cdesktopenv/cde/lib/DtSearch/tiny.txt

11895 lines
354 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# $XConsortium: tiny.txt /main/2 1996/11/11 11:33:03 drk $
mknfsexp Command
Purpose
Exports a directory to NFS clients.
Syntax
/usr/etc/mknfsexp -d Directory [ -t { rw | ro | rm
-h HostName [ , HostName ... ] } ] [
-a UID ] [ -r HostName [ , HostName
... ] ] [ -c HostName [ , HostName ... ] ] [ -s | -n ]
[ -I | -B | -N ]
Description
The mknfsexp command takes the flags and parameters specified and
constructs a line that is syntactically correct for the
/etc/exports file. If this command is invoked
with the -B flag, an entry will be added to the /etc/exports file
and the exportfs command is invoked to export the directory
specified. Alternatively, the -I flag adds an entry to the
exports file and does not export the directory,
or the -N flag does not add an entry to the exports file but does
export the directory.
Flags
-d Directory Specifies the directory that is to be exported or
changed.
-t Type Specifies whether the directory is read-write, read-only,
or read-mostly.
rw Exports the directory read-write. This is the system default.
ro Exports the directory read-only.
rm Exports the directory read-mostly. If chosen, the -h option
must be used to specify the hosts that have read-write permis-
sion.
-h Hostname [ , HostName ] ...
Specifies which hosts have read-write access to the directory.
This option is valid only when the exported file is to be read-
mostly.
-a UID Uses the UID parameter as the effective user ID only if a
request comes from an unknown user. The default value of this
option is -2.
Note: Root users (uid 0) are always considered unknown by the NFS
server, unless they are included in the root option. Setting the
value of UID to -1 disables anonymous access.
-r HostName [ , HostName ] ...
Gives root users on the specified hosts access to the directory.
The default is for no hosts to be granted root access.
-c HostName [ , HostName ] ...
Gives mount access to each of the clients listed. A client can
either be a host or a netgroup. The default is to allow all
hosts access.
-s Requires clients to use a more secure protocol when accessing
the directory.
-n Does not require the client to use the more secure protocol.
This flag is the default.
-I Adds an entry to the /etc/exports file so that the next time
the exportfs command is invoked during system restart, the direc-
tory will be exported.
-N Does not add an entry to the /etc/exports file but the exportfs
command is invoked with the correct parameters so that the direc-
tory is exported.
-B Adds an entry to the /etc/exports file and the exportfs command
is executed to export the directory. This flag is the default.
Examples
1. To export a directory with read-only permission, enter:
mknfsexp -d /usr -t ro
In this example, the mknfsexp command exports the /usr directory
with read-only permission.
2. To export a directory with read-mostly permission and a secure
protocol to specific hosts, enter:
mknfsexp -d /u/guest -t rm -h bighost,littlehost -s
In this example, the mknfsexp command exports the /u/guest direc-
tory with read-mostly permission and a more secure protocol is
used.
3. To export a directory with read-write permission to a specific
netgroup and specific hosts, and to make the export effective on
the next system restart, enter:
mknfsexp -d /usr -t rw -c host1,host3,grp3 -I
In the above example, the mknfsexp command exports the /usr
directory and gives read and write permission to host1, host2,
and grp3. The -I flag makes this change effective on the next
system restart.
Implementation Specifics
This command is part of NFS in Network Support Facilities in Base
Operating System Runtime.
File
/etc/exports Lists the directories that the server can export.
Suggested Reading
Prerequisite Information
Glossary Terms: client, default, directory, export, flag,
host, parameter, protocol, root user, server.
For more information about NFS, see Network File System (NFS)
Overview for System Management.
Related Information
The chnfsexp command, exportfs command, rmnfsexp command.
How to Export a Directory Using NFS.
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.
rmuser Command
Purpose
Removes a user account.
Syntax
rmuser [ -p ] Name
Description
The rmuser command removes the user account identified by the
Name parameter. All attributes defined for the
user are removed, but the user's home directory and files owned
by the user are not deleted. The user name must already exist as
a lower case, alphanumeric character string of 8 characters or
less that begins with an alphabetic character, and cannot be the
ALL or default keywords. If the -p flag is
specified, the rmuser command also removes passwords and other
user authentication information from the /etc/security/passwd
file.
Only the root user can remove administrative users, those users
that have the admin attribute set to true in the
/etc/security/user file.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit rmuser
Flag
-p Removes user password information from the /etc/security/passwd
file.
Security
Access Control: This command should grant execute (x) access only
to the root user and members of the security group. The command
should have the trusted computing base attribute and run setuid
to the root user to access the user database.
