HP-UX Reference Section 1M: System Administration Commands (N-Z) HP-UX 11i Version 2 December 2007 Update Volume 4 of 10 Manufacturing Part Number : B2355-92069 E1207 Printed in USA © Copyright 1983-2007 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. U.S. Government License Confidential computer software.
Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc. Trademark Notices Intel and Itanium are registered trademarks of Intel Corporation in the US and other countries and are used under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and MS-DOS are U.S. registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of The Open Group in the US and other countries. UNIX is a registered trademark of The Open Group.
Preface HP-UX is the Hewlett-Packard Company’s implementation of a UNIX operating system that is compatible with various industry standards. It is based on the System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The ten volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command (see man (1)) that displays them on the system.
Typographical Conventions audit (5) An HP-UX manpage reference. For example, audit is the name and 5 is the section in the HP-UX Reference. On the web and on the Instant Information CD or DVD, it may be a hyperlink to the manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD or DVD, it may be a hyperlink to the book itself.
Command Syntax Literal A word or character that you enter literally. Replaceable A word or phrase that you replace with an appropriate value. -chars One or more grouped command options, such as -ikx. The chars are usually a string of literal characters that each represent a specific option. For example, the entry -ikx is equivalent to the individual options -i, -k, and -x. The plus character (+) is sometimes used as an option prefix. -word A single command option, such as -help.
Function Synopsis and Syntax HP-UX functions are described in a definition format rather than a usage format. The definition format includes type information that is omitted when the function call is actually included in a program. The function syntax elements are the same as for commands, except for the options; see “Command Syntax” on page 7. Function General Definition The general definition form is: type func ( type param [ , type param ]...
Publishing History Revisions of the HP-UX Reference are published with each initial version release and at significant update milestones for each release. The contents are current as of the publication dates. Since manpages are often updated in software patches, you can find the latest version of a manpage on an appropriately patched system, using the man command. The list below is in reverse order of the date of publication.
B9106-90007-13 HP-UX 11i Version 1.5; June 2001 Release; seven volumes HTML; http://docs.hp.com and Instant Information. B2355-90689-97 HP-UX 11i Version 1; December 2000 Release; nine volumes PDF and HTML; http://docs.hp.com, Instant Information and print. B2355-90680-84 HP-UX 11.0; October 1997 Release; five volumes HTML; http://docs.hp.com. B2355-90166 HP-UX 11.0; October 1997 Release; five volumes PDF; http://docs.hp.com. B2355-90128-31 HP-UX 10.
Volume Four Table of Contents Section 1M
Volume Four Table of Contents Section 1M
Table of Contents Volumes Three and Four Section 1M: System Administration Commands Entry Name(Section): name Description intro(1M): intro ............................ introduction to system maintenance commands and application programs accept(1M): accept, reject ..................................................... allow or prevent LP printer queuing requests acct(1M): acctdisk, acctdusg, accton, acctwtmp .............................................
Table of Contents Volumes Three and Four Entry Name(Section): name Description check_patches(1M): check_patches ............................................................... HP-UX 11i patch check utility chnlspath(1M): chnlspath ............................................................................. configure message catalog path chroot(1M): chroot ................................................................................
Table of Contents Volumes Three and Four Entry Name(Section): name Description envd(1M): envd ...................................................................................... system physical environment daemon exportfs(1M): exportfs ......................................................... export and unexport directories to NFS clients extendfs(1M): extendfs ............................................................................. extend a file system size (generic) extendfs_hfs(1M): extendfs ....
Table of Contents Volumes Three and Four Entry Name(Section): name Description install(1M): install ............................................................................................................ install commands intctl(1M): intctl ........................................................................... manage interrupt configuration of system intrbald(1M): intrbald ................................................................................
Table of Contents Volumes Three and Four Entry Name(Section): name Description lvsplit(1M): lvsplit ............................................ split mirrored LVM logical volume into two logical volumes lvsync(1M) : lvsync ............................................................ synchronize stale mirrors in LVM logical volumes lwresd(1M): lwresd ............................................................................................ lightweight resolver daemon makedbm(1M): makedbm .................
Table of Contents Volumes Three and Four Entry Name(Section): name Description nissetup(1M): nissetup ............................................................................................ initialize a NIS+ domain nisshowcache(1M): nisshowcache .................. NIS+ utility to print out the contents of the shared cache file nisstat(1M): nisstat .......................................................................................... report NIS+ server statistics nisupdkeys(1M): nisupdkeys .........
Table of Contents Volumes Three and Four Entry Name(Section): name Description rarpd(1M): rarpd ...................................................................... Reverse Address Resolution Protocol daemon rbacdbchk(1M): rbacdbchk .......... verify the syntax of the Role-Based Access Control (RBAC) database files rc(1M): rc ...................................................... general purpose sequencer invoked upon entering new run level rcancel(1M): rcancel ..........................................
Table of Contents Volumes Three and Four Entry Name(Section): name Description setmemwindow(1M): setmemwindow ................... set window id of a running process or start a program in a particular memory window setmnt(1M): setmnt ............................................................. establish file-system mount table, /etc/mnttab setoncenv(1M): setoncenv ............................................................ NFS environment configuration command setprivgrp(1M): setprivgrp ...................
Table of Contents Volumes Three and Four Entry Name(Section): name Description udpublickey(1M): udpublickey ................................ updates the publickey database file and the NIS map umount: mount and unmount CDFS file systems ............................................................. see mount_cdfs(1M) umount: mount and unmount HFS file systems ................................................................. see mount_hfs(1M) umount: mount and unmount MemFS file systems ......................
Table of Contents Volumes Three and Four Entry Name(Section): name Description vxtunefs(1M): vxtunefs ............................................................................................. tune a VxFS file system vxumount(1M): vxumount ................................................................................... unmount a VxFS file system vxupgrade(1M): vxupgrade ....................................... upgrade the disk layout of a mounted VxFS file system wall(1M): wall ........................
Section 1M Part 2 System Administration Commands N-Z
Section 1M Part 2 System Administration Commands N-Z
naaagt(1M) naaagt(1M) NAME naaagt - Native Agent Adapter (NAA) SYNOPSIS export HP_NAA_CNF= naaCnf export HP_NAA_PORT= snmpPort export HP_NAA_GET_COMMUNITY=community /usr/sbin/naaagt [-K] [-n] [-E priority] [-m logMask] ... /usr/sbin/naaagt { -h | -help } DESCRIPTION The Native Agent Adapter (naaagt ) allows third-party SNMP agents to work with the HP SNMP Master Agent (snmpdm ). The Native Agent Adapter runs as a subagent to the HP SNMP Master Agent.
naaagt(1M) naaagt(1M) those scripts are merely symbolic links to the automatic start-up/shutdown script under /sbin/init.d , following the same naming conventions documented in the rc(1M) manual page. These scripts are executed by the /usr/sbin/snmpd command. See the IndependentStart-up section for procedures for starting naaagt . Independent Start-up The third-party SNMP agent and its Native Agent Adapter can be started by entering commands directly or by executing an arbitrary script.
naaagt(1M) naaagt(1M) International Code Set Support Supports single-byte character code sets except where the SNMP protocol supports only 7-bit characters encoded in ASCII. WARNINGS The Native Agent Adapter only supports SNMP read requests (for example, SNMP Get). SNMP Set requests must be sent directly to the third-party SNMP agent’s non-standard UDP port (HP_NAA_PORT ).
named(1M) named(1M) NAME named - Internet domain name server SYNOPSIS named [-4] [ -c config_file ] [ -d debuglevel ] [ -f ] [ -g ] [ -n no_of_cpus ] [ -p port_number ] [ -t directory ] [ -u user_id ] [-v ] DESCRIPTION named is the Internet domain name server. See RFC 1033, RFC 1034, and RFC 1035 for more information on the Domain Name System (DNS). Without any arguments, named reads the default configuration file /etc/named.conf, reads any initial data, and listens for queries.
named(1M) named(1M) forwarders { 10.0.0.78; 10.2.0.78; }; }; key rndc_key { algorithm "hmac-md5"; secret "c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K"; }; controls { inet 127.0.0.1 allow { 127.0.0.1; } keys { rndc_key; }; }; zone "." { type hint; file "db.cache"; }; zone "berkeley.edu" { type master; file "db.berkeley"; }; zone "32.128.in-addr.arpa" { type master; file "db.128.32"; }; zone "cc.berkeley.edu" { type slave; file "db.cc"; masters { 128.32.137.
named(1M) named(1M) A server can access information from servers in other domains given a list of root name servers and their addresses. The zone "." line specifies that data in db.cache is to be placed in the backup cache. Its use is to prime the server with the locations of root domain servers. This information is used to find the current root servers and their addresses. The current root server information is placed in the operating cache.
named(1M) named(1M) domain is . for root, @ for the current origin, or a standard domain name. If domain is a standard domain name that does not end with ‘‘.’’, the current origin is appended to the domain. Domain names ending with ‘‘.’’ are unmodified. opt_domain This field is used to define an origin for the data in an included file. It is equivalent to placing an $ORIGIN statement before the first line of the included file. The field is optional.
named(1M) named(1M) NOTE: The boot file directives domain and suffixes have been obsoleted by a more useful, resolverbased implementation of suffixing for partially-qualified domain names. The prior mechanisms could fail under a number of situations, especially when then local name server did not have complete information. The following signals have the specified effect when sent to the server process using the kill(1) command: SIGHUP Causes server to read named.conf and reload database.
ncheck(1M) ncheck(1M) NAME ncheck - generate a list of path names from inode numbers SYNOPSIS /usr/sbin/ncheck [-F FStype] [-V] [-o specific_options] [special ...] DESCRIPTION ncheck , when invoked without arguments, generates a list of path names corresponding to the inode numbers of all files contained on the file systems listed in /etc/fstab. If special is specified, ncheck reports on the special only. Path names generated by ncheck are relative to the given special.
ncheck_hfs(1M) ncheck_hfs(1M) NAME ncheck_hfs: ncheck - generate a list of path names from inode numbers for a HFS file system SYNOPSIS /usr/sbin/ncheck [-F hfs ] [-V] [-S sector_ranges] [-i inode-numbers ] [-a] [-s] [ special ... ] DESCRIPTION ncheck , when invoked without arguments, generates a list of path names corresponding to the inode numbers of all files contained on the HFS file systems listed in /etc/fstab . If special is specified, ncheck reports on the special only.
ncheck_hfs(1M) ncheck_hfs(1M) SEE ALSO acl(5), fsck(1M), fstab(4), fs_wrapper(5), ncheck(1M), sort(1).
ncheck_vxfs(1M) ncheck_vxfs(1M) NAME ncheck_vxfs: ncheck - generate pathnames from inode numbers for a VxFS file system SYNOPSIS ncheck [-a] [-F vxfs ] [-i ilist] [-o specific_options] [-s] [-S sector_list ] [-V ] special ... DESCRIPTION ncheck generates a list of pathnames corresponding to inode numbers for files in a specified VxFS file system. You can specify a range for some options. A range can be a single number, or two numbers separated by a hyphen (-). The range is inclusive.
ncheck_vxfs(1M) ncheck_vxfs(1M) sector_list consists of one or more ranges of sector numbers, separated by commas without intervening spaces. Multiple -S options accumulate. -V Echo the completed command line, but do not execute the command. The command line is generated by incorporating the user-specified options and other information derived from /etc/fstab . This option allows the user to verify the command line. Operands ncheck_vxfs recogizes the following operand: special A VxFS file system.
ncheck_vxfs(1M) STRUCTURAL STRUCTURAL UNNAMED UNNAMED UNNAMED - ncheck_vxfs(1M) 1 1 999 999 999 - 97 97 96 1807 1822 - 999 999 - 65 65 - 59072-59135 1152-1159 4861 344387 328082 19766-19769 347192-347194 /file1 /file1000 /file2 DIAGNOSTICS When the file system structure is not correct, ncheck prints ??? to denote the ‘‘parent’’ of a parentless file. A pathname beginning with ... denotes a loop. A pathname beginning with *** denotes a directory entry whose ..
ndd(1M) ndd(1M) NAME ndd - network tuning SYNOPSIS ndd ndd ndd ndd ndd ndd -get network_device parameter -set network_device parameter value -h sup [ported ] -h unsup [ported ] -h [parameter] -c DESCRIPTION The ndd command allows the examination and modification of several tunable parameters that affect networking operation and behavior. It accepts arguments on the command line or may be run interactively. The -h option displays all the supported and unsupported tunable parameters that ndd provides.
ndd(1M) ndd(1M) To get a list of all TCP related parameters: ndd -get /dev/tcp ? To get the current value of the tunable parameter, ip_forwarding: ndd -get /dev/ip ip_forwarding To set the value of the default TTL parameter for UDP to 128: ndd -set /dev/udp udp_def_ttl 128 FILES /etc/rc.config.d/nddconf Contains tunable parameters that will be set automatically each time the system boots. AUTHOR ndd was developed by HP.
ndp(1M) ndp(1M) NAME ndp - IPv6 Neighbor Discovery cache display and control SYNOPSIS ndp host ndp ndp ndp ndp ndp ndp ndp ndp [-i interface] [-n ] -a [-i interface] [-n ] -A interval [-i interface] [-q ] -d host [-i interface] [-nq ] -F [-i interface] -p [-i interface] [-q ] -P -s interface host hw_addr [pub ] -f filename DESCRIPTION The ndp command displays and modifies the IPv6 Neighbor Discovery cache as specified in the IPv6 Neighbor Discovery (ND) protocol.
ndp(1M) ndp(1M) -f filename Create Neighbor Discovery cache entries from the specifications found in the file specified by filename. Each entry in this file specifies the interface, host, hw_addr, and optionally the pub flag. For example, the content of this file can be: lan0 nodea 1:2:3:4:5:6 lan1 nodeb 2:3:4:5:6:7 pub The use of -d, -F, -P, -s , and -f options requires root privileges.
ndp(1M) ndp(1M) To show Neighbor Discovery cache entries for an interface: # ndp -n -i lan3 -a Destination fe80::210:83ff:fef7:7a9d Physical Address 0:10:83:f7:7a:9d Interface State Flags lan3 REACHABLE LP To delete a Neighbor Discovery cache entries for a host and an interface: # ndp -i lan1 -d fe80::202:fdff:fe36:8720 fe80::202:fdff:fe36:8720 (fe80::202:fdff:fe36:8720) deleted.
netfmt(1M) netfmt(1M) NAME netfmt - format tracing and logging binary files SYNOPSIS /usr/sbin/netfmt [-k] -s [-t records] [[-f] file_name] /usr/sbin/netfmt [-k] -p [-c config_file] /usr/sbin/netfmt [-c config_file] [-F] [-t records] [-v] [-l] [-n] [-N [-1 [-L] [-T]]] [[-f] file_name] /usr/sbin/netfmt -k [-c config_file] [-F] [-t records] [-v] [[-f] file_name] DESCRIPTION netfmt is used to format binary trace and log data gathered from the network tracing and logging facility (see nettl(1M)) and the ke
netfmt(1M) -v netfmt(1M) Enables output of verbose information. This includes additional cause and action text with formatted output. This information describes the possible cause of the message and any actions that may be required by the subsystem. After the contents of the input file have been formatted a summary of the file is displayed. When this option is used with the -t option, only a summary of the last records is reported.
netfmt(1M) netfmt(1M) Global Filtering: For NetTL’s Subsystems The below explained global filtering options apply only to NetTL’s subystems. NetTL’s global filtering commands start with the word formatter , followed by the keywords verbosity , mode , option , or filter . formatter verbosity value, value should be either of Enables output of netfmt internal debugging information to standard error. Same as the -v option. high low formatter mode value, No internal debugging information is to be displayed.
netfmt(1M) netfmt(1M) formatter filter User_ID value value specifies the ID number of the messages to format. Last-entered value has precedence over any previous ones. See the record header in the formatted output to determine which ID numbers to filter on. The ! operator is not allowed in value. formatter filter kind value [subsystem] value can either be an established trace kind or a mask. A mask is a hexadecimal representation of a (set of) trace kind(s). Masks in multiple lines are logically ORed.
netfmt(1M) netfmt(1M) The time_from specification includes only those records starting from the resolution of time given. For example, if the time_of_day for time_from is specified as 10:08:00, all times before that, from 10:07:59.999999 and earlier, are excluded from the formatted output. Records with times of 10:08:00.000000 and later are included in the formatted output. Similarly, the time_through specification includes only up to the resolution of time given.
netfmt(1M) netfmt(1M) (the default), use the * operator. To eliminate all subsystems, use the !* operator. kl_formatter filter time_from value kl_formatter filter time_through value The functionality is same as in the case of NetTL. Subsystem Filtering Note: Global filtering described above takes precedence over individual subsystem tracing and logging filtering described below. Subsystem filters are provided to allow filtering of data for individual subsystems or groups of subsystems.
netfmt(1M) netfmt(1M) LAN trace and log filters use the following format: filter type [!] value * filter is the keyword identifying the filter as a LAN subsystem filter. The following filters are available for LAN tracing. filter connection value value takes the form: local_addr :port remote_addr :port where local_addr and remote_addr can be a hostname or a 4-byte Internet address specified in decimal dot notation (see inet(3N) for more information on Internet addresses and decimal dot notations).
netfmt(1M) netfmt(1M) filter rpcprocedure value value is an integer RPC procedure number. The integer value can be designated by a hexadecimal integer (0xdigits), an octal integer (0digits), or a base-10 integer (0 through 65535). filter rpcdirection value value can be either call or reply . filter type value value is a hexadecimal integer of the form: 0x digits; an octal integer of the form: 0digits; or a base-ten integer (0 through 65535).
netfmt(1M) netfmt(1M) STREAMS Filtering The STREAMS subsystem filter allows filtering on some fields of the messages logged by STREAMS modules and drivers. See strlog(7) for more information. EXTERNAL INFLUENCES International Code Set Support Single- and multibyte character code sets are supported in data. Single-byte character codesets are supported in filenames. DEPENDENCIES netfmt only recognizes subsystems and filters from products which have been installed and configured.
netfmt(1M) 4. netfmt(1M) Format all packets transmitted from the local node, local , to the remote node, 192.6.1.3 , which reference local TCP service ports login or shell , or remote UDP port 777 : filter filter filter filter filter 5. 6. 7. ip_saddr ip_daddr tcp_sport tcp_sport udp_dport local 192.6.1.3 login shell 777 Format a TCP connection from local node node2 to 192.6.1.3 which uses node2 service port ftp and remote port 1198 . filter connection node2:ftp 192.6.1.
nettl(1M) nettl(1M) NAME nettl - control network tracing and logging SYNOPSIS /usr/sbin/nettl -start /usr/sbin/nettl -stop /usr/sbin/nettl -firmlog 012 -card dev_name ... /usr/sbin/nettl -log class ... -entity subsystem ... /usr/sbin/nettl -status [log trace all ] /usr/sbin/nettl -traceon kind ... -entity subsystem ... [-card dev_name ...
nettl(1M) nettl(1M) Used with first -traceon option or alone after tracing has been turned on. Used to set the buffer flush timer. This value can be set in seconds. Default value is 5 seconds. timer_value can be in the range of 1 to 10 seconds. Set the maximum time (in seconds) by which buffers are flushed to the disk. The trace buffers are written to the disk when the timer value expires or once the buffers are filled, whichever occurs earlier.
nettl(1M) nettl(1M) Examples of LAN subsystems: ns_ls_driver ns_ls_icmp ns_ls_nfs ns_ls_ipv6 ns_ls_loopback ns_ls_tcp ns_ls_udp ns_ls_icmpv6 ns_ls_x25 ns_ls_igmp ns_ls_ip Two X.25-specific subsystems are used for tracing only: SX25L2 SX25L3 -file tracename (Abbr.: -f) Used with the first -traceon option only. The first time the -traceon keyword is used, it initializes tracing, creating a file tracename .TRC000 which receives the binary tracing data. If a trace file of the name tracename .
nettl(1M) nettl(1M) "nettl -log class -entity subsystem" command with a new log class value. If desired, the command can be run for different log classes and different entities. -m bytes Specify the number of bytes (bytes) of each trace record to trace. This option allows you to specify the number of bytes to be captured in the trace packet. You may prefer not to capture an entire PDU trace, such as when you are only interested in the header. The maximum value for bytes is 2000.
nettl(1M) nettl(1M) Tracing uses a circular file method such that when one file fills up, another file is used. The number of trace files that can exist on a system at any given time can be specified using the -n option. See Data File Management below for more information on file behavior. maxsize specifies the maximum size in kilobytes (KB) of any two trace files combined. Therefore, the maximum size of each trace file will be approximately half of maxsize kilobytes (KB).
nettl(1M) nettl(1M) loopback Packets whose source and destination system is the same. For multiple kinds, the masks can be specified separately or combined into a single number. For example, to enable both pduin and pduout (to trace all packets coming into and out of the node) use either pduin pduout or 0x10000000 0x20000000 or the combination 0x30000000 . Not all subsystems support all trace kinds. No error is returned if a given subsystem does not support a particular trace kind.
nettl(1M) nettl(1M) All log messages written to the console as a result of this configuration information are in a special short form. If more information is desired on the console, the netfmt formatter can be used to direct output to the console device. This may be most useful in an X windows environment. Console logging may be disabled if conservation of system resources is valued more than notification of log events.
nettl(1M) nettl(1M) nettl -tn pduin pduout -e ns_ls_driver -file /var/adm/LAN 9. Enable all kinds of tracing for gelan (GELAN driver) with initial trace memory being 256MB. Binary trace data goes to file /tmp/gelan.TRC000 and combined file size being 128MB. This example assumes that the -traceon option is being used for the first time. 10. Enable all kinds of tracing for igelan (IGELAN driver) with initial trace memory being 128MB and maximum memory that can be allocated being 512MB.
nettl(1M) nettl(1M) SEE ALSO netfmt(1M), nettlconf(1M), nettlgen.conf(4).
nettladm(1M) nettladm(1M) NAME nettladm - network tracing and logging administration manager SYNOPSIS /opt/nettladm/bin/nettladm [-t-l] [-c filter_file] DESCRIPTION The nettladm command is a tool used to administer network tracing and logging. It provides an interactive user interface to the nettl, netfmt, and nettlconf commands. The interface runs in either text terminal mode or in a Motif graphical environment.
nettladm(1M) nettladm(1M) /var/adm/nettl.TRC000 Default trace file. /opt/nettladm/lib/X11/app-defaults/Nettladm X11 application defaults file. AUTHOR nettladm was developed by HP. SEE ALSO nettl(1M), netfmt(1M), nettlconf(1M), nettlgen.conf(4).
nettlconf(1M) nettlconf(1M) NAME nettlconf - configure network tracing and logging command subsystem database SYNOPSIS /usr/sbin/nettlconf [ -KL ] -status /usr/sbin/nettlconf -L [ -console conlog ] [ -portsize logportsize ] [ -space maxlogspace ] [ -filename logfilename ] [ -option logoptfile ] /usr/sbin/nettlconf [ -KL ] [ -qmin minimumklqueuesize ] [ -qmax maximumklqueuesize ] [ -space maxlogspace ] [ -filename logfilename ] [ -write writelog ] /usr/sbin/nettlconf [ -S ] -id ssid -name ssname [ -class
nettlconf(1M) nettlconf(1M) the combined size of the 2 ping-ponged log files. Specify the size in multiples of 1024 bytes. Valid range is 1 through 10240. Default is 1000. This is an optional field. -filename logfilename (abbrev: -f) logfilename is the path and file name to be used as the system log file, without the ping-pong extension (.LOGx). The default system log file is /var/adm/nettl. This is an optional field.
nettlconf(1M) -class logclass nettlconf(1M) (abbrev: -c) logclass is the default log class mask assigned to the subsystem at start-up of NetTL or KL facility. This is an optional field. There is an important difference between the interpretation of the logclass by NetTL and KL facilities. Interpretation By NetTL For multiple classes, the masks must be combined into a single decimal number. For example, to initially log DISASTER and ERROR events use 12 as the logclass.
nettlconf(1M) nettlconf(1M) typically the product name of the subsystem. Several subsystems can be grouped together so that a common banner is printed in the formatted header. This is a required field. The following option is used to remove a subsystem description from the database. -delete ssid (abbrev: -d) Deletes all information associated with the ssid (subsystem ID) from the database.
newaliases(1M) newaliases(1M) NAME newaliases - rebuilds the database for the mail aliases file SYNOPSIS newaliases [-on ] DESCRIPTION newaliases rebuilds the random access database for the mail aliases file /etc/mail/aliases. It must be run each time this file is changed in order for the change to take effect. newaliases is identical to sendmail -bi . Options -on Validate addresses. When sendmail rebuilds the alias database files, it will check the legality of all addresses to the right of the colons.
newfs(1M) newfs(1M) NAME newfs - construct a new file system SYNOPSIS /usr/sbin/newfs [-F FStype] [-o specific_options] [-V] special DESCRIPTION The newfs command is a "friendly" front-end to the mkfs command (see mkfs(1M)). The newfs command calculates the appropriate parameters and then builds the file system by invoking the mkfs command. special represents a character (raw) special device.
newfs_hfs(1M) newfs_hfs(1M) NAME newfs_hfs: newfs - construct a new HFS file system SYNOPSIS /usr/sbin/newfs [-F hfs ] [-B] [-d] [-L-S] [-O disk_type] [-R swap] [-v] [-V] [mkfs-options] special DESCRIPTION The newfs command builds a file system by invoking the mkfs command. The newfs command creates the file system with a rotational delay value of zero (see tunefs(1M)). special represents a character (raw) special device.
newfs_hfs(1M) newfs_hfs(1M) to 32. The default value is 16 cylinders per group. -f fragsize The fragment size for files on the file system. fragsize represents the smallest amount of disk space to be allocated to a file. It must be a power of two no smaller than DEV_BSIZE and no smaller than one-eighth of the file system block size. The default value is 1024 bytes. -i number_of_bytes_per_inode The density of inodes in the file system specified as the number of bytes per inode.
newfs_hfs(1M) newfs_hfs(1M) newfs -F hfs /dev/vg01/rmy_lvol WARNINGS The old -F option, from prior releases of newfs(1M), is no longer supported. newfs(1M) cannot be executed specifying creation of a file system on a whole disk if that disk was previously used as an LVM disk. If you wish to do this, use mediainit(1) to reinitialize the disk first. AUTHOR newfs was developed by HP and the University of California, Berkeley. FILES /etc/disktab /etc/fstab Static information about the file systems.
newfs_vxfs(1M) newfs_vxfs(1M) NAME newfs_vxfs: newfs - create a new VxFS file system SYNOPSIS newfs [-F vxfs ] [-B] [-O disk_type] [-R swap] [-V] [-v] [mkfs_vxfs_options] special DESCRIPTION newfs -F vxfs builds a VxFS file system by invoking mkfs . special specifies a character (or raw) file (for example, /dev/rdsk/c0t6d0). Options newfs recognizes the following options: -B Reserve space for boot programs past the end of the file system.
newfs_vxfs(1M) newfs_vxfs(1M) to indicate another unit of measure. Append k or K to indicate that the value is in kilobytes, m or M to indicate megabytes, or g or G to indicate gigabytes. Operands newfs recognizes the following operand: special A character (raw) file. EXAMPLES To create a VxFS file system on /dev/rdsk/c1t5d0 and reserve 40 megabytes of swap space. newfs -F vxfs -R40 /dev/rdsk/c1t5d0 FILES /etc/disktab /etc/fstab Disk description file. Static information about the file systems.
newkey(1M) newkey(1M) NAME newkey - create a new Diffie-Hellman key pair in the publickey database SYNOPSIS newkey -h hostname [ -s nisplus | nis | files | ldap ] newkey -u username [ -s nisplus | nis | files | ldap ] DESCRIPTION newkey establishes new public keys for users and machines on the network. These keys are needed when using secure RPC or secure NFS service.
nfsd(1M) nfsd(1M) NAME nfsd, biod - NFS daemons SYNOPSIS /usr/sbin/nfsd [ -a ] [ -p protocol ] [ -t device ] [num_nfsd] /usr/sbin/biod [num_nfsiod] DESCRIPTION nfsd starts the NFS server daemons that handle client file system requests (see nfs(7)). num_nfsd is the suggested number of file system request daemons that will start. One daemon will be started to support the kernel threads servicing TCP requests, and multiple additional daemons will be started to service UDP requests.
nfsd(1M) nfsd(1M) The following command: /usr/sbin/biod 16 will result in a total of 16 block I/O daemons being launched. The number of active CPU’s in the system has no effect on the number of biod daemons started. WARNINGS When the biod daemons are not running and the buffer cache is exhausted, I/O on NFS loopback file systems might block indefinitely under rare circumstances, leading to application hangs.
nfsstat(1M) nfsstat(1M) NAME nfsstat - Network File System statistics SYNOPSIS nfsstat [-cmnrsz ] DESCRIPTION nfsstat displays statistical information about the NFS (Network File System) and RPC (Remote Procedure Call), interfaces to the kernel. It can also be used to reinitialize this information. If no options are given, the default is nfsstat -cnrs That is, display everything, but reinitialize nothing. Options -c Display client information.
nfsstat(1M) nfsstat(1M) retrans The number of times a call had to be retransmitted due to a timeout while waiting for a reply from the server. timeout timers The number of times a call timed out while waiting for a reply from the server. wait The number of times a call had to wait because no client handle was available. The number of times the calculated time-out value was greater than or equal to the minimum specified time-out value for a call.
nis_cachemgr(1M) nis_cachemgr(1M) NAME nis_cachemgr - maintains a cache containing location information about NIS+ servers SYNOPSIS /usr/sbin/nis_cachemgr [ -i ] [ -n ] [ -v ] DESCRIPTION The nis_cachemgr daemon maintains a cache of the NIS+ directory objects. The cache contains location information necessary to contact the NIS+ servers that serve the various directories in the name space.
nis_cachemgr(1M) nis_cachemgr(1M) AUTHOR nis_cachemgr was developed by Sun Microsystems, Inc. SEE ALSO keylogin(1), nisaddcred(1M), nisinit(1M), nisshowcache(1M), rpc.nisd(1M), mmap(2), syslog(3C), nisfiles(4).
nisaddcred(1M) nisaddcred(1M) NAME nisaddcred - create NIS+ credentials SYNOPSIS nisaddcred [ -p principal ] [ -P nis_principal ] [ -l login_password ] auth_type [ domain_name ] nisaddcred -r [ nis_principal ] [ domain_name ] DESCRIPTION The nisaddcred command is used to create security credentials for NIS+ principals. NIS+ credentials serve two purposes.
nisaddcred(1M) nisaddcred(1M) 0 (root) are identified with the host principal. Unlike LOCAL, there cannot be more than one DES credential entry for one NIS+ principal in the NIS+ namespace. The public information in an entry of authentication type DES is the public key for the principal. The private information in this entry is the private key of the principal encrypted by the principal’s network password. User clients of NIS+ should have credentials of both types in their home domain.
nisaddcred(1M) nisaddcred(1M) nisaddcred -p 2970 -P fredw.some.domain. local Note that credentials are always added in the cred.org_dir table in the domain where nisaddcred is run, unless domainname is specified as the last parameter on the command line. If credentials are being added from the domain server for its clients, then domainname should be specified. The caller should have adequate permissions to create entries in the cred.org_dir table.
nisaddent(1M) nisaddent(1M) NAME nisaddent - create NIS+ tables from corresponding /etc files or NIS maps SYNOPSIS /usr/lib/nis/nisaddent [ -D defaults ] [ -Parv ] [ -t table ] type [ nisdomain ] /usr/lib/nis/nisaddent [ -D defaults ] [ -Paprmv ] -f file [ -t table ] type [ nisdomain ] /usr/lib/nis/nisaddent [ -D defaults ] [ -Parmv ] [ -t table ] -y ypdomain [ -Y map ] type [ nisdomain ] /usr/lib/nis/nisaddent -d [-AMq] [ -t table ] type [ nisdomain ] DESCRIPTION nisaddent creates entries in NIS+ tab
nisaddent(1M) nisaddent(1M) -p Process the password field when loading password information from a file. By default, the password field is ignored because it is usually not valid (the actual password appears in a shadow file). -q Dump tables in "quick" mode. The default method for dumping tables processes each entry individually. For some tables (e.g., hosts), multiple entries must be combined into a single line, so extra requests to the server must be made.
nisaddent(1M) nisaddent(1M) cat /etc/shadow | nisaddent shadow Replace the hosts.org_dir table with the contents of /etc/hosts (in verbose mode): nisaddent -rv -f /etc/hosts hosts Merge the passwd map from myypdomain with the passwd.org_dir.nisdomain table (in verbose mode) (the example assumes that the /var/yp/myypdomain directory contains the yppasswd map.): nisaddent -mv -y myypdomain passwd nisdomain Merge the auto.master map from myypdomain with the auto_master.
nisclient(1M) nisclient(1M) NAME nisclient - initialize NIS+ credentials for NIS+ principals SYNOPSIS /usr/lib/nis/nisclient -c [-x] [-o] [-v] [-l network_password] [-d NIS+_domain] client_name ...
nisclient(1M) nisclient(1M) Use the fourth synopsis (-r) to restore the network service environment to whatever you were using before nisclient -i was executed. You must be logged in as superuser on the machine that is to be restored. The restore will only work if the machine was initialized with nisclient -i because it uses the backup files created by the -i option. Reboot the machine after initializing a machine or restoring the network service.
nisclient(1M) /etc/defaultdomain /etc/nsswitch.conf /etc/hosts nisclient(1M) the system default domainname configuration file for the name-service switch local host name database WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR nisclient was developed by Sun Microsystems, Inc.
nisinit(1M) nisinit(1M) NAME nisinit - NIS+ client and server initialization utility SYNOPSIS nisinit -r nisinit -p Y |D |N parent_domain host . . . nisinit -c -H host | -B | -C coldstart DESCRIPTION nisinit initializes a machine to be a NIS+ client or an NIS+ root master server. It may be easier to use nisclient(1M) or nisserver (1M) to accomplish this same task. Options -r Initialize the machine to be a NIS+ root server. This option creates the file /var/nis/root.
nisinit(1M) nisinit(1M) /etc/hosts for this host when nisinit is invoked. -B Specifies that the nisinit command should use an IP broadcast to locate a NIS+ server on the local subnet. Any machine that is running the NIS+ service may answer. No guarantees are made that the server that answers is a server of the organization’s namespace. If this option is used, it is advisable to check with your system administrator that the server and domain served are valid.
