98515 90000_Application_Execution_Environment_Users_Manual_Dec85 90000 Application Execution Environment Users Manual Dec85
98515-90000_Application_Execution_Environment_Users_Manual_Dec85 manual pdf -FilePursuit
98515-90000_Application_Execution_Environment_Users_Manual_Dec85 98515-90000_Application_Execution_Environment_Users_Manual_Dec85
User Manual: 98515-90000_Application_Execution_Environment_Users_Manual_Dec85
Open the PDF directly: View PDF .
Page Count: 413
Download | |
Open PDF In Browser | View PDF |
HP 9000 Series 200/300 Computers Fli;- a!1!II Application Execution Environment User's Manual HEWLETT PACKARD Application Execution Environment User's Manual for HP 9000 Series 200/300 Computers Manual Reorder No. 98515-90000 © Copyright 1985 Hewlett-Packard Company This document contains proprietary information which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced or translated to another language without the prior written consent of HewlettPackard Company. The information contained in this document is subject to change without notice. Restricted Rights Legend Use, duplication or disclosure by the Government is subject to restrictions as set forth in paragraph (bX3XB) of the Rights in Technical Data and Software clause in DAR 7-104.9(a). © Copyright 1980, Bell Telephone Laboratories, Inc. © Copyright 1979, 1980, The Regents of the University of California. This software and documentation is based in part on the Fourth Berkeley Software Distribution under license from the Regents of the University of California. Hew.eU-Packard Company 3404 East Harmony Road, Fort Collins, Colorado 80525 Printing History New editions of this manual will incorporate all material updated since the previous edition. Update packages may be issued between editions and contain replacement and additional pages to be merged into the manual by the user. Each updated page will be indicated by a revision date at the bottom of the page. A vertical bar in the margin indicates the changes on each page. Note that pages which are rearranged due to changes on a previous page are not considered revised. The manual printing date and part number indicate its current edition. The printing date changes when a new edition is printed. (Minor corrections and updates which are incorporated at reprint do not cause the date to change.) The manual part number changes when extensive technical changes are incorporated. December 1985 ... Edition 1 NOTICE The information contained in this document is subject to change Without notice. HEWLETT·PACKARD MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MANUAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material. WARRANTY A copy of the specific warranty terms applicable to your Hewlett-Packard product and replacement parts can be obtained from your local Sales and Service Office. ii Table of Contents Chapter 1: Introduction What is AXE? ...................................................... What's In This Manual ................................................ What Parts Should I Read? ....................................... , Conventions ................................................... Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. , 1 2 3 3 4 Chapter 2: Installing AXE Installation Overview ................................................ , 5 Pre-Installation Checklist .............................................. 6 Before Installing AXE ................................................ 8 Your Destination Disc ............................................ 8 Description of a System Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8 Installing AXE from Flexible Disc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 11 Installing AXE from Cartridge Tape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 28 After Installing AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 45 Reconfiguring Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 46 Creating a Recovery System ...................................... 48 Backing Up Your System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 48 Look through the Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 48 Installation Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 49 Chapter 3: Getting Started Becoming Familiar With The Keyboard .................................. Entering Text ................................................. Logging On To The Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How To Login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How to Log Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How To Change Your Password ........................................ 51 51 55 55 56 57 Chapter 4: Using the System: PAM Introducing PAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Two Versions of PAM ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Some Prerequisites for PAM .......................................... What are Function Keys? ........................................ The "Control" Key ............................................. The PAM User Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Looking at the PAM Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The PAM Screen Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a Folder? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Folders Vs. Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 59 60 61 61 62 62 64 64 65 66 iii The Folder Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. , 67 The File Indicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 67 PAM's Command Area ............................................. , 70 The Command Line ............................................ , 70 The Echo Function Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 72 Using the System .................................................. 73 Using the Non-Windows Version of PAM ............................. 73 Using the Windows Version of PAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 73 Working in a Folder ................................................. 75 Opening a Folder .............................................. , 75 Closing a Folder .............................................. , 76 How to Run a Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 76 Looking at the Contents of a File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 77 Rereading a Folder ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 78 How to Print a File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 78 Working with Folders and Files ., . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 80 Creating a Folder .............................................. 80 Creating Files ......... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 80 Renaming a Folder or File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 81 Moving a Folder or File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 82 Copying Files ................................................. 83 Deleting a Folder or File ....... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 84 Special Cases ..................................................... 86 Running PAM ................................................. 86 Leaving PAM ................................................. , 86 Learning PAM in Greater Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 87 Command Line Quoting .......................................... 87 Command Line Pattern Matching ................................... 88 Redirecting Input and Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 89 What is a Pipe? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 92 Sequential Processing ........................................... 93 Nonsequential Processing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 95 What is a Script File? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 95 Using an Autost File .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 100 Direct Execution of Script Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 101 PAM's Environment File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 102 Selecting Alternate Environments with getenv. . . . . . . . . . . . . . . . . . . . . . . .. 107 Networking and PAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 108 Networking Errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 109 Networking Messages .......................................... 109 PAM Messages ................................................... 110 iv Chapter 5: Helpful Tips for Managing Your Files Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a File? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a Folder? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How The File System Is Structured . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How to Organize Your Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How to Find a File ............................................ Backing Up Your Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Purging Unused Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Other File Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. File Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Device Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Archiving Seldom Used Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 115 115 116 11 7 117 118 121 122 122 122 122 122 Chapter 6: Creating Text Files: The vi Editor What is vi? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Conventions ................................................. The vi Modes ................................................ A Short Tutorial. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using vi ........................................................ Entering vi .................................................. The Command Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Moving Around . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Text Input Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Inserting Text ................................................ Deleting Text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Modifying Text ............................................... Searching For Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Leaving vi and Saving Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Additional Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. More Information About vi. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. I Can't Get vi .................... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 123 124 124 125 129 129 129 130 132 132 133 133 134 135 136 137 138 Chapter 7: A New Way of Organizing Tasks HP Windows 9000 Who Can Use Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Overview of Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Multitasking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Why Use Windows? ........................................... Types of Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Detailed Windows Commands .................................... Important Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Window Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Selected Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 140 140 141 142 142 142 142 143 143 144 144 v The Pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Moving the Pointer ............................................ The Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using the Mouse. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Graphics Tablet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Keyboard Commands .......................................... The Pop-Up Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Windows and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Window Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a New Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Destroying a Window or Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Moving a Window ............................................ , Changing the Size of a Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Selecting Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Bringing a Window to the Top of the Stack . . . . . . . . . . . . . . . . . . . . . .... , Putting a Window on the Bottom of the Stack ....................... , Icon Operations .............................................. , Repainting the Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Pausing Window Output ........................................ Scrolling Information in a Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Save Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Cases .................................................... Entering Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Leaving Windows ............................................. 144 145 145 145 146 147 148 149 150 150 151 152 154 156 157 158 158 161 161 162 164 165 165 166 Chapter 8: More Details of AXE The AXE Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Utilities .................................................... , The Shell ................................................... Other Shells ..................................................... BUilding on AXE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Where To Get More Information .................................. 167 168 169 169 169 170 171 Chapter 9: Caring for Your AXE System Periodic Checks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Important Files ................................................... Backing up and Restoring the File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Backup Strategies and Trade-offs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Backing Up the System ........................................ , Restoring the System .......................................... , Special Considerations ......................................... , Checking Your File System ......................................... , preen option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... , 173 175 176 176 178 185 187 188 189 vi yes or no option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. For More Information .......................................... Managing Disc Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Determining Available Disc Space ................................. Using the find Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Logging Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 190 191 192 192 193 194 Chapter 10: AXE System Administration Adding and Removing Users .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Adding A New User ........................................... Removing a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Adding to the Checklist File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .... , Becoming the Root User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Booting AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Boot ROM Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Boot ROM's Search Sequence ................................ After Booting ................................................ Creating a New File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a New Operating System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a Minirnum Operating System ............................. Creating the Maximum Operating System ........................... Creating a Custom Operating System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a Recovery System ......................................... Booting the Recovery System .................................... Using the Recovery System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Initializing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Mounting and Un mounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. To Mount a File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. To Unmount a File System ...................................... Mounting/Unmounting File Systems using / etc/ checklist. . . . . . . . . . . . . . . .. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Reconfiguring Swap Space and System Parameters. . . . . . . . . . . . . . . . . . . . . . . .. What Can Be Configured ........................................ Using Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Parts to Configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Changing System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Removing Optional Products or Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting the System Clock. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up and Removing A Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up a Printer ........................................... 196 196 199 200 202 203 204 206 208 209 210 212 213 215 216 218 219 223 224 224 225 225 226 228 229 229 230 232 238 239 240 241 242 242 vii Removing A Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Other Useful Printer Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up and Removing A Remote Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up a Remote Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Removing A Remote Terminal .................................... Setting Up Mass Storage Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Magnetic Tape Unit and Volume Numbers ........................... Setting Up Plotters and Digitizers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Shutting Down the System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Updating AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Preparing to Update ........................................... Locate and Write-protect the Product. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Load the Update Tools ...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Perform the Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up Peripheral Devices: Genera! Information 246 246 247 247 249 251 254 255 257 259 260 261 261 262 274 Appendix A: System Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 275 Appendix B: List of vi Commands ....................................... 277 Appendix C: Window Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 283 Appendix D: Partitions and File Sets Recovering Lost Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 285 Partitions and Their File Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 291 Appendix E: Determining Swap Size What is Swap Space? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 305 Determining the Amount of Swap Space You Need ........................ 306 Appendix F: Installing Applications ...................................... 309 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 313 Subject Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 325 viii Introducing and Installing AXE Chapter 1: Introduction Vv'hat is AXE? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1 What's In This Manual ................................................ 2 Chapter 2: Installing AXE Installation Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 5 Pre-Installation Checklist .............................................. 6 Before Installing AXE ................................................ 8 Installing AXE from Flexible Disc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 11 Installing AXE from Cartridge Tape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 28 After Installing AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 45 Installation Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 49 Table of Contents 1 Chapter i: introduction What is AXE? ...................................................... What's In This Manual ................................................ What Parts Should I Read? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Conventions ................................................... Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1 2 3 3 4 Introduction 1 What is AXE? AXE, the Application Execution Environment, is a small HP-UXI operating system. AXE includes all parts of HP-UX necessary to execute commands to create and manage files and to run programs. AXE provides an easy-to-use interface program called PAM (Personal Application Manager) so you can run your applications, store and move files, and execute commands. an,... Your system has !!; 'j 12 ; editor, t~ditor, for you to create text files and modify your text files (optionally loaded means the editor is not automatically loaded into the system during installation; you will have to specifically request the editor to be loaded). If you purchased enough memOry.aT, • 'ljtlll ,..s@your system can use HP Windows/9000. Windows (described in Chapter 7) lets you graphically organize your computer operations in a way similar to organizing papers on a desk. 1 HP-UX is an enhanced version of UNIX@, a trademark of AT&T Bell Laboratories. Detailed HP-UX documentation comes with an upgrade to AXE: the Programming Environment: see Chapter 8, "More Detailed Uses of AXE." Introduction 1 What's In This Manual This manual is broken into ten chapters and some appendices. The following topics are covered in this manual: • Chapter 2, Installing AXE: how to install AXE, what to do after you install AXE • Chapter 3, Getting Started: using the keyboard, logging in, changing your password • Chapter 4, PAM: a friendly way to use the system to run your applications • Chapter 5, Helpful Tips on Managing Your Files • Chapter 6, The vi editor: an editor letting you enter, modify and store text • Chapter 7, HP Windows/9000: a new way to organize tasks and run applications programs • Chapter 8, More Detailed Uses of AXE: what are shells, and how to access the on-line command and file descriptions • Chapter 9, Caring For Your AXE System: monitoring and backing up files, checking the file system • Chapter 10, The AXE System Administration 2 : administration tools for the AXE system, booting AXE, shutting down AXE • Appendices: lists of system commands, vi commands, window commands, AXE file sets, and swap space. Some of the chapters include a summary at the beginning of the chapter. This summary can help you in several ways. If you are already familiar with the material in the chapter, you can refresh your memory by reading over the summary. If you have never seen the material in the chapter, you can use the summary as a quick reference after you have read the material. 2 A system administrator is the person in charge of setting up the computer system: installing and configuring the system. 2 Introduction What Parts Should I Read? The following table shows the chapters you should read depending on your needs. Table 1-1. Necessary Chapters Chapters Uses 4 1 2 3 Upkeep of your system X X X Running applications X X X General Use X X X 5 6 7 10 8 9 X X X X X X X X Conventions As you read through this manual, you will see different print used in the text. The following list describes the use of the different print to make reading easier: bold italics Bold type is used for the first definition of a term and for emphasis. Italicized type is used for quoting, generic input statements such as file_name, and emphasis. When you see something like: copy file_name, the file_name refers to a name of a file name you have to type, for example file1 (see computer type). computer Computer type is used for anything that is typed on the screen. If you see something like: Type cd, you are to actually type cd. If you see something like: Type cd folder _name, you are to only type cd and then you substitute a real file name for folder _name. Computer type also represents screen output. Words or letters contained in boxes, for example: refer to keys on the keyboard. I Return I, []I), or [TI Open This type of boldface typing refers to function keys of an application. You will find a detailed description of this convention in the chapter, "Using the System: PAM." Color When you see Color text, this means you are to perform the action that is colored (it can be a description of an action, or something that you type). You will see Color in the sections of chapters which describe interaction with the computer. Introduction 3 Assumptions This manual makes some assumptions: you wish to use AXE for applications oriented tasks, and you do not plan to write programs. You are not expected to be an HP-UX expert. AXE is a helpful tool to make your job easier. 4 Introduction Table of Contents 2 Chapter 2: instaiiing AXE Installation Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 5 Pre-Installation Checklist .............................................. 6 Before Installing AXE ................................................ 8 Your Destination Disc ... ___ ... __ . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8 Description of a System Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8 Installing AXE from Flexible Disc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 11 Installing AXE from Cartridge Tape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 28 After Installing AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 45 Reconfiguring Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 46 Creating a Recovery System ...................................... 48 Backing Up Your System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 48 Look through the Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 48 Installation Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 49 2 Installing AXE You received your AXE system on several flexible discs or on one cartridge tape. Installing AXE involves inserting the discs or tape and loading the contents onto your hard disc. After installation, the hard disc contains the information needed to boot AXE when you turn power on to your computer. This chapter provides a step-by-step procedure for installing the AXE Operating System on HP 9000 Series 300 computers, Models 310 and 320. You must read and fill out the checklist items before installing AXE. This will save you time on installation, and may prevent you from needing to re-install AXE. Each item on the checklist tells you where to look for the information needed to fill out the checklist item. Installation Overview For your convenience, here is an overview of the major steps involved in the software installation of the AXE Operating System. You should already have your hardware installed, using the guidelines in Peripheral Installation Guide. 1. Fill out the pre-installation checklist on the following page. 2. Load the first of the installation flexible discs, or the installation tape. 3. Follow and respond to the installation utility menus 4. Make the necessary changes to your AXE system using the reconfig program. 5. Store your installation tape or flexible discs in a safe place 6. Follow the gUidelines in the "After Installing AXE" section Installing AXE 5 Pre-Installation Checklist Fill out this checklist before you begin the installation procedure. Information from this checklist will be needed during installation. File Sets and Partitions Fi""~'''''' ,..iI.s'" .. ~_.iI ift·"""ndix U. You must install the filesets from the "SYS_CORE" partition. Other file sets are optional. Go through the list of filesets in Appendix D and decide what optional filesets you wish to load. The required file sets are already filled in. Partition: SYS_CORE Partition: Filesets: 98515 Fiiesets: ACORE ACORE2 ACORE3 ACORE4 ACORE5 Partition: Partition: Filesets: Filesets: Swap Space Required Swap space is an area that will be created on your hard disc (destination disc) when your file system is created (during the installation process). You must determine your swap space requirements now; if you require more than the default amount of swap space, and don't request it during the installation process, you will need to re-install AXE. Swap space is discussed in Appendix E. TOTAL SWAP SPACE REQUIRED (in Kbytes) _ __ (continued on next page) 6 Installing AXE 98515·90000, rev: 4/86 Hardware information Does your system have a 98620B DMA card? _ _ _ _ _ __ Will your destination (root) disc be connected to an HP 98625A/B high-speed HP-IB interface card? _ _ _ _ _ __ Will you be installing from cartridge tape or from flexible disc? _ _ _ _ _ __ Will you be installing from an integrated device? Le., is the flexible disc or cartridge tape drive part of the hard disc drive? _ _ _ _ _ __ If you are NOT installing from an integrated device, you must fill in the folloWing address information for your destination (root) disc. If you set up your drives using the guidelines in the Peripheral Installation Guide, you can fill in the information from your worksheet: Select Code _ _ _ _ _ __ Bus Address _ _ _ _ _ __ Unit Number _ _ _ _ _ __ Volume Number _ _ _ _ _ __ Major Number: Always 0 Installing AXE 7 Before Installing AXE You should already have your computer, hard disc drive, installation tape/flexible disc drive, and all interface and memory cards installed and tested. Follow the gUidelines in the Peripheral Installation Guide to install your hardware if you have not already done so. Your Destination Disc The hard disc drive you will install AXE onto is called the destination disc in this chapter. If you have information on your destination disc that you do not want destroyed, you must save the information now. The installation process will overwrite everything on your destination disc. If you have never used this disc, you do not need to worry about this caution. Description of a System Console The system console is a keyboard and monitor (or terminal) given a unique status by AXE and associated with the special (device) file /dev/console. All boot ROM error messages, AXE system error messages, and certain system status messages are sent to the system console. Under certain conditions (for example, the single-user state), the system console provides the only mechanism for communicating with AXE. 8 Installing AXE The boot ROM and the AXE operating system assign the system console function according to a prioritized search sequence. AXE's search for a system console terminates as soon as one of the following conditions is met: • A built-in serial interface, HP 98626A, HP 98628A 1 , HP 98642A, or HP 98644A RS232C serial interface is present with the "remote bit,,2 set. If more than one serial interface card with its "remote bit" set is present, the one with the lowest select code is used. In the case of the HP 98642A (4-channel multiplexer), port 1 is used. • An "internal" bit-mapped display is present. This is true if a Model 310 built-in video output, HP 98542A, HP 98543A, HP 98544A or HP 98545A board is present. It is also true if an HP 98700H display station with its display interface card (HP 98287 A) configured for "internal" control space is present. Note that if the HP 98700H display station's display interface card (HP 98287 A) is configured for "external" control, it is never chosen ("external" bit-mapped displays have a specific select code address and "internal" bit-mapped displays do not). • An HP 98546A compatibility video interface is present. • A built-in serial interface, HP 98626A, HP 98628A, HP 98642A, or HP 98644A RS-232C serial interface is present without the "remote bit" set. If more than one is present, the one with the lowest select code is used. In the case of the HP 98642A (4-channel multiplexer), port 1 is used. The boot ROM does not recognize the serial interface card as console when this condition is met; however, AXE does. If none of the above conditions are met, no system console exists. While boot ROM tolerates this, AXE will not. 1 The HP 98628A Datacomm Interface Card with its "remote bit" set is not supported as a remote console by the Revision A boot ROM; however, it is supported as the system console by the AXE operating system. Therefore, when an HP 98628A card is used and has its "remote bit" set, the boot ROM sends messages to the next console found, but AXE sends its messages to the ITE (terminal) associated with the HP 98628A card. 2 On the HP 98626A Serial Interface board the remote bit is set by cutting a jumper as described in the installation manual supplied with your computer. On the HP 98628A, HP 98642A and HP 98646A interface cards the remote bit is set by setting a switch on the board as described in each board's installation manual. Installing AXE 9 Additional Considerations This section contains information on bit settings for the HP 98626A RS-232C Serial Interface Card's Line Control Switch Pack. The boot ROM requires that the Line Control Switch Pack settings on the HP 98626A RS-232C Serial Interface card be set to the same setting as your remote terminal. AXE resets these values to system defaults on log in. These values are as follows: Stop Bits should be set to 1. BaudRate should be set to 9600 bps. Parity/DataBits should be set to 0's/7. Enq/Ack should be set to NO. Pace (Handshake) should be set to XON/XOFF. To make the above settings on your HP 98626A Serial Interface card, set your cards Line Control Switch Pack (U-2) switches as follows: bit 0 bit 1 bit 2 bit 3 bit 4 bit 5 bit 6 bit 7 1 1 0 0 1 0 1 0 Additional settings for Handshake Type bits 6 and 7 of the Line Control Switch Pack are: Bit 6 Bit 7 Handshake Type 0 0 ENQ/ACK 1 0 XON/XOFF 0 1 NO HANDSHAKE 1 1 NO HANDSHAKE Note that the other switch settings for the Line Control Switch Pack on the HP 98626A card are defined in the installation manual supplied with that card. 10 Installing AXE Installing AXE from Flexible Disc NOTE The whole installation process can take anywhere from one to three hours depending upon the size of the disk being initialized and the number of products you dedde to load. 1. Turn your computer off. 2. Turn on the hard disc drive and the drive you will use for the installation. 3. Insert the first installation flexible disc. Find the discs from the SYS_CORE partition (the discs with no label color (grey discs)). Locate the write-protect mechanism; see Figure 2-1 to locate the write-protect mechanism. For the installation process to be successful, your system must be able to write to the media. The write protect mechanism is located on the back of the disc. Move the protect mechanism away from the label end of the disc, as shown in Figure 2-1. Hold the flexible disc with the label up and towards you (the write protect mechanism will be underneath the disc) and insert the first installation disc into the left side of the disc drive and push until it clicks into place. Write-Protec ~ Mechanism . I E) 0 ) n U 0 ( / Figure 2-1. Flexible Disc Write Protect Mechanism Installing AXE 11 4. After the busy light on your flexible disc drive shuts off, turn on your computer and system console display. NOTE If you have any bootable system currently on your hard disc, you will need to enter the boot ROM's attended mode by holding down the space bar after you turn your computer on (see discussion below). If you are installing AXE to a disc with a bootable system on it, you need to immediately hold the space bar down during the boot ROM power-up sequence, and continue holding it down until the word "keyboard" appears on the left side of your screen. This stops the boot ROM from automatically booting an operating system if one exists on your hard disc. You will see a series of messages on your console similar to those shown in Figure 2-2. Copyright 1985. Hewlett-Packard Company. All Rights Reserved. :HP9122REM. 704. O. 0 1H SYSHPUX 1B SYSBCKUP BOOTROM REV.A Bit Mapped Display MC68020 Processor MC68881 Coprocessor Keyboard HP-IB HP98644 at 9 HP98625 at 14 2096992 Bytes SEARCHING FOR A SYSTEM (RETURN To Pause) RESET To Power-Up Figure 2-2. First Installation Messages 12 Installing AXE 5. Choose the correct operating system. On the right side of your screen, you will see one or more HP product numbers, followed by a list of operating systems found on the disc drive associated with the product number. Choose the AXE operating system (SYSHPUX) corresponding to the product number of the drive that contains the installation disc. In the example shown in Figure 2-2, using an HP9122 disc drive for installation, type OJ I H II Return I. It will take a couple of minutes for the installation program to be loaded. installation utility menus as instructed in the following steps. Follow the The message Booting /hp-ux appears on the screen and the system starts loading the AXE operating system off the flexible disc. The AXE operating system now displays messages pertaining to the system configuration, how much memory is left, and the system copyrights. The AXE operating system loads some more information, then the copyright information will disappear and a new menu will appear (shown in Figure 2-3) to ask you whether you wish to begin or exit the installation procedure. ******************************************************* HP-UX INSTALLATION UTILITY -- MAIN MENU ******************************************************* Choice b e Description BEGIN installation process EXIT installation process Please enter choice (b or e), hit [Return] » Figure 2-3. Main Installation Menu Installing AXE 13 6. Begin the installation process. NOTE The installation procedure will destroy all the files on the destination hard disc, if any exist. • If this is the first time your are installing AXE on this hard disc, or you are sure you don't want files that currently exist on the disc, enter W 1Return I. A screen similar to that shown in Figue 2-4 will appear. Continue with step 7. • If you have files on your destination disc (Le. your destination disc has information on it) and need to save any files, type [i] 1 Return I to exit the installation process. If you wish to save any of the files currently on your disc, exit the installation procedure and reboot your old system, and back up any files you want to save. **************************************************** HP-UX INSTALLATION UTILITY -- DEVICE MENU **************************************************** Destination Device Source Device Major number Select code Bus address Unit number Volume number Choice [Return] e d 4 14 0 1 0 Major Number Select code Bus address Unit number Volume number Description CONTINUE installation process EXIT installation process change DESTINATION device Please enter choice (e or d). hit [Return] » Figure 2-4. Device Menu 14 Installing AXE 0 14 0 0 0 7. Verify the destination device. The screen you now see {similar to Figure 2-4} shows you the source address (installation drive) and default destination address {root disc drive}. The major numbers for both the source and destination devices will be correct. The source address will be correct, but you must check the destination address {select code, bus address, unit number, and volume number}. If your source device {installation drive} and destination device {root disc drive} are integrated {both housed in the same box, product numbers HP9153A or HP9133D/H/L}, these values will be correct. If your source and destination devices are not integrated, you will need to change the destination device address. You should have the adddress written on your pre-installation checklist. You may perform any of the following tasks now: • If you wish to continue with the installation process, using the device parameters as shown, press I Return I {be careful not to press in several returns}. The message Checking values ... will be displayed. Go to step 8. • If you wish to exit the installation process, type Wand I Return I. • If you need to change the address for the destination device, type Wand I Return I. You will be prompted for the select code, bus address, unit number, and volume number. These are discussed in your Peripheral Installation Guide, and should be written on your pre-installation checklist. To change a value, type in the new value followed by I Return the old value will be retained. I; if you just hit I Return I When you are finished changing the values, the message Making device file will be displayed on the screen. You will be returned to the screen shown in Figure 2-4. To continue the installation process, hit I Return I. Installing AXE 15 8. After you hit I Return I (from step 7 above), the message Checking values ... will be displayed. Install will verify that the information you gave is correct if you have only one hard disc connected. If you have more than one hard disc, you must verify these numbers yourself. The system will check your destination device, and depending on what kind of device you have, you mayor may not get the following message(s): aaaaa Will your root disc be on a 98625A/B (disc HP-IB interface card)? [yIn] » Does your system have a 98620B (DMA) card? [yIn] » You should be able to answer these questions from the pre-installation checklist. When you have answered these questions, the installation will continue. The disc parameters menu (Figure 2-5) will appear on your console. 9. Verify the values displayed on the disc parameters menu. You normally should not change these numbers. require non-default hard disc parameters. However, some applications may Swap space is the most common parameter to change. If your applications require more than the default amount of swap space, it is important that you change swap space now. If you do not have enough swap space, you may need to re-install AXE later. You should have your swap space requirements filled out on the pre-installation checklist. If you change the swap space, the system will configure the swap space to be an appropriate value close to the number you request. Parameters other than swap space should be changed only if your application requires it, or if you fully understand the impact they can have on your system. 16 Installing AXE **************************************************** HP-UX INSTALLATION UTILITY -- DISC PARAMETERS MENU **************************************************** Swap Size: Block Size: Fragment Size: 10192 8192 1024 Interleave Factor: Free Space Threshold: Rpms of the disc: Density- bytes / inode: 1 10 3600 2048 Choice Description [Return] e b d f i r s t CONTINUE installation process EXIT installation process change disc BLOCK size change DENSITY (bytes per inode) change disc FRAGMENT size change disc INTERLEAVE factor change disc RPMS change disc SWAP size change disc free space THRESHOLD size Use the values shown above unless you need to change them for tuning. Enter choice followed by [Return] or hit [Return] to continue » Figure 2-5. Disc Parameters Menu NOTE Copy the values from your screen to Figure 2-5. You need several of these values to properly manage your system once it is installed. If you do not need to change any of the hard disc parameters, type I Return I to continue. If you need to change any of the values, type the letter corresponding to the choice and I Return I. Type the new value followed by a I Return I to enter the new value. This will display a new message at the bottom of the screen: Please enter choice (e.b.d.f.i.r.s. or t). hit Return] » If you need to change any other parameters, enter the appropriate choice. Installing AXE 17 NOTE If you change the swap space, the system will configure the swap space to be an appropriate value close to the number you request. When you have changed the necessary parameters, go to step 10. 10. Press I Return I to continue with the installation. You should now see a menu similar to the menu shown in Figure 2-6. This menu is shown so you can verify the correct address for the destination device. If the information is correct, go to step 11. If any information is incorrect, enter ~ and I Return I to exit the installation procedure. To restart the procedure, turn off your computer and continue with step 4. **************************************************** HP-UX INSTALLATION UTILITY -- INSTALL MENU **************************************************** DESTINATION DEVICE Major Select Bus Unit Volume Choice b e Number Code Address Number Number o 14 o o o Description BEGIN Initialization and Installation EXIT Installation Process Please enter choice (b or e). hit [Return] » Figure 2-6. Installation Device Menu 18 Installing AXE m 11. Press and of HP-UX. I Return I to begin the initialization of the destination disc and the installation The following message and prompt will appear at the bottom of your screen: WARNING !! Proceeding will DESTROY the contents of unit xxx, volume xxx of the Destination Device. Do you want to proceed? [yin] » CAUTION Do not switch off power to the computer or hard disc drive during disc initialization. Terminating the initialization process in this fashion may seriously corrupt the disc medium. The only way to install AXE is to type in Wand I Return I. If you think that any of the parameters you entered on previous menus are wrong, or if you do not wish to erase any information on the destination disc, type [6J and I Return I. Answering n will exit the installation procedure. If you entered [iJ, disc initialization begins. The menu, as shown in Figure 2-7, informs you the destination disc is being initialized (jdev /hd and /dev /rhd reference your destination disc). The source drive will also be accessed during the initialization process. The media initialization process sets up your hard disc for normal use. Disc initialization can take from four minutes to fifty minutes depending on the size of your disc. See Table 2-1 at the end of this chapter for approximate initialization times. In addition to initializing the disc, the installation process will create a file system and load important files to the hard disc. The total time before you must interact with the installation process again is between 30 minutes and 3 hours. NOTE See Table 2-1 at the end of this chapter for approximate initialization times. Installing AXE 19 After media initialization, the set of installation tools needed to complete the installation process is copied onto the root disc. You will see a trace of the files being copied, similar to the display shown in Figure 2-7. If you decide to abort the installation process, type ~ and I Return I. **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** Initializing: /dev/rhd This will take between fifteen minutes and three hours Making file system on device: /dev/hd Mounting device: /dev/hd Making directory: /dev Making device file: /dev/console Making device file: /dev/mem Making device file: /dev/kmem Making device file: /dev/null Making device file: /dev/swap Making device file: /dev/tty Making directory: /etc Making directory: /disc Making directory: /usr Making directory: /usr/bin Copying file: /hp-ux Copying file: /etc/copyinit Copying file: /etc/sbtab Figure 2-7. Installation Trace # 1 After the trace shown in Figure 2-7, the trace will disappear, and the following two lines will appear: Copying file: /etc/mkfs Copying file: /etc/mediainit 20 Installing AXE AXE then automatically reboots (this takes about 2 minutes), then prompts you for new media: Please insert media "2" from partition: "SYS_CORE" when BUSY light remains off, hit [Return] » Disc 2 must not be write-protected. Insert the second flexible disc from SYS_CORE. You will see message: ... verifying ... If you loaded the wrong flexible disc, you will be prompted to load the correct disc. The installation process will now load files from the second disc; you will see the execution trace similar to Figure 2-8. **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** Mounting device: /dev/src Making directory: /bin Making directory: /usr Making directory: /usr/bin Making directory: /etc Making directory: /tmp Making directory: /etc/filesets Copying file: /disc/bin/cpio Copying file: /disc/bin/mkdir Copying file: /disc/bin/sh Copying file: /disc/bin/pwd Copying file: /disc/usr/bin/lifcp Copying file: /disc/usr/bin/tcio Copying file: /disc/etc/init2 Copying file: /disc/etc/update Copying file: /disc/etc/sysrm Figure 2-8. Installation Trace #2 Installing AXE 21 After loading the tools, the screen will clear, and the following menu will appear on your screen: **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** setting up device files .. . reading contents file .. . The program then loads all the required files and their file sets and displays a screen similar to the screen shown in Figure 2-9. The "XXXXXXX" refers to the fileset number or fileset name. install will prompt you to insert the rest of the core (required) discs. As you are prompted to insert discs, put the discs in the flexible disc drive. For each disc, the installation procedure will wait until you insert the disc, and will verify that you have inserted the correct flexible disc before continuing. Each time you insert a disc, wait for 5 to 10 minutes while the files are copied from the flexible disc to the hard (destination) disc (a screen similar to Figure 2-9). These discs contain files needed for AXE. 22 Installing AXE **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** Loading files from "XXXXXXX" Loading: etc/init Figure 2-9. Execution Trace #3 NOTE You now have the core (required) files loaded on your system. Installing AXE 23 12. Exit the installation process or load more filesets. If you wish to have only the core AXE system loaded, hit ~ and installation procedure. If you wish to install optional filesets or products, hit wand following line added to Figure 2-10: I Return 1 to exit the I Return I. You will see the Please insert disc Decide which disc contains the file sets you want to load (from your pre-installation checklist or by looking in Appendix D). Insert the disc containing the filesets. You will now see the menu in Figure 2-11. ******************************************************** HP-UX INSTALLATION UTILITY -- FILESET MENU ******************************************************** Choice Description e EXIT install process DISPLAY installation options for a new fileset d Please enter choice (letter or number), hit [Return] » Figure 2-10. Fileset Menu # 1 The menu shown in Figure 2-11 shows the filesets you can load from the disc you have chosen. You can now choose to load all the filesets on the disc, the individual file sets you want, or exit. 24 Installing AXE ******************************************************** HP-UX INSTALLATION UTILITY -- FILESET MENU ******************************************************** Choice Description e EXIT install process DISPLAY installation options for a new fileset Process ALL filesets listed below d a 1 2 3 4 fileset_l fileseC2 fileset_3 fileset_4 Please enter choice (letter or number), hit [Return] » Figure 2-11. Fileset Menu NOTE The time it takes to complete this process varies; it takes about 15 minutes per flexible disc to copy optional partitions and filesets to your hard disc. • If you wish to install all the filesets on this menu, press ~ and I Return I. • If you wish to install only certain filesets, enter the fileset number and hit I Return You will be returned to this menu when the fileset is loaded. Installing AXE I. 25 • If you choose to "DISPLAY installation options", press m and I Return I. You will get a message: insert media from a new partition. Choose any flexible disc of the color of partition you wish to install, and press I Return I. The instal\ation procedure will read the table of contents, and return you to a menu similar to the menu in Figure 2-11. • If you wish to exit this menu, press [i] and I Return I. If this is the first time you see this menu, and you decide to exit without loading anything, you will have only the core (required) files loaded on the system. 13. After you finish installing both the mandatory operating system (end of Step 11) and the optional pieces you want (end of step 12) your screen will clear and the screen shown in Figure 2-12 will appear: **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** unloading media ... When Busy light remains off. hit [Return] » cleaning up ... Figure 2-12. Screen for Exiting Fileset Menu The program will unload the media for you. Press I Return 1 when the light on the flexible disc drive remains off, and remove the media. Remember to store all installation media in a safe place. 26 Installing AXE 14. The system will reboot. If your file system closed cleanly, a message indicating this appears. Otherwise, the !sck(1M) program runs automatically and cleans up your file system. This also causes the system to reboot. This situation usually arises when the shutdown(1 M) command was not used to shut down the system (shutdown is discussed in Chapter 10, "Shutting Down the System"), or when power failure occurs. See "Checking Your File System" in Chapter 9 for a brief discussion of !sck. 15. The program, recon!ig, will start up. You should go through some of the reconfig items now, especially the "Security" item. For a description of recon!ig, read the subsection, "Reconfiguring Your System" in "After Installing AXE" in this chapter. If you wish to exit recon!ig, press the Exit softkey. 16. Follow the steps in the next section, "After Installing AXE". Installing AXE 27 Installing AXE from Cartridge Tape NOTE The whole installation process can take anywhere from one to three hours depending upon the size of the disk being initialized and the number of products you decide to load. 1. Turn your computer off before you insert the tape. 2. Turn on the hard disc drive and the drive you will use for the installation. 3. Insert the installation tape. Locate the write-protect mechanism; see Figure 2-13 to locate the write-protect mechanism. For the installation process to be successful, your system must be able to write to the media. The mechanism is on the top, rear, left-hand corner of the cartridge tape and is labelled "SAFE". The arrow on the protect screw should point away from the word SAFE. If it does not, use a coin or screwdriver to turn the protect screw such that the arrow points away from the word SAFE. Hold the tape with the SAFE label in the rear left hand corner and insert it into the tape drive door and push until it clicks into place. The BUSY indicator should now be lit. The tape drive will begin a cartridge tape conditioning sequence that takes approximately two minutes. Write Protected Write Enabled ~SAFE Figure 2-13. Tape Write Protect Mechanism 28 Installing AXE 4. After the busy light on your tape drive shuts off, turn on your computer and system console display. NOTE If you have a bootable system currently on your hard disc, you will need to enter the boot ROM's attended mode by holding down the space bar after you turn your computer on (see discussion below). If you have a bootable system currently on your disc, you need to immediately hold the space bar down during the boot ROM power-up sequence, and continue holding it down until the word "keyboard" appears on the left side of your screen. This stops the boot ROM from automatically booting an operating system if one exists on your hard disc. You will see a series of messages on your console similar to those shown in Figure 2-14. Copyright 1985, Hewlett-Packard Company. All Rights Reserved. : HP9144TAPE, 704, 0, 0 lH SYSHPUX lB SYSBCKUP BOOTROM REV.A Bit Mapped Display MC68020 Processor MC68881 Coprocessor Keyboard HP-IB HP98644 at 9 HP98625 at 14 2096992 Bytes SEARCHING FOR A SYSTEM (RETURN To Pause) RESET To Power-Up Figure 2-14. First Installation Messages Installing AXE 29 5. Choose the correct operating system. On the right side of your screen, you will see one or more HP product numbers, followed by a list of operating systems found on the tape drive associated with the product number. Choose the AXE operating system (SYSHPUX) corresponding to the product number of the tape drive that contains the installation media. In the example shown in Figure 2-14, using an HP9144 tape drive for installation, type OJ [[] I Return I. It will take a couple of minutes for the installation program to be loaded. Follow the installation utility menus as instructed in the following steps. The message Booting /hp-ux appears on the screen and the system starts loading the AXE operating system off the installation tape. The AXE operating system now displays messages pertaining to the system configuration, how much memory is left, and the system copyrights. 30 Installing AXE The AXE operating system loads some more information, then the copyright information will disappear and a new menu will appear (shown in Figure 2-15) to ask you whether you wish to begin or end the installation procedure. ******************************************************* HP-UX INSTALLATION UTILITY -- MAIN MENU ******************************************************* Choice b e Description BEGIN installation process EXIT installation process Please enter choice (b or e). hit [Return] » Figure 2-15. Main Installation Menu Installing AXE 31 6. Begin the installation process. NOTE The installation procedure will destroy all the files on a currently installed disc. • If this is the first time your are installing AXE on this hard disc, or if you are sure you want to overwrite the contents of the hard disc, enter W I Return I. A screen similar to that shown in Figue 2-16 will appear. Continue with step 7. • If you have files on your destination disc and need to save the files, type W I Return 1 to exit the installation process. If you wish to save any of the files currently on your hard disc, exit the installation procedure and reboot your old system, and back up any files you want to save. **************************************************** HP-UX INSTALLATION UTILITY -- DEVICE MENU **************************************************** Destination Device Source Device Major number Select code Bus address Unit number Volume number Choice [Return] e d 4 14 0 1 0 Major Number Select code Bus address Unit number Volume number Description CONTINUE installation process EXIT installation process change DESTINATION device Please enter choice (e or d). hit [Return] » Figure 2-16. Device Menu 32 Installing AXE 0 14 0 0 0 7. Verify the destination device. The screen you now see (similar to Figure 2-16) shows you the source address (installation drive) and default destination address (root disc drive). The major numbers will be correct for both the source and destination. The source address will be correct, but you must check the destination address (select code, bus address, unit number, and volume number). If your source device (installation drive) and destination device (root disc drive) are integrated (both housed in the same box, product number HP 7908, HP 7911, HP 7912, HP 7914, HP 7942 or HP 7946), these values will be correct. If your source and destination devices are not integrated, you will need to change the destination device address. You should have the adddress written on your pre-installation checklist. You may perform any of the following tasks now: • If you wish to continue with the installation process, using the device parameters as shown, press I Return I (be careful not to press in several returns). The message Checking values ... will be displayed. Go to step 8. • If you wish to exit the installation process, type 0 and I Return I. m and I Return I. You will be prompted for the select code, bus address, unit number, and volume number. These are discussed in your Peripheral Installation Guide, and should be written on your pre-installation checklist. • If you need to change the address for the destination device, type To change a value, type in the new value followed by value will be retained. I Return I; otherwise the old When you are finished changing the values, the message Making device file will be displayed on the screen. You will be returned to the screen shown in Figure 2-16. To continue the installation process, press I Return I. Installing AXE 33 8. After you press I Return I (from step 7 above), the message Checking values ... will be displayed. Install will verify that the information you gave is correct if you have only one hard disc connected. If you have more than one hard disc, you must verify these numbers yourself. The system will check your destination device, and depending on what kind of device you have, you mayor may not get the following message(s): Will your root disc be on a 98625A/B (disc HP-IB interface card)? [yin] » Does your system have a 98620B (OMA) card? [yin] » You should be able to answer these questions from the pre-installation checklist. When you have answered these questions, the installation will continue. The disc parameters menu (Figure 2-17) will appear on your console. 9. Verify the disc parameters. You normally should not change these numbers. require non-default disc parameters. However, some applications may Swap space is the most common parameter to change. If your applications require more than the default amount of swap space, it is important that you change swap space now. If you do not have enough swap space, you may need to re-install AXE later. You should have your swap space requirements filled out on the pre-installation checklist. If you change the swap space, the system will adjust the value to the closest swap space value appropriate for the file system. Parameters other than swap space should be changed only if your application requires it, or if you fully understand the impact it can have on your system. 34 Installing AXE **************************************************** HP-UX INSTALLATION UTILITY -- DISC PARAMETERS MENU **************************************************** Swap Size: Block Size: Fragment Size: 10192 8192 1024 Interleave Factor: Free Space Threshold: Rpms of the disc: Density- bytes / inode: 1 10 3600 2048 Choice Description [Return] e b d f i r s t CONTINUE installation process EXIT installation process change disc BLOCK size change DENSITY (bytes per inode) change disc FRAGMENT size change disc INTERLEAVE factor change disc RPMS change disc SWAP size change disc free space THRESHOLD size Use the values shown above unless you need to change them for tuning. Enter choice followed by [Return] or hit [Return] to continue » Figure 2-17. Disc Parameters Menu NOTE Copy the values from your screen to Figure 2-5. You need several of these values to properly manage your system once it is installed. If you do not wish to change any of the disc parameters, type I Return 1 to continue. If you need to change the any of the values, type the letter corresponding to the choice and I Return I. Type the new value followed by a I Return 1to enter the new value. This will display a new message at the bottom of the screen: Please enter choice (e,b,d,f,i,r,s, or t), hit Return] » If you need to change any other parameters, enter the appropriate choice. Installing AXE 35 NOTE If you change the swap space, the system will adjust the value to the closest swap space value appropriate for the file system. When you have changed the necessary parameters, go to step 10. 10. Press I Return I to continue with the installation. You should now see a menu similar to the menu shown in Figure 2-18. This menu is shown so you can verify the correct address for the destination device. If the information is correct, go to step 11. If any information is incorrect, enter [i] and I Return I to exit the installation procedure. To restart the installation process, turn your computer off and continue with step 4. **************************************************** HP-UX INSTALLATION UTILITY -- INSTALL MENU **************************************************** DESTINATION DEVICE Major Select Bus Unit Volume Choice b e Number Code Address Number Number o 14 o o o Description BEGIN Initialization and Installation EXIT Installation Process Please enter choice (b or e). hit [Return] » Figure 2-18. Installation Device Menu 36 Installing AXE m 11. Press and of HP-UX. I Return 1 to begin the initialization of the destination disc and the installation The following message and prompt will appear at the bottom of your screen: WARNING !! Proceeding will DESTROY the contents of unit xxx, volume xxx of the Destination Device. Do you want to proceed? [yIn] » CAUTION Do not switch off power to the computer or hard disc drive during disc initialization. Terminating the initialization process in this fashion may seriously corrupt the disc medium. The only way to install AXE is to type in [1] and I Return I. If you think that any of the parameters you entered on previous menus are wrong, or if you do not wish to erase any information on the destination disc, type [6J and I Return I. Answering n will exit the installation procedure. If you entered [1], disc initialization begins. The menu, as shown in Figure 2-19, informs you the destination disc is being initialized Udev /hd and / dev / rhd both refer to your destination disc). The source drive will also be accessed during the initialization process. The media initialization process sets up your hard disc for normal use. This process can take from four minutes to fifty minutes depending on the size of your disc. See Table 2-1 at the end of this chapter for approximate initialization times. In addition to initializing your hard disc, the installation process creates a file system and copies some important files from your installation tape to your hard disc. The total time before you will need to interact with the installation process again will be between 30 minutes and 3 hours. NOTE See Table 2-1 at the end of this chapter for approximate initialization times. Installing AXE 37 You will see a trace of the files being copied, similar to the display shown in Figure 2-19. **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** Initializing: /dev/rhd This will take between fifteen minutes and three hours Making file system on device: /dev/hd /dev/hd Mounting device: Making directory: /dev Making device file: /dev/console Making device file: /dev/mem Making device file: /dev/kmem Making device file: /dev/null Making device file: /dev/swap Making device file: /dev/tty Making directory: /etc Making directory: /disc Making directory: /usr Making directory: /usr/bin Copying file: /hp-ux Copying file: /etc/copyinit Copying file: /etc/sbtab Figure 2-19. Installation Trace # 1 After the trace shown in Figure 2-19, the trace will disappear, and the following two lines will appear: Copying file: /etc/mkfs Copying file: /etc/mediainit 38 Installing AXE AXE then automatically reboots (this takes about 2 minutes), loads more files; you will see the execution trace similar to Figure 2-20. **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** Mounting device: /dev/src Making directory: /bin Making directory: /usr Making directory: /usr/bin Making directory: /etc Making directory: /tmp Making directory: /etc/filesets Copying file: /disc/bin/cpio Copying file: /disc/bin/mkdir Copying file: /disc/bin/sh Copying file: /disc/bin/pwd Copying file: /disc/usr/bin/lifcp Copying file: /disc/usr/bin/tcio Copying file: /disc/etc/init2 Copying file: /disc/etc/update Copying file: /disc/etc/sysrm Figure 2-20. Installation Trace #2 Installing AXE 39 After loading the tools, the screen will clear, and the following menu will appear on your screen: **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** setting up device files .. . reading contents file .. . The program then loads all the required files and their file sets and displays a screen similar to the screen shown in Figure 2-21. The "XXXXXXX" refers to the file set number or fileset name. It will take from 30 minutes to one hour to load the mandatory file system. **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** Loading files from "XXXXXXX" Loading: etc/init Figure 2-21. Execution Trace 40 Installing AXE # 3 NOTE You now have the core system installed. 12. Load optional filesets or products. You will now see the menu shown in Figure 2-22. From this menu, either exit (if you want only the core system) or choose which optional partition(s) you want to load. ******************************************************** HP-UX INSTALLATION UTILITY -- PARTITION MENU ******************************************************** Choice Description e a EXIT install process DISPLAY installation options for a new partition Process ALL partitions listed below 1 2 3 4 MISC_UTILS SYS_TOOLS PROG_LANGS TEXT d Please enter choice (letter or number), hit [Return] » Figure 2-22. Partition Menu Installing AXE 41 The options are: • If you wish to load all partitions and file sets hit ~ and I Return I. After everything has been loaded, you will return to the menu shown in Figure 2-22, with only the e and d choices (described below). • If you wish to load individual partitions, enter the partition number and hit I Return I. You will see a file set menu similar to the menu in Figure 2-23. Go to step 13. • If you wish to install another product, such as LAN, press wand I Return I. You will be prompted to insert the tape you wish to load. Insert the tape, and after the busy light remains off, press I Return I. You will now see a fileset menu similar to the menu in Figure 2-23. Go to step 13. • If you wish to exit this menu, hit wand I Return I. You will see the screen shown in Figure 2-24, If this was the first time you saw the partition menu, you wi!! have only the core (required) files loaded on the system. 13. Select your filesets. You can now choose to load all the filesets onto the hard disc, the individual filesets you want, or exit. 42 Installing AXE ******************************************************** HP-UX INSTALLATION UTILITY -- FILESET MENU ******************************************************** Choice Description e EXIT install process DISPLAY installation options for a new fileset Process ALL filesets listed below d a 1 2 3 4 partition_l partition_2 partition_3 partition_ 4 Please enter choice (letter or number), hit [Return] » Figure 2-23. Fileset Menu The time it takes to complete this process varies depending on whether you load one or all of the products. • If you wish to install all the filesets on this menu, hit [i] and I Return I. • If you wish to install only certain filesets, enter the fileset number and hit You will be returned to this menu when the fileset is loaded. m • If you choose to "DISPLAY installation options", hit and returned to the menu in Figure 2-22. Continue with step 12. • If you wish to exit this menu, hit ~ and I Return I. I Return I. You will be I Return I. Installing AXE 43 14. After you finish installing the mandatory operating system (step 11) and the optional pieces you want (steps 12 and 13) your screen will clear and the screen shown in Figure 2-24 will appear: **************************************************** HP-UX INSTALLATION UTILITY -- EXECUTION TRACE **************************************************** unloading media ... When Busy light remains off, hit [Return] » cleaning up ... Figure 2-24. Screen for Exiting Fileset or Partition Menu The program will unload the tape for you. Hit I Return I when the light on the source drive remains off, and remove the tape. Remember to store the installation tape in a safe place. 15. The system will reboot. If your file system closed cleanly, a message indicating this appears. Otherwise, the fsck{1 M) program runs automatically and cleans up your file system. This may cause your system to reboot. fsck is usually run when the shutdown{1M) command was not used to shut down the system (see "Shutting Down the System" in Chapter 10 for a discussion of shutdown), or when power failure occurs. See Chapter 9, "Checking Your File System" for a brief discussion of fsck. 44 Installing AXE 16. The program, reconjig, will start up. You should go through some of the reconfig items now, especially the "Modify System Security" item. For a description of reconjig, read the subsection, "Reconfiguring Your System" in "After Installing AXE" in this chapter. If you wish to exit reconjig, press the Exit soft key. 17. Follow the steps in the next section, "After Installing AXE". After Installing AXE NOTE Now that your system is installed, you have the ability to modify and customize the system as described in the next section. If you have purchased software support services from Hewlett-Packard, you can make only limited changes to certain files without voiding your agreement. Consult your support plan or an HP System Engineer regarding intended changes. Now that your AXE system has been installed, you should look through your documentation and perform the following tasks to protect your system: 1. reconfigure your system, 2. create a recovery system, 3. backup your system, 4. look through the documentation. NOTE Each time you wish to power down your system you must follow the procedures in Chapter 10, "Shutting Down your System". If you do not follow these procedures, you may corrupt your file system. 