This chapter contains notes about issues and known problems with the base operating system and, whenever possible, provides solutions or workarounds to those problems.
The following topics are discussed:
Commands and utilities (Section 5.1)
SysMan system management applications (Section 5.2)
System administration (Section 5.3)
Network and communications (Section 5.4)
Local Area Transport (LAT) (Section 5.5)
File systems (Section 5.6)
Logical Storage Manager (LSM) (Section 5.7)
The following notes apply to commands and utilities.
5.1.1 Root Permissions Are Required to Use the Bootable Tape (BT) application
If you attempt
to run either the
btcreate
or
btextract
command from an account that does not have root privileges, it might produce
a TCL dump script.
To avoid this problem, ensure that you always run the bootable tape
commands from an account with root privileges.
5.1.2 Escaped Comment Symbols in a Makefile
The
make
command does not recognize escaped comment
symbols as literal characters in a Makefile.
Comment lines that begin with
a number sign (#) and all text following this symbol up
to the end of the line are considered part of a comment.
This is true even
if the symbol is preceded with a backslash (\).
5.1.3 Editing an HTML File with XEmacs
If you use XEmacs to edit an HTML file, the editor
looks for an entry corresponding to the e-mail ID in an
.emacs
file.
If this file does not exist or if the entry is not
found, XEmacs prompts the user for the e-mail ID and this information is updated
in the
.emacs
file.
5.1.4 Change in the Default root crontab file
In previous releases,
the
cron
daemon periodically cleaned files such as
/var/adm/cron/log
and
/var/adm/messages
by
default.
These programs that performed these tasks have been removed from the
/var/spool/cron/crontabs/root
file.
Therefore the
cron
daemon does not clean up these files by default.
If you want to clean up these files manually, you must first stop the
cron
daemon and truncate the files.
You can stop and restart the
cron
daemon by using the
/sbin/init.d/cron
script.
Note, if you stop the
cron
daemon and there you
have
cron
jobs scheduled to run during that time, they
will not be executed.
5.1.5 Netscape Communicator
The following notes apply to the Netscape Communicator.
5.1.5.1 Netscape Security
Versions of Netscape Communicator less than version 4.75 contain a security vulnerability that could potentially allow unauthorized users read only access to your file system. This vulnerability, known as Brown Orifice, exploits the Navigator components ability to run programs written in the Java Programming Language. If you are using a version of Netscape on Tru64 UNIX that is less than Version 4.75, Compaq highly recommends upgrading to Netscape Communicator 4.75 or later to avoid this security vulnerability.
You can determine which version of Netscape Communicator you are running by click on the Help button in the toolbar at the top of the Navigator component window, then choose the About Communicator option from the drop down menu.
You can download the latest version of Netscape Communicator for Tru64 UNIX from the Netscape Download World Wide Web site located at the following URL:
http://www.unix.digital.com/faqs/publications/pub_page/update_list.html
You can also obtain the latest version from the Compaq Tru64 UNIX World Wide Web site at the following URL:
http://www.tru64unix.compaq.com/internet/download.htm
If you are unable to upgrade to Netscape Communicator 4.75 or later, you can avoid this security vulnerability by disabling the browsers ability to run Java by performing the following steps:
Start Netscape Communicator using the following command:
$/usr/bin/X11/netscape
Using the mouse, click on the Edit button in the toolbar at the top of the Navigator component window.
Click on the Preferences... option on the drop down menu that appears. This displays the Netscape: Preferences dialog box.
In the window pane on the left of the Netscape: Preferences dialog box, click on the Advanced tab. This displays the Advanced Communicator preferences in the dialog box.
If the box next to the Enable Java preference has a check mark in it, click on the box to remove the check mark. This disables the Java Programming Language. Then click on the Okay button in the Advanced preferences dialog box. (Note: if there is not a check mark in the box, you do not need to take any action.)
Exit the Netscape Communicator by clicking on the Exit option in the drop down menu that appears when you click on the File button on the toolbar at the top of the Navigator window.
Disabling Java ensures Netscape Communicator is not vulnerable to the Brown Orifice security problem. Disabling JavaScript is not required to avoid this vulnerability.
If you are using the Japanese or Chinese interfaces provided in the
Worldwide Language Support (WLS) software, you must update the Communicator
version numbers in the
/usr/lib/X11/*/app-defaults/Netscape
file if you choose to upgrade to Netscape Communicator Version 4.75 or later.
If the version numbers in these files do not match the version of Netscape
Communicator installed, it will not run in the Japanese or Chinese locales.
You can download the updated files from the Compaq Tru64 UNIX World Wide
Web site provided earlier in this note.
5.1.5.2 Netscape Communicator Dumps Core Running in CDE
Netscape
Communicator dumps core when the application posts a file selection dialog
(XmFileSelectionBox).
Typically, this occurs when you run
the application in the Common Desktop Environment (CDE) and select the Save
As option in the File pulldown menu of the Navigator browser.
It can also
occur when you select a link to download a file or save an attachment to a
mail message in the Messenger Mailbox component.
To avoid this problem, invoke Netscape using the following script:
/usr/bin/X11/netscape
If you use this script to start Netscape Communicator, the application
displays the file selection dialog within CDE without dumping core.
Use the
-xrm '*nsMotifFSBCdeMode: True'
command line option if you start
Netscape Communicator using some other means.
For more information, see the Communicator on UNIX release notes at the Netscape Web site:
http://home.netscape.com/eng/mozilla/4.0/relnotes/unix-4.0.html
5.1.5.3 Deleting Multiple Mail Messages Causes Netscape Communicator to Dump Core
Deleting multiple mail messages in Netscape Communicator's
Messenger Mailbox component sometimes causes Communicator to dump core.
Usually,
it requires several multiple deletions of mail to make Communicator dump core.
If Communicator does not dump core immediately, deleted messages might reappear
in the mail folder from which they were deleted.
5.1.5.4 Netscape Communicator Dumps Core Intermittently
Netscape Communicator intermittently dumps core and returns the following error in the terminal window from which it is started:
Memory Fault - (core dumped)
This core dump occurs with different hardware and software configurations
and under different circumstances.
Sometimes it hangs for a time, taking most
of the CPU time, then it crashes.
At other times, you must kill the process
and restart the application.
Numerous problems of this nature have been reported.
None are resolved at this time and no workaround is available.
In all cases,
the behavior cannot be reproduced consistently.
5.1.5.5 Cannot Delete Mail Messages from Inbox to Trash When Using IMAP Server
After upgrading from a previous version of Communicator, an IMAP mail user cannot move messages to the Trash folder in the Messenger component. All Delete options in the user interface are insensitive (greyed-out). Setting the Move it to trash folder option in the IMAP mail server preferences window does not work. This behavior is the result of a new feature in Netscape Communicator that might require user customization after upgrading to the latest version.
Starting with Netscape Communicator Version 4.5, the Namespace extension to the standard IMAP protocol is used to locate the users' folders on the IMAP mail server. This feature does not work if you are using an older IMAP server that does not support the Namespace extension to the protocol. Use the following procedure to customize Netscape Communicator to be able to locate a user's Trash folder on an old IMAP server:
Choose the Preferences option in the Edit pulldown menu and choose the Mail and News Servers option in the Preferences window.