nislog(1M) nislog(1M) NAME nislog - display the contents of the NIS+ transaction log SYNOPSIS /usr/sbin/nislog [-h num-t num] [-v] [directory]... DESCRIPTION nislog displays the contents of the NIS+ server transaction log on the standard output. This command can be used to track changes in the namespace. The /var/nis/ hostname .log file contains the transaction log maintained by the NIS+ server. hostname is the string returned by uname -n.
nisping(1M) nisping(1M) NAME nisping - send ping to NIS+ servers SYNOPSIS /usr/lib/nis/nisping [ -uf ] [ -H hostname ] [ -r | directory ] /usr/lib/nis/nisping -C [ -a ] [ -H hostname ] [ directory ] DESCRIPTION In the first SYNOPSIS line, the nisping command sends a ping to all replicas of a NIS+ directory. Once a replica receives a ping, it will check with the master server for the directory to get updates.
nisping(1M) nisping(1M) This example pings the server example which is a replica of the org_dir.foo.com. directory: nisping -H example org_dir.foo.com. This example checkpoints all servers of the org_dir.bar.com. directory. nisping -C org_dir.bar.com. EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set, and the NIS+ directory name is not fully qualified, each directory specified will be searched until the directory is found.
nispopulate(1M) nispopulate(1M) NAME nispopulate - populate the NIS+ tables in a NIS+ domain. SYNOPSIS /usr/lib/nis/nispopulate -Y [-x] [-f] [-n] [-u] [-v] [-S 0|2] [-l network_passwd] [-d NIS+_domain] -h NIS_server_host [-a NIS_server_addr] -y NIS_domain [table] . . . /usr/lib/nis/nispopulate -F [-x] [-f] [-u] [-v] [-S 0|2] [-d NIS+_domain] [-l network_passwd] [-p directory_path] [table] . . .
nispopulate(1M) nispopulate(1M) -h NIS_server_host specifies the NIS server hostname from where the NIS maps are copied. This is only used with the -Y option. This host must already exist in either the NIS+ hosts table or /etc/hosts file. If the hostname is not defined, the script will prompt you for its IP address, or you can use the -a option to specify the address manually. -l network_passwd specifies the network password for populating the NIS+ credential table.
nispopulate(1M) To create nispopulate(1M) and populate a non-standard key-value type NIS+ table, "private", from the file /var/nis/files/private: (nispopulate assumes that the private.org_dir key-value type table has already been created). /usr/bin/nistbladm -D access=og=rmcd,nw=r \ -c private key=S,nogw= value=,nogw= private.org.dir /usr/lib/nis/nispopulate -F -p /var/nis/files private WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported.
nisserver(1M) nisserver(1M) NAME nisserver - set up NIS+ servers.
nisserver(1M) nisserver(1M) EXAMPLES To set up a root master server for domain hp.com. : root_server# /usr/lib/nis/nisserver -r -d hp.com. For the following examples make sure that the new servers are NIS+ clients and rpc.nisd is running on these hosts before executing nisserver . To set up a replica server for domain hp.com. on host hpreplica : root_server# /usr/lib/nis/nisserver -R -d hp.com. -h hpreplica To set up a non-root master server for domain xyz.hp.com.
nissetup(1M) nissetup(1M) NAME nissetup - initialize a NIS+ domain SYNOPSIS /usr/lib/nis/nissetup [ -Y ] [ domain ] DESCRIPTION nissetup is a shell script that sets up a NIS+ domain to serve clients that wish to store system administration information in a domain named domain. This domain should already exist prior to executing this command (see nismkdir(1) and nisinit(1M)). A NIS+ domain consists of a NIS+ directory and its subdirectories: org_dir and groups_dir .
nisshowcache(1M) nisshowcache(1M) NAME nisshowcache - NIS+ utility to print out the contents of the shared cache file SYNOPSIS /usr/lib/nis/nisshowcache [ -v ] DESCRIPTION nisshowcache prints out the contents of the per-machine NIS+ directory cache that is shared by all processes accessing NIS+ on the machine. By default, nisshowcache only prints out the directory names in the cache along with the cache header. The shared cache is maintained by nis_cachemgr(1M). Options -v Verbose mode.
nisstat(1M) nisstat(1M) NAME nisstat - report NIS+ server statistics SYNOPSIS /usr/lib/nis/nisstat [ -H host ] [ directory ] DESCRIPTION The nisstat command queries a NIS+ server for various statistics about its operations. These statistics may vary between implementations and from release to release. Not all statistics are available from all servers. Requesting a statistic from a server that does not support that statistic is never fatal, it simply returns ’unknown statistic.
nisstat(1M) nisstat(1M) AUTHOR nisstat was developed by Sun Microsystems, Inc. SEE ALSO nisdefaults(1).
nisupdkeys(1M) nisupdkeys(1M) NAME nisupdkeys - update the public keys in a NIS+ directory object SYNOPSIS /usr/lib/nis/nisupdkeys [ -a | -C ] [ -H host ] [ directory ] /usr/lib/nis/nisupdkeys -s [ -a | -C ] -H host DESCRIPTION This command updates the public keys in an NIS+ directory object. When the public key for a NIS+ server is changed, the new key must be propagated to all directory objects that reference that server.
nisupdkeys(1M) nisupdkeys(1M) This example updates the public key in all directory objects that are served by the host wilma. nisupdkeys -s -H wilma WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR nisupdkeys was developed by Sun Microsystems, Inc. SEE ALSO chkey(1), niscat(1), nisaddcred(1M), gethostent(3N), nis_objects(3N).
ntpdate(1M) ntpdate(1M) NAME ntpdate - set the date and time via NTP SYNOPSIS ntpdate [ -Bbdpqsuv ] [ -a key# ] [ -e authdelay ] [ -k keyfile ] [ -o version ] [ -p samples ] [ -t timeout ] server [ ... ] DESCRIPTION ntpdate sets the local date and time by polling those Network Time Protocol (NTP) server(s) given as the server arguments to determine the correct time. It must be run as root on the local host.
ntpdate(1M) ntpdate(1M) -q Prints the offset measurement, stratum of the server(s) and delay measurement without adjusting the local clock. This is similar to -d option which gives a more detailed debugging information. -s Divert logging output from the standard output (default) to the system syslog (see syslog(3C)) facility. This is designed primarily for convenience of cron scripts. -t timeout Specify the maximum waiting time for a server response as the value timeout, in seconds and fraction.
ntpq(1M) ntpq(1M) NAME ntpq - standard Network Time Protocol query program SYNOPSIS ntpq [ -dinp ] [ -c command ] [ host ] [ ... ] DESCRIPTION ntpq is used to query NTP servers, that implement the recommended NTP mode 6 control message format about current state and to request changes in that state. The program may be run either in interactive mode or controlled mode using command line arguments.
ntpq(1M) ntpq(1M) included in control messages can be assembled, and sent using the readlist and writel- ist commands described below. addvars This command allows variables and their optional values to be added to the list. If more than one variable is to be added, the list should be comma-separated and not contain white space. rmvars This command can be used to remove individual variables from the list. clearlist This command removes all variables from the list.
ntpq(1M) ntpq(1M) Control message commands result in one or more NTP mode 6 messages being sent to the server, and cause the data returned to be printed in some format. Most commands currently implemented send a single message and expect a single response. The current exceptions are the peers command, which will send a preprogrammed series of messages to obtain the data it needs, and the mreadlist and mreadvar commands, which will iterate over a range of associations.
ntpq(1M) ntpq(1M) broadcast), when the last packet was received, the polling interval, in seconds, the reachability register, in octal, and the current estimated delay, offset and dispersion of the peer, all in seconds. The character in the left margin indicates the fate of this peer in the clock selection process. The codes mean: x .
ocd(1M) ocd(1M) NAME ocd - outbound connection daemon used by DDFA software SYNOPSIS ocd -fpseudonym -nnode_name [-bboard_no] [-cconfig_file] [-llog_level ] [-pport_no] DESCRIPTION The Outbound Connection Daemon (ocd ) is part of the Data Communications and Terminal Controller (DTC) Device File Access (DDFA) software. It manages the connection and data transfer to the remote terminal server port. It can be spawned from the Dedicated Port Parser (dpp ) or run directly from the shell.
ocd(1M) ocd(1M) In order to shutdown every ocd running without restarting them, the following command can be executed: kill -15 ‘ps -e | grep ocd | awk ’{print $1}’‘ WARNINGS In order to ensure that commands (such as ps ) display the correct device file name (that is, the pseudonym), all pseudonyms should be placed into the directory /dev/telnet . If pseudonyms are not specified for placement in this directory, the correct display of device file names with many commands is not guaranteed.
ocdebug(1M) ocdebug(1M) NAME ocdebug - outbound connection daemon debug utility used by DDFA software SYNOPSIS ocdebug -fpseudonym -nnode_name [-bboard_no ] [-cconfig_file ] [-ddebug_level ] [-llog_level ] [-pport_no ] DESCRIPTION The ocdebug daemon is the debugging version of the Outbound Connection Daemon (ocd ). ocd is part of the Data Communications and Terminal Controller (DTC) Device File Access (DDFA) software. It manages the connection and data transfer to the remote terminal server port.
ocdebug(1M) ocdebug(1M) 1 2 3 Log only LOG_CRIT and LOG_ERR messages. Log only LOG_CRIT, LOG_ERR, and LOG_WARNING messages. Log all messages. If it is omitted, the logging level is set to 1. -nnode_name Specify the IP address of the terminal server or the port. -pport_no Specify a DTC port number or, if the -b option is omitted, the TCP port service address that will be used by the software to access the port. If the value is omitted, the value 23 (Telnet) is used by default.
olrad(1M) olrad(1M) NAME olrad - command for online addition/replacement of PCI IO cards SYNOPSIS Adding Card Commands /usr/bin/olrad [-f] -a slot_id /usr/bin/olrad -A slot_id Replacing Card Commands /usr/bin/olrad [-f] -r slot_id /usr/bin/olrad -R slot_id Other Commands /usr/bin/olrad /usr/bin/olrad /usr/bin/olrad /usr/bin/olrad /usr/bin/olrad /usr/bin/olrad /usr/bin/olrad -n |-q [-F] -q [-F] -h|-c slot_id [-F] -v interface_hw_path -g device_hw_path|slot_hw_path -I |-P|-p flag slot_id -C |-e slot_id D
olrad(1M) -r slot_id olrad(1M) Prepare to replace a card on the system at the specified slot. Critical resource analysis is run to ensure that the current card replacement on the system will not cause disruption in the functioning of the system. The driver scripts (pref_replace and prep_replace ) for the affected slots (if any) and the current slot are run. The drivers associated with the current slot and affected slots are suspended.
olrad(1M) olrad(1M) PCI Express Based Slots: On systems with OLA/R capable PCI-Express slots, the output fields are slightly varied. The detailed description of the fields displayed for such slots are as mentioned below; • Max Link Spd (Expressed in Giga Bits / Second) indicates the maximum link speed possible for the PCI-Express Link at the slot. • Link Spd (Expressed in Giga Bits / Second) indicates the negotiated link speed of the PCI-Express Link at the slot.
olrad(1M) olrad(1M) Command displays the device command register. Multi-func displays if this is one of the multiple functions on the PCI device. Bridge displays if the device is a PCI-to-PCI bridge device. Capable_66Mhz displays if the device is capable of operating at 66 MHz frequency. Power_Consumption displays the power consumption of the device. Capable_Frequency displays the bus frequency at which the device is capable of running.
olrad(1M) olrad(1M) bad. The card in error can be replaced with another card of the same type, and a post replace operation can be tried with the replaced card. A complete description on PCI Error Handling is not covered here. Refer to documents on PCI Error Handling for details, available at the http://docs.hp.com website. Note that the sequence mentioned here for PCI Error Handling is generic. This is subject to changes depending on different platforms and operating system releases.
olrad(1M) olrad(1M) SEE ALSO ioscan(1M), nettl(1M), netfmt(1M).
opx25(1M) opx25(1M) (TO BE OBSOLETED) NAME opx25 - execute HALGOL programs SYNOPSIS /usr/lbin/uucp/X25/opx25 [-f scriptname] [-c char] [-ofile-descriptor] [-ifile-descriptor] [-nstring] [-d] [-v] DESCRIPTION The uucp commands, including opx25 , are targeted for removal from HP-UX; see the WARNINGS below. HALGOL is a simple language for communicating with devices such as modems and X.25 PADs. It has simple statements similar to send xxx and expect yyy that are described below.
opx25(1M) opx25(1M) (TO BE OBSOLETED) set debug Sets the program in debug mode. It echoes each line to /tmp/opx25.log, as well as giving the result of each expect and run. This can be useful for writing new scripts. The command set nodebug disables this feature. set log Sends subsequent incoming characters to /var/uucp/.Log/LOGX25. This can be used in the *.in file as a security measure, because part of the incoming data stream contains the number of the caller.
ospf_monitor(1M) ospf_monitor(1M) NAME ospf_monitor - monitor OSPF (Open Shortest Path First protocol) gateways SYNOPSIS ospf_monitor mon_db_file DESCRIPTION Use the ospf_monitor command to query OSPF routers. The ospf_monitor command operates in interactive mode. It allows the user to query the various OSPF routers to provide detailed information on IO statistics, error logs, link-state data bases, AS external data bases, the OSPF routing table, configured OSPF interfaces, and OSPF neighbors.
ospf_monitor(1M) 5 ospf_monitor(1M) Request the AS external link advertisements. They describe routes to destinations external to the Autonomous System. For this type of request, the ls_id field should be set to the destination network’s IP address. c Display cumulative log. This log includes input/output statistics for monitor request, hello, data base description, link-state request, link-state update, and link-state ack packets.
owners(1M) owners(1M) NAME owners - list owners of outgoing network connections SYNOPSIS /usr/sbin/owners DESCRIPTION owners displays a list of established network connections which originate on this system, and indicates the owners of each connection using the identd running on this system. SEE ALSO sendmail(1M).
parcreate(1M) parcreate(1M) NAME parcreate - create a new partition SYNOPSIS parcreate -c cell :[celltype]:[use_on_next_boot]:[failure_usage][:clm_value] [ -c cell :[celltype]:[use_on_next_boot]:[failure_usage] [:clm_value] ]... [-b path] [-t path] [-s path] [-r cell] [-T flag] [-r cell]... [-k s_lock] [-B ] [-I IPaddress] [-L clm_value] [-P PartitionName] [ [ -u username :[passwd] -h IPaddress|hostname ] | [ -g [passwd] -h IPaddress|hostname ] ] DESCRIPTION The parcreate command creates a new partition.
parcreate(1M) parcreate(1M) precedence over the clm_value specified using the -L option. The command will issue a warning if the specified clm_value exceeds the total memory of the cell. Note: On PA-RISC platforms, the amount of memory allocated for CLM may not match the amount of CLM requested due to some memory being reserved exclusively by the operating system. If no clm_value is specified, maximum interleaved memory (no CLM) is assumed for cells.
parcreate(1M) parcreate(1M) If an error is reported when you attempt to connect using this option, check to see that IPMI LAN access has not been disabled on the remote service processor. Access to the complex via IPMI over LAN can be enabled or disabled by logging on to the service processor and using the SA command from the Command Menu. The -u and -g options are mutually exclusive. SECURITY WARNING: Specifying the password directly on the command line may pose a security risk in your environment.
parcreate(1M) parcreate(1M) Mapping of Global Cell Numbers to Local Cell Numbers The cabinets in a complex are numbered starting from 0. The cell slots in each cabinet are also numbered starting from 0. Each cabinet can have a maximum of 8 cells. For example, the cells located in cabinet 0 will have the following cell numbers in global format: 0, 1, 2, 3, 4, 5, 6, 7. The cell numbers in corresponding local format will be 0/0, 0/1, 0/2, 0/3, 0/4, 0/5, 0/6, 0/7.
parcreate(1M) parcreate(1M) AUTHOR parcreate was developed by the Hewlett-Packard Company. SEE ALSO fruled(1), parstatus(1), cplxmodify(1M), frupower(1M), parmgr(1M), parmodify(1M), parremove(1M), parunlock(1M), partition(5). HP System Partitions Guide on http://docs.hp.com, HP WBEM Services for HP-UX System Administrator’s Guide on http://docs.hp.com, HP WBEM Services for HP-UX 11i v2.0 on Integrity Servers Version A.01.05 Release Notes on http://docs.hp.com.
parmodify(1M) parmodify(1M) NAME parmodify - modify an existing partition SYNOPSIS parmodify -p PartitionNumber {-a cell :[celltype]:[use_on_next_boot]:[failure_usage][:clm_value] [-a cell :[celltype]:[use_on_next_boot]:[failure_usage] [:clm_value]]... |-m cell :[celltype]:[use_on_next_boot]:[failure_usage][:clm_value] [-m cell :[celltype]:[use_on_next_boot]:[failure_usage] [:clm_value]]... |-d cell [-d cell]... |-B |-r cell [-r cell]...
parmodify(1M) parmodify(1M) command is executing is called the local partition. One or more of the following options must be specified with the -p option. -u username:[passwd] Specifies the required authorization to access a partition other than the local system (but can also be used as a loopback access to the local partition). The -h option is required if this option is used. username specifies a configured user name on the target partition. passwd specifies the password associated with the username.
parmodify(1M) parmodify(1M) use_on_next_boot specifies whether the cell will participate in a reboot. The valid values for use_on_next_boot are: y participate in reboot. This is the default. However if the slot is missing or the cell does not exist or the cell is powered off then it defaults to n do not participate in reboot. n failure_usage field is used by system firmware when a partition is booted.
parmodify(1M) parmodify(1M) -B Specifies to reboot the partition now. The default is not to boot. If this option is specified and the partition to be modified is not the local partition, then the command proceeds only if the specified partition is not active. Also this option is useful only if the -a option or the -d option or a clm_value has been specified. -r cell Specifies the core cell choices. A core cell choice is a configured cell which has attached core IO.
parmodify(1M) parmodify(1M) RETURN VALUE The parmodify command exits with one of the following values: Successful completion. Error condition occurred. 0 1 EXAMPLES Add a new cell in cabinet 0 slot 5 to the existing Partition 2 and activate it. parmodify -p 2 -a 0/5:base:y:ri:50% -B Delete a cell in cabinet 0 slot 5 from the existing Partition 2.
parremove(1M) parremove(1M) NAME parremove - remove an existing partition SYNOPSIS parremove -p PartitionNumber [-F] [-k s_lock:p_lock] [ [ -u username:[passwd] -h IPaddress|hostname] | [-g [passwd] -h IPaddress|hostname] ] DESCRIPTION The parremove command removes an existing partition. This will unassign all cells from the partition and destroy the partition definition. PartitionNumber, the target partition, must be inactive except when the -F option is used.
parremove(1M) parremove(1M) Note: This command is a Web-Based Enterprise Management (WBEM) Client Application. The -u option accesses the target partition using a Secure Sockets Layer (SSL) connection. If errors are reported, check that the conditions described in the DEPENDENCIES section are satisfied. SECURITY WARNING: Specifying the password directly on the command line may pose a security risk in your environment.
parremove(1M) parremove(1M) EXAMPLES Remove the inactive partition whose PartitionNumber is 2: parremove -p 2 Remove an inactive partition in the same complex as the remote host Penzance. The command prompts for the root password: parremove -p 0 -u root: -h Penzance WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which passing passwd for the -u and -g options is supported. Specifying passwd on the command line will not be supported in future releases. The command will prompt for the password.
parunlock(1M) parunlock(1M) NAME parunlock - unlock the Stable Complex Configuration Data, Partition Configuration Data, Dynamic Complex Configuration Data, Cell Data or cancel pending changes to the Stable Complex Configuration Data SYNOPSIS parunlock -p PartitionNumber [-s] [-d] [-P] [-c cell] [ [ -u username :[passwd] -h IPaddress|hostname ] | [ -g [passwd] -h IPaddress|hostname ] ] parunlock -s [-d] [-P] [-c cell] [-p PartitionNumber] [ [ -u username :[passwd] -h IPaddress|hostname ] | [ -g [passwd]
parunlock(1M) parunlock(1M) passwd specifies the password associated with the username. If this field is empty, the command prompts for the password. Note: This command is a Web-Based Enterprise Management (WBEM) Client Application. The -u option accesses the target partition using a Secure Sockets Layer (SSL) connection. If errors are reported, check that the conditions described in the DEPENDENCIES section are satisfied.
parunlock(1M) 0 1 parunlock(1M) Successful completion. Error condition occurred. EXAMPLES Unlock the Partition Configuration Data of the partition whose partition number is 2. parunlock -p 2 Unlock the cell data of the cell 2. parunlock -c 2 Unlock the Stable Complex Configuration Data on the local complex. parunlock -s Unlock the Dynamic Complex Configuration Data on the local complex.
pcnfsd(1M) pcnfsd(1M) NAME pcnfsd: rpc.pcnfsd - PC-NFS authentication and print request server SYNOPSIS /usr/sbin/rpc.pcnfsd DESCRIPTION pcnfsd is an RPC server that supports ONC clients on PC (DOS, OS/2, Macintosh, and other) systems. This describes version two of the pcnfsd server. pcnfsd can be started from the /sbin/init.d/nfs.server startup script by setting the PCNFS_SERVER variable to 1 in /etc/rc.config.d/nfsconf, or from the inetd daemon (see inetd(1M)).
pcnfsd(1M) pcnfsd(1M) To process print data in a special way (for example, to print it in landscape mode, or to print it in duplex mode), define a new printer and arrange for the client to print to that printer. There are two ways to define the new printer: • You can add a new printer to the line printer spooling system that uses a different printer model script, and arrange for the client to use the new printer. Do this using the lpadmin command (see lpadmin(1M)).
pcnfsd(1M) pcnfsd(1M) SEE ALSO lp(1), lpstat(1), inetd(1M), lpadmin(1M), wtmp(4).
pcserver(1M) pcserver(1M) NAME pcserver - Basic Serial and HP AdvanceLink server SYNOPSIS pcserver [-n] [-l [ log_file ] ] [-v] DESCRIPTION pcserver is the hostside server program for Basic Serial and AdvanceLink, and is started and terminated by an application program running on a PC. pcserver supports both the Basic Serial and the AdvanceLink protocols.
pcserver(1M) pcserver(1M) If your screen displays a Command not found message when you choose START TRANSFER from AdvLink, either pcserver has not yet been installed on your HP-UX system, or it has been installed in a directory that is not part of your current path. HP-UX treats files containing binary or ASCII data identically. Therefore it is up to the user to specify the desired file type when using pcserver to transfer files with Advancelink.
pdc(1M) pdc(1M) (PA-RISC Systems Only) NAME pdc - processor-dependent code (firmware) DESCRIPTION pdc is the firmware that implements all processor-dependent functionality, including initialization and self-test of the processor. Upon completion, it loads and transfers control to the initial system loader (isl(1M)). Firmware behavior varies somewhat, depending on the hardware series as described below.
pdc(1M) pdc(1M) (PA-RISC Systems Only) If the autoboot sequence is unsuccessful, overridden by the operator, or not enabled in the first place, pdc executes the device search and enters the menu described above. The Primary Boot, Alternate Boot, and Console Paths as well as autoboot and autosearch enable can be modified via isl or at the pdc boot administration level. SEE ALSO boot(1M) isl(1M).
pfs_exportfs(1M) pfs_exportfs(1M) (OBSOLETED) NAME pfs_exportfs - export and unexport directories to PFS clients SYNOPSIS /usr/sbin/pfs_exportfs [ -a -u -v ] [ pathname ] DESCRIPTION pfs_exportfs makes a local directory or filename available for mounting over the network by PFS clients. It is recommended that a command to invoke pfs_exportfs at boot time be added to rc(1M).
pfs_mount(1M) pfs_mount(1M) (OBSOLETED) NAME pfs_mount, pfs_umount - mount and unmount CD-ROM file systems SYNOPSIS pfs_mount [-v -a] pfs_mount [-v -a -f -n] [ -t type ] [ -x xlat ] [ -o options ] filesystem directory pfs_mount [-v -a -f -n] [ -x xlat ] [ -o options ] filesystem | directory pfs_umount [ -v -a -c ] filesystem | directory DESCRIPTION pfs_mount attaches a named filesystem to the file system hierarchy at the pathname location directory, which must already exist.
pfs_mount(1M) pfs_mount(1M) (OBSOLETED) iso9660 will cause the mount program to attempt to mount the CD-ROM image using the ISO 9660 specifications. If the CD image is not ISO 9660 compatible, the mount fails. Note that if the CD image is also Rock Ridge compliant, and the -t iso9660 option is not specified, the CD-ROM image will be mounted with Rock Ridge extensions enabled. hsfs will cause the mount program to attempt to mount the CD-ROM image using the High Sierra specifications.
pfs_mount(1M) pfs_mount(1M) (OBSOLETED) Attributes Cache The server’s attribute cache retains file attribute information on requests that have been made. This provides faster access to entries which have previously been decoded. Lookup Cache The Lookup Cache holds information about the sequential nature of the directory entries. This cache stores the location of the next directory entry.
pfs_mountd(1M) pfs_mountd(1M) (OBSOLETED) NAME pfs_mountd, pfs_mountd.rpc - PFS mount request server SYNOPSIS /usr/etc/pfs_mountd DESCRIPTION This program is available with the Portable File System Package (PFS). pfs_mountd is an RPC server that answers file system mount requests. In the case of remote mount requests, it reads the file /etc/pfs_xtab, described in pfs_exports (5), to determine which file systems are available for mounting by which machines.
pfsd(1M) pfsd(1M) (OBSOLETED) NAME pfsd, pfsd.rpc - PFS daemon SYNOPSIS pfsd [nservers ] [ -v ] [ -o options ] DESCRIPTION pfsd starts the daemons that handle client filesystem requests. nservers is the number of file system server daemons to start. This number should be based on the load expected on this server. The load is defined by the number of mounted file systems. Mounts are distributed in a round-robin fashion to the pfsd daemons. It is recommended that the pfsd daemon be invoked by rc(1M).
pfsd(1M) pfsd(1M) (OBSOLETED) PFS has known functionality and performance problems. HP customers are urged to stop using the PFS interfaces, including these interfaces, pfsd and pfsd.rpc . Customers should move to accessing all CDROM file system formats by using the standard HP-UX commands, specifying the file system type as cdfs .
ping(1M) ping(1M) NAME ping - send ICMP Echo Request packets to network host SYNOPSIS ping [-oprv ] [-f address-family] [-i address] [-I interval] [-t ttl] host [-n count [-m timeout]] ping [-oprv ] [-f address-family] [-i address] [-I interval] [-t ttl] host packet-size [ [-n ] count [-m timeout]] DESCRIPTION The ping command sends ICMP Echo Request (ECHO_REQUEST) packets to the host once per second.
ping(1M) ping(1M) If the address-family is specified, and host is an Internet address, the address family of the Internet address must be the same as that specified in the address-family option. If the address-family is not specified, and host is a symbolic name, an attempt will be made to resolve host into an IPv4 address first. If that fails, a second attempt will be made to resolve host into an IPv6 address. The ping command does not accept IPv4-mapped IPv6 addresses.
ping(1M) ping(1M) FILES /etc/hosts SEE ALSO getaddrinfo(3N), gethostent(3N), inet(3N), inet6(3N).
power_onoff(1M) power_onoff(1M) NAME power_onoff - timed, automatic system power on, and power off SYNOPSIS /usr/sbin/power_onoff -n /usr/sbin/power_onoff time [ date ] [ [ next +increment] time_designation] DESCRIPTION power_onoff instructs the UPS monitor (ups_mond ) to shut down the system, and optionally informs the monitor when to power on the system again. The UPS monitor in turn instructs the uninterruptible power source (UPS) when to turn the power off and on.
power_onoff(1M) power_onoff(1M) power_onoff 5:30 tomorrow To make your system startup each weekday at 7:30 am and shutdown at 5:30 pm each week day, use crontab to execute the first entry on Monday through Thursday and the second entry on Friday (see crontab(1)).
pppoerd(1M) pppoerd(1M) NAME pppoerd - PPPoE (Point to Point Protocol over Ethernet) relay SYNOPSIS pppoerd [-c config-file] [-d debug-level] [-l log-file] DESCRIPTION You need the pppoerd daemon if the PPPoE client and the server are not on the same link. Options pppoerd supports the following options: -c config-file Specify the configuration file with absolute path to be used by pppoerd . The default configuration file is /etc/ppp/pppoerd.conf.
pppoesd(1M) pppoesd(1M) NAME pppoesd - PPPoE (Point-to-Point Protocol over Ethernet) server daemon SYNOPSIS pppoesd [-c config-file] [-d debug-level] [-l log-file] DESCRIPTION pppoesd performs the server side discovery phase functionalities of PPPoE as mentioned in RFC 2516. The pppoesd daemon responds to PADI and PADR packets from clients if it can offer services desired by the client. pppoesd generates a unique session-id for every client that it services.
privedit(1M) privedit(1M) NAME privedit - let authorized users edit files that are under access control SYNOPSIS privedit [-htxv ] [-a authorization] file DESCRIPTION privedit allows authorized users to edit files that are otherwise restricted by permissions or access control lists. Identify which file to edit by specifying the file name as an argument to the privedit command.
privedit(1M) privedit(1M) Field Description command | file For privedit , the fully qualified path of a file to edit. This field may contain wildcards as defined in fnmatch(3C). For privrun , the fully qualified path of the command that is being wrapped to provide additional privilege. arguments Ignored. (Used only by privrun .) (operation ,object ) The operation the user is required to have on the object specified. Together, the (operation ,object ) forms the authorization.
privedit(1M) privedit(1M) RETURN VALUE Success If privedit permitted the user to edit the file, then the return value from privedit is the return value of the editor used to edit the file. Failure privedit returns a value of 1 and an appropriate error message is printed to standard error. EXAMPLES Example 1 In the following example, the caller invokes privedit to edit /etc/fstab . # privedit /etc/fstab The /etc/rbac/cmd_priv database is examined for an entry corresponding to the file /etc/fstab .
privrun(1M) privrun(1M) NAME privrun - invoke another application with privileges after performing appropriate authorization checks and optionally reauthenticating the user SYNOPSIS privrun [-htx ] [-a authorization] [-c compartment ] [-g [gid|groupname] ] [-G [gid|groupname] ] [-p privileges] [-u [uid|username] ] [-U [uid|username] ] [-v [-v] ] command [args] DESCRIPTION privrun allows a user to run legacy applications with elevated privileges according to the authorizations associated with that user.
privrun(1M) command [args] privrun(1M) The HP-UX command to run. command must be fully qualified. If it is not, then privrun will use the current working directory and the PATH environment variable to determine the desired command. args specifies any argument that the command recognizes. The cmd_priv Database The /etc/rbac/cmd_priv file contains information on which authorizations are required to execute each command binary, or edit each file.
privrun(1M) pam-service privrun(1M) Reauthentication service. If specified, the user will be reauthenticated. The privrun command will identify itself to PAM as the service indicated in this field. This allows the security officer to require an additional set of restrictions for particular commands. See pam.conf(4) for a list of PAM services. The keyword DFLT must be used to indicate that no reauthorization is required. flags This field is used by both privrun and privedit .
privrun(1M) privrun(1M) FILES /etc/rbac/roles /etc/rbac/auths /etc/rbac/user_role /etc/rbac/role_auth /etc/rbac/cmd_priv Database containing valid definitions of all roles. Database containing definitions of all valid authorizations. Database specifying the roles for each specified user. Database defining the authorizations for each role. Database defining the authorization information needed to execute commands and and edit files under access control.
psrset(1M) psrset(1M) NAME psrset - create and manage processor sets SYNOPSIS psrset psrset psrset psrset psrset psrset psrset psrset psrset psrset psrset psrset psrset psrset psrset psrset [-f ] -a pset_id processor_list [-f ] -b pset_id pid_list [-f ] -c [processor_list] [-f ] -d pset_list [-f ] -d all [-f ] -e pset_id command [argument_list] [-f ] -g pset_id pgid [-i ] [pset_list] [-f ] -n pset_id -p [processor_list] -q [pid_list] [-f ] -r processor_list [-f ] -t pset_id attribute_name =attribute_va
psrset(1M) psrset(1M) -a pset_id processor_list Assigns processor_list to pset_id. processor_list is the list of processors, and pset_id is the processor set identification number. The processors are taken out of their current processor set and are reassigned to the specified processor set. Processor 0 may not be reassigned. If the processor being reassigned is the last processor in its current processor set, the behavior is defined by the LASTSPU attribute. See the -t option to define LASTSPU .
psrset(1M) psrset(1M) the list (pset_list) or for all sets by default. It will also list the Locality Domains that belong to the processor sets. If pset_list is not specified, then information for all processor sets are displayed. If no options are specified for the psrset command, then the -i option is assumed. -n pset_id Enables external I/O interrupts for all processors assigned to the specified processor set (pset_id).
psrset(1M) -s pset_id psrset(1M) Un-marks the processor set with the identification number, pset_id, as an RTE processor set. The processor set is not destroyed. -R [processor_list] Creates a new RTE processor set and displays the processor set identification number (pset_id) for the new processor set. If a list of processors (processor_list) are specified on the command line, they are assigned to the newly created processor set.
psrset(1M) psrset(1M) AUTHOR psrset was developed by HP. SEE ALSO pset_assign(2), pset_bind(2), pset_create(2), pset_ctl(2), pset_destroy(2), pset_getattr(2), pset_setattr(2). HP Process Resource Manager is documented in the HP Process Resource Manager User’s Guide.
pvchange(1M) pvchange(1M) NAME pvchange - change characteristics and access path of a physical volume in an LVM volume group SYNOPSIS /usr/sbin/pvchange /usr/sbin/pvchange /usr/sbin/pvchange /usr/sbin/pvchange /usr/sbin/pvchange /usr/sbin/pvchange /usr/sbin/pvchange [-A autobackup] -a availability pv_path [-A autobackup] -s pv_path [-A autobackup] -S autoswitch pv_path [-A autobackup] -x extensibility pv_path [-A autobackup] -t IO_timeout pv_path [-A autobackup] -z sparepv pv_path [-A autobackup] -p pro
pvchange(1M) pvchange(1M) path is the primary path to the device, LVM will begin using the best alternate path to the device that is available. When the only path to a device is detached, the associated physical volume will be unavailable to the volume group. The path remains part of the volume group but no I/O is queued to it and the path will remain unused by LVM until it is reattached. LVM will only stop using the physical volume when all the paths to the physical volume are detached.
pvchange(1M) pvchange(1M) volume back into a regular physical volume for this volume group. No physical extents from a spare physical volume will be available as part of the "free" pool of extents in the volume group. A spare physical volume will only be used in the event that another physical volume within this volume group becomes unavailable (fails). sparepv can have one of the following values: y Change the specified physical volume to be a "stand-by" spare for its volume group.