98515-90000, rev: 4/86 Installing AXE 45 46 Installing AXE Reconfiguring Your System After the installation program is finished, the program called reconf;g will automatically begin. To choose an item from the reconf;g screen, use the Return key until you highlight the item you wish, then press the Select softkey. The reconf;g program lets you upgrade and customize your system easily. The program lets you: • add a new user, See the section called "Adding and Removing Users" in Chapter 10. • delete a user, See the section called "Adding and Removing Users" in Chapter 10. • add remote terminal support, See the section called "Adding a Remote Terminal" in Chapter 10. • configure the line printer, See the section called "Setting Up and Removing a Printer" in Chapter 10. • create a new AXE operating system (add optional drivers to the AXE kernel), You will see this menu item only if you loaded the ACONFIG fileset. See the section called "Creating a New Operating System" in Chapter 10. • modify system security. See the description below. Modify System Security A secure system forces people to login to your computer. With security on, no one will be able to simply turn on the power to access or change your information. To select this form, hit the I Return I key until the item "Modify System Security" is highlighted, then press the Select softkey. Your AXE system is sent with security disabled, so you will see the following screen: Please indicate below whether you wish to have full system security enabled (i.e .. users must login) or disabled: >disabled 98515-90000, rev: 4/86 Installing AXE 46.1 If you wish to enable system security, hit the Next softkey and the box will change to read: >enabled Press the Done softkey to cause the operating system to change: pressing Main Menu will return you to the main menu without implementing the security change. When you exit the reconfig program, your system will change run levels and give you a login prompt. The four default logins are described below. If you have System Security Enabled If you request a secure system, the only way to gain access to AXE is to complete a login request; the system must know who you are before it will let you execute any programs. A secure system has four default logins: • "window" - when you log in you will get the pam shell inside a window. You must have windows installed before you log in as "window". • "nowindow" • "root" - when you log in you will get the pam shell with no window. when you log in you will get the Bourne shell with no window. Be careful when you log in as "root". The "root" user is privileged. This allows the "root" user to execute critical system comands not accessible by other users, possibly leading to inadvertent damage to the AXE system. • "guest"- when you log in you will get a restricted shell with no window. The "guest" login should be used by people who should not have access to the whole AXE system. Anyone using AXE regularly should have their own login. On a newly installed system, none of the four default logins have passwords. If you want to completely secure your system, you must assign a password to "root", "window", and "nowindow". Your system is not secure unless root has a password. You don't need to assign a password to "guest" since its login shell is restricted. Follow the gUidelines in Chapter 3, the section "How To Change Your Password", to assign passwords to these three logins. 46.2 Installing AXE 98515-90000, new page: 4/86 NOTE As shipped to you, the "root" user has no password. You must give the "root" user a password to secure your system. If you have System Security Disabled No security means the system does not need to identify you before you have access. When you turn on your computer, you will be in the parn shell with windows (if you have installed Windows/9000) or without windows (if you have not installed Windows/9000). If you do not have a secure system, then each time you need to perform privileged commands (commands associated with the system administration duties in Chapters 9 and 10), you must become the "root" user by typing in: au root I Return I See Chapter 10, "Becoming the Root User" for more information. An Unattended System Console One other protection item deserves mention: depending on the your installation, use discretion about leaving a system console the root user (if you chose security in reconfig) as this defeats root user is privileged, and can execute any AXE command to the integrity of your system. 98515-90000, rev: 4/86 perceived need for security at unattended while logged in as the password protection. The a situation possibly hazardous Installing AXE 47 Creating a Recovery System A recovery system will allow you to boot up if your root disc is corrupted. NOTE It is very important that you create a recovery system. In case your root disc is corrupted, a recovery system may prevent you from having to re-install AXE, an possibly losing all the files you have created. For information on creating a recovery system, read the section, "Creating a Recovery System", in Chapter 10. Backing Up Your System After you customize your system by adding new users, adding remote terminals and printers, and deciding on system security, you should make a backup of the entire system. System backup is explained in Chapter 9, "Backing Up and Restoring the File System". Look through the Documentation If you have never worked with the AXE (or the HP-UX) operating system, you will need to read Chapter 3, "Getting Started", in this manual before continuing. NOTE While you are learning to edit files, do not edit existing files. You could damage your system by editing existing files aCcidentally. Instead, create new files to modify and manipulate. See Chapter 6 for details on how to create new files. This manual contains all the information on AXE most users will need. If this manual is not thorough enough, you should buy the Series 300 System Administrator Manual, available from Hewlett-Packard. Each application program you purchase to run on your AXE system will come with its own manual, and each piece of hardware you purchase will come with its own manual. The Peripheral Installation Guide describes how to set up hardware purchased from Hewlett-Packard. 48 Installing AXE Installation Information Table 2-1. Approximate Disc Initialization Times SIZE INITIALIZATION TIME HP 7907A 20.5 fixed 9 minutes HP 7908P 16.6 Mbytes 9 minutes HP 7911P 28.1 Mbytes 4 minutes HP 7912P/R 65.6 Mbytes 10 minutes HP 7914P/R 132.1 Mbytes 14 minutes HP7933Hj7935H 404.5 Mbytes 49 minutes HP 7941j7942A 24 Mbytes 7 minutes HP 7945A/7946A 55.5 Mbytes 15 minutes HP 91330/91340 16 Mbytes 19 minutes HP 9133H/9134H 20 Mbytes 26 minutes HP 9133L/9134L 44 Mbytes 48 minutes HP 9153A/9154A 10 Mbytes 7 minutes DISC Installing AXE 49 Notes 50 Installing AXE AXE User's Guide Chapter 3: Getting Started Becoming Familiar With The Keyboard .................................. 51 Logging On To The Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 55 How To Change Your Password ........................................ 57 Chapter 4: Using the System: PAM Introducing PAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Some Prerequisites for PAM .......................................... Looking at the PAM Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. PAM's Command Area .............................................. Using the System .................................................. Working in a Folder ................................................. Working with Folders and Files .............. . . . . . . . . . . . . . . . . . . . . . . . . .. Special Cases ..................................................... Learning PAM in Greater Detail ........................................ Networking and PAM ............................................... 59 61 64 70 73 75 80 86 87 108 Chapter 5: Helpful Tips for Managing Your Files Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . What is a File? . . . . . . . . . . . . . . . . . . . . . . . . . . What is a Folder? . . . . . . . . . . . . . . . . . . . . . . . . How The File System Is Structured . . . . . . . . . . . Backing Up Your Files. . . . . . . . . . . . . . . . . . . . . Purging Unused Files . . . . . . . . . . . . . . . . . . . . . . Other File Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . .. 115 115 116 117 121 122 122 Chapter 6: Creating Text Files: The vi Editor What is vi? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. A Short Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using vi ........................................................ I Can't Get vi ............................................... . . . .. 123 125 129 138 Chapter 7: A New Way of Organizing Tasks HP Windows 9000 Who Can Use Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Overview of Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Important Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Window Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Cases ..................................................., 140 140 143 150 165 Table of Contents 3 Chapter 3: Getting Staited Becoming Familiar With The Keyboard .................................. Entering Text ................................................. Logging On To The Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How To Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How to Log Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How To Change Your Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 51 55 55 56 57 3 Getting Started Before you learn how to use AXE and run applications, you need to know some basics. This chapter will show you how to use the keyboard, login to AXE, and change your password (if you have a secure system). Becoming Familiar With The Keyboard The keyboard is used for entering and editing text. An application program may give you additional capabilities or redefine some operations. Be sure to check the application's documentation for any differences to standard keyboard configuration. Entering Text Most of the keys on the itf1 keyboard are like those on a standard typewriter keyboard. You can type uppercase letters, lowercase letters, numbers, and symbols. Be sure to distinguish between the letter "I" and the number "1," and between the letter "0" and the number "0." 1[§gIDDDDEJl:duuDLJI~IIIOOOOII DD[]D[][][][J[][][[]D[]~ ~~ EJOEJO ~~~Duuu~O~uODD~~ D~[]EJ ~ou~~D~~u~DOD~~u []~[]O [;] EJE:JElDEJ[]~EJDu[]EJ Ll~LJ r;;] ~I I~ ~W~ 1166U Figure 3-1. The ITF Keyboard 1 Integrated Terminal Family. Getting Started 51 The Numeric Keypad On the right of the keyboard is the numeric keypad with digits 0 through 9, decimal, comma, enter key, and arithmetic symbols. If you are accustomed to an adding machine or calculator, the numeric keypad lets you enter numbers quickly and accurately. The effect is identical to using the corresponding keys on the main keyboard. EJOEJO uE](:]EJ Figure 3-2. The Numeric Keypad 52 Getting Started Special Typing Keys The following keys are also similar to typewriter keys. They modify the character keys or move the cursor2. I Operation Key Modifies the letter keys to produce uppercase letters; modifies other keys to produce the symbol (or command) on the upper half of the key. Reverses lowercase and uppercase letters on the letter keys. Pressing ~ once causes the letter keys to produce uppercase letters without I Shift I, and to produce lowercase letters with I Shift I. Pressing ~ a second time returns the I Shift 1key operation to normal. I Tab Moves the cursor to the next tab stop. 1 I Shift HTab 1 I Return I Back space I CTRL Terminates a line of text and moves the cursor to the left end of the next line. 1 1 Moves the cursor to the previous tab stop. 1 Moves the cursor left one column and writes a space. Used in combination with other keys to produce special characters (discussed in "Using the System: PAM" chapter, "Prerequisites" section). Used in combination with other letters to send escape sequences to the computer. Also used for termination of certain "vi editor" commands. Sends an interrupt signal to the computer. The keys not mentioned in the above table are keys used in various applications and will be discussed in those application descriptions. 2 The cursor is a visual position indicator which moves with characters entered on the keyboard or with cursor movement keys. Getting Started 53 The following keys are used for line editing functions. When you enter a command or type text, you can use these keys to modify any typing mistakes. Note the keys will be different in applications such as the vi editor (Chapter 6). Editing Operations Key Operation G GJ Moves the cursor right. Moves the cursor left. o Moves the cursor up. [!J Moves the cursor down. m Moves the cursor to the upper-left corner of the entire text. ~ Moves the cursor to the lower-left corner of the entire text. I I nsert line I I Delete line I I I nsert char I I Delete char I I Clear line I I Clear display I I Prev I I Next I 54 Inserts a blank line above the cursor position. The cursor is moved to the blank line. Erases the current line. This key is used to insert a character or text. Press the I I nsert char I and enter text to be inserted. Then press the I Insert char I key again to end the insert mode. Deletes the current character. Clears the current line from the cursor to the end of the line. Clears the screen from the cursor and down. Moves the text information down one page. Moves the text information up one page. Getting Started Logging On To The Computer Depending on whether your AXE system was configured with a secure or non-secure system (see Chapter 2, "After Installing AXE"), you mayor may not have to go through the login procedure. If your system is configured to be a non-secure system, then you do not have to iogin, and you do not need to read the rest of this chapter. Your screen (after boot up) will display the PAM screen (see "Using the System: PAM," Chapter 4). If you have a secure system, you will need to go through the login procedure. Chapter 2, "After Installing AXE," lists several user names with which you can login: window 2 , nowindow. root. guest. These user names can be used if you have not followed the "Adding and Removing Users" section in Chapter 10. Refer to Chapter 2 for instructions on which user name to use. How To Login If you have a secure system, you will see something like the following on the screen: login: The steps for login are as follows: 1. Type your user name, and press I Return /. The user name was set up in "Adding and Removing Users," Chapter 10. You will next be prompted to enter your password (if you required a password when you set up your user account): Password: 2. Type your password, and press I Return /. If you are logging in as root as installed, you will not have a password; you need to get one as soon as possible. When you type the password, you will not see the characters you type on the screen (for security reasons). If the system accepts your login identifier and password, you may see some system messages, and then you will see the PAM screen (described in Chapter 4). If you do not see the PAM screen, your system configuration has been changed when you configured the system and you will see a system prompt. See "Running PAM" in Chapter 4 to bring up the PAM screen. 2 If you have not configured your system for Windows, you should not use this user name for login. If you do, one of two things can happen: if you loaded the Window commands from the AWINDOW file set, the screen will flash and you will be prompted again for login; otherwise you will receive a message like "/usr/lib/wm cannot be found." Getting Started 55 If your login identifier and password are not correctly typed, the system will give you a message like the following: Login incorrect login: and prompt you again for login. You have to type your login identifier and password without making any mistakes. How to Log Out To log off a secure system, press: (press the I CTRL I key and hold it down, then press the []J key; similar to using the I Shift I key for capital letters). You will be logged off the secure system, and the screen will prompt for another login. 56 Getting Started How To Change Your Password Once you have successfully completed the login phase, you will see the PAM screen (unless you configured your system to show a system prompt; in this case, you can follow the same instructions below and ignore the references to PAM). You VJilI be performing your operations in PAM; so it would be helpful to read the "Using the System: PAM" chapter before trying any operations. However, it is important to change your password to something only you know about, and you can follow the steps in this section to change your password without knowing about PAM. Anything you type will appear in the second line from the top of the PAM screen (the command line). The responses from the computer will appear in the first line (message line). All passwords must be at least 7 characters of your choosing, containing at least one numeric or special character3. To change your password, do the following: 1. Type: passwd and press [ Return 1 You will be prompted by the following: Changing password f or your _user _name Old password: where your _user _name is your user name used in login. 2. Type the password currently used. You will not see the characters typed. The system now prompts you for your new password: New password: 3. Type your new password, and press I Return I. The password must contain at least two alphabetic characters, one numeric, and seven characters long. You won't see the characters typed. The system now wishes to double-check your password and prompts you with: Re-enter new password: 4. Type the new password again, and press 3 Special characters: ! " # $%& ' ()•+ -. / : ; < > I Return I. = ? @ [ 1\ ~ _'{}~ Getting Started 57 Something Went Wrong If your new password does not have at least one numeric character (or it has less than two alphabetic characters), you will see the following error message: The password must contain at least two alphabetic characters and at least one numeric or special character. New password: You need to think of a password with the above constraints (sometimes just adding a number to the end of a password is sufficient). If you don't type the same new password when asked: Re-enter new password:, then you may receive a message like: They don't match; try again. New password: You now need to go through the sequence of typing the new password and confirming, until the new password and the re-entered password are exactly the same. Then be sure not to forget your password! If you do, you will have to login as root and enter: passwd user _name I Return I where user _name is the user name with the forgotten password. You will be prompted to enter a new password (and to verify it). The new password will be valid for the user name to login. If you forget the root password, you will need to see Chapter 10, "Creating a Recovery System." If you had trouble with PAM, then you should read the "Using the System: PAM" chapter before trying to change the password again. 58 Getting Started Table of Contents 4 Chapter 4: Using the System: PAM Introducing PAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Two Versions of PAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Some Prerequisites for PAM .......................................... What are Function Keys? ........................................ The "Control" Key ............................................. The PAM User Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Looking at the PAM Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The PAM Screen Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a Folder? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Folders Vs. Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Folder Area. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The File Indicator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. PAM's Command Area .............................................. The Command Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Echo Function Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using the System .................................................. Using the Non-Windows Version of PAM ............................. Using the Windows Version of PAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Working in a Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Opening a Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Closing a Folder ............................................... How to Run a Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Looking at the Contents of a File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Rereading a Folder ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How to Print a File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Working with Folders and Files ................. . . . . . . . . . . . . . . . . . . . . . .. Creating a Folder .............................................. Creating Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Renaming a Folder or File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Moving a Folder or File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Copying Files ................................................. Deleting a Folder or File .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Cases ..................................................... Running PAM ................................................. Leaving PAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Learning PAM in Greater Detail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 59 60 61 61 62 62 64 64 65 66 67 67 70 70 72 73 73 73 75 75 76 76 77 78 78 80 80 80 81 82 83 84 86 86 86 87 Command Line Quoting .......................................... Command Line Pattern Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Redirecting Input and Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a Pipe? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Sequential Processing ........................................... Nonsequential Processing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a Script File? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using an Autost File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Direct Execution of Script Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. PAM's Environment File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Selecting Alternate Environments with getenv. . . . . . . . . . . . . . . . . . . . . . . .. Networking and PAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 87 88 89 92 93 95 95 100 101 102 107 108 Summary of PAM Operations Working in a Folder I I Operation '-'p~ll U .I v n..... ~ ... Action ~. 2. 1. 1. 2. 1. 2. 1. 1. 2. 3. 4. 5. Close a Folder Run an Application View a File Reread a Folder Print a File II.l::ilUI::S.IL &V.lU~& press: Open press: Close highlight file press: Start highlight file press: View press: Reread highlight file type: Ip press space bar press: Echo press: I Return I Working with Folders and Files Create a Folder Rename a Folder or File Moving a Folder or File Copying Files Delete a Folder or File 1. 1. 2. 3. 4. 1. 2. 3. 4. 1. 2. 3. 4. 1. 2. 3. type: makefolder file_name I Return highlight file press: Rename type file_name press: I Return I highlight file press: Move type destination press: I Return I highlight file press: Copy type new_file_name press: I Return I highlight file press: Delete press: I Return I Special Cases Running PAM (when it is not automatically run) Leaving PAM (in secure system) 1. type: pam I Return I 1. press: ~ I Summary Continued: PAM in Detail Description Operation Quoting Pattern Matching Keep PAM from processing special characters in a command. Can be used to search for files. * matches any string ? matches single character [] matches any string in [] Example echo "# < >' , The special characters processed. # < > are not Ip oct* Matches files like: oct1 oct2 october and october7 Ip [ab] * Matches abc and bbc Redirecting Input/Output Send output to file. Receive input from a file. < read standard input > write standard output to a file > > append standard output to a file write error output to a file append error output to a file # use window for standard input, output, and error output. progA > fileB Run progA; write output to fileB. Run programs in sequence. progA I progB A AA Pipes Use output from progA as input to progB. Sequential Processing Run programs in order. progA; progB; Run progA. When it is finished then run progB. Non-sequential Processing Process files at the same time. progAk progBk Run progA and progB at the same time. Script Files A file containing commands to be executed together. 1. Edit file to list commands in order on separate lines 2. Use chmod command to make the file executable. 3. Run the file as a program. Summary Continued: PAM in Detail Operation chmod Command Description Make a file executable. Example chmod 777 script_file_name Make the file script_file_name executable, readable, and writable by anyone. Autost File Automatically run the Autost file when PAM starts if Autost exists in home folder. Just like a script file. source Command Read and execute the commands in a script file and retain the effects of the commands. source file_name Where file_name is a script file. Environment File A file (. environ) containing environment variables. HOME - Homefolder Networking Set up a link with a remote system (if your system is set up for networking). PATH - Search path for programs script files and commands. TERM - Terminal type. TZ - Time zone. ACTION - Executes the program when an associated data file is entered as a command. SCRSHELL - Identifies the shell used when PAM runs a script file. netunam path name (string) path name -remote system pathname (string) -login identifier netunam pathname (with no parameters) Disconnects connection to remote system. Using the System: PAM 4 Introducing PAM PAM, the Personal Applications Manager, is a program that gives you a friendly way to start applications programs or operate on files without having to know much about HP-UX, the computer's operating system!. PAM works as an interpreter between you and the HP-UX operating system. Therefore, PAM lets you easily access the advantages of HP-UX without having to know all of the HP-UX commands. The following topics are discussed in this chapter: • prerequisites for PAM • the PAM screen • PAM's operations: operations in the folder to help you in using your applications programs, creating and using your own folders and files. • detailed uses for PAM • using PAM with your networking system (if you have one) • messages that PAM generates 1 AXE is a subset of HP·UX. For more details see "More Detailed Uses of AXE," Chapter 8. Using the System: PAM 59 Two Versions of PAM There are two versions of PAM providing support for different systems. The non-Windows version supports standard terminals (or displays). The Windows version supports the high resolution displays running HP Windows/9000 (see Chapter 7). PAM starts the correct version for your system. For example, if your system is configured for Windows, the PAM window will be shown on your screen when you login (or boot up). FOLDER AREA COMMAND AREA bin system ta.h.asc junk popup temp dev tmp etc update. disc lib lost+tound Figure 4-1. The PAM screen shown in Windows version. 60 Using the System: PAM Some Prerequisites for PAM Before you begin using the operations PAM has to offer, you need to know about function keys on the keyboard. This section discusses function key and control key use, and how to use PAM's User menu. What are Function Keys? A function key is a key on the keyboard performing an operation when pressed, unlike the "normal" keys which type a character on the screen. The purpose of a function key is to make your job easier. Instead of typing in a command and pressing I Return I, you simply press a function key; the computer does the rest. How To Use Function Keys Throughout this chapter, you will see many references to function keys. These function keys are primarily located on the upper row of keys on your keyboard; see Figure 4-2. The function keys are labeled [ill, [ill, @], @], lliJ, [[], [ill, [][). Other function keys on the keyboard are []!QEJ, I Menu I, and so forth. To use a function key, you only need to press the function key, and an associated function will be executed. Figure 4-2. The Function Keys When you begin using PAM, you will use the "PAM User Menu," which is shown at the bottom of Figure 4-1. This menu is present when you are using PAM. The boxes in the menu correspond with the function keys on the keyboard. For example in Figure 4-1, the first box is labeled Start. The first box corresponds with the first function key, [ill. The second box, Echo corresponds with the second function key, [ill, and so forth. You can note there are eight boxes in the PAM User Menu, and these boxes correspond to the eight numbered function keys in order. How This Chapter Represents Function Keys When you see something like "Press the Start function key," or, "Press Start," you are being asked to press the corresponding function key, in this case: [ill. Using the System: PAM 61 The "Control" Key Another important key is the "Control" key. This chapter uses the control key frequently, and it is important you know how to use the key. The "Control" key is represented by I CTRL I. In every case, you will see the control key followed by a letter or another key, for example: @!BI}ill. In order to use the control key, you use the following procedure: 1. Press I CTRL I and hold the key down. 2. Then press the following key (for example, UJ). Both keys are pressed at the same time (the same as using the I Shift 1 key for capital letters). The PAM User Menu The PAM User Menu (see Figure 4-1 or 4-3) allows you to perform frequently used file operations with a single keystroke. To execute a command, press the corresponding function key. The PAM User Menu is summarized in Table 4-1. 62 Using the System: PAM Table 4-1. PAM User Menu and Function Key Summary Function Key Menu Label [ill2 Open Opens the highlighted folder. View Displays the highlighted data file. Start Executes the highlighted program. Reread [][] @] [ill 0[] [§] ill] [][) Echo > Folder Description Updates the open folder information. (The open folder name must be highlighted.) Copies the highlighted file name to the command line. Indicates arrow keys move file indicator. (Non-Windows version only) >Command Indicates arrow keys move cursor. (Non-Windows version only) Move Used to move the highlighted file. Copy Used to copy the highlighted file. Rename Used to rename the highlighted file. Delete Used to delete the highlighted file. Close Closes the open folder. Function Keys on the Keyboard Function Key Menu Label I Menu I Menu Turns on and off the User Menu. []5ili] System I User Displays the User Menu. I S~stem I System Displays a System Menu. Description 2 The menu label and function of [ill changes with the type of file being accessed. Using the System: PAM 63 Looking at the PAM Screen The non-Windows version of the PAM screen shown in Figure 4-3 looks basically like the PAM Window in Figure 4-1. It consists of two main areas: the Command area and the Folder area. The Command area exists for entering commands and receiving messages. The Folder area contains all of your files and folders. Persona I App I i cat ions Manager • Open Folder: / Data Fi les: Folders: bin system fa.h.asc f lebnee temp dev tmp etc update. di sc lib I Start I I Echo I I >Folder I I Move I ~ lost+found I Rename I I Delete I I Close I Figure 4-3. The PAM Screen (non-Windows version) The PAM Screen Areas As mentioned above, the Command area is used for entering commands and receiving messages. This area will be discussed later. The other area is the Folder area consists of three main sections: the Program listing, the Data file listing, and the Folder listing 3 . The Program listing shows all programs you can use, and the Data file listing shows all the data files you can use. The Folder listing shows all the folders you can enter from this folder (details on folders are described in the next section). 3 There is also a "Devices" listing if /dev is the open folder. 64 Using the System: PAM What is a Folder? A folder is PAM's name for a directory and contains files which can be programs, data files, or other folders (Le. the contents of the Folder area). It's not necessary to have only one folder containing all your files (program or data); you can create several folders to store files, and organize the folders in an efficient way. PAM's folders are organized in a folder within Q folder method. There is a root folder (known as /) which contains (directly or indirectly) all the other folders. Within each folder can be more folders (see Figure 4-4). Figure 4-4. Folders within folders. Using the System: PAM 65 When you wish to get to a particular folder you must follow a path, going from one folder to another. This path consists of folder names separated by slashes (f), the leftmost folder enclosing the next folder, and so on. Therefore, each folder has a path name, for example /users/hpux/demo/files (where the first slash represents the root folder, and successive folders are users, hpux, demo, and files folders). As you create a folder, you will need to remember the path to get to that folder. You can get to a folder either by opening enclosing folders (as you enter each folder you look for the next folder in the path and open it; see "Opening a Folder") or by entering the full path name and directly opening the folder (see "Using the PAM Command Line"). In organizing your folders, Figure 4-5 may be a helpful pictorial reference. The top (or root) folder contains the next level folders (and so forth). / hpux / users usr I I dave man bin tmp Figure 4-5. Tree structure of folders. The path name of the hpux folder on the lower left is: /users/hpux. Folders Vs. Files It is important to differentiate between folders and files. A folder is like a paper folder you use for organizing papers. The papers in the folder are files. Files contain information, either data or an executable program. So, when you see the word file used in this chapter, think of it as one of the names contained in the Folder area (either in the Program listing or Data file listing). 66 Using the System: PAM The Folder Area The PAM screen contains a Folder area (see Figure 4-6) you can use for running programs, looking at the contents of a data file, or looking at other folders. If the folder contains more information than can be displayed at once in the folder area, PAM shows the statement (More Files) at the bottom of the folder area. To see the files not shown, press ~, or if you are using the Windows version of PAM, move the pointer to (More files) and press the select button (you will need to read the Windows chapter to understand this terminology). Similarly, you can press I Prey I to see the previously displayed files. There is no limit to the number of files in a folder area. I Open Folder: ~: _ wpam Data File .. : core fa. h. a .. c f lebnee temp Folders: dev tmp etc update. di sc lib bin system lost+found Figure 4-6. The Folder Area The File Indicator The file indicator is a highlighted area which can be moved from item to item (see Figure 4-6). When the file indicator highlights an item, all applicable function keys and commands will operate on this item. For example, if you move the file indicator to highlight a file and press a function key, the function activated by the function key operates on the highlighted file. You may wonder why you use a file indicator to select a folder (because of the name). The file indicator is a generic name and is used to select rather than just to indicate a file or folder. The terms "indicated file" and "highlighted file" are used interchangeably. Moving the File Indicator in PAM Certain keys perform special functions when PAM is active. For example, the I Tab I key moves the file indicator across a row of file names. The special PAM keys are summarized in the Table 4-2; all other keys keep their respective functions. Using the System: PAM 67 Table 4-2. Special PAM Key Summary Description Key IT] [!] Moves the file indicator up a column of file names. G GJ Moves the file indicator across a row of file names. [!] []6]IDill Moves the file indicator to the first file in the open folder. I Tab I I Shift HTab I Moves the file indicator across a row of file names. 1 Next Moves the file indicator down a column of file names. Moves the file indicator back along a row of file names. I I Prev I I Return I Moves the file indicator to the last file in the open folder. Moves the file indicator back along a row of file names. Displays the next screen of file names. Displays the previous screen of file names. Executes the command in the command line. If the command line is empty, then pressing I Return I is the same as pressing []I). ~ (letter "I") Rereads the disc and updates the open folder information. ~ Terminates PAM (see "Leaving PAM"). When the file indicator is on the top row of files in the folder area, and it is moved with the IT] key, it will wrap to the bottom row of files in the previous column. If the file indicator is on the first column of the top row, then the file indicator moves to the bottom file of the last column when the IT] key is used. The file indicator behaves similarly when on the bottom rows; it wraps to the top row of the next column. Using The Mouse To Move The File Indicator If you are using the Windows version of PAM, you can use the Mouse to move the file indicator instead of using the keyboard (reference "A New Way of Organizing Tasks: HP Windows/9000," Chapter 7). 68 Using the System: PAM To move the file indicator, move the pointer (reference "The Pointer" in the Windows chapter) with the Mouse until the pointer is over a file name. Figure 4-7 shows an example file chcolor. Press the select button (the left button on the Mouse), and the file indicator will move to highlight the file name you selected. Figure 4-8 shows the file indicator selecting the file. en Folder: .... u ::,r ,/ Programs: ~font 11 b,/ hplJJ 1 ndolJJ ::,,/ demo count_9 dum p_sr chcolor ed i t i conJ(". en Folder: lusr/lib/hpwindows/demo Programs: ~font count_9dum p_sr Figure 4-7, 4-8. Moving the File Indicator. You can also use the select button to perform the same as the OIl function key. For example, to open a folder you move the pointer to a folder name. Pressing the select button moves the file indicator to the folder name. Pressing the select button again will open the folder. (Opening a folder will be discussed in detail later). Using the System: PAM 69 PAM's Command Area PAM's command area is the portion of the screen where you issue commands and receive messages (see Figure 4-9). The command area contains two lines. The first line is the message line and the second line is the command line. Per"ona 1 App 1 i cat ion" Hanager • Figure 4-9. The Command Area PAM uses the message line to display informational messages. These are simple messages indicating a problem exists. In some cases, the message contains suggestions about how to fix a problem or complete a task. For example, PAM prompts you when you copy a file. Through the message line, PAM tells you how to specify the destination of the copy command. A complete list of PAM messages and their meanings is shown in the "PAM Messages" section at the end of this chapter. The Command Line The command line allows you to enter commands directly from the keyboard. You can specify operations that involve files in folders other than the open folder and enter commands which require parameters. What are Parameters? A parameter is an item of information transferred to a program. For example, you could have a program which requires you to enter the date along with the command to run the program. You would need to "run the program and pass the date to the program." In the command line you would type the program name (given the program is executable) and the parameter (for example, the date parameter). When you see the word parameter mentioned in this chapter, it is referring to the item of information that follows a program name or command (for a program that requires a parameter). Using the PAM Command Line Entering commands into the command line allows you to perform operations not on the PAM User menu. A list of system commands is in Appendix A. You can also specify operations that involve files not displayed in the open folder. To execute commands from the command line, type the command, and press I Return I. When I Return I is pressed, the command in the command line is executed (if the command line is empty, then pressing I Return I is the same as pressing 00. If you enter a command containing an error, an error message is displayed. 70 Using the System: PAM Editing The Command Line The keystrokes in Table 4-3 can be used to correct errors in the command line. After correcting an error, you press I Return I. Table 4-3. Command Line Editing Keys Keystroke Function ~ Windows version only: moves the cursor one character position to the left. I]EI[]{8 @ Windows version only: moves the cursor to the right one character position. Non-Windows version only: moves the cursor one character position to the left. G Displays the previous command in command memory. []6lli]-[!J Displays the next command in command memory. I Back space I I Clear I Non-Windows version only: moves the cursor to the right one character position. ~ line I Clear display Moves the cursor one space to the left. The Windows version erases the current cursor character. The Non-Windows version does not erase the current cursor charactec Clears all characters from the current cursor character to the right end of the line. 1 I Delete line I I Delete char I I Insert char I Clears the command line and all lines following in command memory. Clears the command line. Deletes the current cursor character. Turns insert character mode on or off. In the non-Windows version of PAM, the function key []TI is used to switch the arrow key meaning. When []TI shows the label >Folder, the arrow keys move the file indicator. When the label is >Command, the arrow keys move the cursor in the command line. To change settings for the arrow keys, simply press []TI until you see the correct label. Using the System: PAM 71 The last 20 lines entered in the command line are kept in a portion of memory called command memory. Previous command lines can be displayed by pressing I Shift 1 along with the vertical arrow keys. For example, pressing ~ displays the previous command line. You can execute these previously entered commands by moving the command memory by one line, making any necessary modifications, and pressing I Return I. When using the command line, you can use a single period (.) to represent the path name of the open folder. Two adjacent periods ( .. ) indicate the folder in which the open folder resides (the enclosing folder). For example, if you wish to execute a program in the enclosing folder, you can type .. /program_name and press I Return 1 (where program_name is the name of the program in the enclosing folder). An alternative would be to close the current folder. The enclosing folder would become the open folder, and you can look for the program name in the folder area. The command line can be used for executing commands that use parameters. Some commands require parameters, while other commands have optional parameters. The syntax shown for each command represents the different ways you can execute it. If the syntax shows no parameters, then parameters for the command are optional. Parameters must be separated with one or more spaces. Many commands allow you to repeat either the first or second parameter several times to perform multiple operations. For example, the copy command allows you to enter the first parameter several times to identify the files you want to copy to the folder specified by the second parameter . To copy three files (prodA prodB and prodC) to the folder /usr/ execfiles, you would type: copy prodA prodB prodC /usr/execfiles and press I Return I. The Echo Function Key Pressing the Echo function key copies the highlighted file or folder name to the command line. You will find this a helpful tool when you execute commands in PAM. To save typing file names, you can move the file indicator to a desired file and press Echo . The file name is copied to the command line. You can then enter any necessary parameters and press I Return 1 to execute the command. 72 Using the System: PAM Using The System In the following sections you will learn how to use PAM. In most applications, you can use a similar method of selecting files or folders for operations (for example, running a program or opening a folder). PAM has a simple way to select files using the file indicator. You can move the file indicator to a file using the arrow keys (or the Mouse in the Windows version). When the file name is highlighted, it means the file is selected. So, you only have to press the appropriate function key to perform a desired task (or press Echo to copy the file name to the command line). Using the Non-Windows Version of PAM When you execute programs or commands in PAM that require screen output, PAM will clear the screen and display the information. When you are through with a command (or when you quit a function) and wish to return to the PAM screen, you will be prompted by PAM, on the bottom line of the screen, to: Press [Return] to continue Press ~ and the PAM screen will automatically appear on the screen. Using the Windows Version of PAM When you use the Windows version of PAM, you need to know the following information: • First be familiar with HP Windows/9000 (see Chapter 7). • When you run a program, use an editor, or other function that requires output to the screen, PAM creates an icon briefly for the function window. The icon then changes to a window when output is displayed on the screen. Both the brief icon and the window have the same name as the command or function. For example, when you use the vi editor, the name of the icon and window is vi. The window is created for the sole purpose of the function you executed. After the function ends, the window remains on the screen. The "echo" and "view" commands do not start with an icon. The function window will be removed from the screen when you run another function (PAM removes the window when a window for the next command or function is created). If you want the window to remain on the screen, you can use the "Save" option to save the window (see "The Save Option," in Chapter 7). So for most circumstances, you can leave the window on the screen, select the PAM window to continue operations, then any new functions that create windows will automatically remove the old function window. Using the System: PAM 73 • When a window is created to show output from a function as mentioned above, the PAM User Menu is taken off the screen; a new user menu is displayed if the function requires a user menu. When you select the PAM window after completing the function, the PAM User Menu will re-appear. Each window has its own user menu. • You can use the Mouse (or other Windows device) to perform tasks easier than using the keyboard arrows. As mentioned earlier, you can use the Mouse to move the file indicator. When you have a folder with more information than will fit in a window, you will see (More Files) displayed at the bottom of the window. You can use the Mouse to select this field by moving the pointer to (More Files) and pressing the select button. • At any time, you can use the pop-up menu to create a new window. This window will not be a PAM window (unless you specifically enter the pam command in that window; see "Running PAM"). When you select a non-PAM window, the PAM User Menu disappears. • If you change the size of the PAM window, PAM will modify its display to fit the constraints of the window size. Generally, this means making the window smaller. PAM displays as much as it can, then displays (More Files). 74 Using the System: PAM Working in a Folder Opening a Folder The names of folders accessible from the open folder are listed in the Folder area of the PAM screen; see Figure 4-6. 1. Move the file indicator to highlight a desired folder. (If there are more folders than PAM can show on the screen, press the next and previous pages of folder contents.) I Next 1 and I Prev 1 to see 2. Press: Open. PAM opens the folder and updates the screen contents. Alternative Ways to Open a Folder • If you are using the Windows version of PAM, move the pointer with the Mouse to the desired folder and press the select button. The folder name is highlighted. Press the select button again (or Open or I Return D to open the selected folder. • Move the file indicator to a desired folder name and press the Echo function key; the folder name is copied to the command line. Press I Return 1 to open the folder. • To open your home folder, type: cd on the command line. If you press I Return I, your home folder is opened (your home folder is defined in the .environ file to be discussed later); if there is no home folder defined, the root (I) folder is opened. • To open any folder in your system, type: folder _name on the command line (where folder _name is the name of a folder), and press I Return I. If folder _name is listed in the open folder, folder _name is opened. Folder _name can also be a path name to a folder not listed in the open folder. An example folder name in this case could be: /usr/lib/hpwindows/demo where the first slash (I) represents the root folder, and each sub-folder is separated by a slash. Using the System: PAM 75 Closing a Folder Press the Close function key. The open folder is closed and displays its outer folder (the folder that contains it) as the open folder. If the open folder is the root folder (f), then the root folder is redisplayed (it cannot be closed since it has no enclosing folder). Alternate Way to Close a Folder • Pressing Close is equivalent to entering close in the command line and pressing I Return I. How to Run a Program Programs available in the open folder are shown in the Program listing of the folder area; see Figure 4-3. 1. Move the file indicator to a desired file (highlighting the file name). 2. Press I Return 1 (with the command line empty) or press the Start function key. (The Start function key label appears when a program file is highlighted.) Alternative Ways to Run a Program • If you are using the Windows version of PAM, move the pointer (with the mouse or the I CTRL 1 and arrow keys}4 to the program and press the select button (or I Select 1 on the keyboard) to move the file indicator to that file. Press the select button again to start the program. • Type the file name into the command line and press I Return I. You can also use the Echo function key to copy the highlighted file name into the command line and then press I Return I. 4 See Chapter 7, sections "The Pointer" and "Using the Mouse". 76 Using the System: PAM Looking at the Contents of a File The view command should be used to display data files, text files, or script files (see "What Is a Script File?"). Program files (that are not script files) and other files that do not contain text should not be displayed with view. If the file accessed does not contain readable text, the data may be interpreted as control characters and other non=displayable characters. The VieW function key can be used to display the contents of any file (unless it is read protected; see "The chmod Command"). 1. Move the file indicator to highlight the file you wish to view. 2. Press: View. If you are using the Windows version, PAM will create a window and display the contents of the file you highlighted one page at a time. Otherwise the screen will clear and the file will be shown. 3. To see the next page, press: More, which now appears in the user menu. The space bar has the same function as More when viewing a file. 4. To return to the open folder and stop viewing a file, press: Quit. If you are using the Windows version, PAM destroys the view window; in the non-Windows version, the PAM screen is immediately redisplayed after pressing Quit. Alternative Ways to Use the View Command • Type: view file_name in the command line, where file_name is the name of the file you wish to view; press I Return I. You can specify a path name to a file not in the open folder, or you can use the Echo function key to copy the file name from the open folder. • Type the name of the file in the command line (or use Echo), and I Return I. • Move the file indicator to a data file, and press I Return I (the command line must be empty). • Use a pointer device (a Mouse, for example) to move the pointer to a file you wish to view. Press the select button to highlight the file name. Press the select button again to view the file. Using the System: PAM 77 Rereading a Folder Generally, the PAM information is updated to show all files and folders whenever a change is made. Sometimes you may run a program to create a file and the PAM information does not get updated. The Reread function key can be used to update and show any changes. Reread is displayed on the PAM User Menu only when the open folder is highlighted. You can execute this command whenever you are unsure if an operation has caused a change to the contents of the open folder. Press: Reread Alternate Way to Reread a Folder • Type: reread in the command line and press I Return I. • Type: I CTRL t[[] (The letter "I") How to Print a File To send a file to the default printer (as designated by the system administrator): 1. Move the file indicator to a desired file (highlighting the file name). 2. Type: Ip followed by a space. 3. Press: Echo The name of the file you want printed is copied to the command line. 4. Press: I Return I Go to the printer and get your copy of the file. Alternative Way to Print a File • Type: Ip file_name I Return I, where file_name is the name of the file you want printed (file_name can have a path name). 78 Using the System: PAM Using Other Printers If you have more printers to use, you may wish to use a printer other than the default printer. The system administrator can find a listing of these printers in the /usr/spool/lp/member folder. It is helpful to make a list of the printers. Once you know the names of the printers from the /usr/spool/lp/member folder, you can use the following command: Ip -dprinter _name I Return I where printer _name is the name of the printer listed in the /usr/spool/lp/member folder. You can also type in Ip -d, then move the file indicator to the file you want printed, and press Echo. (Do not put a space between -d and the printer_name). Something Went Wrong If you received an error message when you tried to print a file, you may have to see "Setting Up Your System to Print Files," Chapter 10. If the computer does not have any information on the printers, it cannot use the printers. Using the System: PAM 79 Working with Folders and Files Creating a Folder 1. Type: makefolder folder _name on the command line, where folder _name is the name of the folder you wish to create. 2. Press: I Return I to create the new folder. The folder is empty and ready for you to use. Alternative Ways to Create a Folder • If folder _name is a path name, the folder will be created in the folder specified by the path name. All folder names along the path must already exist. Only the final folder name will be created. If the folder is a simple name (without slashes) the new folder is created in the open folder. Duplicate folder, or file, names are not allowed in the same folder. Folder names are limited to 14 characters and should not include any special characters (such as * [ ] < > - & ; I and control characters). If you have any special characters in the file name, you must use the file indicator to select the file; the command line will interpret the special characters. You can create more than one folder with the makefolder command by separating the folder names with a space. Creating Files There is no specific command to create a file. When output is redirected with the> or symbols (the details of these symbols are discussed later in "Redirecting Input an Output") to a file that does not exist, the system determines that the file does not exist and creates it. Many application programs also create files automatically. Files for storing text are normally created with a text editor, such as vi. An editor has its own commands alloWing you to create files, and perform editing functions such as adding or removing text. To find more about editors, see the "vi Editor" chapter. Files you create with an editor appear as data files in the PAM screen. These files can be moved to other folders, copied, and deleted. 80 Using the System: PAM If you wish to create a simple data file in a non-Windows version of PAM, there is a qUick way to do this without entering the editors (you must, however, use the editors to change any information in this file). Type in the command line: cat > file_name where file_name is the name of a new file. Press I Return I, and the screen will clear; you can begin typing your data (including carriage returns). To stop entering the data into file_name, press~. You will be prompted to press I Return I to continue. Pressing I Return I will bring back the PAM screen. For the Windows version of PAM, use the same command. An icon will appear. You must, however, change the icon to a window (and select it) in order to type into the cat window; see Chapter 7, "Icon Operations." Type in the text, then ~ as above to end the cat command. Renaming a Folder or File The Rename function key can be used to change the name of a file or folder. 1. Move the file indicator to highlight the file or folder you wish to rename. 2. Press: Rename The message line will prompt you to enter the new name: Now complete the rename with 'to file_name'. to 3. Type the new file or folder name and press I Return I. Alternatives For Renaming a Folder or File The file or folder to be renamed is the first parameter in the rename command. If a second parameter is included, it is used as the new name. Otherwise, you are prompted to enter the new name. If the file or folder to be renamed is not in the open folder, then a path name can be used to identify it. The new name entered should include a similar path name . • Type: rename filename in the command line and press I Return I, where filename is the name of a file. You will be prompted as above to type in the new file or folder name. Type in the new name and I Return I. • Type: rename file_namel file_name2 into the command line and press I Return I. file_namel is the name of the old file or folder; file_name2 is the new name of the file or folder. Using the System: PAM 81 Moving a Folder or File NOTE Using an existing file as the second or last parameter of a move command causes its contents to be overwritten (if write permission exists on the file) with the file being moved. The Move function key can be used to move a file stored in one folder to another folder. Move can also be used to rename a folder or file. 1. Move the file indicator to the file or folder you wish to move. The file name should be highlighted. 2. Press the Move function key. 3. The command line prompts you to type the destination file or folder name. Type the destination file name (be sure to include any necessary path names). 4. Press: I Return 1 to complete the move function. The file or folder is now moved to its destination. Alternative Ways to Move a Folder or File • Type the full command on the command line: move filename destination_filename where filename is the name of the file or folder to be moved, and destination_filename is the name of the destination file or folder. Press I Return I. It is necessary to use a path name for the file name or the folder name if the file or folder is not stored in the open folder. If you specify two file names, the command moves the first file to the second file (full path names for the files can be used). 82 Using the System: PAM Copying Files 1. Move the file indicator to the file you wish to copy. The name will be highlighted. 2. Press the Copy function key to copy the file. The message line will prompt you to enter the name of the file to copy: Now complete the copy with 'to file name' . to 3. Type the name of the file which will be the copy. 4. Press I Return I to complete the copy. Alternative Ways to Copy a File • You can type the entire copy command into the command line and press I Return following commands show the different way the copy command can be used: I. The copy file_namel file_name2 copyfile_name folder _name copyfile_namel file_name2 file_name3 ... folder _name If you enter one parameter with the copy command, the copy operation is started and you are prompted to complete the operation with the to command. When two file names are used as parameters, the second file name is the destination file; it will contain the copy. A path name can be used to specify the file is to be copied to a different folder. If the destination file already exists in the specified folder, then the copy operation overwrites the file with the new name (unless the destination file is write protected). If the last parameter in the copy command is a folder, then the specified files are copied to it. The copies have the same names as the original files. The last parameter specifies the folder in which the copies of the files are placed. Using the System: PAM 83 Deleting a Folder or File The file you delete can be a folder or file in the open folder. You use a path name if you need to delete files or folders contained in other folders. You can delete several files or folders on the same command line by separating the file names by a blank. Be careful when using the delete command. It can be used to delete any file or folder in the file system, with the following exceptions: • Files or folders stored on a disc that is write-protected. • Files or folders that do not have write permission (see "The chmod Command" in "What is a Script?" section). • Files or folders whose outer folder does not have write permission. • Files or folders that are currently being accessed or viewed (with the view command). • The open folder. • Folders that are not empty. All files or folders stored in a folder must be deleted before the folder itself can be deleted. • The outermost folder. NOTE Do not attempt to delete files or folders created for use by the system (for example, jdev). It may be possible to delete files and folders that are necessary to the functioning of the computer. In general, you have to be superuser (an HP-UX mode for access to many operations not available to the general user) in order to do any great damage. 84 Using the System: PAM 1. Move the file indicator to the file or folder you wish to delete. The file or folder name should be highlighted. 2. Press: Delete. 3. delete filename will appear on the command line to make sure you wish to delete the file or folder . To delete the file or folder, press I Return I. If you do not wish to delete the file or folder, then use I Back space 1 to erase the delete command from the command line. a. If you wish to delete more files, move the file indicator to another file or folder, and press Echo to copy the file name to the command line. Be sure to not press Delete again or PAM will write delete filename on the same command line. If this happens, PAM will look for a file named "delete" and write an error message when it can't find the file. Alternative Ways to Delete a Folder or File • Type: delete filename where filename is the file or folder name you wish to delete. Press folder or file. I Return I to delete the If a folder appears empty in the PAM screen, but a message is displayed telling you that it is not empty (when you try to delete it), it probably contains a hidden file or hidden folder (a file that has a name beginning with "."). The folder cannot be deleted until all the files and folders it contains are deleted (with the exception of the "." and " .. " files created by the system); the user does not need to delete the "." and " .. " files created by the system from a folder in order to delete the folder . To list the complete contents of any folder and obtain the names of any files or folders that are hidden, type: 18 -a I Return I in the command line. After deleting these files or folders, the folder they were stored in can be deleted. Using the System: PAM 85 Special Cases Running PAM The AXE default configuration is such that PAM will appear on your screen automatically. This configuration can be changed to not bring up PAM automatically. If this is the case, you will probably see a system prompt (usually a $). If you see the system prompt, you need to execute this command to enter PAM: pam I Return I This will bring up a PAM screen. Leaving PAM If you have an AXE secure system (Le. you had to login to the system), you will need to log out or leave PAM when you are finished with a session. To leave PAM, type: Either command will log you off automatically. There may be the case where you entered PAM from another configuration (as mentioned above). If this is the case, you will see the system prompt again. If you have a non-secure system (PAM appears automatically after boot-up), then typing I CTRL r []] will clear the screen, stop all programs you have running on PAM, and start a new PAM screen. If you have a program running on PAM, it would be a good idea to not press @IlliJ-[]] unless you are sure you wish to stop all processes. There are also operator interfaces other than PAM (see "Other Shells," in Chapter 8). To access these shells from a PAM based configuration, you will execute a command which creates the operator interface out of PAM. This means if you are in a PAM window, a new window will be created in which you can execute commands in another operator interface. When you wish to leave the other operator interface, you would press ~ and you would be back in PAM. The operator interfaces available (if you have prior knowledge of these shells) are Bourne shell, and Restricted Bourne shell. The commands you need to execute are: "C" Shell /bin/ csh (the SYS_ TOOLS file set must be loaded first) Bourne Shell /bin/sh Restricted Bourne Shell /bin/rsh 86 Using the System: PAM "e" shell, Learning PAM in Greater Detail Command Line Quoting To prevent PAM from processing various special characters (characters such as # and> which have a special meaning to PAM), you can enclose those characters in quotation marks. PAM recognizes the following quotation marks: " (double quote) and' (single quote). When a group of one or more characters are enclosed within a set of either single- or doublequote marks, PAM does not interpret them as special characters. You can also use \ (backslash) to quote a single character. The character immediately following the backs lash is not interpreted by PAM as a special character. Examples These examples use the echo command. If the special characters were not enclosed in quotes, PAM would think you were trying to redirect (see "Redirecting Input and Output") the output of the echo command. Either two double-quote marks or two single-quote marks can be used. But you can not use a single- or a double-quote mark together. echo "some special characters: # < >" echo 'some more special characters: & echo here is a special character \; Quotes can also be quoted, but they must be enclosed within a pair of different quote marks. That is, one or more single quotes can be enclosed within a pair of double quotes, and one or more double quotes can be enclosed within a pair of single quotes. For example: echo 'here are some double quotes " " , echo "here are some single quotes I , " Using the System: PAM 87 Command Line Pattern Matching When a command is entered from the command line, each command word (a parameter, for example) is scanned for the characters *, ?, and [. If one of these characters appears, then the word is regarded as a pattern. The word is replaced with alphabetically sorted file names that match the pattern. If no file name is found to match the pattern, the word is left unchanged. Here are some examples: • If you know of a program that begins with the letters oct but you can't remember the rest of the file name, you can type oct* in the command line. PAM reads the word oct* and sees the * character. PAM then scans the list of files looking for any files which begin with oct. The following file names match the oct* pattern: october octl oct23 or oct28.1985. If a pattern is used to specify a command (for example, if you forgot the entire command), PAM will only match one name. If there is more than one match for a command. you will see an error message . • You could organize your files like octl, oct2, oct3 (and so forth). If you wanted to print these files, you could use a print command (for example, Ip) in the following way: Ip oct? PAM would recognize? as a pattern character, and send all files beginning with oct and ending in any single character. The Table 4-4 describes the command line pattern matching: Table 4-4. Command Line Pattern Matching 88 * Matches any string, including the null string. ? Matches any single character. [. .. ] Matches anyone of the enclosed characters. A pair of characters separated by - matches any character exactly between the pair, including those characters. If you place a ! inside the left bracket, PAM will not match the characters in the brackets (in other words it will match every pattern except the pattern in the brackets). Using the System: PAM Redirecting Input and Output Redirecting input and output is a convenient way of selecting what files or devices a program uses. The output of a program normally displayed on the screen can be sent to the active printer or to a file. Redirection does not affect the functioning of the program because the destination of output from the program is changed at the system level. Redirecting input is not used as frequently as redirecting output because the keyboard is usually the default input (that is, input to a program is typed by you). A file containing data can be used for input to a program. To let PAM know where the input comes from, or where the output should go, you include special symbols in the command line to indicate the input or output redirection. Every program that is run has three data paths associated with it: standard input, standard output, and error output. Programs use these data paths to interact with you. For example, if you are using the window version of PAM, standard output and error output are directed to the window in which a program is run. If this window is the selected window, the keyboard can be used for the standard input of the program. The symbols for redirecting input and output allow you to change a specific data path of a program while leaving its other data paths unchanged. For example, you can specify a different device for standard output. Normally, the output would be sent to the screen. You can redirect the standard output, for example, to a file if you wish to store the output. An alternative for redirecting input and output when using Windows is designating a window for program execution. This window is then used for the standard input, standard output, and error output of the program. A window, with a name you provide, is created by PAM when a symbol is included in the command line that identifies the window name to use for the program. Note that while PAM always creates a window for a program or command, this example would create a window with the name you provide. How to Redirect Input and Output Symbols to redirect the input or output of a program or to specify a window for it to run in are entered in the command line when the program is started. When I Return I is pressed, the program begins executing with the data paths specified by the redirection symbols. To specify redirection of input or output for a program, each file or window name is preceded by a redirection symbol, for example: programA < file_name programB > file_name programC # window_name Using the System: PAM 89 Spaces between the redirection symbols and the files or window names are optional. The symbol identifies the name that folIows it as a file for input or output or the name of a window. The redirection symbols are listed in Table 4-5: Table 4-5. Redirection Symbols Function Symbol Example < Read standard input from an existing file. program!Write standard output to a file. program2 >output.data » -# Append standard output to an existing file. sample.prog »output.data Write error output to a file. ABC -error. listing Append error output to an existing file. pgm.tst --error_log Use the specified window for standard input, standard output, and error output. newprog #test NOTE Information in files or windows will be lost when certain redirection symbols are used. If output from a program is directed to an existing file with the > or - symbols, the file wilI be emptied and overwritten when the program starts. Be careful not to use the same file for standard input and standard output or for standard input and error output. When input and output operations access the same file, the results are unpredictable. If a file you specify with a redirection symbol is not in the open folder, you should use a path name to identify it. The folIowing actions are taken when the system does not locate files named with the redirection symbols: • If a file specified for input with the < symbol is not located, an error message is displayed. • If a file specified for output with the > or - symbols is not located, it is created and used for program output. • If a file specified for appending output to with the » or -- symbols is not located, it is created and used for program output. 