Choose the Mail Servers option from the list of Mail and News Servers options.
Choose the IMAP server from the list of servers and click on the Edit button to edit the server configuration.
Choose the Advanced tab in the pop-up dialog box.
Ensure that the Namespace field in the tab reads as follows (quotes and period included):
Namespace: "INBOX."
Click on the OK button in the pop-up window and again in the Preferences window to save the settings.
Exit and restart Communicator.
You can now move messages to the Trash folder and use all the Delete
options.
Because IMAP mail server configurations differ (including the location
of the user's folders on the server), check with your IMAP mail server administrator
if the preceding procedure fails to resolve the problem.
5.1.5.6 Communicator Returns sh: /usr/bin/X11/showps: not found
When you select a link to a PostScript file in the Navigator component of Communicator, the following error message might be displayed:
sh: /usr/bin/X11/showps: not found
The
showps
helper application has been retired from Tru64 UNIX
as a result of licensing changes to Adobe Display PostScript.
The user might
have customized the PostScript Document MIME type to use the
showps
helper application in
$HOME/.mailcap
and
$HOME/.mime.types
files.
To resolve this problem, you must obtain a new PostScript viewer and
reconfigure the helper application for the PostScript Document MIME type in
Communicator.
Use the Edit option in the Edit->Preferences->Navigator->Applications
pulldown menu of Communicator to edit your PostScript Document helper application
and replace
/usr/bin/X11/showps
with the path to your new
PostScript viewer.
5.2 SysMan System Management Applications
The following sections contain notes that apply to restrictions on using
the SysMan system management applications.
5.2.1 Possible Loss of Data When the root File System is Full
When the root file system is full, Sysman applications might not be able to update the system files. This might lead to loss of data or truncated files. Compaq recommends that you ensure that the root file system is not full or nearly full, prior to running Sysman applications.
Also, the
/tmp
directory usually resides on the
root file system.
Therefore you should not run applications that create large
temporary files while you are running Sysman applications.
5.2.2 SysMan Account Manager
You cannot delete a user account by using the SysMan
Account Manager application while the
dxaccounts
application
is running.
If
dxaccounts
is running and you try to delete
a user account by using the SysMan Account Manager application, the following
warning message is displayed:
/etc/.AM_is_running existing
If you continue the delete operation, the Account Manager displays the following error message and the application hangs:
Error: key userName UID not found in /account_management/local _passwd_table
If this occurs, kill the hung process. Look for the following entry in the process table:
sysmansh /usr/share/sysman/menu/tasks/account_management
5.2.3 Tcl Error Can Occur During DNS (BIND) Configuration
During the DNS client configuration, the following steps might result in an Out Of Order Hide Tcl error:
Enter a domain name in Local Domain.
Add DNS servers.
Choose OK in the main window.
Choose Yes to update the system host name to reflect the host name with new domain name.
Choose Yes to add "localhost" to access control list? option.
At this point a Tcl Stack Error can occur. However, the data is not lost.
Because all the data entered by the user is committed by the DNS client
application, kill the DNS client application and restart the DNS configuration
using the SysMan DNS to avoid this problem.
5.2.4 Large Integer Values in Configuration Applications
Entering a very large integer value (on the order of 1019)
in numeric fields in some system configuration applications can cause a stack
trace.
Such large integers are not appropriate values for these applications.
Therefore, this problem is not expected to impede you from configuring
your system.
5.2.5 Error Message When Using sysman -cli -set values Command
If you use the
sysman -cli -set values
command
to change specific values for an existing row in the table defined by the
staticRoutes
group, you might receive an error message.
For example:
#sysman -cli -set values -comp routing -group staticRoutes\"-attr gateway=1.2.3.4 -key1 "dummy system 1.1.1.1"Error: "SYSMAN_NO_DATA" No row exists with the specified key: 'dummy system 1.1.1.1'
If a
row with the defined key is present in the
staticRoutes
group, you can ignore this message.
In any case, to verify that the row
was modified properly, issue the following command:
#sysman -cli -list values -comp routing -group staticRoutes
5.2.6 Problem When Reconfiguring Network Interface Cards
If you use a SysMan
application to reconfigure a network interface card (NIC) and you change the
host name, the
HOSTNAME
variable in the
/etc/rc.config
file is not updated.
If the system has a single network interface card, you can correct this problem by performing the steps in the following procedure. If the system has more than one network interface card and you changed the host name of the primary card (that is, the card with the same host name as the system's host name), do the following to correct the problem:
Use the
rcmgr set HOSTNAME
command to set
the
HOSTNAME
to the correct name.
For example:
#rcmgr set HOSTNAME abcxyz.com
Use the
hostname
command to change the
host name to the correct value in the kernel.
For example:
#hostname abcxyz.com
Use the
xhost
command to add
localhost
to the access control list of the local Xserver,
as follows:
#xhost + localhost
5.2.7 SysMan Command Line Interface
The
-mib
option of the SysMan command
line interface does note work properly.
The
/usr/sbin/sysman -cli
-mib
command generates a Management Information Base file for use
by SNMP applications.
If you use this command, the following error
message is displayed:
ERROR: inrange longer than outrange
The
sysman
configuration and administration utility does not work on
hardware configurations within the following locales:
tr_TR.ISO8859-9
tr_TR.ISO8859-9@ucs4
To avoid this problem, set the
LC_ALL
and
LANG
environment variables to C when you run the
sysman
utility.
5.2.9 NTP Configuration Restriction
If you edit the
/etc/ntp.conf
file manually
and subsequently run the SysMan NTP client configuration utility, your changes
might be lost.
The SysMan NTP client configuration utility understands only a small
subset of the commands that can be used in the
ntp.conf
file.
When the NTP client configuration utility reads the
/etc/ntp.conf
file, it ignores commands it does not understand and it does not
output those commands when rewriting the file.
It also does not allow you
to enter commands it does not understand.
For example, it does not allow you
to enter commands using the
sysman -cli
command.
If you want to configure your system as an NTP sever or your configuration
requires a more complex
ntp.conf
file than SysMan can produce,
edit the
ntp.conf
file manually and do not use the SysMan
utility to modify it.
For more information, see the
Network Administration
guide
and the
ntp.conf(4)
and
xntp.conf(8)
reference pages.
5.2.10 Configuring an NFS Server
When configuring an NFS server, you cannot
leave the Number of TCP server Threads field and the Number of UDP Server
Threads field blank.
If you leave either field blank, the configuration application
will stack trace.
You must specify a number for each field so that the combined
sum is greater than 0 and less than or equal to 128.
5.2.11 Display Problems on Systems with Low-Resolution Graphic Cards
If your system has a low-resolution graphics card and you use large fonts, the images of some graphical applications might be displayed longer than the display area on the monitor. Images that are larger than the display area are truncated at the bottom, often resulting in the buttons being cut off. Some windows in Quick Setup have exhibited this behavior.