Files Accessed:
Mode File
rw /etc/passwd
rw /etc/security/passwd
rw /etc/security/user
rw /etc/security/limits
rw /etc/security/environ
rw /etc/security/audit/config
rw /etc/group
rw /etc/security/group
Auditing Events:
Event Information
USER_Remove user
Examples
1. To remove the user davis account and its attributes from the
local system:
rmuser davis
2. To remove the user davis account and all its attributes, in-
cluding passwords and other user authentication information in
the /etc/sec/passwd file, enter:
rmuser -p davis
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/rmuser Specifies the path to the rmuser command.
/etc/passwd Contains the basic attributes of users.
/etc/security/passwd Contains password information.
/etc/security/limits Defines resource quotas and limits for each
user.
/etc/security/user Contains the extended attributes of users.
/etc/security/environ Contains environment attributes of users.
/etc/security/audit/config Contains audit configuration informa-
tion.
/etc/group Contains the basic attributes of groups.
/etc/security/group Contains the extended attributes of groups.
Suggested Reading
Prerequisite Information
The following glossary entries: access, attribute, authentica-
tion, character, character string, group, home directory,
keyword, parameter, password, path, program, root user,
setuid, system, user.
Security Introduction describes the identification and authenti-
cation of users, discretionary access control, the trusted com-
puting base, and auditing.
Related Information
The chfn command, chgrpmem command, chsh command, chgroup
command, chuser command, lsgroup command, lsuser command,
mkgroup command, mkuser command, passwd command,
pwdadm command, rmgroup command, setgroups command,
setsenv command.
mkclient Command
Purpose
Uncomments the entry in the /etc/rc.nfs file for the ypbind dae-
mon and starts the ypbind daemon to configure a client.
Syntax
/usr/etc/yp/mkclient [ -I | -B | -N ]
Description
The mkclient command uncomments the entry to the /etc/rc.nfs file
to start the ypbind daemon to configure a client. The mkclient
command starts the ypbind daemon by using the appropriate System
Resource Controller (SRC) command.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit mkclient
Flags
-I Uncomments the entry for starting the ypbind daemon to the
/etc/rc.nfs file. This entry causes the ypbind
daemon to start during the next system restart.
-B Uncomments the entry to the /etc/rc.nfs file and starts the
ypbind daemon. This flag is the default.
-N Causes the startsrc command to start the ypbind daemon. This
flag does not affect the /etc/rc.nfs file.
Example
To modify the /etc/rc.nfs file so that the ypbind daemon is
started on the next system restart, enter:
mkclient -I
Implementation Specifics
This command is part of NFS in Network Support Facilities in Base
Operating System Runtime.
Files
/etc/yp/domainname directory Contains the NIS maps for the NIS
domain.
/etc/rc.nfs Contains the startup script for the NFS and NIS dae-
mons.
Suggested Reading
Prerequisite Information
Glossary Terms: daemon.
For information about managing NIS, see Network Information Ser-
vice (NIS) Overview for System Management.
Related Information
The mkmaster command, rmyp command, smit command, startsrc
command.
The ypbind daemon, yppasswdd daemon, ypserv daemon, ypupdated
daemon.
Network File System (NFS) Overview for System Management.
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.
System Management Interface Tool (SMIT) Overview, System
Resource Controller Overview.
rmsnaobj Command
Purpose
Deletes one or more aliases, profiles, or combination and all the
objects' aliases from the SNA configuration database.
Syntax
rmsnaobj -t ObjectType ProfileName ProfileName ...
Description
The rmsnaobj command deletes one or more aliases, profiles, or
combination and all the objects' aliases from the SNA configura-
tion database. When called with an ObjectType and ProfileName
that refer to an alias, this command removes that alias
from the SNA configuration database.
When called with an ObjectType and ProfileName that refer to a
profile that may be removed, rmsnaobj command removes the profile
and all its aliases from the SNA configuration database. The
ProfileName parameter specifies the name of the alias or
profile to be deleted. Default and special profiles, which are
required for the successful execution of SNA, cannot be removed.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit rmsnaobj
Flags
-t ObjectType Specifies the profile type of the alias or profile
to be deleted.
Example
You have connection profiles named CONNECT1, CONNECT2, and
CONNECT3. THREE is an alias for CONNECT3.