pvchange(1M) pvchange(1M) EXAMPLES Prohibit the allocation of additional physical extents to a physical volume: pvchange -x n /dev/dsk/c0t0d0 Allow the allocation of additional physical extents to a physical volume: pvchange -x y /dev/dsk/c0t0d0 Only switch paths when the current path is unavailable.
pvck(1M) pvck(1M) NAME pvck - check or repair a physical volume in LVM volume group SYNOPSIS /usr/sbin/pvck -y pv_path /usr/sbin/pvck -n pv_path DESCRIPTION Note: Currently pvck is only capable of detecting bad checksums caused by a forward system migration after a backward system migration. It should not be used in other situations. The pvck command examines and repairs LVM data structures on a raw disk (pv_path) in a volume group.
pvcreate(1M) pvcreate(1M) NAME pvcreate - create physical volume for use in LVM volume group SYNOPSIS /usr/sbin/pvcreate [-b] [-B] [-d soft_defects ] [-s disk_size] [-f] [-t disk_type] pv_path DESCRIPTION The pvcreate command initializes a direct access storage device (a raw disk device) for use as a physical volume in a volume group. If pv_path contains a file system and the -f option is not specified, pvcreate asks for confirmation.
pvcreate(1M) pvcreate(1M) EXTERNAL INFLUENCES Environment Variables LANG determines the language in which messages are displayed. If LANG is not specified or is null, it defaults to "C" (see lang(5)). If any internationalization variable contains an invalid setting, all internationalization variables default to "C" (see environ(5)).
pvdisplay(1M) pvdisplay(1M) NAME pvdisplay - display information about physical volumes in LVM volume group(s). SYNOPSIS /usr/sbin/pvdisplay [-v] [-d] [-b BlockList] pv_path ... /usr/sbin/pvdisplay -l pv_path ... DESCRIPTION The pvdisplay command displays information about each physical volume specified by a pv_path parameter. Options pvdisplay recognizes the following options: pv_path The block device path name of a physical volume.
pvdisplay(1M) pvdisplay(1M) unavailable/active spare The physical volume is unavailable and it’s an active spare. Thus, the data on this physical volume in unavailable. unavailable/standby spare The physical volume is a spare, "standing by" that is not currently available to capture data from a failed physical volume.
pvdisplay(1M) pvdisplay(1M) LE of LV Number of logical extents within the logical volume that are contained on this physical volume PE for LV Number of physical extents within the logical volume that are contained on this physical volume --- Physical extents --The following information for each physical extent, displayed in column format: Physical extent number PE Status LV LE Current state of the physical extent: free , current , or stale The block device path name of the logical volume to which th
pvdisplay(1M) pvdisplay(1M) EXAMPLES Display the status and characteristics of a physical volume: pvdisplay /dev/dsk/c1t0d0 Display the status, characteristics, and allocation map of a physical volume: pvdisplay -v /dev/dsk/c2t0d0 Check whether the physical volume belongs to LVM: pvdisplay -l /dev/dsk/c2t0d0 Check if the physical volume has relocated blocks: pvdisplay -d /dev/dsk/c2t0d0 WARNINGS The information about the LVM’s Proactive Polling for alternate links of a physical volume will be displaye
pvmove(1M) pvmove(1M) NAME pvmove - move allocated physical extents from one LVM physical volume to other physical volumes SYNOPSIS /usr/sbin/pvmove [-A autobackup] [-n lv_path] source_pv_path [dest_pv_path ... dest_pvg_name ...] /usr/sbin/pvmove [-A autobackup] source_pv_path[:0] [dest_pv_path ... dest_pvg_name ...] Remarks pvmove cannot be performed if the volume group is activated in shared mode.
pvmove(1M) pvmove(1M) EXTERNAL INFLUENCES Environment Variables LANG determines the language in which messages are displayed. If LANG is not specified or is null, it defaults to "C" (see lang(5)). If any internationalization variable contains an invalid setting, all internationalization variables default to "C" (see environ(5)).
pvremove(1M) pvremove(1M) NAME pvremove - remove LVM data structure from a physical volume SYNOPSIS /sbin/pvremove pv_path DESCRIPTION The pvremove command clears the LVM data structure on a disk, so that it is no longer an LVM physical volume. The device may then be used by the file system or by other Volume Manager. The operation is denied if pv_path is assigned to a volume group. The pvremove command only clears the LVM data structure on a disk if the disk does not belong to a volume group.
pwck(1M) pwck(1M) NAME pwck, grpck - password/group file checkers SYNOPSIS /usr/sbin/pwck [-l] [password [shadow]] /usr/sbin/pwck [-s] [-l] [password] /usr/sbin/grpck [ file ] DESCRIPTION pwck scans fields in the password and shadow files and reports any inconsistencies to standard error. The checks include validation of the number of fields, login name, user ID, group ID, and whether the login directory and optional program exist.
pwconv(1M) pwconv(1M) NAME pwconv - install, update or check the /etc/shadow file SYNOPSIS /usr/sbin/pwconv [-t] [-v] DESCRIPTION The pwconv command installs or appends /etc/shadow with information from /etc/passwd , or checks for any discrepancies between the contents of the two files. The pwconv command without options does the following: 1. 2. 3. Creates the file /etc/shadow if it does not exist; otherwise, it removes all entries for usernames that are not present in /etc/passwd .
pwgr_stat(1M) pwgr_stat(1M) NAME pwgr_stat - Password and Group Hashing and Caching Statistics. SYNOPSIS /usr/sbin/pwgr_stat DESCRIPTION pwgr_stat displays the current status of the pwgrd daemon process running on the system. It includes whether or not the daemon is running, how much activity is occurring, as well as statistics for each kind of request serviced by pwgrd .
pwgrd(1M) pwgrd(1M) NAME pwgrd - Password and Group Hashing and Caching daemon. SYNOPSIS /usr/sbin/pwgrd [-d] [-l logfile] DESCRIPTION pwgrd provides accelerated lookup of password and group information for libc routines like getpwuid and getgrname . pwgrd implements per request type caches and hashtables as appropriate. When the corresponding routine in libc is called, a request is issued to pwgrd via a Unix domain socket connection.
pwunconv(1M) pwunconv(1M) NAME pwunconv - convert passwords from shadow to nonshadow SYNOPSIS /usr/sbin/pwunconv DESCRIPTION The pwunconv command transfers the password and aging information for all users from /etc/shadow to /etc/passwd . The /etc/shadow file is removed. Some of the aging information may be lost during the conversion; the warn and expire fields are discarded, while min , max , and lstchg are rounded from days to weeks. Notes HP recommends that you run pwck before running pwunconv .
quot(1M) quot(1M) NAME quot - summarize file system ownership SYNOPSIS /usr/sbin/quot [-F FStype] [-V] [-cfhnv ] [-o FSspecific-options] filesystem ... /usr/sbin/quot [-F FStype] [-V] [-cfhnv ] -a DESCRIPTION The quot command displays the number of 1024-byte blocks in the named filesystem that are currently owned by each user. filesystem is either the name of the directory on which the file system is mounted or the name of the device containing the file system.
quot(1M) quot(1M) SEE ALSO du(1), find(1), ls(1), fstyp(1M), mount(1M), ncheck(1M), quot_hfs(1M), quot_vxfs(1M), repquota(1M), fs_wrapper(5), quota(5).
quot_hfs(1M) quot_hfs(1M) NAME quot_hfs: quot - summarize ownership on an HFS file system SYNOPSIS /usr/sbin/quot [-F hfs ] [-V] [-cfhnv ] filesystem ... /usr/sbin/quot [-F hfs ] [-V] [-cfhnv ] -a DESCRIPTION The quot command displays the number of 1024-byte blocks in the named HFS filesystem that are currently owned by each user. filesystem is either the name of the directory on which the file system is mounted or the name of the device containing the file system.
quot_vxfs(1M) quot_vxfs(1M) NAME quot_vxfs: quot - summarize ownership on a VxFS file system SYNOPSIS quot [-F vxfs ] [-cfhnv ] [-V] filesystem ... quot [-F vxfs ] [-cfhnv ] [-V] -a DESCRIPTION quot displays the number of 1024-byte blocks in the specified VxFS filesystem that are currently owned by each user. filesystem is either the name of the directory on which the file system is mounted or the name of the device containing the file system.
quot_vxfs(1M) quot_vxfs(1M) # quot -c /tstmnt /dev/dsk/c0t1d0 (/tstmnt1): 0 2 0 1 4 4 2 4 12 3 5 27 4 1 31 7 1 38 10 2 58 12 1 70 15 1 85 16 1 101 18 1 119 2047 0 119 AUTHOR Disk Quotas were developed by the University of California, Berkeley, Sun Microsystems, Inc., and HP. FILES /etc/mnttab /etc/passwd Mounted file system table Password file (contains user names). SEE ALSO du(1), find(1), ls(1), fstyp(1M), mount(1M), ncheck(1M), quot(1M), repquota(1M), quota(5).
quotacheck(1M) quotacheck(1M) NAME quotacheck - file system quota consistency checker SYNOPSIS /usr/sbin/quotacheck [-F FStype] [-V] [-o specific-options] filesystem ... /usr/sbin/quotacheck [-F FStype] [-V] [-o specific-options] -a DESCRIPTION The quotacheck command examines each file system, builds a table of current disk usage, and compares this table against that stored in the disk quota file for the file system.
quotacheck(1M) quotacheck(1M) SEE ALSO mount(1M), quotacheck_hfs(1M), quotacheck_vxfs(1M), fs_wrapper(5), quota(5).
quotacheck_hfs(1M) quotacheck_hfs(1M) NAME quotacheck_hfs: quotacheck - quota consistency checker for HFS file systems SYNOPSIS /usr/sbin/quotacheck [-F hfs ] [-V] [-pPv ] filesystem ... /usr/sbin/quotacheck [-F hfs ] [-V] [-pPv ] -a DESCRIPTION The quotacheck command examines each HFS file system, builds a table of current disk usage, and compares this table against that stored in the disk quota file for the file system.
quotacheck_vxfs(1M) quotacheck_vxfs(1M) NAME quotacheck_vxfs: quotacheck - VxFS file system quota consistency checker SYNOPSIS quotacheck [-F vxfs ] [-pPv ] [-V] filesystem... quotacheck [-F vxfs ] [-pPv ] [-V] -a DESCRIPTION Because VxFS maintains quota information in the kernel, quotacheck for VxFS synchronizes quotas from the current system copy to the disk quota file for the specified VxFS file system. quotacheck requires that each file system it checks has a file named quotas in the root directory.
quotaon(1M) quotaon(1M) NAME quotaon, quotaoff - turn HFS file system quotas on and off SYNOPSIS /usr/sbin/quotaon [-v] filesystem ... /usr/sbin/quotaon [-v] -a /usr/sbin/quotaoff [-v] filesystem ... /usr/sbin/quotaoff [-v] -a Remarks These commands are provided for compatibility only. Their use is neither required nor recommended because mount and umount enable and disable quotas cleanly (see mount(1M)). See WARNINGS below for more information.
quotaon(1M) /etc/mnttab directory /quotas quotaon(1M) Mount file system table Quota statistics storage for the file system, where directory is the root of the file system as specified to the mount command (see mount(1M)). SEE ALSO fsclean(1M), quotacheck(1M), quotacheck_hfs(1M), quotacheck_vxfs(1M), mount(1M), quota(5).
rad(1M) rad(1M) NAME rad - rad features have been moved to olrad DESCRIPTION rad has been replaced with a new olrad command which provides enhanced features for performing online addition and replacement of I/O cards. Please see the olrad(1M) manual page. RETURN VALUE rad exits with the value 255. SEE ALSO olrad(1M), ioscan(1M), pdweb(1M).
ramutil(1M) ramutil(1M) NAME ramutil - utility to create or destroy RAM disk volumes SYNOPSIS /usr/sbin/ramutil [-l] -c -v volume_number -s volume_size /usr/sbin/ramutil -d -v volume_number /usr/sbin/ramutil -f DESCRIPTION The ramutil utility is used to create and destroy RAM disk volumes on the system. The system administator must configure additional swap devices and also modify the maxdsiz_64bit tunable in order to create large swappable RAM disk volumes.
ramutil(1M) ramutil(1M) Third party products exist that provide RAM-disk based LVM mirrored configurations with additional support software; these products are delivered on configurations tested and validated by the product vendor. The use of such products is permitted on 11i v2 (11.23); the third party product vendors are responsible for supporting these products. AUTHOR ramutil was developed by HP.
rarpc(1M) rarpc(1M) NAME rarpc - Reverse Address Resolution Protocol client SYNOPSIS rarpc [-d] [-e|-s] [-n count] interface_name DESCRIPTION rarpc , the Reverse Address Resolution Protocol client, implements the client portion of the Reverse Address Resolution Protocol (see SEE ALSO). It sends RARP requests for the specified interface’s hardware address and waits for the response from the RARP server. rarpc can be used during boottime initialization to find the IP address of an interface.
rarpd(1M) rarpd(1M) NAME rarpd - Reverse Address Resolution Protocol daemon SYNOPSIS rarpd [-d] [-f config_file] [interface_name] DESCRIPTION rarpd , the Reverse Address Resolution Protocol daemon, implements the server portion of the Reverse Address Resolution Protocol [1]. It responds to RARP requests providing the requested client IP address. Rarpd can be started during boot-time initialization. To do so, set the RARPD variable with RARPD=1 in /etc/rc.config.d/netconf.
rbacdbchk(1M) rbacdbchk(1M) NAME rbacdbchk - verifies the syntax of the Role-Based Access Control (RBAC) database files SYNOPSIS rbacdbck [-r | -a | -u | -R | -c | -x] DESCRIPTION rbacdbck verifies that there are no conflicting or inconsistent entries in and amongst the RBAC database files. rbacdbck also checks the syntax of the database files and prints messages indicating which lines contain errors. rbacdbchk returns zero output if no errors are present in the database files.
rbacdbchk(1M) rbacdbchk(1M) [Role in role_auth DB with no assigned user in user_role DB] blah:(hpux.*, *) [Invalid Role in role_auth DB. Role ’blah’ does not exist in the roles DB] blah:(hpux.*, *) The following example finds a bad group name: # rbacdbchk [/etc/rbac/user_role] &blah: Administrator invalid group The value ’blah’ for the Group name field is bad.
rc(1M) rc(1M) NAME rc - general purpose sequencer invoked upon entering new run level SYNOPSIS /sbin/rc DESCRIPTION The rc shell script is the general sequencer invoked upon entering a new run level via the init N command (where N equals 0-6). The script /sbin/rc is typically invoked by the corresponding entry in the file /etc/inittab as follows: sqnc:123456:wait:/sbin/rc /dev/console 2>&1 /sbin/rc is the startup and shutdown sequencer script.
rc(1M) rc(1M) When ordering start and kill script links, note that subsystems started in any given order should be stopped in the reverse order to eliminate any dependencies between subsystems. This means that kill scripts will generally not have the same numbers as their start script counterparts. For example, if two subsystems must be started in a given order due to dependencies (e.g.
rc(1M) rc(1M) 0 1 2 3 4 >4 Script exited without error. Script encountered errors. Script was skipped due to overriding control variables from /etc/rc.config.d files, or for other reasons, and did not actually do anything. Script will automatically reboot the system. Script exited without error and started a process in background mode. For return values greater than 4 the action is same as return value 1, script encountered errors. SEE ALSO init(1M), shutdown(1M), inittab(4), rc.config(4).
rcancel(1M) rcancel(1M) NAME rcancel - remove requests from a remote printer spooling queue SYNOPSIS /usr/sbin/rcancel [id ... ] [printer] [-a] [-e] [-u user] DESCRIPTION The rcancel command removes a request, or requests, from the spool queue of a remote printer. rcancel is invoked by the cancel command (see lp(1)). At least one id or the name of a printer must be specified.
rdpd(1M) rdpd(1M) NAME rdpd - router discovery protocol daemon (OBSOLETE) SYNOPSIS rdpd [ -r | -t | -v ] DESCRIPTION rdpd , the router discover protocol daemon, implements the host portion of the router discovery protocol (see SEE ALSO). More specifically rdpd : • solicits router advertisements when it is first started so as to populate the kernel table as soon as possible. • listens on all ethernet interfaces (that are up) for ICMP router advertisement datagrams.
rdpd(1M) rdpd(1M) 5. Default routers added via the route command can be altered due to Router Advertisements for the same router. 6. Adding default routes via the route command can cause unpredictable results and should be avoided. OBSOLESCENCE The functionality of rdpd has been subsumed in gated . See the routerdiscovery statements described in gated.conf(4). rdpd has been obsoleted in HP-UX 11i Version 2. WARNINGS rdpd should not be used if routerdiscovery client is enabled when running gated .
reboot(1M) reboot(1M) NAME reboot - reboot the system SYNOPSIS /usr/sbin/reboot [-h-r] [-n-s] [-q] [-t time] [-m message] /usr/sbin/reboot -R [-H] [-n-s] [-q] [-t time] [-m message] DESCRIPTION The reboot command terminates all currently executing processes except those essential to the system, then reboots the system, or halts, or makes the partition ready for reconfiguration. When invoked without arguments, reboot syncs all disks before rebooting the system.
reboot(1M) reboot(1M) SEE ALSO vpartition(1), reboot(2), partition(5).
remshd(1M) remshd(1M) NAME remshd - remote shell server SYNOPSIS /usr/lbin/remshd [-lmns ] In Kerberos V5 Network Authentication Environments /usr/lbin/remshd [-clmnKkRr ] DESCRIPTION The remshd command is the server for the rcp , rdist and remsh commands, rcmd() and the rcmd_af() function in case of IPv6 systems (see rcp(1), rdist(1), remsh(1), rcmd(3N)), and rcmd_af(3N). remshd allows two kinds of authentication methods: 1.
remshd(1M) remshd(1M) limitation with multi-homed hosts. In a secure environment, remshd will recognize the following additional options: -c Ignore checksum verification. This option is used to achieve interoperability between clients and servers using different checksum calculation methods. For example, the checksum calculation in a application developed with Kerberos V5 Beta 4 API is different from the calculation in a Kerberos V5-1.0 application.
remshd(1M) remshd(1M) 7. The server reads the server’s host account name from the first connection. This is a nullterminated sequence not exceeding 16 characters. 8. The server reads a command to be passed to the shell from the first connection. The command length is limited by the maximum size of the system’s argument list. 9. remshd then validates the user as follows (all actions take place on the host remshd runs on): a.
remshd(1M) remshd(1M) Can’t get stderr port Unable to complete the connection of the secondary socket used for error communication. Second port not reserved The secondary socket connection does not use a reserved port. Locuser too long The name of the user account on the client’s host is longer than 16 characters. Remuser too long The name of the user on the server’s host is longer than 16 characters.
remshd(1M) remshd(1M) FILES $HOME/.rhosts /etc/hosts.equiv User’s private equivalence list List of equivalent hosts SEE ALSO remsh(1), inetd(1M), named(1M), rcmd(3N), inetd.sec(4), security(4), services(4), sis(5). rcmd_af(3N), hosts(4), hosts.equiv(4), inetd.
renice(1M) renice(1M) NAME renice - alter priority of running processes SYNOPSIS renice [-n newoffset] [-g-p-u] id ... DESCRIPTION The renice command alters the system nice value (used in the system scheduling priority) of one or more running processes specified by id .... The new system nice value is set to 20 + newoffset, and is limited to the range 0 to 39. However if the UNIX95 environment variable is set, the new system nice value is set to current nice value + newoffset.
renice(1M) renice(1M) Change the system nice value for all processes owned by user john and user 123 to 33 (newoffset=13). (Affecting other users processes requires appropriate privileges.) renice -n 13 -u john 123 Change the system nice value of all processes in process group 20 to 10 . (Lowering the system nice value of a process group requires appropriate privileges.
repquota(1M) repquota(1M) NAME repquota - summarize file system quotas SYNOPSIS /usr/sbin/repquota [-v] filesystem ... /usr/sbin/repquota [-v] -a DESCRIPTION The repquota command prints a summary of disk usage and quotas for each specified filesystem . filesystem is either the name of the directory on which the file system is mounted or the name of the device containing the file system.
restore(1M) restore(1M) NAME restore, rrestore - restore file system incrementally, local or across network SYNOPSIS /usr/sbin/restore key [ name ... ] /usr/sbin/rrestore key [ name ... ] DESCRIPTION The restore and rrestore commands read tapes previously dumped by the dump or rdump command (see dump(1M) and rdump(1M)). Actions taken are controlled by the key argument where key is a string of characters containing not more than one function letter and possibly one or more function modifiers.
restore(1M) restore(1M) deleted from the extraction list (unless h is specified on the command line). The most expedient way to extract files from a directory is to add the directory to the extraction list, then delete unnecessary files. extract help ls [arg] pwd quit All files named on the extraction list are extracted from the dump tape. restore and rrestore ask which volume the user wants to mount.
restore(1M) restore(1M) There are numerous consistency checks that can be listed by restore and rrestore . Most checks are self-explanatory or can ‘‘never happen’’. Here are some common errors: filename : not found on tape The specified file name was listed in the tape directory but not found on the tape. This is caused by tape read errors while looking for the file, and from using a dump tape created on an active file system.
rexd(1M) rexd(1M) NAME rexd - RPC-based remote execution server SYNOPSIS /usr/sbin/rpc.rexd [-l log_file] [-m mountdir] [-r] DESCRIPTION rexd is the RPC server for remote command execution. A rexd is started by inetd when a remote execution request is received (see inetd(1M)). rexd exits when command execution has completed. If the user ID (uid) in the remote execution request is assigned to a user on the server, rexd executes the command as that user.
rexd(1M) rexd(1M) rexd: could not umount: dir rexd was unable to umount() the user’s current working file system. See WARNINGS for more details. rexd: mountdir (mountdir ) is not a directory The path name mountdir, under which temporary mount points are created, is not a directory or does not exist. rexd: command : Command not found rexd could not find command. rexd: command : Permission denied rexd was denied permission to execute command.
rexd(1M) rexd(1M) FILES /dev/pty [pqr ]* /dev/tty [pqr ]* /dev/ptym/pty[pqr ]* /dev/pty/tty [pqr ]* /etc/inetd.conf /etc/hosts.equiv $HOME/.rhosts /var/spool/rexd/rexdxxxxx Master pseudo terminals. Slave pseudo terminals. Master pseudo terminals. Slave pseudo terminals. Configuration file for inetd(1M). List of equivalent hosts. User’s private equivalence list. Temporary mount points for remote file systems where xxxxx is a string of alpha numeric characters.
rexecd(1M) rexecd(1M) NAME rexecd - remote execution server SYNOPSIS /usr/lbin/rexecd [ -n ] [ -m ] [ -s ] [ -S ] DESCRIPTION rexecd is the server for the rexec () routine, and the rexec_af() routine in case of IPv6 systems; it expects to be started by the internet daemon (see inetd(1M)). rexecd provides remote execution facilities with authentication based on user account names and unencrypted passwords.
rexecd(1M) rexecd(1M) NOTE: The use_psd option cannot be specified in the /etc/pam.conf file for rexecd . 7. A null byte is returned on the connection associated with stderr and the command line is passed to the normal login shell of the user with that shell’s -c option. The shell inherits the network connections established by rexecd .
ripquery(1M) ripquery(1M) NAME ripquery - query RIP gateways SYNOPSIS ripquery [-1] [-2] [-[a5] authkey] [-n] [-N dest[/mask] ] [-p] [-r] [-v] [-w time] gateway ... DESCRIPTION ripquery is used to request all routes known by a RIP gateway by sending a RIP request or POLL command. The routing information in any routing packets returned is displayed numerically and symbolically. ripquery is intended to be used as a tool for debugging gateways, not for network management.
rlogind(1M) rlogind(1M) NAME rlogind - remote login server SYNOPSIS /usr/lbin/rlogind [-lns ] [-B bannerfile ] In Kerberos V5 Network Authentication Environments /usr/lbin/rlogind [-clnKkRr ] [-B bannerfile ] DESCRIPTION rlogind is the server for the rlogin(1) program. It provides a remote login facility with two kinds of authentication methods: 1. Authentication based on privileged port numbers where the client’s source port must be in the range 512 through 1023.
rlogind(1M) rlogind(1M) -K Authorization based on Kerberos V5 must succeed or access will be rejected (see sis(5) for details on authorization). -R Authentication based on privileged port numbers and authorization of the remote user through equivalent accounts must succeed. hosts.equiv(4). For more information on equivalent accounts, see -r Either one of the following must succeed. The order in which, the authorization checks are done is as specified below. 1.
rlogind(1M) rlogind(1M) EXTERNAL INFLUENCES International Code Set Support Single- and multibyte character code sets are supported. DIAGNOSTICS Errors in establishing a connection cause an error message to be returned with a leading byte of 1 through the socket connection, after which the network connection is closed. Any errors generated by the login process or its descendents are passed through by the server as normal communication.
rlp(1M) rlp(1M) NAME rlp - send LP print request to a remote system SYNOPSIS /usr/sbin/rlp -I id [-C class] [-J job] [-T title] [-i[numcols] ] [-k font] [-w num] [-cdfghlnptv ] file DESCRIPTION rlp transfers a spooling request to a remote system to be printed. rlp communicates with a spooling daemon on a remote system to transfer the spooling request. Options can be set only on the original system (the system where the request originated). The file name must be last.
rlp(1M) rlp(1M) FILES /etc/passwd /usr/sbin/rlpdaemon /var/spool/lp/* /var/adm/lp/* /etc/lp/* /usr/lib/lp/* SEE ALSO accept(1M), enable(1), lp(1), lpadmin(1M), lpsched(1M), lpstat(1), rcancel(1M), rlpdaemon(1M), rlpstat(1M).
rlpdaemon(1M) rlpdaemon(1M) NAME rlpdaemon - daemon for queuing, displaying, removing and altering remote spool requests and writing remote messages SYNOPSIS /usr/sbin/rlpdaemon [ -i ] [ -l ] [ -L logfile ] DESCRIPTION rlpdaemon is a LP daemon (spool area handler) for remote spool requests. rlpdaemon is normally invoked at boot time from the /sbin/rc file or started by inetd(1M), when necessary. rlpdaemon runs on a system that receives requests to be printed.
rlpdaemon(1M) rlpdaemon(1M) /etc/lp/* /usr/lib/lp/* /var/adm/inetd.sec SEE ALSO enable(1), lp(1), lpstat(1), accept(1M), inetd(1M), lpadmin(1M), lpsched(1M), rcancel(1M), rlp(1M), rlpdaemon(1M), rlpstat(1M). hosts.equiv(4), inetd.conf(4), inetd.sec(4), services(4).
rlpstat(1M) rlpstat(1M) NAME rlpstat - print status of LP spooler requests on a remote system SYNOPSIS /usr/sbin/rlpstat [-d printer ] [-u user ] [ id ... ] DESCRIPTION rlpstat reports the status of the specified jobs or all requests associated with the specified users on the specified printer. At least one id or the name of a printer must be specified.
rmsf(1M) rmsf(1M) NAME rmsf - remove a special (device) file SYNOPSIS /sbin/rmsf [-a-k] [-D directory] [-q-v] special_file ... /sbin/rmsf [-C class -d driver] [-D directory] -H hw_path [-k] [-q-v] DESCRIPTION The rmsf command removes one or more special files from the /dev directory and potentially removes information about the associated device or devices with H/W type "DEVICE" (see ioscan(1M)) from the system.
rmsf(1M) rmsf(1M) -H hw_path Match devices at a given hardware path, hw-path. Hardware paths can be listed with the ioscan command (see ioscan(1M)). A hardware path specifies the addresses of the hardware components leading to a device. It consists of a string of numbers separated by periods (.), such as 52 (a card), 52.3 (a target address), and 52.3.0 (a device). If a hardware component is a bus converter, the following period, if any, is replaced by a slash (/) as in 2, 2/3 , and 2/3.0 .
rmsf(1M) rmsf(1M) Most device drivers do not support the unbind operation necessary to remove the device from the system. AUTHOR rmsf was developed by HP. FILES /dev/config /etc/ioconfig /usr/conf/master.d/* SEE ALSO rm(1), insf(1M), ioscan(1M), lsdev(1M), lssf(1M), mksf(1M), ioconfig(4).
rmt(1M) rmt(1M) NAME rmt - remote magnetic-tape protocol module SYNOPSIS /usr/sbin/rmt DESCRIPTION rmt is a program used by the remote dump and restore programs for manipulating a magnetic tape drive through an interprocess communication (IPC) connection. The fbackup and frecover commands also use rmt to achieve remote backup capability (see fbackup(1M) and frecover (1M)). rmt is normally started up with an rexec() or rcmd() call (see rexec(3N) and rcmd(3N)).
rmt(1M) rmt(1M) machinevalue stat_struct_member_namevalue The end of the data is indicated by an ASCII NULL character. See /usr/include/sys/stat.h for the struct stat definition. In addition to the struct stat information, there is an entry in the buffer describing the machine type as returned from a uname() call (see uname(2)). In the above format ‘‘machine’’ is a key word. All fields except st_spare4 of the struct stat are returned.
roleadm(1M) roleadm(1M) NAME roleadm - non-interactive editing of role-related information in RBAC databases SYNOPSIS roleadm roleadm roleadm roleadm roleadm roleadm add role [comments ] delete role modify oldrolename newrolename assign user role revoke user [role] list [user= username] [role= rolename] [sys ] DESCRIPTION roleadm is a non-interactive command that allows users with the appropriate authorization to modify and list the role information in /etc/rbac/user_role, /etc/rbac/role_auth, and /etc
roleadm(1M) roleadm(1M) If the specified user does not exist in the system and there exists the special user, DEFAULT , in the /etc/rbac/user_role database, then the roles listed for the specified user will be those of the DEFAULT user. In the event that there is more than one DEFAULT user defined in the /etc/rbac/user_role database, the system will recognize only the last one. If sys is specified, then all the roles in the roles database, /etc/rbac/roles, will be listed.
roleadm(1M) roleadm(1M) # roleadm assign John administrator The following command will remove the line John:administrator from /etc/rbac/user_role file: # roleadm revoke John administrator The following command will remove all the roles for user John from /etc/rbac/user_role file: # roleadm revoke John The following command will remove all the roles for group name users from /etc/rbac/user_role file: # roleadm revoke "&users" The following command will list all the roles for user Joe : # roleadm list
route(1M) route(1M) NAME route - manually manipulate the routing tables SYNOPSIS /usr/sbin/route [-f] [-n] [-p pmtu] add [net host ] destination [netmask mask] gateway [count] [source src] /usr/sbin/route inet6 [-f] [-n] [-p pmtu] add [net host ] v6destination [ / prefix] v6gateway [count] [source v6src] /usr/sbin/route [-f] [-n] delete [net host ] destination [netmask mask] gateway [count] [source src] /usr/sbin/route inet6 [-f] [-n] delete [net host ] v6destination [ / prefix] v6gateway [count] [so
route(1M) route(1M) • • • • v6destination (inet6 only) The destination host system where the packets will be routed. v6destination can be one of the following: • • • prefix A host name (the official name or an alias, see gethostent(3N)). A network name (the official name or an alias, see getnetent(3N)). An Internet address in "dot" notation (see inet(3N)). The keyword default , which signifies the wildcard gateway route (see routing(7)).
route(1M) route(1M) • An IPv6 address in "colon" notation (see inet6(3N)). Operation All symbolic names specified for a destination or gateway are looked up first as a host name using gethostbyname() for IPv4 and getaddrinfo() for IPv6; if the host name is not found, the destination is searched for as a network name using getnetbyname() for IPv4 only. destination and gateway can be in "dot" notation (see inet(3N)). v6destination and v6gateway can be in "colon" notation (see inet6(3N)).
route(1M) route(1M) The specified route is being deleted from the tables. Flags The values of the count and destination type fields in the route command determine the presence of the G and H flags in the netstat -r display and thus the route type, as shown in the following table.
rpc.nisd(1M) rpc.nisd(1M) NAME rpc.nisd, rpc.nisd_resolv, nisd, nisd_resolv - NIS+ service daemon SYNOPSIS /usr/sbin/rpc.nisd [ -ACDFhlv ] [ -Y [ -B [ -t netid ]]] [ -d dictionary ] [ -L load ] [ -S level ] [ -z number ] rpc.nisd_resolv DESCRIPTION The rpc.nisd daemon is an RPC service that implements the NIS+ service. This daemon must be running on all machines that serve a portion of the NIS+ namespace. rpc.nisd is usually started from a system startup script. rpc.
rpc.nisd(1M) rpc.nisd(1M) -t netid Use netid as the transport for communication between rpc.nisd and rpc.nisd_resolv. The default transport is tcp . -v Verbose. With this option, the daemon sends a running narration of what it is doing to the syslog daemon (see syslogd(1M)) at LOG_INFO priority. This option is most useful for debugging problems with the service (see also -A option). -z number Specify the maximum RPC record size that can be used over connection-oriented transports.
rpc.nispasswdd(1M) rpc.nispasswdd(1M) NAME rpc.nispasswdd, nispasswdd - NIS+ password update daemon SYNOPSIS /usr/sbin/rpc.nispasswdd [ -a attempts ] [ -c minutes ] [ -D ] [ -g ] [ -v ] DESCRIPTION rpc.nispasswdd daemon is an ONC+ RPC service that services password update requests from nispasswd(1) and yppasswd(1). It updates password entries in the NIS+ passwd table. rpc.nispasswdd is normally started from a system startup script after the NIS+ server (rpc.nisd(1M)) has been started. rpc.
rpcbind(1M) rpcbind(1M) NAME rpcbind, portmap - universal addresses to RPC program number mapper SYNOPSIS rpcbind [-d] [-w] DESCRIPTION rpcbind is a server that converts RPC program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. When an RPC service is started, it tells rpcbind the address at which it is listening, and the RPC program numbers it is prepared to serve.
rpcinfo(1M) rpcinfo(1M) NAME rpcinfo - report RPC information SYNOPSIS rpcinfo rpcinfo rpcinfo rpcinfo rpcinfo rpcinfo rpcinfo rpcinfo rpcinfo [ -m ] [ -s ] [ host ] -p [ host ] -T transport host prognum [ versnum ] -l [ -T transport ] host prognum [ versnum ] [ -n portnum ] -u host prognum [ versnum ] [ -n portnum ] -t host prognum [ versnum ] -a serv_address -T transport prognum [ versnum ] -b [ -T transport ] prognum versnum -d [ -T transport ] prognum versnum DESCRIPTION rpcinfo makes an RPC call
rpcinfo(1M) rpcinfo(1M) -d Delete registration for the RPC service of the specified prognum and versnum. If transport is specified, unregister the service on only that transport, otherwise unregister the service on all the transports on which it was registered. Only the owner of a service can delete a registration, except the super-user who can delete any service. -l Display a list of entries with a given prognum and versnum on the specified host.