To avoid this problem, reduce the size of the font. See the documentation for the window manager you are using. Also, applications with a curses (character) mode fit the screen better than graphical applications using large fonts.
For more information, see
X(1X),
dtstyle(1),
curses(3), and
sysman_intro(8X).
If you are running these applications in Asian locales, see
Section 5.2.12.
5.2.12 SysMan Applications Do Not Work Properly at VGA Resolution
If your monitor is set to VGA resolution (640x480), Quick Setup and other SysMan applications might not work correctly. The problem is that the large fonts used by some locales (for example, Asian locales like Chinese and Japanese) cause dialog boxes to be larger than 640x480 and control buttons like OK and Cancel are no longer accessible. This is a more specific problem than that described in Section 5.2.11 and the workarounds in that note do not work for this problem.
To avoid this problem, you have the following options:
Set the language option to C or other English locales and reenter the desktop before starting the SysMan applications.
Invoke the SysMan applications in terminal mode using a terminal emulator.
If you have DISPLAY set, use the
sysman -menu -ui cui
command.
If you do not have DISPLAY set, use the
sysman
or
sysman -menu
command.
Some graphics cards support increased display resolutions only after the appropriate PowerStorm subsets have been installed. Install the PowerStorm subsets and then run the sysman applications.
The notes in this section apply to the SysMan Menu application.
Also
see
Section 8.10.1
for information related to online help.
5.2.13.1 Installation Branch Hangs When Run in Background
The Install software, List installed software, and Remove installed software
tasks in the Installation branch of the SysMan Menu hang if you run the SysMan
Menu in the background.
Do not run the SysMan Menu in the background if
you plan to use these tasks in Installation branch.
5.2.13.2 Installation Branch Is Not Supported for Clusters
Do not run the SysMan
Menu Installation branch in a cluster environment.
The Install software, List
installed software, and Remove installed software tasks in the Installation
branch of the SysMan Menu do not work on a cluster system.
5.2.13.3 Running the SysMan Menu Standalone on a PC Fails to Launch Tasks
When you run the SysMan Menu from a PC, you might encounter the following problems:
Sometimes multiple logins are required. You are asked for your username and password each time you launch a task.
Sometimes tasks fail to run. No error is displayed. The task window is not displayed.
To avoid these problems, run the SysMan Menu from within the SysMan Station by doing the following:
Start the SysMan Station either from the Start menu or from a web browser.
Choose the Hardware view.
Right click on a host icon and choose the SysMan Station.
5.2.13.4 Manage Local and NIS Users
The Manage local users and Manage
NIS users tasks on the SysMan Menu are front ends for the
useradd,
usermod, and
userdel
commands.
If you use the Manage local users and Manage NIS users tasks to change the
/etc/passwd
file, a warning message is displayed, even though the
operation completes successfully.
However, the changes do not display in
the Manage local users and Manage NIS users tasks dialog boxes.
This happens
in the following cases:
When you are adding or modifying a user and specifying a primary or secondary group that does not exist
When you are adding a user with Create Home Directory enabled but the user's home directory already exists
To correct this problem, exit the task and restart it.
The
correct attributes for the user will be displayed.
5.2.13.5 Display Currently Mounted File Systems
The Sysman menu Display Currently Mounted File Systems option works only in the English version of the operating system. (You can access the Display Currently Mounted File Systems option from the Sysman menu by selecting Storage --> File Systems Management Utilities --> General File System Utilities.)
To avoid this problem, set the
LC_ALL
environment
variable to C before running the
sysman
command.
This forces
the Sysman Menu to work in English.
Restore the
LC_ALL
environment variable to its prior setting when you are done using the Sysman
Menu.
5.2.14 SysMan Station
The notes in this section apply to the SysMan Station.
Also see
Section 8.10.2
for information related to online help.
5.2.14.1 Incorrect Launch Status
SysMan Station checks the status returned
by all the applications that it launches.
A few applications incorrectly exit
with nonzero (failure) status returns even though the tool has launched successfully.
5.2.14.2 Objects Might Not Display Properly with Internet Explorer
Objects might not display properly in SysMan Station View windows when running SysMan Station from a PC using the Internet Explorer web browser. Sometimes objects are overlayed in the upper left-hand corner of the display window.
To correct this problem, select the Show All option from the Action
menu to redraw the display properly.
5.2.14.3 Cannot Restart the Client in a Web Browser
When you run the SysMan Station client from a web
browser, if you exit the Sysman Station and attempt to restart it by returning
to the URL (http://your_machine:2301),
the client will not restart.
You can correct the problem by restarting the browser.
The client will
load properly from the URL.
5.2.14.4 Client 5-Minute Timeout
If you restart the SysMan Station daemon (smsd) while there are active SM Station clients, the clients will
keep an active network connection that times out after 5 minutes have elapsed.
Attempts to use the
/sbin/init.d/smsd start
command during
this 5-minute interval will fail to restart the server because it cannot
access the required network port.
You must wait for the 5-minute timeout
to elapse before you can restart the SysMan Station server.
You can also check to see if any clients are using the network port with the following command:
/usr/sbin/netstat -a | grep 596
If no matches are found, you can restart the
SysMan Station daemon.
5.2.14.5 Physical_Filesystems View Displays Two Disk Objects for LSM File Systems
Two disk objects are displayed in
the Physical_Filesystems view for each file system that uses LSM.
One disk
object represents the LSM private region, the other represents the LSM public
region.
5.2.14.6 Icons Indicating Warning or Failed States
Objects in a failed or warning state are depicted in the SysMan
Station's Hardware view using a red or yellow highlight for the object's icon.
A very small number of objects do not have warning or failed icons.
In this
case, the object's label correctly indicates that it is in a warning or failed
state.
5.2.14.7 Group Icons Are Not Available for Some Objects
When objects are grouped together, a special group icon is used
to represent the grouping.
A small number of objects do not display a group
icon when an object group is formed.
In these instances, the group's label
correctly indicates that the icon represents a group.
5.2.14.8 Multiple AdvFS Volumes Might Not Appear Properly
When multiple volumes are added to AdvFS file domains, the new AdvFS volume objects might not appear in the SysMan Station AdvFS Filesystem and Physical Filesystem view windows.
You can correct this problem by restarting the SysMan Station daemon
(smsd).
To restart the
smsd
daemon,
exit all connected SysMan Station client sessions and issue the following
command:
#/sbin/init.d/smsd restart
5.2.14.9 SysMan Station Does Not Update Changes to Device base_name Dynamically
If you use the
dsfmgr
utility to
change the
base_name
of a device while the SysMan Station
daemon (smsd) is running, any clients connected to the
running daemon will continue to reflect the old
base_name
in their views.
To obtain a correct view, close all open SysMan Station sessions and restart the SysMan Station daemon with the following command:
#/sbin/init.d/smsd restart
If
the system is a member of a cluster, perform these steps on all
affected cluster members.
5.2.14.10 Some Tools Might Fail When Launched From a Group Object
If you launch a tool from a SysMan Station group object, the SysMan Station attempts to invoke an instance of the tool for each object contained in the group. For certain tools, not all instances of the application will launch successfully. An application error or SysMan Station Authentication server core dump might result.