90 Using the System: PAM Examples The following examples show how the data paths of programs, commands, or utilities can be modified with the redirection symbols. progl -errlist Runs the program progl and sends errors to the file errlist. CHIt est datal -errl Runs the program ABC using the file datal for standard output. The file errl is used for error output. date »syslog Adds the current time and date to the end of the file syslog. newprog #test Runs the program newprog in a window named test. view docl #manual Displays the file dod in a window named manual. Using the System: PAM 91 What is a Pipe? Two or more programs can be connected so the output of one program is used as the input of another program. The data path that joins the programs is called a pipe. In the above example, the output from program_Q is piped as input to program_b. Pipes allow you to redirect program input and output without the use of temporary files. When programs are connected with pipes, the operating system coordinates the input and output between the programs. The pipes only transfer data in one direction, from the standard output of one program to the standard input of another program. How to Connect Programs With Pipes The vertical bar ( I ) is the "pipe" symbol. Parameters for the program are listed after the program name, as usual, but before the I symbol. Spacing between the program names and vertical bars is optional. The syntax used for connecting programs with pipes is as follows: program_Q I program_b I program_c ... Pipes operate on or transform data by separate programs in stages. For example, program_Q could have input that you type from the keyboard. This data would be passed by the first pipe to program_b where it would be checked for validity, and processed. The processed data could then be passed by the second pipe to program_c for formatting into a report, and so on. The redirection symbols described in the "Redirecting Input and Output" section can be used for programs connected with pipes. However, only the data paths not connected with pipes can be changed. If you specify a change to a data path being used with a pipe, then an error occurs. The following changes are permitted: • The standard input of the first program using a pipe can be redirected with the < symbol. • The standard output of the last program using a pipe can be redirected by using the > symbol or appended to an existing file with the » symbol. • The error output for any program using a pipe can be redirected with the - symbol or appended to an existing file with - - . 92 Using the System: PAM Examples The following commands show how programs can be connected with pipes and how additional changes can be made to data paths with redirection symbols. These pipes are typed into the command line. When the command is complete, you press I Return I. test_progt I lusr/output_prog Takes the standard output from tesCprogl and uses it as standard input to /usr/outpuCprog. program.A store_file Runs four programs connected with pipes and puts the output of the fourth program in store-file. Sequential Processing When a program begins, it normally starts executing immediately. New programs can be run whether or not the last program has finished executing (multitasking, see "Multitasking" in Chapter 7). In some cases, it is useful to prevent additional programs from being started until a specific program has completed. This is called sequential processing, or processing files in order. When a program is run with sequential processing, additional programs or commands cannot be entered in PAM until the specific program has finished executing. Sequential processing can be specified for any file or command, although it is normally used only for programs. How to Process Files Sequentially Sequential processing can be used for commands you enter in the command line. Placing a semicolon (;) after the last character in a command tells PAM to process this command before going to the next command. For example, to run the program backupl with sequential processing, use the following command: backup1 ; If parameters are required by the program, they are entered as usual. The semicolon is placed after the last parameter or redirection symbol, for example: test_program 4 5 >test_output ; Using the System: PAM 93 While a program is running as a sequential process, there is no PAM response to keyboard activity until after the program has completed. You then receive output only in the command line after the program completes executing. Programs already in progress when a program with sequential processing is executed continue to run as usual. While a program is running as a sequential process, you have the option of waiting for the program to finish or if you are using the window version of PAM, using applications already running in other windows (by selecting the other windows). Several programs can be run sequentially using the following syntax: program!; programS; programC; ... After the first program is run and completed, the second program begins. After that program ends, the next program begins, and so on. Using Windows, all programs run sequentially this way are executed in the same window. The window has the name of the first program. Examples The following commands specify sequential processing for programs. cleanup_prog ; Runs the program cleanup_prog as a sequential process. /usr/otherapps/backupl #test_window ; Runs the program backupl (in the /usr/otherapps folder) as a sequential process in a window called test_window (for the window version of PAM). text_formatter execfiles/papers/Bookl ; Runs the program text-formatter as a sequential process. The data file execfiles/papers/Bookl is a parameter for this program. testl_diag ; test2_diag; Runs the program testl_diag, waits for it to finish, and then runs test2_diag. 94 Using the System: PAM Nonsequential Processing Programs can be run non sequentially (that is, each program runs without waiting for the previous program to complete). Following the program name with & specifies nonsequential processing. For example: program1& program2& program3& ... For the Windows version of PAM, the & is optional (that is, the default processing of programs is nonsequential) to run a single program nonsequentially. For the non-Windows version, sequential processing is the default (adding ';'). Therefore, if you are in the non-Windows version of PAM and you want to run several programs at the same time, you need to use the & nonsequential syntax. NOTE For the non-Windows version of PAM: if the output is not redirected, running a program non-sequentially may cause PAM display problems. You could get output from several programs on the screen at the same time. Also, you need to be aware that you cannot use the keyboard as the default input because there may be several programs asking for input at the same time. In this case it is wise to redirect input to programs from data files. What is a Script File? As you become familiar with PAM, you will be entering commands in the command line frequently. There may be times when you need to use the same sequence of commands over and over. It would be nice to just have one command to do this and save you so much typing. A script file is a file containing commands you frequently use. By placing the commands in a script file, you can execute the commands with one command. Script files contain commands and can be executed like a program. By creating a script file, you can design commands for your own needs. When the name of the script file is entered in the PAM command line, the commands in the file are executed as if you entered each one individually. Any command that can be entered in the command line can be placed in a script file. You can even use the names of other script files in a script file to act as subprograms or "subscripts. " Using the System: PAM 95 Depending on the commands you include in a script file, command output mayor may not be displayed when you execute it. Output from PAM commands, such as move or copy (except error messages), is suppressed when the commands are executed from a script file. Output from programs is displayed as if you had executed them from the command line. How to Create a Script File Script files are first written as data files with a text editor such as vi (see the "vi Editor," Chapter 6). Before a data file can be executed as a script file, its execute permission must be changed so it is identified as a program file. In other words, PAM will view the script file and not execute it unless PAM is told the script is executable. The chmod ("change mode") command can be used to change file permissions. This command is described later. With script files, sequential processing is the default for all commands. For example, the command on the second line of the script file is not started until the command on the first Hne is finished executing. Multiple commands can be run simultaneously from a script file by entering the ampersand (&) character after each command that is not to be processed sequentially (see "Nonsequential Processing"). Placing an ampersand after a command specifies that PAM does not need to wait for it to finish executing before executing the next command in the script file. Using an ampersand after a command in a script file is equivalent to placing an ampersand after the same command when it is entered in the command line. Parameters needed for commands in a script file are entered in the command line when the script file is executed. For example, to execute a script file called prinCit that requires one file named 1st as a parameter, the command would be the following: Let us assume for this example that the file prinCit has the following contents: copy $1 /users/dave lp /users/dave/$1 delete /users/dave/$1 In the prinCit script file, 1st is assigned to the variable $1. This file is first copied to the file 1st in the /users/dave folder. Then the file fusersfdavef1st is printed on the active printer using the /p command. Finally, 1st is deleted from the /users/dave folder. Because sequential processing is the default in script files, the /p command is not executed until the file is copied to the /users/dave folder and the file is not deleted until printing is complete. 96 Using the System: PAM The parameters for script files are called positional because they are assigned to variables in the script file in the order they are entered in the command line. The parameter values you enter are passed to the variables $1, $2, and so on up to $9, in the script file. Multiple parameters must be separated by one or more spaces. The first parameter is assigned to the variable $1, the second parameter is assigned to $2, and so on. The null string is assigned to variables for parameters you do not enter. Using the variabie $0, the name of the script file can be used within the script. When all variables are referenced at once, or over nine variables are needed in a script file, the variable $* can be used. All the parameters entered in the command line are passed to the variable $* as a long character string. This variable is useful when a different interpretation of parameters, such as one long character string, is necessary for the commands in a script file. Example Here is an example of the contents of a script file called date_print: date > $1 cat $2 » $1 lp $1 delete $1 After entering these commands in a script file (using an editor), you must use the chmod command (described next) to make the file executable. Then you enter a single command like: date_print outfile memofile The script file date_print would use outfile as $1 and memofile as $2. First, the date command output is placed in $1 (outfile) using the redirection symbol. Then $2 (memofile) is appended to $1. The resulting file ($1) contains the date and contents of memofile. This file is then printed, and finally deleted. The chmod Command The chmod command has two syntax formats. Both are described in this section; you may choose the syntax you find easiest to use. The first syntax for the chmod command is as follows: chmod nnn script_file_name where nnn are three integers (0 through 7) which describe file permissions, and script_file_name is the name of the script file you wish to execute. The command can be entered into the command line. You will not get any messages after pressing I Return I, but the status of the file will be changed to allow you to execute the script. Using the System: PAM 97 In a multi-user environment, you have the possibility of other people using your files. The chmod command can also allow you to protect your files, along with allowing you to execute the files. The nnn specified in the above command syntax refers to three permissions you can allow for any file: owner (you), group, and public. Each integer of the nnn is either a 0, 1, 2, 3, 4, 5, 6, or 7. To figure out which of these numbers should be used for each permission, make a form like Figure 4-10, and follow the instructions given below the form. chmod read (add 4) write (add 2) execute (add 1) Owner (you) Group Public first number second number third number total Figure 4-10. Chmod Permission Form Instructions: For each permission (owner, group, and public) decide if you wish to allow reading, writing, and/ or execution of the file. If you wish to allow reading the file, place a 4 under the permission heading. For writing, place a 2 under the heading, and so on. Then sum the numbers vertically to get a total for each permission. The three digit number you have left is the chmod number to enter in the command line (replacing the nnn in the above syntax). Examples chmod 777 file_a Allow all users to read, write and execute file_a. chmod 500 file_b Allow only the owner (you) to read and execute the file. Remember in order to execute a file, you have to be able to read it first. chmod 644 file_c file_c could be a data file. Therefore, you allow the file to be read and written by you but only read by others. 98 Using the System: PAM Chmod Symbolic Syntax The second syntax that chmod uses is: chmod nnn filename where nnn is replaced by: user group other [[Jj + r g - w o = x Using the symbolic syntax may be easier to understand than the above numeric syntax for the chmod command. The symbols r, w, and xrepresent read, write, and execute permissions, respectively. The u, g, and ocharacters represent user, group, or other to whom permissions will be granted or taken away. Using the + symbol with one (and only one) permission (r, w, or x) adds the permission for the specified user (u), group (g), or other (0), all of them (if neither u, g, nor 0 is specified). Using the - symbol with one permission takes away (erase) one file permission. Using the = symbol sets the file permission to only the one permission you specify. Examples chmod u-x filel This command removes the execute permission from the user (it does not affect the other groups). chmod g+w file2 This command adds the write permission to file2 for the group (you and a group specified by the system administrator). chmod o=r file3 This command sets file3 to be read only by other users. chmod +r file~. This command adds read permissions for user, group and other. chmod =rwx file5 this command sets read, write, and execute permissions for user, group, and other for file5. Using the System: PAM 99 Listing the File Permissions To find out are the file permissions for a particular file or files in a folder, use the following command: 11 I Return I This will give you a listing of files in the folder (except for hidden files). To list a single file type the following command: 11 file_name I Return I where file_name is the file you want listed. An example listing shows what to look for: -rwxrwxrwx 1 davek axe 347 Nov 15 09:29 myfile The first column of information gives you the file permissions. These are shown in the following diagram: -rwxrwxrwx II II last three are for public I I second three are for your group I first three are for you only indicates a folder if it shows "d" Each set of three corresponds to the read, write, execute permissions. If there is a "-" in the permission position, then the file does not have that permission. When you use the chmod command to change permissions, you can verify permissions by executing the 11 command. Using an Autost File An Autost ("auto-start") file is used to perform desired operations at the beginning of a PAM session. Autost files are often used to start an application running so that no initial choices need to be made. The file must be named Autost, and the following actions are taken by PAM: • If the Autost file is a data file, it is displayed . • If it is a program or a script file, it is executed. PAM will accept command input after the processing of the Autost file has completed. If the system does not locate an Autost file, the PAM screen is displayed. 100 Using the System: PAM Any file can be used as an Autost file by using the rename (or move) command to change its name to Autost. Names such as autost or AUTOST should not be used because the system differentiates between lowercase an uppercase letters. Unless the file name is Autost, the file will not be accessed when you enter PAM. If you are using the Windows version of PAM, a window named Autost is created and the output is displayed in this window. If a command that needs input is executed in the Autost file, you can type in the window if the window is selected. The Autost window will be destroyed (if it is no longer in use) when PAM creates another command window. Direct Execution of Script Files A script file can be run in two ways: • Normally, without direct execution, a script file when run will execute commands such as cd, getenv, and netunam (see "Networking and PAM") within the script but will not change the open folder, environment, or network status. For example, if a script is run with a cd command, the folder is changed during the script execution. When the script is finished, the open folder in effect prior to the script execution once again becomes the open folder. • If a script is run with direct execution, the commands cd, getenv, and netunam when run in the script, will change the open folder, environment, or network status, and the changes will remain in effect after the script execution completes. The Autost file (if it is a script file) is run with direct execution. Therefore, when you start PAM and the Autost file is automatically run, the commands to set the open folder and environment stay in effect when the script is finished. To directly execute scripts, you type the following command in the command line: source scripCname I Return I where scripCname is the name of the script. Cases in which you might use this command are, for example: • executing a script file containing the cd command. • executing a script file with the getenv command (described in the next section). • executing a script with the netunam command that establishes a connection with a remote system (see "Networking and PAM") if you have networking capabilities. Using the System: PAM 101 PAM's Environment File Environment files provide information to the system for defining the active environment in PAM. The active environment may include a search path for locating files, a home folder that can be easily accessed, and other information about the computer for application programs. These variables provide information about your system and the files and folders it contains. When PAM is run, a file named. environ is used to set up the active environment. NOTE The. environ file is an ordinary data file. It can be changed with a text editor. The most common reason for changing the default environment is to reassign the PATH variable (order of folders PAM searches to find a program) and the TZ (time zone) variable. The uses of the active environment include the following: • PAM uses the environment as a source of information when conducting searches. When the name of a program is entered as a command, the PATH variable provides a list of folders to search. The open folder must be in the PATH in order to be searched (specified as "."). • Utilities can determine information about the system environment by reading variables in the environment. The time_oj_day utility, for example, accesses the variable TZ to determine in what time zone the computer is. • Commands can use information in the environment as a supplementary source of information. The cd command uses the HOME variable to determine what folder to open when it is executed without a parameter, for example. • Application programs utilize the environment to obtain information about how various features are implemented on the computer. An editor is normally used for making changes to the .environ file. Changes can be made to the assignment strings of existing variables. Or, different variables can be added to the file as required by your applications. The following form is used for all variable assignments: variable =string 102 Using the System: PAM In addition, • The end-of-Iine indicator (usually the carriage return character) should be used to terminate the variable assignment. For example, TERM= sets the terminal type to the null string. • Colons are used to separate parts of a variable assignment. With the PATH variable, colons separate the folder names. Do not put spaces in a variable assignment unless they are part of the assignment. Changing the .environ file does not cause a change to be made in the active environment until PAM is re-started. The getenu command allows you to change the environment during a session without terminating the session (see "Selecting the Environment with getenv"). These variables can be included in the. environ file: • The HOME variable sets the home folder. Executing the cd command without a folder name causes this folder to be displayed. • The PATH variable sets the search path for programs and script files. When a program name is entered in the command line, the folders included in the search path are searched in order until the specified file is found. If this variable is not specified, the open folder is searched instead. • The TERM variable provides the terminal type. This can be accessed by application programs to determine whether level 0 or level 1 features are implemented, for example. • The TZ variable provides the time zone information. This can be changed so that the time_of_day utility displays the correct time zone. • The ACTION variable specifies a program to execute when a data file name is entered as a command. • The SCRSHELL variable is used to identify the shell (or command interpreter) to be used when PAM runs certain script files 5 . 5 For more details about shells, see "More Detailed Uses of AXE, .. Chapter 8. Using the System: PAM 103 Setting the Home Folder The home folder is the folder accessed by executing the cd command without a parameter. It is convenient to set a folder you frequently access as the home folder. If the folder currently being used as the home folder is not the one you use most often, then the HOME variable in the .environ file can be changed to another folder. The folder name assigned to the HOME variable should be an absolute path name. HOME=folder _name An example of setting the home folder is changing it from jusr to a folder called jusrjexecfiles. The folder you specify must already exist. To change the home folder, access the .environ file with a text editor and change the HOME variable to the following: HOME=/usr/execfiles Although the value of the HOME variable has been changed, the home folder used by PAM will be jusr until the active environment is set when you re-start PAM or it is changed with the getenv command. Setting the Search Path The search path is a list of folders that is searched for programs in a specific order. When a program name is entered in the command line, PAM checks the folders included in the search path for the specified file. The order of folders in the search path determines the efficiency of the search, and when duplicate file names exist, it determines which file is accessed. The system searches for files starting with the leftmost folder in the search path. If a file is not found, the next folder is searched. When a match is found, the search ceases, and the file is accessed. If no match is found, a error message is displayed. NOTE PAM uses search paths only for program file names. Files used as command parameters are not located with the search path. 104 Using the System: PAM The path names of the folders in the search path are separated with colons, as follows: PATH=folderl :/0Ider2:folder3 ... The order that folders are searched when a command is entered in the command line is shown in the following illustration. If the PATH environment variable is not defined, only the open folder is searched. If the search is unsuccessful after searching the last folder in the search path, then an error message is displayed. Sample Search Path PATH=. :/usr/execfiles:/bin:/tmp:/ The The The The The current (.) folder is searched first. /usr/execfiles folder is searched second. /bin folder is searched third. /tmp folder is searched fourth. root (f) folder is searched last. If the root folder is frequently used for storing programs and files, the ordering of the folders in the search path can be changed to improve search efficiency. The following assignment changes the sample search path so that the root folder, represented with /, is searched first instead of last: PATH=/:. :/usr/execfiles:/bin:/tmp: Another change that can be made to a search path is adding another folder to it. If a folder named /usr/solutions is used for storing frequently executed programs, then it can be included in the search path. This would allow programs stored in /usr/solutions to be executed from any open folder without specifying a path name. Note that many application programs do not use the PATH variable and can only locate files outside of the open folder when a path name is used. The following variable assignment adds the /usr/solutions folder to the sample search path: PATH=. :/usr/execfiles:/bin:/tmp:/:/usr/solutions If a folder is specified for the PATH variable that is not currently included in the file system, then it is ignored. An error message is displayed only when programs entered in the command line cannot be located. Using the System: PAM 105 Setting the Action The computer takes certain default actions when files are selected depending on file type. The variable ACTION can be added to the .environ file to change the action taken when data files are selected (remember a getenv . environ command or a re-start of PAM needs to be done to have the new ACTION variable in the active environment). If the ACTION variable is not present, data files are displayed when they are accessed. When the variable ACTION is included in the environment and is set equal to a program name, then selecting a data file causes the program to begin executing. NOTE If you change the default action for accessing data files by including the ACTION variable in your .environ file, the view command can still be used to display data files. Assigning a program to the ACTION variable enables application programs to be automatically executed whenever the name of a data file is entered in the command line. The name of the data file selected is passed to the program as the first parameter so entering the name of a data file then becomes equivalent to entering the program name followed by the data file name in the command line. A program is identified as the default action as follows: ACTION=program_name To specify that the program reports be executed, for example, add the following line to the .environ file: ACTION=reports If a simple name is used to identify the program, then the folder it is stored in should be included in the search path. When you type a data file on the command line and press I Return I, PAM will use this data file as input to reports. 106 Using the System: PAM Setting the SeRSHEll Variable The SCRSHELL environment variable is used to identify the shelf> to be used by PAM in running scripts. If the name specified by SCRSHELL does not contain a "/", then PAM searches for the shell using the PATH variable. The SCRSHELL variable is examined whenever a script is run. If SCRSHELL is undefined or the specified shell does not exist, then the script is processed by PAM. In other words, if PAM does not find the shell, PAM will try to process the script instead of letting a shell process the script. An example would be: If you try execute wmstart (Windows) from PAM without a SCRSHELL set to /bin/ sh, PAM will try to run wmstart. Since PAM cannot do this alone, you would receive error messages from PAM. However, if you set SCRSHELL=/bin/sh, PAM will let this shell run wmstart, and you will not receive any error messages. Selecting Alternate Environments with getenv NOTE The most common reason for changing the default environment is to reassign the PATH variable (order of folders PAM searches to find a program) and the TZ (time zone) variable. The active environment set when you start PAM can be changed by selecting another environment file with the getenv command. The getenv command replaces the active environment with the contents of the specified file. You specify the environment file for getenv to access by entering it as a parameter as follows: getenv file_name For example, if you put environment commands in a file called sysenv, you w")uld change the active environment to the settings specified using: getenv sysenv The getenv command is convenient for changing the environment after editing the .environ file, and without restarting PAM. The environment can be changed by executing getenv from a script file, but the changes apply only to the commands executed from the script file (unless the script file is directly executed; see "Direct Execution of Script Files"). 6 For more details on shells, see "More Detailed Uses of AXE," Chapter 8. Using the System: PAM 107 Networking and PAM PAM allows network access for the HP 9000 series 300 and 500 computers. If your system has networking capabilities, you can use the following command: netunam path name (string) pathname is a special network file path. If you provide PAM with a simple name (with out necessary prefixes), PAM will automatically place /net/ in front of the path. (string) is the login string (login identifier) required by the remote system with which you are networking. The parentheses () indicate that string is optional. The (string) is of the form: user: password where user is your login identifier for the remote system, and password is the password for the remote system. If you enter the login string as simply user: then you are prompted by PAM to enter the password (you will not see the characters typed; this is a good method to preserve security). If you do not need a password for the remote system, then type user without the colon (:). If you enter only netunam without the user:password parameter, then the netunam command disconnects the existing link to the remote system. If you try to access a folder in a remote system (that you are not yet connected to), PAM will try to establish a connection and prompt you for login and password if necessary. Network special files are regarded by PAM as folders corresponding to the root folders of the remote systems. Opening a network special file is the same as opening the root of the associated remote system. 108 Using the System: PAM Networking Errors 'netunam path_name string' is the proper form of the command. Improper syntax was used in entering a netunam command. Invalid path name for network special file. The first parameter of the netunam command was not a network special file (even with /net/ preceding the simple path). The remote system is not connected to the network. A connection was attempted, and it was determined the remote system was not connected to the network. The specified login is invalid. The login you used was not accepted by the remote system. Error doing netunam: error=ERROR. A networking error occurred that is not interpreted by PAM (e.g. NE_INTERNAL). A list of the error numbers are listed in the error messages appendix in the "Network Services/9000 LAN User's Guide" (the manual accompanying LAN). Cannot disconnect from the remote system when connection is in use. The open folder is on the remote system when you tried to disconnect the link (using the netunam command with only the pathname parameter). Networking Messages Opening a remote folder on 'system'; Please enter a login. This message is shown when you attempt to open a folder on a remote system that has not been connected to the local system by a previous netunam command. You are prompted to enter a login with an optional password. Please enter a password. If a password is not provided when a login string is entered, PAM prompts you with this message to enter a password. Establishing connection ... This message is shown while a netunam command is being executed (there is a delay while a connection is established). Using the System: PAM 109 PAM Messages Listed below are messages that can appear in the top line of the PAM screen. Following each message are an explanation and, for error messages, some hints about solving the problem. Where the listing below shows file name or folder name, the actual message shows the name of the actual file or folder. Sorry, no more memory. A script is nested too deeply. Modify the script file. name cannot be found. PAM doesn't understand the command you typed in. If name is a PAM command, such as makefolder or rename, check the spelling. If name is a simple file name, make sure it's listed in the open folder, make sure the folder containing name appears in the path variable in the environment. Cannot create file name. 1. There may not be er.ough room on the disc for a new file. 2. A new file cannot be created due to permissions set for the file system (for example, "copy a /" tries to write file a into the root directory, which is not available to non-root users). file name exists and cannot be overwritten. Make sure that you have write permission to the destination file or folder. Use the HP-UX chmod command to change the permission. Cannot delete name. Make sure that you have write permission to the destination file or folder. Use the HP-UX chmod command to change the permission. Cannot delete the open folder. Press Close ([][]). The next outer folder becomes the open folder, and the folder you want to delete is listed among the contents of the outer folder. You can then delete the folder. folder name is not empty so it cannot be deleted. Move or delete all files in the folder. You can then delete the folder. 110 Using the System: PAM Cannot copy folder name. You must create a new folder and copy the files in the original folder to the new folder. Cannot move a folder between discs. You must create a new folder on the destination disc and move the files in the original folder to the new folder. Cannot move a folder into itself. You can't introduce circularity into the file system-for example, you can't move Folderl into Folder2 if Folderl contains Folder2. First move Folder2 so it is no longer contained in Folderl, and then move Folder! into Folder2. Cannot read name. You don't have read permission for the file or folder. Use the HP-UX command chmod to change the permission. Cannot write in folder name. You don't have write permission for the folder. Use the HP-UX command chmod to change the permission. Cannot rename folder name. You can't rename or move a folder specified by . or .. , or specified by a name ending in /. Cannot open folder name. You don't have execute permission for the folder. Use the HP-UX command chmod to change the permission. Specify file to copy. move. or rename before specifying 'to'. You gave a to command before specifying the action to perform. Now complete the copy with 'to file name'. Now complete the move with 'to file name'. Now complete the rename with 'to file name'. After you give a one-parameter copy, move, or rename command, this message prompts you to supply the second parameter. Using the System: PAM 111 Error while reading file name. Check that the disc is working properly. This rare error may require system administrator attention or possibly indicate the need for service on a hard disc. Error while writing file name. Check that the disc is working properly. This rare error may require system administrator attention or possibly indicate the need for service on a hard disc. Command missing in command line. You specified I/O redirection or a command terminator without a corresponding command. Supply the command. Missing Missing Missing Missing name name name name after '> ' after '< ' after after 'I' The name that should follow the symbol is missing. Supply the name. The standard input is ambiguous in the command. The standard output is ambiguous in the command. The standard error is ambiguous in the command. The standard input, output, or error is specified more than once in the command. The application window is ambiguous in the command. A window is specified more than once in the command. Only one window can be specified for all commands in a single command line. Window name cannot contain a '/'. Windows must have simple names. Too many command parameters. The specified pattern matches so many file names the resulting command uses up command memory. Perform the command with fewer parameters. Too many commands in the command line. Limit is 10. Edit the command line and try again. 112 Using the System: PAM Too many parameters. Use 'cd folder'. The cd command takes only one argument. Cannot find folder's location. Check that you correctly typed the name of the destination folder. Unmatched quote character ' Unmatched quote character II Supply the matching single or double quote character. The name command does not accept parameters. You specified a parameter for a command that doesn't take parameters. Please wait ... A copy, move or rename is in progress. Done with copy. Done with move. Done with rename. The command is completed. Use the [Next] and [Prev] keys to see more files. The folder contains more files than can be displayed at once in the PAM window. Too many characters in script command line. Limit is 160. The number of characters is determined after parameter substitution. Cannot make a unique window name. When there is an existing window with the same name as a new program, PAM appends"!" to the name for the new window. This error occurs if PAM can't append "!" without exceeding the limit for the length of a window name. 'name' could not be matched No file name matches 'name' pattern. 'command filename' is the proper form of the command. You gave the wrong number of parameters. Check the command's syntax. Using the System: PAM 113 'name' is a device You tried to specify a device as a command. 'name' is a pipe You tried to specify a pipe as a command. 'name' is matched more than once; one match is required. The command requires one file name, but the indicated pattern matches more than one file name. 'name' is not a folder You must specify a folder as the parameter for the cd command. 'name' is not a window. The name is not an existing window (for the Windows version of PAM). 'filename' is not a runnable script. The file either is not a script file or does not have execute permission. Use the chmod command to change the permission (see section on chmod). 114 Using the System: PAM Table of Contents 5 Chapter 5: Helpful Tips for Managing Your Files Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a File? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. What is a Folder? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How The File System Is Structured . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How to Organize Your Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. How to Find a File ............................................ Backing Up Your Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Purging Unused Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Other File Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. File Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Device Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Archiving Seldom Used Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 115 115 116 117 117 118 121 122 122 122 122 122 Helpful Tips for Managing Your Files 5 Introduction This chapter describes ways you can organize your information. When you read Chapter 4, "Using the System: PAM," you learned how to move within the system and create folders and files. Now you can use this knowledge and make an efficient file system. First, let us define files and folders again for you, then go into the helpful ways to manage your files. What is a File? A file is a collection of information stored on a disc (an external memory) or on the computer's internal memory. Each file has a unique name consisting of 1 to 14 characters. You can use any character of the alphabet or any numeral in a file name. You may also use the underscore (J, the minus (-), and the period (.). You should avoid using other characters (Le. special characters such as characters PAM recognizes for certain purposes such as < > • I, or control characters). The details of creating a file can be found in Chapter 4, and in "The vi Editor," Chapter 6. Typical file names can look like: Junelist Memo--12 Sept.Account test Test TEST .hidden PAM distinguishes between uppercase and lowercase letters. This means test, Test, and TEST are three separate file names. If the file has a period (.) as the first character, the file is a hidden file. Hidden files are not listed in the folder area of the PAM screen. However, you can still access a hidden file by typing in the complete file name (including the period). If you wish to see a listing of all files including the hidden files, type: 1s -a I Return I in the command line and a complete listing will be displayed. Helpful Tips for Managing Your Files 115 The Types of Files There are four kinds of files in the file system l . Program files perform specific tasks. Typical program files include word processors, spreadsheets, and programs to calculate numbers. Information created or needed by these files are stored in data files. Data files include spreadsheet and document files created by an application program. A third "file" is the folder, which organizes files. A fourth file is the device file. Device files provide access to internal and external physical devices connected to the computer (discussed later in this chapter). What is a Folder? A folder is a collection of files. You can use folders to help organize your files by grouping them together. The file system is arranged as a hierarchy of folders. The top level of the system is called the root folder (identified by a f). A typical file system might look like this: / bin users dev usr tmp etc conf passwd lib losHfound I Project1 Project2 guest grp I File1 nd rnd md rmd File2 Dave Jaci man bin lib spool Figure 5-1. An Example File System In HP-UX, of which AXE is a subset (see Chapter 8), program and data files are both called "regular files"; folders are called "directories" or "directory files." 116 Helpful Tips for Managing Your Files How The File System Is Structured Folders are powerful because they can contain other folders as well as files. This leads to a hierarchy of folders: you can store a file in a folder that is stored in another folder, which you can store in another folder, and so on. As you saw in Figure 5-1, the structure iooks iike a family tree (an upside-down tree). When you enter folders, you are following the "tree" in Figure 5-1 down. For example, to find a file in the Projectl folder, you begin at the root folder U} and open folder users. Next, you would open folder myfolder. Finally, you would open folder Projectl, and look in that file listing. How to Organize Your Files You can organize your files in folders in such a way to collect related files in the same folder. One good example is the use of folders that contain files or other folders related to a particular project. Figure 5-2 shows an example of how to organize your files. / users myfolder I File 1 Project1 Pro ject2 Pro ject3 I I I File2 File3 file 1 file2 file3 FILEl personal I Dave Jaci Figure 5-2. Organizing Your Files By placing files into certain folders, you save time searching unrelated folders for your files. Also, while in the same folder, you can have direct access to all of your related files without having to switch to another folder. Helpful Tips for Managing Your Files 117 Ways to Keep Track of Your Files The PAM screen shows the contents of one folder at a time. That is, PAM shows only the file names and folder names in the next level of the tree. The table below is a helpful way to keep track of which folders you have and which files are contained in the folder. List all folders under the "Open Folder" heading. Then list the contents of each folder (what appears in the open folder area) under the "Contents of the Folder" heading. For example, the listing for Figure 5-2 is: Open Folder Contents of the Folder ... , users, ... / users ... , myfolder, '" myfolder Projectl, Project2, Project3, Personal Project! Filel. File2, File3 Project2 file!, file2, file3 Project3 FILE! Personal Dave, Jaci Figure 5-3. Keeping Track of Your Files How to Find a File Finding a file involves finding its folder, and this involves moving around in the file structure. PAM puts you in a Home l folder when you login. This Home folder can be considered your outermost folder for files that are specifically yours. You can then move down the tree of folders you create, opening folder after folder, until you find the file you want. For example, if you want to find the file Filel in Figure 5-2, and your Home folder happened to be /, you would need to move from the root folder (j) to users, from users to myfolder, from myfolder to Projectl, and you would see Filel in the open folder of Projectl. You can also use the cd command (described in Chapter 4, "Using the System: PAM") to go directly to a folder, if you know the complete path name. For example, cd /users/myfolder/Project1 will open the Proj ect1 folder from any other folder. You can then find Filel in the open folder. When you login to a security system, you can find out your working folder by executing the pwd command. If you set a Home folder in your Autost file for PAM. whatever file you define as Home folder will be your working folder when you login (or boot up to a non-secure system), 118 Helpful Tips for Managing Your Files Each folder is identified by its path name. The folder's path name defines a path from the root folder to that folder. With our example, users is /users myfolder is /users/myfolder Projectl is /users/myfolder/Proj ect! Files also have path names. A file's path name consists of its folder's name followed by a / then the file name. For example: File 1 is /users/myfolder/Proj ect1/Filel To determine the path name, you can either trace the path name from the root folder to the file on the tree diagram as shown in Figure 5-4: / f f users myfoider I f f File1 Project1 Pr-oject2 Pro ject3 I I I File2 File3 file 1 file2 file3 FILE1 personal I Dave Jaci Figure 5-4. Tracing the Path to a File Helpful Tips for Managing Your Files 119 or trace the path on the table for keeping track of your files: Contents of the Folder Open Folder / ! ! ! users myfolder ... , users, ... ... , myfolder, ... Projectl, Project2, Project3, Personal Projectl---t File!, File2, File3 Project2 file l, file 2 , file3 Project3 FILEl Personal Dave, Jaci Figure 5-5. Tracing the Path to a File 120 Helpful Tips for Managing Your Files Backing Up Your Files When you use files as data for applications, you must preserve the data. You can loose an entire file of text or data by making a very simple mistake (like deleting the wrong file). Therefore it is a good idea to make backup copies of your files. Ideally, you would want to make copies of your files in two separate, physical locations. If this option is not available to you (such as using two different discs for storage) because you do not have access to such discs or do not have the knowledge required to use the discs, then you can make copies of your files in two different areas of your file system structure. One good suggestion is to create a folder whose specific purpose is to store back up files. You could name such a folder "BKUP" or "backup." Then you would copy files using the Copy function key from the present folder to the new folder (see Chapter 4). You will need to know the path name of the backup folder to correctly copy the file to the new folder. NOTE Single file backup is in addition to backing up the file system, not in place of backing up the file system. See Chapter 9, "Backing Up and Restoring the File System," for details on backing up the file system. Helpful Tips for Managing Your Files 121 Purging Unused Files As your file system grows, you will begin to see files you no longer have any use for. These files, if you determine they will not be used again, should be deleted from the system. They take up space on the storage devices, and clutter your folders. So, you should occationally go through your files and determine which files are no longer needed. Then you can use PAM to delete these files. Other File Information File Security Every file has three permissions (three each for the owner (you), your group, and the public) determining which operations can be performed with the file: read permission, write permission, and execute permission. You have the ability through the chmod command, described in Chapter 4, "The chmod Command" section, to change the permissions for a file. This can be useful if there are other people who have access to your system. If you do not protect your files, anyone can change or delete them. Device Files Physical devices are accessed through device files. Each device, such as a printer or disc, is associated with an internal or external device. Operations access a device by accessing the corresponding device file. All device files are contained in the /dev folder. When you run programs, commands, and utilities, the system automatically accesses certain devices and device files. These default device files correspond to built-in (internal) devices. Peripheral devices, such as a printer, are accessed with device files that you create when you set up the peripheral device. Archiving Seldom Used Files If you need to keep some files, but rarely use them, you should archive the files. To archive a file, copy it to an off-line storage (a flexible disc or cartridge tape) and then remove the file from your file system. 122 Helpful Tips for Managing Your Files Table of Contents 6 Chapter 6: Creating Text Files: The vi Editor What is vi? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Conventions ................................................. The vi Modes .............................................. " A Short Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using vi ........................................................ Entering vi .................................................. The Command Mode ......................................... " Moving Around . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Text Input Mode ......................................... " Inserting Text ................................................ Deleting Text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . , , . . . . . . . .. Modifying Text ............................................... Searching For Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Leaving vi and Saving Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " Additional Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. More Information About vi ............. , . . . . . . . . . . . . . . . . . . . . . . . .. I Can't Get vi .................................................. " 123 124 124 125 129 129 129 130 132 132 133 133 134 135 136 137 138 VI REFERENCE CARD Entering and Leaving VI vi filename I Return zz :w :q! I Enter vi, editing filename Save and quit vi. I Return I I Return I Save the file, but do not leave vi. Quit vi without saving. Basic Cursor Movement lliJ OJ Move the cursor left. IT] IT] Move the cursor up. Move the cursor down. Move the cursor right. More Cursor Movement ~ Move to the beginning of the next word. [RJ IT] [[] Move to the beginning of the next word, skipping punctuation. o m CIJ [QJ (zero) Move to the beginning of the previous word. Move to the beginning of the previous word, skipping punctuation. Move to the end of the next word. Move to the end of the next word, skipping punctuation. Move to the end of the current line. Move to the beginning of the current line. [I] Move to the beginning of the previous sentence. ITJ Move to the end of the next sentence. IT] Move to the beginning of the previous paragraph. OJ Move to the end of the next paragraph. nCQ] Move to line number n (a number you type). Text Input OJ Insert text before the cursor. ~ [QJ (letter) Insert text after the cursor. [QJ Insert on the line above the cursor. (letter) Insert on the line below the cursor. Deleting Text o Delete the character on the cursor. dd Delete the current line. ndd Delete the next n lines including the current line. Replacing Text rcharacter Replace the current character with character. Rtext I ESC Replace the characters starting with the current character with text. I stext I ESC I Substitute text for the current character. : 1, $s/string/stringA/g Search the entire text for string and replace it with stringA. I Return I Finding Text / string I Return I ?string I Return I Search forward for string. Search backwards for string. n Repeat last search. N Repeat last search in opposite direction. Additional Commands [TI nl I y Yank a copy of the current line. I Yank a copy of the n lines starting at the current line. W Place yanked lines after the current line. IT] Place yanked before the current line. W Undo last command. [[] Return the current line to previous state. o Repeat the previous command QJ Join the current and the following lines together. I CTRL H G I Update the message line. ~ Redraw the screen. : set nu I Return I : set nonumber I Return Number the lines in the file. I Turn off the numbering of lines. Creating Text Files: The vi Editor 6 What is vi? This chapter describes the vi (pronounced "vee eye") editor. The vi editor is a screen-oriented text editor which allows you to input, save, and update text information. Because vi is a screen oriented editor, you can scroll through a text file at leisure, and therefore view the text file as whole (unlike line editors which only allow you to view or move through a file one line at a time). In order to use the vi editor, you must have loaded the ACMD file set. If you did not load the vi editor during installation, and you wish to use vi, see the section "I Can't Get vi" at the end of this chapter. This chapter will teach you the basics of vi. You will learn vi commands to input, save, and modify text. vi has a number of commands; this chapter presents those commands which allow you to use vi effectively without having to know all of the detailed vi commands. A list of vi commands is in Appendix B. NOTE It is important that you do not press any other keys than the ones described in this chapter while in vi. There are many commands in vi, not all of which are described in this chapter. Therefore, to avoid any frustration: don't touch anything you do not know about. If you happen to see a colon (:) at the bottom of the screen and you receive error messages which do not make any sense, you may have gotten into another editor via the vi editor . To leave this mode you need to either press the I ESC I key or type : q! to exit the editor and start again. If your screen changes or does something other than described, press @!BD[JJ (the letter "L"). This command will redraw the screen. Creating Text Files: The vi Editor 123 Conventions This chapter uses several conventions to describe commands you will use. When you see a command typed in computer font, it means you type in the command word for word. For example, means you type vi sample_file and then press I Return I. When you see a letter or word enclosed in a box, you are to press the letter or function key on the keyboard corresponding with box. For example, OJ means you press the letter "i." When you see italics, you are to substitute an appropriate word (or file name, for example). These italicized words usually follow a command or letter. For example, I string I Return 1 means you type "I" and then a string. For example, if your string was food, then you would type Ifood I Return I· Letters typed in computer font are always the exact letters you are to type. Any italicized letters or words are to be substituted with letters or words you generate. The vi Modes There are two modes to which you need to focus your attention: the command mode, and the text input mode. The command mode is seen when you first enter vi, and allows you to move about freely in the text. The text input mode is activated when you wish to input text. In this mode, you can type in text; however, you have limited mobility, unlike the command mode. Before we go into any great detail of vi concepts, let us go through a short tutorial so you can become familiar with vi. 124 Creating Text Files: The vi Editor A Short Tutorial It is assumed you have already become familiar with the preceeding chapters. From those chapters you learned how to login, use PAM, and have some familiarity with files. This chapter will assume you are not entering vi from Windows. The commands are the same for vi in all cases, only the details of screen format (ie. a window for vi) are different. With that aside, let us begin our tutorial. 1. First, be sure you have logged in, are in PAM, and vi is loaded in the system. 2. Type: vi sample_file in the PAM command line. 3. Press: I Return I The screen will clear, and you will see the vi command mode which looks like the following (note a flashing cursor at the top left of the screen): nsample_file n [New file] IMPORTANT If you receive an error message instead (like: vi: execution permission denied) then you need to read the "I Can't Get vi" section at the end of this chapter. 4. Press: CD (Lowercase I; do not press I Return I). This command means "insert before the cursor." The screen does not change, so only press CD once. Creating Text Files: The vi Editor 125 5. Now you are in the text input mode. Type the following sample text and be sure to include all mistakes (we will correct them later). If you type a mistake which is not in the text, use the 1 Back space 1 key to move back over the mistake, and type the correct text. There once was a file named Sampl_file, Who resided on AXE for a while, Mistakes wer in he, Correct them did we, With vi. the edditor with style. 6. Press: 1 ESC 1 (I ESC 1 is the escape key, which terminates the text input mode, and returns you to the command mode. However, you won't see much change in the screen. The 1 ESC 1 key is used often in vi; it is the only way to get out of the text insert mode. If you get lost, typing 1 ESC 1 will get you out of the text insert mode. If you are already out of the text insert mode, pressing I ESC I will only cause your terminal to beep.) 7. Type: ZZ Be sure these are both capital letters, and do not press 1Return I. This command saves the sample-file file, and you will exit vi. You will be prompted from PAM to Press return to continue. . .. Press 1 Return 1 and the PAM screen will appear. Now, let's reenter vi and correct our mistakes. 8. Type: vi sample_file This command is the same as before, except now vi looks and finds the sample-file you just created. 9. Press: 1 Return 1 The screen should clear, and you will see something like the following: There once was a file named Sampl_file. Who resided on AXE for a while. Mistakes wer in he. Correct them did we. With vi. the edditor with style. "sample_file" 5 lines. 146 characters If the last line on the screen reads a little differently, don't worry. You probably pressed one extra I Return I. Our first task is to correct "Sampl_file" in the first line. 126 Creating Text Files: The vi Editor 10. Press: CO (lowercase L) several times to move the cursor until the cursor flashes under the "_" in "Sampl_file" (the first row of text). If you pass the "_," press the CEJ key to move the cursor left. m 11. Press: (Lowercase I, as we did before to insert text). 12. Type: e To correctly spell Sample_file. 13. Press: I ESC I To terminate the input. Now, let's correct "wer" in the third line. 14. Press: OJ (Lowercase J) two times to move the cursor to the third line. If you pass the line, press the [TI key to move the cursor up. 15. Press: CEJ (Lowercase H) several times until the cursor flashes under the "r" in "wer". 16. Press: Q (Lowercase A). This key is for appending, inputting text after the cursor (note before, when we used [0 for insert, the text was inserted before the cursor). 17. Type: e to correctly spell "were." 18. Press: I ESC I To terminate the append mode (the same as terminating the input mode). Our last task is to correct "eddi tor" in the last line. 19. Press: OJ (Lowercase J) two times; the cursor should be on the last row of text. 20. Press: CO (lowercase L) several times to move the cursor under one of the "d's" in "edditor." If you pass the "d'S," press to move the cursor left. m 21. Once you are under one of the "d'''s in "edditor," then Press: ~ (Lowercase X). This key deletes one character, and you should now have a correct spelling of "editor." If you make any mistakes, such as deleting more than one character, then press [QJ (capital U). This command restores the line to its original state before you made any deletions. Then you can try deleting the "d" again. Creating Text Files: The vi Editor 127 Your screen should now look something like: There once was a file named Sample_file, Who resided on AXE for a while, Mistakes were in he, Correct them did we, With vi, the editor with style. "sample_file" 5 lines, 151 characters 22. Type: ZZ (both in capital letters; do not press I Return D to leave vi and save your corrections. You should be prompted again by PAM to Press return to continue .... Press I Return I and you will see the PAM screen. Congratulations! You have now finished a basic vi session, and you know how to enter vi, input text, make some minor corrections, exit and save the text in a file. Let's review what you just did: "enter vi and create sample_file" "insert text" "quit inserting" ZZ "leave vi and save the file" "enter vi using already created sample_file" OJ CIJ "move cursor right" [TI "move cursor up" [EJ "move cursor left" ~ "append after the cursor" IEsel "quit the append mode" o "delete a character" "move cursor down" The next part of this chapter goes into a little more detail on vi commands. Once you have read this chapter, you can use the enclosed vi Reference Card for quick reference while using vi. 128 Creating Text Files: The vi Editor Using vi Entering vi Before you begin, you need to check if vi is ioaded into the system. One easy way to do this is to execute the command described below in the "Action" sub-section. If you receive an error message something like: vi: execute permission denied then either vi is not loaded or your search path (places where the system looks for commands and files) needs to be changed. If you have received an error message, then you need to read the section, "I Can't Get vi," at the end of this chapter. Action To enter vi, you must specify a file name for vi to either create or find. If you are creating a text file, then use the vi command with your new file name. If you are editing an existing file, use the vi command with the existing file name. The syntax for the vi command is: vi file_name in the PAM command line, where file_name is either a new file name or existing file name you type following vi. After you type the command, press: I Return I. The Command Mode When you enter vi after typing the vi command, you see vi's visual command mode. In the command mode, you can type the commands to enter the text input mode, move the cursor around the screen, look at more lines of text, and leave vi. Understanding which mode you are in is important. Using the wrong commands when you are in a particular mode can cause unpredictable results. For example, if you are in the text input mode, you cannot use the cursor movement keys (you may be typing the letter instead of moving the cursor). Part of the confusion is because you do not receive any feedback from vi. One helpful suggestion is, when you are not sure what mode you are in, press the I ESC I key. This should put you in the command mode. You might press the I ESC I key again to make sure; if you hear a beep, you are in the command mode. Creating Text Files: The vi Editor 129 Moving Around The following table gives you a list of the commands to use for moving the cursor while in the command mode. To use these commands, press the key (letter). You may have to press the key several times in some cases because the command may only move the cursor one character or line. If you do not like pressing the key over and over to move the cursor in the text, try pressing the key and holding it down. The cursor will move rapidly. When you reach your destination, release the key, and the cursor will stop. IMPORTANT Please pay attention to the case of the letters. vi will distinguish between lower case and upper case. Table 6-1. Moving the Cursor: Basics Command 130 Action IT] Moves the cursor left. OJ Moves the cursor down. m Moves the cursor up. [IJ Moves the cursor right. Creating Text Files: The vi Editor More Movement Commands In addition to the above basic movement commands are those in the following table. Table 6-2. More Movement Commands Word Oriented Command Action 0 Move the cursor to the beginning of the next word. [RJ IT] Move the cursor to the beginning of the next word, skipping punctuation. Move the cursor to the beginning of the previous word. m Move the cursor to the beginning of the previous word, skipping punctuation. CiJ Move the cursor to the end of the next word. IT] Move the cursor to the end of the next word, skipping punctuation. Line Oriented Command m [QJ (zero) Action Move the cursor to the end of the current line. Move the cursor to the beginning of the current line. Block Oriented Command Action rn rn Move the cursor to the beginning of the previous sentence. IT] Move the cursor to the beginning of the previous paragraph. OJ Move the cursor to the end of the next paragraph. n[QJ Move the cursor to line number n (a number you type). [QJ Move the cursor to the end of the file. Move the cursor to the end of the next sentence. Creating Text Files: The vi Editor 131 The Text Input Mode n When you are in the text input mode, you will notice the tilde on the left side of the screen disappear when you begin typing on that line. Also, if the line is longer than what the screen shows, the line of text will wrap around to the next line on the screen. NOTE If you type a line greater than 511 characters, vi will print an error message: line too long. To continue, you have to type: vi and press I Return I. Your long line will be lost, so you need to make any appropriate changes. Inserting Text When you insert text, you are entering the text input mode. There are several commands to insert text in different ways. The following table shows the commands to insert text. As with all of vi commands, pay attention to the case of the letters. Table 6-3. Inserting Text Command Action OJ Insert text before the cursor. [i] Insert text after the cursor. 0 (Lowercase letter "0"). Enter the text input mode on the line below the cursor. []] (Uppercase letter "0"). Enter the text input mode on the line above the cursor. When you wish to stop inserting text, press: 132 Creating Text Files: The vi Editor I ESC I. You will return to the command mode. Deleting Text When modifying text, you may wish to delete some text. The commands in Table 6-4 delete either a specific character, or several characters. Table 6-4. Deleting Text Command Action 0 Delete the character on the cursor. dd Delete the current line. ndd Delete the next n lines (the number of lines you wish to delete including the current line). Modifying Text This section describes the commands you need to modify or update a file. You execute these commands while in the command mode. First, you locate the error or change to be made; then you use one of the modifying commands. This method differs from the previous idea of editing. Before, you were able to locate the error, delete it, then insert the correct text. Now, you can use a replace or substitute command and correct errors in a one step method. The following table describes how to use the modifying commands: Table 6-5. Commands to Modify Text Command Action rcharacter Type r followed by a single character (symbolized here as character). This command rep/aces the next character after the cursor with the character you type following r. Rtext I ESC 1 stext I ESC 1 : 1 . $s/ string/ stringA/ g I Return 1 Type R followed by some text (it can include spaces). When you are through typing the text, press I ESC 1 to execute the command. This command rep/aces the characters following the cursor (character for character) with the text you type. Type s followed by some text (it can include spaces). When you are through typing the text, press I ESC 1 to execute the command. This command substitutes the entire text you typed for the character (the single character) following the cursor. To change all occurrences of string to stringA, first type: 1. $s/ then type the string to be changed. Next, type a / followed by the string you want in place of the previous string. End the command with a /g and press I Return I. For example: : 1 • $s/ snort/ sort/ g I Return 1will change all occurrences of snort to sort. Creating Text Files: The vi Editor 133 Searching For Text When you have a file with many lines of text, you may find it difficult to search through the text by using the movement commands and searching Visually for an error or modification to be made. If you know the error, or wish to look for a particular word (or string), you can use vi's searching commands. Table 6-6. Searching Commands Action Command 134 / string I Return I First, type /. Then type the string for which you wish to search. Finally, execute the command by pressing I Return I (you can also press I ESC I with the same results). For example: / eddi tor I Return I will search forward through the file for the string edditor. ?string I Return I First, type ? Then type the string for which you wish to search. Finally, execute the command by pressing I Return I (you can also press I ESC I with the same results). This command searches backwards through the file for string. For example: ?Sampl_file I Return I will search backwards through the file for Sam pi_file . n After you have executed a search command (/ string for example), and you wish to search for the same string, type: n. This will search for the next occurrence of the string (down in the text) in the previously executed search command. N After you have executed a search command (/ string for example), and you wish to search for the same string, type: n. This will search for the next occurrence of the string (up in the text) in the previously executed search command. Creating Text Files: The vi Editor Leaving vi and Saving Text After you have inputted text, you will probably want to save the text. When you are in vi, the text you type and modifications made do not change the original file until you specifically say so. You therefore have several ways of saving the text, or, leaving vi without saving any changes (the original file remains intact). It is a good idea to save the file you are working on periodically. This way you will insure your changes are saved in case, for example, the system goes down. The following table shows the commands to save and/or leave vi. Table 6-7. Saving Text Action Command :w :q! ZZ Quit vi and save the changes made in the original file. I Return I I Return I Quit vi without changing the original file. Update the file, but do not leave vi. When you leave vi you will be prompted by PAM to Press [Return] to continue ... Press I Return I and you will see the PAM screen again. Creating Text Files: The vi Editor 135 Additional Commands The commands described in this section are additional vi commands which give you some helpful editing features. Table 6-8. Additional Commands Action Command This command "picks up" (or yanks) a copy of the current line. You will not see any change in the screen. This command is used in conjunction or W command (described below). For more information with the see these commands. m nIT] This command "picks up" (or yanks) a copy of the n lines following the current line (n is a number you type). This command is also used in conjunction with the or W commands. See these command for more information. m This command is used after you use the IT] or nIT] command. You first use the IT] or nIT] command to "pick up" a copy of a line or lines. Then you use the cursor movement keys and move to another location in the file. When you press [Q], a copy of the line or lines you yanked is placed after the current line. This command sequence is helpful when you wish to move or copy parts of the text to another location in the file. This command can also be used with lines deleted with the dd command. This command is used after you use the IT] or nIT] command. You first use the IT] or nIT] command to "pick up" a copy of a line or lines. Then you use the cursor movement keys and move to another location in the file. When you press a copy of the line or lines you yanked is placed before the current line. This command sequence is helpful when you wish to move or copy parts of the text to another location in the file. This command can also be used with lines deleted with the dd command. m, You can use this command when you have made a mistake in the editor. This command will undo the last command you made. For example, if you made a replacement and you decided you did not need the replacement, you could press GQ, and the replacement will change back to the way it was before you executed the command. Pressing GQ again will "undo the undo," or reverse the command. You will be put back to the original mistake. If you are editing an entire line, and decide you do not want any of the corrections made, then press []] and the entire line will return to the way it was before you started editing the line even if you used more than one command to change the line. 136 Creating Text Files: The vi Editor Table 6-8. Additional Commands (Continued) Command Action o 0 The (dot) command is used to repeat the previous command. This is especially useful when you need to delete, replace, or search for a string. This command joins two lines together. It also provides you with the appropriate spacing when the lines are joined: one space for words, two spaces after. a ".". By pressing I CTRL 1 and holding it down, then pressing []], you update the message line at the bottom of the screen. It will tell you if the file has been modified since you entered vi, and what line you are presently on. Both upper- and lowercase G's can be used in this command. This command will clear and redraw the screen. This command is helpful if you are in vi and receive a message from another user. The screen will be changed, but the text will not be changed. To see the original text, use this command. : set nu I Return This command will automatically number the lines in the file. You will type the command on the bottom line of the screen. 