rquotad(1M) rquotad(1M) NAME rquotad - remote quota server SYNOPSIS /usr/sbin/rpc.rquotad DESCRIPTION rquotad is an RPC server that returns quotas for a user of a local file system currently mounted by a remote machine by means of NFS (see rpc(3N)). The results are used by quota to display user quotas for remote file systems (see quota(1)). rquotad is normally invoked by inetd (see inetd(1M)). AUTHOR Disk Quotas were developed by the University of California, Berkeley, Sun Microsystems, Inc., and HP.
rstatd(1M) rstatd(1M) NAME rstatd - kernel statistics server SYNOPSIS /usr/lib/netsvc/rstat/rpc.rstatd [-l log_file] [-e-n] DESCRIPTION rstatd is an RPC server that returns performance statistics obtained from the kernel. The rup utility prints this information (see rup(1)). inetd invokes rstatd through /etc/inetd.conf (see inetd(1M)). Options rstatd recognizes the following options and command-line arguments: -l log_file Log any errors to the named log file, log_file.
rtradvd(1M) rtradvd(1M) NAME rtradvd - Router Advertisement daemon for IPv6 SYNOPSIS rtradvd [-C] [-c configfile] [-d debuglevel] [-i] [-p pidfile] [debugfile] DESCRIPTION rtradvd , the router advertisement daemon for IPv6, implements router functionality as specified by RFC 2461 ("Neighbor Discovery for IP Version 6"). The daemon listens to router solicitation and sends router advertisement messages on demand and periodically as described in "Neighbor Discovery for IP Version 6".
rtradvd(1M) rtradvd(1M) NOTE The following ICMPv6 types are assigned for Mobile IPv6: Home Agent Address Discovery Request: ICMPv6 type 144 Home Agent Address Discovery Reply: ICMPv6 type 145 Mobile Prefix Solicitation: ICMPv6 type 146 Mobile Prefix Advertisement: ICMPv6 type 147 Refer to the Mobile IPv6 Administrator’s Guide for information on configuring Virtual IPv6 Anycast addresses. AUTHOR rtradvd was developed by HP. FILES /etc/rtradvd.conf /var/run/rtradvd.pid /etc/rc.config.
runacct(1M) runacct(1M) NAME runacct - run daily accounting SYNOPSIS /usr/sbin/acct/runacct [ mmdd [ state ] ] DESCRIPTION runacct is the main daily accounting shell procedure. It is normally initiated via cron(1M). runacct processes connect, fee, disk, and process accounting files. It also prepares summary files for prdaily or billing purposes. runacct takes care not to damage active accounting files or summary files in the event of errors.
runacct(1M) runacct(1M) If runacct failed in its PROCESS state, remove the last ptacct file because it will not be complete. FILES /var/adm/acct/nite/active /var/adm/acct/nite/daytacct /var/adm/acct/nite/lastdate /var/adm/acct/nite/lock /var/adm/acct/nite/lock1 /var/adm/pacct∗ /var/adm/acct/nite/ptacct∗.
rusersd(1M) rusersd(1M) NAME rusersd - network username server SYNOPSIS /usr/lib/netsvc/rusers/rpc.rusersd [-l log_file] [-e-n] DESCRIPTION rusersd is an RPC server that returns a list of users on the network. The rusers command prints this information (see rusers(1)). inetd invokes rusersd through /etc/inetd.conf (see inetd(1M)). Options rusersd recognizes the following options and command-line arguments: -l log_file Log any errors to the named log file, log_file.
rwall(1M) rwall(1M) NAME rwall - write to all users over a network SYNOPSIS /usr/sbin/rwall hostname ... /usr/sbin/rwall -n netgroup ... /usr/sbin/rwall -h host -n netgroup DESCRIPTION rwall reads a message from standard input until EOF, then sends the message, preceded by the line Broadcast Message ... , to all users logged in on the specified host machines. With the -n option, rwall sends the message to the specified network hosts defined in /etc/netgroup (see netgroup(4)).
rwalld(1M) rwalld(1M) NAME rwalld - network rwall server SYNOPSIS /usr/lib/netsvc/rwall/rpc.rwalld [-l log_file] [-e-n] DESCRIPTION rwalld is an RPC server that handles rwall requests (see rwall(1)). rwalld calls wall to send a message to all users logged into the host on which rwalld is running (see wall(1)). inetd invokes rwalld through /etc/inetd.conf (see inetd(1M)). Options rwalld recognizes the following options and command-line options: -l log_file Log any errors to log_file.
rwhod(1M) rwhod(1M) NAME rwhod - system status server SYNOPSIS /usr/sbin/rwhod [-s] [-r] DESCRIPTION rwhod is the server that maintains the database used by rwho and ruptime (see rwho(1) and ruptime(1)). rwhod sends status information to and receives status information from other nodes on the local network that are running rwhod . rwhod is started at system boot time if the RWHOD variable is set to 1 in the file /etc/rc.config.d/netdaemons.
rwhod(1M) rwhod(1M) AUTHOR rwhod was developed by the University of California, Berkeley. FILES /var/spool/rwho/whod.* Information about other machines. SEE ALSO rwho(1), ruptime(1).
sa1(1M) sa1(1M) NAME sa1, sa2, sadc - system activity report package SYNOPSIS /usr/lbin/sa/sa1 [ t n ] /usr/lbin/sa/sa2 [-ubdycwaqvmA ] [-s time ] [-e time ] [-i sec ] /usr/lbin/sa/sadc [ t n ] [ ofile ] DESCRIPTION System activity data can be accessed at the special request of a user (see sar(1M)) and automatically on a routine basis as described here. The operating system contains a number of counters that are incremented as various system actions occur.
sa1(1M) sa1(1M) unsigned unsigned unsigned unsigned unsigned unsigned long long long long long long unsigned unsigned unsigned unsigned unsigned unsigned unsigned unsigned long long long long long long long long unsigned unsigned unsigned unsigned long long long long unsigned unsigned unsigned unsigned unsigned long long long long long unsigned long s unsigned unsigned unsigned unsigned unsigned long long long long long unsigned unsigned unsigned unsigned unsigned unsigned unsigned unsigned un
sa1(1M) sa1(1M) SEE ALSO cron(1M), sar(1M), timex(1).
sam(1M) sam(1M) NAME sam - system administration manager SYNOPSIS /usr/sbin/sam [-display display] [-f login] [-r] DESCRIPTION The sam command starts a menu-driven System Administration Manager program (SAM) for performing system administration tasks with only limited, specialized knowledge of the HP-UX operating system. SAM discovers many aspects of a system’s configuration through automated inquiries and tests. Help menus describe how to use SAM and perform various management tasks.
sam(1M) sam(1M) Backup and Recovery • Interactively back up files to a valid backup device (cartridge tape, cartridge tape autochanger, magnetic tape, DAT, magneto-optical disk, or magneto-optical disk autochanger). The SAM interface is suspended so that you can read and/or respond to the interactive messages produced by fbackup (see fbackup(1M)). • Recover files online from a valid backup device.
sam(1M) sam(1M) Peripheral Devices Management You can configure cards and devices from the Web-based HP-UX Peripheral Device tool (pdweb ) or from the HP-UX Peripheral Device tool in Terminal User Interface (TUI) mode. The following activities can be performed from this functional area: • Administer the LP spooler, associated printers, and plotters (see "Printer and Plotter Management" below). • Add, modify, or remove the configuration of disk devices. • Add or remove terminals and modems.
sam(1M) sam(1M) • Set up password aging for a user account. • Add, remove, view, and modify groups. • Deactivate and reactivate user accounts. • Manage trusted system security policies on a per-user basis. Adding New Functionality to SAM You can easily add stand-alone commands, programs, and scripts to SAM. SAM is suspended while the executable program is running. When it finishes, the SAM interface is restored. You can also write your own help screen for each menu item you create.
sam(1M) sam(1M) VT100 or VT320 may note that these terminals/emulators may produce the same character for TAB and shift-TAB. As such, it is impossible for an application to distinguish between the two and both of them are treated as if the TAB key was pressed. This presents an inconvenience to users if they want to go backward. In most cases, they should complete rest of the input fields and get back to the desired field later.
sam(1M) • sam(1M) WY30 and WY60 Depending on what other applications are running concurrently with SAM, more swap space may be required. SAM requires the following amount of internal memory: 8 MB 16 MB If using terminal based version of SAM. If using Motif X Window version of SAM. For more detailed information about how to use SAM on a terminal, see the Managing Systems and Workgroups manual. AUTHOR sam was developed by HP. FILES /etc/sam/custom /etc/sam/rmfiles.
sar(1M) sar(1M) NAME sar - system activity reporter SYNOPSIS sar [-ubdycwaqvmzAMPS] [-p psetid ] [-o file ] t [ n ] sar [-ubdycwaqvmAMPS] [-p psetid ] [-s time ] [-e time ] [-i sec ] [-f file ] DESCRIPTION In the first form above, sar samples cumulative activity counters in the operating system at n intervals of t seconds. If the -o option is specified, it saves the samples in file in binary format. The default value of n is 1.
sar(1M) sar(1M) disk3 − SCSI and NIO FL disks sdisk − SCSI disks; -y %busy avque r+w/s Portion of time device was busy servicing a request; blks/s avwait Number of bytes transferred (in 512-byte units) from and to the device; avserv Average time (in milliseconds) to service each transfer request (includes seek, rotational latency, and data transfer times) for the device.
sar(1M) -v -m sar(1M) pset pset id (only on a multi-processor and pset configured system, used with -P , -M and -q option) cpu cpu number (only on a multi-processor system and used with the -M option) runq-sz %runocc Average length of the run queue(s) of processes (in memory and runnable); swpq-sz Average length of the swap queue of runnable processes (processes swapped out but ready to run).
sar(1M) sar(1M) blocks in memory (blkcnt) and the number of MemFS blocks in swap (swpcnt). The number of MemFS blocks is expressed in terms of 4 KB only. Note that the -z option does not record MemFS data into a file. However, if the -z and -o options are used together, then the data for all the options except the MemFS option is recorded into a file. You can then query this data. It is also not possible to use the -z option with the -f option.
sasmgr(1M) sasmgr(1M) NAME sasmgr - utility to manage HP-UX Serial Attached SCSI (SAS) Mass Storage I/O cards / HBAs SYNOPSIS Path: /opt/sas/bin sasmgr [-h][-f] add -D device_file -q raid -q level= raid_level -q enc_bay= enc:bay[,enc:bay] [-q size =size] [-q rebuild_rate =rate] sasmgr [-h][-f] add -D device_file -q raid -q spare -q enc_bay= enc:bay sasmgr [-h][-f] bdr -D device_file -q lun= {all | lun_dsf} sasmgr [-h] clear_stat -D device_file sasmgr [-h] clear_stat -D device_file -q all sasmgr [-h] clea
sasmgr(1M) sasmgr(1M) sasmgr [-h][-f] set_attr -D device_file -q raid -q raid_vol =rvol_id -q rebuild_rate =rebuild_rate DESCRIPTION sasmgr is a common diagnostic tool used for all Serial Attached SCSI (SAS) I/O cards / Host Bus Adapters (HBAs). sasmgr requires the use of a device file to indicate the interface over which the requested command needs to be performed. Options sasmgr -f -h -q recognizes the following command-line options: Suppresses the warning messages and continues executing the command.
sasmgr(1M) sasmgr(1M) clear_stat When the clear_stat command is run without qualifiers, it clears statistics of the SAS I/O card / HBA represented by device_file. The following qualifiers are specified with the clear_stat command: all Clears all statistics for the SAS I/O card / HBA, all PHYs, all ports, and all targets. phy Clears statistics for all PHYs or a specific PHY. phy_in_port Clears statistics for a port to which the specified PHY belongs to or clears statistics for all ports.
sasmgr(1M) sasmgr(1M) enable Enables the SAS I/O card / HBA and brings it back online. This command causes the driver to initialize the SAS I/O card / HBA. get_info When the get_info command is run without qualifiers, it returns information about the SAS I/O card / HBA represented by device_file. The following qualifiers are specified with the get_info command: lun Shows hardware path and SAS address information for a specific lun or all luns.
sasmgr(1M) sasmgr(1M) set_attr One of the following sets of qualifiers must be specified with the set_attr command: lun locate_led This set of qualifiers is used to turn on or turn off the locate LED for the specified lun. If it is a RAID device lun, then this command turns on or turns off the LOCATE LED for all the physical disks that are part of the RAID volume.
sasmgr(1M) sasmgr(1M) Change the rebuild rate to 20% for the RAID volume with volume id 3. sasmgr set_attr -D /dev/sasd0 -q raid -q raid_vol=3 -q rebuild_rate=20 SEE ALSO privileges(5). HP 8 Internal Port SAS Controller Users Guide at http://docs.hp.com. AUTHOR sasmgr was developed by HP.
savecrash(1M) savecrash(1M) NAME savecrash - save a crash dump of the operating system SYNOPSIS /sbin/savecrash [-cflprvzZ ] [-D dumpdevice -O offset] [-d sysfile] [-m minfree] [-s chunksize] [-t tapedevice] [-w NOSWAP SWAPEACH SWAPEND ] [dirname] DESCRIPTION savecrash saves the crash dump information of the system (assuming one was made when the system crashed) and writes a reboot message in the shutdown log file.
savecrash(1M) savecrash(1M) devices are configured as swap devices, the entire dump will be preserved in the crash directory. If no swap devices are used as dump devices (dedicated dump devices), only the INDEX file and kernel modules will be copied into the crash directory. -r Resaves a dump that a previous invocation of savecrash has marked as already saved. This is useful if the first invocation did ran out of space, and enough space has since been freed to try again.
savecrash(1M) savecrash(1M) written out to the dump tape. This file is written a second time once all the dump files have been written. The first copy of the file only contains crash dump header information and its filename on tape is tmpindex . It does not contain information for the module and image files. When writing to tape, the tape device must be online otherwise the command will fail with an error. Additionally, when savecrash reaches end-of-tape, it will prompt the user for the next tape.
scsictl(1M) scsictl(1M) NAME scsictl - control a SCSI device SYNOPSIS scsictl [-akq ] [-c command]... [-m mode[=value] ]... device scsictl [-o ola_params]... scsictl -p pr_clear key device DESCRIPTION The scsictl command provides a mechanism for controlling a SCSI device. It can be used to query mode parameters, set configurable mode parameters, and perform SCSI commands. The operations are performed in the same order as they appear on the command line.
scsictl(1M) scsictl(1M) -m mode Display the status of the specified mode parameter. mode can be one of the following: immediate_report For devices that support immediate reporting, this mode controls how the device responds to write requests. If immediate report is enabled (1), write requests can be acknowledged before the data is physically transferred to the media. If immediate report is disabled (0), the device is forced to await the completion of any write request before reporting its status.
scsictl(1M) scsictl(1M) scsictl -a -m ir=1 -m ir /dev/rdsk/c0t6d0 producing the following output: immediate_report = 0; queue_depth = 8; immediate_report = 1 The same operation with labels suppressed: scsictl -aq -m ir=1 -m ir /dev/rdsk/c0t6d0 produces the following output: 0; 8; 1 To clear persistent reservation from a device: scsictl -p pr_clear key /dev/rdsk/c0t6d0 WARNINGS Not all devices support all mode parameters and commands listed above.
security_patch_check(1M) security_patch_check(1M) NAME security_patch_check - check compliance with HP-UX security bulletins SYNOPSIS security_patch_check [-a] [-n] [-q | -qq] [-c security-catalog] [- | -f filename | -h depot | -h remote-host] [-i ignore-file] [-m | -o [bcdmprs ] ] [-r [url] ] [-s os-version] security_patch_check -t [-a] [-n] [-q | -qq] [-c security-catalog] [-h depot | -h remote-host] [-i ignore-file] [-m | -o [bcdmprs ] ] [-r [url] ] [-s os-version] security_patch_check -u DESCRIPTION
security_patch_check(1M) security_patch_check(1M) If closing patch-related security holes with the minimum system change is required, the Patch Database (found at the IT Resource Center, http://itrc.hp.com) may be used in combination with security_patch_check to download the minimum set of patches with their dependencies. The Patch Database will always display the set of patches that HP currently recommends. These patches may be newer than those identified by security_patch_check.
security_patch_check(1M) security_patch_check(1M) catalog also contains additional patch information that allows patch dependency optimization and additional types of analysis. -h depot or -h remote-host Run an analysis on a remote host or depot, rather than localhost (default). remote-host is an HP-UX 11.x system. depot is the full path to a directory-format or tape-format depot on a remote or local system.
security_patch_check(1M) security_patch_check(1M) c Print a "Cnt" field to indicate how many bulletins relate to this recommendation. For example: 1st = this is the first and only bulletin, 2nd = this is the 2nd of two, 3rd = this is the 3rd of three, and so on. d m Print a "Description" field and show a description of each recommended action. p r s Print a "PDep" field and indicate whether each recommended patch has patch dependencies.
security_patch_check(1M) security_patch_check(1M) To access an archive of HP-UX security advisories, you must have an account on the ITRC. Go to https://itrc.hp.com/cki/bin/doc.pl/screen=ckiSecurityBulletin . security_patch_check uses Perl’s tainting checks. This means that security_patch_check will exit if the command line options it receives contain any character besides a letter (A-Za-z), number (0-9), slash (/), dot (.), underscore (_), or dash (-).
security_patch_check(1M) security_patch_check(1M) CRLCHECK When this variable is set to 1, security_patch_check will require the certificate revocation list to be updated and checked for the trusted CA certificate being used to validate the remote server. This means the CRLURL variable must also be set and only the certificate used to sign the downloaded revocation list can be used to validate the server connection.
security_patch_check(1M) security_patch_check(1M) basic authentication), the download_cmd extended option offers extremely flexible download capabilities, which are much more powerful than what SPC provides. EXTERNAL INFLUENCES Environment Variables Security Patch Check uses the HOME environment variable to set default locations for the ignore file and the default trust store. If the tool is run by root without HOME set, Security Patch Check will default to using /var/opt/sec_mgmt/spc.
security_patch_check(1M) security_patch_check(1M) swlist -l fileset -a supersedes \ -a software_spec -a revision -a state -d \ @ machineA:/patch_depot \ machineB:/fileset_depot \ | security_patch_check -s 11.00" -" Analyze remote system machineA after downloading the security bulletin catalog. This example may be considered a typical usage of security_patch_check as a cron job.
sendmail(1M) sendmail(1M) NAME sendmail - send mail over the Internet SYNOPSIS /usr/sbin/sendmail [ mode ] [ flags ] [ address ... ] DESCRIPTION sendmail sends a message to one or more recipients or addresses and routes the message over whatever networks are necessary. sendmail does internetwork forwarding as necessary to deliver the message to the correct place. sendmail is not intended as a user interface routine. Other programs provide user-friendly front ends.
sendmail(1M) sendmail(1M) -bi Initialize the alias database for the mail aliases file. newaliases is identical to sendmail -bi . See newaliases(1M). -bm Deliver mail in the usual way (default). -bp Print a listing of the mail queue. mailq is identical to sendmail -bp . See mailq(1). -bs Use the SMTP protocol as described in RFC821 on standard input and output. This flag implies all the operations of the ba flag that are compatible with SMTP. -bt Run in address test mode.
sendmail(1M) -qIsubstr -qRsubstr -qSsubstr -rname -Rreturn sendmail(1M) Limit processed jobs to those containing substr as a substring of the queue id. Limit processed jobs to those containing substr as a substring of one of the recipients. Limit processed jobs to those containing substr as a substring of the sender. An alternate and obsolete form of the f flag. Set the amount of the message to be returned if the message bounces.
sendmail(1M) sendmail(1M) p q w print the errors on the terminal (default). throw away error messages (only exit status is returned). ‘‘write’’ back the error message (or mail it back if the sender is not logged in). If the text of the message is not mailed back by modes m or w, and if the sender is local to this machine, then a copy of the message is appended to the file dead.letter in the sender’s home directory. SaveFromLine Save UNIX -style ‘‘From’’ lines at the front of messages.
sendmail(1M) PidFile sendmail(1M) Define the location of the pid file. The /etc/mail/sendmail.pid file will be the default even if this option is not set. ProcessTitlePrefix Specify a prefix string for the process title shown in ps listings. DataFileBufferSize Control the maximum size of a memory-buffered data (df) file before a disk-based file is used. XscriptFileBufferSize Control the maximum size of a memory-buffered transcript (xf) file before a disk-based file is used.
sendmail(1M) sendmail(1M) resolver lookups except the first delivery attempt. Timeout.resolver.retry Use this option to set the number of times to retransmit a resolver query. This also sets Timeout.resolver.retry.first and Timeout.resolver.retry.normal options. Timeout.resolver.retry.first Use this option to set the number of times to retransmit a resolver query for the first attempt to deliver a message. Timeout.resolver.retry.
sendmail(1M) sendmail(1M) ConnectionRateThrottle=N Use this option to set the maximum number of connections per second to the SMTP port to N. AutoRebuildAliases Use this option to rebuild the alias database when needed. Setting this option may cause excessive overhead and is not recommended. DontProbeInterfaces Use this option to turn off the inclusion of all the interface names in $=w on startup. In particular, if you have many virtual interfaces, this option speeds up the startup.
sendmail(1M) sendmail(1M) RunAsUser= user Use this option to enable sendmail do a setuid to that user early in processing to avoid potential security problems. However, this means that /var/spool/mqueue directory owned by the user and all .forward and :include: files must be readable by that user, and all files to be written must be writable by that user, and all programs will be executed by that user. It is also incompatible with the SafeFileEnvironment option.
sendmail(1M) sendmail(1M) Address Name Port Send Receive Listen M IP address or hostname Name of the agent (MTA or MSA ) Port number (for Name=MSA , the port number should be 587) Send buffer size Receive buffer size Listen queue size Modifier flags. Following are the values to which the modifier flag can be set: a b c f h u C E Require authentication. Bind to interface through which mail has been received. Pass the address for canonification. Enable fully qualified address for From address.
sendmail(1M) sendmail(1M) Except for the /etc/mail/sendmail.cf file and the daemon process ID file, the below mentioned default pathnames are all specified in the configuration file, /etc/mail/sendmail.cf. These default file names can be overridden in the configuration file. /etc/mail/aliases raw data for alias names /etc/mail/aliases.db data base of alias names /etc/mail/sendmail.cf configuration file /usr/share/lib/sendmail.hf help file /etc/mail/sendmail.
service.switch(1M) service.switch(1M) NAME service.switch - indicate lookup sources and fallback mechanism SYNOPSIS /etc/mail/service.switch DESCRIPTION /etc/mail/service.switch is a sendmail(1M) service switch similar to /etc/nsswitch.conf (see switch(4)) that indicates the lookup source for host names and aliases. It consists of two lines, one for hosts and one for aliases . The lookup sources are listed after the hosts or aliases name.
set_parms(1M) set_parms(1M) NAME set_parms - set system initial identity parameters: host name, date, time, root password, networking SYNOPSIS set_parms set_parms set_parms set_parms set_parms set_parms initial hostname timezone date_time ip_address addl_netwrk DESCRIPTION The set_parms command is an interactive system setup command that allows you to specify various "initial identity parameters" when first booting a newly installed operating system (whether preinstalled, or installed locally from medi
set_parms(1M) set_parms(1M) set_parms edits /etc/hosts to associate the new host name with the current IP address of the system, if that can be determined. Note: It does not notify DNS (Domain Name Servers), etc. This higher level of configuration is handled later by broader configuration tools. First boot Also allows the user to specify a DHCP server from which to get host name and networking parameters, then confirms the information.
set_parms(1M) set_parms(1M) If Ignite-UX is installed on your system, see the manual entries for ignite(5) and instl_adm(4). In particular, read instl_adm(4) for descriptions of the is_net_info_temporary, run_setparms , and final variables. Native Language Support (NLS) The set_parms command supports all of the standard HP-supplied languages. In first-boot situations, the language set_parms uses is dictated by either geocustoms (1M) or the LANG parameter as set in /etc/rc.config.d/LANG.
setboot(1M) setboot(1M) NAME setboot - display and modify boot variables in stable storage SYNOPSIS /usr/sbin/setboot [-p primary-path] [-h HA_alternate-path] [-a alternate-path] [-b onoff ] [-s on off ] [-v] [-t testname =on off default ]... [-T testname =on off default ]... DESCRIPTION The setboot command displays and sets boot variables in stable storage (also known as nonvolatile memory). Any user can display the values; only a superuser can change them.
setboot(1M) setboot(1M) Current The current enablement of each test. on means the test is normally executed on each boot. off means the test is normally omitted on each boot. partial means some of the subtests are normally executed on each boot. On Itanium-based platform any test modified using the -T option will be reflected in Current. Supported Whether the test is supported by the system firmware. yes means the test is supported. no means the test is not supported.
setboot(1M) setboot(1M) Options The setboot command supports the following options: (none) Display the current values for the primary and alternate boot paths and the autoboot and autosearch flags. See example 2 in the EXAMPLES: General section. -p primary-path Set the primary boot path variable to primary-path. See ioscan(1M) for the correct format. -h HA_alternate-path Set the High Availability alternate boot path variable to HA_alternate-path. See ioscan(1M) for the correct format.
setboot(1M) setboot(1M) DIAGNOSTICS The setboot command returns the following error messages: "bootpath" is not a proper bootpath The boot path bootpath is not in correct format. See ioscan(1M) for the proper hardware path format. cannot open /dev/kepd - message setboot cannot open the kernel pseudo driver file /dev/kepd . The message explains why. cannot set autoboot/autosearch flags The autoboot or autosearch flag could not be set. cannot set type boot path setboot can’t set the specified boot path.
setboot(1M) setboot(1M) Primary bootpath : 2/0/1.6.0 HA Alternate bootpath : 2/0/1.6.1 Alternate bootpath : 2/0/2.0.0 Autoboot is ON (enabled) Autosearch is ON (enabled) SpeedyBoot 1. Display all current stable storage values. setboot -v on PA-RISC architecture displays: Primary bootpath : 10/0.0.0 HA Alternate bootpath : 10/0/1.6.1 Alternate bootpath : 10/12/5.0.
setboot(1M) 5. setboot(1M) Reset only the FASTBOOT (full_memory and PDH ) tests to their default values. setboot -t FASTBOOT=default 6. Cause the early and late CPU tests to be executed on the next system boot. The previously set test values take effect again after the single boot. setboot -T SELFTESTS=on 7. Cause all tests to be skipped on the next reboot. The previously set test values will take effect for subsequent reboots.
setext(1M) setext(1M) NAME setext - set VxFS extent attributes SYNOPSIS setext [-F vxfs ] [-e extent_size] [-f flag] [-r reservation ] [-V] file DESCRIPTION setext specifies a fixed extent size for a file, and reserves space for a file. The file must already exist. Options setext recognizes the following options: -e extent_size Specify a fixed extent size. extent_size is the number of file system blocks to allocate for the extent.
setext(1M) setext(1M) In some cases, fsadm may reorganize the extent map of a file in such a way as to make it less contiguous. However, it will not change the geometry of a file that has a fixed extent size. For the -e or -r options, you can specify the size in number of file system blocks or in bytes. A numeric value indicates file system blocks, a numeric value with a suffix specifies the size in bytes: k for kilobytes, m for megabytes, or g for gigabytes.
setfilexsec(1M) setfilexsec(1M) NAME setfilexsec - set binary executable file security attributes SYNOPSIS setfilexsec -d filename setfilexsec -D absolutepath setfilexsec [-c compartmentname] [-f flags] [-p privs] [-P privs] [-r privs] [-R privs] filename DESCRIPTION setfilexsec sets various security attributes of binary files. The attributes currently include retained privileges, permitted privileges, compartment, and the privilege start flag.
setfilexsec(1M) setfilexsec(1M) hpux.security.xsec.filexsec.restricted RETURN VALUE setfilexsec returns the following values: 0 Successful completion. The security attributes are updated successfully. >0 An error occurs. An error can be caused by an invalid option, an invalid argument, or insufficient permissions for the user to perform the operation.
setmemwindow(1M) setmemwindow(1M) NAME setmemwindow - changes the window id of a running program or starts a program in a particular memory window SYNOPSIS setmemwindow [ -cjnfbov ] [ -i WinId ] -p pid | program [ arg ... ] DESCRIPTION setmemwindow is the command that changes the window id of a running process or starts a specified program in a particular memory window.
setmemwindow(1M) setmemwindow(1M) -c Create a window with id WinId and attach the specified process to it. If WinId already exists the call fails. -j Join an existing window with id WinId. The specified process attaches to an existing memory window. If no entry exists the call fails. -n If program is exec’ed, the default behavior is to waitpid (see the wait(2) manual page) for the process to terminate. Specifying -n causes setmemwindow to exit after fork’ing the child (that will exec program).
setmemwindow(1M) setmemwindow(1M) memory window. A common usage of these commands is to extract a memory window id with get- memwindow , which is then passed to setmemwindow to start a process with the given window id. Processes must be in the same window to share data. Processes wanting to share global data, such as shared memory or MAP_SHARED memory mapped files, must make sure all processes are in the same memory window.
setmnt(1M) setmnt(1M) NAME setmnt - establish the file-system mount table, /etc/mnttab SYNOPSIS /usr/sbin/setmnt DESCRIPTION The setmnt command creates the /etc/mnttab table (see mnttab(4)), which is needed by both the mount and umount commands (see mount(1M)). setmnt reads the standard input and creates an entry in /etc/mnttab for each line of input.
setoncenv(1M) setoncenv(1M) NAME setoncenv - NFS environment configuration command SYNOPSIS /usr/sbin/setoncenv [-a][v] variable value /usr/sbin/setoncenv -l [v] [subsystem|variable] /usr/sbin/setoncenv -r [v] variable [value] DESCRIPTION setoncenv initializes, displays, and removes the value of NFS configuration variables, found either in /etc/rc.config.d/nfsconf, or /etc/rc.config.d/namesvrs. The value can be an integer or a string and should be consistent with the variable being set.
setoncenv(1M) setoncenv(1M) /sbin/init.d/nfs.client. AUTOMOUNTD_OPTIONS [option_string] automount daemon used by run time arguments for the /sbin/init.d/nfs.client. The setoncenv command recognizes the following configuration variable names for the KEY subsystem: KEYSERV_OPTIONS [option_string] keyserv The run time arguments for the daemon used by /sbin/init.d/nis.client or /sbin/init.d/nis.server.
setoncenv(1M) setoncenv(1M) PCNFS_SERVER [0 | 1] Used to enable or disable the pcnfsd daemon by /sbin/init.d/nfs.server. START_MOUNTD [0 | 1] Used to enable or disable the rpc.mountd daemon by /sbin/init.d/nfs.server. NUM_NFSD [number] Number of NFS deamons (nfsd ) to start on an NFS server. The default is 16. This variable will be obsolete in a future release. NUM_NFSIOD [number] Number of NFS BIO daemons (biod ) to start on an NFS client. The default is 16.
setoncenv(1M) setoncenv(1M) nfs_fine_grain_fs_lock Enabling this tunable reduces the occurrence of alpha semaphore contention in NFS file operations that are performed serially. This tunable will be obsolete in a future release. nfs_new_lock_code Controls the performance of asynchronous I/O against files that are locked on NFS filesystems. This tunable will be obsolete in a future release.
setoncenv(1M) setoncenv(1M) /sbin/init.d/nis.client. YPPASSWDD_OPTIONS [option_string] The run time arguments for the rpc.yppasswdd daemon used by /sbin/init.d/nis.server. YPSERV_OPTIONS [option_string] The run time arguments for the ypserv daemon used by /sbin/init.d/nis.server. YPSET_ADDR [string ] This sets the IP address of an NIS server that the client should bind to. This value is used by /sbin/init.d/nis.client.
setprivgrp(1M) setprivgrp(1M) NAME setprivgrp - set special privileges for groups SYNOPSIS setprivgrp setprivgrp setprivgrp setprivgrp groupname [privileges] -g [privileges] -n [privileges] -f file DESCRIPTION The setprivgrp command associates a group with a list of privileges, thus providing access to certain system capabilities for members of a particular group or groups. The privileges can be displayed with the getprivgrp command (see getprivgrp (1)).
setprivgrp(1M) PSET MPCTL setprivgrp(1M) Can change system pset configuration (see pset_create (2)). Can use mpctl() to change processor binding, locality domain binding or launch policy of a process (see mpctl(2)). Group Privileges File Format The file specified with the -f option should contain one or more lines in the following formats: groupname [privileges] -g [privileges] -n [privileges] They are described above in "Options and Arguments".
setrules(1M) setrules(1M) NAME setrules - set compartment rules SYNOPSIS setrules [-p] DESCRIPTION setrules takes the current rules files on the system and puts them into effect. Prior to using this command, changes in the rules files have no effect on the system. This command can only be used when compartmentalization is enabled (see cmpt_tune(1M)). Options setrules recognizes the following option: -p Preview the rules.
setuname(1M) setuname(1M) NAME setuname - change machine information SYNOPSIS setuname [-s name] [-n node] [-t] DESCRIPTION The setuname command is used to modify the value for system name and/or the node name by using the appropriate option(s). The setuname command attempts to change the parameter values in both the running kernel and the system configuration to cross reboots. A temporary change affects only the running kernel.
showmount(1M) showmount(1M) NAME showmount - show all remote mounts SYNOPSIS /usr/sbin/showmount [-a] [-d] [-e] [ host ] DESCRIPTION showmount lists all clients that have remotely mounted a filesystem from host. This information is maintained by the mountd server on host (see mountd(1M)). The default value for host is the value returned by hostname (see hostname(1)).
shutdown(1M) shutdown(1M) NAME shutdown - terminate all processing SYNOPSIS /sbin/shutdown [-h-r] [-y] [-o] [grace] /sbin/shutdown -R [-H] [-y] [-o] [grace] DESCRIPTION The shutdown command is part of the HP-UX system operation procedures. Its primary function is to terminate all currently running processes in an orderly and cautious manner.
shutdown(1M) • shutdown(1M) • If the system is standalone, /sbin/rc is executed to shut down subsystems, unmount file systems, and perform other tasks to bring the system to run level 0. • If the system is a server, the optional -o argument is used to determine if all clients in the cluster should also be rebooted.