To workaround this problem, do the following:
Close all open SysMan Station sessions.
Enter the following commands:
#/sbin/init.d/smauth restart#/sbin/init.d/smsd restart
On a cluster, perform these steps on all affected cluster members.
5.2.14.11 Unable to Expand the Host Object in a Cluster
The Sysman Station client might occasionally encounter a Java class exception error when a user attempts to expand a Host object.
If you encounter this problem, restart the SysMan Station client and
retry the expand operation.
5.2.14.12 Unable to Select Other Objects After a Vertical Bus Is Selected
If you select a vertical bus within the
SysMan Station Hardware view, you are unable to select any other object in
the view.
If this problem occurs, exit the view and then return to it, or
restart the client.
5.2.15 Configuring Tru64 UNIX from Linux Systems
You can now configure Tru64 UNIX from Linux systems.
The following
section provides information on how to install the SysMan client on these
systems.
5.2.15.1 Installing the SysMan Client on a Linux System
You can configure a system running Tru64 UNIX from a system that is running Linux using Java by performing the following steps:
Download the
/usr/share/sysman/web/classLib/suit.jar
file from the Tru64 UNIX system to your Linux system and
add the full path of that file to your
CLASSPATH
environment
variable.
If you use
csh
and you downloaded the
suit.jar
file to
/usr/local/lib, use the following
syntax:
setenv CLASSPATH $CLASSPATH:/usr/local/lib/suit.jar
If you use
ksh
and you downloaded the
suit.jar
file to
/usr/local/lib, use the following
syntax:
CLASSPATH=$CLASSPATH:/usr/local/lib/suit.jar
export CLASSPATH
Run SysMan Menu with the following command, substituting the name or IP address of your Tru64 UNIX computer for HOST:
java suit HOST sysman
Alternatively, you can run a SysMan task directly by substituting the
accelerator for
sysman.
For example:
java suit HOST ntp_config
You can redirect the standard output to
/dev/null
if you do not want to see the diagnostic messages that SysMan
prints when run in this fashion.
SysMan has been tested on RedHat Linux Version 6.0 and SuSE Linux Version
6.0 on Intel using Version 1.1.7 of the Java Run-time Engine (JRE).
Other
versions of Linux and Java might also work.
5.3 System Administration
The following notes apply to system administration.
5.3.1 Device Naming Changes
Tru64 UNIX Version 5.0 and higher releases provide full support for FibreChannel, SCSI-3, and wide SCSI devices. The implementation of this support required a major change to the Tru64 UNIX device naming scheme. This change has been implemented for all disk and tape devices.
For example, prior to Version 5.0, disks were named as follow:
/dev/rz2X
/dev/rz3X
/dev/rz4X
This naming had encoded within it the bus and Logical Unit Number (LUN)
of the SCSI disk.
For example, disk 0 on bus 0 was
rz0.
Disk 0 in bus 1 was
RZ8, and so on.
As a result Tru64 UNIX
was limited to supporting no more than eight devices per bus, because the
name for any additional devices would collide with other devices.
Wide SCSI supports up to 16 devices per bus; within FibreChannel the number is in the thousands. FibreChannel also allows the LUNs to change dynamically, which the old device naming scheme could not support.
Therefore, in Version 5.0 disk names have the following format:
/dev/disk/dsknx
Tape drives have the following format:
/dev/tape/tapen_dx
(For more information on the formats, see the System Administration guide.)
The new device name will use the world-wide identifier (WWID) of the disk. A disk's WWID is set by the manufacturer for devices that support it and is unique. Therefore, no two disks can have the same WWID.
Using the WWID to identify a disk has two implications:
Once a disk is recognized by the operating system, the disk's
/dev/disk/dskX
name will stay
the same, even if its SCSI address changes.
Tru64 UNIX can support multipathing to a disk where the disk is accessible through different SCSI controllers. Therefore, within a Tru64 UNIX Version 5.0 or higher cluster environment, as disks are moved from one node to another node, the disk names and how they are accessed remains the same.
Tapes devices will reside under the
/dev/tape
directory;
no-rewind tape devices will reside under the
/dev/ntape
directory.
This version of Tru64 UNIX supports the existing device names
as a compatibility option, but the same device cannot be accessed through
both the old and new name at the same time.
The following utilities have been added to enhance the support for device naming and hardware management:
The Device Special File Manager (dsfmgr)
for managing device special file names.
The Hardware Manager (hwmgr) to assist
in device management.
This utility replaces the
scsimgr
utility.
5.3.2 Boot Sequence Stops in Single-User Mode After Core Dump
A problem exists that causes the boot sequence to stop in single-user mode and display the following message:
/sbin/dn_setup: 1048647 Memory fault - core dumped bcheckrc: Device Naming failed boot configure or verify. Please correct the problem and continue or reboot INIT: SINGLE-USER MODE #
This problem is most likely to occur every time you boot systems with Fibre Channel devices or once if you have changed the hardware configuration between boots.
The problem occurs after the
dsfmgr
command successfully
completes during the exit cleanup routines.
Data integrity is not compromised and no corrective action is required,
except to remove the core file from the root directory (/core
or
/core.dsgmgr*).
You can continue the boot process by pressing
[Ctrl/d]
to exit single-user mode or by initiating multiuser mode with the
init 3
command.
Alternatively, you can reboot the system, provided
no Fibre Channel devices are connected to the system.
5.3.3 Account Manager
The notes in this section apply to the Account Manager (dxaccounts) applications.
5.3.3.1 General Restrictions
The Account Manager has the following restrictions on both base security and enhanced security (C2) systems:
Leading and trailing white space is not stripped from text entry areas. This can lead to confusion. For example, if a field in the Find dialog box contains a space character before the desired search string, the search string will not match because of the spurious space character.
Using mouse button 1 (MB1) to drag and drop user accounts, groups, or templates does a copy operation, not a move operation. This is different from the CDE/Motif default in which MB1 performs a drag-and-drop move operation and Shift/MB1 performs a copy operation. For example, if you use MB1 to drag a user account from the Local Users view and drop it in the NIS Users view, you create a copy of that user account in NIS. To avoid this problem, delete the original icon after the copy has been completed.
If you change a user's UID with the Account Manager, the ownership
of the user's files and subdirectories does not change and, under certain
circumstances, the home directory ownership might not change, either.
For
example, if you change the UID of user
johndoe
from 200
to 201, the files and subdirectories under his home directory still belong
to UID 200.
Furthermore, if
johndoe
does not own his home
directory, the ownership of that directory does not change.
To avoid this
problem, use the
chown
command to change the directory
and files, if applicable.
You cannot drag and drop items across different instances of the Account Manager. For example, if the Account Manager A on system 1 and the Account Manager B on system 2 are displayed on the same workstation, then you cannot drag and drop between Account Manager A and B. To avoid this problem, use the copy/paste feature to copy users, groups, or templates from Account Manager A to B. After paste operations, the Paste Errors dialog box might be displayed. You can ignore the error message and click OK to dismiss the dialog box.