1 : set nonumber I Return 1 This command will "turn off" the numbering of lines in the file. You will type the command on the bottom line of the screen. More Information About vi To find more about vi, you can look at Appendix B. This appendix lists all of the available vi commands with a short description. Windows and vi If you are using Windows, the vi commands and procedures are the same as not using Windows. The only difference is that vi is contained in the window from where you entered vi. If you are using the Windows version of PAM, there are some procedures you need to know. You enter the vi command in the command line and press I Return I. PAM then creates a brief icon, then restores the icon to a window named vi. You are then in the command mode of vi and proceed as normal. When you leave vi, the window does not disappear but rather stays selected. You cannot use this window for anything except a reference. Therefore, to continue you need to either: destroy the window, and the PAM window will become selected, or select the PAM window, leaving the vi window on the screen as a reference. Creating Text Files: The vi Editor 137 I Can't Get vi If you are having trouble entering vi you will have to check a few things. There are two possibilities why you are having trouble getting vi: the search path doesn't find vi, or vi is not loaded into the system. To find out which of these is the case, do the following: 1. Type: Is /usr/bin/vi into the command line. I Return I If you receive a response like: /usr/bin/vi then vi is loaded into the system and there is something wrong with your search path. If this is the case, then go to your system administrator and ask to have /usr /bin included in your search path. If you are the system administrator, see the "Using the System: PAM" chapter, "PAM's Environment File" and read about how to include /usr/bin in the search path for PAM. If you receive a response like: /usr/bin/vi not found then you need to load vi in to the system. This is a system administrator task, so you need to see the person responsible for system administration. If you are the system administrator, then go to Chapter 11, "Updating the AXE System" section. You will need to select ACMD as one of the file sets. 138 Creating Text Files: The vi Editor Table of Contents 7 Chapter 7: A New Way of Organizing Tasks HP Windows 9000 Who Can Use Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Overview of Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Multitasking. . . . Why Use Windows? ........................................... Types of Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Detailed Windows Commands ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Important Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Window Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Selected Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Moving the Pointer ............................................ The Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using the Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Graphics Tablet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Keyboard Commands .......................................... The Pop-Up Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Windows and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Window Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a New Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Destroying a Window or Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Moving a Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Changing the Size of a Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Selecting Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Bringing a Window to the Top of the Stack . . . . . . . . . . . . . . . . . . . . . . . . .. Putting a Window on the Bottom of the Stack . . . . . . . . . . . . . . . . . . . . . . .. Icon Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Repainting the Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Pausing Window Output ........................................ Scrolling Information in a Window ............................... " The Save Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Cases .................................................... Entering Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Leaving Windows ............................................. 140 140 141 142 142 142 142 143 143 144 144 144 145 145 145 146 147 148 149 150 150 151 152 154 156 157 158 158 161 161 162 164 165 165 166 WINDOWS QUICK REFERENCE CARD CONTROLLING THE WINDOWS POINTER SHAPES D -when outside of all windows . • Move pOinter to control box . • Press select button (left button on mouse and puck; press down on stylus). +- when in a function zone. ~ - when in the user area or pop-up menu. WINDOW OPERATIONS CHANGE A WINDOW TO AN ICON MOVE A WINDOW • With pOinter over ICON box; press sele!ct button. ICON appears (see right). • With pointer over MOVE box, press select button. • Move dotted rectangle with pointer device to desired location; press select button. SCROLL UP SYSTEM PROMPT SELECTION INDICATOR USER AREA Lines in border indicate this window is selected; you can use the keyboard to type in this window. POINTER SCROLL DOWN PAUSING WINDOW OUTPUT • With pOinter over PAUSE box; press select button. Output is paused. CHANGING THE SIZE OF A WINDOW RESTORING WINDOW OUTPUT • With pOinter over PAUSE box; press select button again. • With pointer over a SCROLL ARROW; press select button. • With pOinter over the SIZE box; press select button. • Move dotted rectangle with pointer device to desired size; press select button. USING THE POP-UP MENU BRINGING UP A POP-UP MENU D • Move pOinter to area in border outside of any boxes; press ______ select button. • To bring up a pop-up menu for the selected window, move pOinter to a clear area of the screen; press select button. THE POP-UP MENU WINDOW/ICON NAME Highlighted items will be _ _ activated if select button is pressed. MOVE A WINDOW/ICON TO ANOTHER SCREEN LOCATION CHANGE A WINDOW TO AN ICON KILL ALL PROCESSES AND REMOVE A WINDOW FROM THE SCREEN REDRAW THE SCREEN ~--CHANGE THE SIZE OF A WINDOW !----SAVE THIS WINDOW ! - - - - LEAVE THE WINDOW SYSTEM, KILL ALL WINDOW PROCESSES CREATE ANOTHER WINDOW SELECT A WINDOW A selected window allows you to type in that window and access the window's operating system. Indicates this window is selected. • Move pointer to user area; press select button. Window is brought to top of stack. = • Move pOinter to border of any window and use pop-up menu to select the window. The window stays in its location. I I • Press SH I FT I-C§EECT to shuffle windows: bringing window an bottom of stack to the top, and selecting it. Lines in border indicate this window is selected. ICON OPERATIONS MOVE AN ICON RESTORE AN ICON TO A WINDOW • With pointer over Icon MOVE box; press select button. • Move dotted rectangle to desired location; press select button. • With pointer over RESTORE box; press select button. Window re-appears . ICON NAME A New Way of Organizing Tasks HP Windows/9000 A New Way of Organizing Tasks HP Windows/9000 7 139 Who Can Use Windows If you purchased the necessary memory to run HP Windows/9000 (recommended 2 megabytes) you will have configured your system during installation to run Windows; this means you loaded the AWINDOWS and ASTARBAS file sets. The default configuration (if you did not specifically request your own configuration) runs Windows automatically after you turn on the system and login (if you have a secure system). Therefore, your screen, in the default configuration, would show the Windows screen with a PAM window (for details on PAM, see Chapter 4). Overview of Windows Most of us are familiar with the picture of a desk scattered with papers. Some papers may be memos, others reference materials, and others current projects. As you place these papers on the desk, the most current are placed on top of others. During the course of the work day, papers are shuffled, bringing some on the bottom of the stack to the top. You may even work on several papers at the same time, performing several tasks. In the computer realm, a terminal performs a task. A terminal can be thought of as a single screen on which you execute tasks. The window concept takes a different approach, providing you with a visual method of performing multiple tasks. Like the papers in our desk top analogy, you can better monitor the progress of tasks by using windows . 140 A New Way of Organizing Tasks HP Windows/9000 Windows You probably noticed the name HP Windows/9000 and may have wondered what papers on a desk have to do with windows (aside from throwing the papers out of windows). A window can be thought of as a piece of paper in our analogy of the desk top. Windows produces a graphic representation of a window and allows you to graphically place windows on the screen in the same manner you would place papers on a desk (see Figure 7-1). Sep Aug Aug Aug Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Aug Sep Sep Sep Sep Aug 24 12 29 28 24 23 29 19 19 29 1 1 1 I 23 24 13 23 I 24 23 I I 1985 18: 59 98: 31 16: 48 1985 23:92 23: 25 13:56 13: 22 20: 97 Ie: 19 19: 19 16: 12 18: 52 23: 02 1985 29: 23: 18: 1 23: 12: 17: gUJlndow2 gwrl te gzoom i nvert_bc ldump life magdump sample sample_wi scr scr_greed scr _gwri ,,~"'c" __ u~; screens set icon stu . II It ,., • ., ~ I I t' Meet i ng at 9: geam, Room 348 THE DESK TOP OF DESKTOP COMPUTERS Figure 7-1. An example of window placement Looking at figure 7-1, you see how windows can be organized like papers on a desk top, but what specifically is a window? A window can be thought of as a terminal in which you perform a task. You can execute commands and run programs in each window. You interact with the computer within the borders of the window, and the window can be thought of as a complete unit. It is like having several terminals on the same screen. A New Way of Organizing Tasks HP Windows/9000 141 Multitasking By organizing the papers on your desk, you can work on several tasks at once, maybe using one as a current task and another as a reference. Performing several tasks at once on a computer is called multitasking. Multitasking with one terminal, you must run background processes (processes that are running but you cannot visually monitor). Windows allows you to display more than one task on the screen so you can monitor each task at the same time; each task executing in its own window and capable of interacting with other windows. Why Use Windows? As mentioned above, Windows provides a break from the traditional user/computer interface. Traditionally, you would interact with a single terminal, entering commands to perform one task at a time at that terminal. When multitasking is used without windows, you must specify foreground and background processes and may see only one task at a time (the foreground task). Using windows, you are can visually separate tasks on the computer screen and observe output. The confusion of running multiple tasks from one terminal is reduced. Another advantage of Windows is the ability to organize your tasks in the same manner you do with paper. The graphic representation helps you remember a task that has been put aside for the moment. You can move windows around the screen, change their size, stack them like sheets of paper, and many other helpful organizing operations. Types of Windows Two types of windows are supported by Windows: terminal and graphics windows. A terminal window performs as a normal display which allows you to generate information. Applications programs using graphics execute in graphics windows. This chapter is primarily concerned with terminal windows. Detailed Windows Commands You can enter commands from the keyboard. These commands are included with the system if you wish to learn and use Windows in greater detail. A list of these commands is available in Appendix C. 142 A New Way of Organizing Tasks HP Windows/9000 Important Concepts Before we discuss specific operations, let us first cover some essential concepts of windows. Window Details Looking at a window (see Figure 7-2), you can see two main areas: the border area, and the user area. MOVE BOX\ WINDOW NAME I / PAUSE BOX BORDER AREA USER AREA SCROLL ARROW Figure 7-2. Window areas POINTER "'" SIZE BOX The user area is reserved for information that you type on the keyboard. The border area extends around the user area (with a thin left border). Within the border are the window's name, symbols representing the status of the window, and areas that allow you to control the window and its relation to other windows. The operations that let you control window organization (control boxes) are covered in the "Window Operations" section and on the "Quick Guide to HP Windows/9000" card. A New Way of Organizing Tasks HP Windows/9000 143 In the upper border (to the left) you see the name of the window, in our case wconso/e. The asterisk (*) in front of the window name, and the presence of a line extending through the middle of the entire border indicates that this window is the selected window. The area on the screen outside of any window or icon (see "Icon Operations") is called the clear area. Selected Window Windows allows you to go from one window to the next and perform operations. The keyboard is associated with one window at a time, therefore it is important to know which window is currently being used. A selected window responds to the keyboard. You can tell which window is selected by looking for an asterisk in front of the window name and a line in the border (see Figure 7-2). Windows without a line in the border or the asterisk in front of the window name will not respond to the keyboard until that window is selected. The Stack As you accumulate more than one window on the display screen, they may become overlapped. When windows are piled in this manner, they are in a stack. Even when the windows are not specifically overlapped, the computer orders the windows in such a way that when you shuffle windows (see "Shuffling Windows"), the selected window moves through the computer defined stack. The Pointer When the window system is running, there is a pointer that you can move about the screen by using a device such as a keyboard, a Mouse, or a graphics tablet (these devices will be described in more detail later). The pointer indicates the current screen location. The pointer is not the same as a cursor. A cursor is present on a terminal and thus on a terminal Window (see Figure 7-2). You can have the operating system running in a window and thus have a cursor in that window. Remember that the cursor is confined to a window, and the pointer is not. As the pointer moves on the screen, it changes shape for different areas. D + ~ POINTER SHAPE OUTSIDE OF WINDOWS POINTER SHAPE IN FUNCTION POINTER SHAPE IN USER AREA ZONE OR Figure 7-3. Pointer shapes 144 A New Way of Organizing Tasks HP Windows/9000 POP-UP MENU Moving the Pointer The window system accepts instructions from various devices. While it is possible to use a keyboard to interact with Windows, a graphic input device (such as a Mouse or graphics tablet) is much more effective. These devices allow fast and easy interaction with the window system. The Mouse The Mouse is a convenient device to use with Windows (see Figure 7-4). It is logically connected to the pointer. To use the Mouse, place the palm of your hand over the hump on the Mouse, resting your fingers on the two buttons near the connector cord. By moving the Mouse on a table, you control the movement of the pointer. The pointer responds to every physical movement of the Mouse on the table. SELECT BUTTON Figure 7-4. The Mouse Using the Mouse The pointer can be moved to any location on the screen by moving the Mouse over a flat surface, such as a desk top. The left button on the Mouse (as you face the cord, see Figure 7-4) is the "select button." The other button on the Mouse is not used by Windows. You can perform various window operations by moving the pointer to appropriate locations inside the window border (see window operation descriptions) or to select items from a "pop-up" menu. For example, the box in the upper left corner of the border on a window represents the move operation. By moving the pointer to that area and pressing the select button, the move operation is activated. You can select a window in a similar manner (see window operation descriptions). A New Way of Organizing Tasks HP Windows/9000 145 Graphics Tablet The graphics tablet is also used as an interactive device for the windows system. You can use a puck (flat device with selection buttons) or a stylus (pen device) with the graphics tablet; see Figures 7-5 and 7-6. The graphics stylus or puck moves the pointer on the screen, as does the Mouse. The Mouse is moved on a table, and the pointer moves when the Mouse is moved. The stylus and puck are moved on a graphics tablet. The tablet area corresponds to the screen area; so when you pick up the stylus or puck and move it to another area of the tablet, the pointer moves to a corresponding location on the screen. Picking the Mouse off the table and moving it to another area would not move the pointer; the pointer only moves when the Mouse moves. SELECT BUTTON Figures 7-5, 7-6. The Puck Switch and the Graphics Stylus You hold the puck with the cord facing you (opposite to the mouse). The "select button" on the puck is the leftmost button facing the cross-hairs, and the same as pressing down on the stylus. Keyboard If you have neither the Mouse nor the graphics tablet, you can still take advantage of Windows. Using the keyboard you can move the pointer and perform the same operations as with the Mouse. The next section describes the keyboard commands for Windows. 146 A New Way of Organizing Tasks HP Windows/9000 Keyboard Commands The following commands are used to move the pointer and select operations in Windows. If two keys are shown, you must press the first key and hold it down, then press the second key. Hold the keys down to keep the pointer moving. Releasing the keys stops the pointer movement. NOTE If you fail to press the I CTRL I key along with the arrow keys, the pointer will not move. Instead, the cursor within the selected window will move. Table 7-1. Keyboard Commands Key Operation ICTRLG Moves the pointer left. ICTRLG Moves the pointer right. I CTRL ~[TI Moves the pointer up. I CTRL ~[!] Moves the pointer down. I Select I I Shift HSelect I I Reset I Selects the choice indicated by the pointer. Shuffle selection of windows on the display screen. Stops execution of a process. ~ Pauses window output (switches between pausing output and resuming output). I Menu I or I System I or I Shift HUser I Turns the system menu on or off. A New Way of Organizing Tasks HP Windows/9000 147 The Pop-Up Menu Most operations in the window system can be performed by moving the pointer and pressing the select button. However, you may not always be able to access the correct part of a window. For example, if a window is covered by another window, you need another way to operate on the covered window. Also, you need other commands such as "create a window" or "exit the system." To solve these problems, use the pop-up menu. To activate the window system's pop-up menu (see Figure 7-7) move the pointer outside any window (not a part of any window) or to the border of a window, and press the select button. Make sure the pointer does not cover any of the control boxes. If the pointer is in a clear area (outside of any window), the pop-up menu is displayed for the selected window (items will operate on the selected window). If the pointer is in the border of a window (not necessarily the selected window), the pop-up menu will operate on that window. Figure 7 -7. A pop-up menu Using the Pop-Up Menu Once the pop-up menu is activated, you will see the menu and a new pointer shape (see Figure 7-7). The menu contains a list of items available to you. To select the item, move the pointer to the item. It will highlight the area around the item (see Figure 7-8). Pressing the select button will activate the highlighted item. 148 A New Way of Organizing Tasks HP Windows/9000 Figure 7-8. Selecting an item in a pop-up menu You can only access items that highlight as the pointer passes over that item. To leave the pop-up menu, you can do one of the following: • Move the pointer in a quick motion out of the menu area. • Press any button other than the select button • Move the pointer to the pop-up menu title or item that does not highlight and press the select button. You will hear a beep to indicate leaving the pop-up menu. Windows and Applications If you purchase an application which uses Windows, you need to know the difference between Window Smart and Window Dumb applications. A Window Smart program will automatically use Windows (in other words you only have to start the program and it will start Windows). A Window Dumb application does not know how to start Windows. You must be in Windows, create a window and then run the application in the created window. A New Way of Organizing Tasks HP Windows/9000 149 Window Operations This section describes window operations. The descriptions avoid specific references to devices (such as graphics tablet or keyboard) by using statements like "moving the pointer." Therefore you will be able to learn the operations by observing action on the screen. IMPORTANT You should have read at least the "Important Concepts" section in the beginning of this chapter before continuing with the operation descriptions. Creating a New Window When a new window is created, it appears in its largest form. You can change the size with the Size option to suit your needs. The new window becomes the selected window (note the border lines and the asterisk before the window name). Action 1. Bring up a pop-up menu (see "The Pop-Up Menu"). 2. Highlight Create Window. 3. Press the select button to activate the Create Window operation. 4. After a short time, a new Window will appear on the screen. Things That Can Go Wrong If you are having trouble staying in the pop-up menu, try to use slower motions. If you select the wrong item in the pop-up menu (such as Repaint) you will have to bring up the menu again. 150 A New Way of Organizing Tasks HP Windows/9000 Destroying a Window or Icon The window or icon is removed from the screen and is not retrievable. Make sure you really wish to destroy a window or an icon before you execute this item. All processes in the destroyed window (or icon) are killed. If you destroy the selected window, the window on the top of the stack (if there are windows stacked on top of each other) becomes the selected window. Action 1. Bring up a pop-up menu from the desired window (see "The Pop-Up Menu"). Check the name at the top of the pop-up menu with the name of the window you want destroyed. If the names are not the same, you have selected the wrong window; exit the pop-up menu and try again. 2. Highlight Destroy. 3. Press the select button to activate the Destroy item. The window will disappear from the screen. Things That Can Go Wrong If you destroy a window you wish to keep, you cannot retrieve the window. Therefore, be careful when selecting the correct pop-up menu. Remember at any time in a pop-up menu, you can leave the menu by moving the pointer in a qUick motion out of the menu area or by pressing a button other than the select button. If you aCcidentally destroy all windows on the screen, you will be able to access a System Menu pop-up menu. This menu has only three items that are available: Exit WS, Repaint, and Create Window. Therefore you can either leave the system (see Exit operation description), or create a new window (see Create Window operation description). You will not, however, be able to retrieve the destroyed windows. A New Way of Organizing Tasks HP Windows/9000 151 Moving a Window The window can be moved anywhere on the screen and can be moved partially off the screen. Action 1. Move the pointer to the upper left box in a window border. The pointer changes to cross-hairs. Make sure the pointer is in the box with the double slanting arrow (see Figure 7-9). MOVE BOX Figure 7-9. Move box 2. Press the select button to activate the Move operation. 152 A New Way of Organizing Tasks HP Windows/9000 3. A dotted rectangle will appear, surrounding the user area. Move the pointer device to move the dotted rectangle. Figure 7-10. The Move Rectangle 4. Move the dotted rectangle to a desired location on the screen. Press the select button when you have reached the location. The window will move to the new area. Note the dotted rectangle represents the user area, and you should compensate for the border (if you get close to the screen edge). If the Move box (the box with the double arrow) is unavailable, you may wish to use the pop-up menu for the Move operation. Reference the section on pop-up menus earlier in this chapter and follow these steps: 1. Bring up a pop-up menu for the desired window (see "The Pop-Up Menu"). 2. Highlight Move. 3. Press the select button and follow steps 2 through 4, of the previous Action section. A New Way of Organizing Tasks HP Windows/9000 153 Things That Can Go Wrong If you experience some trouble during this operation, the pointer is probably centered in the wrong area. If you are trying to select the Move box (the double arrow) and get no response, you are probably outside of the box. Look at the shape of the pointer; it should be in the shape of a cross. Also make sure that you are not in the area of the border with the window name. If you are having trouble staying in the pop-up menu, try to use slower motions. Recall that to leave the pop-up menu, you move the pointer with a quick motion outside of the menu area. If you select the wrong item in the pop-up menu (such as Size) try to not move the pointer, and press the select button to leave that command mode. Changing the Size of a Window You can change the size of a window by enlarging or shrinking the window to suit your needs. The largest a window can be is the size it was when you created the window. There is also a minimum size for a window. You can find these sizes by experimenting with this operation. Windows allows you to change the size of a window from its size when created to a smaller size if desired. What happens if you have information filling a larger window, and you decide to shrink the size of the window? The information is not lost. The information remains the same size (pictorially), only the viewing area gets smaller. You will see later that it is possible to scroll the information in the viewing area of a terminal window up, down, left, and right to view the information in this smaller window (scroll arrows). Action 1. Move the pointer to the box in the lower right corner of the border (see Figure 7-11). SIZE BOX Figure 7-11. Size box 2. Press the select button to activate the Size operation. As in the Move operation, a dotted rectangle appears around the user area of the chosen window. If the window is partially off screen, the allowable range is only the user area on the screen (the dotted rectangle does not disappear off the screen). 154 A New Way of Organizing Tasks HP Windows/9000 Figure 7-12. The Size Rectangle 3. Move the pointer device to change the shape of the dotted rectangle. Moving up and down will cause the rectangle to shorten and lengthen in height; moving left and right causes the rectangle to shrink and expand in width. 4. When you have a desired window size, press the select button. The window will change size. If you wish to use the pop-up menu: 1. Bring up a pop-up menu for the desired window (see "The Pop-Up Menu"). 2. Highlight Size. 3. Press the select button to execute the Size operation. 4. Follow steps 3 & 4, of the previous Action section. Things That Can Go Wrong If you experience some trouble during this operation, the pointer is probably centered in the wrong area. If you are trying to select the Size area (in Figure 7-11) and get no response, you are probably outside of the area. Look at the shape of the pointer; it should be in the shape of a cross. If you are having trouble staying in the pop-up menu, try to use slower motions. If you select the wrong item in the pop-up menu (such as Move) try to not move the pointer. Just press the select button to leave that command mode. A New Way of Organizing Tasks HP Windows/9000 155 Selecting Windows If you have windows overlapping, you may wish to select a window that is not on top. There are several options: bring it to the top and make it the selected window, select it in its current location or shuffle windows. By selecting a window, you can interact with that window; see "Selected Window" section. NOTE It is possible to select an icon. In this case the icon name is preceeded by an asterisk. Anything typed while the icon is selected cannot be seen unless the icon is restored to its original window size. Actions Selecting a Window and Bringing it to the Top If you have windows that are overlapping and you select a window underneath another window or windows, this method of selection automatically brings the entire window to the top of the stack of windows. 1. To select a new window, move the pointer to the user area of the window you wish to be selected (look at the borders to make sure it is not selected; they should not have a line). 2. Press the select button. The window becomes the selected window and moves to the top of the stack. Selecting a Window in Place If you wish to select a window under another window or windows, this method keeps the selected window in place. 1. Bring up a pop-up menu for the desired window (see "The Pop-Up Menu"). 2. Highlight Select. 3. Press the select button to activate the Select operation. The window is now the selected window (note the lines in the border). 156 A New Way of Organizing Tasks HP Windows/9000 Shuffling Windows Shuffling windows brings the window on the bottom of the stack to the top and selects that window. 1. Press I Shift HSelect I on the keyboard. The window on the bottom of the stack becomes the selected window. Things That Can Go Wrong If you do not position the pointer in the user area when selecting a window, you may activate the wrong operation or a pop-up menu. Remember that the pointer is in the shape of an arrow while in the user area. You may inadvertently select the wrong window. In this case move the pointer to the correct window and press the select button. If you do everything correctly and nothing happens, you may have selected a window which is already selected. If you use a pop-up menu, make sure the Select item is highlighted. If your pointer is over the window name, nothing will happen. If the Select item is faded, you have chosen a window already selected. Bringing a Window to the Top of the Stack This operation can be used when you have several overlapping windows. You can go to the window you wish to be on top (selected or not) and use the pop-up menu to bring the window to the top of the stack. Action 1. Bring up a pop-up menu for the desired window (see "The Pop-Up Menu"). 2. Highlight Top. 3. Press the select button. The window will move to the top of the stack. Note the window need not be selected to move it to the top. Things That Can Go Wrong If you aCcidentally select a pop-up menu for the wrong window, leave the menu by qUickly moving the pointer out of the menu. If Top does not highlight as you pass the pointer over the item, it means you have selected a window which is not under another window. A New Way of Organizing Tasks HP Windows/9000 157 Putting a Window on the Bottom of the Stack This operation is useful when you have several overlapping windows. Use the pop-up menu to take a window to the bottom of the stack. Action 1. Bring up a pop-up menu for the desired window (see "The Pop-Up Menu"). 2. Highlight Bottom. 3. Press the select button. The window will move to the bottom of the stack. Note the window need not be selected to move it to the bottom. Things That Can Go Wrong If you aCcidentally select a pop-up menu for the wrong menu, then leave the menu by quickly moving the pointer out of the area. If Bottom does not highlight as you pass the pointer over it, there is no window under the selected window. Icon Operations In Windows, an icon is a small representation of a window. As an analogy, let us return to our desk top. If your desk is getting full of papers, but all papers are important, you may wish to fold some up and place them in the corner of the desk. You therefore eliminate some of the clutter and make room for the more vital papers (yet you still have a visual reminder of the folded paper). You can do something like folding papers in Windows: change the window into an icon and place it out of the way. Figure 7-13 shows a typical terminal icon. Figure 7-14 shows a picture of a typical graphics icon. When you use this operation, you clear the window off the screen, and the icon is placed out of your way. It is still there as a visual reference so you do not forget it is an important window. Figures 7-13, 7-14. Terminal icon and Graphics icon The icon location and window location are independent of each other. 158 A New Way of Organizing Tasks HP Windows/9000 Action Creating the Icon 1. Move the pointer to the upper right corner box (see Figure 7-15). iCON BOX Figure 7-15. Icon box 2. Press the select button to activate the Icon operation. The window will disappear from the screen, and an icon (Figure 7-13) will appear on the lower left portion of the screen. The icon will display the name of the window. If the icon covers part of another window, it will not interfere with the performance of that window. If you wish to use the pop-up menu, follow these steps: 1. Bring up a pop-up menu for the desired window (see "The Pop-Up Menu"). 2. Highlight Icon. 3. Press the select button to activate the Icon operation. Moving the Icon 1. Move the pointer to the lower left corner of the icon. Here you see a small box containing a double arrow (the same as in the Move operation). Center the pointer over this area. The pointer will change to cross hairs. 2. Press the select button. A small dotted rectangle will appear around the icon. 3. Move the pointer device and move the rectangle to a desired location. 4. Press the select button. The icon moves to the new location. A New Way of Organizing Tasks HP Windows/9000 159 Restoring a Window From an Icon 1. Move the pointer to the lower right corner of the icon to the area containing the filled square (see Figure 7-15). 2. Press the select button. The original window is restored. Moving and Restoring a Window From an Icon The pop-up menu contains items to move and restore the window to its normal size and location. To use the icon's pop-up menu, follow these steps: 1. Make sure that the pointer is covering some portion of the icon other than the control boxes. 2. Press the select button to bring up the icon pop-up menu. Compare the name of the pop-up menu with the name of the icon. Make sure these names are the same. 3. If you wish to move the icon, highlight Move. If you wish to restore the icon to the normal window size, highlight Normal. 4. Press the select button. If you selected the Move operation, move the dotted rectangle to a desired location and press the select button. Things That Can Go Wrong If you experience some trouble during this operation, the pointer is probably centered in the wrong area. If you are trying to select the restore area and get a pop-up menu, you need to be accurate with the pointer. Always compare the name of the pop-up menu with the icon name. If the names differ, leave the pop-up menu and try again. If you are having trouble staying in the pop-up menu, try to use slower motions. If you select the wrong item in the pop-up menu (such as Size) try to not move the pointer. Just press the select button to leave that command mode. Be careful not to accidentally execute the Destroy item. This will erase the window or icon, and you will have to create another window. 160 A New Way of Organizing Tasks HP Windows/9000 Repainting the Screen At some point you may be running an program that prints outside of or over a window. The Repaint operation redraws the screen and restores the original window format. This operation does not guarantee to fix all damage done to either type of window. Graphics windows, for example, may only repaint the borders. Action 1. Bring up a pop-up menu (see "The Pop-Up Menu"). 2. Highlight Repaint. 3. Press the select button to execute the Repaint item. The screen will be repainted. Things That Can Go Wrong You may try the Repaint item and notice that nothing changed. You probably have nothing to repaint. If you do not change the screen format (over the windows, for example), repaint duplicates the window format (since it is already in correct format). Pausing Window Output This operation allows you to halt and restart output in a terminal window. For example you may have window output (resulting from a command or program) which is scrolling too fast to read. You can stop the scrolling with this operation and restart it when ready. Action 1. Move the pointer to the lower left corner of the desired window (see Figure 7-16). PAUSE BOX Figure 7-16. Pause box 2. When you wish to pause the window output, press the select button. Note the area in the shape of a stop sign is highlighted. This tells you that the Pause operation is activated. 3. To restart the output, press the select button again. The area in the shape of a stop sign will return to its original form. A New Way of Organizing Tasks HP Windows/9000 161 Using the Keyboard 1. Press ~ to pause window output. 2. To restart output, press ~ again. Things That Can Go Wrong If you experience some trouble during this operation, the pointer is probably centered in the wrong area. If you are trying to select the Pause box and get no response, you are probably outside of the box. Look at the shape of the pointer; it should be in the shape of a cross. Also make sure that you are not in the user area. Scrolling Information in a Window This operation allows you to scroll the information in the user area of a window. You can scroll up, down, right, and left. This operation is especially useful for small windows. You can visualize the process by thinking of a window moving over a large area of information. Figure 7-17 shows an analogy of scrolling information. ~~ ~ I~~ ~~~ ~~ ~~ ~ ~~~- ~~~. IQ]I+- -+IIQ] Figure 7-17. Scrolling Analogy Inside the right and lower border of a window you will see small arrows near the control boxes (see Figure 7-18). The scroll arrows scroll the screen in the indicated directions. 162 A New Way of Organizing Tasks HP Windows/9000 • ROLL UP lUconsole SCROLL ARROWS SCROLL DOWN SCROLL LEFT Figure 7-18. Scroll Arrows Action 1. Move the pointer to cover a scroll arrow in the border (see Figure 7-18). 2. Press the select button. The information is scrolled by one character. If you wish to scroll rapidly, press I Select I and hold it down. Things That Can Go Wrong If the information does not move, it could be due to not having the pointer correctly over a scroll arrow. Also, the information will not scroll if it has reached the limit of two screens vertically, or the margins (left or right). If a pop-up menu appears, your pointer is not correctly over a scroll arrow. A New Way of Organizing Tasks HP Windows/9000 163 The Save Option You have the option to save or not save a window. If you have an application running in one or several windows there are two options that can occur when the application has stopped: the windows created can either stay on the screen or they can be automatically destroyed. Using the save option keeps the windows on the screen when all processes of that application are terminated. You can have windows which are not saved. By doing this you can destroy the window automatically by stopping all processes. In most cases the windows you create will perform as terminals. By pressing ~ you terminate all processes (from a shell or system prompt). If the window is not saved, pressing ~ will stop all processes, and destroy the window. The window will not be destroyed after command is processed (for example, listing the current directory), only when all processes are stopped (the operating system or shell, and PAM are considered processes). When you create windows using the pop-up menu, you create windows which are not saved. To change this you should use the Save item in the pop-up menu for this particular window. Therefore, if you create windows using the pop-up window, your only option is to turn on the save option. The entry in the pop-up menu for this window will now be inaccessible. Once you have saved a Window, it stays saved. Action 1. If you wish to turn on the Save option in the selected window, bring up a pop-up menu in the clear area (see "The Pop-Up Menu"). If you wish to turn on the Save option in a window which is not selected, bring up a pop-up menu for the desired window. 2. Highlight Save. 3. Press the select button to turn on the Save item. This window is now saved. Things That Can Go Wrong If you choose to use the Save option, you must be aware that turning on the save option is permanent for that window. Make sure you do not highlight another item when you press the select button in the pop-up menu. If the save item is not highlighted when you move the pointer over the item area, the save option is already turned on for this window. 164 A New Way of Organizing Tasks HP Windows/9000 Special Cases If your system is configured as a secure system (you have to login before you begin operations) you may not automatically see the Windows version of PAM when you login. If this is the case, your system may be configured for using a different shell (see "More Details of AXE, " Chapter 8). If you are in a shell other than PAM, you can run Windows (providing you system is configured for Windows) by following these commands (the reference to system prompt is the shell prompt the computer uses to notify you that it is ready for another process. Entering Windows To start Windows, be sure you see a system prompt (usually $). Enter the following command (in lower case): wmstart I Return I A window named wconsole will appear. From this window, you can begin operations in Windows. Figure 7-19. The wconsole Window A New Way of Organizing Tasks HP Windows/9000 165 Leaving Windows This operation will leave Windows, clear the screen, and provide you with a system prompt. All processes will be killed, so make sure you are ready to leave Windows before you proceed with this operation. (If your system is configured to run PAM in Windows, this command will only clear the screen and a new PAM window will be created.) Action 1. Bring up a pop-up menu (see "The Pop-Up Menu"). 2. Highlight Exit WS. 3. Press the select button to execute the Exit WS item. A small pop-up menu will appear asking you if you wish to leave the system (see Figure 7-20). Figure 7-20. Exit system menu 4. Move the pointer to Yes. The area around Yes will be highlighted. 5. Press the select button to leave Windows. Things That Can Go Wrong If you accidentally activate the Exit WS item from a pop-up menu, you can easily cancel the action with one of two methods. First you can choose No and return to Windows. Second, you could move the pointer with a quick motion out of the small pop-up menu area and return to Windows. If you have trouble staying in the pop-up menu, try slower movements of the pointer. 166 A New Way of Organizing Tasks HP Windows/9000 Table of Contents 8 Chapter 8: More Details of AXE The AXE Structure .............................................. " The Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Shell ................................................... Other Shells ..................................................... BUilding on AXE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Where To Get More Information .................................. 167 168 169 169 169 170 171 8 More Details of AXE The AXE you see and interact with on the screen is only part of a whole. The preceeding chapters showed you how to use AXE; this chapter will describe AXE in greater detail, on a conceptual level. The AXE Structure Before we discuss the AXE structure, let us divert for a moment and talk about the way humans react when interpreting the phrase, "Hand me the book." On one level, we hear the phrase, "Hand me the book." Our brain, through channels connected to the hearing process (given they function), interprets the phrase. Messages are then sent to the arm and hand to pick up the book and hand it to the person requesting it. Looking at a computer system, you can see similar levels of interaction. When you type in the keyboard, you are opening a channel to the computer like the ears hearing the phrase, "Hand me the book." On one level, the computer interprets the keyboard interaction and sends messages to another level, similar to the brain sending messages to the arm and hands. On the lowest level, the hardware, the task is completed whether it is handing a book or performing a computer function. AXE has several levels of interaction: the shell, the file system or utilities, and the kernel. These levels are shown in Figure 8-1, where the arrows between the levels represent interaction. More Details of AXE 167 USER HARDWARE Figure 8-1. The AXE Structure The top level represents the user (you) interacting via the keyboard or some other interactive device. The bottom level represents the actual hardware of the system. The levels in-between are described in the sections below. The Kernel Starting from bottom up, you can see the kernel directly interacting with the hardware. The kernel is the level which manages the resources of the computer system. It keeps track of and interacts with all the devices such as discs, printers, communication, and memory. 168 More Details of AXE Utilities The next level from the kernel is the utility or file system level. AXE has many utilities, all stored in files. These files contain the instructions that tell the kernel what to do. An example of a utility is a sorting function. When a file is to be sorted, the utility instructs the kernel how to sort the file. The kernel then instructs the hardware to physically perform the sort. The utility level contains all of the files the system uses. The Shell The top level of AXE is the shell. The shell is a command interpreter. It receives information from you (when you type commands, for example) and works as a supervisor, translating your requests into actions through the utility and kernel levels. The shell is what you see on the screen. The AXE default configuration (if you do not change the system when configuring or reconfiguring the system) is the PAM shell. PAM is described in detail in Chapter 4, "Using the System: PAM." There are several other kinds of shells available to you which will be described in the sections below. Other Shells AXE has several shells available for your use other than the PAM shell (the shell present if you do not specifically say otherwise when configuring the system). These are the "C" shell (/bin/csh, located in the SYS_TOOLS file set), Bourne shell (/bin/sh), and the Restricted Bourne shell (/bin/rsh). A shell allows you to execute HP-UX commands (a list of commands available to you is in Appendix A). These commands can be used, but due to their detailed nature, they will not be discussed in this manual. The use of detailed HP-UX commands are catered to the needs of a programmer. Information about the shells and detailed commands are present in the "Programming Environment" package which can run "on top of" AXE (an addition to the system; see the next section, "Building on AXE"). More Details of AXE 169 Building on AXE AXE is only a subset of a large system available to you. HP-UX gives you flexibility with how much detail you need for your particular application. AXE offers a basic system for users who need only basic commands to run applications. The user who wishes to write programs would need more than AXE. Figure 8-2 shows a diagram with the available additions that can be made to AXE. Figure 8-2. HP-UX Structure The AXE is at the innermost level, providing PAM, administration tools, the vi editor, Windows, and other utilities. The next level is the Programming Environment (PE). This level includes UNIX! operating utilities and libraries, communications packages, a "e" language compiler, programming control of Windows, and other enhancements to AXE. The outermost level shows additional languages that can be placed on the system: FORTRAN 77, Pascal, and DGL/ AGP, a set of graphics tools to enable advanced graphics. 1 UNIX@ is a trademark of AT&T Bell Laboratories, Inc. 170 More Details of AXE Where To Get More Information There are several books on the market that give detailed information about UNIX. HP-UX is an enhanced version of UNIX, so the information gained by these books is applicable to your system. Also, if you upgrade your system to include the Programming Environment, you will receive detailed documentation about shells, commands, and other HP-UX information. More Details of AXE 171 Notes 172 More Details of AXE System Administrator's Guide for AXE Chapter 9: Caring for Your AXE System Periodic Checks .................................................. , Important Files ................................................... Backing up and Restoring the File System .............................. , Checking Your File System ......................................... , Managing Disc Space .............................................. , 173 175 176 188 192 Chapter 10: AXE System Administration Adding and Removing Users ........................................ , Adding to the Checklist File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Becoming the Root User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Booting AXE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a New File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a New Operating System .................................... , Creating a Recovery System ......................................... Initializing Media ................................................. , Mounting and Unmounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... , Reconfiguring Swap Space and System Parameters. . . . . . . . . . . . . . . . . . . . . . . .. Removing Optional Products or Filesets ................................ , Setting the System Clock. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. , Setting Up and Removing A Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up and Removing A Remote Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . ., Setting Up Mass Storage Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up Plotters and Digitizers ..................................... , Shutting Down the System .......................................... , Updating AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up Peripheral Devices: General Information ....................... , 196 200 202 203 209 210 216 223 224 229 239 240 242 247 251 255 257 259 274 Table of Contents 9 Chapter 9: Caring for Your AXE System Periodic Checks .................................................. , Important Files ......... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., Backing up and Restoring the File System . . . . . . . . . . . . . . . . . . . . . . . . . . .... , Backup Strategies and Trade-offs ................................. , Backing Up the System . . . . . . . . . . . . . . . . . . . . . . . . . ............... , Restoring the System .......................................... , Special Considerations ......................................... , Checking Your File System ......................................... , preen option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. yes or no option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., For More Information ............. ,",,"...................... Managing Disc Space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............. , Determining Available Disc Space ................................. Using the find Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Logging Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........... , 173 175 176 176 178 185 187 188 189 190 191 192 192 193 194 Caring for Your AXE System 9 You have invested time and money into your AXE opeiating system. You must take care of your system so it continues to perform correctly. This chapter provides gUidelines and procedures to care for your AXE system. Periodic Checks It is very important that you follow the suggested procedures for taking care of your AXE system. If you do not follow the suggested procedures, you could lose files, corrupt your file system, or run out of disc space. After you install your AXE system: • create a recovery system, • create a password for the user. "root" (if you have a secure system), • backup your system after you have installed and customized your system. Each time you shutdown the system: • use procedures in "Shutting Down the System" in Chapter 10. Each time your file system space is low: • Follow procedures in "Managing Disc Space" Each time you reformat your disc (such as changing swap space or creating a new file system) or re-install AXE: • do an archival backup using the procedures in "Backing Up and Restoring the File System" in this chapter, then, • create a new recovery system following the procedures in "Creating a Recovery System" in Chapter 10. Caring for Your AXE System 173 Daily: • incremental or archival backup (see "Backing Up and Restoring the File System" in this chapter), • check logging files using the procedures in "Managing Disc Space" in this chapter, Weekly: • perform an archival backup (follow procedures in "Backing Up and Restoring Your File System" in this chapter), • check logging files using the procedures in "Managing Disc Space" in this chapter. Monthly: • check logging files using the procedures in "Managing Disc Space" in this chapter, • save a permanent copy of an archival backup. 174 Caring for Your AXE System Important Files Do not delete the device files listed in Table 9-1. Deleting these required files will cause severe problems because your AXE system needs these files to operate properly. Table 9-1 Default Device Files Device File c/b Major / dev / console c 0 OxOOOOOO System message port I dev I syscon c 0 OxOOOOOO System console (linked to console) / dev I systty c 0 OxOOOOOO System tty (linked to console) Idev Itty c 2 OxOOOOOO Process group control terminal Idev/null c 3 OxOOOOO2 /dev/mem c 3 OxOOOOOO Physical memory image Idev/kmem c 3 OxOOOOOl Idev/swap c 8 Idev/root b Oxffffff OxOOOOOO Swap device Oxffffff Root psuedo device file Minor Device Description Null file ("bit bucket") Kernel virtual memory image If you inadvertently remove any of the files in Table 9-1 use the information in the table to create a new file, using the following command: mknod device-file c/b major minor Another important file is your AXE operating system, /hp-ux. If you have HP Windows/9000 running, do not remove the following files in the /dev folder: crt crt9837 crt98700 hil* locator screen pty* In general, do not remove files from the following folders: /bin and /usr/bin. Caring for Your AXE System 175 Backing up and Restoring the File System The backup process lets you recover lost data if there is a hardware failure, a system crash, or if you aCcidentally remove or corrupt a file. Backups can be made on cartridge tape, flexible disc, or 9-track tape. Recovery procedures are also detailed in this section. To minimize the chance of loss, backups should be stored at a different location from the main file system. "Data safes", specially designed air-tight, water-proof containers for mass storage media, are available from many computer accessory manufacturers. If a file or the entire file system is lost or destroyed, you can recover by restoring the latest version of your system backup. Backup Strategies and Trade-offs The method, frequency and extent of the backup operation depends on how much you use your system and how much data you feel you can afford to lose. Complete backups (as compared with partial ones) take significant time and the media costs involved can be high. Daily Archive Backups One backup strategy is to make complete backups of the file system on a daily basis. A complete backup is often called an archive backup. Restoring the file system from a full archive backup consists of restoring the most recent backup tape or flexible disc. While relatively expensive in terms of media, system resources and the time required to make full daily backups, the time and effort spent recovering the system is minimal. Incremental Backups An incremental backup contains only files that have changed since the last archival backup. Incremental backups almost always require less time and less backup media than archive backups. Mixing Archive and Incremental Backups The ability to use both archive and incremental backups leads to a useful backup strategy that is cost-effective and time-efficient without sacrificing the integrity of the file system. This method involves making archive (complete) backups of the file system once per week and supplementing this with daily incremental backups. Suppose, for example, that you make a complete backup of the file system on Monday and make incremental backups on Tuesday and Wednesday. Each incremental backup contains only those files that have changed since Monday. Further assume that, on Thursday, the file system is destroyed. The file system may be reconstructed by first restoring Monday's archival backup of the file system and then restoring the files from Wednesday's incremental backup. Note that the file system is now restored to the end of Wednesday's incremental backup. All work not on a backup has been lost. 176 Caring for Your AXE System There are two backup scripts provided with your system, backup and backup/. Use backup! if your backup will be on flexible disc. Use backup if your backup will be on cartridge tape or 9-track tape. If you use 9-track tape, you must modify the backup script. The backup scripts (backup! or backup) can be used to do either a full or an incremental backup. You can customize these scripts, as explained later in this chapter. Hewlett-Packard recommends the following backup schedule: • full archival backup weekly or biweekly • store the backup at least 2 weeks (see Figure 9-1) • daily incremental backup • take an archive backup and store it in a permanent archive monthly. File System Backup Queue age of backup 1 ~ day old extra 2 day old 3 day old place in queue 4 day old 5 day old 6 day old 7 day old 8 day old 9 day old 10 day old ~ backup system If Figure 9-1. File System Backup Queue You should continue making/using incremental backups until: • one or two weeks have passed since the last archive backup (if you are maintaining an archival schedule). • the size of the backups becomes unwieldy (for example, larger than one tape). • you feel it is necessary to create a new archive backup for any reason. Caring for Your AXE System 177 Backing Up the System The file system can be backed up onto the following media: • cartridge tape, • flexible disc, • magnetic tape. You can either: • perform a regular system backup using either the backup command or the backupJ command, or • backup selected files using the cpio or tar commands to copy selected files to a backup volume. The following sections describe how to use the correct backup script for your backup media. Backing up Onto Flexible Disc Use the backup script, backupJ, to backup your file system onto flexible discs. To prepare to backup, answer the following question: • Is character special file associated with your flexible disc drive called / dev / rJd? If not, you must edit /etc/backupJ to assign the correct device file to the outdev variable or use the procedures in "Setting Up Mass Storage Devices" in Chapter 10 to create the character special device file called /dev/rJd. 1. Login as the super-user root. See the section "Becoming the Root User" in Chapter 10. If you are not the super-user you will have problems copying files that you do not own or have permission to access. 2. Execute the shutdown command by typing: shutdown 0 I Return I For more information on the shutdown procedure, see the section "Shutting Down the System" in Chapter 10. 3. Insert the flexible disc. 178 Caring for Your AXE System 4. Perform the backup. The backupf script will write (log) information to the file /etc/backup/og: the start and finish times of the backup, the number of blocks copied, and any error messages that may have occurred during the backup. Information and messages written to this log file are appended onto the end of the file. If the backupf command runs out of room on the flexible disc, it prompts you to insert a new medium . • If you are doing an archival backup, do the following steps: a. Change to the root directory by typing: cd / I Return I b. Type: /etc/backupf -archive I Return I c. Check the file system by typing in: fsck -p [filesystem_nameJ I Return I For more information on fsck see "Checking Your File System" in this chapter. NOTE Do not run fsck -p without reading the "Checking Your File System" section in this chapter . • If you are performing an incremental backup, do the following: a. Change to the root directory by typing: cd / b. I Return I Type: /etc/backupf I Return I Caring for Your AXE System 179 • If you are backing up selected files, do the following: a. Go to the folder containing the files: cd folder _name I Return I b. Assuming your flexible disc drive is associated with the device file /dev/rfd (if not, replace "rfd" with the correct character special device file name), use the cpio command as follows : • to back up all files and folders from the current folder, type in: find. -print I epio -oeBx > /dev/rfd \ Return I • to back up all files in your current folder, type in: Is I epio -oeBx > /dev/rfd I Return I • to back up selected files in your current folder and folders, type in: Is file-name dir-name/file I epio -oeBx > /dev/rfd I Return I The file names should be separated by blank spaces. If your files are in different folders, you can specify relative path names for your file names. 5. When the backup has finished, remove the flexible disc. 6. Label the flexible disc with the date and the type of backup (archive or incremental) and store it in a secure place. 7. Examine the information and messages sent to the file, / etc/ backuplog to determine if any errors occurred during the backup process. Backing up Onto Cartridge Tape Use the backup script, backup, to backup your file system onto cartridge tape. To prepare to backup, answer the following questions: • Is character special file associated with your cartridge tape drive called /deu/rct? If not, you must edit /etc/backup to assign the correct device file to the outdev variable or use the procedures in "Setting Up Mass Storage Devices" in Chapter 10 to create the character special device file called /dev/rct. 1. Login as the super-user root. See the section "Becoming the Root User" in Chapter 10. If you are not the super-user you will have problems copying files that you do not own or have permission to access. 180 Caring for Your AXE System 2. Execute the shutdown command by typing: shutdown 0 I Return! For more information on the shutdown procedure, see the section "Shutting Down the System" in Chapter 1 o. 3. Insert the cartridge tape. 4. Perform the backup. The backup script will write (log) information to the file /etc/backuplog: the start and finish times of the backup, the number of blocks copied, and any error messages that may have occurred during the backup. Information and messages written to this log file are appended onto the end of the file. If the backup command runs out of room on the cartridge tape, it prompts you to insert a new tape . • If you are doing an archival backup, do the following steps: a. Change to the root folder by typing: cd / I Return i b. Type: /etc/backup -archive I Return! c. Check the file system by typing in: fsck -p [filesystem_namell Return ! For more information on fsck see "Checking Your File System" in this chapter. NOTE Do not run fsck -p without reading the "Checking Your File System" section in this chapter. Caring for Your AXE System 181 • If you are performing an incremental backup, do the following: a. Change to the root folder by typing: ed / I Return ! b. Type: /ete/baekup I Return I • If you are backing up selected files, do the following: a. Go to the folder containing the files: ed folder _name I Return ! b. Assuming your cartridge tape drive is associated with the device file /dev/rct (if not, replace "rct" with the correct character special device file name), use the cpio command as follows: • to back up all files and subfolders from the current folder, type in: find. -print lepio -oex Iteio -0 /dev/ret I Return I • to back up all files in your current folder, type in: Is lepio -oex Iteio -0 /dev/ret I Return ! • to back up selected files in your current folder and folders, type Is file_name dir _name/file_name Iepio -oex Iteio -0 /dev/ret The file names should be separated by blank spaces. If your files are in different folders, you can specify relative path names for your file names. 5. When the backup has finished, remove the cartridge tape. Be certain that the cartridge tape is logically "unloaded" before physically removing it from the tape drive; see the "Special Considerations" material later in this section. 6. Label the cartridge tape with the date and the type of backup (archive or incremental) and store it in a secure place. 7. Examine the information and messages sent to the file, / etc/ backuplog to determine if any errors occurred during the backup process. 182 Caring for Your AXE System Backing up Onto Magnetic Tape Use the backup script, backup, to backup your file system onto magnetic tape. To prepare to backup, you must edit the /etc/backup script and replace these lines: cpio -ocx tcio -0 $outdev with this line: cpio -ocBx > /dev/rmtxx where /dev/rmtxx is the special character device file associated with your magnetic tape drive. 1. Login as the super-user root. See the section "Becoming the Root User" in Chapter 10. If you are not the super-user you will have problems copying files that you do not own or have permission to access. 2. Execute the shutdown command by typing: shutdown 0 I Return I For more information on the shutdown procedure, see the section "Shutting Down the System" in Chapter 10. 3. Insert the magnetic tape. 4. Perform the backup. The backup script will write (log) information to the file /etc/backuplog: the start and finish times of the backup, the number of blocks copied, and any error messages that may have occurred during the backup. Information and messages written to this log file are appended onto the end of the file. If the backup command runs out of room on the magnetic tape, it prompts you to insert a new tape . • If you are doing an archival backup, do the following steps: a. Change to the root folder by typing: cd / I Return I b. Type: /etc/backup -archive I Return I Caring for Your AXE System 183 c. Check the file system by typing in: fsck -p [filesystem_nameJ I Return I For more information on fsck see "Checking Your File System" in this chapter. NOTE Do not run fsck -p without reading the "Checking Your File System" section in this chapter. • If you are performing an incremental backup, do the following: a. Change to the root folder by typing: cd / I Return I b. Type: /etc/backup I Return I • If you are backing up selected files, do the following: a. Go to the folder containing the files: cd folder _name I Return I b. Assuming your magnetic tape drive is associated with the device file /dev/rmt (if not, replace "rmt" with the correct character special device file name), use the cpio command as follows: • to back up all files and subfolders from the current folder, type in: find. -print I cpio -ocBx > /dev/rmt I Return I • to back up all files in your current folder, type in: Is cpio l-ocBx > /dev/rmt I Return I • to back up selected files in your current folder and subfolders, type in: Is file_name dir_name/file_name I cpio -ocBx > /dev/rmt I Return I The file names should be separated by blank spaces. If your files are in different folders, you can specify relative path names for your file names. 184 Caring for Your AXE System 5. When the backup has finished, remove the magnetic tape. 6. Label the magnetic tape with the date and the type of backup (archive or incremental) and store it in a secure place. 7. Examine the information and messages sent to the file, /etc/backuplog to determine if any errors occurred during the backup process. Restoring the System If you need to restore the system due to major problems, and the system is still functioning, log in as the super-user root and run the shutdown and fsck commands as referenced in steps 2 and 3 under the heading "A Standard Backup Procedure" above. In many cases, the fsck command can repair even serious problems in the file system. Often, lost files will show up in the /lost+found folder after running fsck. If you did not need to use fsck to repair the system, or after fsck has repaired the system, follow the procedures below. You can use these procedures to recover one or more specific files from a backup, also. Before restoring a backup, you must know how the backup was made. If you used cartridge tape, you used both cpio and tdo. If you used flexible disc or 9-track, you used only cpio. To restore the file system: 1. Log in as the super-user, root, if you need to restore the entire file system. Follow the procedure in "Becoming the Root User" in Chapter 10. If you will restore only specific files, you must be either the file's owner or root. 2. Write protect the tape or flexible disc your backup is stored on. 3. Place the backup medium in the mass storage device. If you are using a cartridge tape as the backup medium, wait for the cartridge tape drive's conditioning sequence to complete before continuing with this process. If you wish to restore only a single file, from a multiple-cartridge tape backup, insert the correct tape and answer "y" to the resynch prompt. 4. Once the medium is ready, enter one of the following command forms. You must reside in the correct parent folder before restoring files. The correct parent folder is the same as the folder you were in when you created the backup. If you are restoring from an archive or incremental backup, you must be in the root (I) directory. If you are restoring files from a selected file backup, you must be in the directory where you performed the backup. Select the appropriate form of the command based on the information supplied above. Caring for Your AXE System 185 For flexible disc or magnetic tape, type in: epio -iBedmuvx [patterns] < speciaCJile I Return I For cartridge tape, type in: teio -i speciaCJile I epio -iedmuvx [patterns] I Return I Note that speciaCJile is the name of the character special file associated with the backup device (usually /dev/rJd, /dev/rmt, or /dev/rct). [patterns] is an optional parameter used to specify which files to recover. If you wish to recover all the files, do not specify a pattern. If you wish to recover specific files, list them (separated by a blank space) where you see [patterns). If Disaster Strikes If the entire file system is destroyed or if the system is in such poor shape that the cpio command will not function properly, then one of two options is available. NOTE If your file system is destroyed, you should take the time to understand the circumstances which caused the problem so you can prevent having to repeat this procedure. Option one If you have set up a recovery system after your initial installation (using the procedures described in "Creating a Recovery System") you can boot your system and rebuild your file system from your backups. The recovery system is a functional AXE system on cartridge tape or flexible disc. Option two If you have not created a recovery system, your system must be re-installed from the original distribution medium. Follow the instructions in Chapter 2, "Installing AXE", and reinstall the system. 