shutdown(1M) shutdown(1M) FILES /etc/shutdown.allow Authorization file. The file contains lines that consist of a system host name and the login name of a user who is authorized to reboot or halt the system. A superuser’s login name must be included in this file in order to execute shutdown . However, if the file is missing or of zero length, the root user can run the shutdown program to bring the system down.
sig_named(1M) sig_named(1M) NAME sig_named - send signals to the domain name server SYNOPSIS /usr/bin/sig_named [kill restart ] DESCRIPTION sig_named sends the appropriate signal to the domain name server /usr/sbin/named. The process ID is obtained from /var/run/named.pid or from ps(1) if /var/run/named.pid does not exist. Options sig_named recognizes the following command-line arguments: kill Kill the name server process. restart Signal the name server to reload its database.
slpd(1M) slpd(1M) NAME slpd - Service Location Protocol Daemon SYNOPSIS slpd [ -c configuration_file ] [ -r registration_file ] [-l log_file ] [ -p pid_file ] [ -d ] DESCRIPTION The slpd daemon provides the functionality of the Directory Agent and Service Agent for the Service Location Protocol ("SLP") version 2. SLP provides a scalable framework that allows the networking applications to discover the existence, location and configuration of networked services in the enterprise networks.
slpd(1M) slpd(1M) DIAGNOSTICS Any errors encountered by slpd in the registration or configuration file or in normal operation are logged in the log file, /var/adm/syslog/slpd.log, which is the default file. To change this log file, use the slpd -l log_file command. AUTHOR slpd was developed by the Caldera Systems, Inc. FILES /etc/slp.conf /etc/slp.reg /var/run/slpd.pid /var/log/slp.
slpdc(1M) slpdc(1M) NAME slpdc - send signals to the SLP daemon or starts slpd SYNOPSIS slpdc [ start stop restart dump ] DESCRIPTION slpdc sends the appropriate signal to the SLP daemon or starts slpd /usr/sbin/slpd. The process ID is obtained from /var/run/slpd.pid or from the ps command if /var/run/slpd.pid does not exist (see ps(1)). Options slpdc recognizes the following command-line arguments: dump Sends the SIGINT signal to slpd and makes slpd dump its database.
smrsh(1M) smrsh(1M) NAME smrsh - restricted shell for sendmail SYNOPSIS smrsh -c command DESCRIPTION The smrsh program is intended as a replacement for sh for use in the prog mailer in sendmail configuration files. It sharply limits the commands that can be run using the |program syntax of sendmail in order to improve the overall security of your system.
snmpd(1M) snmpd(1M) NAME snmpd, snmpdm - Simple Network Management Protocol (SNMP) Process SYNOPSIS /usr/sbin/snmpd [ -a ] [ -authfail ] [ -C contact ] [ -Contact contact ] [ -h ] [ -help ] [ -L location ] [ -Location location ] [ -l logfile ] [ -logfile logfile ] [ -m logmask ] [ -mask logmask ] [ -n ] [ -P portnum ] [ -Port portnum ] [ -sys description ] [ -sysDescr description ] /usr/sbin/snmpd [ -e extendFile ] /usr/sbin/snmpdm [ -apall ] [ -aperror ] [ -aptrace ] [ -apwarn ] [ -a ] [ -authfail ] [ -
snmpd(1M) snmpd(1M) -logfile logfile -l logfile Use the logfile for logging rather than the default logfile, /var/adm/snmpd.log. A value of - will direct logging to stdout . -log_format value The value can be 0 or 1. 0 means use traditional logging format for /var/adm/snmpd.log file. 1 means use new logging format. The new logging format gives the Log level, Timestamp, Program Name, File name, Line Number and message in separate lines. -mask logmask -m logmask Sets the initial logging mask to logmask.
snmpd(1M) snmpd(1M) linkUp Sends a linkUp trap when an interface comes up. authenticationFailure Sends an authenticationFailure trap when an SNMP request is sent to the SNMPR agent with a community name that does not match the community names specified in /etc/SnmpAgent.d/snmpd.conf. The Master Agent (snmpdm ) and the IPv6 subAgent (ipv6agt ) collaborate to send the following SNMP traps: linkDown linkUp Sends a linkDown trap when an IPv6 interface goes down.
snmpd(1M) snmpd(1M) It also includes the subagents /usr/sbin/trapdestagt and /usr/sbin/naaagt. The trapdestagt supports the MIB variables used for updating the trapdest entries in snmpd.conf file. For details on the naaagt subagent please refer to naaagt man page. The MIB-2 subAgent supports most of the objects in RFC1213 . The EGP group is not supported. The HP-UX subAgent supports most of the objects in the HP-UX MIB.
snmpd(1M) snmpd(1M) /sbin/init.d/SnmpMib2 invokes /usr/sbin/mib2agt /sbin/rc /sbin/rc2.d/s565SnmpHpunix /sbin/init.d/SnmpHpunix invokes invokes invokes /sbin/rc2.d/s565SnmpHpunix /sbin/init.d/SnmpHpunix /usr/sbin/hp_unixagt /sbin/rc /sbin/rc2.d/s565SnmpTrpDst /sbin/init.d/SnmpTrpDst invokes invokes invokes /sbin/rc2.d/s565SnmpTrpDst /sbin/init.d/SnmpTrpDst /usr/sbin/trapdestagt HP-UX 11i Version 1 (with IPv6 depot installed) /sbin/rc invokes /sbin/rc2.d/S560SnmpMaster invokes /sbin/init.
snmpd(1M) snmpd(1M) Objects that return Null values (Solaris only): • ifInNUcastPkts ifInDiscards ifOutNUcastPkts ifOutDiscards Objects that return noSuchName errors (Solaris only): • ifLastChange ifInOctets ifInUnknownProtos ifOutOctets • ipInReceives ipInAddrErrors ipForwDatagrams ipInUnknownProtos ipInDiscards ipInDelivers ipOutRequests ipOutDiscards ipOutNoRoutes ipReasmTimeout ipReasmReqds ipReasmOKs ipReasmFails ipFragOKs ipFragFails ipFragCreates ipAdEntReasmMaxSize ipRouteAge ipRoutingDiscards •
snmpd(1M) snmpd(1M) The environment variables specific to the master agent snmpdm are as below: Environment Variables SNMP_LOG_SIZE Exporting this variable to >= 1MB restricts the size of the snmp log file. When the size grows beyond the value exported, the log file rolls over. SR_SNMP_TEST_PORT This variable can be exported to change the default port on which snmpdm listens. SR_TRAP_TEST_PORT This variable can be exported to change the default port to which snmpdm sends traps.
softpower(1M) softpower(1M) NAME softpower - determine if softpower hardware is installed on the system SYNOPSIS /sbin/softpower DESCRIPTION The softpower command determines whether a software controlled power switch is installed on the system. RETURN VALUE softpower returns the following values: 0 Softpower hardware detected on the system. 1 Softpower hardware was not detected on the system.
spray(1M) spray(1M) NAME spray - spray packets SYNOPSIS /usr/sbin/spray host [-c count ] [-l length ] DESCRIPTION spray sends a one-way stream of packets to host using RPC, then reports how many were received by host and what the transfer rate was. The host name can be either a name or an internet address. Options spray recognizes the following options and command-line arguments: -c count Specifies how many packets to send.
sprayd(1M) sprayd(1M) NAME sprayd - spray server SYNOPSIS /usr/lib/netsvc/spray/rpc.sprayd [-l log_file ] [-e-n] DESCRIPTION sprayd is an RPC server that records the packets sent by spray from another system (see spray(1M)). inetd invokes sprayd through /etc/inetd.conf (see inetd(1M)). Options sprayd recognizes the following options and command-line arguments: -l log_file Log any errors to the named log file, log_file. Errors are not logged if the -l option is not specified.
st(1M) st(1M) NAME st - shared tape administration SYNOPSIS st -f device_file [-r] [-s] DESCRIPTION The st command provides users with a command-line interface to check the status of a shared tape device or to reclaim a shared tape device from a host system that has failed while holding a reservation on the shared tape device. The st command can also be used for the same purpose on shared library robotic devices. To use the st command you must have root user id. Please see examples below for usage.
statd(1M) statd(1M) NAME statd, rpc.statd - network status monitor SYNOPSIS /usr/sbin/rpc.statd [-l log_file] DESCRIPTION statd is an RPC server. It interacts with lockd to provide crash and recovery functions for the locking services on NFS (see lockd(1M)). A fixed port can be specified for statd /etc/rc.config.d/nfsconf file, as shown: STATD_PORT =port_number by using the STATD_PORT variable in the The port number can have any value between 1 and 65535.
strace(1M) strace(1M) NAME strace - write STREAMS event trace messages to standard output SYNOPSIS strace [ mod sub pri ] ... DESCRIPTION strace gets STREAMS event trace messages from STREAMS drivers and modules via the STREAMS log driver (strlog(7) ), and writes these messages to standard output. By default, strace without arguments writes all STREAMS trace messages from all drivers and modules. strace with command-line arguments limits the trace messages received.
strace(1M) strace strace(1M) 28 2 0 28 3 0 28 4 1 WARNINGS Running strace with several sets of arguments can impair STREAMS performance, particularly for those modules and drivers that are sending the messages. Also be aware that strace may not be able to handle a large number of messages. If drivers and modules return messages to strace too quickly, some may be lost. FILES /usr/lib/nls/msg/C/strace.cat NLS catalog for strace . SEE ALSO strclean(1M), strerr(1M), strlog(7).
strchg(1M) strchg(1M) NAME strchg, strconf - change or query stream configuration SYNOPSIS strchg -h module1[, module2]... strchg -p [ -a-u module] strchg -f file strconf strconf -t strconf -m module DESCRIPTION The strchg and strconf commands are used to change or query the configuration of the stream associated with the user’s standard input. The strchg command pushes modules on and/or pops modules off the stream. The strconf command queries the configuration of the stream.
strchg(1M) strchg(1M) DIAGNOSTICS strchg returns zero on success. It prints an error message and returns non-zero status for various error conditions, including usage error, bad module name, too many modules to push, failure of an ioctl on the stream, or failure to open file from the -f option. strconf returns zero on success (for the -m or -t option, "success" means the named or topmost module is present). It returns a non-zero status if invoked with the -m or -t option and the module is not present.
strclean(1M) strclean(1M) NAME strclean - remove outdated STREAMS error log files SYNOPSIS strclean [-d logdir ] [-a age ] DESCRIPTION strclean cleans the STREAMS error logger directory of log files (error. mm-dd) that contain error messages sent by the STREAMS log driver, strlog(7). If the -d option is not used to specify another directory, strclean removes error log files in the /var/adm/streams directory.
strerr(1M) strerr(1M) NAME strerr - receive error messages from the STREAMS log driver SYNOPSIS strerr [-a sys_admin_mail_name ] [-d logdir ] DESCRIPTION The strerr daemon receives error messages from the STREAMS log driver (strlog(7)) for addition to the STREAMS error log files (error. mm-dd) in the STREAMS error logger directory (/var/adm/streams by default). When first called, strerr creates the log file error. mm-dd.
strvf(1M) strvf(1M) NAME strvf - STREAMS verification tool SYNOPSIS strvf [-v] DESCRIPTION strvf executes a series of subcommands that verify whether or not STREAMS is currently installed and configured on your system. All output is sent to stdout . Verbose output is always sent to the logfile /var/adm/streams/strvf.log. These subcommands make sure that the STREAMS kernel daemons are running and that open() , putmsg() , getmsg() , ioctl() , and close() can be performed on /dev/echo .
swa(1M) swa(1M) NAME swa - HP-UX Software Assistant SYNOPSIS swa [ [-x] -?] swa report [-a analyzer] [-r stdout_report_type] [-s inventory_source] [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] [-X option_file] swa get [-p] -t target_depot [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] [-X option_file] swa step {inventory |catalog |analyze |report |download |depot } [step_options ] [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ]] [-X option_file] swa clean {sw
swa(1M) swa(1M) step Perform an individual step of the swa report or swa get command, both of which are actually composed of multiple steps (advanced usage). See swa-step(1M). clean Remove software and files cached by SWA. See swa-clean(1M). Security Considerations The analysis that swa performs relies on the integrity of the inventory to determine the appropriate patches to install on the system.
swa(1M) swa(1M) To generate a report, updating the catalog of HP software if it is more than 48 hours old: swa report -x catalog_max_age=48 To generate a report using a specified catalog of HP software without updating that catalog: swa report -x catalog=˜/mycatalog.
swa-clean(1M) swa-clean(1M) NAME swa-clean: swa - remove files created by SWA SYNOPSIS swa clean {swcache |usercache |all } [-p] [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] [-X option_file] DESCRIPTION The swa clean command allows the user to remove software and files cached by Software Assistant (SWA). As SWA is used to report on systems and download software, objects are cached on disk for later use. There are two caches.
swa-clean(1M) swa-clean(1M) 3. Proxy environment variables (See the Environment Variable section.) 4. Options specified within the $HOME/.swa.conf file 5. Options specified within the /etc/opt/swa/swa.conf file 6. Default value, specified in the descriptions of each option below in option_name =default_value format. Note: If the same option or extended option is given multiple times in the same location, the last option takes effect.
swa-clean(1M) swa-clean(1M) Applicable caches: swcache usercache all Specifies the level of standard error verboseness: 0 1 2 3 Only ERROR messages and the starting/ending BANNER messages. Adds WARNING messages. Adds NOTE messages. Adds INFO messages (informational messages preceded by the asterisk ’*’ character); this is the default. 4 Adds verbose INFO messages. 5 Adds very verbose INFO messages.
swa-clean(1M) swa-clean(1M) HP-UX Software Assistant System Administration Guide and HP-UX Software Assistant Release Notes at http://docs.hp.com.
swa-get(1M) swa-get(1M) NAME swa-get: swa - download software from HP to resolve issues and make a depot SYNOPSIS swa get [-p] -t target_depot [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] [-X option_file] DESCRIPTION The swa get command downloads software from HP to resolve issues identified by swa report ; see swa-report(1M). By default, a new depot is created.
swa-get(1M) swa-get(1M) Extended Options The extended options may be specified in different ways: on the command line using the -x option, in an option file specified using the -X option, or in one of the configuration files /etc/opt/swa/swa.conf (system wide) or $HOME/.swa.conf (user-specific). The /etc/opt/swa/swa.conf.template file provides example syntax for a configuration or -X file. If the same option is given in multiple locations, the following order is prioritized from highest to lowest: 1.
swa-get(1M) swa-get(1M) -x download_cmd= Usage: Intermediate Specifies a command that can download a URL from the Internet. The command is enclosed in single quotes (’). This option is useful in cases where a system does not have a direct connection to the Internet, but can execute a command that can download a URL from the Internet (for example, by using a gateway machine).
swa-get(1M) swa-get(1M) -x http_proxy=${proxy} Usage: Advanced Proxy host and port (with optional HTTP basic authentication username and password) for accessing content using the HTTP protocol. No proxy information is specified by default. The following format is used: service:// [user:password@]proxy-server :port For example: http_proxy=http://web-proxy.mycompany.com:8088 The HTTP protocol is the default protocol used to download certificate revocation lists. See the crl_url option for more details.
swa-get(1M) swa-get(1M) -x swcache=/var/opt/swa/cache Usage: Basic This is the directory where SWA stores downloaded patches before putting them into a depot. The default location is only writable by root, so this value needs to be changed for a non-root user to be able to download software. Opening up permissions on the default location is not recommended. -x user_dir=˜/.swa Usage: Basic The directory where SWA stores catalog, inventory, analysis, ignore, and report files.
swa-get(1M) swa-get(1M) swa get -x -? To run swa get using the options specified in the file ./myconfig : swa get -X .
swa-report(1M) swa-report(1M) NAME swa-report: swa - report software and security issues, and resolutions. SYNOPSIS swa report [-a analyzer] [-r stdout_report_type] [-s inventory_source] [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] [-X option_file] DESCRIPTION The swa report command inventories and analyzes a host system or some types of depots against a catalog of HP software and known issues (security and other defects).
swa-report(1M) swa-report(1M) Specify one system or depot to be inventoried, analyzed and reported on. If this option is not specified, the local system is inventoried, analyzed and reported on. Supports Secure Shell (recommended for remote connections) and swlist (legacy) protocols for gathering inventory information. See the inventory_source extended option for more details. -q The verbosity level is decreased by one for each instance -q is specified. (See also the -x verbosity option.
swa-report(1M) swa-report(1M) Specifies a space-separated list (appropriately quoted for your shell if applicable) of analyzers to be used. Each analyzer represents a different type of analysis that swa can perform. The supported analyzers follow in two lists (generic and specific).
swa-report(1M) swa-report(1M) Note: The following are alternative, though less-secure, unauthenticated paths to the standard HP catalog file: http://ftp.itrc.hp.com/wpsl/bin/doc.pl/screen=wpslDownloadPatch/ swa_catalog.xml.gz?PatchName=/export/patches/swa_catalog.xml.gz ftp://ftp.itrc.hp.com/export/patches/swa_catalog.xml.
swa-report(1M) swa-report(1M) The FTP protocol is used for patch download. Integrity of the patches is checked using MD5 secure hashes in the catalog, for which the HTTPS protocol is recommended. See the https_proxy option and the catalog_source option for details. The use of ${proxy} for this option value is substituted with the value of the proxy option (which is not set by default). -x html_report=${user_dir}/report/swa_report.
swa-report(1M) swa-report(1M) Specifies the age, in hours, of the cached copy of the inventory contents of a given system. If the inventory becomes too old (based on the timestamp stored in the file), SWA will inventory the host system/depot again. Note: There are two special values, 0 and -1 . The value of 0 signifies to always update the file. The value of -1 signifies to never update the file, regardless of age.
swa-report(1M) swa-report(1M) others on your network). Also, credentials specified on the command-line are visible to other local users, and access to credentials stored in extended option files are determined by their permissions. If your proxy server requires another type of authentication, see the -x download_cmd option. This option is used as the default for the other proxy settings.
swa-report(1M) swa-report(1M) EXTERNAL INFLUENCES Environment Variables For compatibility with other applications (including security_patch_check), several environment variables can be used to configure how SWA connects to the Internet to retrieve catalogs, certificate revocation lists, and software. These environment variables include ftp_proxy , http_proxy , and https_proxy . These environment variables have the same effect as the corresponding extended options of the same names.
swa-report(1M) swa-report(1M) swa report -x catalog_max_age=48 To generate a report using a specified catalog of HP software without updating that catalog: swa report -x catalog=˜/mycatalog.xml -x catalog_max_age=-1 To generate a report always updating the catalog of HP software: swa report -x catalog_max_age=0 AUTHOR swa was developed by HP. FILES /etc/opt/swa/swa.conf /etc/opt/swa/swa.conf.template $HOME/.swa.conf /var/opt/swa/swa.log System-wide Software Assistant configuration file.
swa-step(1M) swa-step(1M) NAME swa-step: swa - advanced control of Software Assistant execution steps SYNOPSIS swa step inventory [-s inventory_source] [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] swa step catalog [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] swa step analyze [-a analyzer] [-s inventory_source] [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-? ] ] swa step report [-r stdout_report_type] [-q[q[q] ] ] [-v[v] ] [ [-option] -?] [-x option=[value|-?
swa-step(1M) swa-step(1M) the downloaded software into a depot. Depending on the extended options used, a new depot is created or an existing depot is added to. Example use case: If a depot server system does not have Internet access, use swa step download to get software on your intranet. Then copy the software to the swcache directory on your depot server and use swa step depot to unpack the downloaded software and create your depot.
swa-step(1M) swa-step(1M) information. See the inventory_source extended option for more details. -t target_depot The depot that software is copied into as specified by target_depot . This is where patches from HP are copied into. Normally, the target_depot should be empty and a new depot will be created. If the depot already exists, you must specify the advanced option -x allow_existing_depot=true and understand its implications. (See also the -x allow_existing_depot option in Extended Options).
swa-step(1M) swa-step(1M) -x analysis_file=${user_dir}/cache/swa_analysis.xml Usage: Basic Applicable steps: analyze report download depot The file containing the raw analysis results, including a list of software that should be downloaded from Hewlett-Packard in order to address the issues found by the analysis. Use this option to save the results from a specific analysis, and later reuse those results in order to download the corresponding software from HP.
swa-step(1M) swa-step(1M) The use of ${user_dir} at the beginning of this option value is substituted with the value of the user_dir option (which defaults to $HOME/.swa ). -x catalog_source=https://ftp.itrc.hp.com/wpsl/bin/doc.pl/ screen=wpslDownloadPatch/swa_catalog.xml.gz?PatchName= /export/patches/swa_catalog.xml.
swa-step(1M) swa-step(1M) This command should take one option that is supplied by SWA (the URL of a file to download), and outputs that file to its standard output. If the actual command in your environment behaves differently, it can be wrapped by a shell script in order to provide the interface that SWA needs. The command needs to support the protocol specified by the catalog_source option (default HTTPS) for catalog retrieval and FTP for patch retrieval. See the catalog_source option.
swa-step(1M) swa-step(1M) The use of ${proxy} for this option value is substituted with the value of the proxy option (which is not set by default). -x http_proxy=${proxy} Usage: Advanced Applicable steps: catalog download Proxy host and port (with optional HTTP basic authentication username and password) for accessing content using the HTTP protocol. No proxy information is specified by default.
swa-step(1M) swa-step(1M) depot. The inventory information is cached for later access in a cache directory within the user_dir . Naming of the inventory files is based on the hostname and path-to-depot as specified (for example, using the fully qualified domain name of a host will be cached separately from using the nodename, even for the same machine). Refresh of the cached inventory for each inventory_source is determined by the inventory_max_age option.
swa-step(1M) swa-step(1M) -x report_when_no_issues=true Usage: Intermediate Applicable steps: report Controls whether SWA will produce a report to standard output when there are no issues and/or actions. This is useful, for example, in a cron job where you want email sent to you only if there is an issue found. true false A standard output report is always produced. A standard output report is only produced if there are issues and/or actions.
swa-step(1M) swa-step(1M) 3 Adds INFO messages (informational messages preceded by the ’*’ character); this is the default. 4 Adds verbose INFO messages. 5 Adds very verbose INFO messages. Note: The -v option is equivalent to increasing verbosity by 1 (for example, from 3 to 4) and the -q option is equivalent to decreasing verbosity by 1. The -v and -q options can be used more than once.
swa-step(1M) swa-step(1M) swa step analyze To analyze a remote system for security issues, using the previously cached inventory and catalog (in their default locations): swa step analyze -a SEC -s remotesys To analyze the local system for security issues, using a specified location for the catalog and analysis files: swa step analyze -a SEC -x catalog=˜/mycatalog \ -x analysis_file=˜/myanalysis.
swa-step(1M) swa-step(1M) download.contents Lists all files downloaded from HP stored within the swcache , a directory specified by the swcache extended option. readBeforeInstall.txt Lists special installation instructions and other dependencies for the patches in the depot. Located in the root directory of the target depot. ignore Lists issue IDs to be ignored (for example, they are completed or not applicable). Supports comments and regular expressions. See regexp(5).
swacl(1M) swacl(1M) NAME swacl - view or modify the Access Control Lists (ACLs) which protect software products SYNOPSIS swacl -l level [-D acl_entry | -F acl_file | -M acl_entry ] [-f software_file ] [-t target_file ] [-x option=value ] [-X option_file ] [software_selections] [@ target_selections] Remarks • This command supports operations on remote systems. See the Remote Operation section below for details. • Type man 5 sd to display sd(5) for an overview of all SD commands.
swacl(1M) swacl(1M) NOTE: You can also set up remote access by using swacl directly on the remote machines to grant root or non-root access to users from the controller system. Options If the -D, -F, or -M option is not specified, swacl prints the requested ACL(s) to the standard output. The swacl command supports the following options: -D acl_entry Deletes an existing entry from the ACL associated with the specified object(s). For this option, the permission field of the ACL entry is not required.
swacl(1M) swacl(1M) You can specify only one of the -D, -F , or -M options at each invocation of swacl . Operands Most SD commands support two types of operands: software selections followed by target selections. These operands are separated by the "at" (@) character. This syntax implies that the command operates on "software selections at targets".
swacl(1M) swacl(1M) [command_name.]option=value The optional command_name prefix denotes one of the SD commands. Using the prefix limits the change in the default value to that command. If you leave the prefix off, the change applies to all commands. You can also override default values from the command line with the -x or -X options: command -x option =value command -X option_file The following section lists all of the keywords supported by the swacl command.
swacl(1M) swacl(1M) rpc_binding_info=ncacn_ip_tcp:[2121] ncadg_ip_udp:[2121] Defines the protocol sequence(s) and endpoint(s) on which the daemon listens and which the other commands use to contact the daemon. If the connection fails for one protocol sequence, the next is attempted. SD supports both the tcp (ncacn_ip_tcp:[2121]) and udp (ncadg_ip_udp:[2121]) protocol sequence on most platforms. rpc_timeout=5 Relative length of the communications timeout.
swacl(1M) swacl(1M) LANG=ja_JP.eucJP to make the agent and daemon log messages display in Japanese. LC_ALL Determines the locale used to override any values for locale categories specified by the settings of LANG or any environment variables beginning with LC_ . LC_CTYPE Determines the interpretation of sequences of bytes of text data as characters (for example, single versus multibyte characters in values for vendor-defined attributes).
swacl(1M) swacl(1M) r ead Grants permission to read the object. On host , depot , or root objects, read permission allows swlist operations. On products within depots, read permission allows product files to be installed or copied with swinstall or swcopy . w rite Grants permission to modify the object itself. • On a root object (for example, installed root filesystem), this also grants permission to modify the products installed (contained) within it.
swacl(1M) swacl(1M) RETURN VALUE The swacl command returns: 0 1 2 The software_selections and/or target_selections were successfully displayed or modified. The display/modify operation failed on all target_selections. The modify/modify operation failed on some target_selections. DIAGNOSTICS The swacl command writes to stdout, stderr, and to the daemon logfile. Standard Output The swacl command prints ACL information to stdout when the user requests an ACL listing.
swacl(1M) swacl(1M) user:ramon:-r--t group:swadm:crwit other:-r--t host:lehi.fc.hp.
swacl(1M) swacl(1M) swacl -l depot -M user:steve:- -M user:george:- \ @ newdist:/var/spool/sw To delete entries for local user rick from all products in the default local depot: swacl -l product -D user:rick \* WARNINGS • You can edit an ACL in such a way that it will leave a system inaccessible. Do not remove all control permissions on an ACL. (Note, however, that the local super-user can always edit SD ACLs, regardless of permissions.) • ACLs can grant the equivalent of local superuser permission.
swagentd(1M) swagentd(1M) NAME swagentd, swagent - daemon that invokes swagent; serve local or remote SD software management tasks SYNOPSIS swagent executed by swagentd only. swagentd [-k] [-n] [-r] [-x option=value ] [-X option_file ] Remarks • This command supports operation on remote systems. See Remote Operation below. • For an overview of all SD commands, see the sd(5) man page by typing man 5 sd on the command line.
swagentd(1M) swagentd(1M) Options The swagentd command supports the following options to control its behavior. (These options do not apply to swagent , which you cannot start from the command line.) -k The kill option stops the currently running daemon. Stopping the daemon will not stop any agent processes currently performing management tasks (such as installing or removing software), but will cause any subsequent management requests to this host to be refused.
swagentd(1M) swagentd(1M) other commands use to contact the daemon. If the connection fails for one protocol sequence, the next is attempted. SD supports both the tcp (ncacn_ip_tcp:[2121]) and udp (ncadg_ip_udp:[2121]) protocol sequence on most platforms. Agent Options These options apply only to the agent, swagent . You cannot set these options directly from the command line. To set agent options, you must edit the system-wide defaults file. See the Default Options heading above for instructions.
swagentd(1M) swagentd(1M) kernel_path=/stand/vmunix Defines the path to the system’s bootable kernel. This path is passed to the kernel_build_cmd via the SW_KERNEL_PATH environment variable. mount_cmd=/sbin/mount Defines the command called by the agent to mount all file systems. reboot_cmd=/sbin/reboot Defines the command called by the agent to reboot the system after all filesets have been loaded, if any of the filesets required reboot.
swagentd(1M) swagentd(1M) Note: The language in which the SD agent and daemon log messages are displayed is set by the system configuration variable script, /etc/rc.config.d/LANG. For example, /etc/rc.config.d/LANG, must be set to LANG=ja_JP.SJIS or LANG=ja_JP.eucJP to make the agent and daemon log messages display in Japanese. LC_ALL Determines the locale to be used to override any values for locale categories specified by the settings of LANG or any environment variables beginning with LC_ .
swagentd(1M) swagentd(1M) source machine and when the software is pulled. Refer to the swagent.source_depot_audit option for more information. When operating on software depots, the swagent logs messages to the file swagent.log beneath the depot directory (for example, /var/spool/sw). When accessing a read-only software depot (for example, as a source), the swagent logs messages to the file /tmp/swagent.log.
swapinfo(1M) swapinfo(1M) NAME swapinfo - system paging space information SYNOPSIS /usr/sbin/swapinfo [-mtadfnrMqw ] DESCRIPTION swapinfo prints information about device and file system paging space. (Note: the term ‘swap’ refers to an obsolete implementation of virtual memory; HP-UX actually implements virtual memory by way of paging rather than swapping. This command and others retain names derived from ‘swap’ for historical reasons.
swapinfo(1M) swapinfo(1M) START/LIMIT For device paging areas, START is the block address on the mass storage device of the start of the paging area. The value is normally 0 for devices dedicated to paging, or the end of the file system for devices containing both a file system and paging space. For file system paging areas, LIMIT is the maximum number of 1-Kbyte blocks that will be used for paging, the same as the limit value given to swapon .
swapinfo(1M) • swapinfo(1M) System available memory is shared between the paging subsystem and kernel memory allocators. Thus, the system may show memory paging usage before all available disk paging space is completely reserved or fully allocated. Logical Volume Manager (LVM) The swapinfo command displays swap logical volume if the system was installed with LVM. To modify swap logical volume, refer to the LVM commands and manpages for lvlnboot and lvrmboot .
swapinfo(1M) swapinfo(1M) The information in this manual page about paging allocation and other implementation details may change without warning; users should not rely on the accuracy of this information. AUTHOR swapinfo was developed by HP. SEE ALSO lvlnboot(1M), lvrmboot(1M), swapon(1M), swapon(2), fstab(4).
swapon(1M) swapon(1M) NAME swapon - enable device or file system for paging SYNOPSIS Preferred Forms /usr/sbin/swapon -a [-u] [-t type]... /usr/sbin/swapon [-e -f] [-p priority] [-u] device ... /usr/sbin/swapon [-m min] [-l limit] [-r reserve ] [-p priority] directory ... Obsolescent Form /usr/sbin/swapon directory [min limit reserve priority] DESCRIPTION The swapon command enables devices or file systems on which paging is to take place.
swapon(1M) swapon(1M) After a file system has been enabled for paging, the optional arguments can be modified by subsequent swapon commands. Options swapon recognizes the following options and arguments: -a Cause all devices marked as swap and all file systems marked as swapfs in the file /etc/fstab to be made available to the paging system.
swapon(1M) swapon(1M) reserve can be specified in the same forms as limit, above. -t type Restrict the type of the paging area. If the -t option is omitted, all of the paging areas defined in /etc/fstab are made available. type can have one of the following values: dev fs local remote -u Device paging areas. File system paging areas. Paging areas defined on the local system. Paging areas defined on remote systems. Unlock block device files which are being used by the savecrash command.
swapon(1M) limit L F swapon(1M) = Paging space limit specified by the -l option = Space currently available to the paging system = Space currently occupied by the file system the following relationships hold: F + R + limit < D In normal operation L=0 If F + R >= D 0 <= L <= limit If F + R + limit >= D FILES /dev/dsk/c card ttarget ddevice /etc/fstab /etc/savecrash.
swask(1M) swask(1M) NAME swask - ask for user response SYNOPSIS swask [-v] [-c catalog ] [-C session_file ] [-f software_file ] [-J jobid ] [-Q date ] [-s source ] [-S session_file ] [-t target_file ] [-x option=value ] [-X options_file ] [ software_selections ] [@ target_selections] Remarks • This command supports operation on remote systems. See Remote Operation below. • For an overview of all SD commands, see the sd(5) man page by typing man 5 sd on the command line.
swask(1M) swask(1M) $HOME/.sw/sessions/. You can recall a session file with the -S option. -f software_file Reads the list of software_selections from software_file instead of (or in addition to) the command line. -s source Specifies the source depot (or tape) from which software is selected for the ask operation. (SD can read both tar and cpio tape depots.) -S session_file Executes swask based on the options and operands saved from a previous session, as defined in session_file.
swask(1M) swask(1M) • All version components are repeatable within a single specification (for example, r>=AA.12 , r
swask(1M) swask(1M) ask=true Executes the request script, if one is associated with the selected software, and stores the user response in a file named response . If ask=as_needed, the swask command first determines if a response file already exists in the catalog and executes the request script only when a response file is absent. autoselect_dependencies=true Controls the automatic selection of prerequisite and corequisite software that is not explicitly selected by the user.
swask(1M) swask(1M) 0 No such identifiers are prepended (default). 1 Applies to ERROR messages only. 2 Applies to ERROR and WARNING messages. 3 Applies to ERROR, WARNING, and NOTE messages. 4 Applies to ERROR, WARNING, NOTE, and certain other log file messages. logdetail=false Controls the amount of detail written to the logfile. When set to true , this option adds detailed task information (such as options specified, progress statements, and additional summary information) to the logfile.
swask(1M) swask(1M) To save session information in a different location, execute swask with the -C session__file option. A session file uses the same syntax as the defaults files. You can specify an absolute path for a session file. If you do not specify a directory, the default location for a session file is $HOME/.sw/sessions/. To re-execute a session, specify the session file as the argument for the -S session__file option.
swask(1M) swask(1M) SW_ROOT_DIRECTORY Defines the root directory in which the session is operating, either "/" or an alternate root directory. This variable tells control scripts the root directory in which the products are installed. A script must use this directory as a prefix to SW_LOCATION to locate the product’s installed files. The configure script is only run when SW_ROOT_DIRECTORY is /.
swask(1M) swask(1M) swask -s swposix:/tmp/sample.depot.1 -c /tmp/test1.depot Product1 Run request scripts from remote depot /tmp/sample.depot.1 on host swposix only when a response file is absent, create the catalog /tmp/test1.depot on the local controller machine, and place the response file (named response ) in the catalog: swask -s swposix:/tmp/sample.depot.1 -c /tmp/test1.depot -x ask=as_needed \* FILES $HOME/.swdefaults Contains the user-specific default values for some or all SD options.