Although the Account Manager
correctly allows two or more system administrators to work on the same password
files simultaneously, only one system administrator can use the Account Manager
at a time.
If multiple instances of the Account Manger are run concurrently,
the proper file locking occurs and new accounts can be added or modified.
However, the local groups file,
/etc/group, and the NIS
groups file,
/var/yp/src/group, are written out after modification
of each group.
Therefore, if more than one system administrator is working
on the same file, the last one to change a group's view window overwrites
any prior changes from a different system administrator.
For this reason,
running multiple, concurrent Account Manager instances is not recommended.
5.3.3.2 Account Manager and Enhanced Security
The following problems apply to the Account Manager application when running on systems with enhanced security:
The Lock/Unlock Toolbar and Menu Options are inactive for the Template views. To avoid this problem, change the template lock setting on the Add/Modify Template dialog box after selecting the template by double clicking on the template icon in the Template view icon box.
The Account Manager does not enforce the minimum and maximum
password length limitations when setting passwords.
To avoid this problem,
set passwords by using the
/usr/tcb/bin/dxchpwd
or the
/usr/bin/passwd
command if the minimum and maximum password length
limitation is necessary.
When you rename a user account by changing the Username field of the Add/Modify User dialog box in Modify mode, the protected password database entry for the old name does not change. To avoid this problem, use the following command to remove the dangling protected password database entry:
#/usr/tcb/bin/edauth -ruser name
Do not rename a template by changing the Template name field of the Add/Modify Template dialog box in Modify mode. The Account Manager creates a new template without removing the old template, but renames the old template's icon from the Icon Box. To avoid this problem, restart the Account Manager to restore the former template icon. Use the Delete Toolbar icon or the Edit->Delete... option from the Template view to delete the undesired template.
Accounts and templates inherit their settings either from locally defined values in their protected password database entry or from the templates that they reference. All accounts and templates implicitly reference a default template that is not served by the Network Information Service (NIS). This creates an inconsistency for the Account Manager when displaying NIS user accounts and templates on an NIS master. The user and template values displayed might be the default template values of the NIS master. When an NIS user logs in to an NIS client, the NIS client's default template might be different from the NIS master's default template. The client's default template is used to establish the user's account settings.
When you use drag and drop to copy a user account on a different view, the user's template references are copied by value. This means that the template itself is no longer referenced by the new account. Instead, the template's values are contained directly in the new user's protected password database entry. For example, assume the local user Joe has an account based on the developers template. If you drag and drop Joe's account from the Developers view into the NIS Users view, the attributes from the developers template are placed into the protected password database entry for Joe's account. This preserves Joe's developer attributes and overrides any corresponding attributes from the default template for NIS users. To avoid this problem, modify the copied user's account and change the template from the default to the desired template. Note that the template reference is maintained if the user account is dropped within the same view.
After deleting a template, the NIS maps are not remade. Therefore, you will have to manually remake the NIS maps or perform an Account Manager function (for example, Account Modification) that will remake the maps. To manually remake the maps, do the following:
#cd /var/yp#make all
5.3.4 EISA Configuration Utility Revision Requirements
For Tru64 UNIX
and its software supplements, the supported version
of the EISA Configuration Utility (ECU) is Version 1.10 or higher.
If your
system is configured with an EISA bus, update the ECU to this
supported version.
5.3.5 Alternate Root Installation May Change Host File Dates
During an alternate root installation of base operating
system subsets, such as is done using the
dmu
utility to
set up a Dataless Management Services environment, the file access dates on
some of the files in the host server's file system might be changed to correspond
to those from the subset's file inventory.
When the release installed into
the alternate root is different from that installed on the host system, these
changed dates appear invalid because they may be newer (or older)
than the actual file dates from the host system's installation kit.
This occurs when the
pax
utility is invoked by the
setld
utility to copy symbolic links from the kit subsets, and the
symbolic links target absolute paths that correspond to actual files in the
host system's file system.
The
pax
utility attempts to
adjust the dates for the symbolic link, but the file system actually adjusts
the dates for the target of the symbolic link.
The changed dates have no operational impact on the host system.
The
content of the affected files is not changed.
However, because the dates
have changed, the behavior of utilities that examine file dates (such as the
find
command or archivers) might be affected.
5.3.6 Compressed Crash Dump Might Display Incorrect Byte Count
If you have full crash dumps enabled on a machine with more than 2 GB of memory, the compressed crash dump message will display the number of bytes as less than zero. If a machine has over 4 GB of physical memory, the displayed value will overflow. For example:
DUMP: Will attempt to compress -688128 bytes of dump
: into 3927949296 bytes of memory.
This problem is an
artifact of the 32-bit integer math used in the
printf()
code that generates the message.
It does not affect the results of the crash
dump.
5.3.7 The dxkerneltuner Application Dumps Core
The
dxkerneltuner
application dumps core if
you select
vm
from the list of loadable kernel subsystems.
To avoid this problem, do not select
vm
from the list of loadable kernel subsystems.
Instead, use the
sysconfig
command line interface to modify the
vm
subsystem.
For more information see the
sysconfig(8)
reference page.
5.3.8 Prestoserve Restriction on Devices Larger than 1 TB
The Prestoserve
product has a restriction in its ability to cache blocks on a device that
is larger than 1 TB.
This applies both to physical devices (RAID) and logical
devices (LSM).
Any device that is larger than 1 TB can be cached via the
Prestoserve product but blocks with an address that exceeds the 1 TB boundary
will not be cached.
5.3.9 Possible Error Updating /etc/doprc
If you use the
dop -W
command
and the following error occurs, unset the DISPLAY variable:
Error occurred trying to update /etc/doprc:
Dop_write_actions verbose ; Dop_update_binary /etc/doprc
child process exited abnormally
5.3.10 Persistent Reservation Error
Under certain circumstances, you can encounter persistent reservation
problems.
If this occurs, see
Appendix B.
5.3.11 Security
The notes in this section have to do with system management and security.
5.3.11.1 Authentication Problem with Multi-Threaded Applications
Third-party applications
that perform user authentication or impersonation from multiple threads, such
as PMDF, will correctly verify a user's group membership only from
the first thread.
All other threads that call the
sia_get_groups
routine receive a failure status.
This can lead to seemingly random
behavior, in which a user's membership in a group of which the user is a legitimate
member is sporadically denied.
5.3.11.2 Security and Compaq Management Agents
The Compaq Management
Agents for Tru64 UNIX is configured by default when you install the operating
system.
Anonymous login to WebAgent applications, enabled by default, allows
nonprivileged users to invoke the Management Agents and view details of any
connected devices in the local area network, although users cannot perform
any operations unless authorized.
Many site security policies strongly discourage
suc h anonymous access.
To disable these agents, use the Compaq Management
Agents Configuration icon on the Monitor ing/Tuning menu.
5.3.11.3 Behavior of useradd, usermod, and userdel Commands
The
useradd
command correctly honors the default administrative lock value found in the
/.sysman/Account_defaults
file.
If the
Account_defaults
file does not exist, the internal default for the
useradd
command is to create locked accounts.