186 Caring for Your AXE System NOTE If you have updated your system since you first installed AXE, contact your local Hewlett-Packard Sales Office to obtain a current installation tape or set of flexible discs. Otherwise you will have to do one (or more) updates before you even begin restoring files. Once you have re-installed the original system and it is operating properly, use the forms of the cpio and tcio commands given above to copy (restore) the most recent archive and incremental backup(s) from the backup device to the system's root device. Special Considerations One of the characteristics of incremental backups is that they depend heavily on the system clock. Both the current time and date as well as the time and date associated with the file being used as a reference point for the backup (such as / etc/archivedate) have to be reasonably accurate to insure useful incremental backups. Always check, and if necessary reset, the clock (using the date command) if the system has been powered down for any reason or if a check of the clock shows any appreciable amount of inaccuracy. Dealing with Backup Media If the end of the medium is reached during the backup process, a message is sent to the standard error file (usually the system console) by the tcio and cpio commands. For example: tcio: to continue. type new device name when ready. return implies same device When this occurs, change the backup medium and type: speciaCJile_name I Return I where speciaCJile_name is the special (device) file name associated with the backup device (for example, if you are using flexible disc, the special (device) file is probably /dev/rJd). The backup process will then continue. Caring for Your AXE System 187 Checking Your File System You can use a program called fsck to check the integrity of your file system. This program is automatically run at bootup if the system detects an improper shutdown, so you normally will not need to run fsck yourself. The fsck command takes a few minutes to execute-the actual time depends on the size of your disc, the amount of disc space you have used, and the model of computer you have purchased. For example, an HP 7933 hard disc can take about 20 minutes to check. To use fsck, use the following procedure: 1. Login as the super-user root. See "Becoming the Root User" in Chapter 10. 2. Shutdown your system by typing: shutdown 0 I Return I 3. Check the file system by typing: fsck [options] [file_system_name] I Return I The options for fsck are -p, -y, and -no The preen (-p), yes (-y), and no (-n) options are described below. If you do not specify any options, fsck will run in interactive mode and will prompt you for directions if it finds any errors. The information necessary to make decisions on file system errors is beyond the scope of this manual so do not use the interactive mode. If you wish to check all the file systems associated with the devices listed in /etc/checklist (see "Adding to the checklist File"), you do not need to specify the file_system_name. If you wish to check only certain file systems, or wish to check a file system not listed in / etc/checklist, you must specify the character special file name (for non-root file systems) associated with the file system or the block special file name (for the root file system). NOTE When checking the root file system, you must use the block special file name associated with the root file system. When checking non-root file systems, you must use the character special file name associated with the file system. 188 Caring for Your AXE System 4. Reboot the system by typing in: reboot -n I Return I This will bring you back to the normal operating mode, with all the system processes running. NOTE If you are prompted to reboot from fsck -n or fsck -y, or get a return status other than 0 from fsck -p, you must immediately reboot continuing to use the system. If you are running fsck with the -n or -y option, the program will prompt you to reboot if necessary. If you are running fsck with the -p option, you will not be prompted to reboot, but must check the return status to determine if you need to reboot. See the section on "preen option" for more details on when to reboot. preen option Using fsck with the preen option (-p) safely fixes many file system errors. This option is used at boot up if a file system check is necessary, and is the option you should use if you suspect problems with the file system. preen Option at Bootup At bootup, if AXE determines your system was not shut down correctly, AXE will automatically run fsck -po You will see a message on your screen indicating a file system check is running. While fsck is executing, unless you have errors, all you get on your screen is information on available disc space. If fsck finds errors, it will either fix them or inform you that it was unable to fix the errors. If fsck finds errors it cannot fix, you will be prompted to run the fsck program interactively (with no options). If this happens, call the National HP Response Center (if you have purchased support services) or your local HP Sales Office (if you have not purchased support services). To make intelligent responses to errors in the interactive mode you must have a thorough understanding of the file system, which is beyond the scope of this manual. At bootup, if certain errors are fixed, the system will automatically reboot after a short pause. Caring for Your AXE System 189 Using the preen Option Manually If you feel you might have a corrupt file system, you should execute the file system check program manually, first with the -n option (see the section "yes or no Option"). If fsck -n finds errors, you should rerun fsck with the preen option by typing in: fsck -p [Jile_system_namell Return I While fsck is executing (with the preen option), unless you have errors, all you get on your screen is information on available disc space. If fsck -p finds errors, it will either fix them or inform you that it was unable to fix the errors. If fsck -p was unable to fix errors, call the National HP Response Center (if you have purchased support services) or your local HP Sales Office (if you have not purchased support services). If fsck needed to correct information on the root file system, you must reboot the system. If you are running fsck -p manually, you must check the exit status to determine if you need to reboot by typing in: echo $1 I Return I If AXE returns any number other than "0", you need to reboot. yes or no option If you run fsck manually (with the -n or -y option), you will see output similar to that shown in Figure 9-1 (if -y option, you will not see the "(NO WRITE)" on the first line). /dev/root (NO WRITE) Last Mounted on / Root file system Phase 1 - Check Blocks and Sizes Phase 2 - Check Pathnames Phase 3 - Check Connectivity Phase 4 - Check Reference Counts Phase 5 - Check CCyl groups 686 files, 3755 used, 5924 free (12 frags, 739 blocks) ** ** ** ** ** ** ** ** Figure 9-1. fsck sample output If you get errors during the five phases using the -y option, fsck will make changes to the file system. This might remove some files. 190 Caring for Your AXE System If certain errors occur on the root file system, the fsck output will be followed by the prompt: ***** REBOOT HP-UX ***** If this message appears, you must reboot the system immediately by typing: reboot -n I Return I If you get errors using the -n option, fsck will report the errors, but will not make any changes. You should then re-run fsck with the preen option. A thorough explanation of possible errors is beyond the scope of this manual. For More Information If you wish to run the fsck program interactively, you must have a thorough understanding of the file system on your Series 300 AXE computer. The Series 300 System Administrator Manual, Chapter 3, gives a description of the file system on the Series 300, and Appendix A gives a more detailed description of the fsck program. Caring for Your AXE System 191 Managing Disc Space AXE requires the file system to have a certain amount of free disc space. If there is not enough free disc space, you will get the message: no free space When you get the above message, you must delete files before you can continue using the system. If you are the super-user root, you may continue to use the system, but you still must free disc space if you wish your system to operate properly. It is best if you avoid this situation by doing the following on a regular basis: • remove any unwanted files, • remove any unneeded filesets using the procedures in "Removing File Sets" in Chapter 10, For example, if you have the manual pages from AMANUAL loaded, but never use them, remove the AMANUAL fileset. • archive little-used files on flexible discs or cartridge tape, then remove the file from your file system, • check, and clear, all logging files (logging files are described below), • make sure each user on the system removes or archives all unnecessary files. Determining Available Disc Space To determine the available disc space, you can run the file system checking program, fsck. To interpret the file system size information, you must know your system's fragment size and the free space threshold. The fragment size and the free space threshold numbers were reported to you during AXE installation. If you did not copy these numbers down, you cannot use this method to determine available file system space. For example, if you want to determine the available disc space on your root disc, and your root disc is associated with /deu/root, you would type in: /etc/fsck -n /dev/root 192 Caring for Your AXE System You will see the output shown in Figure 9-1 (in the section "Checking Your File System"), which ends with a line similar to: 686 files, 3755 used, 5924 free (12 frags, 739 blocks) The amount of free disc space you have (total) is 5924 X fiagmenCsize. If your fragment size is 1024 bytes, then you have 5924 X 1024 = 6066 176 bytes of free space. A percentage (free space threshold) of this space is reserved. If the free space threshold is 10%, then of the 6 066 176 bytes, 5 359 558 is available to the non-super-user. Using the find Command To identify disc usage problems, use the find command. Find is a complicated command, but certain fields are useful for locating trouble-files. You must be the super-user (root) to have access to, and find, all the files in your system. The format of the find command useful for identifying disc usage problems is (each part is described below): find path_name_list -user uname -size n -atime n -mtime n -ctime n tells find where you want to begin searching (for example, the root folder I), -user uname tells find to print the names of any files owned by the user's login name uname. -size n tells find to print the names of any files whos size is larger than n blocks. A block is 512 bytes. -atime n tells find to print the names of any files that have been accessed in n days. -mtime n tells find to print the names of any files that have been modified in n days. -ctime n tells find to print the names of any files that have been changed in n days. When you execute find, the output will come to your screen. If you wish to save the output, redirect it into a file (redirection is discussed in Chapter 4). Caring for Your AXE System 193 Example 1 The following command puts the names of files neither written nor accessed in the last 90 days in the file aging_files: find / -mtime +90 -atime +90 -print > aging_files Example 2 The following command puts the names of large files (over 1 Mbyte) in the file big_files: find / -size +2000 -print > big_files Logging Files Logging files are files created and written to by certain AXE commands to monitor system use and for general house-keeping. If logging files are not periodically checked and cleared, they continue to grow. Here are some logging files: • /etc/utmp (binary) - current login status. • /etc/wtmp (binary) - history of logins, logouts and date changes. • /usr/adm/sulog (ASCII) - history of use of the su command. These files are useful for keeping track of what goes on in your system. However, they can get very large. To keep logging files from using too much disc space, you should: • edit the ASCII files weekly and delete unused information, • occasionally clean the binary files by copying them to backup files, then deleting the files when you are sure you will not need them. • If you are sure you will never use these logging files, link them to /dev/null by executing the command: In logging_file /dev/null 194 Caring for Your AXE System Table of Contents 10 Chapter 10: AXE System Administration Adding and Removing Users ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " Adding A New User ......................................... " Removing a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...... " Adding to the Checklist File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Becoming the Root User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Booting AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Boot ROM Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. The Boot ROM's Search Sequence ................................ After Booting ................................................ Creating a New File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a New Operating System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a Minimum Operating System ............................. Creating the Maximum Operating System ........................... Creating a Custom Operating System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Creating a Recovery System ......................................... Booting the Recovery System .................................... Using the Recovery System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Initializing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Mounting and Un mounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. To Mount a File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. To Unmount a File System ...................................... Mounting/Unmounting File Systems using /etc/checklist. . . . . . . . . . . . . . . .. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Reconfiguring Swap Space and System Parameters. . . . . . . . . . . . . . . . . . . . . . . .. What Can Be Configured. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Using Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Parts to Configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Changing System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Removing Optional Products or Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting the System Clock. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Special Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up and Removing A Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up a Printer ........................................... Removing A Printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Other Useful Printer Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 196 196 199 200 202 203 204 206 208 209 210 212 213 215 216 218 219 223 224 224 225 225 226 228 229 229 230 232 238 239 240 241 242 242 246 246 Setting Up and Removing A Remote Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up a Remote Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Removing A Remote Terminal .................................... Setting Up Mass Storage Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Magnetic Tape Unit and Volume Numbers ........................... Setting Up Plotters and Digitizers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Shutting Down the System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Updating AXE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Preparing to Update ........................................... Locate and Write-protect the Product. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Load the Update Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Perform the Update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Setting Up Peripheral Devices: General Information . . . . . . . . . . . . . . . . . . . . . . .. 247 247 249 251 254 255 257 259 260 261 261 262 274 AXE System Administration 10 There are many tasks you need to perform to properly take care of your ,.t\XE system. This chapter tells you how to perform the following tasks: • Adding and Removing Users • Adding to the Checklist File • Becoming the Root User • Booting AXE • Creating a New File System • Creating a New Operating System • Creating a Recovery System • Initializing Media • Mounting and Un mounting File Systems • Reconfiguring Swap Space and System Parameters in AXE • Removing Optional Products and Filesets • Setting the System Clock • Setting Up and Removing A Printer • Setting Up and Removing A Remote Terminal • Setting Up a Plotter or Digitizer • Setting Up Mass Storage Media • Shutting Down The System • Updating AXE NOTE If you execute a command, but get the error: command: file not found you may need to load the command using the procedures in "Updating AXE". AXE System Administration 195 Adding and Removing Users Adding A New User Even on a single-user system, you probably need severallogins. You might want a different login for each person that accesses the computer. or for each task you want to do. To add a new user, perform the following steps: 1. Login as the super-user, root. See "Becoming the Root User" in this chapter for details. 2. Enter the command: reconfig I Return I The main menu of reeonfig will appear on your screen. 3. Using the I Tab I key, move the cursor to the Add a new user menu item and press the Select softkey. The form to create a new user will appear on your screen. 4. Fill in the following fields. USER NAME This is the name your system uses to identify the user. This name will be used both to log in to the system, and will be the name of the HOME folder for the new user. The USER NAME must be limited to 8 characters, and usually represents the persons name or function. Your login might be your initials, first name, or last name. If you want a separate login for using an application such as ALIS, you might call it aliso GROUP NAME The name of the group the new user will belong to. A list of existing groups is displayed on the form. You can choose one of the existing groups, or you can type in a new group name. If you use a new group name, reeonfig will create the new group by adding it to the file jete/group. If you hit I Return I without typing a group name, you select the default (displayed) group name. You can assign only one group to the user. DEFAULT SHELL The shell is a program that provides an interface between the user and the operating system. The user enters commands and accomplishes work through the shell. Four shells are provided from Hewlett-Packard, but you may use your own program or application. 196 AXE System Administration The four shells supplied by Hewlett-Packard are: /bin/sh /bin/csh /bin/rsh /bin/pam (Bourne shell) (C shell) (Restricted Bourne shell) (Personal Applications Manager) You must specify the shell as a full path name, that is, it must begin with '/'. The shell cannot be a folder name or a device name; it must be an executable file. If you hit I Return I without typing the shell name, you select the displayed (default) shell. This manual describes only the PAM shell. You should choose the PAM shell unless you know one of the other shells. WINDOWS AT LOGIN?: requires a yes or no answer. YES the window system will automatically be started when the user has finished his login. The user's shell will appear in a window. You must make sure your operating system is configured for windows. See the section called "Creating a New Operating System" and make sure the windows filesets are loaded. NO The user's shell will appear on the screen, but not in a window. PASSWORD? Using a password is one method of securing your computer system, and the data it contains. YES A new user will be forced to enter a password the first time he logs in. NO The user is not prompted for a password. Anyone who knows the user's login name will be able to enter the computer system. 5. When you are sure each field contains the correct information, press the DONE softkey to exit the form. The reconf;g program now performs the following tasks: • updates the /etc/passwd file with information about the new user. • updates the / etc/group file with the new user name, and a new group name if you created a new group. • creates the HOME folder in /users. The HOME folder will have the same name as the USER NAME. • puts an environment file into the new user's HOME folder. AXE System Administration 197 • checks that you have limited the user's name to 8 characters, • checks that you have not duplicated a user's name. The main menu of reconfig will appear on your screen. 6. Set up a terminal for the user if necessary. If the new user will use an existing remote terminal, or will use the console, this step should be skipped. If the new user will have a separate terminal, you must now go to the entry in reconfig for Add remote terminal support. See the section called "Adding a Remote Terminal" for information on setting up a terminal. 7. Press the Exit softkey to return to your shell. Example: If you want to add the following user: • Name is Ryan Asp • Member of group AXE • Needs HP Windows/9000 • Wants PAM for a shell • Needs a password (since you have a secure system) you should perform the following steps: 1. Type reconfig I Return I. 2. Press the key until the "Add a new user" option is high-lighted. I Tab 1 3. Press the Select softkey; the "Add user" form will appear on your screen. 4. Enter the USER NAME (for example, ryan). 5. Press the I Tab 1 key to go to the GROUP NAME field. Press the Clear Line key (on your keyboard) to clear the field, then type AXE. 6. Press the I Tab 1 key to go to the DEFAULT SHELL field. Press the "Clear Line" key (on your keyboard) to clear the field, then type /bin/pam. 7. Press the I Tab I key to go to the WINDOWS AT LOGIN? field. Press the Next softkey once to display the "Yes" option. 198 AXE System Administration 8. Press the I Tab I key to go to the PASSWORD? field. Press the Next softkey once to display the "Yes" option. 9. Press the Done softkey to exit the form. Removing a User 1. Login as the super-user root. See "Becoming the Root User" in this chapter for details. 2. Enter the command: reconfig I Return I The main menu of reconf;g will appear on your screen. 3. Use the I Tab I key to move the cursor to the Delete a user menu item and press the select softkey. A form to delete a user will appear on your screen. 4. Fill in the fields: USER NAME The login name for the user you wish to remove from the system. DELETE USER'S FILES Select "yes" or "no". YES This deletes the user's files and the user's HOME folder. If the user has files you, or anyone on the system, need, you should make a copy of these files before executing this command. These files will be removed. NO This leaves the user's files on the system. The password file will not have a name to associate with the user's id number, so the files will appear as being owned by a number, rather than a user. These files should be re-assigned to another user by using the chown command. The format for the chown command is as follows, where i_name is the file or folder name and u_name is the new owner's user name: The next time you add a user, the new user will get the user id from the deleted user. If you have not changed the ownership of the deleted user's files, the new user will automatically inherit the files. Unless you want this to happen, re-assign the files before adding a new user. AXE System Administration 199 5. When you are sure each field contains the correct information, press the Done soft key to exit the form. This will remove the user from the /etc/posswd and /etc/group files, and, if you answered yes to the second field, it will delete all the user's files and the user's HOME folder. The main menu for reconfig will appear on your screen. 6. Press the Exit softkey to return to the shell. Adding to the Checklist File NOTE If you do not understand the terminology used in this section, refer to "Reconfiguring Swap Space and System Parameters" and "Mounting and Unmounting File Systems" in Chapter 10 and "Checking Your File System" in Chapter 9. The /etc/checklist file contains a list of file systems and swap devices. programs use the checklist file for information: The following AXE • During bootup, or if you execute the mount -0 command all file systems (type "rw" and "ro") in /etc/checklist will automatically be mounted, • during boot up (if you add swapon -a to /etc/rc), or if you execute swopon devices (type "sw") in /etc/checklist will be enabled, -0, all swap • if you execute fsck without a list of filesystems, all file systems in /etc/checklist will be checked. The format of an entry in /etc/checklist is: comment 200 AXE System Administration Where: The device name used by fsck and swapon. If the file system is the root file system, /dev_name must be the block special device file name associated with the root file system (usually /dev/root). If the file system is a non-root file system, dev_name must be the character special device file name associated with the file system (for example, /dev/rhd rather than /dev/hd). If the file system is marked as a swap device, this must be the block special device file name. mnLdev The block special device file name used by mount and swapon. mounLfld The folder where mnCdev is to be mounted. type The possible values for type are: rw read/write permission for the file system ro read-only permission for the file system sw swap device xx ignore this entry order fsck will check the file systems in the order you specify. The root file system (jdev/root) should always be "I". Any file system labeled "2" will be checked after the root file system. File systems labeled "3" will be checked after the file systems labeled "2". You will probably only use "I" and "2". o This field always has a value of "0". comment This field is preceeded by a "#". You can put any comment in this field. For example, the entries in Table 10-1 will allow your system to automatically (at bootup): • fsck both the /dev/root and the /dev/rhd file systems (fsck ignores all "sw" and "xx" entries), • mount /dev/hd on the directory /hd2 with read/write permission (using the mount -a command automatically executed at bootup), • turn on swapping (if you added the command /etc/swapon -a to the /etc/rc file). Also, the shutdown command executes umount -a, and fsck, when run manually, reads the list of file systems from /etc/checklist if you do not provide a list of filesystems in the command line. AXE System Administration 201 If you are temporarily removing a disc from the system, you should invalidate the entries for that disc by changing the disc's type to "xx". Table 10-1: Example /etc/checklist Entries /dev/root /dev/rhd /dev/hd Note that root is root file system. file system entry be automatically /dev/root /dev/hd /dev/hd / /hd2 /hd2 rw rw sw 1 2 2 o o o #root #7945 #7945 swap assumed to be a swap device, so you don't need a separate swap entry for the For all other file systems, if they are also swap devices, you must have both a (if you wish it to automatically be mounted) and a swap entry (if you wish it to enabled for swapping). Becoming the Root User You need to be logged in with the USER NAME root to perform most AXE system administrative tasks. If you have a non-secure system, the only way to become root is to type in: su root I Return I If you have a secure system, you can use the above method, or you can log in as root. When you receive the login prompt, enter the word root: login: root I Return I then supply the password. 202 AXE System Administration Booting AXE Your Series 300 computer has a program, called the boot ROM, which is executed automatically when you turn on your computer. The boot ROM performs some hardware testing, assigns a system console, and loads an operating system. Once the operating system is loaded; the boot ROM passes control to the operating system. To boot your system: 1. Turn power on to all your connected peripherals. 2. Turn power on to your computer and to your system console. A description of the system console is given at the beginning of Chapter 2. A description of the displays you will see is in the "Boot ROM Displays" subsection. 3. Select an operating system. a. If you are using the unattended mode, do nothing {see the subsection "Unattended Mode"}. b. If you need to use the Boot ROM's attended mode, press the space bar {see the subsection "Attended Mode"}. 4. Log in when you receive the prompt. If the wrong AXE or HP-UX operating system was loaded, use the procedures in Chapter 10, the section "Shutting Down Your System", to shutdown and reboot your system, entering the boot ROM's attended mode. If an operating system other than AXE or HP-UX was loaded, cycle power {turn the computer off, then back on} and enter the boot ROM's attended mode. You can set the correct time and date {using the date command} by typing an entry of the form: date MMddhhmm{yy} I Return MM I is a two digit integer representing the month. For example, 03 represents March. is a two digit integer representing the day of the month. For example, 02 represents the second day of the month. dd hh is a two digit integer specifying the current hour in terms of a twenty-four hour clock. For example, 03 specifies 3:00 am and 14 specifies 2:00 pm. AXE System Administration 203 mm is a two digit integer specifying the number of minutes past the stated hour. For example, 04 specifies four minutes past the hour. {yy} is an optional two digit integer specifying the last two digits of the current year; this parameter may be omitted if the year is already correct. For example, 86 specifies 1986 as the current year. Boot ROM Displays The foHowing shows a typical display of the boot ROM's operation. The displays vary depending on the version of the boot ROM. Copyright 1985, Hewlett-Packard Company. All Rights Reserved. BOOTROM Rev. A Bit Mapped Display MC68010 Processor Keyboard HP-IB HP98620B HP98644 at 9 HP98625 at 14 2096978 Bytes SEARCHING FOR A SYSTEM (RETURN To Pause) RESET To Power-Up 204 AXE System Administration : HP7946, 1400, 0, 0 1H SYSHPUX 1D SYSDEBUG 1B SYSBCKUP Once the SEARCHING FOR A SYSTEM message appears on the system console, the screen will clear and a series of messages appear, including the following information: Console information Processor information Interface cards real mem = buffer information root device information swap device information avail mem = unlockable mem = file system checking information copyright information If, when you shutdown your system, you did not follow the procedures in "Shutting Down the System", AXE will execute fsck, a program to check and, if necessary repair, your file system. For more information on fsck, read Chapter 9, the section "Checking Your File System". On the media where your bootable system resides (hard disc or recovery system) there is a boot area. The boot area has a file, called /hp-ux, that is your operating system. SYSHPUX points to /hp-ux. If you have modified your operating system, SYSBCKUP points to the previous version of /hp-ux. The old operating system is now called /SYSBCKUP. NOTE If you depend on the boot ROM's search sequence to boot a default system, make sure the mass storage device containing the operating system has completed its power-up cycle and is ready for use before powering up the computer. The order in which the operating systems are found depends on both the search sequence, and on the availability of the mass storage devices. AXE System Administration 205 The Boot ROM's Search Sequence The boot ROM has two modes of selecting an operating system: attended and unattended. In attended mode, you can select the operating system to boot from all the operating systems found on the mass storage devices. In unattended mode, the boot ROM automatically boots the first operating system in its search sequence. Unattended Mode You should use the unattended mode of booting if you have only one bootable operating system on line, or if you know the operating system you wish to boot is the first operating system the boot ROM will find. The boot ROM searches a prioritized list of devices. The first system found on one of these devices will be booted. If no system is found, the list will be searched again until a system is found. This means that discs not found at power-up can be found after their initialization is complete. To boot the operating system: • make sure the desired operating system is the first system found, following the prioritized list below, • make sure the device holding the operating system is fully powered up before you turn on your computer. The search sequence that the boot ROM uses to find an operating system follows these priorities: 1. Internal mini-floppy, Unit 0 (i.e., Drive O). 2. External discs at Select Codes 0 thru 31, Bus Address 0, Unit 0, Volume O. 3. Shared Resource Manager at Select Code 21, Volume 8. 4. Bubble Memory at Select Code 30. 5. EPROM on Unit O. 6. ROM board (for ROM=based operating systems). 7. Internal mini-floppy, Units 1 thru N. 8. Other external discs at Select Codes 0 thru 31, Bus Addresses 0 thru 7, Units 0 thru 15, Volumes 0 thru 7 (not Bus Address 0, Unit 0, Volume O). 9. Other Shared Resource Managers at Select Codes 0 thru 31 (not Select Code 21, Volume 8). 206 AXE System Administration 10. Bubble Memory on Select Code ° thru 29. 11. Other EPROMs. According to the above priorities, external devices are searched in order of select code; a system at select code 4 would be found before a system at select code 5. Also, multiple units at the same select code and bus address are searched before moving to the next ascending select code or bus address. Thus, the AXE system on the root mass storage device at select code 14, bus address 0, unit 0, is found and loaded before any of the AXE "utilities" systems at select code 14, bus address 0, unit 1. To summarize, the search levels for AXE devices, in ascending order are: 1. device class (internal discs, external discs) 2. select code 3. bus address (also called device address) 4. unit number 5. volume number Attended Mode If you do not want to default to the first operating system found by the boot ROM, you must enter the attended mode of selection. You enter attended mode by typing a space, I Return I, or any letter or number, during the time before a default system is found, but after the keyboard has been initialized. The character used to enter attended mode is used as part of the string to select the operating system. The best way to enter the attended mode is to hold down the space bar until the word "Keyboard" appears in the installed interfaces list on the left side of the screen. When attended mode is activated, the boot ROM displays a boot selection menu. This menu lists all accessible operating systems as the boot ROM finds them. The operating systems will be displayed by their name, listed under a mass storage device name and address. For example, if you have both an AXE kernel and an AXE backup kernel on an HP7946 at select code 14, bus address 0, unit 0, the following will appear on the menu: : HP7946, 1400, 0, 1H SYSHPUX 1B SYSBCKUP ° You select an AXE operating system by typing the 1 to 3 digit string associated with the desired system. For AXE this will usually be a "lH". The characters typed are printed in the lower right corner of the display. AXE System Administration 207 After Booting After your system is booted, AXE starts system processes that perform the following checks: • check to see if your system was properly shutdown, If not, it calls the fsck program to check your file system and possibly make some repairs (see "Checking Your File System" in Chapter 9). • if you have a "secure" system, processes that interact with remote terminals, called gettys, start, • set the default PATH environmental variable, • set the time zone (TZ) variable, • set the date (an interactive process) • initialize the system console, • start the printer spooler process if you set up the spooler (see "Setting Up a Printer" in this chapter), • start LAN (if you have installed LAN), • mount all file systems in /etc/checklist. 208 AXE System Administration Creating a New File System If you run out of space on your root file system, you can either remove enough files to gain space or you can create another file system. The following are the steps you should follow to create a file system. 1. Connect the mass storage device on which the file system will exist to your AXE system. See the "Setting Up Mass Storage Media" section in this chapter and the installation manuals supplied with your Series 300 computer and/or the mass storage device for hardware installation details. 2. Create both a character special and a block special device file for the mass storage medium. Use the instructions in the "Setting up Mass Storage Devices" section of this chapter. 3. Once the mass storage device is properly installed and turned on, run the media initialization utility mediainit. This utility initializes the medium on which the file system will reside. If the medium has been initialized before, you may skip this step. Read "Initializing Media" in this chapter. 4. Determine if you have any special file system requriements. Generally, the only file system parameter you may need to change is the swap space (discussed below). The command to create a file system (newfs) will create a file system with certain defaults (unless you otherWise specify). These defaults are taken from a file called /etc/disktab. Most attributes of the file system should be used as the default value. Read Appendix E to determine how much swap space you need. Determine the default swap space size from / etc/disktab. If you determine you need more than the default swap space, use the -s option of newfs to create a smaller filesystem (and therefore a larger swap space). All other default values should be unchanged unless the manual for your application instructs you to change them. 5. Create the file system on the initialized disc (you must be logged in as the super-user root). If you wish to create a file system using all default values, type in: newfs device_file disc-type I Return I where device-file is the character special device file associated with the disc drive where the file system will reside, and disc-type is the name for the disc in the text file /etc/disktab. AXE System Administration 209 If you wish to create a file system with a larger swap space, type in a command of the following form, where fs_size is the total size of the disc, less the amount of swap space (see "Reconfiguring Swap Space and System Parameters", section "Swap Space" in this chapter for an example of using newfs with a size you supply): newfs device_file -s fs_size disctype 6. Next, mount the new file system. This is described in the section "Mounting and Unmounting File Systems". 7. If the newly created file system is intended as a permanent addition, you may wish to modify / etc/checklist so the new file system will be checked and mounted when the system is booted. Add the new file system to /etc/checklist by inserting the name of the character special device file name associated with the file system. (Refer to "Adding to the Checklist File") Creating a New Operating System The heart of your operating system is called the kernel. The kernel is made up of optional drivers and other resource management software. A driver is simply a section of the kernel. Some drivers are required in the kernel, others are optional, and are needed only when you install certain peripherals or subsystems. The required drivers will be in every version of the operating system you create. You can create an operating system that is big or small depending on which optional drivers you include in your kernel. A small kernel will give you better performance than a large kernel. NOTE Add ONLY the operating system drivers you need. Each optional driver requires main memory space. 210 AXE System Administration The optional drivers you can choose from are shown in Table 10-2. Table 10-2: Optional Kernel Drivers Driver Name Used For cs80 most mass storage devices (always included in the operating system if you use reconfig). amigo Amigo Mass Storage Devices ciper Ciper Printers printer Non-ciper Printers hpib Plotters tape 9-Track Tape Drives stape 9-Track Streaming Tape Drives 98624 Internal Disc Controller 98625 Hi-speed HPIB Disc Controller 98628 Datacomm Card 98642 4 channel MUX Card 98626 RS-232 CARD gpio GPIO Card ieee802 or ethernet Local Area Network (LAN) srm Shared Resource Management (SRM) rje Remote Job Execution (RJE) ptymas and ptyslv Windows To determine which kernel driver you need, look up the part number of your peripheral in the section at the end of this chapter, "Setting Up Peripheral Devices: General Information". 98515-90000, rev: 4/86 AXE System Administration 211 You have three choices when you create an operating system, or kernel, from the reconfig program. Each choice is described in detail in the following sections. You can create: • the minimum operating system, • the maximum operating system, • a customized operating system. Creating a Minimum Operating System If you have not changed your operating system since you installed AXE, you will have the minimal operating system. The minimal operating system contains the drivers shown in Table 10-3. Table 10-3: Drivers in Minimum Operating System Use Driver name cs80 Most mass storage devices (always included in the operating system if you create the operating system with reconfig). ptymas Windows pytslv HP Windows/9000 98624 HP 98624 HP-IB Card printer Non-ciper Printers hpib Plotters 98625 HP 98624 Hi-speed HP-IB Disc Controller 98626 HP 98626 RS-232 Card 98642 HP 98642 4 channel MUX Card To create the minimal operating system, perform the following steps: 1. Login as the super-user root. See "Becoming the Root User" in this chapter for details. 2. Enter the command: reconfig I Return I The main menu of reconfig will appear on your screen. 212 AXE System Administration 3. Using the I Tab I key, move the cursor to the Create a minimally loaded operating system menu item and press the select softkey. You will see the following message on your screen: Please wait while the new operating system is created (this may take several minutes) ... This will not overwrite your current operating system until you specifically request it (see step 4 for instructions). The new operating system is in a file called /etc/conf/hp-ux.new. You will see the main menu for reconf;g on your screen. NOTE New drivers cannot be accessed until you reboot. Step 4 explains how to automatically reboot. 4. You should now see an additional item in the main menu of reconf;g. This item is called reboot. • If you select the reboot option, the old kernel will be overwritten 1 , and your new kernel will contain the minimal operating system listed above. AXE will now reboot. • If you do not want to reboot, press the Exit soft key. You will be asked again if you wish to reboot. Using the next soft key, select "no", then press the done softkey to exit. You will be given instructions on how to reboot AXE later. You will now be returned to your shell. Creating the Maximum Operating System The maximum operating system is made of all the drivers listed at the beginning of this section. With the maximum operating system, you may need extra memory in your computer. If you create an operating system that is too big, some of your larger applications may run slower. You can use the previous version of your operating system by typing in: exec reboot -f SYSBCKUP I Return I or by rebooting AXE in the attended mode (see "Booting AXE"). The old kernel is actually moved to /SYSBCKUP. This way, if your new kernel doesn't work, you can reboot with your old kernel using the attended mode of the boot ROM. AXE System Administration 213 To create the maximum operating system, perform the following steps: 1. Login as the super-user root. See "Becoming the Root User" in this chapter for details. 2. Enter the command: reconfig I Return I The main menu of reconfig will appear on your screen. 3. Using the I Tab I key, move the cursor to the Create a maximally loaded operating system menu item and press the select softkey. You will see the following message on your screen: Please wait while the new operating system is created (this may take several minutes) ... This will not overwrite your current operating system until you specifically request it (see step 4 for instructions). The new operating system is in a file called /etc/conf/hp·ux.new. You will see the main menu for reconfig on your screen. NOTE New drivers cannot be accessed until you reboot. 4. You should now see an additional item in the main menu of reconfig. This item is called reboot . • If you select the reboot option, the old kernel will be overwritten!, and your new kernel will contain the maximum operating system (an operating system that contains all the drivers AXE supports). AXE will now reboot. • If you do not want to reboot, press the Exit softkey. You will be asked again if you wish to reboot. Using the next softkey, select "no", then press the done softkey to exit. You will be given instructions on how to reboot AXE later. You will now be returned to your shell. 1 The old kernel is actually moved to /SYSBCKUP. This way, if your new kernel doesn't work, you can reboot with your old kernel using the attended mode of the boot ROM. 214 AXE System Administration Creating a Custom Operating System A custom operating system contains only the parts (drivers) you choose to include. 1. Decide what parts of the operating system you need to include by following the instructions at the beginning of this section. 2. Login as the super-user root. See "Becoming the Root User" in this chapter for details. 3. Enter the command: reconfig I Return I The main menu of reconfig will appear on your screen. 4. Using the Tab key, move the cursor to the Create a custom operating system menu item and press the Select softkey. The custom operating system creation will now begin. You will see a series of forms, each asking if you need a specific driver. If you need that driver, choose the YES answer to that form. You will see a form for each type of driver listed at the beginning of this section. After all the forms have appeared, reconfig will create your new operating system. You will see the following message on your screen: Please wait while the new operating system is created (this may take several minutes) ... This will not overwrite your current operating system until you specifically request it (see step 5 for instructions). The new operating system is in a file called /etc/conf/hp-ux.new. You will see the main menu for reconfig on your screen. NOTE New drivers cannot be accessed until you reboot. Step 5 explains how to automatically reboot. 5. You should now see an additional item in the main menu of reconfig. This item is called reboot . • If you select the reboot option, the old kernel will be overwritten!, and your new kernel will support each of the items you chose in the previous screens. AXE will now reboot. The old kernel is actually moved to /SYSBCKUP. This way, if your new kernel doesn't work, you can reboot with your old kernel using the attended mode of the boot ROM. AXE System Administration 215 • If you do not want to reboot, press the Exit softkey. You will be asked again if you wish to reboot. Using the next softkey, select "no", then press the done softkey to exit. You will be given instructions on how to reboot AXE later. You will now be returned to your shell. Creating a Recovery System Once your system has been installed, the first thing you should do is make a recovery system. If you can't boot from your root disc, you can use your recovery system to boot and repair your file system. You may be unable to boot because your root disc is too corrupt, or because you forgot your root password. A recovery system is built using a command, /etc/mkrs. mkrs will build a small AXE system with a minimal kernel so you can boot. The recovery system is easy to build, and is valuable if you ever need it. You can build your recovery system on either cartridge tape or on two 3 112 inch double-sided, double-density micro discs. The cartridge tape can hold more files, but is much slower for both creating and using the recovery system. NOTE If you change the swap space of your system, you MUST create a new recovery system. If you fail to create a new recovery system, the old one may overwrite and destroy your root file system. The recovery system has a boot area so you can boot using just the recovery system. The recovery system also has a small file system, containing the following files and directories: hp-ux A minimal kernel. /bin Directory containing a small subset of AXE commands. The actual commands vary depending on your recovery media. Use the Is command to list the exact files you have on your recovery system. / dev The / dev directory contains the device files necessary for using the recovery system (block and character special files for the root disc and the recovery drive). The device files are created automatically. 216 AXE System Administration Idisc A directory that can be used to mount a file system. letc jete contains the tools necessary to fix your root file system: sbtab, fsek, mknod, mount, and umount. It also contains small inittab, init, profile, and re files, which are necessary for booting. Itmp To create the recovery system: 1. Log in as the superuser, root. You will be accessing privileged commands, so you must have super-user privileges. See "Becoming the Root User" in this chapter for details on logging in as root. 2. Create the device files in /deu for the device you wish to create the recovery system on. See "Setting Up Mass Storage Media" for procedures on how to create device files. You must have both character and block mode device files for the root disc and for the tape or flexible disc drive used for the recovery system. 3. Create the recovery system by using the mkrs command. If mkrs doesn't exist on your system (you receive a message mkrs: not found), follow the gUidelines in "Updating AXE" to install the "ACONFIG" file set (MISC_UTILS partition -green labels). update will automatically load all file sets dependent on ACONFIG. mkrs has the following form: mkrs [-f rsdev] [-r rootdev] [-t type] [-v] rsdeu is name of the block mode device file for the device on which you are creating your recovery system. rsdeu must be the same block special device file name you created in step 2. If your device files are named et and ret, you don't need to specify this option; et is the default. Do not use the full path name (e.g. use md, not /deu/md). rootdeu is assumed to be hd by default. If your root device files are not named hd and rhd, you must use the -r option. Do not use the full path name (e.g. use root, not /deu/root). type can be either et (cartridge tape) or md (micro disc). The default is ct. For example, if your root file system is associated with the device file, /deu/hd, and you will be creating your recovery system on the flexible disc drive associated with the device file /deu/md, you would type in: mkrs -f md -t md I Return I AXE System Administration 217 If you are creating your recovery system on micro discs, you will need two discs. You will be prompted to insert the second disc when mkrs is finished with the first disc. The mkrs process takes about 30 minutes on a micro disc and about 1 hour on a cartridge tape. 5. Boot the recovery system to check it out. For this step, you will need to shut down the system. You probably want to test-boot the recovery system during off hours. Follow the steps 1 - 3 under "Booting the Recovery System". 6. Put the recovery system in a safe place and LOCK IT! When you boot using the recovery system, you come up as super-user, root. This is potentially a serious security problem. It is up to you, to keep this recovery system safe (so you can use it if needed) and out of sight (so unauthorized people do not have access to it). Booting the Recovery System To use your recovery system, you will need to boot, then use the recovery tools to gain access to your root disc. Follow these steps to boot your system. 1. Power up all system swap devices (generally just your root file system's hard disc) and the recovery system device. Your recovery system uses the swap space on your system, so these devices must be powered up. 2. Turn on your computer and (immediately) hold down the space bar to access the attended mode of the Boot ROM. A list of operating systems will come on your screen. 3. Find the system labelled "SYSHPUX" listed under the device you have your recovery system on. Enter its number on the command line. For example, if you have your recovery system on a 91220 flexible disc drive, you might see (on the right side of the display): 9146; 1400, 0, 0 lH SYSHPUX lB SYSBCKUP 9122; 0700, 0, 0 2H SYSHPUX You would select I2 I H I. As the recovery system is booting, you may see lines such as: prod# ...... ignored Don't worry about these messages. Your recovery system is a minimal subset of the kernel, and doesn't have (or need) the device drivers the full HP-UX system has. 218 AXE System Administration The booting process takes only 2 or 3 minutes from the micro disc, and about 10 minutes from the cartridge tape. When it's done, you will see the words: Welcome to the HPUX Recovery System You are now in the recovery system. Using the Recovery System Once you have booted your recovery system and you see the shell prompt on your display, you can use the following steps to try to recover your root file system. The procedure outlined here: • assumes you cannot boot your regular system; you suspected a problem and used the recovery system to boot, • uses the term "root device" for the device that is root under normal circumstances (disc drive associated with your root file system), • assumes your root device is called /dev/hd (block special file) and /dev/rhd (character special file), • assumes your recovery device is on flexible disc and is called /dev/fd (block special file) and /dev/rfd (character special file). NOTE Use "Is -I / dev" to determine what device files are actually present on the recovery system, 1. If you think your root device is corrupted, then run fsck (see "Checking Your File System" in this chapter) on the character special file associated with your root device (e.g. /dev/rhd). The file /etc/sbtab on the recovery system should identify the location of duplicate superblock (it will be an empty file if / etc/ sbtab did not exist on your root file system when the recovery system was made). For example, if one of the locations is block 16, then use fsck -b 16 /dev/rhd. If you think the boot area on your root device has been corrupted, then copy the boot area from the recovery system to the root device as follows: dd if=/dev/rfd of=/dev/rhd count=l bs=8k AXE System Administration 219 If the fsck appears to solve the problem then do a sync, wait for the busy light on the tape or floppy drive to remain off, halt the system, and reboot from your hard disc. If the reboot fails then come up on the recovery system again and go on with step 2. If the boot succeeds but other problems still exist on the disc (such as missing or corrupted files) then go to step 3. 2. Once you have run fsck and have recieved no errors, mount the root device using: mount /dev/hd /disc I Return I The strategy at this point is to get the root volume back to the point where the system can be booted from it. The critical files are listed below. If any of these files are suspect on the root volume then take the indicated actions to fix the file. /bin/sh copy the version of this file on the recovery system to the root volume, then remove and relink /bin/rsh. The commands are: cp /bin/sh /disc/bin/sh rm /disc/bin/rsh In /disc/bin/sh /disc/bin/rsh /etc/init copy the version of this file on the recovery system to the root volume. cp /etc/init /disc/etc/init /etc/inittab if inittab is corrupted, init might fail. To work around this problem, save the inittab file (you may want to go edit it later), then create a single line inittab. Do this as follows: mv /disc/etc/inittab /disc/etc/inittab.save echo lis:s:initdefauIt:" > /disc/etc/inittab Be very careful to type the second line exactly as shown (including the quotes). etc/ioctl.syscon If you have changed the device used as the console then it is possible that /etc/ioctl.syscon is incorrect, or it may have otherwise become corrupted. Work around this problem by removing the file (the next time the system is booted a correct file will automatically be created): rm /disc/etc/ioctl.syscon 220 AXE System Administration / dev / console This file (which is also linked to /dev/syscon and /dev/systty) could be corrupted or the file might not match the console, resulting in the system not being bootable. Use the following to compare these files on the recovery system and the root device. Is -1 /dev /disc/dev If the files on the root volume do not match those on the recovery system, then correct the problem by doing the following: remove the 3 files, console, syscon, and systty rm /disc/dev/console /disc/dev/syscon /disc/dev/systty # # # # use the appropriate parameters to make /dev/console match the /dev/console file on the recovery media (using mknod) . Note that you cannot copy (using cp) device files. the files In /disc/dev/console /disc/dev/syscon In /disc/dev/console /disc/dev/systty # link /hp-ux If the kernel file got corrupted there are two possibilities: • If there is a backup kernel file on the root volume that is not corrupted then use it to reboot from the hard disc. Once you have rebooted you can either create a new kernel (using config) or copy the backup kernel to / hp-ux. A common name for a backup kernel is /SYSBCKUP. • If there is no usable backup kernel then you need to copy /hp-ux.min from the recovery system to the root device. If your recovery system is on cartridge tape, /hp-ux.min will be on your one recovery tape. If your recovery system is on flexible disc, /hp-ux.min will be on your second recovery disc. To use the second recovery disc to boot from, do the following: • umount / dey /hd I Return I • sync and wait for the busy light on the floppy drive to remain off. AXE System Administration 221 • Turn off your computer, remove flexible disc # 1, insert flexible disc #2, power on your computer, hold the space bar down, and once given the choice, choose to boot from the flexible disc. • The kernel on flexible disc # 2 was built so that it uses the root volume as root (and not the flexible disc). • mkdir /dise mount /dev/fd /dise ep /dise/hp-ux.min /hp-ux umount /dev/fd • Go to step 5. 3. If you have not already done so, unmount your root disc (umount /dev/hd) 4. You should now be able to boot from the root volume. Do a sync (while still running on the recovery media), wait for the busy light on the tape or flexible disc drive to remain off, halt the system and reboot. 5. If you have rebooted from the root volume, you can now fix other possible problems as described below. • if /etc/inittab was corrupted you can now edit the version that was saved to fix it. Once edited, move it back to /etc/inittab. Until you have tested your newly edited inittab, you should make the default state s, i.e., like the initdefault line shown above, which causes the system to come up in single user state when booted. You can switch to other states using init x, where x=1,2, ... , 6. • if you lost other system files you should update your system. update requires that at least the following commands be available. The flexible disc containing the command is also listed. All of these commands can be gotten from the # 1 tape. /ete/mkfs /usr/bin/mediainit /bin/sh /bin/mkdir /bin/pwd /bin/epio /usr/bin/lifep /usr/bin/teio /ete/update /ete/sysrm SYS_CORE SYS_CORE SYS_CORE SYS_CORE SYS_CORE SYS_CORE SYS_CORE SYS_CORE SYS_CORE SYS_CORE (gray) (gray) (gray) (gray) (gray) (gray) (gray) (gray) (gray) (gray) #1 #1 (found as /mediainit) #2 #2 #2 #2 #2 #2 #2 #2 If any of these are missing, they can be gotten from your install tape/flexible disc by mounting the tape/flexible disc and copying the missing command(s) to the root device. 222 AXE System Administration Initializing Media A command, mediainit, must be used on your flexible discs, cartridge tape, and hard discs before you can put files on them. mediainit prepares the disc or tape for error-free operation. NOTE Do not initialize a mounted file system. 1. Install (set up and connect) the disc or tape drive if you have not already done so. Follow the guidelines in the Peripheral Installation Guide. 2. Create a character device file for the tape or disc drive if you have not already done so. Follow the gUidelines in the section "Setting Up Mass Storage Media" in this chapter. 3. Initialize the media by typing in the mediainit command using the character special device file's path name (e.g. /dev/rfd rather than /dev/fd for flexible disc). mediaini t [options] pathname I Return I The choice of the interleave factor can have a substantial impact on disc performance (both hard disc and flexible disc). The interleave factor should be 2 for flexible disc. For hard disc, use the interleave factor recommended in the Peripheral Installation Guide, listed under the HP part number of your disc drive. NOTE If you add new hard disc to your system, you may need to reinitialize the new hard disc before you can use it. If you change your system configuration (such as moving the system disc from the built-in HP-IB to the HP 98625A interface, or adding DMA) it may be necessary to reinitialize the disc. Check with your local HP sales office. Here are examples of two common uses of mediainit: • If you are initializing a cartridge tape (associated with the character special device file /dev/rct) , type in: mediainit /dev/rct 98515-90000, rev: 4/86 AXE System Administration 223 • If you are initializing a flexible disc (associated with the character special device file /dev/rfd), you must specify an interleave factor of 2. Type in: mediainit -i 2 /dev/rfd Remember, it is usually necessary to initialize media only once. Mounting and Unmounting File Systems When AXE is installed, only one file system (the root file system) exists. You may create, modify, and delete files from this system. At installation, the AXE file system exists on this single disc. It is possible to have other file systems on different discs; any other mass storage device supported by Series 300 AXE can be used as an additional file system. To accomplish this, the additional file system(s) is attached to the root file system. The process of attaching additional and functionally independent file systems to the root file system is called mounting and is achieved with the mount command. The process of removing file systems from the root file system is called un mounting and is achieved with the umount command. To Mount a File System 1. Create special device files for the disc drive. You must have both character special and block special device files in /dev (see the section "Setting Up Mass Storage Media" in this chapter). 2. Create the file system if you haven't already done so (see the instructions in the section "Creating a New File System" in this chapter). 3. Power up the disc drive. If the file system is on removable medium (such as flexible disc), insert the media in the mass storage device now. Do not remove the flexible disc until the file system is unmounted. 4. Create a new directory, under /, to mount the file system by typing: mkdir mounCdirectory I Return I This needs to be done only once. Make sure the directory is empty. 5. Mount the file system on the block special device file (for example, /dev/ct rather than / dev / ret) by typing: fete/mount /dev/filesystem_name /mounCdirectory 224 AXE System Administration I Return I To Unmount a File System Use the following procedure to un mount a file system. 1. Make sure that all files on the file system are closed; no one may be accessing any file on the file system. Attempting to unmount a file system that has open files (including your current working directory) causes the umount command to fail without unmounting the file system. 2. Enter the following: /etc/umount /dev/filesystem_name I Return I where filesystem_name is the name of the block special (device) file of the device associated with the mounted file system. 3. When the shell prompt (#) is again displayed on your screen, it indicates that the file system is unmounted. If the file system is on a removable medium (such as a flexible disc), the medium can now be removed safely. Mounting/Unmounting File Systems using /etc/checklist You can mount and unmount all file systems listed in /etc/checklist with one command. The / etc/ checklist file must contain the device file associated with the file system, and the full path name where each file system will be mounted. See "Adding to the checklist File" in this chapter. If you wish to mount all file systems in /etc/checklist, enter the following: mount -a I Return I If you wish to unmount all file systems in / etc/checklist, enter the following: umount -a I Return I AXE System Administration 225 Example The diagrams that follow show the directory structure before and after mounting. The new file system will be mounted in the directory called /direct. The new file system is on a flexible disc. Figure 10-1 shows the /direct folder on the root file system. It also shows the file system hierarchy on the as-yet-unmounted flexible disc. Hierarchy of Existing File System File System Hierarchy of Unmounted Flexible Disc Volume ~I P° profile D = chop1 I e0 0 °c / directory Figure 10-1. File System before Mounting Figure 10-2 shows the file system hierarchy once the file system is mounted on the / direct folder, using the command: fete/mount /dev/md /direet I Return I The file newfile was added to the new file system after it was mounted. 226 AXE System Administration Hierarchy of Mounted File System profile chop1 D newfile = directory Figure 10-2. File System After Mounting Figure 10-3 shows the / direct folder on the root file system after the new file system is unmounted, using the command: /etc/umount /dev/md Hierarchy of Existing File System I Return I File System of Unmounted Flexible Disc Volume . J ~ 0 ) profile D = chop1 0 0 ( newfile directory Figure 10-3. File System After Un mounting AXE System Administration 227 Special Considerations You can't unmount a file system that has open files. The following situations are the most frequent cause of open files on a file system: • having your current working folder on a file system causes an open file on the file system. Change to a folder on another file system, such as the root file system . • if a file has been accessed and the sticky bit is set in the file's protection mode; the file is always open. To turn off the sticky bit, type: chmod u -t file_name I Return 228 AXE System Administration I Reconfiguring Swap Space and System Parameters Series 300 AXE allows you to configure, or customize, various attributes of your system. You may require more swap space than the default amount of space. Perhaps you don't want the full kernel taking space in main memory. Or maybe, fOi a special application, you need to change selected system parameters to make the application more efficient. The config command allows you to customize your system to meet these requirements. NOTE Do not confuse the command, config (discussed here), and the command reconfig, discussed in Chapter 2, the section "After Installing AXE". When configuring only your AXE operating system (kernel), you can use either config or reconfig. However, if you system requires a second swap device, or requires that you change system parameters, you must use the config command. To create a new operating system kernel using reconfig, read the section "Creating a New Operating System" in this chapter. The rest of this section will discuss how to use the config command to create a new kernel, use additional swap space, and change system parameters. What Can Be Configured Each time you configure your system, you create a new kernel. Any kernel drivers not specifically listed in the dfile (described later) will be removed from the kernel. The AXE System Administration 229 Using Config Programs and files used for configuring your system are: • /etc/config, • /etc/master, • / etc/ conf/libraries- object code, • /etc/conf/h- .h files, • /etc/conf/machine - .h files, • /etc/conf/dfile.{minJullJull.lan,supportJ - sample configuration files. • /etc/conf/dfile- the configuration file created with reconfig. This file reflects the drivers currently installed (unless you have created a new operating system using config, and used a different dfile). NOTE You must not use config in the root folder kernel. U} or you will overwrite your To use config, follow these steps: 1. Log in as the superuser, root. 2. Follow the procedures in this chapter, the section "Updating AXE", to add the ACONFIG fileset to your system. 3. Shutdown the system. This will bring your system into single-user mode, and will make your system inactive. Follow the procedure in "Shutting Down the System" in this chapter. 4. Execute fsck using the procedures in "Checking Your File System" in Chapter 9. 5. cd to some directory other than / (for example, /etc/config). This process creates your new kernel, so you must be in a directory other than the root directory or you will overwrite the current kernel. 6. Create or edit the dfile (description file). The dfile is a user-provided description of the system configuration. You can either create your own dfile, use the dfile created with reconfig (jetc/conf/dfile) , or use one of the sample dfiles sent with your system. See the samples in /etc/conf: djile.full, djile Ju II. lan, djile.min, djile.5upport). These dfiles are described in the "Device Drivers and I/O Cards" section. 230 The AXE System Administration 7. Execute config on your dfile to create both a C program and a makefile. See config(1M) for available options. /etc/config dfile I Return I Executing config creates conf.c and config.mk. conf.c is a C program that contains external references to the kernel driver code. Satisfying these external references will bring code from the system libraries into the kernel. config.mk is a makefile that will automatically compile conf.c and link a new kernel (hp-ux). Check to see that you have these files by typing Is. You should see your dfile, conf.c, and config.mk. 8. Create the new hp-ux kernel in the current directory by executing: make -f config.mklReturnl config.mk will list all code brought into the kernel, for example: /etc/conf/libmin.a cs80.o mux.o muxs.o /etc/conf/libdevelop.a amigo. 0 ciper.o Executing conf.mk creates a file, hp-ux, in your current directory. 9. Backup the existing kernel by typing in: cp /hp-ux /SYSBCKUP I Return I If the newly configured kernel won't boot, use the bootrom's attended mode to access the backup kernel. To use the attended mode, press the space bar during bootup. This halts the automatic boot mechanism and allows you to choose the system to load. You should select "B" (backup) option instead of the "H" (HP-UX) option. For example, select "IB" instead of "1 H" . 1 O. Move the new kernel to the / directory. cp ./hp-ux /hp-ux The AXE System Administration 231 11. Reboot exec reboot I Return I 12. If you added a second swap disc (described under "Creating Swap Space" later in this section), enable the second disc by executing: swapon second_swapdevice I Return I where second_swapdevice is a block special file. Add this entry to /etc/rc for automatically enabling the second disc when you boot. 13. Once you are sure your new operating system works, remove the ACONFIG fileset by following the procedures in the section "Removing Optional Products and Filesets" in this chapter. Parts to Configure You can configure kernel device drivers and I/O cards, swap space, and system parameters. Each is described below. NOTE Remember that you MUST have all the AXE kernel device drivers you need included in your dfile each time you use config, along with swap device information and/or system parameter information if you need them. Device Drivers and 1/0 Cards You MUST configure all the kernel device drivers you need each time you execute config. If you do not include all the kernel device drivers you need, you will be unable to communicate with the peripherals associated with those drivers. Peripherals are the hardware associated with the files in / dev. This area of customization enables you to configure hardware drivers, cards in the backplane, and software drivers (pseudo drivers). Pseudo drivers don't talk to any hardware device. LAN and Windows/9000 drivers are examples of pseudo drivers. 