swconfig(1M) swconfig(1M) NAME swconfig - configure, unconfigure, or reconfigure installed software SYNOPSIS swconfig [-p] [-u] [-v] [-c catalog ] [-C session_file ] [-f software_file ] [-J jobid ] [-Q date ] [-S session_file ] [-t target_file ] [-x option=value ] [-X option_file ] [software_selections] [@ target_selections] Remarks • This command supports operation on remote systems. See Remote Operation below. • swconfig can perform limited interactive operations. See Interactive Operation below.
swconfig(1M) • 2) swconfig(1M) If remote system is older than 11.00 or for some other reason does not have setaccess in place, copy setaccess script from an 11.11 or higher system to the remote system. swinstall , swcopy , and swremove have enhanced GUI interfaces for remote operations. Enable the enhanced GUIs by creating the .sdkey file on the controller. Use this command: touch /var/adm/sw/.
swconfig(1M) swconfig(1M) bundle[.product[.subproduct][.fileset]][,version ] product[.subproduct][.fileset][,version ] • The = (equals) relational operator lets you specify selections with the following shell wildcard and pattern-matching notations: • Bundles and subproducts are recursive. Bundles can contain other bundles and subproducts can contain other subproducts. • The \* software specification selects all products. Use this specification with caution.
swconfig(1M) swconfig(1M) EXTERNAL INFLUENCES Default Options In addition to the standard options, several SD behaviors and policy options can be changed by editing the default values found in: /var/adm/sw/defaults the system-wide default values. $HOME/.swdefaults the user-specific default values. Values must be specified in the defaults file using this syntax: [command_name.]option=value The optional command_name prefix denotes one of the SD commands.
swconfig(1M) swconfig(1M) defined for each selected product.) If set to true , target compatibility is not enforced. allow_multiple_versions=false Prevents the configuration of another, independent version of a product when a version already is configured at the target. If set to true , another version of an existing product can be configured in its new location. Multiple versions can only be installed if a product is locatable. Multiple configured versions will not work unless the product supports it.
swconfig(1M) swconfig(1M) • • INDEX.gz or INFO.gz exist on the source depot. INDEX.gz or INFO.gz are not older than the corresponding uncompressed INDEX or INFO files. The uncompressed INDEX or INFO file is accessed by the source agent if any problem occurs when accessing, transferring, or uncompressing the INDEX.gz or INFO.gz file. controller_source Location of a depot for the controller to access to resolve selections. This has no effect on which sources the target uses.
swconfig(1M) swconfig(1M) summary information) to the logfile. This information is in addition to log information controlled by the loglevel option. See loglevel below and the sd(5) manual page, by typing man 5sd , for more information. logfile=/var/adm/sw/swconfig.log This is the default command log file for the swconfig command. loglevel=1 Controls the log level for the events logged to the command logfile, the target agent logfile, and the source agent logfile.
swconfig(1M) swconfig(1M) select_local=true If no target_selections are specified, select the local host as the target of the command. software= Defines the default software_selections. There is no supplied default. If there is more than one software selection, they must be separated by spaces. targets= Defines the default target_selections. There is no supplied default (see select_local above). If there is more than one target selection, they must be separated by spaces.
swconfig(1M) swconfig(1M) Environment variables that affect scripts are: SW_CATALOG Holds the path to the Installed Products Database (IPD), relative to the path in the SW_ROOT_DIRECTORY environment variable. Note that you can specify a path for the IPD using the installed_software_catalog default option. SW_CONFIG_AFTER_REBOOT This variable should be read only by the configure script.
swconfig(1M) swconfig(1M) depot session before exiting, so that it can register or unregister depots if necessary. Requests to start new sessions are refused during this wait. Each agent will complete the configuration task (if the execution phase has already started) before it wraps up. This avoids leaving software in a corrupt state. RETURN VALUES The swconfig command returns: 0 1 2 The software_selections were successfully configured. The configure operation failed on all target_selections.
swconfig(1M) swconfig(1M) LIMITATIONS The SD-UX version of swconfig does not support the configuration, unconfiguration, or reconfiguration of installed software on remote targets. FILES $HOME/.swdefaults Contains the user-specific default values for some or all SD software management command options. $HOME/.sw/sessions/ Contains session files automatically saved by the SD software management commands, or explicitly saved by the user. /usr/lib/sw/sys.
swinstall(1M) swinstall(1M) NAME swinstall, swcopy - install and configure software products; software products for subsequent installation or distribution; respectively SYNOPSIS swinstall [XToolkit Options] [-i] [-p] [-r] [-v] [-c catalog ] [-C session_file ] [-f software_file] [-J jobid ] [-Q date ] [-s source ] [-S session_file ] [-t target_file ] [-x option=value ] [-X option_file ] [software_selections] [@ target_selections] swcopy [XToolkit Options] [-i] [-p] [-v] [-C session_file ] [-f software_fi
swinstall(1M) swinstall(1M) or swcopy on the command line (without any command-line options). You can also invoke the GUI by including the -i option with any other command-line options. The sd command provides an interactive interface for monitoring and scheduling software jobs. You can also use sd to invoke the swinstall , copy , and swremove GUIs. If you have enabled SD’s remote operations features, swinstall , swcopy , and swremove provide enhanced GUIs to support operations on remote targets.
swinstall(1M) swinstall(1M) checkinstall a script executed during the analysis of a target_selection, it checks that the installation can be attempted. If this check fails, the software product is not installed. preinstall postinstall configure a script executed immediately before the software’s files are installed. unpreinstall a script executed immediately after the software’s files are installed.
swinstall(1M) swinstall(1M) Options swinstall and swcopy support the following options: XToolKit Options The swinstall and swcopy commands support a subset of the standard X Toolkit options to control the appearance of the GUI. The supported options are: -bg , -background , -fg, -foreground , -display , -name , -xrm , and -synchronous . See the X(1) manual page by typing man X for a definition of these options. -i Runs the command in interactive mode (Graphical User Interface).
swinstall(1M) swinstall(1M) -S session_file Execute swinstall or swcopy based on the options and operands saved from a previous session, as defined in session_file. You can save session information from a command-line session with the -C session_file option. -t target_file Read the list of target_selections from target_file instead of (or in addition to) the command line.
swinstall(1M) swinstall(1M) [ ], *, ?, ! For example, the expression r=1[01].* returns any revision in version 10 or version 11. • All version components are repeatable within a single specification (for example, r>=A.12 , r
swinstall(1M) swinstall(1M) • If you set the value of this option to HOME/ path, SD replaces HOME with the invoking user’s home directory (from the system password file) and resolves path relative to that directory. For example, HOME/my_admin resolves to the my_admin directory in your home directory. • If you set the value of the installed_software_catalog default option to a relative path, that path is resolved relative to the value of this option.
swinstall(1M) swinstall(1M) If set to ask=true , or ask=as_needed, you can use the -c catalog option to specify the pathname of an exported catalog to store copies of the response file or files created by the request script. See swask(1M) for more information on request scripts. autoreboot=false (Applies only to swinstall .) Prevents the installation of software requiring a reboot from the non-interactive interface.
swinstall(1M) swinstall(1M) When set to true , the first left-most dependency in a list of OR dependencies that satisfies a requisite is not automatically selected when another dependency in the list that also satisfies the requisite is explicitly selected. If set to false , the first left-most dependency in a list of OR dependencies that satisfies a requisite is automatically selected even when another dependency in the list that also satisfies the requisite is explicitly selected.
swinstall(1M) swinstall(1M) The uncompressed INDEX or INFO file is accessed by the source agent if any problem occurs when accessing, transferring, or uncompressing the INDEX.gz or INFO.gz file. controller_source= Specifies the location of a depot for the controller to access to resolve selections. Setting this option can reduce network traffic between the controller and the target.
swinstall(1M) swinstall(1M) enforce_dsa=true Prevents the command from proceeding past the analysis phase if the disk space required is beyond the available free space of the impacted filesystem(s). If set to false , the install or copy operation uses the filesystem’s minfree space and may fail because it reaches the filesystem’s absolute limit. enforce_kernbld_failure=true (Applies only to swinstall .) Prevents swinstall from proceeding past the kernel build phase if the kernel build processes fail.
swinstall(1M) swinstall(1M) See loglevel=1 and the sd(5) manual page by typing man 5 sd for more information. logfile=/var/adm/sw/swremove.log This is the default command log file for the swinstall command. loglevel=1 Controls the log level for the events logged to the command logfile, the target agent logfile, and the source agent logfile. This information is in addition to the detail controlled by the logdetail option. (See logdetail=false and the sd(5) manual page for more information.
swinstall(1M) swinstall(1M) If multiple targets are specified, the first target in the list is used as the basis for patch selections. patch_match_target=false If set to true , this option selects the latest patches (software identified by the is_patch=true attribute) that correspond to software on the target root or depot. If multiple targets are specified, the first target in the list is used as the basis for patch selections. The patch_filter= option can be used in conjunction with patch_match_target.
swinstall(1M) swinstall(1M) If set to false, SD does not compute checksums and compares files only by size and timestamp. remove_obsolete_filesets=false (Applies only to swcopy .) Controls whether swcopy automatically removes obsolete filesets from target products in the target depot. If set to true , swcopy removes obsolete filesets from the target products that were written to during the copy process. Removal occurs after the copy is complete.
swinstall(1M) swinstall(1M) as long as the preceding value. A value of 5 is about 30 seconds for the ncadg_ip_udp protocol sequence. This option may not have any noticeable impact when using the ncacn_ip_tcp protocol sequence. run_as_superuser=true This option controls SD’s nonprivileged mode. This option is ignored (treated as true) when the invoking user is super-user.
swinstall(1M) swinstall(1M) above). If there is more than one target selection, they must be separated by spaces. uncompress_files=false (Applies only to swcopy .) If set to true , files being transferred from a source are uncompressed before swcopy store them on the target depot. use_alternate_source=false Empowers each target agent to use its own, configured alternate source, instead of the one specified by the user.
swinstall(1M) swinstall(1M) The swinstall and swcopy interactive user interfaces read a default list of patch filters that you can use as selection criteria for patch software. The list is stored in: /var/adm/sw/defaults.patchfilters the system-wide default list of patch filters. $HOME/.sw/defaults.patchfilters the user-specific default list of patch filters. The list of patch filters is enclosed in braces {} and separated by white space (blank, tab, or newline). For example: swinstall.
swinstall(1M) SW_PATH swinstall(1M) A PATH variable which defines a minimum set of commands available to for use in a control script (for example, /sbin:/usr/bin). SW_ROOT_DIRECTORY Defines the root directory in which the session is operating, either "/" or an alternate root directory. This variable tells control scripts the root directory in which the products are installed. A script must use this directory as a prefix to SW_LOCATION to locate the product’s installed files.
swinstall(1M) swinstall(1M) The agent ignores SIGHUP, SIGINT, and SIGQUIT. It immediately exits gracefully after receiving SIGTERM, SIGUSR1, or SIGUSR2. Killing the agent may leave corrupt software on the system, and thus should only be done if absolutely necessary. Note that when an SD command is killed, the agent does not terminate until completing the task in progress. The daemon ignores SIGHUP, SIGINT and SIGQUIT. It immediately exits gracefully after receiving SIGTERM and SIGUSR2.
swinstall(1M) swinstall(1M) /var/adm/sw/swinstall.log (/var/adm/sw/swcopy.log). Similar messages are logged by an interactive swinstall and swcopy session. The user can specify a different logfile by modifying the logfile option. Target Log A swagent process performs the actual install or copy operation at each target_selection. For install tasks, the swagent logs messages to the file var/adm/sw/swagent.log beneath the root directory (for example, / or an alternate root directory).
swinstall(1M) swinstall(1M) catalog: swinstall -s swposix:/tmp/sample.depot.1 -c /tmp/bar.depot \ -x ask=true \* Install all products in remote depot /tmp/sample.depot.1 on host swposix , use response files, run request scripts only when a response file is absent, create catalog /tmp/bar.depot and copy all response files to the new catalog: swinstall -s swposix:/tmp/sample.depot.1 -c swposix:/tmp/bar.
swinstall(1M) swinstall(1M) /var/adm/sw/defaults.hosts Contains the system-wide default list of hosts to manage. /var/adm/sw/defaults.patchfilters Contains the system-wide default list of patch filters. /var/adm/sw/getdate.templ Contains the set of date/time templates used when scheduling jobs. /var/adm/sw/products/ The Installed Products Database (IPD), a catalog of all products installed on a system.
swjob(1M) swjob(1M) NAME swjob, sd - display and monitor job information, create and remove jobs; invoke graphical user interface to display and monitor job information and create and remove jobs, respectively SYNOPSIS swjob [-i] [-R] [-u] [-v] [-a attribute ] [-C session_file ] [-f jobid_file ] [-S session_file ] [-t target_file ] [-x option=value ] [-X option_file ] [jobid(s)] [@ target_selections ] sd [XToolkit Options] [-x option=value ] [-X option_file ] Remarks • The sd command invokes an interacti
swjob(1M) swjob(1M) XToolKit Options The sd command supports a subset of the standard XToolkit options to control the appearance of the system GUI. The supported options are: -bg , -background , -fg, -foreground , -display , -name , -xrm , and -synchronous . See the X(1) man page by typing man X for a definition of these options. -i Runs the command in interactive mode (invokes the GUI.) (Using this option is an alias for the sd command.
swjob(1M) swjob(1M) The optional command_name prefix denotes one of the SD commands. Using the prefix limits the change in the default value to that command. If you leave the prefix off, the change applies to all commands. You can also override default values from the command line with the -x or -X options: command -x option =value command -X option_file The following section lists all of the keywords supported by the swjob command. If a default value exists, it is listed after the =.
swjob(1M) swjob(1M) the invoking user is super-user. When set to the default value of true, SD operations are performed normally, with permissions for operations either granted to a local super-user or set by SD ACLs. (See swacl(1M) for details on ACLs.) When set to false and the invoking user is local and is not super-user, nonprivileged mode is invoked: • Permissions for operations are based on the user’s file system permissions. • SD ACLs are ignored.
swjob(1M) LC_ALL swjob(1M) Determines the locale to be used to override any values for locale categories specified by the settings of LANG or any environment variables beginning with LC_ . LC_CTYPE Determines the interpretation of sequences of bytes of text data as characters (for example, single versus multibyte characters in values for vendor-defined attributes). LC_MESSAGES Determines the language in which messages should be written.
swjob(1M) swjob(1M) Logging The swjob command does not log summary events. It logs events about each read task to the swagent logfile associated with each target_selection. swagentd Disabled If the swagentd daemon has been disabled on the host, it can be enabled by the host’s system administrator by setting the SW_ENABLE_SWAGENTD entry in /etc/rc.config.d/swconfig to 1 and executing /usr/sbin/swagentd -r .
swlist(1M) swlist(1M) NAME swlist - display information about software products SYNOPSIS swlist [-d|-r] [-i] [-R] [-v] [-a attribute ] [-C session_file ] [-f software_file ] [-l level] [-s source ] [-S session_file ] [-t target_file ] [-x option=value ] [-X option_file ] [software_selections] [@ target_selections] Remarks • This command supports operation on remote systems. See Operations on Remote Systems below.
swlist(1M) swlist(1M) swlist -d -a readme -l product SW-DIST @ hostA:/depot11 Options When no options or operands are specified, swlist lists the software bundles (and products which are not part of a bundle) that are installed at the local host. swlist supports the following options: -d -i List software available from a depot (instead of software installed on a root filesystem). -r Operates on an alternate root directory, which must be specified in the @ target_selections option.
swlist(1M) swlist(1M) -t target_file Read the list of target_selections from target_file instead of (or in addition to) the command line. -x option=value Set the session option to value and override the default value (or a value in an alternate option_file specified with the -X option). Multiple -x options can be specified. -X option_file Read the session options and behaviors from option_file. Operands swlist supports two types of operands: software selections followed by target selections.
swlist(1M) swlist(1M) within the context of an exported catalog, where instance_id is an integer that distinguishes versions of products and bundles with the same tag. Target Selections swlist supports this syntax for each target_selection. [host ][:][/directory ] The colon (:) is required if both a host and directory are specified.
swlist(1M) swlist(1M) codeword= Provides the "codeword" needed to unlock protected HP CD-ROM software. Some HP software products are shipped on CD-ROM as "protected" products. That is, they cannot be installed or copied unless a "codeword" and "customer ID" are provided. The codeword is found on the CD-ROM certificate which you received from HP. You may use this default specification on the command line or the SD-UX interactive user interface to enter the codeword.
swlist(1M) swlist(1M) writing distributions and swlist output. Supported values are "1.0" (default) and "0.8". SD object and attribute syntax conforms to the layout_version 1.0 specification of the IEEE POSIX 1387.2 Software Administration standard. SD commands still accept the keyword names associated with the older layout version, but you should use layout_version=0.8 only to create distributions readable by older versions of SD.
swlist(1M) swlist(1M) When set to false and the invoking user is local and is not super-user, nonprivileged mode is invoked: • Permissions for operations are based on the user’s file system permissions. • SD ACLs are ignored. • Files created by SD have the uid and gid of the invoking user, and the mode of created files is set according to the invoking user’s umask. SD’s nonprivileged mode is intended only for managing applications that are specially designed and packaged.
swlist(1M) swlist(1M) Environment Variables The environment variables that affect the swlist command are: LANG Determines the language in which messages are displayed. If LANG is not specified or is set to the empty string, a default value of C is used. See lang(5) for more information. NOTE: The language in which the SD agent and daemon log messages are displayed is set by the system configuration variable script, /etc/rc.config.d/LANG. For example, /etc/rc.config.d/LANG, must be set to LANG=ja_JP.
swlist(1M) swlist(1M) the level of objects in the software_selections. For example, if you want to list specific product selections but not their contents, use -l product . If you want to list specific fileset selections but not their contained files, use -l fileset . The software_selection options only apply if the level is bundle, product, subproduct, fileset, file, or patch. Depot Listing Another class of objects that swlist can display are software depots.
swlist(1M) swlist(1M) swlist -i @ host1 Use interactive swlist to view a depot: swlist -i -d @ /tmp/depot List all of the products installed on the local host: swlist Generate a comprehensive listing that includes all filesets for the product NETWORKING: swlist -v -l fileset NETWORKING List all the attributes for the ARPA-RUN fileset: swlist -v NETWORKING.ARPA.
swlist(1M) swlist(1M) swlist -l patch BogusProduct Output: BogusProduct BogusProduct.FakeFS PHZX-0004.FakeFS PHZX-3452.FakeFS 1.0 This is a Bogus Product Fake fileset Patch for defect X superseded Patch for defect Y applied Another example showing just the patch: swlist -l patch PHZX-0004 Output: PHZX-0004 PHZX-0004.FakeFS 1.0 Patch product Patch for defect X superseded FILES $HOME/.swdefaults Contains the user-specific default values for some or all SD options. $HOME/.
swmodify(1M) swmodify(1M) NAME swmodify - modify software products in a target root or depot SYNOPSIS swmodify [-d|-r] [-p] [-u] [-v] [-V] [-a attribute=[value]] [-c catalog ] [-C session_file ] [-f software_file ] [-P pathname_file ] [-s product_specification_file| [-S session_file ] [-x option=value ] [-X option_file ] [software_selections] [@ target_selection] Remarks For an overview of all SD commands, see the sd(5) man page by typing man 5 sd on the command line.
swmodify(1M) swmodify(1M) -a attribute[=value] Add, modify, or delete the value of the given attribute. If the -u option is specified, then delete the attribute from the given software_selections (or delete the value from the set of values currently defined for the attribute). Otherwise add/modify the attribute for each software_selection by setting it to the given value. Multiple -a options can be specified. Each attribute modification will be applied to every software_selection.
swmodify(1M) swmodify(1M) [ ], *, ? • Bundles and subproducts are recursive. Bundles can contain other bundles and subproducts can contain other subproducts. • The \* software specification selects all products. Use this specification with caution.
swmodify(1M) swmodify(1M) The optional command_name prefix denotes one of the SD commands. Using the prefix limits the change in the default value to that command. If you leave the prefix off, the change applies to all commands. You can also override default values from the command line with the -x or -X options: command -x option =value command -X option_file The following keywords are supported by swmodify . If a default value exists, it is listed after the =.
swmodify(1M) swmodify(1M) control_files= When adding or deleting control file objects, this option lists the tags of those control files. There is no supplied default. If there is more than one tag, they must be separated by white space and surrounded by quotes. distribution_target_directory=/var/spool/sw Defines the default distribution directory of the target depot. The target_selection operand overrides this default.
swmodify(1M) swmodify(1M) A value of: 0 provides no information to the log files. 1 enables verbose logging to the log files. 2 enables very verbose logging to the log files. To enable logging by swmodify commands invoked by control files, add the following line to the system defaults file: swmodify.loglevel=1 patch_commit=false Commits a patch by removing files saved for patch rollback.
swmodify(1M) swmodify(1M) You can also save session information to a specific file by executing swmodify with the -C session__file option. A session file uses the same syntax as the defaults files. You can specify an absolute path for the session file. If you do not specify a directory, the default location for a session file is $HOME/.sw/sessions/. To re-execute a session file, specify the session file as the argument for the -S session__file option of swmodify .
swmodify(1M) swmodify(1M) Logfile The swmodify command logs events to the command logfile and to the swmodify logfile associated with each target_selection. Command Log The swmodify command logs all messages to the the logfile /var/adm/sw/swmodify.log. (The user can specify a different logfile by modifying the logfile option.) Target Log When swmodify logs messages to the file modifying installed software, var/adm/sw/swagent.log beneath the root directory (for example, / or an alternate root directory).
swmodify(1M) swmodify(1M) /var/adm/sw/defaults Contains the active system-wide default values for some or all SD options. /var/adm/sw/products/ The Installed Products Database (IPD), a catalog of all products installed on a system. /var/spool/sw/ The default location of a target software depot. AUTHOR swmodify was developed by the Hewlett-Packard Company.
swpackage(1M) swpackage(1M) NAME swpackage - package software products into a target depot or tape SYNOPSIS swpackage [-p] [-v] [-V] [-C session_file ] [-d directory|device ] [-f software_file ] [-s product_specification_file|directory ] [-S session_file ] [-x option=value ] [-X option_file ] [software_selections] [@ directory|device] Remarks • For a description of the Product Specification File (PSF) used as input to the swpackage command, see the swpackage(4) man page by typing man 4 swpackage on the c
swpackage(1M) swpackage(1M) with the older layout version 0.8, but you should use the older version only to create distributions readable by older versions of SD. Which layout_version the SD commands write is controlled by the layout_version option or by specifying the layout_version attribute in the PSF file. See sd(4), the description of the layout_version option in the following section and in sd(5) for more information. See sd(4) for more information on PSF files.
swpackage(1M) swpackage(1M) product[.subproduct][.fileset][,version ] • The = (equals) relational operator lets you specify selections with the following shell wildcard and pattern-matching notations: • Bundles and subproducts are recursive. Bundles can contain other bundles and subproducts can contain other subproducts. • The \* software specification selects all products. Use this specification with caution.
swpackage(1M) swpackage(1M) $HOME/.swdefaults the user-specific default values. Values must be specified in the defaults file using this syntax: [command_name.]option=value The optional command_name prefix denotes one of the SD commands. You can also override default values from the command line with the -x or -X options: command -x option =value command -X option_file The following section lists all of the keywords supported by swpackage and swcopy .
swpackage(1M) swpackage(1M) compress_cmd=/usr/contrib/bin/gzip Defines the command called to compress files before installing, copying or packaging. If the compression_type option is set to other than gzip or compress , this path must be changed. compress_files=false If set to true , uncompressed files are compressed before transfer from a source.
swpackage(1M) swpackage(1M) the packaged products. A value of true for this keyword causes swpackage to follow symbolic links in the package source files and include the files they reference in the packaged products. include_file_revisions=false Do not include each source file’s revision attribute in the products being packaged. Because this operation is time consuming, by default the revision attributes are not included.
swpackage(1M) swpackage(1M) products in the target depot. If set to true , swpackage removes obsolete filesets from the target products that were written to during the package process. Removal occurs after the packaging is complete. Filesets are defined as obsolete if they were not part of the most recent packaging of the product into the depot or during the current packaging of the product defined in the source psf.
swpackage(1M) swpackage(1M) compression_type of the file is gzip then the internal uncompression (funzip ) is used instead of the external uncompress_cmd. verbose= Controls the verbosity of a non-interactive command’s output: 0 disables output to stdout. (Error and warning messages are always written to stderr). 1 enables verbose messaging to stdout. 2 for swpackage and swmodify , enables very verbose messaging to stdout. The -v option overrides this default if it is set to 0. Applies to all commands.
swpackage(1M) swpackage(1M) The agent ignores SIGHUP, SIGINT, and SIGQUIT. It immediately exits gracefully after receiving SIGTERM, SIGUSR1, or SIGUSR2. Killing the agent may leave corrupt software on the system, and thus should only be done if absolutely necessary. Note that when an SD command is killed, the agent does not terminate until completing the task in progress. The daemon ignores SIGHUP, SIGINT and SIGQUIT. It immediately exits gracefully after receiving SIGTERM and SIGUSR2.
swpackage(1M) 0 1 swpackage(1M) The products specified in the product_specification_file were successfully packaged into the target depot/tape. An error occurred during the swpackage session (for example, bad syntax in the product_specification_file.) Review stderr or the log file for details. DIAGNOSTICS The swpackage command writes to stdout, stderr, and to the logfile. Standard Output The swpackage command writes messages for significant events.
swpackage(1M) swpackage(1M) SEE ALSO sd(4), swpackage(4), sd(5). Software Distributor Administration Guide, available at http://docs.hp.com. SD customer web site at http://docs.hp.com/en/SD/.
swreg(1M) swreg(1M) NAME swreg - register or unregister depots and roots SYNOPSIS swreg -l level [-u] [-v] [-C session_file] [-f object_file] [-S session_file] [-t target_file] [-x option=value] [-X option_file] [objects_to_(un)register] [@ target_selections] Remarks • This command supports operations on remote systems. See Remote Operation below. • For an overview of all SD commands, see the sd(5) man page by typing man 5 sd on the command line.
swreg(1M) swreg(1M) Causes swreg to unregister the specified objects instead of registering them. -u -v Turns on verbose output to stdout. (The swreg logfile is not affected by this option.) Verbose output is enabled by default, see the verbose option below. -C session_file Save the current options and operands to session_file. You can enter a relative or absolute path with the file name. The default directory for session files is $HOME/.sw/sessions/. You can recall a session file with the -S option.
swreg(1M) swreg(1M) • If you set the value of this option to HOME/ path, SD replaces HOME with the invoking user’s home directory (from the system password file) and resolves path relative to that directory. For example, HOME/my_admin resolves to the my_admin directory in your home directory. SD’s nonprivileged mode is intended only for managing applications that are specially designed and packaged. This mode cannot be used to manage the HP-UX operating system or patches to it.
swreg(1M) swreg(1M) ncadg_ip_udp protocol sequence. This option may not have any noticeable impact when using the ncacn_ip_tcp protocol sequence. run_as_superuser=true This option controls SD’s nonprivileged mode. This option is ignored (treated as true) when the invoking user is super-user. When set to the default value of true, SD operations are performed normally, with permissions for operations either granted to a local super-user or set by SD ACLs. (See swacl(1M) for details on ACLs.
swreg(1M) swreg(1M) The environment variables that affect the swreg command are: LANG Determines the language in which messages are displayed. If LANG is not specified or is set to the empty string, a default value of C is used. See the lang(5) man pages by typing man 5 lang for more information. NOTE: The language in which the SD agent and daemon log messages are displayed is set by the system configuration variable script, /etc/rc.config.d/LANG. For example, /etc/rc.config.
swreg(1M) swreg(1M) swreg -u -l depot /var/spool/sw @ hostA hostB hostC Unregister a specific depot at the local host: swreg -u -l depot /cdrom FILES $HOME/.swdefaults Contains the user-specific default values for some or all SD options. /usr/lib/sw/sys.defaults Contains the master list of current SD options with their default values. /var/adm/sw/ The directory which contains all of the configurable and non-configurable data for SD. This directory is also the default location of logfiles.
swremove(1M) swremove(1M) NAME swremove - unconfigure and remove software products SYNOPSIS swremove [XToolkit Options] [-d|-r] [-i] [-p] [-v] [-C session_file] [-f software_file] [-J jobid] [-Q date] [-S session_file] [-t target_file] [-x option=value] [-X option_file] [software_selections] [@ target_selections] Remarks • swremove supports an interactive user interface (GUI) that can be invoked alone or by the sd command. See Interactive Operation below.
swremove(1M) swremove(1M) If you have enabled SD’s central management features, swinstall , swcopy , and swremove provide enhanced GUIs to support operations on remote machines. See Remote Operations above. Removing Patches or Patch Rollback Files To remove patch software, rollback files corresponding to the patch must be available for rollback. You must remove the base software modified by the patch. (Removing the base software also removes the patches associated with that software.
swremove(1M) swremove(1M) -J jobid Executes a previously scheduled job. This is the syntax used by the daemon to start the job. -Q date Schedules a job for the specified date. You can change the date format by modifying the file /var/adm/sw/getdate.templ. -S session_file Execute swremove based on the options and operands saved from a previous session, as defined in session_file. You can save session information to a file with the -C option.
swremove(1M) swremove(1M) For example, r>=B.10.00 chooses all revisions greater than or equal to B.10.00 . The system compares each dot-separated field to find matches. Shell patterns are not allowed with these operators. • The = (equals) relational operator lets you specify selections with the shell wildcard and patternmatching notations: [ ], *, ?, ! For example, the expression r=1[01].* returns any revision in version 10 or version 11.
swremove(1M) swremove(1M) your home directory. • If you set the value of the installed_software_catalog default option to a relative path, that path is resolved relative to the value of this option. SD’s nonprivileged mode is intended only for managing applications that are specially designed and packaged. This mode cannot be used to manage the HP-UX operating system or patches to it.
swremove(1M) swremove(1M) autoselect_reference_bundles=true If true , bundles that have the is_sticky attribute set to true will be automatically removed when the last of its contents is removed. If false , the sticky bundles will not be automatically removed. compress_index=false Determines whether SD commands create compressed INDEX and INFO catalog files when writing to target depots or roots. The default of false does not create compressed files.
swremove(1M) swremove(1M) See also the admin_directory and run_as_superuser options, which control SD’s nonprivileged mode. (This mode is intended only for managing applications that are specially designed and packaged. This mode cannot be used to manage the HP-UX operating system or patches to it. For a full explanation of nonprivileged SD, see the Software Distributor Administration Guide, available at the http://docs.hp.com web site.) job_title= Specifies an ASCII string giving a title to a job.
swremove(1M) swremove(1M) rpc_binding_info=ncacn_ip_tcp:[2121] ncadg_ip_udp:[2121] Defines the protocol sequence(s) and endpoint(s) on which the daemon listens and the other commands contact the daemon. If the connection fails for one protocol sequence, the next is attempted. SD supports both the tcp (ncacn_ip_tcp:[2121]) and udp (ncadg_ip_udp:[2121]) protocol sequence on most platforms. See the sd(5) manual page (type man 5 sd ) for more information.
swremove(1M) swremove(1M) 1 enables verbose messaging to stdout. write_remote_files=false Prevents the removal of files from a remote (NFS) file system. When set to false , files on a remote file system are not removed. If set to true and if the superuser has write permission on the remote file system, the remote files are removed. Session File Each invocation of swremove defines a task session.
swremove(1M) swremove(1M) LC_CTYPE Determines the interpretation of sequences of bytes of text data as characters (for example, single versus multibyte characters in values for vendor-defined attributes). LC_MESSAGES Determines the language in which messages should be written. LC_TIME Determines the format of dates (create_date and mod_date) when displayed by swlist . Used by all utilities when displaying dates and times in stdout , stderr , and logging .
swremove(1M) swremove(1M) SW_SESSION_IS_KERNEL Indicates whether a kernel build is scheduled for the current install/remove session. A TRUE value indicates that the selected kernel fileset is scheduled for a kernel build and that changes to /stand/system are required. A null value indicates that a kernel build is not scheduled and that changes to /stand/system are not required. The value of this variable is always equal to the value of SW_SESSION_IS_REBOOT.
swremove(1M) swremove(1M) Logging Both interactive and non-interactive swremove sessions log summary events at the host where the command was invoked. They log detailed events to the swagent logfile associated with each target_selection. Command Log A non-interactive swremove session logs all stdout and stderr messages to the the logfile /var/adm/sw/swremove.log. Similar messages are logged by an interactive swremove session. The user can specify a different logfile by modifying the logfile option.
swremove(1M) swremove(1M) AUTHOR swremove was developed by the Hewlett-Packard Company. SEE ALSO install-sd(1M), swacl(1M), swagentd(1M), swask(1M), swconfig(1M), swcopy(1M), swinstall(1M), swjob(1M), swlist(1M), swmodify(1M), swpackage(1M), swreg(1M), swverify(1M), sd(4), swpackage(4), sd(5). Software Distributor Administration Guide, available at http://docs.hp.com. SD customer web site at http://docs.hp.com/en/SD/.
swverify(1M) swverify(1M) NAME swverify - verify software products SYNOPSIS swverify [-d|-r] [-F] [-v] [-C session_file] [-f software_file] [-J jobid] [-Q date] [-S session_file] [-t target_file] [-x option=value] [-X option_file] [software_selections] [@ target_selections] Remarks • This command supports operations on remote systems. See Remote Operation below. • For an overview of all SD commands, see the sd(5) man page by typing man 5 sd on the command line.
swverify(1M) swverify(1M) Options swverify supports the following options: -d Operate on a depot rather than installed software. -F Runs vendor-specific fix scripts to correct and report problems on installed software. The fix script can create missing directories, correct file modifications (mode, owner, group, major, and minor), and recreate symbolic links. -r Operates on an alternate root directory, which must be specified in the @ target_selections option.
swverify(1M) swverify(1M) [,r revision][,a arch][,v vendor] [,c category ][,q= qualifier][,l= location] [,fr revision][,fa arch] • location applies only to installed software and refers to software installed to a location other than the default product directory. • fr and fa apply only to filesets. • r , a , v , c , and l apply only to bundles and products. They are applied to the leftmost bundle or product in a software specification.
swverify(1M) swverify(1M) admin_directory=/var/home/LOGNAME/sw (for nonprivileged mode) The location for SD logfiles and the default parent directory for the installed software catalog. The default value is /var/adm/sw for normal SD operations. When SD operates in nonprivileged mode (that is, when the run_as_superuser default option is set to true ): • The default value is forced to /var/home/LOGNAME/sw.