Use the
administrative_lock_applied
extended command-line option to override the default.
In the following
example, the
useradd
command creates a locked account for
foo
regardless of the default value for administrative lock:
useradd -x administrative_lock_applied=1 foo
For base
security, a locked account has the text
Nologin
in the
password field in the
/etc/passwd
file.
If an account
is unlocked and has no password, that account has no value in the password
field.
The account is open and accessible to anyone.
A warning is displayed
if an unlocked account with no password is created.
For enhanced security, all accounts have an asterisk (*)
in the password field in the
/etc/passwd
file, but the
lock flag in the protected password database is correctly set to reflect the
lock status.
As with base security, an unlocked account with no password
is accessible to anyone.
The
usermod
command correctly sets the lock flags
for enhanced security when the
administrative_lock_applied
option is given on the command line.
If you use the
usermod
command to unlock a locked account with no password, a warning is displayed.
The
userdel
command will either retire
or remove accounts on a system running enhanced security.
5.3.11.4 Prevent IP Spoofing Attacks
To detect and prevent
an IP spoofing attack that can potentially result in a denial of service,
configure theifaccess.conf
file to disable
localhost
as a source address.
For all adapters except the local loopback adapter (lo0),
disable incoming packets with a source address of
localhost
(127.0.0.1).
For example, add the following entry to the
/etc/ifaccess.conf
for
tu0:
tu0 127.0.0.1 255.255.255.255 denylog
Then enable access filtering on
tu0:
#ifconfig tu0 filter
Note that
localhost
is
now disabled by default for new installations.
5.3.11.5 Use db_checkpoint for Log Trimming
A customized version of the Berkeley Database (Berkeley DB) is embedded in this version of the operating system to provide high-performance database support for critical security files. The database includes full transactional support and database recovery, using write-ahead logging and checkpointing to record changes.
The
secconfig
utility enables you to create a
cron
job to perform log file trimming; that is, to delete log files
no longer involved in active transactions.
The
db_archive
utility requires a log file checkpoint
to determine when a log file is no longer in use.
Under some circumstances,
security activity may not generate checkpoints for long intervals.
Therefore,
add the following line to the
/var/spool/cron/crontabs/root
before the
db_archive
entry:
/usr/tcb/bin/db_checkpoint -1 -h /var/tcb/files
5.3.12 OSFJAVA Subsets Are Required for Bundled Applications
Java Version 1.1.8-7 is
included with this version of the operating system.
Other versions of Java
are available, however, SysMan Station and other system components
will fail to operate if Java Version 1.1.8-7 is removed.
Therefore, do not
remove Java Version 1.1.8-7 from your system.
5.3.13 Change in struct utmp, struct utmpx, and struct lastlog
To bring them
into compliance with several UNIX and Internet standards, the
struct
utmp,
struct utmpx, and
struct lastlog
structures were updated in Version 5.0.
These changes affect the
/usr/include/utmp.h,
/usr/include/utmpx.h, and
/usr/include/lastlog.h
files:
The time field in the
struct utmp
structure
has changed from a
time_t
structure to a
struct
__ut_timeval
structure (to be consistent with the
/usr/include/utmpx.h
file).
The
ut_host
field size (in the
struct utmp
and
struct utmpx
structures) has
been increased to comply with relevant Internet RFCs.
The
ll_line
and
ll_host
manifest constants in the/usr/include/lastlog.h
file have
changed to allow their sizes to correspond to the
ut_line
and
ut_host
fields in
struct utmp
and
struct utmpx
structures.
These changes also affect the format of the
/var/adm/utmp,
/var/adm/wtmp, and
/var/adm/lastlog
files.
The following conversion programs are supplied:
/usr/lbin/wtmpconvert
/usr/lbin/llconvert
The programs enable you to convert your existing
/var/adm/wtmp
and
/var/adm/lastlog
files to the new format
or convert new format files to the old format for use by existing programs.
See the corresponding reference pages for more information.
5.3.14 Argument Size Limit for the exec System Call
The amount
of memory used by the arguments to the
exec
system call
is limited by
sysconf(_SC_ARG_MAX), which is about 38
KB.
You can exceed this limit systemwide by setting the
exec_disable_arg_limit
argument in the
sysconfigtab
file to 1 as follows:
#sysconfig -r proc exec_disable_arg_limit=1
When you set this argument to 1, the limit becomes an
amount that is slightly less than the maximum stack size for the process,
which is typically 8 MB or more.
When you set the
exec_disable_arg_limit
argument to 1,
sysconf(_SC_ARG_MAX)
incorrectly
reports that the limit is 38 KB.
However, programs that rely on this value
will not be limited to 38 KB and will function normally.
It is unlikely that programs will require more than 38 KB of memory;
however, test suites that test this limit and expect an error return when
sysconf(_SC_ARG_MAX)
is exceeded will not obtain their expected
result.
If you are running test suites that expect an error return when this
limit is exceeded, leave the
exec_disable_arg_limit
argument
set to 0.
Otherwise, it is recommended that you set this argument to 1.
5.3.15 Startup Messages Lost in Large Configurations
On systems that display
a large number of console messages at system initialization (typically, systems
configured with a large number of devices), some messages may be missing from
the
/var/adm/messages
file.
You can correct this problem
by increasing the size of the kernel's message buffer.
Use either of the following procedures to change the buffer size. You must be root to make the change.
To change the buffer size using graphical administration tools, use the following steps:
Start the
dxkerneltuner
application.
Select the
generic
subsystem.
Set the Boot Time Value entry for the
msgbuf_size
attribute to the new value.
Apply the change before exiting.
To change the buffer size from the command line, use the following steps:
Create a temporary file,
/tmp/msgbufsize,
containing the following lines, but replacing the 32768 with the size appropriate
for your system:
generic: msgbuf_size = 32768
Enter the following command:
%sysconfigdb -f /tmp/msgbufsize -m
If a different entry is present in the database,
sysconfigdb
displays a warning message to advise you of the change in size.
The increase takes effect at the next system reboot. After rebooting, you can verify the change by entering the following command:
%sysconfig -q generic | grep msgbuf_size
Note
The default size of the message buffer is 4 KB, and the example above sets it to 32 KB. Because the space used by the buffer is not returned for general use after initialization, set the size only high enough to correct the problem.
See the
System Administration
guide for information on changing
the buffer size.
5.3.16 Hardware Manager Incorrectly Reports the Presence of the Keyboard and Mouse
If you boot a system with no keyboard and no mouse, the system
incorrectly registers default keyboard and mouse information with the hardware
manager, and displays keyboard0 and mouse0 when you view the hardware
hierarchy.
This information is not correct and will not match the correct
information reported by the
sizer
command.
To view the correct information use the
sizer -wk
and
sizer -wm
commands.
5.3.17 Compaq Management Agents for Tru64 UNIX (Compaq Insight Manager)
This section provides information on the Compaq Management Agents for Tru64 UNIX
(formerly, Insight Manager).