232 The AXE System Administration Four sample script files came with your system to show how different device drivers and I/O cards can be combined to form different kernels. The sample files can be found in jete/con/. The files are: • dfile.full-this file will configure an AXE system with all the drivers supported in this release, minus LAN, • dfile.full.lan-dfile.full plus the LAN driver. • dfile.support-this file reflects the set of drivers and I/O cards available in releases prior to 5.0. • dfile.min-this file contains one possible minimal (but still useful) system configuration. In addition to the sample files, the dfile you created, or the dfile created by reeonfig (jete/eonf/ dfile) , will be in this directory. In determining the device drivers for the hardware you have, you can consult the "alias" portion of the jete/master file. If you wish to determine the device drivers from the jete/master file using alias, do the following: 1. make a list of the model numbers of all your peripheral devices, I/O cards, and software (LAN, Windows/9000, etc.). 2. look up the part number in the jete/master file and add the corresponding driver name to your dfile. For example, if you have a 7945 disc, look up 7945 in the file. You will see the following entry: 7945 caBO You would add "csBO" to your dfile. NOTE Remember that, in addition to configuring your kernel with the device drivers you need, you must create special (device) files. See the sections in this chapter specific to setting up peripherals for information on creating device files. The AXE System Administration 233 Swap Space Swap space is an area on your disc (or discs) reserved for the virtual memory system. Swap space must be large enough to hold a process image of all the processes that are running. To determine the amount of swap space you need, read Appendix E. If you do not have enough swap space, AXE will not execute your program. AXE will kill your process and send you the message: Sorry. pid pidnum was message. Pidnum is the id number of the process that was killed. Message is one of 7 possible messages, describing when and why the process was killed. Creating Swap Space You can specify swap devices (the secondary storage devices holding swap space) by adding a line to your dfile that looks like: swap devname address swplo [nswap} devname Swap device's driver name (e.g. cs80). If you don't know the driver name, look up the product number in the jete/master file's alias table. address Minor device number in hexadecimal, without the preceeding Ox. This is the same minor device number you set up when you created the special (device) file for the disc drive that will contain the swap space. swplo Swap area's location in decimal. If (swplo = -1), then the swap space is put on the disc, after the file system. If (swplo = 0), then allocate the entire disc to the swap space- don't reserve any area before the swap area. If (swplo >= 1), then reserve sIVplo space at the beginning of the disc, leaving (disc-size - swplo) for the swap area. nswap 234 Size of swap area in number of 1 Kbyte units. The AXE System Administration NOTE Remember that you MUST have all the AXE kernel device drivers you need included in your dfile, along with any swap device lines. Swap space can be on the same disc as your file system, on a separate disc, or both (see figure 10-4). If you need more than the default swap space, use the swap configuration in either 10-4-c or 10-4-d. An explanation of each configuration follows. NOTE If you rebuild your root file system, you must have another bootable system (Le. another root disc). This procedure is described later. 10-4-0 10-4-b File System File System Swap Space Swap Space disc disc 10-4-c 10-4-d File System Swap Space Swap Space disc disc 2 disc 2 File System File System Swap Space Swap Space disc disc 2 Figure 10-4. Swap Space The AXE System Administration 235 Possible configurations for swap space are: • lO-4-a shows the default configuration. Use newts to create your file system (see "Creating File Systems" in this chapter) • lO-4-b shows one disc (probably the root disc) with no default swap area after the file system, and a second disc dedicated to swapping. You must remake your file system, using the entire disc for the file system, then put the following line in your dfile 1 : swap csBO E0100 0 /* disc 2 */ • lO-4-c shows one disc (probably the root disc) with a file system with the default swap space, and a second disc dedicated to swapping. The entry in your dfile for figure lO-4-c would look like 1 : swap csBO EOOOO -1 /* disc 1 */ swap csBO E0100 0 /* disc 2 */ • lO-4-d shows two file system discs, each with the default swap space. On each disc, a file system was created using new/so The entries in your dfile would look like 1 : swap csBO EOOOO -1 /* disc 1 */ swap csBO E0100 -1 1* disc 2 */ NOTE If you increase the size of the swap space on your file system disc without re-making the file system, you may loose parts of your file system and the system will probably crash. How to Remake Your File System, decreasing the file system size. Decreasing your file system's size increases your swap size. This option would look similar to Figure lO-4-a, but the swap space would be larger-less file system space. 1 All the examples assume disc 1 is at select code 14, bus address 0, and disc 2 is at select code 14, bus address 1 236 The AXE System Administration To rebuild your filesystem, you can either use another root disc or re-install your system. To rebuild your filesystem using another root disc, follow these steps: 1. Determine how big you wish your swap space to be using the guidelines in Appendix E. 2. From your required swap size, determine the size your file system should be. disc size - swap size in bytes DEV_BSIZE DEV _BSIZE is the size of blocks and is defined in /usr/include/sys/param.h. For example, if DEV _BSIZE = 1024 bytes, and you need 20971 520 bytes of swap space on your HP 7945 disc, you would need 36352 blocks for your file system: 58195968 - 20971520 = 36 352 blocks 1024 3. Create another root file system on hard disc using the file_system_size you determined in step 2. In this example, you would make your file system on the disc associated with /dev/rhd2 using the command line: newfs -s 36352 /dev/rhd2 hp7945 I Return I See "Creating A New File System" in this chapter for specific details on the file system creation procedure. 4. Copy your existing file system onto the new root disc. If you choose to re-install AXE, you must perform the following steps: 1. Determine how big you wish your swap space to be using the guidelines in Appendix E. 2. Backup the entire file system using the procedures in Chapter 9, the section "Backing Up and Restoring AXE". 3. Re-install AXE, this time specifying the larger swap size in the "Disc Parameters Menu". See Chapter 2 for instructions on how to install AXE. 4. Restore your files from the backup created in step 2. The AXE System Administration 237 Enabling Swap Space The kernel will automatically turn on the first swap device specified. If you want to use the other swap devices you have configured, you must use the swapon command after you boot the new kernel. For examples lO-4-c and lO-4-d, if the second disc corresponded to the device file /dev/hd2, and had a minor number of OxOeOlOO, the second device could be enabled by typing "swapon /dev/hd2". The swap device can be enabled automatically at boot up by adding "swapon /dev/hd2" to jete/reo Once you have enabled a device for swapping, it can not be disabled without halting the system. See "Adding to the checklist File" in this chapter for information on automatically enabling swap devices at bootup. Changing System Parameters If the application you purchased requires you to change AXE operating system parameters, you must put a line of the following form in your dfile: parameter_name parameter_value where parameter _name is the name of the system parameter you need to change, and parameter _value is the new value required by your application. 238 The AXE System Administration Removing Optional Products or Filesets If you are no longer using a fileset, you should remove it so you have more space on your file system. The program sysrm performs the opposite of update; it removes optional file sets. 1. Determine which file sets you wish to remove. A list of AXE file sets is given in Appendix D. Appendix D does not list the file sets for optional products, such as LAN. The folder, /etc/filesets, contains a complete list of file sets you have installed on your system using either the update or the install procedures. 2. Become the root user. 3. Shut down the system by typing in: shutdown 0 I Return I 4. Type in the following command, where fileset is the name or number of the fileset to be removed (determined in step 1): /etc/sysrm fileset I Return I You must execute sysrm once for each fileset you wish removed. The file set(s) you typed in will no longer be available. You can load them back into the system, if needed, by using the update procedure (see "Updating AXE"). 5. Return your system to normal operating mode by typing in: reboot I Return I The AXE System Administration 239 SeHing the System Clock You must make sure the system clock always has the correct time and date because a number of commands use the clock to accomplish their tasks. Occasionally, the system clock needs to be set or reset. There is no need to reset the system clock on your Series 300 if you have powered down-it has a battery which keeps the clock current. Only the super-user can change the system clock. To set the current time and date: 1. Login as the super-user, root. 2. Insure that the time zone environment variable TZ is set properly by typing in: echo $TZ I Return I Typically, TZ's value is set with a variable declaration (as shown below) in the file /ete/profi/e. As shipped to you, the system is set up to run in the Mountain Time Zone. To change the time zone to your time zone, modify the /ete/profile file to contain two entries of the form: TZ=XXXHYYY export TZ where xxx and YYY are three letter representations of the standard and daylight time zones for your area and H represents the difference between current local time and Greenwich Mean Time, in hours. The export TZ line will remain the same regardless of the time zone. For example, in Denver, Colorado you would enter the following: TZ=MST7MDT export TZ where MST stands for Mountain Standard Time and MDT stands for Mountain Daylight Time. Here are some other examples: • For St. Clair Shores, Michigan: TZ=EST5EDT • For Norman, Oklahoma: TZ=CST6CDT • For Corvallis, Oregon: TZ=PST8PDT • For Hawaii: TZ=HST10 since Hawaii has no Daylight Savings Time. 240 The AXE System Administration 3. Now that the time zone is set, you can set the correct time and date (using the date command) by typing an entry of the form: date MMddhhmm{yy} I Return I MM is a two digit integer representing the month. For example, 03 represents March. dd is a two digit integer representing the day of the month. For example, 02 represents the second day of the month. hh is a two digit integer specifying the current hour in terms of a twenty-four hour clock. For example, 03 specifies 3:00 am and 14 specifies 2:00 pm. mm is a two digit integer specifying the number of minutes past the stated hour. For example, 04 specifies four minutes past the hour. {yy} is an optional two digit integer specifying the last two digits of the current year; this parameter may be omitted if the year is already correct. For example, 85 specifies 1985 as the current year. When date is executed it echoes the time and date on your screen. Special Considerations As mentioned in the "Backing Up and Restoring the File System" section in Chapter 9, the process of making incremental backups depends heavily on the correctness of the date. This is because incremental backups are always made in relation to a dated file. The AXE System Administration 241 Setting Up and Removing A Printer Setting Up a Printer When you set up a printer, you can print files, or redirect output, to the printer using the /p command. NOTE In addition to completing the steps here, you may need to reconfigure your kernel. The kernel must be configured with the correct driver before the printer can work. 1. Configure the AXE operating system so it supports this printer. This step can be done before or after you have set up your printer. Check the file / etc/ conf/ dfile to see if the driver is already installed. If not you must add a driver (see "Creating a New Operating System") for both the printer type and for the RS232 or HP-IB printer interface. 2. Enter the command: reconfig I Return I The main menu for reconfig will appear on your screen. 3. Using the I Tab I key, move the cursor to the Configure the line printer menu item and press the Select softkey. The form for configuring your line printer will appear on your screen. 4. Fill in each field of the form. PRINTER NAME This is the name you will use to combination of up to 14 characters is normally chosen. For example, if system, any of the following names thinkjet 242 thinkjetl The AXE System Administration access the printer. This name can be any unique and numbers; however, a name describing the printer you are adding an HP 2225A Thinkjet printer to your would be appropriate: hp2225a Ip1 If you called the printer thinkj et 1, and you wish to send a file called bowling_scores to the printer, type: lp -dthinkjetl bowling_scores I Return I MODEL NAME Choose one of the models listed below the form. Each printer model listed has a corresponding description file in the /usr/spool/lp/model directory. The Ip program uses these descriptions to access the special features of the printer. If your printer does not fit into any of these models, use the dumb model. SELECT CODE Each I/O card installed in your system has a unique address associated with it, which is referred to as its select code. The select code is a number from 0 through 31. If you have used the Peripheral Installation Guide to set up your printer, you will have the correct select code on your worksheet. If you have not used the Peripheral Installation Guide to set up your printer, you may have to remove the card and check the select code switches on it. WARNING DO NOT remove the card while your computer is turned on. PRINTER INTERFACE This field allows you to indicate which type of interface the printer supports The two choices are HP-IB and RS-232. This information is needed to guarantee that AXE properly communicates with the printer. If you are unsure which interface the printer supports, refer to the manual supplied with the printer. The AXE System Administration 243 SUB-ADDRESS The sub-address is a number from 0 through 31. The sub-address depends on the type of printer, RS232 or HP-IB. Use Table 10-4 to help determine what the sub-address number is: Table 10-4. Printer Sub-Addresses Printer Interface SubAddress HP-IB HP-IB address assigned to the printer. Look at the switch settings or refer to your the Peripheral Installation Guide. RS232 with single channel (HP 98626 or HP 98644 card) 0 See the note on RS232 printers. RS232 with 4-channel MUX (HP 98642 card) channel number on the card (refer to the Peripheral Installation Guide) See the note on RS232 printers. DEFAULT SYSTEM PRINTER The default system printer is used if you do not specify a particular destination printer in the lp command. The default system printer is the printer associated with the device file /dev/lp. For example, the following command will print the file, bowling_scores, on the default system printer: lp bowling_scores I Return I However, the following command will print the file, bowling_scores, on a thinkjet printer: lp -dthinkjetl bowling_scores I Return I You do not need to have a default system printer, but if you don't, then you must specify a destination printer each time you print a file. The system supports only one default printer at a time. Each time a new one is set, the old one is replaced. 5. Press the Done softkey to exit the form. The reconfig program now performs the following functions: • creates a file in the / dev folder, For example, if you named your printer thinkjetl, the following file will be created: /dev/thinkj et!. 244 The AXE System Administration • checks to see that each field is within the limits, • does NOT check to see that the select code/address/etc are correct, If the numbers you supplied are within the range, reconfig assumes you supplied the correct information. • checks for a duplicate device file name, If you already had a file in the /dev folder with the name you supplied in "PRINTER NAME", you will need to supply a new name. • adds the new printer name to the line printer spooler mechanism so AXE knows you now have a printer. You will now see the main menu on your screen. 6. Press the Exit softkey to return to your shell. A NOTE ON ADDING RS232 PRINTERS When an RS232 printer, using the dumb printer model, is added to the system, the operating system will, by default, talk to that printer at 300 baud. For many people, this speed is inadequate. To increase the baud rate, you must become the superuser and edit the file /etc/rc to add a line similar to the following (you can find the exact lines you need in the Peripheral Installation GUide): nohup sleep 2000000000 < /dev/PRINTER& stty 9600 -ienqak ixon -parenb opost onlcr tab3 < /dev/PRINTER where PRINTER is the printer name you specified in the form. If you wish to run at a speed other than 9600 baud, then replace the 9600 with the desired baud rate. 98515-90000, rev: 4/86 The AXE System Administration 245 Removing A Printer If you remove a printer from your system, you need to perform the following steps to stop the lp scheduler: 1. Shutdown the lp scheduler by typing in: /usr/lib/lpshut I Return I 2. Remove the printer name from the scheduler by typing in: /usr/lib/lpadmin -xprinter _name I Return I where printer _name is the name you called the printer when you set it up. 3. Restart the lp scheduler (if you still need it) by typing in: /usr/lib/lpsched I Return I If space is a problem, and this was the only printer of it's type on your system, you can remove the kernel driver by creating a new operating system. Other Useful Printer Commands If your printer gets disabled, for example if it runs out of paper, you can re-enable it by typing in: enable printer _name I Return I where printer _name is the name you called the printer when you set it up. If you need to check on your printers, i.e., verify that they are enabled, type in: lpstat -t I Return 246 I The AXE System Administration Setting Up and Removing A Remote Terminal Remote terminal support allows you to login from a terminal other than your system console. If you will be using only the system console, or are running a single-user system, do not add remote terminal support. The system will try to access the terminal and waste processor time. NOTE You can login from a remote terminal only if you have a multi-user system. Setting Up a Remote Terminal NOTE Remote terminals can be accessed only in a "secure" system. If you set up your system for "no security", you can use only your system console. To add support for a new port, follow these steps: 1. Follow the gUidelines in the Peripheral Installation Guide to install the RS232 or MUX interface card (HP 98626, HP 98642, or HP 98628) that you will connect your remote terminal to. 2. Configure your AXE operating system to support the interface card you installed. This step can be done before or after you have set up your remote terminal. Check the file /etc/conf/dfile to see if the driver is already installed. If not you must add a driver (see "Creating a New Operating System") for the RS232 or MUX interface card. 3. Enter the command: reconfig I Return I The main menu of reconfig will appear on your screen. 4. Using the I Tab I key, move the cursor to the Add remote terminal support field and press the Select soft key. The form for adding a remote terminal will appear on your screen. 98515-90000, rev; 4/86 The AXE System Administration 247 5. Fill out each field of the form: SELECT CODE Each I/O card installed in your system has a unique address associated with it, called a select code. If you installed your interface card using the guidelines in the Peripheral Installation Guide, you will have the select code on your worksheet. If you did not use the Peripheral Installation Guide when installing your interface card. you need to remove the card and check the select code switches on it. WARNING DO NOT remove the card while your computer is turned on. If you do, you can damage your hardware. PORT ADDRESS If you are adding remote terminal support to a single channel RS-232 card (98626 or 98644) port, you must set this field to 0 (zero). If the port is a 4 channel MUX card (98642), you should set this field to the port number (0 - 3) to which terminal support is being added. The card's product number is shown on the faceplate of the card. SPEED Choose the default speed (or baud rate) at which this port should operate. There are 5 choices: 300, 1200, 2400, 4800, and 9600. Terminals that are directly connected to this port should probably be set to 9600 baud. If you are using a modem, the setting will depend on the modem. PORT USAGE It is important that you set this field to correctly reflect how the port will be used. There are 3 choices: 248 Direct connect If the terminal is directly connected to your interface card (you will not use a modem), select this option. US modem If you will use a modem, and are in the United States or Canada, select this option. This setting will allow you to dial into your system. CCITT modem If you will use a modem, and are not in the United States or Canada, select this option. This setting will allow you to dial into your system. The AXE System Administration 6. When you are sure each field contains the correct information, press the DONE softkey to exit the form. The reconfig program will perform the following tasks: • create a file in the / deu folder with the correct port number (the port number is the xx at the end of the file name) and correct address. A direct connect terminal will have a file that looks like: /dev/ttydxx. A dial-in terminal will have a file that looks like: /deu/ttyxx . • add an entry for the device file in the /etc/inittab file. Each time AXE enters the "secure" mode, a process, called a getty, will be started for this terminal. The main menu of reconfig will appear on your screen. 7. Press the Exit soft key. If you haven't reconfigured your kernel to include the new interface card, you will receive a message on your screen similar to: Unable to access ttyxx Install the kernel driver using the guidelines in "Creating a New Operating System" in this chapter. Removing A Remote Terminal If you remove a remote terminal from your system, you must clean up your system by performing the following steps: 1. Find the system's name for the terminal. If you have been receiving messages on your screen that are similar to: Unable to access ttyxx then the system's name for the terminal is the ttyxx name. If you have not recieved the message, you must determine the name of the remote terminal by the following method: a. type cd /dev I Return I. The AXE System Administration 249 b. type ls -1 tty* I Return J You will see lines of the form: erw--w--w- 1 jaei axe 1 OxSePaOT date /dev/ttyPa The field OxSePaOT stands for the following: Ox Indicates this number is in base 16 Sc Select code . refer to the Peripheral Installation Guide Pa Port address - always 0 if your terminal was connected to an HP 98626 or HP 98642 interface card, and is 00,01,02, or 03 if the terminal was connected to an HP 98642 interface card. OT If you are in the United States or Canada, 00 means dial-in modem 01 means dial-out modem If you are not in the United States or Canada, 02 means dial-in modem 03 means dial-out modem 04 means direct-connect 2. Edit the file /etc/inittab. You must have the vi editor on your system. See the instructions in "Updating AXE" if you don't have vi. Delete the line that has a field with the words: : respawn: jete/getty ttyxx, where ttyxx is the port you identified in step 1. 3. Update /etc/inittab knowledge of the terminal by typing: te1init q I ReturnJ 250 The AXE System Administration Setting Up Mass Storage Media When you set up a flexible disc drive, cartridge tape drive, or hard disc drive, you must create special files, called device files, in the / dev folder. The instructions for creating these special files are given in this section. 1. Login as the super-user root. See the section "Becoming the Root User" in this chapter for details. 2, Shutdown your system with the desired grace period (in seconds) by typing in: shutdown -h grace_period I Return I and wait for the "halted" message on your console. The section "Shutting Down the System" in this chapter explains the shutdown procedure. 3. Turn the power to your computer off. 4. Using the guidelines covered in the Peripheral Installation Guide and the installation manual supplied with the peripheral device, determine the best place (in terms of HP-IB Bus Addresses, shared sets of I/O resources, expected usage, etc.) to locate your disc or tape drive. 5. Connect the disc or tape drive. If it requires an interface card, set the appropriate switches on the card and install the card in the computer. Never install an interface card while the computer is powered up. Then set any required switches on the disc or tape drive and connect it to the computer (or interface card). If you ever change the switch settings on an HP-IB device, be sure to cycle power the device before attempting to address it. 6. Turn power on to your computer. 7. Create the special device file for your peripheral. Using the information from step 4, create the device file by typing in a line with the following form: /etc/mknod /dev/device-file_name c/b major _num OxScBaUV I Return device_file_name I The device-file_name should follow the AXE naming conventions: Distinguish the name of a character device from a block device by prefacing the character device name with "r". See Table 10-5 for examples. The AXE System Administration 251 Table 10-5. Mass Storage Device Naming Conventions Device File Name Character/Block Mode Type of Mass Storage Device /dev/hd block Hard disc /dev/rhd character Hard disc /dev /fd block Flexible disc /dev /rfd character Flexible disc /dev /ct block Cartridge tape /dev /rct character Cartridge tape /dev/mt block Magnetic tape /dev/rmt character Magnetic tape /dev/hd9134 block HP 9134 disc drive /dev/rhd9134 character HP 9134 disc drive Several programs assume the AXE naming conventions. For example, backup assumes the character-mode cartridge tape associated with /dev/rct, and backupf assumes the character-mode flexible disc drive associated with /dev/rfd. c/b Use c if you are creating a character special device file and b if your are creating a block special device file. Each hard disc drive, flexible disc drive, and cartridge tape drive must have both a character special and a block special device file. major_num 252 For most mass storage devices, the maLnum will be 0 for the block special device files and 4 for the character special device files. Look up the product number of your mass storage device in the section, "Setting Up Peripheral Devices: General Information" at the end of this chapter. The AXE System Administration 98515-90000, rev: 4/86 The addressing (also called minor number) consists of a select code (Sc), HP-IB address (Ba), unit number (U), and volume number (V). The Ox tells AXE that this number is a hexadecimal number. You can find these numbers from the worksheet you filled out while installing the mass storage device. For each possible HP-IB address where hard discs may be located, there can be several minor numbers. For example, if you have an HP7946A disc/tape drive, the disc drive has a unit number of 0 and the tape drive has a unit number of 1. select code = 7, HP-IB address = 0 disc drive minor number = Ox070000 cartridge tape minor number = Ox070010 OxScBaUV For hd/ct combination drives with a single controller, the ct will be unit 1. If you ordered a dual controller option for a hd/ct drive, such as the hp 7114 TC, the unit number for both devices is 0, but the bus addresses for the two controllers must be set to different values. If you have an integrated CS80 hard disc and flexible disc drive, at Select code 7, bus address 0, your mknod command lines would be: mknod mknod mknod mknod /dev/hd b 0 Ox070000 /dev/rhd c 4 Ox070000 /dev/md b 0 Ox070010 /dev/rmd c 4 Ox070010 You can replace the supplied device names with an appropriate name that contains the model number of your hard disc. 8. Change the permissions on the new device file. If you have set up a new hard disc, you should type (for both block and character files): chmod 600 /dev/deuice_file_name I Return I For flexible disc drives and cartridge tape drives, you should type: (for both block and character files) chmod 666 /dev/deuice-file_name I Return I 9. Make sure your kernel contains the correct drivers (kernel code) to use the peripherals. See "Creating a New Operating System" in this chapter for a description on how to add drivers to AXE. If you created the maximum kernel you will have all the drivers installed. Check the /etc/conf/dfile file for the list of installed drivers. The AXE System Administration 253 Magnetic Tape Unit and Volume Numbers The unit and volume number fields of the minor number have special meaning when creating special files for the HP 7970E, HP 7971A, HP 7974A or HP 7978A/B magnetic tape drives. The single hexadecimal unit number represents a four bit binary value. Setting and clearing the bits of this binary value affects the manner in which the tape drive operates, as indicated in Table 10-6 (bits 6 and 7 select the tape density, while bits 4 and 5 represent the unit number, and "x"s represent "don't care"): Table 10-6. Tape Density and Unit Number Bit Settings hex value 7 6 5 4 Selects 8 1 0 x x Density = 6250 bpi (HP 7978 only) 4 0 1 x x Density = 1600 bpi (All mag tapes) 0 0 0 x x Density = 800 bpi (HP 7974, opt 800 only) 0 x x 0 0 Select Unit 0 1 x x 0 1 Select Unit 1, etc. The volume number field of the minor number also has special meaning when creating special files for magnetic tape drives. The single hexadecimal volume number represents a four bit binary value. Setting and clearing the bits of this binary value affects the manner in which the tape drive operates, as indicated in Table 10-7. Table 10-7. Magnetic Tape Operation Bit Settings Bit When When Clear (0) Set (1) 3 Industry Standard mode HP-UX 2.0 compatibility mode 2 Immediate report on (ignored by HP 7970/7971) Immediate report off 1 AT&T style compatibility mode Berkeley style compatibility mode 0 Rewind on close No rewind on close. Order Example minor numbers for your tape drive are given in the Peripheral Installation Guide. 254 The AXE System Administration 98515-90000, rev: 4//86 Setting Up Plotters and Digitizers If you are installing an interface card, you MUST perform all the steps given here. If you are connecting your plotter or digitizer to an existing interface card, you can skip steps 2, 3, and 6. 1. Login as the super-user root. See the section "Becoming the Root User" in this chapter. 2. Shutdown your system with the desired grace period by typing in: shutdown -h grace-period I Return I and wait for the "halted" message on your console. 3. Turn the power to your computer off. 4. Using the gUidelines covered in the Peripheral Installation Guide and the installation manual supplied with the peripheral device, determine the best place (in terms of HP-IB Bus Addresses, shared sets of I/O resources, expected usage, etc.) to locate the peripheral. 5. Connect the plotter or digitizer. If it requires an interface card, set the appropriate switches on the card and install the card in the computer. Never install an interface card while the computer is powered up. Then set any required switches on the device and connect it to the computer (or interface card). If you ever change the switch settings on an HP-IB device, be sure to cycle power on the device before attempting to address it. 6. Turn power on to your computer. 7. Create the character special device file for your peripheral. Using the select code, bus address, unit number, and volume number from step 4, create the device file by typing in a line with the folloWing form: /etc/mknod /dev/device-file_name c 21 OxScBaUV I Return I Make the character special device file name meaningful, such as plotter or the devices model number. c Use c to create a character special device file. 21 The major number is always 21 for plotters and digitizers. OxScBaUV The addressing (also called minor number) consists of a select code (Sc), HP-IB address (Ba), unit number (U), and volume number (V). The Ox tells AXE that this is a hexadecimal number. You can find these numbers from the worksheet you filled out while installing the mass storage device. For each possible HP-IB address where hard discs may be located, there can be several minor numbers. 98515-90000, rev: 4/86 The AXE System Administration 255 8. Change the permissions on the new file by typing: chmod 666 Idevldevice_file_name I Return I 9. Make sure your kernel contains the hpib kernel driver. See "Creating a New Operating System" for a description on how to add drivers to AXE. If you created the maximum kernel you will have all the drivers installed. Check the /etc/conf/dfile file for the list of installed drivers. 256 The AXE System Administration 98515-90000, rev: 4/86 Shutting Down the System Improperly powering down the computer (or an "on-line" mass storage device) can cause the file system to become corrupt. shutdown(lM) terminates, in an orderly and cautious manner, all processes currendy running on the system. This aiiows you to power down the system hardware without adversely affecting the file system. The shutdown(1M) command - among other things - kills all unnecessary processes, forces the contents of the file system's I/O buffers to be written to the disc (with the sync(1) command), and takes the system into the single-user state. It will also optionally halt or reboot the system. To shutdown the system from a normal operating mode, perform the following steps. 1. Login as the super-user root. See "Becoming the Root User" in this chapter for more information on how to become the super-user. 2. Move to the root directory of the file system by entering the command: ed / I Return 1 3. Execute the shutdown command. The shutdown command allows you to specify a grace_period, which is the number of seconds you want shutdown to wait before terminating all processes. You can also use the -r option to automatically reboot the system after reaching run-level "s", or the -h option to halt the system. The shutdown command looks like (see the examples below): fete/shutdown [-rl-hl grace_period I Return 1 If grace_period is non-zero, shutdown prompts to see whether you wish to send the standard broadcast message or enter your own message. If you elect to send your own broadcast message, type the message on the terminal. When you are finished typing the message, press I Return I. Then hold the I CTRL 1key depressed as you press [QJ to signify the end of the message. If grace_period is omitted, then after waiting the specified amount of time, shutdown asks if you want to continue. When shutdown completes its task, it displays a message telling you to halt the system when you are ready. 4. If you have halted the system (shutdown -h) you may now power down the system if you wish. If you wish to bring the system back up, go to step 5. The AXE System Administration 257 If you have not halted the system, and you wish to power down the system, you have two alternatives: a. If you ran shutdown without the -h option, you are now in run-level s, and can halt the system by typing in: reboot -h I Return I b. If you have not yet run the shutdown program, you are still in the normal operating run-level, and can halt the system by typing in: shutdown -h I Return I 5. If you do not wish to power down the system, and now need to resume normal operating run-level, you should type in: reboot I Return I For example: • To activate a newly configured kernel, you should shutdown the system with no grace period, and automatically reboot: shutdown -r 0 I Return I • If you wish to install an interface card, halt the system by typing: shutdown -h 0 I Return I Wait for the "halted" message, then turn the power off to the computer. • If you wish to backup your system, you should change to run-level "s" by typing: shutdown 0 I Return I After running backup, bring the system back up with all the daemons running by typing: reboot I Return I NOTE Do not execute shutdown -r from run-level "5". You must reboot using the reboot command. 258 The AXE System Administration • If you wish to halt the system from run-level "s" with no daemons or programs running, type: reboot -h I Return j Updating AXE This section describes the steps necessary to update your AXE system, as well as how to install optional products such as the SRM access utilities (Shared Resource Manager), LAN (Local Area Network) and optional partitions of your operating system. Since the process of updating or installing optional products could involve changes to the AXE kernel, you should carefully follow the preparatory steps below before proceeding. Note that the procedure is exactly the same for updating and for optional product installation. An overview of the entire update procedure is: 1. prepare the system for an update, 2. locate the product (optional product, operating system update, or optional partition), 3. load the update tools if you are updating your operating system, 4. perform the update, 5. exit the update program, 6. Check for additional information in the Installation Notes or in the file called /etc/newconfig/Update_info. Each of these 6 steps is discribed in the following subsections. The AXE System Administration 259 Preparing to Update To make sure can recover your system in case anything goes wrong during the update, perform the following steps: 1. Stop all unnecessary processes by typing: shutdown grace_period I Return I where grace_period is the number of seconds you wish to wait. 2. Back up your file system If you make a mistake while updating your system, you should be able to recover all of your data if you have adequately backed up your system. See the Backing up and Restoring the File System section of Chapter 9. 3. Do an fsck Following the guidelines in "Checking Your File System" in Chapter 9, do a file system check using the fsck command. If the fsck showed no problems with your file system, and your system is in single-user mode, you are ready to begin the update and optional product installation process. 4. Find /dev Major and Minor Numbers You need to know the major and minor numbers of the drive used to read the update media, and for the hard disc being updated as well. Be sure you know the correct values of these numbers before you continue. You can obtain this information by typing: 11 / dey / source / dey / dest I Return I where source is the cartridge tape drive or flexible disc drive your update will be loaded from, and dest is the hard disc you will be updating (probably your root disc). Make sure you write these values down, because the /etc/update program uses screen menus-you won't be able to "scroll" back to find these numbers. 260 The AXE System Administration Locate and Write-protect the Product You will be performing the update either with cartridge tape or with flexible discs. If your update is on cartridge tape, locate the write-protect mechanism (labeled "SAFE") on the top, rear, left-hand corner of the cartridge tape. The arrow on the protect screw should point toward the word SAFE. If it does not, use a coin or screwdriver to turn the protect screw such that the arrow points toward the word SAFE. Place this tape in the CS/80 data cartridge drive connected to your system with the SAFE label in the rear left hand corner. Only the BUSY and PROTECTED indicators should now be lit. The drive will begin a cartridge tape conditioning sequence that takes approximately two minutes. Do not proceed until the busy light remains off. If your update is on flexible discs, locate the write-protect mechanism on the label end, and the back side of the disc. Slide the write protect shutter toward the label end of the disc, so you uncover the write protect hole. Holding the flexible disc with the label up and toward you, insert the disc into your disc drive. Load the Update Tools The update tools need to be loaded ONLY if you are updating your operating system with a new set of media. If you are adding an optional partition or loading an optional product, you do not need to load the update tools. If you are not updating your operating system, go to the section called "Perform the Update". If you are updating your operating system, type in: lifcp -a /dev/source:GETTOOLS /tmp/gettools I Return chmod 700 /tmp/gettools lReturnl /tmp/gettools /dev/source I Return I rm /tmp/gettools I Return I I where the device / dey / source is the special device file name assigned to the same cartridge tape or flexible disc drive you just inserted the update media in. Executing /tmp/gettoo/s causes any new tools related to the update process to be extracted from the media and put into your current file system. This could take from one to several minutes to complete. The AXE System Administration 261 Perform the Update NOTE Before you perform the update, you must have completed the preperatory steps to ensure your system is ready. You must have copied the major and minor numbers of the cartridge tape drive or flexible disc drive the update will be on, and the major and minor numbers of the disc you will be performing the update to (usually your root disc). If you have a non-HP terminal, you MUST execute the update program with a -m option. This will turn off all the menus in the update program. You will be prompted for the appropriate chOices, rather than see the menu, on your screen. 1. Type in: fete/update I Return I Your system will reboot to remove any remaining processes. You will see your normal boot messages, and then the screen should clear and the menu shown in Figure 10-5 will appear. This is the main update utility menu. All update procedures are treated as sub-tasks from this menu. 262 The AXE System Administration ******************************************************************* HP-UX UPDATE UTILITY -- MAIN MENU ******************************************************************* Select Choice Source device is: /dev/update.src Destination device is: /dev/update.dest Maj or: -1 Major: -1 Minor: ffffffff Minor: ffffffff DISPLAY options for a new partition EXIT update CHANGE source device CHANGE destination device Figure 10-5. Main Utility Menu Note the four softkeys at the bottom of your screen: • NEXT will move the highlight to the next item in each menu. • PREVIOUS will move the highlight to the previous item in each menu (the item listed above the current item). • SELECT will execute the currently highlighted option. • QUIT will exit the update program at any time. Both the source and destination device have the major number listed as -1 and the minor number as ffffffff. This prevents you from accidentally accessing the wrong device. Since these are impossible values, you must enter the correct major and minor numbers, which you should have written down earlier. The AXE System Administration 263 2. CHANGE the source device. By using the NEXT and PREVIOUS softkeys, choose the "CHANGE source device" option on the main menu and press SELECT. You will see the top half of the menu shown in Figure 10-6. ************************************************************* HP-UX UPDATE UTILITY -- CHANGE DEVICE MENU ************************************************************* Current source device address is: NEW NEW NEW NEW NEW Major: -1 Major Number? Select Code? Bus Address? Unit Number? Volume Number? Minor: ffffffff 4 7 4 o 0 Figure 10-6. Change Device Menu As you are prompted for each item, enter the source device's major number, select code, bus address, unit and volume numbers in decimal format. You have these numbers written down in hexidecimal format. In our example the major number was 4, and the minor number was Ox070400 in hexadecimal format (do not type in any leading zeros for these values). The minor number has the format: OxScBaUV where Ox indicates the number is in base 16, Sc is the select code, Ba is the bus address, U is the unit number, and V is the volume. 264 The AXE System Administration Once you have entered the volume number, the main menu will appear. Notice that the new source device values are now shown. Check that the values shown on the menu match those you have written down. It is possible that you could make a mistake while converting from hexadecimal to decimal format. 3. CHANGE the destination device. Use the NEXT and PREVIOUS softkeys to choose the "CHANGE destination device" option on the menu and press SELECT. You should now see a screen very similar to the menu shown in Figure 10-6, only you will be changing the destination device rather than the source device. In exactly the same manner as you just changed the source device, enter the new destination device major and minor numbers, which you have written down. We will use major number 0 and minor number OxOe0500 in our example. Once you have entered the new volume number, the update program will attempt to mount the device you have listed at that address. If it is the root device (which is the normal case), the following prompt will appear near the bottom of the console: Cannot mount the destination device. Is this the ROOT device? ('y'or'n'»> Because the method of updating the root disc versus another hard disc is different, you must tell the program that you are indeed updating the root volume by typing W. Otherwise, you should enter an ~. Once you have entered the correct addresses for the source and destination devices, you see these values reflected in the main menu, similar to our example menu in Figure 10-7. If either of these values are. wrong, you can go back to change either the source or the destination device. Do not continue if you are unsure of these values! Use the QUIT softkey if you are not sure of these device addresses, and go back to step 1 to begin again. The AXE System Administration 265 ******************************************************************* HP-UX UPDATE UTILITY -- MAIN MENU ******************************************************************* Select Choice Source device is: /dev/update.src Destination device is: /dev/update.dest Major: Major: 4 Minor: 70400 o Minor: e0500 DISPLAY options for a new partition EXIT update CHANGE source device CHANGE destination device Figure 10-7. Main Menu After Changing Devices 266 The AXE System Administration 4. Choose the "DISPLAY" option. Using the NEXT and PREVIOUS keys, choose the "DISPLAY options for a new partition" menu item and press SELECT. The update procedure will now read the update tape or flexible disc to get a list of available options, which takes a couple of minutes. You should see the screen shown in Figure 10-8. **************************************************** HP-UX UPDATE UTILITY -- READING FILE MENU **************************************************** reading Please insert media for a new partition. When the busy light goes off, press [Return] Figure 10-8. Reading File Menu Press I Return I. The update procedure will read the tape or flexible disc, and a new main menu will appear. If you are performing the update from cartridge tape, perform steps 5 and 6, then go to step 8. If you are performing the update from flexible discs, skip steps 5 and 6, go to step 7. The AXE System Administration 267 5. If you are updating from flexible disc, go to step 7. The new menu is similar to the menu shown in Figure 10-9. ******************************************************************* HP-UX UPDATE UTILITY -- MAIN MENU ******************************************************************* Select Choice Load "98515A" partition Load "SYS_CORE" partition Process ALL partitions DISPLAY options for a new partition EXIT update CHANGE source device CHANGE destination device Figure 10-9. Partition Menu for Update on Cartridge Tape • If you wish to process all the partitions, use the NEXT and PREVIOUS softkeys to move to the "Process ALL partitions" menu item, and press the SELECT softkey. The update program will automatically load all partitions and file sets. You will be prompted when to change media, and will be returned to the menu in Figure 10-7 when everything is loaded. It takes approximately 1 hour to process all filesets on one tape. You can then EXIT the update program. 268 The AXE System Administration • If you wish to "load" a partition, use the NEXT and PREVIOUS softkeys to move to the "Load xxxxxx partition" menu item, and press the SELECT softkey. Go to Step 6. • If you wish to display the options for a new partition, use the NEXT and PREVIOUS softkeys to move to the "DISPLAY options for a new partition" menu item, and press the SELECT softkey. The update procedure will now read the update tape to get a list of available options, which takes a couple of minutes. You should see the screen shown in Figure 10-9. • If you wish to exit the update procedure, use the NEXT and PREVIOUS softkeys to move to the "EXIT update" menu item, and press the SELECT softkey. 6. This step is performed if you chose to "Load" a partition from cartridge tape (see step 5). If you are updating from flexible disc, go to step 7. You will see a menu similar to that in Figure 10-10. On the new menu, notice a partition name on the upper left segment of the screen, and the list of product "file sets". Partition: Media Number: "SYSCORE" "1" *********************************************************** HP-UX UPDATE UTILITY -- FILE SET MENU *********************************************************** select choice Load "ACORE" fileset Load "ACORE2" fileset Process ALL file sets Use the [Quit] softkey to exit the menu Figure 10-10. File Set Menu for Updates on Cartridge Tape The AXE System Administration 269 At this point you have several options: • If you wish to load all the file sets at one time, use the softkeys to select the Process ALL file sets option. This procedure could take 20 to 60 minutes to load depending upon the processor and peripherals being used, and the partition being loaded. When finished, you will be returned to the fileset menu (Figure 1010). Press the QUIT softkey to exit. You will then return to the partition menu (Figure 10-9). • If you wish to load just the core system (baSically the update for AXE itself), use the softkeys to select the option similar to Load "ACORE" file set. Note that in each "Load xxxxxx" option, the xxxxxx is the product number or name for that file set. • If you wish to load the core system and certain optional products, select the options you want. You will select one loading option at a time. Each time, that fileset will be loaded, along with all dependencies, and you will return to the fileset menu. When you have loaded all the filesets you wish, press the QUIT softkey to exit. You will be returned to the partition menu (Figure 10-9). • If you wish to exit the fileset menu, press the QUIT soft key to return to the partition menu, Figure 10-9. The update program will immediately load this file set if it has never done so previously, but if it has, the update program will inform you that the product exists on your system and asks you if you want it removed. W will remove the old fileset, and re-Ioad the new one. Answering 0 will prevent this file set from being loaded. NOTE When loading the AXE operating system or SYS_CORE partition you should answer W for each piece queried. When the selected option is complete, the main menu (shown in Figure 10-9) will be re-displayed, but with one or more of the "load" options removed. Those options corresponding to the partitions you have completely loaded will not be displayed. 270 The AXE System Administration 7. Perform this step if you are updating from flexible discs. You will see a menu similar to that in Figure 10-11. On the new menu, notice a partition name on the upper left segment of the screen, and the list of product "file sets". r Partition: Media Number: "SYSCORE" "1" *********************************************************** HP-UX UPDATE UTILITY -- MAIN MENU *********************************************************** select choice Load "98515A" file set Load "ACORE" file set Process ALL file sets DISPLAY options for a new partition EXIT update CHANGE source device CHANGE destination device , Figure 10-11. File Set Menu for Updates on Flexible Disc At this point you have several options: • If you wish to load all the file sets at one time, use the softkeys to select the Process ALL file sets option. This procedure could take 20 to 60 minutes to load depending upon the processor and peripherals being used . • If you wish to load just the core system (basically the update for AXE itself), use the softkeys to select the option similar to Load "98515A" file set. Note that in each "Load xxxxxx" option, the xxxxxx is the product number or name for that file set. The AXE System Administration 271 • If you wish to load the core system and certain optional products, select the options you want. You will select one loading option at a time. Each time, that fileset will be loaded, and you will return to the fileset menu. When you have loaded all the filesets you wish, press the QUIT softkey to exit. You will be returned to the main menu (Figure 10-11). • If you wish to load more operating system partition, select the "DISPLAY options for a new partition" menu item. You will go back to the menu shown in Figure 10-7. Continue with step 4. • If you wish to abort the entire update procedure, select the "EXIT update" menu item. The update program will immediately load this file set if it has never done so previously, but if it has, the update program will inform you that the product exists on your system and asks you if you want it removed. W will remove the old file set, and re-Ioad the new one. Answering GQ will prevent this file set from being loaded. NOTE When loading the AXE operating system or the ACORE fileset, you should answer W for each piece queried. When the selected option is complete, the main menu (similar to the menu shown in Figure 10-11) will be re-displayed, but with one or more of the "load" options removed. Those options corresponding to the file sets you have already loaded will not be displayed. If you decided to load all the file sets, there will be no "load" options displayed. 272 The AXE System Administration 8. Leave the update program. If you have loaded all the partitions you want in this session, select the EXIT update option on the main menu. The program will inform you that it is unloading the media, which will take a few minutes. The system will reboot. NOTE Do not cycle power during the reboot. The reboot of your system may appear to take longer than normal. This is because the first time you reboot after doing an update, scripts execute which customize your system for the updated products you installed. 9. Check for additional information. Following this reboot process, you should log in and check to see if you have files in /etc/newcontig/Update_into. Also look for any other update files in the letc/newconfig folder or in the /tmp/update.iog file. Follow instructions in these files, and instructions in the Installation Notes, if supplied. The file called README contains useful information about your updated system. 98515-90000, rev: 4/86 The AXE System Administration 273 Setting Up Peripheral Devices: General Information This section shows the necessary kernel driver and major number for your peripheral's product number. Use the reconfig program to add kernel drivers to your operating system (refer to "Creating a New Operating System" in this chapter). If you create the maximal operating system, you will have access to all the kernel drivers listed below. For each peripheral, you also need to set up a device file. The device file should be created in the / deu directory using the instructions in the "Setting Up" section for your peripheral. In the tables in this section, Nj A means "Not Applicable". If you are using some products (for example the Mouse) you do not need to configure a kernel driver since the driver is automatically included in every kernel. Only mass storage devices require a block-mode major number, so for all other products, that item is not applicable. If you don't know what interface your peripheral device is connected to, or can't decide which interface to connect it to, read the information for your peripheral in the Peripheral Installation Guide. Hard Disc Drives, Cartridge Tape Drives, and Flexible Disc Drives Table 10-8 shows the kernel driver and major device number for hard disc drives, cartridge tape drives, and flexible disc drives. Most of these devices are called C5/80 devices, which stands for Command Set 80, or 55/80 devices, which stands for SubSet 80. CS80 and SS80 are the only devices that are supported for booting the operating system. Hewlett-Packard also has Amigo drives. In addition to the cs80 or amigo kernel driver as shown in Table 10-8, you must have the kernel driver of the HP-IB interface the mass storage drive is connected to. If your drive is connected to the internal HP-IB you need the kernel driver 98624. If your drive is connected to the high-speed HP-IB you need the kernel driver 98625. Some of the amigo drives can only be used with the 98624 kernel driver. The hard disc your AXE system is on (a cs80 disc) should be connected to the high-speed HP-IB disc interface if you have it. 274 The AXE System Administration 98515-90000, new page: 4/86 Table 10-8: Kernel Drivers and Major Device Numbers for Hard Disc Drives, Cartridge Tape Drives, and Flexible Disc Drives Product Number HP 7907 HP 7908 HP 7911 HP 7912 HP 7914 HP 7933 HP 7935 HP 7936 HP 7937 HP 7941 HP 7942 HP 7945 HP 7946 HP 7947A HP 7949A HP 7960A HP 9122 HP9123D HP9125 HP 9133D/H/L HP 9134D/H/L HP 9142 HP 9144 HP 9154 HP 82901 HP82902 HP 9121 HP 9133A/B/V /XV HP 9134A/B/XV HP 9135 HP9138A HP9895 98515-90000, new page: 4/86 Kernel Driver cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 cs80 amigo amigo amigo amigo amigo amigo amigo amigo Block-mode Major Number 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 2 2 2 2 2 2 Char-mode Major Number 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 11 11 11 11 11 11 11 11 The AXE System Administration 274.1 9-Track Tape Drives In addition to the tape or stape kernel driver as shown in Table 10-9, you must include the kernel driver for the HP-IB you have the tape drive connected to. The tape drives using the tape kernel driver require the 98624 kernel driver. The tape drives using the stape kernel driver require either the 98624 or the 98625 kernel driver. Table 10-9: Kernel Drivers and Major Device Numbers for 9-Track Tape Drives Block-mode Major Number Char-mode Major Number HP7970 Device Driver tape N/A HP 7971 tape N/A 5 5 9 9 Product Number HP7974 stape N/A HP 7978 stape N/A Terminals The kernel driver needed by your terminal is the kernel driver for the interface card the terminal is connected to. The interface card kernel drivers to choose from are: 98628, 98642, or 98626. For example: if your terminal is connected to a HP 98642 Mux Card, you need kernel driver 98642. Table 10-10: Kernel Drivers and Major Device Numbers for Terminals Product Number All Terminals 274.2 Device Driver Block-mode Major Number 98628/98642/98626 N/A The AXE System Administration Char-mode Major Number 1 98515-90000, new page: 4/86 Printers In addition to the printer or ciper kernel driver as shown in Table 10-11, you need the kernel driver of the interface card the printer is connected to. If your printer is connected to an HP-IB card, you must have the 98624 kernel driver. If your printer is connected to and RS-232 card, you must have the 98626, 98628, or 98642 kernel driver. You should use the reconfig program to set up your printers (refer to "Setting Up and Removing A Printer" in this chapter). The reconfig program will create the correct device file. However, you must make sure the correct kernel driver exists in your system. Printers that are connected to an HP-IB card and are using graphics mode should use the character-mode major number of 21 and need the hpib kernel driver. Table 10-11: Kernel Drivers and Major Device Numbers for Printers Product Number HP 2225 HP 2245 HP 2601 HP 2602A HP 2631 HP 2671A/G HP 2673 HP 2686 HP 2932 HP 2933 HP 2934 HP82905 HP82906 HP9876 HP 2563 HP 2565 HP 2566 HP 2567 HP 2608S 98515-90000, new page: 4/86 Device Driver printer printer printer printer printer printer printer printer printer printer printer printer printer printer ciper ciper ciper ciper ciper Block-mode Major Number N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A Char-mode Major Number 7 7 7 7 7 7 7 7 7 7 7 7 7 7 26 26 26 26 26 The AXE System Administration 274.3 Plotters and Digitizers In addition to the hpib kernel driver shown in Table 10-12, you must include the 98624 kernel driver for the HP 98624 HP-IB your plotter or digitizer is connected to. Table 10-12: Kernel Drivers and Major Device Numbers for Plotters and Digitizers Product Number Kernel Driver Block-mode Major Number Char-mode Major Number All Plotters and Digitizers hpib N/A 21 Data Communications The LAN kernel drivers are not included in your AXE system. You have these drivers ONLY if you have purchased (and installed) LAN. Table 10-13: Kernel Drivers and Major Device Numbers for Data Communications Product Number Kernel Driver Block-mode Major Number Char-mode Major Number LAN ieee802 N/A 18 LAN ethernet N/A 19 SRM srm N/A 13 RJE rje N/A 15 Miscellaneous HP-HIL devices include the HP Touch Bezel, Bar Code Reader, Keyboards, Mouse, and Control Knobs. Table 10-14: Kernel Drivers and Major Device Numbers for Miscellaneous Devices Product Number HP98622 274.4 Kernel Driver gpio Block-mode Major Number Char-mode Major Number N/A 22 HP Windows/9000 pytmas / ptyslv N/A N/A HP-HIL devices N/A 23/24/25 N/A The AXE System Administration 98515-90000, new page: 4/86 Appendices Appendix A: System Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 275 Appendix B: List of vi Commands ....................................... 277 Appendix C: Window Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 283 Appendix D: Partitions and File Sets Recovering Lost Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 285 Partitions and Their File Sets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 291 Appendix E: Determining Swap Size What is Swap Space? .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 305 Determining the Amount of Swap Space You Need ........................ 306 Appendix F: Installing Applications ...................................... 309 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 313 Subject Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 325 A System Commands This appendix lists the system commands. These are commands entered on the keyboard and are intended for the user who wishes to use AXE in detail. To get a more detailed description of some of the commands and options, use the man command (if the AMANUAL file set is loaded), type: man command_name I Return I where command_name is one of the commands in the following list. accept asa awk backup backupf banner basename bfs bif bifchgrp bifchmod bifchown bifcp biffind biffsck bifls bifmkdir bifmkfs bifrm bifrmdir brc cancel cat cd chgrp chmod chown chroot c1ri cmp config cp cpio csh cut" date do devnm dirname disable ~9 echo ed edit enable ex expr false find fold fsck fscIean getty grep help hostname hp init intro ipcr ipcs killall lif lifcp lifinit Iifls lifrename Iifr line In login Ip Ipadmin Ipmove Ipsched Ipshut Ipstat Is man mediainit mkdev mkdir mkfs System Commands 275 mknod more mount mv mvdir newfs nice pam passwd pr ps pwd reboot reconfig red reject rm 276 System Commands rmdir rsh sed setmnt sh shutdown sleep sort stty su swapon sync syncer tabs tail tar tcio tee touch tr true tset umask umount uname vedit vi view wc what whereis which who whoami B List of vi Commands This appendix contains commands for the optionally loaded ACMD me set {ACMD me set must be loaded for vi to work}. The symbol is used to represent I CTRL I. When you see something like p, it is the same as ~. A A Command(s) Description Entering vi vi filename Enter vi; filename is the name of the file you wish to create or edit. Moving The Cursor k or Ap Move cursor up. j, Aj, or An h, Ah, or I Back space 1 or Space Move cursor down. I Move cursor left. Move cursor right. w or W Move cursor to next word. b or B Move cursor to previous word. e or E Move cursor to end of next word. o Move cursor to first column in current line. n: Move cursor to column n of current line. A (hat) Move cursor to last character in current line. $ + Move cursor to first character in current line. or I Return I Move cursor to first character in next line. Move cursor to first character in previous line. G Move cursor to last line in file. nG Move cursor to line n in file. Move cursor to previous sentence. Move cursor to end of next sentence. { Move cursor to previous paragraph. } Move cursor to end of next paragraph. List of vi Commands 277 Section Positioning Mark a section by placing a { in the first section. [[ Move cursor to beginning of previous section. ]] Move cursor to end of next section. Cursor Placement on Screen and Adjusting the Screen H Move cursor to top line of screen. nH Move cursor to line n from top of screen. M Mve cursor to middle of screen. L Move cursor to bottom line of screen. nL Move cursor to line n from bottom of screen. Move screen up one line. e Move screen down one line. Move screen up 1/2 page. -d Move screen down 1/2 page. -b Move screen up one page. -f Move screen down one page. -1 Redraw screen. I Return I nz I Return I z. I Return I nz. I Return I z- I Return I nz - I Return I Make current line top line on screen. z Make line n top line in screen. Make current line middle line in screen. Make line n middle line in screen. Make current line bottom line in screen. Make line n bottom line in screen. Placing Marks in the Text m{a-z} Mark current position with name {a-z}. • {a-z} Move cursor to position with name (a-z). Move cursor to where you were before the last / ? or G command. 278 List of vi Commands Searching Move cursor to beginning of balancing 0, [], or {}. fcharacter Move cursor forward in current line to character. Fcharacter Move cursor backward in current line to character. Move cursor forward in current line to character before char- tcharacter acter. Move cursor backward in current line to character after char- Tcharacter acter. / string I Return I ?string I Return I : se ic I Return I : se noic I Return I Find string. Find in reverse, string. Ignore case when searching. Pay attention to case when searching. Using Regular Expressions in Searching : se magic I Return : se nomagic I I Return I Turn on regular expressions. Turn off regular expressions. Include these special characters in search string: At beginning of string, match beginning of line. $ At end of string, match end of line. Match any character. \< Match beginning of word. \> Match end of word. [string] Match any single character in string. [-string] Matches any character not in string. [x-y] Match any character between x and y. * Match any number of the preceeding pattern. List of vi Commands 279 Inserting Text I ESC I Atext I ESC I itext I ESC I Itext I ESC I otext I ESC I Otext I ESC I atext Insert text after cursor. Insert text after end of current line. Insert text before cursor. Insert text before beginning of current line. Insert a new line of text after current line. Insert a new line of text before the current line. Deleting Text -h or I Back space I While typing text, delete previous character. While typing text, delete previous word. x Delete current character. nx Delete next n characters, beginning with current. x Delete previous character. nX Delete previous n characters. dw Delete next word. db Delete previous word. dd Delete current line. ndd Delete next n lines, including current. D Delete rest of current line. dcursor command Delete text from current position to cursor command position. Copying Text yy or Y Yank current line; see Placing Text. nY Yank next n lines. ycursor command Yank from current position to cursor command position. Placing Text p Place yanked text after cursor. p Place yanked text before cursor. 280 List of vi Commands Changing Text rcharacter Replace next character with character. I ESC I stext I ESC I cwtext I ESC I cctext I ESC I Ctext I ESC I Replace next characters with text. Rtext ccursor commandtext I ESC I Substitute text for next character. Change next word to text. Change current line to text. Change rest of current line to text. Change text from current position to cursor command position to text. Joining Text J Join next line to end of current line. nJ Join next n lines together. Indenting Text -d While typing text, back up over supplied indentation. O-d While typing text, delete all supplied indentation. -i or I Tab I I Return I noai I Return I sw=n I Return I While typing text, insert one shift width. : se ai Turn on auto-indentation. : se Turn off auto-indentation. : se Set the shift width to n characters. « Shift one line left by one shift width. n« Shift n lines left by one shift width. » Shift one line right by one shift width. n» Shift n lines right by one shift width. < or > can be used with almost any cursor command to shift multiple lines left or right. List of vi Commands 281 Saving and Leaving vi ZZ I Return I or : x I Return I Save file and leave vi. or : wq : w I Return I : w name I Return Save file and do not leave vi. I I Return I : q! I Return I : r filename I Return I :q Save file to name and do not leave vi. Leave vi. Leave vi without saving any changes. Read filename into current file after current line. Other Commands u Undo last command. u Restore current line to previous state. n Repeat last multi-character search command. N Repeat, in reverse direction, last multi-character search command. Repeat last single-character search command. Repeat, in reverse direction, last single-character search command. Repeat last command which changed the file. Display status line. -vcharacter 282 List of vi Commands While typing text, insert character in the text without interpreting it (eg. a command character). c Window Commands This appendix lists the commands available for accessing HP Windows/9000 from the keyboard. Windows is an optional enhancement to your system. You will have had to order the correct memory requirements to run Windows on your system. These are commands entered on the keyboard and are intended for the user who wishes to use Windows in detail by changing window default values. For an overview of HP Windows/9000, and the commands it recognizes, type: man windows I Return I To get a more detailed description of the commands and options, use the man! command, type: man command_name I Return I where command_name is one of the commands described in the following table. Window Command Descriptions Command Name Description wborder Lets you change border style, colors, and/or label. wcreate Create a window without a shell and set up the environment. wdestroy Destroys a window. wdisp Lets you change one or more window position in the display stack, their concealment, and/or their representation (normal or icon). wfont Load and activate fonts. wlist List status of window or fonts. wmove Move one or more windows or their icons. wmready Reports whether the window manager is running. wmstart Bring up the window system. wmstop Leave the window system and kill all processes. wselect Select a window. wsh Create a new window, and set up reasonable environments. wsize Change the size of the specified window. 1 The man command is only available if you have the AMANUAL file set loaded. Window Commands 283 Notes 284 Window Commands Partitions and File Sets D Your set of AXE micro discs (or a single tape) demonstrates the concept of partitions. AXE is broken into partitions or parts and stored on micro discs (or on one tape). Each disc represents a subset or subsets of the whole AXE system. Each partition is composed of file sets. File sets are the smallest unit in installation. You can choose the file sets you want loaded onto the system. However, the file sets which make up the SYS_CORE partition are automatically loaded on your AXE system by the installation (see "Mandatory vs. Non-mandatory File Sets" below). After these file sets are loaded, you can load other file sets depending on your needs. By separating AXE into file sets, you can install only those file sets of AXE you will use (and save time and disc space). For example, if you do not plan to use a part of AXE (such as a text editor) you have the option of not loading the file set containing it on the system. Except for guarding against the possibility of trying to install partitions or file sets which will not fit on your hard disc, not much planning is required. In the installation procedure you have a great deal of flexibility in what you want on (or off) the system. This flexibility also means you have to make several key decisions when installing. Partitions and File Sets 285 How Partitions and File Sets Work You can think of partitions, file sets, and files as "building blocks" of the AXE system. The smallest unit of information in this scheme is a file. Groups of related files are grouped into file sets. File sets, in turn, are grouped into partitions. Finally, the partitions - taken as a whole - comprise the AXE system. As noted above, when you receive AXE, the system will be partitioned into color coded discs (if you received AXE in a set of micro discs). Each of the color-coded partitions represents a grouping of file sets; each file set represents a grouping of files. The following diagram illustrates the relationship between the AXE system. partitions. file sets, and files. SYS - CORE /bin/csh TEXT AWINDOW MISC - UTILS ACMD SYS - TOOLS ABCMD / etc/ chroot PROG - LANGS ASTARBAS / etc/newconfig AXE PARTITIONS IN FILE SETS SYS_ TOOLS PARTITION /bin/ed FILES IN ACMD FILE SET Figure D-l. AXE partitions, file sets and files. Dependent File Sets In some cases, one file set will depend on other file sets being present in the system. If such a dependency exists, the file set must be loaded along with (either before or after) the file set in question. When trying to load a file set that has a dependency, the computer informs you of the dependency. If necessary, the computer prompts you to insert a different disc to load from; it specifies which disc or tape to use. If more than one dependency exists, the computer may prompt for yet another disc to load from. File sets are never split among discs although a given file set may have dependencies on other discs. 