swverify(1M) swverify(1M) requisite is explicitly selected by the user. When set to true , the first left-most dependency in a list of OR dependencies that satisfies a requisite is not automatically selected when another dependency in the list that also satisfies the requisite is explicitly selected.
swverify(1M) swverify(1M) enforce_locatable=true (Currently, swverify recognizes this option, but the option has no associated behavior. See swinstall(1M) or sd(5) for more information.) Controls the handling of errors when relocating a non-locatable fileset. If true , an error is generated when an attempt is made to locate a non-locatable fileset. If false , an attempt is made to locate the fileset in any case.
swverify(1M) swverify(1M) mount_all_filesystems=true By default, the SD commands attempt to mount all filesystems in the /etc/fstab file at the beginning of the analysis phase, to ensure that all listed filesystems are mounted before proceeding. This policy helps to ensure that files are not loaded into a directory that may be below a future mount point, and that the expected files are available for a remove or verify operation.
swverify(1M) swverify(1M) for swpackage and swmodify , enables very verbose messaging to stdout. 2 The -v option overrides this default if it is set to 0. Session File Each invocation of the swverify command defines a verify session. The invocation options, source information, software selections, and target hosts are saved before the installation or copy task actually commences. This lets you re-execute the command even if the session ends before proper completion.
swverify(1M) swverify(1M) control_file with a name other than its tag and lets you use multiple control file definitions to point to the same file. A control_file can query the SW_CONTROL_TAG variable to determine which tag is being executed. SW_LOCATION Defines the location of the product, which may have been changed from the default product directory. When combined with the SW_ROOT_DIRECTORY, this variable tells scripts where the product files are located.
swverify(1M) swverify(1M) Standard Error The swverify command also writes messages for all WARNING and ERROR conditions to stderr. Logging The swverify command logs summary events at the host where the command was invoked. It logs detailed events to the swagent logfile associated with each target_selection. Command Log The swverify command logs all stdout and stderr messages to the the logfile /var/adm/sw/swverify.log. (The user can specify a different logfile by modifying the logfile option.
swverify(1M) swverify(1M) AUTHOR swverify was developed by the Hewlett-Packard Company. SEE ALSO install-sd(1M), swacl(1M), swagentd(1M), swask(1M), swconfig(1M), swcopy(1M), swinstall(1M), swjob(1M), swlist(1M), swmodify(1M), swpackage(1M), swreg(1M), swremove(1M), sd(4), swpackage(4), sd(5). Software Distributor Administration Guide, available at http://docs.hp.com. SD customer web site at http://docs.hp.com/en/SD/.
sync(1M) sync(1M) NAME sync - synchronize file systems SYNOPSIS sync [-l] DESCRIPTION sync executes the sync() system call (see sync(2)). If the system is to be stopped, the sync command must be called to ensure file system integrity. sync flushes all previously unwritten system buffers including modified super blocks, modified inodes, and delayed block I/O out to disk. This ensures that all file modifications are properly saved before performing a critical operation such as a system shutdown.
syncer(1M) syncer(1M) NAME syncer - periodically sync for file system integrity SYNOPSIS /usr/sbin/syncer [ seconds ] [-s] [-d directory ... ] DESCRIPTION syncer is a program that periodically executes sync() at an interval determined by the input argument seconds (see sync(2)). If seconds is not specified, the default interval is every 30 seconds. This ensures that the file system is fairly up-to-date in case of a crash.
sysdef(1M) sysdef(1M) (TO BE OBSOLETED) NAME sysdef - display system definition SYNOPSIS /usr/sbin/sysdef [kernel [master] ] DESCRIPTION Note: sysdef will not be supported in future releases of HP-UX (refer to WARNINGS section below). So users are advised to use the kctune(1M) utility which provides additional information on kernel tunable parameters. The command sysdef analyzes the currently running system and reports on its tunable configuration parameters.
syslogd(1M) syslogd(1M) NAME syslogd - log system messages SYNOPSIS /usr/sbin/syslogd [-a] [-d] [-D] [-f configfile] [-m markinterval] [-N] [-p logfile] [-r] [-s] [-v] DESCRIPTION The syslogd command reads and logs messages into a set of files described by the configuration file /etc/syslog.conf. Options syslogd recognizes the following options: -a Allows all messages except consecutive duplicate messages without reordering them. -d -D Turn on debugging.
syslogd(1M) syslogd(1M) syslogd configures itself when it starts up and whenever it receives a hangup signal. Lines in the configuration file consist of a selector to determine the message priorities to which the line applies and an action. The action field is separated from the selector by one or more tabs. Selectors are semicolon separated lists of priority specifiers.
syslogd(1M) syslogd(1M) However, be careful when configuring syslogd , so that messages from different locales do not get logged to the same log file. WARNINGS A configuration file selector selects all messages at the specified level or higher. The configuration lines: user.debug user.info /tmp/logfile /tmp/logfile cause the logfile to get two copies of all user messages at level info and above. Kernel panic messages are not sent to syslogd .
talkd(1M) talkd(1M) NAME talkd - remote user communication server SYNOPSIS talkd DESCRIPTION Talkd is the server that notifies a user that someone wants to initiate a conversation. It acts as a repository of invitations, responding to requests by clients wishing to initiate a conversation. To initiate a conversation, the client (the talk command) sends a message of type LOOK_UP to the server (see /usr/include/protocols/talkd.h).
tcpd(1M) tcpd(1M) NAME tcpd - access control facility for internet services DESCRIPTION The tcpd program can be set up to monitor the incoming requests for telnet , finger , ftp , exec , rsh , rlogin , tftp , talk , and other services that have a one-to-one mapping onto executable files. The program supports both 4.3BSD-style sockets and System V.4-style TLI. The functionality may be limited when the protocol underneath TLI is not an internet protocol.
tcpd(1M) tcpd(1M) Example 1 Move the original daemon to the /usr/lbin/wrapper directory and install tcpd in place of the original daemon. No changes are required to the inetd configuration file, /etc/inetd.conf.
telnetd(1M) telnetd(1M) NAME telnetd - TELNET protocol server SYNOPSIS /usr/lbin/telnetd [-A ] [-a [-TCP_DELAY ] authmode] [-b [bannerfile] ] [-e] [-f] [-n] [-s] [-t] [-y] [-z] DESCRIPTION The telnetd daemon executes a server that supports the DARPA standard TELNET virtual terminal protocol. The Internet daemon (inetd ) executes telnetd when it receives a service request at the port listed in the services database for telnet using the tcp protocol (see inetd(1M) and services (4)).
telnetd(1M) telnetd(1M) Options telnetd has the following options. -b [bannerfile] Specify a file containing a custom banner. This option overrides the standard telnetd login banner. For example, to use /etc/issue as the login banner, have inetd start telnetd with the following lines in /etc/inetd.conf (\ provides line continuation): -e -n telnet stream tcp nowait root /usr/lbin/telnetd \ telnetd -b/etc/issue To work in the IPv6 environment, the entry in /etc/inetd.
telnetd(1M) telnetd(1M) system may telnet directly to any participating system without being prompted for another login. -y Set the behavior for stty 0 to instruct telnetd to close the connection on the shell command stty 0 or whenever the telnet client communicates with telnetd to arrive upon 0 baud rate for TELOPT_TERMSPEED. -z This option allows users to set the BUFFERTIMEOUT value.
telnetd(1M) telnetd(1M) DIAGNOSTICS If any error is encountered by telnetd in establishing the connection, an error message is returned through the connection, after which the connection is closed and the server exits. Any errors generated by the login process or its descendents are passed through as ordinary data. The following diagnostic messages are displayed by telnetd : unable to allocate Telnet device The server was unable to obtain a Telnet pseudo-terminal for use with the login process.
tftpd(1M) tftpd(1M) NAME tftpd - trivial file transfer protocol server SYNOPSIS /usr/lbin/tftpd [-l ] [-R retran-seconds] [-r blksize |timeout |tsize ] [-s] [-T total-seconds] [path ...] DESCRIPTION tftpd is a server that supports the Internet Trivial File Transfer Protocol (RFC783). The TFTP server operates at the port indicated in the tftp service description (see services (4)). The server is normally started by inetd using the /etc/inetd.conf file (see inetd(1M) and inetd.conf(4)).
tftpd(1M) tftpd(1M) name can be found in both locations, tftpd accesses the one under tftp ’s home directory. Note that inetd allows continuation of command lines in inetd.conf by ending continued lines with a backlash. Defining the tftp pseudo-user is strongly recommended even when paths are specified, because client access is further restricted to files that can be read and/or written by this pseudo-user. It is safe to set the tftp pseudo-user’s home directory to / in this case.
tic(1M) tic(1M) NAME tic - terminfo compiler SYNOPSIS tic [-v [n]] [-c] file ... DESCRIPTION tic translates terminfo files from source format into the compiled format. Results are placed in the directory /usr/share/lib/terminfo. -vn Specifies that (verbose) output be written to standard error trace information showing tic’s progress. The optional integer n is a number from 1 to 10, inclusive, indicating the desired level of detail of information. If n is omitted, the default level is 1.
tsm.lpadmin(1M) tsm.lpadmin(1M) NAME tsm.lpadmin - add or remove a printer for use with tsm SYNOPSIS /usr/tsm/bin/tsm.lpadmin -p printer -m model /usr/tsm/bin/tsm.lpadmin -x printer DESCRIPTION tsm.lpadmin is used to add (or remove) a printer to (or from) the LP spooling system when the printer is connected to the system through a terminal running the Terminal Session Manager (see tsm(1)). tsm.
ttsyncd(1M) ttsyncd(1M) NAME ttsyncd - daemon to maintain the nis+ password table in sync with the nis+ trusted table SYNOPSIS /usr/lbin/ttsyncd [-D] [-v] [-t synchour] [-i interval] DESCRIPTION ttsyncd checks that each login name in the nis+ password (passwd ) table appears in the nis+ trusted table. It will create a user entry in the trusted table for every user that exists in the password table and NOT in the trusted table.
ttsyncd(1M) ttsyncd(1M) DEPENDENCIES NIS+ (Network Information Name Service) ttsyncd requires NIS+ to be configured and running. It should be run only on an nis+ server. Moreover, ttsyncd will self-terminate if the password table does not exist. AUTHOR ttsyncd was developed by Hewlett Packard. FILES /etc/rc.config.d/comsec /etc/sbin/init.d/comsec SEE ALSO getprpwent(3).
tunefs(1M) tunefs(1M) NAME tunefs - tune up an existing HFS file system SYNOPSIS /usr/sbin/tunefs [-A] [-v] [-a maxcontig ] [-d rotdelay ] [-e maxbpg ] [-m minfree ] [-r advanced read-ahead ] special-device DESCRIPTION The tunefs command is used to alter dynamic parameters that affect HFS file system layout policies. Parameters to be altered are specified by the options and arguments provided on the command line as described below. tunefs affects how the file system blocks are laid out on the disk.
tunefs(1M) tunefs(1M) AUTHOR tunefs was developed by the University of California, Berkeley. SEE ALSO dumpfs(1M), mkfs(1M), newfs(1M).
udpublickey(1M) udpublickey(1M) NAME udpublickey - update the publickey database file and the NIS map SYNOPSIS udpublickey Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same. DESCRIPTION udpublickey is executed from the updaters(1M) makefile when either newkey or rpc.ypupdated updates the /etc/publickey database file. udpublickey receives the following information from newkey or rpc.
untic(1M) untic(1M) NAME untic - terminfo de-compiler SYNOPSIS untic [term] [-f file] DESCRIPTION untic translates a terminfo file from the compiled format into the source format. If the environment variable TERMINFO is set to a path name, untic checks for a compiled terminfo description of the terminal under the path specified by TERMINFO before checking /usr/share/lib/terminfo. Otherwise, only /usr/share/lib/terminfo is checked.
update-ux(1M) update-ux(1M) NAME update-ux - updates the HP-UX operating system from new HP-UX media SYNOPSIS update-ux -s source_location [-?] [-n|-y] [-i] [-x option=value] [-f software_file] [sw_spec] DESCRIPTION The update-ux command updates the HP-UX operating system to a newer version. Use update-ux when updating the operating system (OS), and installing or changing operating environments (OEs). update-ux works only with source depots containing the OS and OEs such as HP-UX 11i OE DVDs.
update-ux(1M) update-ux(1M) -? -n|-y Print the usage statement. -i Start the swinstall interactive interface. For more information, see the swinstall(1M) manpage. -x option =value Set swinstall options. swinstall -p (preview) is not supported. For more information, see the swinstall(1M) manpage. -f software_file By default, update-ux pauses when an error is detected to ask if it should continue. Specify "no" (-n ) or "yes" (-y ) to tell update-ux whether to continue when a error message is issued.
updaters(1M) updaters(1M) NAME updaters - configuration file for NIS updating SYNOPSIS updaters Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality of the two remains the same; only the name has changed. DESCRIPTION updaters is a makefile used for updating the Network Information Service (NIS) databases. Databases can be updated only if the network is secure, that is, only if there is a NIS publickey database ( publickey.byname).
ups_mond(1M) ups_mond(1M) NAME ups_mond - HP PowerTrust Uninterruptible Power System monitor daemon SYNOPSIS /usr/lbin/ups_mond [-f configfile ] [-s ] [-t ] DESCRIPTION When it detects a loss of AC power for a period of time exceeding a configured limit, ups_mond ensures file system integrity by shutting down HP-UX.
ups_mond(1M) ups_mond(1M) Messages resulting in exit of daemon: usage: ups_mond [-f configfile]. cannot exec /usr/lbin/ups_mond -f -e ups_monchild due to . permission denied; must be superuser. exiting; unable to lock process in memory: . aborted, configfile open received error: . aborted, configfile fseek error: . aborted, malloc error: . terminated by signal .
ups_mond(1M) ups_mond(1M) UPS line too noisy; ignoring that UPS. UPS could not enable; loss of power would not be detectable. UPS read failed: ; Uninterruptible Power Supply has not been connected correctly; loss of power would not be detectable. UPS write failed: ; ignoring that UPS. UPS read of status received ILLEGAL CMD or NOISY LINE.
ups_mond(1M) ups_mond(1M) Timer Controlled On/Off information invalid; ignored. mknod error: for Timed On/Off fifo file /var/tmp/timed_off; continuing without. open error: for Timed On/Off fifo file /var/tmp/timed_off; continuing without. Timer Controlled On value exceeds UPS maximum. The maximum value of will be used for this UPS.
useradd(1M) useradd(1M) NAME useradd - add a new user login to the system SYNOPSIS useradd [-u uid [-o] ] [-g group] [-G group [ , group ...
useradd(1M) -e expire useradd(1M) Specifies the date on which this login can no longer be used. After expire, no user will be able to access this login. This option is used to create temporary logins. expire, which is a date, may be typed in any format, except a Julian date. For example, a date may be entered in either of the following formats: July 13, 1993 7/13/93 A value of ’’’’ defeats the expired date status. Manages the defaults for various options.
useradd(1M) 2 3 4 6 9 10 useradd(1M) Invalid command syntax. Invalid argument supplied to an option. uid is not unique (when -o is not used). The group specified with the -g option does not exist. login is not unique. Cannot modify the /etc/group file. The login was added to the /etc/passwd file, but not to the /etc/group file. 12 Unable to create the home directory (while using the -m option) or unable to complete the copy of skel_dir to the new home directory.
userdbck(1M) userdbck(1M) NAME userdbck - verify or fix information in the user database, /var/adm/userdb SYNOPSIS /usr/sbin/userdbck [-a] [-u] [-r] [-f] [file] DESCRIPTION userdbck verifies the information in the user database (/var/adm/userdb), reports inconsistencies, and fixes problems. If no options and no arguments are specified, userdbck reports all data corruption problems in all files in /var/adm/userdb. If the -r option is also specified, each reported problem is repaired.
userdbget(1M) userdbget(1M) NAME userdbget - display information residing in the user database, /var/adm/userdb SYNOPSIS /usr/sbin/userdbget [-i] -u name [attr]... /usr/sbin/userdbget [-i] -a [attr]... DESCRIPTION userdbget displays the per-user information residing in the user database as a sequence of attribute =value pairs. Each pair is printed on a separate line and is preceded by the username.
userdbget(1M) userdbget(1M) /usr/sbin/userdbget -a joe AUDIT_FLAG=1 joe DISPLAY_LAST_LOGIN=0 jane ALLOW_NULL_PASSWORD=0 mike AUDIT_FLAG=0 FILES /var/adm/userdb /etc/default/security /etc/security.dsc user database security defaults configuration file security attributes description file SEE ALSO userdbck(1M), userdbset(1M), security(4), userdb(4).
userdbset(1M) userdbset(1M) NAME userdbset - modify information in the user database, /var/adm/userdb SYNOPSIS /usr/sbin/userdbset /usr/sbin/userdbset /usr/sbin/userdbset /usr/sbin/userdbset /usr/sbin/userdbset -u -d -d -d [-u name attr =value [attr=value ...] -u name [-i] -u name attr [attr...] -a attr [attr...] name] -f filename DESCRIPTION userdbset modifies the per-user information residing in the user database, /var/adm/userdb.
userdbset(1M) userdbset(1M) Notes userdbset validates attributes and attribute values based on information in /etc/security.dsc. The validation of an attribute fails if: • • • • • Any specified attr is not listed in /etc/security.dsc. /etc/security.dsc does not allow a per-user value for the attr. name is not a valid user. /etc/security.dsc allows the attr only for local users, and name is not in /etc/passwd . The value of an attr is not within the range specified in /etc/security.dsc.
userdel(1M) userdel(1M) NAME userdel - delete a user login from the system SYNOPSIS userdel [-r] login DESCRIPTION The userdel command deletes a user login from the system by modifying the appropriate login related files. The userdel command requires the login argument. login is the name to be deleted, specified as a string of printable characters. It may not contain a colon (:) or a newline (\n).
userdel(1M) userdel(1M) 14 /etc/passwd file or /etc/ptmp file busy. Another command may be modifying the /etc/passwd file. 17 Cannot delete entry from /etc/passwd file. EXAMPLES Remove the user otto from the system: userdel otto Remove the user bob from the system and delete bob ’s home directory from the system: userdel -r bob WARNINGS As many users may try to write the /etc/passwd file simultaneously, a passwd locking mechanism was deviced.
usermod(1M) usermod(1M) NAME usermod - modify a user login on the system SYNOPSIS usermod [-u uid [-o] ] [-g group] [-G group [ , group ... ] ] [-d dir [-m] ] [-s shell] [-c comment ] [-f inactive] [-l new_logname] [-e expire] login DESCRIPTION The usermod command modifies a user login on the system by changing the appropriate login related files. The usermod command requires the login argument. login is a new login name, specified as a string of printable characters.
usermod(1M) usermod(1M) A value of ’’’’ defeats the expired date status. Unless enhanced security is installed, the -e and -f options are not supported and will return an error. A directory can be shared between the users belonging to the same group. If the home directory is in unshared mode and a new user is allocated to that directory, then it will be put into shared mode by setting the permissions of that directory to 775 (i.e., includes the write permissions to the group as well).
usermod(1M) usermod(1M) EXAMPLES Change otto ’s primary group to staff . usermod -g staff otto Change otto ’s user ID to 333 and change the login name to bob . usermod -u 333 -l bob otto WARNINGS As many users may try to write the /etc/passwd file simultaneously, a passwd locking mechanism was devised. If this locking fails after subsequent retrying, usermod terminates. While modifying the user login, the username is not added to the primary group entry in the /etc/group file.
userstat(1M) userstat(1M) NAME userstat - check status of local user accounts SYNOPSIS /usr/sbin/userstat [-q] -u name [parm]... /usr/sbin/userstat [-q] -a [parm]... DESCRIPTION userstat checks the status of local user accounts and reports abnormal conditions, such as account locks. If any parm arguments are specified, abnormal status is displayed only for those parameters, otherwise abnormal status is displayed for all parameters.
userstat(1M) userstat(1M) RETURN VALUE userstat exits with one of the following values: 0 did not find abnormal status 1 found abnormal status 2 invalid usage or user not found EXAMPLES The following example reports all abnormal status for all local accounts. /usr/sbin/userstat -a joe nullpw mary admlock maxtries=5 The following example shows that the account for user joe is not locked due to too many consecutive authentication failures.
utmpd(1M) utmpd(1M) NAME utmpd - user accounting database daemon SYNOPSIS /usr/sbin/utmpd DESCRIPTION utmpd , user accounting database daemon, manages the user accounting database which is the database of currently logged-in users. This was previously maintained by /etc/utmp and /etc/utmpx files on HP-UX. Upon startup, utmpd writes its pid to the file /etc/useracct/utmpd_pid. Applications can add, update, or query entries into the database using the getuts() APIs.
uucheck(1M) uucheck(1M) (TO BE OBSOLETED) NAME uucheck - check the uucp directories and permissions file SYNOPSIS /usr/lbin/uucp/uucheck [-v] [-x debug_level ] DESCRIPTION The uucp commands, including uucheck , are targeted for removal from HP-UX; see the WARNINGS below. uucheck checks for the presence of the files and directories required by uucp (see uucp(1)). uucheck is executed from the UUCP makefile before the installation occurs.
uucico(1M) uucico(1M) (TO BE OBSOLETED) NAME uucico - transfer files for the uucp system SYNOPSIS /usr/lbin/uucp/uucico -r1 -s system [-x debug_level ] [-d spool_directory ] /usr/lbin/uucp/uucico [-x debug_level ] [-d spool_directory ] DESCRIPTION The uucp commands, including uucico , are targeted for removal from HP-UX; see the WARNINGS below. uucico scans the /var/spool/uucp directories for work files.
uuclean(1M) uuclean(1M) (TO BE OBSOLETED) NAME uuclean - uucp spool directory clean-up SYNOPSIS /usr/lbin/uucp/uuclean [ options ] DESCRIPTION The uucp commands, including uuclean , are targeted for removal from HP-UX; see the WARNINGS below. uuclean scans the spool directories for files with the specified prefix and deletes all those that are older than the specified number of hours. Options uuclean recognizes the following options: -ddirectory Clean directory instead of the spool directory.
uucleanup(1M) uucleanup(1M) (TO BE OBSOLETED) NAME uucleanup - uucp spool directory clean-up SYNOPSIS /usr/lbin/uucp/uucleanup [-C time ] [-D time ] [-W time ] [-X time ] [-m string ] [-o time ] [-s system ] [-x debug_level ] DESCRIPTION The uucp commands, including uucleanup , are targeted for removal from HP-UX; see the WARNINGS below. uucleanup scans the spool directories for old files and takes appropriate action to remove them.
uucleanup(1M) uucleanup(1M) (TO BE OBSOLETED) SEE ALSO cron(1M), uucp(1), uux(1), uuclean(1M). Tim O’Reilly and Grace Todino, Managing UUCP and Usenet, O’Reilly & Associates, Inc. USA. Grace Todino and Dale Dougherty, Using UUCP and Usenet, O’Reilly & Associates, Inc. USA.
uucpd(1M) uucpd(1M) NAME uucpd - UUCP over TCP/IP server daemon SYNOPSIS /usr/sbin/uucpd DESCRIPTION uucpd is the server for supporting UUCP connections over TCP/IP networks. uucpd is invoked by inetd (see inetd(1M)) when a UUCP connection is established (that is, a connection to the port indicated in the "uucp" service specification; see services (4)), and executes the following protocol: If 1) The server prompts with "login:", the uucico process at the other end must supply a username.
uugetty(1M) uugetty(1M) (TO BE OBSOLETED) NAME uugetty - set terminal type, modes, speed and line discipline SYNOPSIS /usr/lbin/uucp/uugetty [-h] [-t timeout ] [-r] line [ speed [ type [ linedisc ] ] ] /usr/lbin/uucp/uugetty -c file DESCRIPTION The uucp commands, including uugetty , are targeted for removal from HP-UX; see the WARNINGS below. uugetty sets terminal type, modes, speed and line discipline.
uuls(1M) uuls(1M) (TO BE OBSOLETED) NAME uuls - list spooled uucp transactions grouped by transaction SYNOPSIS uuls [ -m ] [ directories ...] uuls [ -s ] [ -m ] [ directories ...] uuls [ -k ] [ -m ] [ directories ...] DESCRIPTION The uucp commands, including uuls , are targeted for removal from HP-UX; see the WARNINGS below.
uuls(1M) uuls(1M) (TO BE OBSOLETED) stat-able, and to print the C-file meaning. uucp -C and uux both set to a true (spooled) subfile name. Orphan files are those whose names start with D. and which are not referenced by any control files. This algorithm extracts from control files the names of all subfiles that should exist in the spool directory when the transaction is not being actively processed.
uusched(1M) uusched(1M) (TO BE OBSOLETED) NAME uusched - schedule uucp transport files SYNOPSIS /usr/lbin/uucp/uusched [-u debug_level ] [-x debug_level ] DESCRIPTION The uucp commands, including uusched , are targeted for removal from HP-UX; see the WARNINGS below. uusched is the UUCP file transport scheduler. It is usually started by the daemon uudemon.hour , which is started by cron (see cron(1M)) from the following entry in /var/spool/cron: 39 * * * * /usr/bin/su uucp -c */usr/lbin/uucp/uudemon.
uusnap(1M) uusnap(1M) (TO BE OBSOLETED) NAME uusnap - show snapshot of the UUCP system SYNOPSIS uusnap DESCRIPTION The uucp commands, including uusnap , are targeted for removal from HP-UX; see the WARNINGS below. uusnap displays in tabular format a synopsis of the current UUCP situation.
uusnaps(1M) uusnaps(1M) (TO BE OBSOLETED) NAME uusnaps - sort and embellish uusnap output SYNOPSIS uusnaps DESCRIPTION The uucp commands, including uusnaps , are targeted for removal from HP-UX; see the WARNINGS below. uusnaps runs uusnap (see uusnap(1M)) and post-processes the output into a more useful form. It sorts output lines in ‘‘Pareto-style’’, showing first those remote systems with the greatest number of Cmds files, next Data files, and then Xqts files.
uusub(1M) uusub(1M) (TO BE OBSOLETED) NAME uusub - monitor uucp network SYNOPSIS /usr/lbin/uucp/uusub [ options ] DESCRIPTION The uucp commands, including uusub , are targeted for removal from HP-UX; see the WARNINGS below. uusub defines a uucp subnetwork and monitors the connection and traffic among the members of the subnetwork. Options uusub recognizes the following options: -asys Add sys to the subnetwork. -dsys Delete sys from the subnetwork. -l Report the statistics on connections.
uusub(1M) uusub(1M) (TO BE OBSOLETED) WARNINGS Use of uucp commands, including uusub , is discouraged because they are targeted for removal from HP-UX. Use ftp(1) or rcp(1) instead. FILES /var/uucp/.Admin/L_sub /var/uucp/.Admin/R_sub /var/uucp/.Log/* connection statistics traffic statistics system log file SEE ALSO uucp(1), uustat(1). Tim O’Reilly and Grace Todino, Managing UUCP and Usenet, O’Reilly & Associates, Inc. USA.
uuxqt(1M) uuxqt(1M) (TO BE OBSOLETED) NAME uuxqt - execute remote uucp or uux command requests SYNOPSIS /usr/lbin/uucp/uuxqt [ -s system ] [ -x debug_level ] DESCRIPTION The uucp commands, including uuxqt , are targeted for removal from HP-UX; see the WARNINGS below. uuxqt executes remote job requests generated by use of the uux command (see uux(1)). uux generates X. files and places them in the spool directory, where uuxqt searches for them. For each X.
vgcfgbackup(1M) vgcfgbackup(1M) NAME vgcfgbackup - create or update LVM volume group configuration backup file SYNOPSIS /usr/sbin/vgcfgbackup [-f vg_conf_path] [-u] vg_name DESCRIPTION The vgcfgbackup command saves the LVM configuration for a volume group in a default or alternate configuration backup file (see the -f option). By default, vgcfgbackup runs automatically each time an LVM command changes the LVM configuration. In this case, it always uses the default configuration backup file.
vgcfgbackup(1M) vgcfgbackup(1M) AUTHOR vgcfgbackup was developed by HP. SEE ALSO vgcfgrestore(1M).
vgcfgrestore(1M) vgcfgrestore(1M) NAME vgcfgrestore - display or restore LVM volume group configuration from backup file SYNOPSIS /usr/sbin/vgcfgrestore /usr/sbin/vgcfgrestore /usr/sbin/vgcfgrestore /usr/sbin/vgcfgrestore -n vg_name -l [-R] [-F] -n -f vg_conf_path [-R] [-F] -f [-v] vg_name [-o old_pv_path] pv_path -l [-v] vg_conf_path [-o old_pv_path] pv_path Remarks vgcfgrestore cannot be performed if the volume group is activated in shared mode.
vgcfgrestore(1M) -R vgcfgrestore(1M) This option will force restoring the LVM configuration data even if there is a physical volume mismatch between the kernel and the configuration backup file with the volume group still active. This option should not be used unless the configuration file is absolutely valid and up-to-date. Restoring invalid configuration data can result in data corruption later.
vgcfgrestore(1M) vgcfgrestore(1M) Above command might display the following: Volume Group Configuration information in "/etc/lvmconf/vg00.conf" VG Name /dev/vg00 ---- Physical volumes : 2 ---/dev/rdsk/c0t6d0 (Bootable) /dev/rdsk/c0t5d0 (Non-bootable) Restore LVM configuration information stored for /dev/rdsk/c0t7d0 in default configuration file /etc/lvmconf/vg01.
vgchange(1M) vgchange(1M) NAME vgchange - set LVM volume group availability SYNOPSIS Activate volume group /usr/sbin/vgchange -a availability [-l] [-p] [-q quorum] [-s] [-P resync_daemon_count] [vg_name ... ] Assign to high availability cluster and mark volume group sharable /usr/sbin/vgchange -c cluster -S sharable vg_name Change activation mode of sharable volume group /usr/sbin/vgchange -a availability -x {vg_name...
vgchange(1M) vgchange(1M) part of a high availability cluster, it is activated in exclusive readwrite mode, as for the -a e option. e Activate each specified volume group and all associated physical and logical volumes for exclusive read-write access. The volume group must be marked as part of a high availability cluster, and the availability software must be running on the system; otherwise, the volume group is not activated.
vgchange(1M) vgchange(1M) n Remove the shared attribute from the volume group. The high availability software does not need to be running. The volume group must be deactivated with the -a n option before a -S yn option can be executed. -l Disable the opening of logical volumes that belong to each specified volume group. If the -l option is set, later attempts to open the logical volumes will fail. To allow an opening of these logical volumes to succeed, execute lvchange -a y.
vgchange(1M) vgchange(1M) If any internationalization variable contains an invalid setting, all internationalization variables default to "C" (see environ(5)).
vgchange(1M) vgchange(1M) logical volumes should not be mirrored and should not have bad-block relocation turned on, or all systems should use read-only access to the logical volumes. In order to activate a logical volume greater than 2 terabytes, the kernel must be updated to support this feature, and the corresponding feature enabling patch must be installed.
vgchgid(1M) vgchgid(1M) NAME vgchgid - modify the Volume Group ID (VGID) on a given set of physical devices SYNOPSIS /usr/sbin/vgchgid PhysicalVolumePath [PhysicalVolumePath] ... DESCRIPTION The vgchgid command is designed to change the LVM Volume Group ID (VGID) on a supplied set of disks. vgchgid will work with any type of storage, but it is primarily targeted at disk arrays that are able to create "snapshots" or "clones" of mirrored LUNs.
vgchgid(1M) 2) vgchgid(1M) For XP disk array, the commands are paircreate and pairsplit . Three BCV disks are created. 2. Change the VGID on the BCV disks. vgchgid /dev/rdsk/c0t0d0 /dev/rdsk/c0t0d1 /dev/rdsk/c0t0d2 3. Make a new volume group using the BCV disks. mkdir /dev/vgbcv mknod /dev/vgbcv/group c 64 0x040000 4. Import the BCV disks into the new volume group. vgimport /dev/vgbcv /dev/dsk/c0t0d0 /dev/dsk/c0t0d1 /dev/dsk/c0t0d2 5. Activate the new volume group. vgchange -a y /dev/vgbcv 6.
vgcreate(1M) vgcreate(1M) NAME vgcreate - create LVM volume group SYNOPSIS /usr/sbin/vgcreate [-f] [-A autobackup] [-x extensibility] [-e max_pe] [-l max_lv ] [-p max_pv ] [-s pe_size] [-g pvg_name] vg_name pv_path ... DESCRIPTION The vgcreate command creates a new volume group. vg_name is a symbolic name for the volume group and must be used in all references to it. vg_name is the path to a directory entry under /dev that must contain a character special file named group .
vgcreate(1M) vgcreate(1M) alternate block(s) might be inside the user data area. Potential data corruption could occur. -g pvg_name Create a new physical volume group with the name pvg_name. All physical volumes specified in the pv_path parameter become a member of the newly created physical volume group. The physical volume group information is stored in an ASCII file, /etc/lvmpvg . The file can be edited to create a physical volume group instead of using the vgcreate command.
vgcreate(1M) vgcreate(1M) vgcreate -s 2 /dev/vg00 /dev/dsk/c1t0d0 /dev/dsk/c1t2d0 Create a volume group named /dev/vg01 that can contain a maximum of three logical volumes, with extent size set to 8 MB: vgcreate -l 3 -s 8 /dev/vg01 /dev/dsk/c3t4d0 Create a volume group named /dev/vg00 and a physical volume group named PVG0 with two physical volumes: vgcreate -g PVG0 /dev/vg00 /dev/dsk/c1t0d0 /dev/dsk/c2t0d0 Using the PV Links feature to create a volume group named /dev/vg00 with a physical volume that c
vgdisplay(1M) vgdisplay(1M) NAME vgdisplay - display information about LVM volume groups SYNOPSIS /usr/sbin/vgdisplay [-v] [vg_name ...] DESCRIPTION The vgdisplay command displays information about volume groups. For each vg_name specified, vgdisplay displays information for that volume group only. If no vg_name is specified, vgdisplay displays names and corresponding information for all defined volume groups. The volume group must be activated (see vgchange(1M)) before it can be displayed.
vgdisplay(1M) vgdisplay(1M) Total Spare PVs in use Total number of spare physical volumes that are active in place of (containing all data from) a failed physical volume.
vgdisplay(1M) vgdisplay(1M) unavailable/standby spare The physical volume is a spare "standing by" that is not currently available to capture data from a failed physical volume. Total PE Total number of physical extents on the physical volume. Free PE Number of free physical extents on the physical volume. Spared from PV If the physical volume represents an active spare, this field will show the name of the failed physical volume whose data now resides on this spare.