5.3.17.1 Software Notes
The following notes apply to the Compaq Management Agents for Tru64 UNIX software:
The configuration of SNMP for Threshold Set Operations is described in the Best Practice document titled Configuring SNMP for Threshold Set Operations on the Compaq Management Agents, which is available from the following URL:
http://www-unix.zk3.dec.com:8083/faqs/publications/best_practices/
Threshold Subagent Support for Alarm Types
The Compaq Management Agents Threshold subagent supports SNMP Set operations, but they are not supported by the other Compaq Management Agents subagents.
In this release the Threshold subagent supports the following alarm configurations:
| cpqMeAlarmSampleType | cpqMeAlarmStartupAlarm |
absoluteValue |
risingAlarm |
absoluteValue |
fallingAlarm |
absSuppressRisingTrap |
fallingAlarm |
absSuppressFallingTrap |
risingAlarm |
The following alarm types are not supported:
| cpqMeAlarmSampleType | cpqMeAlarmStartupAlarm |
absoluteValue |
risingOrFalling |
deltaValue |
rising |
deltaValue |
falling |
deltaValue |
risingOrFalling |
The Compaq Management Agents System Board web page displays CPU cache and memory module information from AlphaServers supporting FRU Version 4.0 and Version 5.2 configuration tables only.
The bus information displayed by the Compaq Management Agents System Information and System Board web pages might be incorrect or incomplete. Some system bus types supported by AlphaServer platforms are not currently supported by Compaq Management Agents.
The following problems exist in the current version of the Compaq Management Agents:
SysMan, the Configuration Report Management Modules, or the Compaq Management Agents might not complete their initialization. Therefore, their respective icons might not be displayed on the Device Home Page.
Another possible result is that the icons might be displayed correctly, but clicking on them results in an HTTP Server 404 (Not Found) error.
To remedy either of these situations, log in as root to stop and then
restart the Compaq Management Agents daemon,
insightd,
manually, as follows:
#/sbin/init.d/insightd stop#/sbin/init.d/insightd start
The Compaq Management Agents
Device Discovery web page (http://machine:2301/cpqdev.htm)
might show inconsistent or incorrect data on some platforms, as active discovery
is not fully functional.
The Compaq Management Agents XE Servers might not
be displayed on the Device Discovery Page.
On some browsers, the login dialog box, which consists of text fields for Name and Password, opens with the initial focus on the Password text field.
Using Netscape to set File System usage thresholds for Compaq Management Agents from Tru64 UNIX might result in visual display problems. Dragging the triangle shaped indicators leaves a trace on the bar graphs. You can correct this problem by reloading the frame.
The Compaq SCSI subagent returns incorrect values for disk read and write statistics. The statistics are calculated once, when the subagent is started.
The Compaq SCSI subagent might not return the total capacity for SCSI RAID arrays.
Compaq Management Agents software does not support partitioned memory on the AlphaServer GS140 platform. The System Board web page displays information about all hardware memory modules, instead of only those modules configured for the partition in which Compaq Management Agents software is running.
The introductory paragraph for the Compaq Management Agents Configuration application's online help should read:
The additional sentence currently in the online help regarding specifying passwords is not appropriate in this release.
The notes in this section apply to the Event Manager (EVM).
5.3.18.1 Event Viewer and evmget Display a Message When the binlog File Is Invalid
If the binary error log file,
/var/adm/binary.errlog, contains invalid log entries, an error message similar to the
following is displayed when you run
evmget:
binlog2evm: Invalid event data encountered at offset 80216
binlog2evm: Error occurred while reading from
"/.local../usr/var/adm/binary.errlog"
binlog2evm: Skipped invalid data - restarted at offset 85248
If you see this message, follow your normal investigation and reporting procedures to determine the source of the corruption.
A short-term solution to prevent the message from being displayed is
to redirect
stderr
to
/dev/null.
If you are certain that the error log is properly backed up and does
not contain required event information, you can permanently remove the invalid
data by cleaning up the log file as described in the directions
in the
binlogd(8)
reference page.
Note that this operation removes the log
file and creates a new one.
Because two generations of the error log are
held, the message continues to be displayed until you run the cleanup procedure
twice.
5.3.18.2 EVM Reports Kernel Messages with Critical Priority
EVM reports all messages that are posted from the
kernel through the
syslog
event facility as having critical
priority.
This incorrectly includes many informational messages that are posted
when you start the system.
5.3.18.3 EVM Fails to Detect syslogd and binlogd During Boot
Occasionally, EVM displays either or both of the following messages on the console:
S97evm: Communication with syslogd is not functioning
S97evm: Communication with binlogd is not functioning
In
most cases, communication with
syslogd
and
binlogd
works correctly.
The
S97evm
script subscribes
to
binlog
and
syslog
events and then
posts a
syslog
and
binlog
event.
The
S97evm
script expects to see the events it just posted, but a synchronization
issue in the script might cause the posted events to be missed.
As a result,
the script times out and outputs the error messages.
You can correct this problem by modifying the sleep time-out parameter
in the
/sbin/rc3.d/S97evm
script by changing
sleep 1
to
sleep 3.
Then rerun the script by
executing the
/sbin/rc/3.d/S97evm start
command.
5.4 Network and Communications
The following notes apply to network and communications software.
5.4.1 The autofsd Utility
The following problems
can occur when using the
autofsd
utility:
A problem can occur with certain busy file systems if you
stop and restart the
autofsd
utility without bringing the
system to a halt.
Hierarchical direct map entries specify file systems to be mounted and
unmounted together; however, the
autofsmount
program currently
does not enforce this rule.
If the hierarchy is only partially unmounted,
when the
autofsd
utility starts, these unmounted subentries
are not automatically available again.
To avoid this problem, unmount the rest of the submounts (those that
were busy), unmount the intercept point, and run the
autofsmount
program again to reinstall the intercept points.
Local and remote mounts do not always work together in a hierarchical
map entry.
For example, in the following direct map entry,
lcl
represents the local system and
remote
represents a remote
system:
/dir1 / remote:/a/b /subdir1 lcl:/c/d
The intention of this direct map is to mount
remote:/a/b
on
/dir1, and to mount
lcl:/c/d
on
/dir1/subdir1.
The
remote:/a/b/subdir1
directory
should already exist, but the
autofsd
utility serves local
file systems by using symbolic links.
In this example, the
autofsd
utility needs to convert
remote:/a/b/subdir1
to a symbolic link, which it cannot do.
To avoid this problem, move the data of
lcl:/c/d
to
remote:/a/b/subdir1
and delete the last line from
the map entry.
5.4.2 The rcinet stop inet Command Stops IPv6 Communications
Issuing the
/usr/sbin/rcinet stop inet
command
marks all network interfaces as down.
Therefore, applications that use IPv6
will be unable to transmit messages through the interfaces.
5.4.3 Mail
This section provides information on problems that can occur when configuring
and running mail on your systems.
5.4.3.1 The mailcv -I -t and -M -t Commands Do Not Work As Expected
If
you are converting a
dtmail
folder hierarchy to IMAP, or
you are converting a single folder that does not already exist in the IMAP
hierarchy, you receive the following error message and the conversion of the
hierarchy stops:
Mailcv: Can?t create output file {foldername}, ignoring conversion.
foldername is the new name of the folder.