286 Partitions and File Sets Mandatory vs. Non-mandatory Partitions Only one partition must be installed for your AXE system to function: SYS_CORE. This partition contains the ACORE file sets which in turn contain essential facilities and commands used by other file sets. All the other partitions contain optional file sets. The SYS_CORE partition is mandatory for the operation of AXE and wiii be automaticaiiy ioaded by the instaiiation procedure. it is on the micro discs which have no colored labels. You can run AXE with only this single partition loaded. All the other partitions are considered "non-mandatory"; they need not be installed for the proper operation of AXE. However, for most needs we recommend you install the SYS_TOOLS partition as well if you have enough disc space. This partition contains fundamental tools for file management, file manipulation, process control, peripheral support, and HP Windows/9000. The SYS_TOOLS partition is on the micro discs with the red labels. Besides these two partitions, loading all other partitions and file sets depends on your intended use of the system. This factor must be weighed against your other needs for available storage space on your hard disc (or RAM, Random Access Memory, in the case of HP Windows/9000). Which File Sets Do I Want? After reading about what a file set is, you need to determine which file sets you feel you want on the system. All of the file sets are listed in this appendix with a short description. As you read through the list, you may wish to mark the file sets you feel you want on the system. Then, during installation, you can refer to this list for the file sets you want installed. Partitions and File Sets 287 Recovering Lost Files Most of the commands in the AXE system are contained in the file sets documented in this appendix. If any of these commands are removed or somehow destroyed, you can use update to re-Ioad the file set containing the commands. In order to run update, you need to recover certain essential files. You can mount the installation media (tape or discs 1 and 2) and recover these files: Micro disc 1: etc/mkfs mediainit Micro disc 2: bin/cpio bin/mkdir bin/sh bin/pwd usr/bin/lifcp usr/bin/tcio etc/update etc/sysrm NOTE These files are not included in anyone file set. Therefore, you cannot use update to recover them. The files are essential for update to be able to run. So, if these files get destroyed, you must recover them before you can run update. Recovering Files If you installed from a cartridge tape: 1. Make sure the tape is writable. 2. Insert tape in drive; wait for the drive light to remain off. 3. Mount the tape to an empty folder using: mount /dev/ct /disc where /dev/ct is a block device. 288 Partitions and File Sets 4. Perform the following copies depending on the file you are recovering: NOTE You can copy any or all of these files if needed. ep ep ep ep ep ep ep ep ep ep /dise/ete/mkfs jete /dise/mediainit /usr/bin /dise/bin/epio /bin /dise/bin/mkdir /bin /dise/bin/sh /bin /dise/bin/pwd /bin /dise/usr/bin/lifep /usr/bin /dise/urs/bin/teio /usr/bin /dise/ete/update jete /dise/ete/sysrm jete 5. Type: sync 6. Type: umount /dev/et If you installed from micro discs: 1. Make sure the first two micro discs are writable. 2. Insert micro disc 1 (with the grey label); wait for the drive light to remain off. 3. Mount the micro disc to an empty folder: mount /dev/fd /dise where /dev/fd must be a block device. 4. Enter the commands: ep /dise/ete/mkfs jete ep /dise/mediainit /usr/bin 5. Unmount the first micro disc: umount /dev/fd 6. Insert micro disc 2 (grey label) into drive; wait for the drive light to remain off. Partitions and File Sets 289 7. Mount the micro disc to an empty folder: mount /dev/fd /dise where /dev/fd must be a block device. 8. Enter any or all of the following commands: ep ep ep ep ep ep ep /dise/bin/epio /bin /dise/bin/mkdir /bin /dise/bin/pwd /bin /dise/ete/update jete /dise/ete/sysrm jete /dise/usr/bin/lifep /usr/bin /dise/usr/bin/teio /usr/bin 9. Unmount the second micro disc: 290 Partitions and File Sets umount /dev/fd Partitions and Their File Sets The file set list is broken into sections, each representing a partition of the system. Within each section will be sub-sections which describe each file set, and list the files associated with the file set. During installation, the following files are stored. These are not present in a specific file set. They are loaded automatically. bin/mkdir bin/pwd bin/sh bin/epio usr/bin/mediainit usr/bin/teio usr/bin/lifep ete/mkfs PARTITION: SVS_CORE This partition is contained on the grey labeled micro discs. There are 6 micro discs to the SYS_CORE partition. These micro discs are mandatory for AXE installation and minimal operation (the file sets in this partition are loaded automatically). The first two micro discs are used for the installation procedure. FILE SET: 98515A Description: Mandatory file set. hp-ux etc/coni/diile system/9S616A/customize FILE SET: ACORE Description: Mandatory file set. bin/basename bin/date bin/expr bin/line bin/la bin/mY bin/paBswd bin/rm bin/rmdir bin/sed bin/stty bin/sync bin/who etc/coni/. amigo. help etc/conf/. ciper .help etc/coni/. del_user. help etc/coni/. exit .help etc/coni/. exit2 . help etc/coni/ .int. help etc/coni/. intro.help etc/coni/ .lp. help etc/coni/ .ncip.help etc/conf/. os_opt .help etc/conf/. plotter. help etc/ coni / . printer. help etc/ coni / . prod. help etc/conf/. security . help etc/coni/. stape. help etc/coni/. tape.help etc/coni/. term.help etc/coni/. user. help etc/init etc/initconiig usr/lib/mv_dir FILE SET: ACORE2 Description: Mandatory file set. bin/backupi Partitions and File Sets 291 bin/cat bin/dd bin/dirname bin/echo bin/find bin/grep bin/ipcrm bin/ipcB bin/kill bin/login bin/pB bin/Bleep bin/Bu etc/boot etc/devnm etc/fsck etc/fBclean etc/getanBwer etc/getty etc/killall etc/link etc/mknod etc/mount etc/mvdir etc/newconfig/.profile etc/newconfig/README etc/newconfig/Update_info etc /newconfig/backup et c /newc onf ig/bcheckrc etc/newconfig/brc etc/newconf ig/ checkliBt etc/newconfig/diBktab etc/newconfig/gettydefB et c / newconf ig/ group etc/newconfig/inittab etc/newconfig/motd etc/newconfig/multi_uBer etc/newconfig/paBswd etc/newconfig/profile etc/newconfig/pBtatuB etc/newconfig/qBtatuB etc/newconfig/rc etc/newconfig/Bingle_uBer etc/newconfig/ttytype etc/newfB etc/reboot etc/reconfig etc/Betmnt etc / shutdown etc/syncer etc/umount etc/unlink etc/wall 292 Partitions and File Sets FILE SET: ACORE3 Description: Mandatory file set. bin/chgrp bin/chIDod bin/chown bin/touch bin/uname bin/wc etc/Bwapon uBr/bin/banner u8r!bin!cut UBr /bin/hoBtname uBr/bin/tBet uBr/lib/hp2686a uBr/lib/hp2934a uBr/lib/terminfo uBr/lib/terminfo/1/100 uBr/lib/terminfo/1/110 uBr/lib/terminfo/1/160 uBr/lib/terminfo/1/1620 uBr/lib/terminfo/1/1621 uBr/lib/terminfo/1/1620 uBr/lib/terminfo/1/1620-m8 uBr/lib/terminfo/1/1640 uBr/lib/terminfo/1/1640-m8 uBr/lib/terminfo/1/1700 uBr/lib/terminfo/1/lline uBr/lib/terminfo/1/llinepty uBr/lib/terminfo/2/2382 uBr/lib/terminfo/2/2392 uBr/lib/terminfo/2/2393 uBr/lib/terminfo/2/2394 uBr/lib/terminfo/2/2397 uBr/lib/terminfo/2/2600 uBr/lib/terminfo/2/2621 UBr /li b/terminf 0/2/2621-48 uBr/lib/terminfo/2/2621-ba uBr/lib/terminfo/2/2621-fl uBr/lib/terminfo/2/2621-nl uBr/lib/terminfo/2/2621-nt uBr/lib/terminfo/2/2621-pb uBr/lib/terminfo/2/2621-wl uBr/lib/terminfo/2/2621A uBr/lib/terminfo/2/2621P uBr/lib/terminfo/2/2621a uBr/lib/terminfo/2/2621k46 uBr/lib/terminfo/2/2621nl uBr/lib/terminfo/2/2621nt uBr/lib/terminfo/2/2621p UBr /lib/terminf 0/2/2621 wI uBr/lib/terminfo/2/2622 uBr/lib/terminfo/2/2622a UBr /lib/terminf 0/2/2622p UBr /li b/terminf 0/2/2623 usr/lib/terminfo/2/2623a usr /li b/terminf 0/2/2623p usr /li b/terminf 0/2/2624 usr /lib/terminf 0/2/2624a usr/lib/terminfo/2/2624p usr/lib/terminfo/2/2626 usr/lib/terminfo/2/2626 usr/lib/terminfo/2/2626-12 usr /li b/terminf 0/2/2626-12- s usr /li b/ terminf 0/2/2626-12x40 usr /li b/terminf 0/2/2626-ns usr/lib/terminfo/2/2626-s usr/lib/terminfo/2/2626-x40 usr/lib/terminfo/2/2626A usr/lib/terminfo/2/2626P usr/lib/terminfo/2/2626a usr /lib/terminfo/2/2626p usr/lib/terminfo/2/2627 usr/lib/terminfo/2/2627a usr/lib/terminfo/2/2627p usr/lib/terminfo/2/2628 usr/lib/terminfo/2/262x usr /li b/terminf 0/2/2640 usr/lib/terminfo/2/2640a usr/lib/terminfo/2/2640b usr/lib/terminfo/2/2644 usr /li b/terminfo/2/2646 usr /li b/terminfo/2/2647 usr /li b/terminfo/2/2647F usr/lib/terminfo/2/2648 usr/lib/terminfo/2/2648A usr/lib/terminfo/2/2648a usr/lib/terminfo/2/2703 usr/lib/terminfo/2/2709 usr/lib/terminfo/3/3oo usr/lib/terminfo/3/300s usr/lib/terminfo/3/3046 usr/lib/terminfo/3/31 usr/lib/terminfo/3/3101 usr/lib/terminfo/3/33 usr/lib/terminfo/3/333 usr/lib/terminfo/3/36 usr/lib/terminfo/3/36 usr/lib/terminfo/3/37 usr/lib/terminfo/3/380 usr/lib/terminfo/3/382 usr/lib/terminfo/3/3a usr/lib/terminfo/3/3a+ usr/lib/terminfo/4/40 usr/lib/terminfo/4/4oo usr/lib/terminfo/4/4012 usr/lib/terminfo/4/4013 usr/lib/terminfo/4/4014 usr/lib/terminfo/4/4014-sm usr/lib/terminfo/4/4016 usr/lib/terminfo/4/4016-sm usr /li b/terminfo/4/4023 usr/lib/terminfo/4/4024 usr/lib/terminfo/4/4026 usr /li b/terminfo/4/4026-17 usr/lib/terminfo/4/4026-17ws usr/lib/terminfo/4/4026cu usr/lib/terminfo/4/4026ex usr/lib/terminfo/4/4027 usr/lib/terminfo/4/4027-17 usr/lib/terminfo/4/4027-17ws usr/lib/terminfo/4/4027cu usr/lib/terminfo/4/4027ex usr/lib/terminfo/4/4080 usr/lib/terminfo/4/4112 usr/lib/terminfo/4/4112-6 usr/lib/terminfo/4/4112-d usr/lib/terminfo/4/4112-nd usr/lib/terminfo/4/4113 usr/lib/terminfo/4/4114 usr /li b/terminf 0/4/42 usr/lib/terminfo/4/42-nl usr/lib/terminfo/4/43 usr/lib/terminfo/4/4424 usr/lib/terminfo/4/4424-2 usr/lib/terminfo/4/4424-el-2 usr/lib/terminfo/4/46 usr/lib/terminfo/4/460 usr/lib/terminfo/6/6620 usr/lib/terminfo/7 /736 usr/lib/terminfo/7 /743 usr/lib/terminfo/7 /746 usr /li b/terminf 0/8/8001 usr/lib/terminfo/8/8610 usr/lib/terminfo/9/9020 usr/lib/terminfo/O/012 usr/lib/terminfo/O/012-2p usr/lib/terminfo/O/0122p usr/lib/terminfo/O/012b usr/lib/terminfo/O/012c usr/lib/terminfo/O/012cc usr/lib/terminfo/O/020 usr/lib/terminfo/O/020-2p usr/lib/terminfo/O/0202p usr /lib/terminf 0/O/020b usr/lib/terminfo/O/020c usr/lib/terminfo/O/926 usr/lib/terminfo/O/060 usr/lib/terminfo/O/060-2p usr/lib/terminfo/O/060-4p usr/lib/terminfo/O/060-rv usr/lib/terminfo/O/060-rv-2p usr/lib/terminfo/O/060-rv-4p usr/lib/terminfo/O/0602p usr/lib/terminfo/O/0604p usr /lib/terminf 0/O/060rv Partitions and File Sets 293 usr/l1b/terminfo/9/96Orv2p usr/l1b/terminfo/9/96Orv4p usr/l1b/terminfo/9/9816te usr/l1b/terminfo/9/9816teb usr/l1b/terminfo/9/9826 usr /l1b/terminfo/9/9826i te usr/l1b/terminfo/9/9836 usr/l1b/terminfo/9/9836 usr /l1b/terminfo/9/9836i te usr/l1b/terminfo/9/9836te usr/l1b/terminfo/9/9836teb usr/l1b/terminfo/9/9837 usr/lib/terminfo/9/9837ite usr/l1b/terminfo/9/9846 usr/l1b/terminfo/9/98700 usr/l1b/terminfo/a/a980 usr/l1b/terminfo/a/aa usr/l1b/terminfo/a/aaa usr/l1b/terminfo/a/aaa-18 usr/lib/terminfo/a/aaa-18-rv usr/l1b/terminfo/a/aaa-20 usr/lib/terminfo/a/aaa-22 usr/l1b/terminfo/a/aaa-24 usr/lib/terminfo/a/aaa-24-rv usr/l1b/terminfo/a/aaa-26 usr/l1b/terminfo/a/aaa-28 usr/l1b/terminfo/a/aaa-29 usr/l1b/terminfo/a/aaa-29-ctxt usr/l1b/terminfo/a/aaa-29-np usr/l1b/terminfo/a/aaa-29-rv usr/l1b/terminfo/a/aaa-29-rv-ctxt usr/l1b/terminfo/a/aaa-30 usr/l1b/terminfo/a/aaa-30-ctxt usr/l1b/terminfo/a/aaa-30-rv usr/l1b/terminfo/a/aaa-30-rv-ctxt usr/l1b/terminfo/a/aaa-30-s usr/l1b/terminfo/a/aaa-30-s-ctxt usr/l1b/terminfo/a/aaa-30-s-rv usr/l1b/terminfo/a/aaa-30-s-rv-ct usr/lib/terminfo/a/aaa-36 usr/l1b/terminfo/a/aaa-36-rv usr/l1b/terminfo/a/aaa-40 usr/l1b/terminfo/a/aaa-40-rv usr/lib/terminfo/a/aaa-48 usr/l1b/terminfo/a/aaa-48-rv usr/l1b/terminfo/a/aaa-69 usr/l1b/terminfo/a/aaa-60 usr/l1b/terminfo/a/aaa-60-rv usr/lib/terminfo/a/aaa-60-s usr/l1b/terminfo/a/aaa-60-s-rv usr/l1b/terminfo/a/aaa-ctxt usr/lib/terminfo/a/aaa-db usr/lib/terminfo/a/aaa-rv usr/l1b/terminfo/a/aaa-rv-ctxt uu/l1b/terminfo/a/aaa-rv-unk 294 Partitions and File Sets usr/l1b/terminfo/a/aaa-s usr/lib/terminfo/a/aaa-s-rv usr/lib/terminfo/a/aaa-unk usr/lib/terminfo/a/aaa18 usr/l1b/terminfo/a/aaa20 usr/lib/terminfo/a/aaa22 usr/l1b/terminfo/a/aaa24 usr/l1b/terminfo/a/aaa26 usr/lib/terminfo/a/aaa28 usr /11 b/terminf 0/ a/ aaa29 usr/lib/terminfo/a/aaa30 usr/l1b/terminfo/a/aaa36 usr/lib/terminfo/a/aaa40 usr/lib/terminfo/a/aaa48 usr/lib/terminfo/a/aaa69 usr/l1b/terminfo/a/aaa60 usr/lib/terminfo/a/aaadb usr/lib/terminfo/a/act4 usr/lib/terminfo/a/act6 usr/lib/terminfo/a/act6s usr/lib/terminfo/a/addrinfo usr/lib/terminfo/a/adm1 usr /11 b/terminfo/ a/ adm1a usr/lib/terminfo/a/adm2 usr/l1b/terminfo/a/adm21 usr /li b/terminf 0/ a/ adm3 usr/11b/terminfo/a/adm31 usr/lib/terminfo/a/adm36 usr/lib/terminfo/a/adm3a usr/11b/terminfo/a/adm3a+ usr/11b/terminfo/a/adm3aplus usr/l1b/terminfo/a/adm42 usr/11b/terminfo/a/adm42-nl usr/lib/terminfo/a/adm6 usr/11b/terminfo/a/aed usr/l1b/terminfo/a/aed612 usr/11b/terminfo/a/agile usr /l1b/terminfo/ a/ agiles usr/l1b/terminfo/a/aj usr/11b/terminfo/a/aj830 usr/lib/terminfo/a/aj832 usr/l1b/terminfo/a/alto usr/11b/terminfo/a/altoh19 usr/lib/terminfo/a/altoheath usr/11b/terminfo/a/ambas usr /11 b/terminf 0/ a/ ambassador usr/l1b/terminfo/a/ampex usr/11b/terminfo/a/annarbor usr/lib/terminfo/a/ansi usr/11b/terminfo/a/apple usr/l1b/terminfo/a/arpanet usr/l1b/terminfo/b/bantam usr /lib/terminfo/b/bc usr/lib/terminfo/b/beacon usr/lib/terminfo/b/beehiveIIIIIl uBr/lib/terminfo/b/bg uBr/lib/terminfo/b/bg-ni uBr/lib/terminfo/b/bg-nv uBr/lib/terminfo/b/bg-rv uBr/lib/terminfo/b/bg1.26 uBr/lib/terminfo/b/bg1.26-nv uu/Hb/terminfo/b/bgl.26-rv uBr/lib/terminfo/b/bg2.0 uBr/lib/terminfo/b/bg2.0-nv uBr/lib/terminfo/b/bg2.0-rv uBr/lib/terminfo/b/bh3m UBr /lib/terminfo/b/bi tgraph UBr /lib/terminf o/b/bi tgraph -ni UBr /lib/terminfo/b/bi tgraph -nv uBr/lib/terminfo/b/bitgraph-rv UBr /lib/terminfo/b/bli t uBr/lib/terminfo/b/blit-pb UBr /lib/terminfo/b/bli tlayer uBr/lib/terminfo/b/buBBiplexer uBr/lib/terminfo/c/c100 uBr/lib/terminfo/c/c100-1p uBr/lib/terminfo/ c/ c100-4p UBr /li b/terminfo/ c/ c 100-rv UBr /lib/tenainfo/ c/ c 100-rv-4p uBr/lib/terminfo/c/c100-rv-4p-na UBr /lib/terminfo/ c/ c 100-rv-4p-pp UBr /li b/terminf 0/ c/ c 100-rv-na UBr /li b/ terminf 0/c/ c 100-rv-pp UBr /lib/terminfo/ c/ c 1004p uBr/lib/terminfo/c/c100rv UBr /lib/terminfo/ c/ c 100rv4p UBr /li b/terminfo/ c/ c 100rv4pna uBr/lib/terminfo/c/c100rv4ppp UBr /lib/terminfo/ c/ c 100rvna uBr/lib/terminfo/c/c100rvpp uBr/lib/terminfo/c/c100rvB uBr/lib/terminfo/c/c100B uBr/lib/terminfo/c/c104 UBr /lib/terminfo/ c/ c 10S uBr/lib/terminfo/c/c10S-4 UBr /lib/terminfo/ c/ c 10S-4p uBr/lib/terminfo/c/c10S-S uBr/lib/terminfo/c/c1OS-Sp UBr /li b/terminf 0/ c/ c 10S-Sp-na UBr /li b/terminf 0/ c/ c 10S-Sp-rv-na usr/lib/terminfo/c/clOS-na uBr/lib/terminfo/c/c10S-na-Sp UBr /lib/terminfo/ c/ c 1OS-rv uBr/lib/terminfo/c/c10S-rv-4p uBr/lib/terminfo/c/c10S-rv-Sp UBr /li b/terminfo/ c/ c 10S-rv-na UBr /lib/terminfo/ c/ c 10S-rv-na -Sp uBr/lib/terminfo/c/c1OS-w uBr/lib/terminfo/c/c10S-w-Sp uBr/lib/terminfo/c/ca uBr/lib/terminfo/c/ca22S61 uBr/lib/terminfo/c/carlock uBr/lib/terminfo/c/cb-unix uBr/lib/terminfo/c/cbblit uBr/lib/terminfo/c/cbunix uBr/lib/terminfo/c/cdc uBriHbiterminfo/c/cdc466 uBr/lib/terminfo/c/cdc466tBt uBr/lib/terminfo/c/cdi uBr/lib/terminfo/c/cdi1203 uBr/lib/terminfo/c/cg7000 UBr /lib/terminf 0/ c/ chromatic B uBr/lib/terminfo/c/ciS610 UBr /lib/terminfo/ c/ ci toh uBr/lib/terminfo/c/citoh-61pi uBr/lib/terminfo/c/citoh-Slpi UBr /lib/terminfo/ c/ ci toh -comp uBr/lib/terminfo/c/ci toh-eli te UBr /lib/terminfo/ c/ ci toh -pica uBr/lib/terminfo/c/citoh-prop UBr /lib/terminfo/ c/ ci toh -PB UBr /li b/terminf 0/ c/ compucolor2 uBr/lib/terminfo/c/compucolorii uBr/lib/terminfo/c/concept uBr/lib/terminfo/c/concept100 UBr /li b/ terminf 0/ c/ concept 100-rv uBr/lib/terminfo/c/concept100-rvuBr/lib/terminfo/c/concept10S-4p UBr /li b/terminf 0/c/ concept 10S-Sp uBr/lib/terminfo/c/concept10S-naUBr /lib/terminf 0/ c/ concept 108-rvuBr/lib/terminf 0/ c/ concept 10S-w-S uBr/lib/terminfo/c/ctS2 uBr/lib/terminfo/c/ctS600 uBr/lib/terminfo/d/d100 uBr/lib/terminfo/d/d132 uBr/lib/terminfo/d/d200 uBr/lib/terminfo/d/dSO uBr/lib/terminfo/d/dSOO uBr/lib/terminfo/d/datagraphix uBr/lib/terminfo/d/datamedia2600 uBr/lib/terminfo/d/datapoint uBr/lib/terminfo/d/dataspeed40 uBr/lib/terminfo/d/dd6000 uBr/lib/terminfo/d/debug uBr/lib/terminfo/d/decwriter uBr/lib/terminfo/d/delta uBr/lib/terminfo/d/dg uBr/lib/terminfo/d/dg6063 uBr/lib/terminfo/d/diablo uBr/lib/terminfo/d/dialogue uBr/lib/terminfo/d/dialogue80 uBr/lib/terminfo/d/dialup uBr/lib/terminfo/d/digilog uBr/lib/terminfo/d/direct Partitions and File Sets 295 u8r/1ib/terminfo/d/direct800 u8r/lib/terminfo/d/dm1620 u8r/lib/terminfo/d/dm1621 u8r/lib/terminfo/d/dm2600 u8r/lib/terminfo/d/dm3026 u8r/lib/terminfo/d/dm3046 u8r/lib/terminfo/d/dm80 u8r/lib/terminfo/d/dm80-w u8r/lib/terminfo/d/dmdt80 U8r /lib/terminf 0/d/ dmdt80-w u8r/lib/terminfo/d/dp3 u8r/lib/terminfo/d/dp3360 u8r/lib/terminfo/d/d840 u8r/lib/terminfo/d/d840-2 u8r/lib/terminfo/d/dt80 u8r/lib/terminfo/d/dt80-w u8r/lib/terminfo/d/dtc u8r/lib/terminfo/d/dtc3008 u8r/lib/terminfo/d/dtc382 u8r/lib/terminfo/d/dumb u8r/lib/terminfo/d/dw u8r/lib/terminfo/d/dw1 U8r /li b/ terminf 0 / d/ dw2 u8r/lib/terminfo/d/dw3 u8r/lib/terminfo/d/dw4 u8r/lib/terminfo/e/env230 U8r /lib/terminfo/ e/ envi8ion230 u8r/lib/terminfo/e/ep40 u8r/lib/terminfo/e/ep4000 u8r/lib/terminfo/e/ep4080 u8r/lib/terminfo/e/ep48 u8r/lib/terminfo/e/e8prit u8r/lib/terminfo/e/ethernet U8r /lib/terminfo/ e/ ex3000 u8r/lib/terminfo/e/exidy u8r/lib/terminfo/e/exidy2600 u8r/lib/terminfo/f/f100 u8r/lib/terminfo/f/f100-rv u8r/lib/terminfo/f/f1720 u8r/lib/terminfo/f/f1720a u8r/1ib/terminfo/f/fa1co u8r/1ib/terminfo/f/fa1co-p u8r/lib/terminfo/f/fixterm u8r/1ib/terminfo/f/fox u8r/lib/terminfo/f/freedom u8r/lib/terminfo/f/freedom-rv U8r /li b/terminf off / freedom100 u8r/lib/terminfo/g/gigi u8r/lib/terminfo/g/gsi u8r/lib/terminfo/g/gt100 u8r/lib/terminfo/g/gt100a u8r/1ib/terminfo/g/gt40 u8r/lib/terminfo/g/gt42 u8r/lib/terminfo/h/h1000 u8r/1ib/terminfo/h/h1420 296 Partitions and File Sets u8r/lib/terminfo/h/h1600 u8r/1ib/terminfo/h/h1610 u8r/lib/terminfo/h/h1620 u8r/lib/terminfo/h/h1662 u8r/lib/terminfo/h/h1662-rv u8r/lib/terminfo/h/h19 u8r/lib/terminfo/h/h19-a U8r /li b/terminf 0/h/h19-b u8r/lib/terminfo/h/h19-b8 u8r/lib/terminfo/h/h19-pb u8r/lib/terminfo/h/h19-8mu1 u8r/lib/terminfo/h/h19-u u8r/lib/terminfo/h/h19A u8r/lib/terminfo/h/h19a u8r/lib/terminfo/h/h19b u8r/lib/terminfo/h/h19b8 u8r/lib/terminfo/h/h19u u8r/lib/terminfo/h/h2000 U8r /li b/ terminf 0/h/h89 u8r/lib/terminfo/h/heath u8r/lib/terminfo/h/heath-19 u8r/lib/terminfo/h/heath-ansi U8r /lib/terminfo/h/heathki t u8r/lib/terminfo/h/heathkit-a U8r /li b/terminfo/h/hp u8r/lib/terminfo/h/hp110 u8r/lib/terminfo/h/hp160 u8r/lib/terminfo/h/hp2382 u8r/lib/terminfo/h/hp2382a u8r/lib/terminfo/h/hp2392 u8r/lib/terminfo/h/hp2392a u8r/lib/terminfo/h/hp2393 u8r/lib/terminfo/h/hp2393a u8r/lib/terminfo/h/hp2394 U8r /1 i b/ terminf 0/h/hp2394a u8r/lib/terminfo/h/hp2397 u8r/lib/terminfo/h/hp2397a u8r/lib/terminfo/h/hp2621 u8r/lib/terminfo/h/hp2621-ba u8r/lib/terminfo/h/hp2621-fl U8r / li b/ terminf 0/h/hp2621-n1 u8r/lib/terminfo/h/hp2621-nt u8r/lib/terminfo/h/hp2621-pb U8r /lib/terminfo/h/hp2621-w1 u8r/lib/terminfo/h/hp2621a U8r /li b/ terminf 0/h/hp2621k46 u8r/lib/terminfo/h/hp2621n1 U8r /li b/ terminf 0/h/hp2621nt u8r/lib/terminfo/h/hp2621p u8r/lib/terminfo/h/hp2621w1 u8r/lib/terminfo/h/hp2622 u8r/1ib/terminfo/h/hp2622a u8r/lib/terminfo/h/hp2622p u8r/lib/terminfo/h/hp2623 u8r/lib/terminfo/h/hp2623a uBr/lib/terminfo/h/hp2623p uBr/lib/terminfo/h/hp2624 uBr/lib/terminfo/h/hp2624a UBr /li b/ terminf 0/h/hp2624p UBr /li b/ terminf 0/h/hp2626 uBr/lib/terminfo/h/hp2626 usr!lib/terminfo/h/hp2626a usr/lib/terminfo/h/hp2626p uBr/lib/terminfo/h/hp2627 usr/lib/terminfo/h/hp2627a UBr /li b/ terminf 0/h/hp2627p usr /li b/terminf 0/h/hp262S UBr /li b/ terminf 0/h/hp2640a uBr/lib/terminfo/h/hp2640b uBr/lib/terminfo/h/hp2644 UBr /li b/terminf 0/h/hp2646 usr /li b/terminf 0/h/hp264S usr/lib/terminfo/h/hp264Sa uBr/lib/terminfo/h/hp2703 uBr/lib/terminfo/h/hp2700 uBr/lib/terminfo/h/hp44 uBr/lib/terminfo/h/hp46 uBr/lib/terminfo/h/hp9020 usr/lib/terminfo/h/hp9S16te UBr /lib/terminfo/h/hp9S16teb uBr/lib/terminfo/h/hp9S26 uBr/lib/terminfo/h/hp9S36 usr/lib/terminfo/h/hp9S36 UBr /li b/terminf 0/h/hp9S36te uBr/lib/terminfo/h/hp9S36teb usr/lib/terminfo/h/hp9S37 uBr/lib/terminfo/h/hp9S46 usr/lib/terminfo/h/hp9S700 usr /li b/ terminf o/h/hpex usr /lib/terminf o/h/hpBUb uBr/lib/terminfo/i/i100 usr/lib/terminfo/i/i3101 uBr/lib/terminfo/i/i400 uBr/lib/terminfo/i/ibm uBr/lib/terminfo/i/ibm3101 uBr/lib/terminfo/i/infoton usr/lib/terminfo/i/intertec uBr/lib/terminfo/i/intertube uBr/lib/terminfo/i/intertube2 uBr/lib/terminfo/i/intext usr/lib/terminfo/i/intext2 UBr /lib/terminf 0/ i/ intextii usr/lib/terminfo/i/ipB uBr/lib/terminfo/i/iq120 uBr/11b/terminfo/i/iq140 uBr/lib/terminfo/i/isc UBr /11 b/terminfo/ i/iacSOO1 usr/lib/terminfo/i/it usr /li b/terminf 0/ i/i t2 uBr/lib/terminfo/i/ite usr/lib/terminfo/j usr/lib/terminfo/j /j erq uBr/lib/terminfo/k/k46 uBr/lib/terminfo/k/klc usr /li b/terminf o/k/ktm uBr/lib/terminfo/l/la120 UBI" /11 b/terminf oil/layer uBr/lib/terminfo/l/lp UBr /lib/terminf o/l/lpr uBr/lib/terminfo/m/md1110 usr/lib/terminfo/m/megatek UBr /li b/terminf o/m/microb usr/lib/terminfo/m/microbee uBr/lib/terminfo/m/microki t UBr /li b/terminfo/m/microterm uBr/lib/terminfo/m/microterm6 usr/lib/terminfo/m/mime uBr/lib/terminfo/m/mime-3a usr/lib/terminfo/m/mime-3ax usr/lib/terminfo/m/mime-adm3a usr/lib/terminfo/m/mime-adm3ax uBr/lib/terminfo/m/mime-fb UBr /li b/terminfo/m/mime - hb usr/lib/terminfo/m/mime1 uBr/lib/terminfo/m/mime2 uBr/lib/terminfo/m/mime2a uBr/lib/terminfo/m/mime2a-s usr/lib/terminfo/m/mime2a-v UBr /li b/terminf o/m/mime2aa uBr/lib/terminfo/m/mime2av UBr /li b/terminf o/m/mimefb uBr/lib/terminfo/m/mimehb UBr /li b/terminf o/m/mimei usr/lib/terminfo/m/mimeii uBr/lib/terminfo/m/minanBi usr/lib/terminfo/m/mkt uBr/lib/terminfo/m/mransi uBr/lib/terminfo/m/mw2 uBr/lib/terminfo/n/nec usr/lib/terminfo/n/netronicB uBr/lib/terminfo/n/network UBr /11 b/terminf o/n/netx uBr/lib/terminfo/n/nomad uBr/lib/terminfo/n/nuc uBr/lib/terminfo/n/nucterm usr/lib/terminf%/o31 uBr/lib/terminf%/oadm31 uBr/lib/terminf%/obitgraph uBr/lib/terminf%/obitgraph-nv uBr/11b/terminf%/obitgraph-rv uBr/lib/terminf%/oblit uBr/lib/terminf%/oc100 uBr/lib/terminf%/oconcept uBr/lib/terminf%/ojerq usr/lib/terminf%/omron Partitions and File Sets 297 uar/llb/termlnf%/ov13oo uar/llb/termlnf%/owl uar /li b/termlnf o/p/patch uar/lib/termlnfo/p/patchboard uar /lib/termlnf o/p/pbox uar/llb/termlnfo/p/pc uar /li b/termlnfo/p/pe660 uar/llb/termlnfo/p/plaama uar/lib/termlnfo/p/plugboard uar/lib/termlnfo/p/print uar/lib/terminfo/p/printer uar/lib/terminfo/p/printerbox uar /li b/terminf o/p/printing uar/lib/termlnfo/p/pa uar/lib/terminfo/p/pty uar/lib/terminfo/q/qume uar/lib/terminfo/q/qume6 uar/lib/terminfo/r/ramtek uar/lib/terminfo/r/rayterm uar/lib/terminfo/r/reach uar/lib/terminfo/r/regent uar/lib/terminfo/r/regent1oo uar/lib/terminfo/r/regent20 uar/lib/terminfo/r/regent2oo uar /li b/terminf o/r /regent26 uar/lib/terminfo/r/regent40 uar/lib/terminfo/r/regent40+ uar/lib/terminfo/r/regent40-a uar/lib/terminfo/r/regent60 uar/lib/terminfo/r/regent60-na uar/lib/terminfo/a/a16oo uar/lib/terminfo/a/ab1 uar/lib/terminfo/a/ab2 uar/llb/terminfo/a/ab3 uar/lib/terminfo/a/abg uar /li b/termlnf 0/ a/ abi uar /li b/terminfo/ a/ acrewpoint uar/lib/terminfo/a/aexidy uar/llb/terminfo/a/amarterm uar/lib/terminfo/a/amarterm-a uar/lib/terminfo/a/amartvid uar/lib/terminfo/a/aol uar/lib/terminfo/a/ao11 uar/lib/terminfo/a/ao12 uar /lib/terminf 0/ a/ aoroc uar/lib/terminfo/a/apinwriter uar/lib/terminfo/a/aun uar/lib/terminfo/a/aun1 uar/lib/terminfo/a/auperbee uar/lib/terminfo/a/auperbrain uar/lib/terminfo/a/awitch uar/lib/terminfo/a/awtp uar/lib/terminfo/a/aynertek uar/lib/terminfo/a/ayatem1 uar/lib/terminfo/t/t10 298 Partitions and File Sets uar/lib/terminfo/t/t1061 uar/lib/terminfo/t/tl061f uar/lib/terminfo/t/t16 uar/lib/terminfo/t/t37oo uar/lib/terminfo/t/t38oo uar/lib/terminfo/t/t5oo uar /li b/terminf oft/tab uar/llb/terminfo/t/tab132 uar/lib/terminfo/t/tab132-rv uar/lib/terminfo/t/tab132-w uar/lib/terminfo/t/tab132-w-rv uar/lib/terminfo/t/tec uar/llb/terminfo/t/tec4oo uar/lib/terminfo/t/tec6oo uar/lib/terminfo/t/tek uar/lib/terminfo/t/tek4012 uar/lib/terminfo/t/tek4013 uar/lib/terminfo/t/tek4014 uar/lib/terminfo/t/tek4014-am uar/lib/terminfo/t/tek4016 uar/lib/terminfo/t/tek4016-am uar/lib/terminfo/t/tek4023 uar/lib/terminfo/t/tek4024 uar/lib/terminfo/t/tek4026 uar/lib/terminfo/t/tek4027 uar/lib/terminfo/t/tek4112 uar/lib/terminfo/t/teleray uar/lib/terminfo/t/teletec uar/lib/terminfo/t/televlde0960 uar/lib/terminfo/t/terak uar/lib/terminfo/t/terminet uar/lib/terminfo/t/terminet12oo uar/lib/terminfo/t/terminet3oo uar/lib/terminfo/t/tex uar/lib/termlnfo/t/tl uar/lib/terminfo/t/ti 700 uar/lib/terminfo/t/ti 733 uar/lib/terminfo/t/ti 736 uar/lib/terminfo/t/ti 746 uar/lib/terminfo/t/ti800 uar/lib/terminfo/t/tn12oo uar/lib/terminfo/t/tn3oo uar/lib/terminfo/t/tra-80 uar/lib/terminfo/t/tra80 uar/lib/terminfo/t/ta-1 uar/lib/terminfo/t/ta1 uar/lib/terminfo/t/tty uar/lib/terminfo/t/tty33 uar/lib/terminfo/t/tty37 uar/lib/terminfo/t/tty40 uar/lib/terminfo/t/tty43 uar/lib/terminfo/t/tty4424 uar/lib/terminfo/t/tty4424-2 uar /li b/terminf 0/t/tty4424-el-2 uar/lib/terminfo/t/ttywilliama usr/lib/terminfo/t/tvi usr /lib/terminfo/t/tvi -2p usr/lib/terminfo/t/tvi2p usr/lib/terminfo/t/tvi912 usr/lib/terminfo/t/tvi912-2p usr/lib/terminfo/t/tvi9122p usril1bitermintoititvi912b usr/l1b/terminfo/t/tvi912c usr/l1b/terminfo/t/tvi912cc usr/l1b/terminfo/t/tvi912cupCl usr/l1b/terminfo/t/tvi920 usr/lib/terminfo/t/tvi920-2p usr/l1b/terminfo/t/tvi9202p usr/lib/terminfo/t/tvi920b usr/l1b/terminfo/t/tvi920c usr/l1b/terminfo/t/tvi925 usr/l1b/terminfo/t/tvi950 usr/lib/terminfo/t/tvi950-2p usr/lib/terminfo/t/tvi950-4p usr/l1b/terminfo/t/tvi950-ap usr/l1b/terminfo/t/tvi950-b usr/l1b/terminfo/t/tvi950-ns usr/l1b/terminfo/t/tvi950-rv usr/l1b/terminfo/t/tvi960-rv-2p usr/lib/terminfo/t/tvi960-rv-4p usr/l1b/terminfo/t/tvi9502p usr/l1b/terminfo/t/tvi9504p usr/l1b/terminfo/t/tvi950b usr/l1b/terminfo/t/tvi950ns u8r/l1b/terminfo/t/tvi950rv usr/lib/terminfo/t/tvi950rv2p u8r/lib/terminfo/t/tvi950rv4p u8r/l1b/terminfo/u/ubell usr/lib/terminfo/u/ubellchar u8r/l1b/terminfo/u/unitrm18 u8r/lib/terminfo/u/unknown usr /l1b/terminf o/v /vc 103 U8r /11 b/terminf o/v /vc203 u8r/l1b/terminfo/v/vc303 u8r/11b/terminfo/v/vc303-a U8r /11b/terminf o/v /vc403a usr /l1b/terminfo/v /vc404 U8r /11b/terminfo/v /vc404-na u8r/11b/terminfo/v/vc404-8 u8r/lib/terminfo/v/vc404-8-na u8r/l1biterm1nfo/vivc415 u8r/l1b/terminfo/v/vi2oo u8r/11b/terminfo/v/vi2oo-f U8r /11b/terminf o/v /vi2oo- ic U8r /11 b/terminf o/v /vi2oo-rv usr /l1b/terminf o/v /vi2oo-rv-1c u8r/11b/terminfo/v/vi3oo u8r/11b/terminfo/v/vi300-aw u8r/11b/terminfo/v/vi300-rv U8r /11 b/terminfo/v /vi3OO- 8S u8r/l1b/terminfo/v/vi560 U8r /l1b/terminfo/v /viewpoint usr/l1b/terminfo/v/virtual u8r/lib/terminfo/v/visual u8r/lib/terminfo/v/vitty usr/l1b/terminfo/v/vkloo u8ril1bitermintoivivtl00 usr/l1b/terminfo/v/vtlOO-am u8r/11b/terminfo/v/vtloo-bot-8 usr /11 b/terminfo/v /vt lOO-nam u8r/l1b/terminfo/v/vtloo-nam-w u8r/l1b/terminfo/v/vtloo-nav u8r/l1b/terminfo/v/vtloo-nav-w u8r/11b/terminfo/v/vtloo-np usr/11b/terminfo/v/vtlOO-8 u8r/11b/terminfo/v/vtloo-8-bot usr /l1b/terminf o/v /vt 100- 8 -top usr/l1b/terminfo/v/vtloo-top-s UBr /11 b/terminfo/v /vt lOO-w uBr/11b/terminfo/v/vtlOO-w-am uBr/11b/terminfo/v/vtloo-w-nam u8r/11b/terminfo/v/vt100-w-nav u8r/11b/terminfo/v/vt100am U8r /11b/terminfo/v /vt 100nam u8r/lib/terminfo/v/vt100B uBr/l1b/terminfo/v/vtloow UBr /11 b/terminf o/v /vt 125 u8r/lib/terminfo/v/vt132 uBr/11b/terminfo/v/vt60 usr /11 b/terminfo/v /vt50h uBr/l1b/terminfo/v/vt52 usr/11b/terminfo/w/wy1oo u8r/l1b/terminfo/x/x17oo u8r/l1b/terminfo/x/x1720 u8r/l1b/terminfo/x/x1750 usr/11b/terminfo/x/xi tex u8r/11b/terminfo/x/xI83 usr/11b/terminfo/y/ya u8r/11b/terminfo/z/z19 usr/11b/terminfo/z/z30 u8r/11b/terminfo/z/zen30 uBr/11b/terminfo/z/zenith FILE SET: ACORE4 Description: Mandatory file set. etc/newconUg/ d. prof 11e u8r/bin/asa uBr/bin/awk uar/bin/cancel u8r/bin/disable uar /bin/ enable u8r/bin/lp u8r/bin/lpr UBr /bin/lpstat Partitions and File Sets 299 usr/bin/more usr/bin/tabs usr/bin/tar usr/bin/what usr/l1b/accept usr/l1b/expreserve usr/l1b/lpadmin usr/l1b/lpfx usr/l1b/lpmove usr/l1b/lpsched usr/l1b/lpshut usr/l1b/more. help usr/l1b/nls usr/l1b/nls/n-computer usr/l1b/reject usr/l1b/tabset/xerox1720 usr/l1b/tabset/vt100 usr /11 b/tabset/teleray usr /l1b/tabset/ stdcrt usr /l1b/tabset/ std usr /l1b/tabset/ diablo usr /11 b/tabset/beehi ve usr/l1b/tabset/9837 usr/l1b/tabset/9836 usr/l1b/tabset/9826 usr/l1b/tabset/3101 usr/spool/lp/class usr / spool/lp/ interface usr / spool/lp/member usr / spool/lp/request usr / spool/lp/model usr / spool/lp/model/dumb usr / spool/l p/model/hp2226a usr / spool/lp/model/hp2631g usr / spool/lp/model/hp2686a usr / spool/lp/model/hp2934a usr/preserve usr/tmp 11b lost+found tmp users/guest system/ ACORE4/ customize FILE SET: ACORE5 Description: Mandatory file set. bin/pam system/ ACORE6/ customize system/ ACORE6/rev11st users/nowindow/ Autost users/nowindow/ . environ usr /11 b/nls/n -computer usr/11b/nls/n-computer/pam. cat PARTITION: SYS_TOOLS This partition resides on the 4 red labeled micro discs. This partition contains editors and useful programs. FILE SET: ACMD Description: This file set resides on micro disc 1 and contains the vi editor (shown as bini ed) and helpful programs such as help and sort. If you plan to do text editing with the vi editor described in Chapter 6, you should load this file set. bin/cmp bin/clri bin/csh bin/du bin/ed bin/false bin/nice bin/pr bin/sort bin/tail bin/tee bin/touch bin/true 300 Partitions and File Sets bin/uname bin/wc etc/chroot etc/newconfig/csh . login etc/newconfig/d. Autost et c /newc onf ig/ d . environ etc/newconfig/ d. exrc etc/newconfig/mkdev system/ ACMD/ customize usr /bin/bf s usr/bin/ex usr/bin/fold usr/bin/help usr/11b/builtins/CI usr /11b/buil tins/ a11as usr/11b/builtins/alloc usr/lib/builtins/case usr/lib/builtins/cd usr/11b/builtins/chdir usr/11b/builtins/dirs usr/l1b/builtins/eval uar /li b/bull tina/ exec uar/lib/bulltina/foreach uar /lib/bull tina/glob uar/lib/builtina/haahatat uar/lib/bulltina/hiatory uar/lib/bulltina/if uar /li b/bull tina/ j oba uar /lib/bull tina/kill uar/lib/bulltina/login uar /li b/bull tina/logout uar /lib/bull tina/newgrp uar /li b/bull tina/nice uar /lib/bull tina/nohup uar/lib/bulltina/notify uar /lib/bull tina/ onintr uar/lib/bulltina/popd uar/lib/bulltina/puahd uar /li b/bull tina/rehash uar/lib/bulltina/aet uar /lib/bull tina/ aetenv uar /lib/bull tina/ source uar/lib/bulltina/atop uar /li b/bull tina/ awi tch uar/lib/builtina/time uar/lib/bulltina/umask uar /lib/bull tina/unalias uar /li b/bull tina/unhaah uar /lib/bull tina/unaet uar /lib/bull tina/unaetenv uar/lib/bulltina/wdt uar/lib/bulltina/whlle uar /li b/ exrec over uar/lib/help uar /li b/hel p/dehul t uar/lib/help/he FILE SET: ABCMD Description: This file set on micro disc 2 contains Iif and bif utilities. The lif utilities allow you to see what is on tapes or micro discs, and provides an interface between HP 9000 Series 200 or 500 computers and your computer. The bif utilities are used to transfer data or script files in a specific format from the Series 200 or 500 systems to your new system. uar /bin/bif chgrp uar /bin/bif chmod uar /bin/bif chown uar/bin/bifcp uar /bin/biffind uar/bin/biffack uar /bin/bifla uar /bin/bifmkdir uar /bin/bifmld B uar /bin/bifrm uar /bin/bifrmdir uar/bin/hp uar /bin/lifini t uar /bin/lifla uar /bin/lifrename uar /bin/Hfrm uar/bin/man uar/bin/tr uar /bin/whereia uar /bin/whoami ayatem/ ABCMD ayatem/ ABeND/ cuatomize FILE SET: AWINDOW Description: This file set on micro disc 3 contains the utilities necessary for you to run HP Windows/9000. You will need to load this file set along with the ASTARBAS file set (a dependency) to run Windows on your system (the computer will prompt you to insert the 4th disc when you need to). ayatem/ AWINDOW/ customize system/ AWINDOW/revlist uaers/window/ . WIIIsh usr /bin/wborder uar /bin/WIIIstart uar/lib/raster/12x20 uar/lib/raster/12x20/cour.OU uar/l1b/raster/12x20/cour. b. OU usr /lib/raster /1ax30 uar/lib/raster/1ax30/math. OM usr/lib/raater/1ax30/pica. au usr /lib/raster /6xa usr/lib/raster/6xa/lp. au usr/lib/raster/6xa/lp. b. aI uar/lib/raster/6xa/math. aM usr /lib/raster /7x10 usr/lib/raater/7x10/lp. au uar /lib/raater /ax16 uar /lib/raster /ax16/kana. aK uar/lib/raater/ax16/linedraw.OL usr/lib/raster/ax16/lp. au usr/lib/raster/ax16/lp. b. au uar /lib/raster /ax16/lp. i . au uar /lib/raster /ax16/math. OM usr /lib/raster /L6x16 usr /lib/raster /L6x16/lp. au usr/lib/wm usr/man/cati/wborder .1 uar/man/cat1/wcreate .1 Partitions and File Sets 301 usr/llan/catt/wdestroy.1 usr /llan/ cat 1/wdisp. 1 usr/llan/cat1/wfont.1 usr/llan/catt/windows.1 usr/llan/catt/w11st .1 usr/llan/catt/_ove.1 usr/llan/catt/~eady .1 usr/llan/catt/_start .1 usr/llan/cat1/_stop.1 usr/llan/catt/wse1ect .1 usr/man/cat1/wsh.1 usr/llan/cat1/ws1ze.1 FILE SET: ASTARBAS Description: This file set on micro disc 4 is a dependency for the AWINDOW file set. usr /11b/ stub..e/hp98710 usr/11b/stubase/hp9S710/te_data usr /11 b/ stubase/hp9S710/te_lIcode usr/11b/stubase/defau1ta usr/11b/stubase/chu_sets usr/11b/stubase/sb_daellon_1.1 usr /11b/ stubase/ stroke usr /11b/ stubase/stroke/llukers usr /11 b/ stubase/ stroke/usasc 11 usr/11b/stubase/stroke/usasc11/1 usr /11 b/ stubase/ stroke/usasc 11/2 usr /11 b/ stub.. e/ stroke/katakana usr/11b/stubase/stroke/katakana/1 usr /11 b/ stubase/ stroke/katakana/2 usr /11b/ stubase/ stroke/ j iBasc11 usr /11b/ stubase/stroke/ j isasdi/1 uar /lib/atarbase/atroke/ j is&8c11/2 usr /11 b/ stub..e/ atroke/hprollan uar/11b/atubase/stroke/hprollan/1 uar /li b/starbase/ stroke/hproman/2 uar/11b/stubase/stroke/font_info usr /11 b/ atubase/ stroke/f ont_inf 0/1 usr/11b/stubaae/stroke/font_info/2 usr /11b/ atubaae/ errore usr /li b/ stubaae/ errors/ american uar /li b/ atarbase/ errora/ american/sb. errora uar /11 b/ stubaae/ errora/n - computer usr/1ib/stubase/errors/n-computer/ab. errors aystem/ ASTARBAS/ custollize aystem/ ASTARBAS/rev11at PARTITION: PROG_LANGS This partition is contained on the blue labeled micro disc. Both file sets contained in this partition are used for configuring your operating system and making a recovery system. FILE SET: AC bin/cc FILE SET: APROG lib/c2 11b/ccom 11b/cpp lib/11bc.a bin/ar bin/as bin/1d bin/make bin/strip PARTITION: MISe_UTILS This partition is contained on the 2 green labeled micro discs. The two file sets in this partition are used for reconfiguring the operating system and for making a recovery system. FILE SET: ACONFIG etc/maater etc/mkrs etc/mkra . deva etc/mkrs . swap etc/config etc/conf/h/buf .h etc/conf/h/callout .h etc/conf/h/cmap.h etc/conf/h/conf .h 302 Partitions and File Sets etc/conf/h/dir. h etc/conflh/dmap.h etc/conf/h/errno. h etc/conf/h/ino. h etc/conf/h/inode. h etc/conf/h/ioct1. h etc/conf/h/ipc. h etc/conf/h/kerne1.h etc/conflh/magic .h etc/conf/h/map.h etcl conf/h/msg. h etc/conf/h/opt .h etcl conf Ih/param. h etc/conf/h/privgrp .h etc/conf/h/proc .h etc/conf/h/pty.h etclconf Ih/ptyio . h etcl conf Ih/resource . h etcl conf Ih/sem. h etc/conf/h/shm.h etc/conf/h/signal.h etc/conf/h/space.h etcl conf Ih/sysmacros . h etc/conf/h/systm.h etc/conf/h/text .h etclconf Ih/time . h etcl conf Ih/tty . h etcl conf Ih/types . h etc/conf/h/user. h etc/conf/l1bdiLsrm .a etc/conf/libdreq. a etcl conf lliblan. a etcl conf 111bmin. a etcl conf Imachinel a. out. h etcl conf Imachine/param. h etc/conf/machine/pcb. h etcl conf Imachine/pte. h etc/conf/machine/timeout. h FILE SET: ACONFIG2 etc/conf/dflle. full etc/conf/dflle. full. Ian etc/conf/dflle .min etc/conf/dflle. support etc/conf/libdevelop. a etc/conf/libsysV. a etc/conf/l1bdreq. a etc/conf/l1bkreq. a PARTITION: TEXT This partition is contained on the orange labeled micro disc. FILE SET: AMANUAL Description: This file set contains formatted manual pages which give you a description of the commands available to you. If you load this file set, you can use the man command. usr/man/cat1/asa.1 usr/man/cat1/awk.1 usr/man/cati/banner .1 usr/man/cati/basename .1 usr/man/cati/bfs .1 usr/man/cati/bifchmod.1 usr/man/cati/bifchoWD.1 usr/man/cati/bifcp .1 usr/man/cati/biffind .1 usr/man/cat1/biffsck.1 usr/man/cati/bifls .1 usr/man/cati/bifmkdir.1 usr/man/cati/bifmkfs .1 usr/man/cat1/bifrm .1 usr/man/cat1/cat.1 usr/man/cat1/cd.1 usr/man/cati/chmod.1 usr Imanl catil ChOWD. 1 usr Imanl catil cmp . 1 usr/man/cati/cp.1 usr Imanl cat 11 cpio . 1 usr/man/cati/csh.1 usr/man/cati/cut .1 usr/man/cati/date .1 usr/man/cati/dd.1 usr/man/cat1/du.1 usr/man/catllecho .1 usr/man/cat1/ed.1 usr/man/cat1/edi t.1 usr/man/cati/enable .1 usr/man/cati/ex.1 usr/man/cati/expr.1 usr/man/cati/find.1 usr/man/cati/fold.1 usr Imanl catil grep. 1 usr/man/cat1/help.1 usr/man/cat1/hostname .1 uer/man/cati/hp.1 usr/manl cati/ipcrm. 1 usr/man/cat1/ipcs.1 usr/man/cat1/intro.1 usr/man/cat1/kill.1 usr/man/cat1/l1fcp.1 usr/man/cati/l1finit .1 usr/man/cati/l1fls .1 usr/man/cati/lifrename .1 usr/man/cati/lifrm.1 usr/man/cati/l1ne .1 usr/man/cat1/login.1 usr/man/cat1/lp.1 usr/man/cati/lpstat .1 usr/man/cat1/ls.1 usr/man/cati/man.1 usr/man/cati/media1nit .1 Partitions and File Sets 303 usr/man/cat1/mkdir.1 usr/man/cat1/more.1 usr/man/cat1/nice.1 usr/man/cat1/pam.1 usr/man/cat1/passwd.1 usr/man/cat1/pr.1 usr/man/cati/ps.1 usr/man/cati/pwd.1 usr/man/cati/rm.1 usr/man/cat1/sh.1 usr /manl cat 1/sleep. 1 usr /man/ cati/ sort. 1 usr/man/cat1/stty.1 uBr/man/cat1/su.1 usr/man/catl/sync.1 usr/man/cati/tabs .1 usr/man/catl/tail.1 usr/man/cat1/tar.1 usr/man/cat1/tcio.l usr/man/catl/tee .1 usr /man/ cat 1/touch. 1 usr/man/cat1/tr .1 uBr/man/cat1/true.1 usr/man/cati/tset .1 usr/man/cat1/umask.1 usr/man/cati/uname.1 usr/man/cat1/vi.l usr/man/cat1/wc.1 usr/man/cat1/what.1 usr/man/cat1/whereis.1 usr/man/cati/who.1 304 Partitions and File Sets usr/man/cati/whoami.1 usr /man/ cat 1m usr/man/cat1m/accept .1m usr /man/ cat 1m/backup. 1m usr/man/catim/brc .1m usr/man/cat1m/chroot .1m usr/man/catim/clri.1m usr/man/cat1m/conUg .1m usr/man/cat1m/devnm.1m usr/man/catim/fsck.1m usrimanicat1m/fsclean.lm usr/man/catim/getty.1m usr/man/cat1m/init .1m usr/man/catim/lpadmin.1m usr/man/catim/lpsched.1m usr/man/catim/mkdev.1m usr/man/catim/mkfs .1m usr/man/cat1m/mknod.1m usr/man/cat1m/mount .1m usr/man/cat1m/mvdir .1m usr/man/cat1m/newfs.1m usr/man/cat1m/reboot .1m usr/man/cat1m/reconfig.1m usr/man/cat1m/setmnt .1m usr/man/cat1m/shutdown.im usr/man/cat1m/syncer .1m usr/man/cat5 usr /man/ cat5/bif . 5 usr/man/cat5/l1f.5 system/!MANUAL/ customize E Determining Swap Size This appendix briefly describes what swap space is, then explains how to determine the amount of swap space you need on your system. The section describing swap space is fairly technical; read it only if you are interested. You do not need to understand the information in "What is Swap Space?" to determine the amount of swap space you need. What is Swap Space? Swap space is a contiguous area on the secondary storage, usually a hard disc drive, reserved for use by the Series 300's virtual memory management system. The virtual memory management system keeps an image copy of all existing processes and shared memory objects. Swap space is separate from the file system, but is usually on the same hard disc as the root file system. Series 200/300 computers support both single and multiple swap devices. The multiple swap device mechanism allows the swap space to be present on several disc drives for ease of expanding the swap space. Also, if your applications require above average number of I/O operations, multiple swap devices may increase throughput. The space for the entire image of every existing segment is allocated on the swap space; therefore swap space must be large enough hold all segments of all existing processes. If there is not enough swap space the system will either return an error (such as ENOMEM) for some system calls, or it will kill the user process. If you need more swap space, you can add more swap devices or you can rebuild the file system and reserve more swap space on your existing swap device. Use the procedures in "Reconfiguring HP-UX" in Chapter 10 to create more swap space. Determining Swap Space 305 Determining the Amount of Swap Space You Need You must have enough swap space to hold your process or the process can't execute. When you create a file system, newfs creates a default amount of swap space. A file system is automatically created during the installation of AXE. Determining Swap Space for Installation If you have not yet installed AXE, do the following: Determine the largest amount of swap space (in Kbytes 1 ) needed by your largest application (look in the manual supplied with your application or ask the manufacturer). Add system overhead. If your largest application is less than 2 048 Kbytes, add 512 Kbytes. If your largest application is more than 2 048 Kbytes, add 2 048 Kbytes 2 . If you will be running HP Windows/9000, add 4096 Kbytes TOTAL swap space needed (in Kbytes 1 ) Enter this total on your "Pre-Installation Checklist". When you see the "Disc Parameters Menu" during installation, compare your total with the default swap space shown in the menu. If your total is less than the swap space shown, do not change the swap space. If your total is more than the swap space shown, change the swap space. Determining Swap Space After Installation If you need to increase your swap space, estimate the amount of swap space you need by adding the space required by your largest application to the current amount of swap space. Determine the swap space (in Kbytes 1 ) required by your largest application (look in the manual supplied with your application or ask the manufacturer). Add the current amount of swap space from the messages on your display at boot up3, divided by 2. (Current swap space + 2) TOTAL swap space needed (in Kbytes 1 ) 1 Kbyte = 1024 bytes. 2 The exact amount required varies. 2 048 Kbytes should be sufficient in all cases. 3 At powerup the size and location of the swap space on each swap device is displayed in 512 byte blocks. "start = xxxxxx" indicates the swap space's starting disc block number and "size = xxxxxx" indicates size of swap space. 306 Determining Swap Space Use this total to change the amount of swap space, using the procedures outlined in Chapter 10, "Reconfiguring Swap Space and System Parameters". Determining Swap Space 307 Notes 308 Determining Swap Space F Installing Applications One of the main purposes of AXE is to allow you to run applications programs. AXE wiii have a number of applications available. If you purchase an application for your AXE system, you need to follow all instructions that come with the application to install and to run it. Things To Look Out For While Installing AXE When you install the AXE system, you have the option to increase swap space. Some of your applications, such as Alis@ /HP-UX 1 or TK!Solver® /HP-UX 2 , may require more than the default amount of swap space. Therefore, is important to know if you have enough space for application. The swap space required for an application may be found in the application's documentation. If it is not in the documentation, contact your vendor. If you purchased the application from Hewlett-Packard, contact your HP Sales Engineer or your local HP Sales Office. For your information, the following table lists some of the available applications and their swap spaces. There are also many other packages available for your system. These swap spaces are subject to changes. Make sure, if you use Table F-I, that you have the same revision of the application. 1 Alis @ is a trademark of Applix, Incorporated. 2 TK!Solver® is a registered trademark of Software Arts, Incorporated. Installing Applications 309 Table F-l. Applications and Their Swap Spaces3 Application HP Part Number Swap Space Alis@/HP-UX 98801 V (single user) 98801 W (multi user) 12288 Kbytes, 1st user 1 024 Kbytes, each additional user TK!Solver® /HP-UX 45515V (single user) 45515W (multi user) 250 Kbytes Plo Trak (TID /HP-Ux 4 98800V (single userj 98800W (multi user) 250 Kbytes MicroTrak@ /HP-UX 5 45524 V (single user) 45524W (multi user) 250 Kbytes Diagraph@ /HP-UX 6 45463V 768 Kbytes Picture Perfect@ /HP-UX 7 45462V 768 Kbytes MemoMaker /HP-UX 45420V (single user) 45420W (multi user) 150 Kbytes Multiplan® /HP-UX 8 45473V (single user) 45473W (multi user) 128 Kbytes To determine the total amount of swap space you require, go the Appendix E, "Determining Swap Space". Some other questions to ask are: • Do I need any peripheral devices? If so, install them as described in the appropriate section in Chapter 10. • Do I need extra memory? If so, you may need to purchase more memory. See your local HP Sales Office. • Do I need special AXE commands? 3 These swap spaces are subject to changes. The amounts given here are accurate as of December, 1985. 4 PloTrak@ is a trademark of SofTrak@ S~;stems. 5 MicroTrak@ is a trademark of SofTrak@ Systems. 6 Diagraph @ is a trademark liscensed to Computer Support Corporation. 7 Picture Perfect@ is a trademark of Computer Support Corporation. S Multiplan® is a US registered trademark of Microsoft Corporation. 310 Installing Applications If so, look up the commands in the filesets in Appendix D. Either load these optional filesets when you install your AXE system, or load them using the procedures in Chapter 10, the section "Updating AXE". • Do I need to change any system parameters to run my application? For most applications you will NOT need to change system parameters. If you do, follow the procedures in Chapter 10, the section "Reconfiguring Swap Space and System Parameters" to change the parameters. Loading Applications When you receive your application, it will come with instructions on how to load the application (how to get the program on the computer). This section shows an example of an installation process for the TK!Solver application (an equation-solving program for engineering, business, education and science). Example: Installing TK!Solver Remember this is not an applications installation gUide. You will need to follow the instructions given to you by the application. The procedure will, however, be similar. So, after reading through this example, you will understand the installation process better. Let us assume this application was received before you installed of AXE, so you can determine the amount of swap space required before installation. TK!Solver requires 250 Kbytes of swap space. Assume, also, that you will be using HP Windows/9000. 1. Determine the amount of swap space required. Following the procedures in Appendix E, add 250 Kbytes for TK!Solver, 512 Kbytes for system overhead (since your application is less than 2048 Kbytes), and 4096 Kbytes for HP Windows/9000, to get 4858 Kbytes of swap space required. Write this number on your Pre-installation Checklist (See Chapter 2). 2. Install AXE using the procedures in Chapter 2. When you get to the system parameters menu, you will see the default swap space for your hard disc. Compare this value with the value listed for "Swap Size". Let's say the swap size value is 10 192 Kbytes. Since the swap space you require is less than the default amount of swap space, do not change the value in the system parameters menu. 3. Complete the installation, then login as the super-user root. If you are not the superuser, you will not be able to access certain files or folders to install the application. See "Becoming the Root User" in Chapter 10. Installing Applications 311 4. Insert the TK!Solver disc (or tape) into the drive. At this point environment you need to look for this you need to know if you will be using TK!Solver in a multi-user or single-user (AXE is a single-user environment). There are two versions of TK!Solver, and make sure you have the correct one. Other applications may be similar, so when installing them. 5. Change to the folder suggested in the TK!Solver documentation. For example, change to the "root" folder by typing: cd / I Return I This command opens the / ("root") folder. From this folder, the super-user can access the files needed for installation. 6. Type: tar -xvf /dev/devicefile_name I Return I where devicefile_name is the name of the device file associated with the tape or flexible disc drive containing the TK!Solver disc (or tape). Usually, flexible disc drives are named /dev/rfd and tape drives are named /dev/rct. This command will load the disc onto the system and place the TK!Solver files in the correct folders. It would be rare that you had files with the same name as those used by TK!Solver (or any application for that matter), but if you do, the original files will be lost. Therefore, if you have similar file and folder names (as listed by the application documentation) you need to either rename them or move them to another folder. When the application installation is finished: 7. Remove the TK!Solver disc (or tape) from the drive. Store it in a safe place. The installation is finished. TK!Solver is installed on the hard disc and available for your use without having to load the application every time you wish to use it. 312 Installing Applications Glossary The following terms and definitions are defined as they apply to the Series 300 AXE operating system. address In the context of peripheral devices, a set of values which specify the location of an I/O device to the computer. The address is composed of up to four elements: select code, bus address, unit number and volume number. You can read about addresses in the Peripheral Installation Guide. archive A complete backup of the system. AXE Applications Execution Environment AXE folder structure The hierarchical grouping of folders and files on AXE. Autost A script file executed automatically when PAM is started. backup The procedure to save a copy of the operating system and files. block The primary logical unit of information in the HFS file system. Block size on an HFS file system can be either 4 Kbytes or 8 Kbytes, and is set at file system creation. The default block size is 8 Kbytes. Blocks can be divided into 1 Kbyte, 2 Kbyte, or 4 Kbyte fragments. block mode Buffered I/O: data is transferred one block at a time. Block size for buffered I/O is not the same as block size on the file system. Block size for block mode is defined as BLKDEV _IOSIZE in / usr/ include / sys / param.h. Glossary 313 block special file A type of file used to communicate with a peripheral device in "block" mode. Block special files are created with a mknod command and have a "b" as the first character in the permission field (the permission field is the leftmost set of characters seen on your screen when you execute the 11 command). Block special files and character special files usually reside in the / dev folder. boot or boot-up The process of loading, initializing and running an operating system. boot area The first 8 Kbytes of the disc that are reserved for system use. This area contains the LIF volume header, the folder that defines the contents of the volume, and the bootstrapping program. boot ROM A program residing in ROM (Read Only Memory) that executes each time the computer is powered-up. The function of the boot ROM is to run tests on the computer's hardware, find some devices accessible through the computer and then load either a specified operating system or the first operating system found according to a specific search algorithm. The bootstrap program uses the boot ROM's mass storage drivers to load and pass control to the kernel. When the kernel gains control, it completes the job of bringing up the AXE operating system. Depending on your boot ROM version, the boot ROM displays may differ slightly from those shown in this manual; any differences between boot ROM versions are noted in this manual when the topic in question is discussed. The boot ROM identifies its version when power is applied to the computer. bus address Part of an address used for devices, especially devices on an HP-IB (HP Interface Bus); a number determined by the switch setting on a peripheral which allows the computer to distinguish between two devices connected to the same interface. A bus address is sometimes called a "device address", and no two devices on the same HP-IB can have the same bus address. bytes per inode This specifies the number of data bytes (amount of user file space) per inode slot. The number of inodes is calculated as a function of the file system size. The default value is 2048. 314 Glossary cartridge tape You can use either a flexible disc or a cartridge tape to backup your system, install your system, create a recovery system, and update your system. character special file A type of file used to communicate with a peripheral device in "raw" mode, character by character. Character special files are created with a mknod command and have a "c" as the first character in the permission field (the permission field is the leftmost set of characters seen on your screen when you execute the 11 command). Character special files and block special files usually reside in the / dev folder. control key Used with other keys (in the same manner as the Shift key) to generate special characters. cursor A visual position indicator which moves with characters entered with the keyboard or with cursor movement keys. data Computer information supplied to a program or produced by a program. destination device The mass storage device on which AXE is to be installed. The destination device must be a hard disc drive. device file The file associated with an I/O device. Device files are read and written just like ordinary files, but requests to read or write result in activation of the associated device. These files normally reside in the / dev folder. directory Another name for folder. disc A platter for recording and storing information. A disc can be either a flexible disc or a hard disc. In this manual, when the term "disc" is used alone, it refers to a hard disc. Glossary 315 driver number A pointer to the part of the kernel needed to use the device. The driver number is used in the mknod command when setting up a device file. The driver number, for a particular device, can be found in the sections in Chapter 10 explaining how to set up a particular device. edit Making changes in a file containing text, data or a program . .environ The file used to set up the active environment in the PAM shell. It contains a search path for locating files, the HOME folder, and other information PAM needs to execute commands. environment System defaults which affect AXE operation. /etc/shutdown A shell script that has the primary function of terminating all currently running processes in an orderly and cautious manner. See "Shutting Down Your System" in Chapter 10 for details on this shell. execution Carrying out the instructions of a program or command. file A collection of computer information: program or data residing on a mass storage medium (e.g. a hard disc). file system The organization of files and folders, associated with a block special file, on a hard disc. The HFS file system is an implementation of the AXE folder structure. file types Several file types are recognized by AXE. The file type is established at the time of the file's creation. The types are: • Regular files - Contains a stream of bytes. Characters can be either ASCII or non-ASCII. This is generally the type of file a user considers to be a file: object code, text files, nroff files, etc. • Folder - AXE treats folders like regular files, with the exception that writing directly to folders is not allowed. Folders contain information about other files. 316 Glossary • Block special files - Device files that buffer the I/O. Reads and writes to block devices are done in block mode. • Character special files - Device files that do not buffer the I/O. Reads and writes to character devices are in raw mode. • Network special files - contain the address of another system. • Pipes - A temporary file used with command pipelines. When you use a pipeline, AXE creates a temporary buffer to store information between the two commands. This buffer is a file, and is called a pipe. • FIFO - A named pipe. A FIFO (First In/First Out) has a folder entry and allows processes to send data back and forth. flexible disc 3 1/4 inch flexible disc. You can use either a flexible disc or a cartridge tape to backup your system, install your system, create a recovery system, and update your system. folder A collection of files. fragment A piece of a block. This is the smallest unit of information HFS will read or write. The lower limit of a fragment is DEV _BSIZE (defined in /usr/include/sys/param.h). Fragment size is set at file system creation. free space threshold Specifies minimum percentage of free disc space allowed. Once the file system capacity reaches this threshold, only the super-user is allowed to allocate disc blocks. The default is 10%. function key A key on the keyboard which, when pressed, executes a specified computer function. HP-UX The computer's operating system (AXE is a subset of HP-UX). HP-UX is an enhanced version of UNIX1. 1 UNIX is a trademark of AT&T Bell Laboratories, Inc. Glossary 317 hard disc A collection of recording platters contained in a single hard disc drive. Hard disc, or disc, is synonymous with disc pack. hex A numbering system using base 16 rather than base 10. Base 16 uses the following numbers: Decimal number Hex number 0 1 2 3 4 5 6 0 1 2 3 4 5 6 7 7 8 9 10 11 12 13 14 15 8 9 a b c d e f HFS file system High performance File System. This is the file system implemented on your Series 300 AXE system. Other models of Hewlett-Packard computers running AXE or HP-UX may have a different file system. hidden file A file name not seen in the folder area. identifier A label. 318 Glossary inode A data structure containing information about a file such as file type, pointers to data, owner, group, and protection information. input Designated data to a program, or to type on the computer. internal memory Electronic data storage located in the computer for program and computer operations execution. itf Integrated Terminal Family: the name for the standard keyboard used with AXE. Kbyte or kilobyte 1024 bytes. kernel The core of the AXE operating system. The kernel is the compiled code responsible for managing the computer's resources; it performs such functions as allocating memory and scheduling programs for execution. The kernel resides in RAM (Random Access Memory) whenever AXE is running. LlF Logical Interchange Format. LIF is Hewlett-Packard's standard file format, used for transferring files between Hewlett-Packard systems. Since LIF is a standard, files with LIF format can easily be transferred between different Hewlett-Packard computers (see the LIF(5) entries in the HP-UX Reference. login The process of a user gaining access to a secure AXE system. This process consists of entering a valid user name and its associated password (if one exists). Mbyte or megabyte 1 048576 bytes. Glossary 319 magnetic tape Nine-track tape used for recording and storing information. Magnetic tape is often used for backups and archives. magtape Same as magnetic tape. major number Same as driver number. message An item of information generated by the computer to inform the user of an operation or error resulting from a command. microflexible disc Same as flexible disc. minor number A hexidecimal number made up of a select code, bus address, unit number, and volume number of the device. MUX MUX is an abbreviation for Asynchronous Multiplexer. The HP 98642 four channel MUX is available for the Series 300. Each channel is an RS-232C port which is normally associated with a /dev/ttyXX file. network A system of a computer and terminals providing access from each terminal to the computer and other terminals. non security system A system allowing anyone to use it. non sequential In no particular order (at the same time). 320 Glossary operating s,stem The part of the system that interacts with the user and executes the user's commands. AXE is an operating system. output The data that results from a program or computer process. PAM Personal Applications Manager; the interface between you and the operating system. parameter The second (and subsequent) words/data after a command or program. Parameters are used to pass information to a program or command. password A security measure to insure the correct user is using the system. path An ordered sequence of steps from origin to destination. path name A series of folder names separated by / characters, and ending in a folder name or a file name. peripheral A device you have connected to your computer, such as a printer, mouse, or terminal. permission Operation allowed to a specified type of user. pipe The name given to a command line where the output of one command becomes the input to another command. The commands must be connected by a "I" character. process A process is the environr:nent in which a program (or command) executes. It includes the program's code, data, status of open files, and value of variables. For example, whenever you execute an AXE command, you are creating a process; whenever you log in, you create a process. Glossary 321 program A sequence of instructions performing a task. purge To erase, delete. raw mode Unbuffered I/O: information is written to, or read from, a peripheral device character by character. redirection Changing the default path of input or output (sending output to a file instead of to the screen, for example). root Root refers to the highest level folder (root folder or I). Root also refers to the super-user login name. screen The device with which the user sees computer output (the CRT or terminal). script file A file containing commands (each on a separate line). When the entire file is executed, the commands are executed in the order in which they appear in the file. secure system An AXE operating system is secure if you chose "Security" in reconf;g. See the discussion of security in "After Installing AXE" in Chapter 2. select code Part of an address used for devices; a number determined by switch settings on the interface card. Each interface card is in turn connected to a peripheral. Multiple peripherals connected to the same interface card share the same select code. sequential In order (not at the same time). 322 Glossary shell A program that interfaces between the user and the operating system. HP-supported shells are: /bin/sh /bin/csh /bin/rsh /bin/pam special file See device file. source device The mass storage device from which AXE is installed. cartridge tape drive or flexible disc drive. The source device can be either a superblock A data structure containing global information about the file system such as file system size, disc information, and cylinder group parameters. The superblock is created at the same time as the file system and is replicated into each cylinder group. super-user A user who has special privileges. The super-user has a login name called root. system console A keyboard and display (or terminal) given a unique status by AXE and associated with the special device file /dev/console. All boot ROM error messages (messages sent prior to loading AXE), AXE system error messages, and certain system status messages are sent to the system console. Under certain conditions (for example, run-level s), the system console provides the only mechanism for communicating with AXE. unit number Part of an address used for devices; a number whose meaning is software- and device-dependent but which is often used to specify a particular disc drive in a device with a multi-drive controller. When referring to single-controller integrated disc/tape or disc/flexible disc drive, a unit is used to distinguish between disc and cartridge tape drives or hard disc and flexible disc drive. The unit number also selects a single partition on the 913x series. Glossary 323 user name The login identifier required to access secure systems. variable See Parameter. vi The vi editor (visualize). virtual memory management A method of coordinating a limited amount of physical memory in a computer. The HewlettPackard Series 300 computers running AXE or HP-UX use demand page virtual memory management. volume number Part of an address used for devices; a number whose meaning is software- and device-dependent but which is often used to specify a particular volume on a multi-volume disc drive. The volume number is also used to inform the device driver of special handling semantics (such as printer drivers skipping over perforations). window A graphic device to visually emulate a device. Several windows can be placed on a terminal to allow a visual means to monitor several tasks at the same time. yank To copy specified information into a buffer (to be used in an editor to move text). 324 Glossary Index a .................................................................. 92 87 .................................................................. 87 88 * + . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 72 ., ................................................................ 72 / .............................................................. 76, 116 .................................................................. 93 ...... " .......................................................... 99 ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 [ .. ] ............................................................... 88 - ................................................................. 132 # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89,90 $* . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 &I; • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 95,96 - ............................................................... 90,92 -- .............................................................. 90,92 < ............................................................ 89,90,92 > ............................................................ 89,90,92 » .............................................................. 90,92 [IJ ................................................................ 131 131 137 131 CD ................................................................ 131 W ................................................................ 131 [!] .............................................................. 54, 68 54,68 G ........................................................... 54,68,71 G " ......................................................... 54,68,71 - .................................................................. 99 [QJ ................................................................ 131 ~ ............................................................ 128,132 ABCMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 AC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 rn ................................................................ o ................................................................ rn ................................................................ m .............................................................. Index 325 accessing a printer .................................................... 242 accidental file loss .................................................... 288 ACMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123, 300 ACONFIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46.1,217,230,232,302 ACONFIG2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 ACORE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 ACORE2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 ACORE3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 ACORE4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 ACTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 103, 106 active environment ................................................ 102, 103 add text ............................................................ 132 adding a new user ................................................ 196-199 adding mass storage media. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 274-274.1,251-254 address ...................................................... 7, 253, 255 Alis ............................................................... 310 alternate environments ................................................. 107 AMANUAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192,275,303 appending text ................................................... 127, 132 Application Execution Environment .......................................... 1 application programs .............................................. 102, 306 application Alis ............................................................. 310 Diagraph ......................................................... 310 installing ..................................................... 309-312 MemoMaker ....................................................... 310 MicroTrak ........................................................ 310 Multiplan ......................................................... 310 PicturePerfect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 310 PloTrak .......................................................... 310 swap space ....................................................... 310 TK!Solver ........................................................ 310 APROG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 archive backup .......................... 174,176,177,179,181,183-184,187 archiving ........................................................... 122 assumptions for AXE .................................................... 4 ASTARBAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140, 302 attended mode of bootup (see also booting) ............................... 12, 29 auto-start file ........................................................ 100 Autost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100, 101 AWINDOW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Index 140, 301 AXE: 1, 59, 167, 170 installation (see installation) structure ................................................. 167, 168, 170 system ........................................................... 285 b 131 131 background processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 142 backing up files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 121 backing up the system (see also system backup, backup, and backupf) . . . . . . . . . . . . . .. 48 174, 176-185, 187,231,260 archive backup ............................ 176,177,179,181,183-184,187 backup schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 177 cartridge tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 180-182 flexible disc ................................................... 178-180 incremental ....................................................... 241 incremental backup ............................ 176, 177, 179, 182, 184, 187 magnetic tape ................................................. 183-185 selected files .......................................... 178, 180, 182, 184 I Back space I ................................................... 53, 71, 126 backup ............................................. 177,178,180-185,252 backup copies ....................................................... 121 backup media (see also backing up the system) ............................... 187 backupf ................................................ 177, 178-180, 252 basics: ................................................................. 51 Windows ......................................................... 143 baud rate ........................................................... 248 becoming the root user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 202 bif utilities file set ...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 301 /bin/csh ........................................................ 86, 169 /bin/rsh ........................................................ 86, 169 /bin/sh ..................................................... 