vgdisplay(1M) vgdisplay(1M) SEE ALSO lvdisplay(1M), pvdisplay(1M), vgchange(1M), vgcreate(1M).
vgexport(1M) vgexport(1M) NAME vgexport - export an LVM volume group and its associated logical volumes SYNOPSIS /usr/sbin/vgexport [-m mapfile] [-p] [-v] [-f outfile] vg_name /usr/sbin/vgexport -m mapfile -s -p -v vg_name DESCRIPTION Using the format of the first command line of the SYNOPSIS above, the vgexport command can be used to remove a volume group from the system. The volume group will be removed without modifying the logical volume information found on the physical volumes.
vgexport(1M) vgexport(1M) EXAMPLES Export the volume group /dev/vg01 into mapfile vg01.mymap . The volume group will be removed from the exporting system. vgexport -m vg01.mymap /dev/vg01 Export the volume group /dev/vg01 and write the disk names into the file vg01.outfile . vgexport -v -f outfile /dev/vg01 Create a mapfile to be copied to other systems in a high availability cluster to build the volume group information for the volume group, /dev/vg02 .
vgextend(1M) vgextend(1M) NAME vgextend - extend an LVM volume group by adding physical volumes SYNOPSIS /usr/sbin/vgextend [-f] [-A autobackup] [-g pvg_name] [-x extensibility] [-z sparepv] vg_name pv_path ... Remarks vgextend cannot be performed if the volume group is activated in shared mode. DESCRIPTION The vgextend command assigns additional physical volumes to volume group vg_name. The volume group must be active.
vgextend(1M) vgextend(1M) -x extensibility Set allocation permission for additional physical extents on the physical volume specified by pv_path. extensibility can have one of the following values: y n -z sparepv Allow allocation of additional physical extents on the physical volume. Prohibit allocation of additional physical extents on the physical volume. Logical volumes residing on the physical volume can still be accessed.
vgextend(1M) vgextend(1M) volumes already in the volume group. Clearly this checking only applies if the disks involved (those already in the volume group and those being added) in the operation are EMC Symmetrix. Should the command find an incompatibility, a message of the following type will be produced: "Attempt to mix incompatible EMC Symmetrix disk types failed. Volume group contains standard disks, but physical volume /dev/dsk/cxtxdx contains EMC BCV DISK.
vgimport(1M) vgimport(1M) NAME vgimport - import an LVM volume group onto the system SYNOPSIS /usr/sbin/vgimport [-m mapfile] [-p] [-v] [-f infile] vg_name pv_path ... /usr/sbin/vgimport -m mapfile -s [-v] [-p] vg_name DESCRIPTION The vgimport command adds the specified volume group to the system. The physical volumes, specified as pv_path ... are scanned to obtain the volume group information and logical volume information.
vgimport(1M) vgimport(1M) must appear on a new line in the infile. This option may not be used together with the -s option. WARNINGS In order to import a logical volume greater than 2 terabytes, the kernel must be updated to support this feature, and the corresponding feature enabling patch must be installed. In order to import a striped and mirrored logical volume, the kernel must be updated to support this feature, and the corresponding feature enabling patch must be installed.
vgimport(1M) vgimport(1M) mymap and will be shared among the exporting system, this system, and other systems importing the volume group as shared: vgimport -v -s -m /tmp/vg02.mymap /dev/vg02 Import the volume group /dev/vg02 using the infile, /tmp/vg02.infile. infile was previously specified by the vgexport command on another system, and it assumes that pv_paths in the /tmp/vg02.infile are identical on both systems. vgimport -v -f /tmp/vg02.infile /dev/vg02 SEE ALSO vgexport(1M), vgscan(1M).
vgmodify(1M) vgmodify(1M) NAME vgmodify - handle physical volume size changes and modify configuration parameters of an existing LVM volume group SYNOPSIS Set Specified Parameters /usr/sbin/vgmodify [-B bootable] [-e max_pe] [-l max_lv ] [-n] [-p max_pv ] [-r] [-v] vg_name [pv_path ... ] Optimize the Volume Group Settings /usr/sbin/vgmodify -o [-B bootable] [-r] [-v] vg_name [pv_path ...
vgmodify(1M) • vgmodify(1M) Change a physical volume type from boot to non-boot or vice versa (see pvcreate(1M) -B ). Note that making a physical volume non-bootable will increase the space available on that device for LVM configuration data. However, even a single bootable physical volume in the volume group will restrict the max_pv and max_pe settings available. All the physical volumes associated with the volume group must be available for the vgmodify command to succeed.
vgmodify(1M) vgmodify(1M) on each physical volume and, therefore, the possible settings for the volume group parameters. No user data is moved during that process, only the LVM numbering of physical extents changes. When the first extent is being reallocated from user to LVM configuration data, the physical extent numbers are decreased. This will only occur if the first extent is free.
vgmodify(1M) 0 >0 vgmodify(1M) Successful completion. Error condition occurred.
vgmodify(1M) vgmodify(1M) /etc/lvmconf/VG_restore A script created by vgmodify before making any update, to be used if the vgmodify command is interrupted while committing the configuration changes to the physical volumes. See the Remarks section for its usage. SEE ALSO boot(1M), lvlnboot(1M), mkboot(1M), pvcreate(1M), pvmove(1M), vgcfgbackup(1M), vgcfgrestore(1M), vgchange(1M), vgcreate(1M), vgdisplay(1M), vgextend(1M), vgreduce(1M), lvm(7).
vgreduce(1M) vgreduce(1M) NAME vgreduce - remove physical volumes from an LVM volume group SYNOPSIS /usr/sbin/vgreduce [-A autobackup] vg_name pv_path ... /usr/sbin/vgreduce [-A autobackup] [-l] vg_name pv_path /usr/sbin/vgreduce [-A autobackup] [-f] vg_name Remarks vgreduce cannot be performed if the volume group is activated in shared mode. DESCRIPTION The vgreduce command removes each physical volume specified by a pv_path argument from volume group vg_name.
vgreduce(1M) vgreduce(1M) lvmtab file. Currently the max limit is 8 paths to a PV (seven alternates and one primary). In this situation invoking the command without the -f option will not resolve the condition because the path is not attached to the volume group. Similarly the condition would not be overcome by invoking with the -f option as this works on PVs rather than links. pv_path The block device path name of a physical volume. vg_name The path name of the volume group.
vgremove(1M) vgremove(1M) NAME vgremove - remove LVM volume group definition from the system SYNOPSIS /usr/sbin/vgremove vg_name ... DESCRIPTION The vgremove command removes from the system the last physical volume of the volume group and the definition of the volume group or groups specified by vg_name .... Since all system knowledge of the volume group and its contents are removed, the volume group can no longer be accessed.
vgscan(1M) vgscan(1M) NAME vgscan - scan physical volumes for LVM volume groups SYNOPSIS /usr/sbin/vgscan [-a] [-p] [-v] DESCRIPTION The vgscan command allows the re-creation of the /etc/lvmtab file and possibly the associated volume group device files. This command should be run only in the event of a catastrophic error such as the deletion of the /etc/lvmtab file or the mismatch of names of the physical volumes in the /etc/lvmtab file to the actual physical volume path configuration.
vgscan(1M) vgscan(1M) the /etc/lvmtab . If for some reason, there is a need to re-construct /etc/lvmtab when the system is running production application, vgscan will create a partial /etc/lvmtab . In this case, most of the primary paths should be included in the /etc/lvmtab . Use vgextend to include any missing alternate paths in the VG. EMC DISK WARNINGS Starting at 10.20, the vgscan command is supporting additional EMC Symmetrix disk product functionality (see vgchgid(1M)).
vgsync(1M) vgsync(1M) (Requires Optional HP MirrorDisk/UX Software) NAME vgsync - synchronize stale logical volume mirrors in LVM volume groups SYNOPSIS /usr/sbin/vgsync vg_name ... Remarks This command requires the installation of the optional HP MirrorDisk/UX software, which is not included in the standard HP-UX operating system. DESCRIPTION The vgsync command synchronizes the physical extents of each mirrored logical volume in the volume group specified by vg_name ....
vhardlinks(1M) vhardlinks(1M) NAME vhardlinks - checks the consistency of compartment rules for files with multiple hardlinks SYNOPSIS vhardlinks [-m mount_point...] DESCRIPTION vhardlinks checks the consistency of compartment rules for files that have multiple hard links pointing to them. If a file has multiple hard links, it is possible to create compartment rules such that the file will have conflicting rules controlling access to it.
vipw(1M) vipw(1M) NAME vipw - edit the password file SYNOPSIS vipw DESCRIPTION vipw edits the password file while setting the appropriate locks, and does any necessary processing after the password file is unlocked. If the password file is already being edited, you will be told to try again later. The vi editor is used unless the environment variable EDITOR indicates an alternate editor.
volcopy(1M) volcopy(1M) NAME volcopy, labelit - copy a file system with label checking SYNOPSIS /usr/sbin/volcopy [options] fsname special1 volname1 special2 volname2 /usr/sbin/labelit [options] special [fsname volume [-n] ] DESCRIPTION The volcopy command makes a literal copy of the file system using a block size matched to the device. Options volcopy recognizes the following options: -F FStype Specify the file system type on which to operate (see fstyp(1M) and fs_wrapper(5)).
volcopy(1M) volcopy(1M) provides for initial labeling of new tapes only (this destroys previous contents). The -F, -V, and -o options can be specified for the labelit command. The behavior of the -F, -V, and -o options is similar to their behavior in the volcopy command. FILES /etc/default/fs /etc/fstab File that specifies the default file system type. Static information about the file systems. SEE ALSO volcopy_hfs(1M), volcopy_vxfs(1M), fs_wrapper(5).
volcopy_hfs(1M) volcopy_hfs(1M) NAME volcopy_hfs: volcopy, labelit - copy an HFS file system with label checking SYNOPSIS /usr/sbin/volcopy [options] fsname special1 volname1 special2 volname2 /usr/sbin/labelit [options] special [fsname volume [-n] ] DESCRIPTION The volcopy command makes a literal copy of an HFS file system using a block size matched to the device. Options volcopy recognizes the following options: -F hfs Specifies the HFS file system type.
volcopy_vxfs(1M) volcopy_vxfs(1M) (TO BE OBSOLETED) NAME volcopy_vxfs: volcopy, labelit - copy a VxFS file system with label checking SYNOPSIS /usr/sbin/volcopy [-F vxfs ] [-V] [-a] [-s] [-y] fsname special1 volname1 special2 volname2 /usr/sbin/labelit [-F vxfs ] [-V] [-n] special [fsname volume] DESCRIPTION volcopy makes a literal copy of a VxFS file system using a block size matched to the device.
vtdaemon(1M) vtdaemon(1M) NAME vtdaemon - respond to vt requests SYNOPSIS vtdaemon [-g[ngateway]] [-n] lan_device lan_device ... DESCRIPTION vtdaemon responds to requests from other systems (via local area network) made by vt (see vt(1)). vtdaemon spawns a server to respond to each request that it receives.
vtdaemon(1M) vtdaemon(1M) FILES /var/adm/vtdaemonlog logfile used by vtdaemon. /dev/lan0 default lan device name. SEE ALSO vt(1), uucico(1M).
vxdiskusg(1M) vxdiskusg(1M) NAME vxdiskusg - generate VxFS disk accounting data by user ID SYNOPSIS vxdiskusg [-s] [-v] [-i ignlist] [-p password-file] [-u outfile] [ file... ] DESCRIPTION vxdiskusg generates intermediate disk accounting information from data in file, or the standard input if the -s option is specified and file is omitted.
vxdiskusg(1M) vxdiskusg(1M) SEE ALSO acct(1M), acctsh(1M), diskusg(1M), acct(4).
vxdump(1M) vxdump(1M) NAME vxdump, rvxdump - incremental VxFS file system dump, local or across network SYNOPSIS vxdump [-cnouwW ] [-0123456789 ] [-b blocksize] [-B records] [-d density] [-f filename] [-s size] [-T time] filesystem rvxdump [-cnouwW ] [-0123456789 ] [-b blocksize] [-B records] [-d density] [-f filename] [-s size] [-T time] filesystem vxdump option [argument ...] filesystem rvxdump option [argument ...
vxdump(1M) vxdump(1M) -f filename Place the dump on the file filename instead of the tape. If the name of the file is -(dash), vxdump writes to the standard output. This option can be of the form machine :device to specify a tape device on a remote machine. -n Whenever vxdump requires operator attention, notify all users in group operator by means similar to that described by wall(1M). -o -s size Use /etc/vxdumpdates rather than /etc/dumpdates for timestamp information.
vxdump(1M) vxdump(1M) Compatibility The dump tape format is independent of the VxFS disk layout. A dump of a file system with the Version 4 disk layout can be restored on a file system using the Version 2 disk layout or even a file system of another file system type, with the following exceptions: • Files larger than 2 GB cannot be restored by earlier versions of vxrestore .
vxdump(1M) /etc/fstab /etc/mnttab /etc/group vxdump(1M) Dump table: file systems and frequency. Mounted file system table. Used to find group operator . SEE ALSO dump(1M), init(1M), mount(1M), mount_vxfs(1M), open(2), rmt(1M), setext(1M), vxrestore(1M), wall(1M), close(2), open(2), ctime(3C), getopt(3C), fstab(4), mnttab(4).
vxenablef(1M) vxenablef(1M) NAME vxenablef - enable VxFS DMAPI, OnLineJFS, or full VxFS functionality in the kernel SYNOPSIS /sbin/fs/vxfs/vxenablef [-a] /sbin/fs/vxfs/vxenablef [-e { dmapi | full | online } ] DESCRIPTION vxenablef enables VxFS DMAPI (Data Management Applications Programming Interface), OnLineJFS functionality, or full VxFS functionality in the kernel.
vxfsconvert(1M) vxfsconvert(1M) NAME vxfsconvert - convert a file system to a vxfs file system or upgrade a VxFS disk layout version. SYNOPSIS /sbin/fs/vxfs/vxfsconvert [-l logsize] [-s size] [-efnNvyY ] special DESCRIPTION vxfsconvert converts a file system of a supported type to a VxFS file system with a Version 4 disk layout. Currently vxfsconvert only supports conversion of an HFS file system to a VxFS file system. Conversion of all file system block and fragment sizes is supported.
vxfsconvert(1M) b c d l p s ? vxfsconvert(1M) The inode is a regular file. The inode is a block special file. The inode is a character special file. The inode is a directory. The inode is a symbolic link. The inode is a fifo. The inode is a socket. The inode type is unknown. -y | Y Assume a yes response to all questions asked by vxfsconvert . This option implies that the conversion is committed unless vxfsconvert fails to allocate the required disk space.
vxfsconvert(1M) vxfsconvert(1M) 3. Reads every inode in the file system and converts it to a VxFS inode. 4. For every regular file inode, vxfsconvert allocates and initializes enough extent data to map all of the file’s data blocks. This translates only the representation of the file’s data blocks from the old format to that of VxFS. It never copies or relocates user data blocks. 5. For every directory inode, vxfsconvert allocates sufficient disk space to hold all the directory entries.
vxfsconvert(1M) vxfsconvert(1M) be greater than or equal to the required free space.
vxfsconvert(1M) vxfsconvert(1M) vxfsconvert -s required_space /dev/vg01/rlvol5 After the conversion completes, the increased volume space becomes a part of the converted VxFS file system. Note: DO NOT reduce the volume after the conversion. If the conversion fails, continue using the original file system. You do not need to run fsck . Reclaim the disk space by entering (on LVM): lvreduce /dev/vg01/rlvol5 old_size WARNINGS Do not run vxfsconvert on the /stand or whole-disk bootable file systems.
vxfsstat(1M) vxfsstat(1M) NAME vxfsstat - display VxFS file system statistics SYNOPSIS vxfsstat vxfsstat vxfsstat vxfsstat [-aCgsvxz ] [-e columns] [-c sample_count] [-t seconds] mount_point [-abi ] [-c sample_count] [-t seconds] mount_point [-w outfile] [-c sample_count] [-t seconds] mount_point -r infile [-aCgsvxz ] [-e columns] DESCRIPTION vxfsstat is a statistical reporter to aid in performance tuning and determining performance anomalies.
vxfsstat(1M) vxfsstat(1M) EXAMPLES The following examples show the output of vxfsstat using various options. To display buffer cache statistics: vxfsstat -b -c 5 /mount_point 0:43:44.091 Mon Apr 15 2002 -- absolute sample buffer cache statistics 36992 Kbyte current 377456 maximum 688187425 lookups 99.98% hit rate 37165 sec reuse age [not limited by maximum] 10:43:54.121 Mon Apr 15 2002 -- delta (10.029 sec sample) buffer cache statistics 36992 Kbyte current 377456 maximum 29793 lookups 99.
vxfsstat(1M) vxfsstat(1M) 921 sec recycle age [not limited by maximum] 4294967295 sec free age To display all shared counters that are non-zero: vxfsstat -vz /mount_point 10:53:56.471 Mon Apr 15 2002 -- absolute sample vxi_alloc_emap 127970901 vxi_alloc_expand_retry 891135 vxi_alloc_find_retry 153918 vxi_alloc_findfail 25474427 vxi_alloc_findfix 889319 vxi_alloc_mapflush 2 vxi_alloc_prev 14598090 vxi_alloc_search 59282134 vxi_alloc_sumsum 31483425 vxi_alloc_try 73892402 . . .
vxfsstat(1M) vxfsstat(1M) vxi_physmem_mbyte vxi_superwrite vxi_tran_commit vxi_tran_low vxi_tran_space vxi_tran_subfuncs vxi_tranlogflush 04:09:48.804 511 3 1 1 5 2 2 Sun Apr 14 2002 -- delta (10.010 sec sample) vxi_bcache_curkbyte vxi_bcache_maxkbyte vxi_bcache_recycleage vxi_dnlc_size vxi_icache_curino vxi_icache_maxino vxi_icache_peakino vxi_ifree_timelag 128 37898 3569 19940 27 19937 27 600 SEE ALSO iostat(1), vmstat(1), sar(1M).
vxlicense(1M) vxlicense(1M) NAME vxlicense - VxFS and VxVM licensing key utility SYNOPSIS /sbin/vxlicense {-p | -t feature} DESCRIPTION vxlicense maintains the VxFS and VxVM license key files. Options vxlicense requires one of the following options. -p Print available VxFS and VxVM licenses and features in a system. -t feature Test a VxFS and VxVM license in a system. feature can be HP_OnLineJFS , HP_DMAPI , or VxVM .
vxrestore(1M) vxrestore(1M) NAME vxrestore, rvxrestore - restore file system incrementally, local or across network SYNOPSIS vxrestore [-chimrRtvxy ] [-b blocksize] [-e opt] [-f file] [-s number] [ filename ... ] rvxrestore [-chimrRtvxy ] [-b blocksize] [-e opt] [-f file] [-s number] [ filename ... ] vxrestore key [ filename ... ] rvxrestore key [ filename ... ] DESCRIPTION vxrestore and rvxrestore read tapes previously dumped by the vxdump or rvxdump command (see vxdump(1M)).
vxrestore(1M) vxrestore(1M) up after a restore aborts prematurely. verbose -r The sense of the v modifier is toggled. When set to verbose, the ls command lists the inode numbers of all entries. and vxrestore prints information about each file as it is extracted. Read the tape and load into the current directory. Be careful when using the -r option. Restore only a complete dump tape onto a clear file system, or restore an incremental dump tape after a full level zero restore.
vxrestore(1M) vxrestore(1M) ignore Ignore extent attribute information entirely. warn Issue a warning message if extent attribute information cannot be kept (the default). -f file Specify the name of the archive instead of /dev/rmt/0m . If the name of the file is -(dash), vxrestore reads from standard input.
vxrestore(1M) vxrestore(1M) You can override a termination in interactive mode or by specifying the -y option when you invoke vxrestore . If a termination is overridden, vxrestore tries to skip over bad data and continue restoring. It is not a good practice to do this except under extraordinary circumstances. As part of normal dump/restore processing, it is best to identify the underlying cause of the problem and repair it.
vxrestore(1M) vxrestore(1M) bad name hole in map gethead: bad bitmap encountered gethead: unknown inode type number linkit: unknown type number initsymtable called from command n unextracted directory name bad entry entry details There are numerous consistency checks that vxrestore can list. Most checks are self-explanatory or rarely occur. Here are some common errors: filename : not found on tape The specified file name was listed in the tape directory but not found on the tape.
vxrestore(1M) vxrestore(1M) vxrestore does not restore access control lists (ACLs). AUTHOR vxrestore and rvxrestore are based on the restore program distributed in the 4.4 Berkeley Software Distribution, developed by the the University of California, Berkeley, and its contributors. FILES /dev/rmt/0m default tape drive /tmp/rstdr ∗ file containing directories on the tape /tmp/rstmd ∗ owner, mode, and time stamps for directories .
vxtunefs(1M) vxtunefs(1M) NAME vxtunefs - tune a VxFS File System SYNOPSIS vxtunefs [-ps] [-f tunefstab] [-o parameter=value] [{mount_point|block_special}] . . . DESCRIPTION vxtunefs sets or prints tuneable I/O parameters of mounted file systems. vxtunefs can set parameters describing the I/O properties of the underlying device, parameters to indicate when to treat an I/O as direct I/O, or parameters to control the extent allocation policy for the specified file system.
vxtunefs(1M) vxtunefs(1M) write_pref_io, to the full stripe size and set write_nstream to 1. For an application to do efficient direct I/O or discovered direct I/O, it should issue read requests that are equal to the product of read_nstream and read_pref_io . In general, any multiple or factor of read_nstream multiplied by read_pref_io is a good size for performance. For writing, the same general rule applies to the write_pref_io and write_nstream parameters.
vxtunefs(1M) vxtunefs(1M) block allocation is required for subsequent writes, which improves the write performance during migration. Because most applications write to files using a buffer size of 8K or less, the increasing extents start doubling from a small initial extent. initial_extent_size changes the default initial extent size to a larger value, so the doubling policy starts from a much larger initial size, and the file system won’t allocate a set of small extents at the start of file.
vxtunefs(1M) vxtunefs(1M) read_pref_io The preferred read request size. The file system uses this in conjunction with the read_nstream value to determine how much data to read ahead. The default value is 64K. write_nstream The number of parallel write requests of size write_pref_io to have outstanding at one time. The file system uses the product of write_nstream and write_pref_io to determine when to do flush behind on writes. The default value for write_nstream is 1.
vxumount(1M) vxumount(1M) NAME vxumount - unmount a VxFS file system SYNOPSIS vxumount [-o [force ] ] {special|mount_point} DESCRIPTION vxumount unmounts a currently mounted VxFS file system, which you can specify either as a mount_point or as special, the device on which the file system resides. Note: Only a privileged user can unmount file systems. Options vxumount recognizes the following option: -o Specifies the VxFS-specific options in a comma-separated list.
vxupgrade(1M) vxupgrade(1M) NAME vxupgrade - upgrade the disk layout of a VxFS file system SYNOPSIS vxupgrade [-n new_version ] [-r rawdev] mount_point DESCRIPTION vxupgrade prints the current disk layout version number for a VxFS file system or upgrades the file system to a new disk layout. vxupgrade operates on file systems mounted for read/write access: mount_point must be a mounted VxFS file system. Only a privileged user can query or upgrade a VxFS file system.
vxupgrade(1M) vxupgrade(1M) • HP-UX 11.0 with JFS 3.3 from Application CD • HP-UX 11.1x You cannot upgrade the root (/) or /usr file systems to Version 4 on an 11.0 system running JFS 3.3 from the Application CD. Additionally, we do not advise upgrading the /var or /opt file systems to Version 4 on an 11.0 system. These core file systems are crucial for system recovery. The HP-UX 11.
wall(1M) wall(1M) NAME wall - write message to all users SYNOPSIS /usr/sbin/wall [-ggroupname] [file] /usr/sbin/cwall [-ggroupname] [file] DESCRIPTION Without arguments, the wall command reads a message from standard input until end-of-file. Then it sends this message to all currently logged-in users preceded by: Broadcast Message from ...
whodo(1M) whodo(1M) NAME whodo - which users are doing what SYNOPSIS /usr/sbin/whodo [-h] [-l] [user ] DESCRIPTION The whodo command produces merged, reformatted, and dated output from the who , ps and acctcom commands (see who(1) , ps(1) and acctcom(1M)). If user is specified, output is restricted to all sessions pertaining to that user. The following options are available: -h -l Suppress the heading. Produce a long form of output.
xntpd(1M) xntpd(1M) NAME xntpd - Network Time Protocol daemon SYNOPSIS xntpd [-abdm ] [-c conffile] [-e authdelay] [-f driftfile] [-k keyfile] [-l logfile] [-p pidfile] [-r broadcastdelay] [-s statsdir] [-t key] [-v variable] [-V variable] [-x] DESCRIPTION xntpd is an operating system daemon that sets and maintains the system time-of-day in synchronism with Internet standard time servers.
xntpd(1M) xntpd(1M) The file format is similar to other UNIX configuration files. Comments begin with a # character and extend to the end of the line. Blank lines are ignored. Configuration commands consist of an initial keyword followed by a list of arguments, some of which may be optional, separated by white space. Commands may not be continued over multiple lines.
xntpd(1M) xntpd(1M) clock oscillator. If the file exists, it is read at startup in order to set the initial frequency offset and then updated once per hour with the current frequency offset computed by the daemon. If the file does not exist or this command is not given, the initial frequency offset is assumed zero. In this case, it may take some hours for the frequency to stabilize and the residual timing errors to subside.
xntpd(1M) xntpd(1M) N The key is a 64-bit hexadecimal number in the format specified in the NTP standard. This is the same as the DES format except the bits in each octet have been rotated one bit right so that the parity bit is now the high order bit of the octet. Leading zeroes must be specified and odd parity must be maintained. A zero key in NTP format would be specified as 8080808080808080. A The key is a 1-to-8 character ASCII string.
xntpd(1M) xntpd(1M) age This type of file generation sets changes to a new element of the file set every 24 hours of server operation. The file name suffix consists of a dot, the letter a, and an eight-digit number. This number is taken to be the number of seconds the server is running at the start of the corresponding 24 hour period. enable disable Information is only written to a file generation set when this is set to enable . Output is prevented by specifying disable . The default is enable .
xntpd(1M) xntpd(1M) The next step is to be sure the RS232 messages, if used, are getting to and from the clock. The most reliable way to do this is with an RS232 tester and to look for data flashes as the driver polls the clock and/or as data arrive from the clock. Our experience is that many of the problems occurring during installation are due to problems such as miswired connectors or improperly configured device links at this stage.
xntpd(1M) : : : : : : xntpd(1M) synchronized to 15.13.115.194, stratum=1 Previous time adjustment incomplete; residual Previous time adjustment incomplete; residual Previous time adjustment incomplete; residual Previous time adjustment incomplete; residual Previous time adjustment incomplete; residual -0.022223 -0.020624 -0.020222 -0.020623 -0.020623 sec sec sec sec sec But this does not mean that your system clock has been stepped.
xntpdc(1M) xntpdc(1M) NAME xntpdc - special NTP query program SYNOPSIS xntpdc [ -dilnps ] [ -c command ] [ host ] [ ... ] DESCRIPTION xntpdc is used to query the xntpd daemon about its current state and to request changes in that state. The program may be run either in interactive mode or controlled mode using command line arguments. Extensive state and statistics information is available through the xntpdc interface.
xntpdc(1M) xntpdc(1M) help [ command_keyword ] A ? or help by itself will print a list of all the command keywords. ntpq . A ? or help followed by a command keyword (command_keyword) will print function and usage information about the command. delay milliseconds Specify a time interval to be added to timestamps included in requests which require authentication. This is used to enable (unreliable) server reconfiguration over long delay network paths or between machines whose clocks are unsynchronized.
xntpdc(1M) xntpdc(1M) was cast off in the falseticker detection. A plus (+) indicates that the peer made it through. An asterisk (*) denotes the peer that the server is currently synchronizing with. showpeer peer_address [ ... ] Shows a detailed display of the current peer variables for one or more peers. Most of these values are described in the NTP Version 2 specification. pstats peer_address [ ... ] Show per-peer statistic counters associated with the specified peer(s).
xntpdc(1M) xntpdc(1M) RUNTIME CONFIGURATION REQUESTS All requests which cause state changes in the server are authenticated by the server using a configured NTP key. This facility is disabled if the NTP key is not configured. The key number and the corresponding key must also be made known to xtnpdc . This can be done using the keyid and passwd commands, the latter of which will prompt at the terminal for a password to use as the encryption key.
xntpdc(1M) xntpdc(1M) monitor Enables the monitoring facility. See the xntpdc program and the monolist command for more information. The default for this flag is enable. pll Enables the server to adjust its local clock by means of NTP. If disabled, the local clock free-runs at its intrinsic time and frequency offset. This flag is useful in case the local clock is controlled by some other device or protocol and NTP is used only to provide synchronization to other clients.
ypinit(1M) ypinit(1M) NAME ypinit - build and install Network Information Service databases SYNOPSIS /usr/sbin/ypinit -m [DOM= NIS_domain] /usr/sbin/ypinit -s NIS_server_name [DOM= NIS_domain] /usr/sbin/ypinit -c Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.
ypinit(1M) ypinit(1M) /etc/services /etc/auto_master /etc/mail/aliases SEE ALSO domainname(1), makedbm(1M), ypmake(1M), yppush(1M), ypserv(1M), ypxfr(1M), ypxfrd(1M), group(4), hosts(4), netgroup(4), networks(4), passwd(4), protocols(4), publickey(4), rpc(4), services(4), ypfiles(4).
ypmake(1M) ypmake(1M) NAME ypmake - create or rebuild Network Information Service databases SYNOPSIS /var/yp/ypmake [DIR= source_directory ] [DOM=NIS_domain ] \ [NOPUSH=1 ] [PWFILE= passwd_file ] [ map [ map ... ] ] cd /var/yp; make [DIR= source_directory ] [DOM=NIS_domain ] \ [NOPUSH=1 ] [PWFILE= passwd_file ] [ map ... ] Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.
ypmake(1M) ypmake(1M) EXAMPLES Create or rebuild the password databases (both the passwd.byname and passwd.byuid maps) from /etc/passwd and use yppush to copy the databases to any slave NIS servers in the default NIS domain: ypmake passwd.
yppasswdd(1M) yppasswdd(1M) NAME yppasswdd - daemon for modifying Network Information Service passwd database SYNOPSIS /usr/lib/netsvc/yp/rpc.yppasswdd passwd_file [-l log_file] [-nogecos ] [-noshell ] [-nopw ] [-nohome ] [-m [ arg1 arg2 ... ] ] Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.
yppasswdd(1M) yppasswdd(1M) File /var/adm/ptmp must be removed before yppasswdd can function properly again. vipw also uses /var/adm/ptmp when updating /etc/passwd (see vipw(1M)). As a result, yppasswdd competes with vipw when it updates passwd_file if passwd_file is /etc/passwd . AUTHOR yppasswdd was developed by Sun Microsystems, Inc.
yppoll(1M) yppoll(1M) NAME yppoll - query NIS server for information about NIS map SYNOPSIS /usr/sbin/yppoll [-h host] [-d domain] mapname Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.
yppush(1M) yppush(1M) NAME yppush - force propagation of Network Information Service database SYNOPSIS /usr/sbin/yppush [-d domain ] [-m maxm ] [-t mint ] [-v] mapname Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same. DESCRIPTION yppush copies a Network Information Service (NIS) map (database), mapname, from the map’s master NIS server to each slave NIS server.
yppush(1M) yppush(1M) FILES /usr/sbin/ domain/ypservers.{dir, pag} /usr/sbin/ domain/mapname.{dir, pag} SEE ALSO domainname(1), ypserv(1M), ypxfr(1M), ypfiles(4).
ypserv(1M) ypserv(1M) NAME ypserv, ypbind, ypxfrd - Network Information Service (NIS) server, binder, and transfer processes SYNOPSIS /usr/lib/netsvc/yp/ypserv [-l log_file] /usr/lib/netsvc/yp/ypbind [-l log_file] [-s] [-ypset -ypsetme ] [-broadcast ] /usr/sbin/ypxfrd Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality remains the same; only the name has changed.
ypserv(1M) ypserv(1M) Client requests drive the binding process. As a request for an unbound domain comes in, the ypbind process broadcasts on the network, if the file /var/yp/binding/domain_name /ypservers does not exist, trying to find a ypserv process serving maps within that NIS domain. If the binding should be established by broadcasting, at least one ypserv process must exist on every network.
ypserv(1M) ypserv(1M) AUTHOR ypserv , ypbind , and ypxfrd were developed by Sun Microsystems, Inc. FILES /var/yp/binding/domainname .version These files cache the last successful binding created for the given domain, in order to to speed up the binding process. When a binding is requested, these files are checked for validity and then used. /var/yp/securenets This file is read by ypxfrd and ypserv . It contains a list of IP addresses that these servers will allow a binding to.
ypset(1M) ypset(1M) NAME ypset - bind to particular Network Information Service server SYNOPSIS /usr/sbin/ypset [-V1 ] [-h host ] [-d domain ] server Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same. DESCRIPTION ypset tells ypbind to get Network Information Service (NIS) services for the specified domain from the ypserv process running on server (see ypserv (1M) and ypbind(1M)).
ypupdated(1M) ypupdated(1M) NAME ypupdated, rpc.ypupdated - server for changing NIS information SYNOPSIS /usr/lib/netsvc/yp/rpc.ypupdated [-is] Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same. DESCRIPTION ypupdated is a daemon that updates information in the Network Information Service (NIS) databases.
ypxfr(1M) ypxfr(1M) NAME ypxfr, ypxfr_1perday, ypxfr_1perhour, ypxfr_2perday - transfer NIS database from server to local node SYNOPSIS /usr/sbin/ypxfr [b] [-c] [-d domain] [-f] [-h host ] [-s domain] [-C tid prog ipaddr port] mapname Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.
ypxfr(1M) ypxfr(1M) AUTHOR ypxfr was developed by Sun Microsystems, Inc. FILES /usr/sbin/ypxfr.log log file The following scripts are suggested for use with cron . /usr/sbin/ypxfr_1perday run one transfer per day /usr/sbin/ypxfr_2perday run two transfers per day /usr/sbin/ypxfr_1perhour hourly transfers of "volatile" maps SEE ALSO crontab(1), domainname(1), cron(1M), ypinit(1M), yppush(1M), ypserv(1M), ypfiles(4).
(Notes) (Notes) y 708 Hewlett-Packard Company −1− HP-UX 11i Version 2: December 2007 Update