Use Netscape to migrate your folders to IMAP as follows:
Set the Local Mail folder to point to the directory that contains
the
dtmail
folder hierarchy.
From the Preferences menu, choose the Mail & Newsgroup subtree, then select Mail Servers.
Choose the Local Mail Directory and change the directory to the UNIX folder directory you want to convert.
Choose OK and restart Netscape.
Choose the Netscape Messenger window to display your mail folders. Drag and drop the mail folders from the local folders to the IMAP folders or select all the messages in a folder and use the move command to move all the messages to the IMAP folder.
If you are converting
dxmail
or MH mail to IMAP folders,
you receive the following error message:
Mailcv: Can?t create output file {foldername}, ignoring conversion.
foldername is the new name of the folder.
To migrate
folders from
dxmail
or MH mail folders to IMAP, do the
following:
Migrate the folders to UNIX style by using the
mailcv
command with the
-A
option.
Use Netscape, as described in the previous procedure, to migrate the UNIX mail folders to your IMAP folders.
5.4.3.2 IMAP Server: Preserving Uppercase User Names
If your system is configured as an IMAP server and you want to preserve uppercase for user names, do the following:
Add the
F=u
flag for IMAP mailer in your
sendmail
configuration file.
Edit the
/var/adm/sendmail/sendmail.cf.pd
file and
/var/adm/sendmail/sendmail.m4
file (if it exists)
before you run either the
mailsetup
script or
mailconfig
application.
Search for the line with
Mimap
and add the
u
flag to its
F=
option.
The original line appears
as follows:
Mimap, P=/usr/bin/deliver, F=nsmFDM, S=10, R=20/50, A=deliver $u
After you update the line, it should appear as follows:
Mimap, P=/usr/bin/deliver, F=nsmFDMu, S=10, R=20/50, A=deliver $u
If you have already configured
sendmail
using either the
mailsetup
script or the
mailconfig
application, apply these changes to the
/var/adm/sendmail/sendmail.cf
file in addition to the
/var/adm/sendmail/sendmail.cf.pd
and
/var/adm/sendmail/sendmail.m4
files.
5.4.3.3 sendmail Warning Message
The
permissions on the
/var
directory do not satisfy the
checks by the sendmail binary.
The
sendmail
utility expects
the permission of the
/var
directory to be 755.
However,
the permissions are 775.
Therefore,
sendmail
logs the following warning message in the
syslog
file every
time it checks the mode of the
/var
directory:
WARNING: writable directory /var/adm/sendmail
This
does not impact the functionality of
sendmail, so you can
ignore this warning.
If you want, you can change the permissions on the directory
to 755 by logging in as root and entering the following command:
#chmod go-w /var
5.4.3.4 Problem Starting the sendmail Daemon
If you manually edit the
/var/adm/sendmail/sendmail.cf
file and there are errors in the file, the Sendmail startup script
might display a message that the daemon started when it has not.
To verify whether the
sendmail
daemon has actually
started, issue the following command:
#ps -aef | grep sendmail
If
the
sendmail
process is not present, check the
/var/adm/syslog.dated/current/mail.log
file for any errors associated
with the start of the daemon.
Correct any errors recorded in this
file before starting the
sendmail
daemon again with the
following command:
#/sbin/init.d/sendmail start
The following notes apply to Local Area Transport (LAT).
5.5.1 Duplicate Minor Numbers and latsetup
The
latsetup
utility sometimes creates
devices with duplicate minor numbers.
If you manually create LAT BSD devices
that do not match the valid BSD
tty
name space convention,
latsetup
can create devices with duplicate minor numbers.
For example,
creating device
tty0
with a minor number 2 instead of 1
can cause this problem.
5.5.2 Simultaneous llogin Connections
When doing a number of simultaneous
llogin
connections, use
llogin
with the
-p
option.
To speed up an
llogin
connection, add the target
host name as a reserved service.
5.6 File Systems
The notes in this section apply to file systems.
5.6.1 Advanced File System (AdvFS)
The following notes discuss features, problems, and restrictions of
the Advanced File System (AdvFS).
5.6.1.1 AdvFS Clones Cannot Be Opened for Direct I/O
AdvFS clones cannot be opened for direct
I/O (O_DIRECTIO).
If you attempt to open AdvFS clones for
direct I/O, the
open(2)
system call returns an
EINVAL
error code.
5.7 Logical Storage Manager
The following notes describe problems and restrictions of the Logical
Storage Manager (LSM).
5.7.1 Using LSM rootvol Requires sysconfigtab Parameters
If you use the LSM
rootvol
volume for the root file system and the
swapvol
volume
is in use as a primary swap volume, LSM adds the following entries to the
/etc/sysconfigtab
file to enable it to become root:
lsm: lsm_rootdev_is_volume=1
If these entries are deleted or if the
/etc/sysconfigtab
file is deleted, the system will not boot.
If
this happens, you can boot the system interactively as follows:
>>>boot -fl i......... .........Enterkernel_name option_1 ... option_n:vmunix lsm_rootdev_is_volume=1
Use the
sysconfigdb
utility to add the LSM entries
as shown previously to the
/etc/sysconfigtab
file after
the system boots.
Then, reboot the system for the changes to take effect.
5.7.2 Cannot Enable Logging on RAID 5 Volumes Using the LSM Bottom-Up Commands
You
can create RAID 5 volumes using either the LSM top-down or bottom-up
commands.
However, you cannot enable logging using the bottom-up commands,
such as
volsd aslog, to associate a log subdisk to a plex
or
volplex att
to attach a logging plex to a RAID 5 volume.
The
volassist
top-down command does work.
Therefore,
use the
volassist addlog
command to add logging to RAID
5 volumes.
Note that if you create a RAID 5 volume using the
volassist
make
command, logging is configured and enabled automatically.
5.7.3 LSM Dirty Region Logging (DRL) Cannot Be Used with rootvol
LSM Dirty Region Logging (DRL) cannot be used with a mirrored
rootvol.
If a system with a mirrored
rootvol
is not brought down cleanly, the system automatically recovers the
rootvol
by doing a complete resynchronization.
Attaching a logging
subdisk might degrade the
rootvol
write performance with
no benefit in recovery time.
5.7.4 LSM Initialization Hangs When Accessing Failed Fibre Channel Devices
Due to a problem with error recovery on failed Fibre Channel devices, systems might block for long periods of time while booting during the LSM startup. The system might appear to be deadlocked during the boot after the starting LSM message, but the system will complete the boot process after the device driver error recovery times out. This might take some time and will take longer on clusters with more members or more failed Fibre Channel devices.
A similar delay might occur when attempting to operate on failed devices, for example, importing a diskgroup with a failed disk.
If this problem occurs, either remove (delete) or replace and recover the failed Fibre Channel devices so that all Fibre Channel units are available at boot time. There should be no unreasonable delays during normal operations or LSM I/O, only booting (LSM initialization) and other operations on failed disks are affected. If you cannot remove the failed units from the system prior to booting, the system will boot; however, it will take longer than expected.