You have local LU profiles named LOCAL1 and LOCAL2. LU2 is an
alias for LOCAL2. You wish to remove the connection profile
CONNECT2, the local LU profile LOCAL2, and the
THREE alias from CONNECT3. Removing LOCAL2 also removes the LU2
alias. Enter the following commands:
rmsnaobj -t connection CONNECT2 THREE
rmsnaobj -t local_lu LOCAL2
Implementation Specifics
This command is part of AIX Systems Network Architecture Ser-
vices/6000.
This command is not available for Japanese Language Support.
Files
/usr/bin Directory in which the rmsnaobj command resides.
Suggested Reading
Related Information
The mksnaobj command, chsnaobj command.
The System Management Interface Tool (SMIT) Overview.
mknfs Command
Purpose
Configures the system to run NFS.
Syntax
/ust/etc/mknfs [ -I | -N | -B ]
Description
The mknfs command configures the system to run the NFS daemons.
The mknfs command adds an entry to the inittab file so that the
/etc/rc.nfs file will be executed on system res-
tart.
Flags
-I Adds an entry to the inittab file to execute the /etc/rc.nfs
file on system restart.
-N Executes the /etc/rc.nfs file to start the NFS daemons immedi-
ately. When started this way, the daemons run until the next
system restart.
-B Adds an entry to the inittab file to execute the /etc/rc.nfs
file on system restart. The mknfs command also executes the
/etc/rc.nfs file immediately to start the NFS
daemons. This flag is the default.
Implementation Specifics
This command is part of NFS in Network Support Facilities in Base
Operating System Runtime.
Files
inittab Controls the initialization process of the system.
/etc/rc.nfs Contains the startup script for the NFS and NIS dae-
mons.
Suggested Reading
Prerequisite Information
Glossary Terms: configure, daemon, default, flag.
For more information about NFS, see Network File System (NFS)
Overview for System Management.
Related Information
The chnfs command, mknfsexp command, mknfsmnt command, rmnfs
command.
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.
How to Set Up NFS on Your Network .
psrev Command
Purpose
Reverses the page order of a PostScript file and selects a page
range for printing.
Syntax
psrev [ -R ] [ -s Pagespec,... ] [ File ]
Description
The psrev command reverses the page order of the file specified
by the File variable and prints the pages specified by the
Pagespec parameter. The psrev command writes
the resulting file to the standard output.
Note: The file specified by the File variable must conform to the
PostScript file structuring conventions.
If no File variable is specified, the psrev command reads from
standard input.
Flags
-R Does not reverse the page order (but subsets the pages if
specified).
-sPagespec Specifies a range (or several ranges) of pages to be
printed. The Pagespec parameter is a string, not containing
spaces, of the following form:
Pagespec,...
The Pagespec parameter may be a single page number or a range of
the form N-M, which prints pages N through M. -N prints from the
beginning of the document to page N. M- prints from page M to
the end of the document.
Files
/usr/tmp/RV* Contains the temporary file if the input is a pipe.
Related Information
The enscript command.
usrck Command
Purpose
Verifies the correctness of a user definition.
Syntax
usrck { -n | -p | -t | -y } {ALL | User . . .}
Description
The usrck command verifies the correctness of the user defini-
tions in the user database files, by checking the definitions for
ALL the users or for the users specified by the User parameter.
If more than one user is specified, there must be a space between
the names. You must select a flag to indicate whether the system
should try to fix erroneous attributes.
The command first checks the entries in the /etc/passwd file. If
you indicate that the system should fix errors, duplicate user
names are reported and removed, but duplicate IDs are reported
only, since there is no system fix. If an entry has fewer than
six colon-separated fields, the entry is reported, but not fixed.
The usrck command next checks specific user attributes in other
files.
A list of all the user attributes follows, with notations stating
which attributes are checked:
admgroups Checks to see if the admgroups are defined in the user
database and, if you indicate that the system should fix errors,
the command removes any groups that are not in the database.
auditclasses Checks to see if the auditclasses are defined for the
user in the /etc/security/audit/config file. If you indicate
that the system should fix errors, the command deletes all the
auditclasses that are not defined in the
/etc/security/audit/config file.
auth1 Checks the primary authentication method. Unless the method
is NONE or SYSTEM, it must be defined in the
/etc/security/login.cfg file and the program at-
tribute must exist and be executable by the root user. If you
indicate that the system should fix errors, it will disable the
user account if an error is found.
auth2 Checks the secondary authentication method. Unless the
method is NONE or SYSTEM, it must be defined in the
/etc/security/login.cfg file and the program at-
tribute must exist and be executable by the root user. There is
no system fix.
core Checks to ensure that the values are sensible. If not, the
command resets the values to 200 blocks, the minimum value.
cpu Checks to ensure that the values are sensible. If not, the
command resets the values to 120 seconds, the minimum value.