86, 107, 169 block mode device file (see also block special file) ................... 219,274-274.1 block special file ............................. 188,209, 219, 224, 232, 251, 252 blue labeled micro discs ................................................ 302 bold . ................................................................ 3 boot area ........................................................... 205 Index 327 boot ROM: attended mode ............................................... 12, 29, 231 displays .......................................................... 204 functions ......................................................... 203 search sequence .............................................. 9, 205-207 booting (see also bootup) ....................................... 203, 218, 219 bootup (see also boot ROM) .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 189 bootup: attended mode ............................................. 203, 206, 207 default system ..................................................... 205 tasks performed after booting .......................................... 208 unattended mode ........................................... 203, 206-207 border area ......................................................... 143 bottom a window ................................................. 157, 158 Bourne shell ...................................................... 86, 169 box ........................................................... 124, 143 I Break I .............................................................. 53 built-in device ........................................................ 122 bus address: for update ........................................................ 264 plotters and digitizers ................................................ 255 c C shell: 86, 169 file set ........................................................... 300 ~ .............................................................. 53 cartridge tape: backup (see also backing up the system) .............................. 180-182 write protect mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 28 cat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 cd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104, 118 change permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 98 changing: environment ....................................................... 107 location of a window ................................................ 152 the size of a window ................................................ 154 your password ...................................................... 57 chapters you should read ................................................. 3 character matching ..................................................... 88 character special file ................. 188,209,219,224,251, 252, 255, 274-274.1 checking your file system (see also fsck) ................................ 188-191 328 Index chmod: ....................................................... 96, 97, 98, 122 symbolic syntax ..................................................... 99 cleaning up files ...................................................... 122 clear area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " 144 I Clear display I ...................................................... 54, 71 I Clear line I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 54, 71 clock .......................................................... 240-241 Close ........................................................... 63, 76 close a folder ......................................................... 76 closed file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... " 225 Color type ............................................................ 3 >Command ....... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 63, 71 command (see also program) command area ..................................................... 64, 70 command help file set ................................................. 303 command interpreter .................................................. 169 command line: ............................................ , ........... 57, 70, 71, 72 pattern matching .................................................... 88 quoting ........................................................... 87 command memory ..................................................... 72 command mode .................................................. 124, 129 command: backup (see also backing up the system) .................. 177, 178, 180-185, 252 backupf (see also backing up the system) ..................... 177, 178-180, 252 config ....................................................... 229-238 date ......................................................... 203, 241 enable ........................................................... 246 find ......................................................... 193-194 fsck ................ 179, 181, 184, 185, 188-191, 192, 205, 208, 219, 220, 230 Ipadmin .......................................................... 246 Ipsched .......................................................... 246 Ipshut ........................................................... 246 Ipstat ............................................................ 246 shutdown ............ 178, 181, 183, 185, 188,203, 239, 251, 255, 257-259, 260 swapon .......................................................... 238 Index 329 commands: 102, 275-276 executed frequently .................................................. 95 computer font . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 124 computer type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 config ......................................................... 229-238 configure the operating system ....................................... 210-215 configuring operating system file set ....................................... 302 connecting programs ................................................... 92 connecting to a remote system ........................................... 108 contents .............................................................. 2 control boxes ........................................................ 143 control key .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 62 conventions ........................................................... 3 conventions vi editor .................................................. 124 copy ........................................................... 72, 83, 96 Copy ........................................................ 63, 83, 121 copy a file ........................................................... 83 correct: mistakes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 126 typing mistakes ..................................................... 54 corrupt system ....................................................... 257 corrupted file ........................................................ 222 corrupted root device .................................................. 219 create: a file ............................................................. 80 a folder ........................................................... 80 a script files ........................................................ 96 a window ......................................................... 150 text file .......................................................... 129 creating an icon ...................................................... 159 creating swap space ................................................... 234 I GTRL I ........................................................... 53, 62 ~ .......................................................... 147 ~ .......................................................... 147 I GTRL l-G .......................................................... 147 IGTRLG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 I GTRL r@] ............................................... 56, 68, 81, 86, 164 I GTRL I-@] .......................................................... 137 ~ ................................................. 68, 78, 123, 137 330 Index cursor .......................................................... 53, 144 cursor movement .......................................... 71, 127, 130, 131 cursor movement keys .................................................. 54 customize your system .............................................. 45, 229 d data data data date file listing ........................................................ 64 files ........................................................... 116 path ......................................................... 89, 92 .................................................... 91, 203, 240-241 dd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 default logins, secure system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 46.2 default printer ....................................................... 244 default shell ..................................................... 196-197 default: actions ........................................................... 106 environment ....................................................... 107 input ...................................... , . __ ........... " 89 printer ............................................................ 78 window configuration ................................................ 140 defaults ............................................................ 102 delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 85, 96 I Delete I .......................................................... , 63, 85 delete: a file .......................................................... 84, 85 a folder ........................................................ 84, 85 one character ...................................................... 127 text ............................................................. 133 I Delete char I ....................................................... 54, 71 I Delete line I ........................................................ 54, 71 deleting: characters ......................................................... 54 lines .............................................................. 54 unused files ....................................................... 122 dependency ......................................................... 286 dependent file sets .................................................... 286 destination disc: installation ........................................................ 6-8 update ....................................................... 263, 265 destroy a window ..................................................... 151 details of AXE ....................................................... 167 determining available disc space ...................................... 192-194 Index 331 determining kernel device drivers ........................... 211, 233, 274-274.4 determining the amount of swap space ................................. 305-307 /dev ....................................................... 64, 122, 274 DEV _BSIZE ......................................................... 237 device driver .......................................... 232, 235, 274-274.4 device files ............................................ 116, 122, 274-274.4 devices listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ " 64 dfile ........................................... 229-230, 233-236, 238, 253 Diagraph ........................................................... 310 digitizers,setting up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 255-256, 274.4 direct connect ....................................................... 248 direct execution of script files ............................................ 101 directory ........................................................ 65, 116 directory files ........................................................ 116 disc ........................................................... 115, 122 disc: initialization times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 49 initialize .................................................... 19, 37, 223 interleave ......................................................... 223 performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 223 reformat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 173 swap space ...................................................... . 305 disconnecting network ................................................ . 108 discs: blue ............................................................ . 302 green ........................................................... . 302 grey ............................................................ . 291 orange .......................................................... . 303 red 300 documentation ........................................................ 48 driver (see operating system) .............................. 253, 256, 274-274.4 dumb printer model ................................................... 245 duplicate a file ........................................................ 83 duplicating lines in vi .................................................. 136 e 131 131 echo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Echo ............................................................ 63,72 edit command line ..................................................... 71 edit text .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 54 332 Index editing files .......................................................... 48 editing text ...................................................... 51, 123 enabling swap space ................................................... 238 enclosing folder ....................................................... 72 enter commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 70 entering text ......................................................... 51 entering Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 165 . environ ............................................... 102, 103, 104, 106 environment file .................................................. 102, 197 environment selection .................................................. 107 environment variable: PATH ........................................................... 208 TZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208,240 erase text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 133 error message: file not found ...................................................... 195 no free space ................. .................................... 192 unable to access tty ................................................. 249 error: correction ......................................................... 71 output ......................................................... 89, 90 vi ............................................................... 129 errors: in printing ......................................................... 79 networking ........................................................ 108 vi editor .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 138 I ESC I .......................................... 53, 123, 126, 127, 128, 129 escape key .......................................................... 126 ex file set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 300 example: adding a new user .............................................. 198-199 mounting and unmounting a file system .............................. 226-227 examples: of chmod . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 99 of file system ...................................................... 116 of finding files ................................................. 119, 120 of pipes ........................................................... 93 of redirection ....................................................... 91 of script files ....................................................... 97 of search path ..................................................... 105 of sequential processing ............................................... 94 of window placement ................................................ 141 Index 333 execute .................................................. 98, 99, 100, 122 execute a file ......................................................... 98 execute permission ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..... " 96 executing: a command in PAM .................................................. 68 a script files ....................................................... 101 commands ......................................................... 7 programs .......................................................... 92 programs at the same time ............................................. 95 programs in order ................................................... 94 exit PAM ......................................................... 68, 86 exit vi ............................................................. 135 exit Windows ........................................................ 166 external device ............................. . . . . . . . . . . . . . . . . . . . . . . . . .. 122 ° f @] ................................................................ 71 file not found ........................................................ 195 file set: ACONFIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230, 232 AMANUAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 optional .......................................................... 310 remove .......................................................... 192 removing ......................................................... 239 required ............................................................ 6 file system ...................................... 186, 188-191, 210, 224, 305 file system: create ....................................................... 209-210 mounting and unmounting ........................................ 224-228 not enough space ................................................... 173 parameter ........................................................ 209 remake ...................................................... 236-237 root ............................................................. 305 size ............................................................. 237 file: ... " .............................................. '" 66,67,115,118 backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 121 checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 208, 210, 225 closed ........................................................... 225 copying ........................................................... 83 default device files .................................................. 175 334 Index deleting ........................................................... 84 dfile ......................................... 229-230, 233-236, 238, 253 disktab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 209 /hp-ux ............................................... 175, 205, 221, 231 indicator ....................................................... 67, 73 inittab ................................................... 220, 222, 250 loss ............................................................. 288 management ...................................................... 115 names ........................................................... 115 naming conventions ......................................... 115,251,252 not to delete ....................................................... 84 open ............................................................ 228 organization ....................................................... 117 permissions .................................................... 97, 100 protection ..................................................... 98, 122 security .......................................................... 122 sets ..................................................... 285, 286, 291 sets needed ....................................................... 287 storage .......................................................... 122 SYSHPUX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 system ................................................... 116,117,167 system level ....................................................... 169 types ............................................................ 116 find ........................................................... 193-194 find text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 134 finding files ......................................................... 118 flexible disc: backup (see also backing up the system) .............................. 178-180 grey disc .......................................................... 11 write-protect mechanism ............................................... 11 >Folder .......................................................... 63, 71 folder: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 65, 116, 117 area ........................................................ 64, 65, 67 listing ............................................................. 64 names ............................................................ 80 naming conventions .................................................. 80 structure .......................................................... 66 folders vs. files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 66 font ................................................................. 3 free disc space ....................................................... 192 free space threshold ................................................... 193 Index 335 fsck .............. 179,181,184,185,188-191,192,205,208,219,220,230,260 fsck sample output .................................................... 190 function keys ...................................................... 61, 63 function keys representation .............................................. 61 9 [QJ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 131 getenv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103, 107 getty .......................................................... 208, 250 global substitution .................................................... 133 graphics icon ........................................................ 158 graphics tablet ............................................... 144, 145, 146 graphics windows ..................................................... 142 green labeled micro discs ............................................... 302 grey labeled micro discs ................................................ 291 group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 98, 99, 122 group name ......................................................... 196 guest login ......................................................... 46.2 h [6J ............................................................ 128, 130 halt the system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 257-259 hardware ........................................................... 168 help ............................................................... 275 help file set ......................................................... 303 hidden files ...................................................... 85, 115 hierarchy of folders ............................................... 116, 117 highlight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 67 highlighted item ...................................................... 148 HOME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102, 103, 104 HOME ........................................................... 54,68 HOME folder ........................................................ 197 home folder ................................................. 102, 104, 118 how to install optional file sets and partitions from installation ............ 24-26, 41-43 HP Windows/9000 ..................................... 140, 175, 197, 274.4 336 Index HP-IB address: mass storage media ................................................. 253 plotters and digitizers ................................................ 255 HP-UX .................................................... 1,59,116,170 HP-UX structure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 170 HP98626A .......................................................... 10 i [0 ................................................................ 132 icon ............................................................... 158 if your file system is destroyed ....................................... 186-187 important files ....................................................... 175 incorrect login ........................................................ 56 incorrect password ..................................................... 58 incremental backup ...................... 174, 176, 177, 179, 182, 184, 187, 241 indicate files ......... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 67 information .......................................................... 70 information on HP-UX ................................................. 1 71 initializing media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 209, 223-224 inittab ..................................................... 220, 222, 250 input: ..................... , ........................................... 89 redirection ......................................................... 89 text ............................................................. 123 insert text .......................................................... 125 I Insert char i ....................................................... 54, 71 inserting: characters ......................................................... 54 lines .............................................................. 54 text ............................................................. 132 I Insert line I ........................................................... 54 installation .......................................................... 291 installation: applications ................................................... 309-312 cartridge tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ., 28-45 destination device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 15, 33, 37 destination disc ................................................... 6, 19 device menu .................................................... , 14, 32 disc parameters menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 16, 17, 35, 306 disc paramter menu .................................................. 34 flexible disc ..................................................... 11-27 hardware ..................................................... 7, 8, 209 Index 337 overview ........................................................... 5 pre-installation checklist .......................................... 6-7, 306 re-install .......................................................... 173 source device .................................................... 15, 33 swap space ................................................... 306,309 time ......................................................... " 11,28 what to do when you are finished ................................. 45-48, 173 write protect mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..... " 28 installing AXE ...................................................... 5-50 integrated device ................................................. 7, 15, 33 interface, printer ..................................................... , 243 interfacing devices ................................................ 145, 146 interleave factor ...................................................... 223 internal device ....................................................... 122 interpreting special characters .............. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 87 introduction to AXE ..................................................... 1 I/O card ........................................................... 232 italics ............................................................ 3, 124 itf keyboard .......................................................... 51 j m ................................................................ 137 128, 130 join lines ........................................................... 137 CD ............................................................ k [EJ ............................................................ 128, 130 Kbytes ............................................................. 306 kernel ............................................................. 168 kernel (see also operating system) ..................................... 167, 229 keyboard ........................................................ 51, 146 keyboard commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 147 I [IJ ............................................................ 128, 130 LAN ................................................ 208, 211, 259, 274.4 leaving PAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 86 leaving vi ........................................................... 135 leaving Windows ..................................................... 166 lif utilities file set ..................................................... 301 line editing ........................................................... 54 338 Index link with remote system ................................................ list: files .................................................".......... of files ............................................................ of hidden files ...................................................... iisting file permissions " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 108 100 85 85 100 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 loading applications ............................................... 309-312 locating files ......................................................... 102 locating windows ..................................................... 152 log out .............................................................. 86 logging files ................................................. 174, 192, 194 logging off ........................................................... 56 logging on ........................................................... 55 login ............................................................... 55 login errors .......................................................... 56 login identifier ........................................................ 55 logout .............................................................. 56 look at a file ......................................................... 77 look for text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 134 lost files ............................................................ 288 lowercase letters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 115 1p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78,96 1p -d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Is ................................................................ 138 Is -a ........................................................... 85, 115 m magnetic tape: backup (see also backing up the system) .............................. 183-185 setting up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 254, 274.2 major number .................... 7, 33, 252, 255, 260, 263, 264, 265, 274-274.4 makef older . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 man . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275, 283, 303 managing disc space ......................... . . . . . . . . . . . . . . . . . . . . .. 192-194 managing files ....................................................... 115 mandatory file sets .................................................... 291 mandatory partitions .................................................. 287 manual contents ........................................................ 2 mass storage device ................................................... 209 mass storage media,setting up ............................. 251-254,274-274.2 matching strings ....................................................... 88 Index 339 maximum operating system ............................. 212, 213-214, 253, 256 media initialization ............................................ 209, 223-224 MemoMaker ......................................................... 310 I Menu I .......................................................... 63, 147 message line micro discs: ...................................................... 57, 70 ................................................................ 285 302 302 291 303 300 310 265 MISC_UTILS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217, 302 mknod ..................................................... 251, 253, 255 modem ........................................................ 248, 250 modify typing mistakes .................................................. 54 modifying text ....................................................... 133 blue labeled ....................................................... green label ........................................................ grey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. orange ........................................................... red label ......................................................... MicroTrak .......................................................... minor number .......................... 253, 255, 259, 260, 262, 263, 264, monitoring your system: daily ............................................................ monthly .......................................................... weekly ........................................................... more information ..................................................... 174 174 174 171 (More Files) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 67 mounting a file system ................................. 208, 210, 220, 224-228 mouse ................................................ 68, 144, 145, 274.4 move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Move . ........................................................... 63,82 move: a file ............................................................. a folder ........................................................... a window ..................................................... 152, an icon .......................................................... , rectangle ......................................................... the cursor ................................................. 54, 130, the file indicator ..................................................... the pointer .................................................... 145, multi-user system ..................................................... Multiplan ........................................................... multitasking ...................................................... 93, 340 Index 82 82 153 159 153 131 68 147 247 310 142 n 134 134 netunam ............................................................ 108 N ................................................................. n ................................................................. network errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 108 108 108 108 I Next I ............................. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 54, 68 no free space ........................................................ 192 non-HP terminal ...................................................... 261 non-mandatory partitions ............................................... 287 non-secure system ................................................. 47, 247 non-Windows version of PAM .......................................... 60, 73 nonsequential processing ................................................ 95 normal ............................................................. 160 nowindow login ..................................................... 46.2 null string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 97 number lines ........................................................ 137 number of files in folder ................................................. 67 numeric keypad ....................................................... 52 network file path ..................................................... network special files ................................................... networking .......................................................... networking messages .................................................. o [QJ ................................................................ 132 [QJ ................................................................ 132 off-line storage ....................................................... 122 old commands ........................................................ 72 Open ............................................................ 63, 75 open a folder ......................................................... 75 open file ........................................................... 228 operating system installation (see installation) operating system: ............................................................ , .... 59 create ................................................... 210-216, 229 custom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 212, 215-216 drivers ......................................... 211, 212, 215, 274-274.4 maximum ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 212, 213-214 minimal ...................................................... 212-213 optional file set: install .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 24-26, 41-43 removing ......................................................... 239 Index 341 optional file sets ...................................................... 310 optional kernel drivers ....................................... 211,274-274.4 optional products, installing .............................................. 259 optionally loaded ................................................... 1, 277 orange labeled micro disc ............................................... 303 organizing files ................................................... 115, 117 other ............................................................... 99 output .............................................................. 89 output redirection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 89 overview of windows .................................................. 140 owner .......................................................... 98, 122 p [f] ........ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 136 [2J ................................................................ 136 page down ........................................................... 54 page up ............................................................. 54 pam ................................................................ 86 PAM: ............................................................. 59, 169 areas ............................................................. 64 closing folders ...................................................... 76 command area ................................................... 64, 70 command line ................................................. 70, 71, 72 command line pattern matching ......................................... 88 command line quoting ................................................ 87 command memory ................................................... 72 copying files ........................................................ 83 creating files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 80 creating folders ..................................................... 80 data file listing ...................................................... 64 deleting files .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 84, 85 deleting folders ................................................... 84, 85 Echo ............................................................. 72 edit command line ................................................... 71 environment file .................................................... 102 executing commands ................................................. 70 execution of a command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 68 exit .............................................................. 68 exiting ............................................................ 86 file indicator ..................................................... 67, 73 folder area ...................................................... 64, 67 342 Index folder listing ........................................................ 64 function keys ....................................................... 63 highlight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 67 message line ....................................................... 70 messages ......................................................... 110 mouse ............................................................ 68 moving files ........................................................ 82 moving folders ...................................................... 82 networking ........................................................ 108 non-Windows version ........................................... 60, 64, 73 nonsequential processing .............................................. 95 opening folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 75 operations ......................................................... 73 pipes .......................................................... 92, 93 prerequisites ....................................................... 61 printing files ........................................................ 78 program listing ................................................... 64, 76 redirecting input and output ............................................ 89 renaming files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 81 renaming folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 81 reread folder ....................................................... 68 rereading folders .................................................... 78 running ........................................................... 86 running programs .................................................... 76 screen ............................................................ 64 screen areas ......... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 64 selecting files ....................................................... 73 sequential processing .............................................. 93, 96 shell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 197 soft keys .......................................................... 63 special keys ........................................................ 68 User Menu ................................................... 61, 62, 63 versions ........................................................... 60 viewing files ........................................................ 77 Windows screen ..................................................... 60 Windows version ................................................. 60, 73 parameter .................................................. 70, 72, 96, 97 partition: .................................................................. 6 green label (MISC_UTILS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 217 grey label (SYS_CORE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 MISC_UTILS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 SYS_CORE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11, 222 Index 343 partitions: 285, 286, 291 mandatory ........................................................ 287 non-mandatory ..................................................... 287 passwd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57, 58 password ............................................. 46.1-47, 55,57, 197 password: errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 58 format ............................................................ 57 rules ............................................................. 57 path ................................................................ 66 PATH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102, 103, 105 PATH environment variable ............................................. 208 path name ....................................... 66, 72, 104, 105, 118, 119 pattern .............................................................. 88 pattern matching ...................................................... 88 pause box .......................................................... 161 pausing window output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 161 PE ................................................................ 170 perform task ......................................................... 73 peripheral device ..................................................... 122 permissions ...................................... 97, 99, 100, 122, 253, 256 perserving data ...................................................... 121 Personal Applications Manager ............................................ 59 physical devices ...................................................... 122 pick up line ......................................................... 136 PicturePerfect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 310 pipe ............................................................. 92,93 pipe syntax .......................................................... 92 placing windows ...................................................... 152 PloTrak ............................................................ 310 plotters, setting up ................................................ 255-256 pointer: ............................................................ 144, 145 movement .................................................... 145, 147 shapes ........................................................... 144 pop-up menu ........................................................ 148 port address, remote terminal ............................................ 248 port usage of a remote terminal .......................................... 248 positional ............................................................ 97 power down the computer (see also shutdown and shutting down) ...... 45, 251, 257-259 power up the computer ............................................ 203, 218 pre-installation checklist ............................................ 6-7, 306 344 Index prerequisites for PAM ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 61 I Prev I ............................................................ 54, 68 previous commands .................................................... 72 print ................................................................ 3 print a file ........................................................... 78 printer ....................................................... 78, 79, 122 printer commands (see printer spooler) printer spooler: enable .......................................................... . Ipadmin ......................................................... . lpsched ......................................................... . Ips hut .......................................................... . lpstat ........................................................... . printer: accessing ......................................................... default ........................................................... dumb model .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. model name ....................................................... name ............................................................ 208 246 246 246 246 246 242 244 245 243 243 242 RS-232 .......................................................... 245 select code ........ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 243 setting up and removing .................................... 242-246, 274.3 sub-address ....................................................... 244 printing errors ........................................................ 79 processing: files at the same time ................................................. 95 files in order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 93 special characters .................................................... 87 PROG_LANGS ......................................................... 302 program files ........................................................ 116 program listing ..................................................... 64, 76 program (see also command) program: reconfig ....... 27-45, 196, 197,212-215,229,230,233,242-245,247-249,274 programming environment .......................................... 169, 170 protecting files .................................................... 98, 122 protection (see also system security) ........................................ 45 public . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 98, 122 puck .............................................................. 146 purging unused files ................................................... 122 pwd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Index 345 q :q! ........................................................... 123, 135 ............................................................. 87 quoting r re-install .................................................... 173, 186, 237 read ..................................................... 98, 99, 100, 122 reboot .. ,......................... 189, 203, 213, 214, 215, 232, 239, 262, 273 reconfig ...... 27,45-47, 196, 197,212-215,229,230,233,242-245,247-249,274 reconfiguring swap space ....................................... 229, 234-238 recovering lost files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 288 recovery system ............................................... 48, 173, 186 recovery system file set ................................................ 302 recovery system: booting ...................................................... 218-219 create ....................................................... 216-218 using ........................................................ 219-222 red labeled micro discs ................................................. 300 redirecting input and output .............................................. 89 redirection: .............................................................. 89,90 of program output ................................................... 92 symbols ........................................................ 89, 90 redraw screen ................................................... 137, 161 regular files ......................................................... 116 remote system ....................................................... 108 remote terminal .............................................. 198, 247-250 removable medium ................................................ 224, 225 removing a printer .................................................... 246 removing a remote terminal ......................................... 249-250 removing optional file sets .............................................. 239 removing optional products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 239 rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 81, 101 Rename ......................................................... 63,81 rename: a file ............................................................. 81 a folder ........................................................... 81 repaint screen ....................................................... 161 repeat previous command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 137 repeat string search ................................................... 134 replace text ......................................................... 133 required file sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 6 346 Index reread . ............................................................. 78 Reread .......................................................... 63, 78 reread: a folder ........................................................... 78 PAM folder information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 68 I Reset I ............................................................. 147 restoring icons to windows .............................................. 160 restoring the system from a backup ................................... 185-187 Restricted Bourne shell .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 86, 169 I Return I .......................................................... 53, 68 RJE ......................................................... 211,274.4 root device (see also root file system) .................................. 219, 265 root disc ......................................................... 15, 48 root file system .................................................. 209, 219 root folder ............................................ 65, 76, 116, 119, 257 root login (see also root user and super-user) ........................... 46.2, 46.3 root user ........................................................... 202 RS-232 ............................................................ 245 rules for file names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 115 run a program ........................................................ 76 running: a script files ....................................................... 101 PAM ............................................................. 86 programs .......................................................... 92 Windows ......................................................... 165 5 save: files ............................................................. option ........................................................... text ............................................................. saving typing ......................................................... screen areas ...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. screen oriented text editor .............................................. script files: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 95, 96, 97, 100, 101, direct execution .................................................... execution ......................................................... scroll arrows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. scrolling information in windows .......................................... seRSHELL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103, search for text ....................................................... Index 122 164 135 95 64 123 107 101 101 163 162 107 134 347 search path ................................................. 102, 104, 105 secure system ....................................... 46.2, 86, 202, 208, 247 security ................................................ 46.1-47, 197,218 I Select I ............................................................. 147 select code: for update ........................................................ 264 mass storage media ................................................. 253 plotters and digitizers ................................................ 255 printer ........................................................... 243 remote terminal .................................................... 248 select: a window ......................................................... 156 button ....................................................... 145, 148 files ........................................................... 67, 73 selected file backup ....................................... 178, 180, 182, 184 selected window ...................................................... 144 selecting environments ................................................. 107 selecting pop-up menu ................................................. 149 sequential processing ............................................. 93, 94, 96 : set nonumber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 137 :set nu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 setting action ........................................................ 106 setting the system clock ............................................ 240-241 setting up a printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 242-245, 274.3 setting up a remote terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 247-249, 274.2 setting up mass storage media .............................. 251-254,274-274.1 setting up plotters and digitizers ................................ 255-256, 274.4 shell ........................................... 103, 107, 167, 169, 196-197 I Shift I .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 53 ~ ............................................................. 71 ~ ............................................................. 71 ~ ............................................................ 71 ~ ............................................................ 71 I Shift HHOME I ...................................................... 54, 68 ~ ........................................................ 147 [§5lli}I System I ........................................................ 63 I Shift HTab I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 68 I Shift HUser I ......................................................... 147 shrinking windows .................................................... 154 shuffle a window ............................................. 144, 156, 157 shutdown. 178,181,183,185,188,203,205,208,230,239,251, 255, 257-259, 260 shutting down the system ................................ 45, 173, 239, 257-259 simple name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 108 348 Index size: box ............................................................. 155 rectangle ......................................................... 155 sizing windows ....................................................... 154 sort file set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 300 source. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 101 source device: update ................................................... 260, 261, 264 special device file ....................................................... 8 special: characters .................................................. 57, 87, 115 keys .............................................................. 53 keys for PAM ....................................................... 68 speed (baud rate) of a remote terminal ..................................... 248 SRM .................................................... 211, 259, 274.4 stack .............................................................. 144 standard: input ....................................................... 89, 90, 93 output ...................................................... 89, 90, 93 Start ............................................................... 63 sticky bit ........................................................... 228 ~ .............................................................. 147 stop: all processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 86 scrolling .......................................................... 161 window output ..................................................... 161 storing files ......................................................... 122 stretching windows .................................................... 154 string: matching .......................................................... 88 search ........................................................... 134 substitution ....................................................... 133 structure of folders ..................................................... 66 stylus .............................................................. 146 sub-address, printer ................................................... 244 subprograms ......................................................... 95 subscript ............................................................ 95 substitute text ....................................................... 133 summary of manual ..................................................... 2 superuser ...... 84, 192, 202, 209, 212, 214, 217, 218, 230, 239, 240, 251, 255, 257 swap device ............................................. 202, 234-236, 305 swap disc ........................................................... 232 swap size,how to determine ......................................... 305-306 Index 349 swapspace .......... 6,16,18,34,35,173,209,210,216,229, 234-238, 305-306 swap space: enabling .......................................................... 238 increasing after installation .................................... 234-238, 306 installation ........................................................ 306 swapon command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 238 SYSBCKUP ..................................................... 205, 231 SYS_CORE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11, 222, 291 SYSHPUX ...................................................... 205, 218 I System I ......................................................... 63, 147 system system system system system system system system administration .................................................. 202 administrator .................................................... 2 clock .................................................... 240-241 commands ................................................. 70, 275 console ....................................... 8-10,47, 198,208,221 level .......................................................... 89 parameters ............................................ 229, 232, 238 security .................................................... 46-47 SYS_TOOLS ................................................... 86, 169, 300 t I Tab I ............................................................ 53, 68 TERM .............................................................. 103 terminal: 140 icon ............................................................. 158 non-HP .......................................................... 261 set up ..................................................... 198,274.2 type ............................................................. 103 window ...................................................... 142, 144 terminate Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 166 TEXT .............................................................. 303 text: editor ......................................................... 96, 123 input ............................................................ 129 input mode ............................................... 124, 126, 132 time ........................................................... 240-241 time zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 103 time-of-day . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 TK!Solver .......................................................... 310 topics ................................................................ 2 topics for PAM ........................................................ 59 350 Index topping a window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 157 touch file set ........................................................ 300 transfer a file - - __________ , ______ . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 82 tree ............................................................... 117 tree structure of folders ................................................. 66 trouble with vi ....................................................... 138 type ................................................................. 3 types of files ........................................................ 116 types of windows ..................................................... 142 typing mistakes ....................................................... 54 TZ environment variable .................................... 102, 103, 208, 240 u [QJ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 136 ~ ................................................................ 136 unable to access tty ................................................... 249 undo vi commands .................................................... 136 unit number: for update ........................................................ 264 magnetic tape ..................................................... 254 mass storage media ................................................. 253 plotters and digitizers ....... _ . _ _ . . . . _ . . . . _ . _ _ _ _ _ _ _ . . . . . . . . . . . . . . . . . .. 255 unmounting a file system ....................................... 222, 224-228 unnumber lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 137 update: 288 folder ............................................................. 78 message line ...................................................... 137 updating AXE ................................................... 259-273 updating,additional information ........................................... 273 uppercase letters ..................................................... 115 User Menu ..................................................... 61, 62, 63 user name .................................................. 196, 197, 202 user: .............................................................. 98,99 area ............................................................. 143 name ....................................................... 55, 57, 58 using PAM ........................................................... 73 /usr/spool/lp/member ................................................. 79 utilities ..................................................... 102, 167, 169 Index 351 v values .............................................................. 97 variable .......................................................... 70, 97 variable assignments ................................................... 102 versions of PAM ....................................................... 60 vi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 vi editor: ................................................................ 123 commands ........................................................ 277 conventions ....................................................... 124 cursor movement ............................................... 130, 131 duplicate line ...................................................... 136 entering .......................................................... 129 errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 exit ............................................................. 135 file set ........................................................... 300 join lines ......................................................... 137 modes ........................................................... 124 number lines ...................................................... 137 redraw screen ..................................................... 137 repeat commands ................................................... 137 text deletion ....................................................... 133 text:insert ........................................................ 132 text modification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 133 text search ........................................................ 134 tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 125 undo commands .................................................... 136 unnumber lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 137 update message line ................................................. 137 windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 137 view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77,91, 106 View ............................................................ 63,77 view a file ........................................................... 77 virtual memory management system ....................................... 305 visual command mode ................................................. 129 visual editor ......................................................... 123 volume number: for update ........................................................ 264 magnetic tape ..................................................... 254 mass storage media ................................................. 253 plotters and digitizers ................................................ 255 352 Index w 135 ............................................................... 131 ~ ................................................................ 131 wconsole window ., .................................................. . 165 window dumb ....................................................... . 149 window login 46.2 window smart 149 window: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 140, 141 output ......................................................... 89, 90 placement ........................................................ 141 redirection ......................................................... 89 Windows: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 140, 141 and applications .................................................... 149 and vi ........................................................... 137 basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 143 border area ....................................................... 143 bottom of stack .................................................... 158 changing size ...................................................... 154 clear area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 144 commands ................................................ 142, 148, 283 control boxes ...................................................... 143 creating icons ...................................................... 159 creating windows ................................................... 150 destroying windows ................................................. 151 exiting ........................................................... 166 file set ....................................................... 301, 302 icon ............................................................. 158 moving icons ...................................................... 159 moving windows ................................................ 152, 153 pausing output ..................................................... 161 pointer ...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 144 pointer movement .................................................. 147 pop-up menu ...................................................... 148 repainting screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 161 restoring icons to windows ............................................ 160 running .......................................................... 165 save option ....................................................... 164 scrolling information ................................................. 162 selecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 144 :w . . . . . . . . . . . . ,' . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ~ Index 353 selecting windows ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 156 shuffling windows ............................................... 156, 157 stack ............................................................ 144 top of stack ....................................................... 157 types ............................................................ 142 user area ......................................................... 143 version of PAM .................................................. 60, 73 why use? ......................................................... 142 wmstart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107, 165 write .................................................... 98, 99, 100, 122 write protect mechanism: cartridge tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 28 write-protect mechanism: during update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 261 flexible disc ........................................................ 11 x x ................................................................. 127 128,133 o ............................................................ y 136 136 yank z zz ........................................................ 354 Index 126, 128, 135 MANUAL COMMENT CARD Application Execution Environment User's Manual for HP 9000 Series 200/900 Computers Manual Reorder No. 98515-90000 Name: Company: Address: Phone No: Please note the latest printing date from the Printing History (page ii) of this manual and any applicable update(s); so we know which material you are commenting on _____________ NO POSTAGE NECESSARY IF MAILED IN THE UNITED STATES BUSINESS REPLY MAIL FIRST CLASS PERMIT NO. 37 POSTAGE WILL BE PAID BY ADDRESSEE Hewlett-Packard Company Fort Collins Systems Division Attn: Customer Documentation 3404 East Harmony Road Fort Collins, Colorado 80525 LOVELAND,COLORADO rh~ ~~ HEWLETT PACKARD Reorder Number 98515-90600 98515·90000 Printed in U.S.A. 12/85 Mfg. No. Only
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Create Date : 2010:04:09 19:29:21-08:00 Modify Date : 2010:04:09 23:22:28-07:00 Metadata Date : 2010:04:09 23:22:28-07:00 Producer : Adobe Acrobat 9.31 Paper Capture Plug-in Format : application/pdf Document ID : uuid:0475be30-c5de-43ee-abb5-4b508fd1e47a Instance ID : uuid:266b2b54-4a3c-40a1-998b-6eb05520cea2 Page Layout : SinglePage Page Mode : UseNone Page Count : 413EXIF Metadata provided by EXIF.tools