data Checks to ensure that the values are sensible. If not, the
command resets the values to 128 blocks (64K), the minimum value.
expires No check.
fsize Checks to ensure that the values are sensible. If not, the
command resets the values to 200 blocks, the minimum value.
gecos No check.
home Checks the existence and accessibility of the home directory
by read mode and search mode. If you indicate that the system
should fix errors, it will disable the user account if an error
is found.
id Checks the uniqueness of the user ID. If you indicate that the
system should fix errors, the command deletes any invalid entry
in the /etc/passwd file.
login No check.
name Checks the uniqueness and composition of the user name. The
name must be an alphanumeric string of not more that 8 charac-
ters, and begin with an alphabetic character. The name cannot be
the ALL or default keywords. If you indicate that the system
should fix errors, the command will disable the user account if
an error is found and delete any invalid entry in the /etc/passwd
file.
pgrp Checks for the existence of the primary group in the user da-
tabase. If you indicate that the system should fix errors, it
will disable the user account if an error is found.
rlogin No check.
rss Checks to ensure that the values are sensible. If not, the
command resets the values to 128 blocks (64K), the minimum value.
shell Checks the existence and accessibility of the shell by exe-
cute mode. If you indicate that the system should fix errors, it
will disable the user account if an error is found.
stack Checks to ensure that the values are sensible. If not, the
command resets the values to 128 blocks (64K), the minimum value.
su No check.
sugroups Checks for the existence of the sugroups in the user da-
tabase files. If you indicate that the system should fix errors,
it will delete all the groups that are not in the database.
sysenv No check.
tpath Checks to ensure that the shell attribute is tagged as a
trusted process if tpath=always. If you indicate that the system
should fix errors, it will disable the user account if an error
is found.
ttys Checks for the existence of the ttys in the user database
files. If you indicate that the system should fix errors, it
will delete all the ttys that do not exist from the user data-
base.
usrenv No check.
If the fix involves disabling a user account, use the chuser com-
mand to re-set the value of the expires attribute to an expired
date and time. You can use the System Management Interface Tool
(SMIT) to run the chuser command by entering:
smit chuser
The root user or a member of the security group can re-enable a
user account by removing the expires attribute or setting the
expires attribute to a future date and time.
The root user's account is not disabled by the usrck command.
Generally, the sysck command calls the usrck command as part of
the verification of a trusted-system installation. If the usrck
command finds any errors in the user database, the root user or a
member of the security group should execute both the grpck com-
mand and the pwdck command.
The usrck command checks to see if the database management pass-
word files (the etc/passwd.dir file and the /etc/passwd.pag file)
are up-to-date or newer than the system password files (the
/etc/passwd file and the /etc/security/passwd
file). If the database management password files are
out-of-date, a warning message appears indicating that the root
user should run the mkpasswd command.
Flags
-n Reports errors but does not fix them.
-p Fixes errors but does not report them.
-t Reports errors and asks if they should be fixed.
-y Fixes errors and reports them.
Security
Access Control:
This command should grant execute (x) access to the root user and
members of the security group. The command should be setuid to
the root user and have the trusted computing base attribute.
Files Accessed:
Mode File
r /etc/passwd
r /etc/security/user
rw /etc/security/group
rw /etc/group
rw /etc/security/limits
rw /etc/security/audit/config
rw /etc/security/login.cfg
Auditing Events:
Event Information
USER_Check user, attribute-error, status
Examples
1. To verify that all the users exist in the user database, and
have any errors reported (but not fixed), enter:
usrck -n ALL
2. To delete from the user definitions those users who are not in
the user database files, and have any errors reported, enter:
usrck -y ALL
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/usrck Specifies the path of the usrck command.
/etc/passwd Contains basic user attributes.
/etc/security/user Contains the extended attributes of users.
/etc/group Contains basic group attributes.
/etc/security/group Contains the extended attributes of groups.
/etc/security/limits Contains the process resource limits of
users.
/ etc/security/audit/config Contains audit system configuration
information.
/etc/security/login.cfg Contains configuration information.
Suggested Reading
Prerequisite Information
The following glossary entries: access, attribute, flag,
group, keyword, parameter, path, root user, setuid, system,
trusted computing base, trusted path, user, value, verify.
Security Introduction describes the identification and authenti-
cation of users, discretionary access control, the trusted com-
puting base, and auditing.
Related Information
The grpck command, pwdck command, sysck command.
arp Command
Purpose
Displays and modifies address resolution.
Syntax
Display ARP Entries
arp { HostName | -a }
Delete an ARP Entry
arp -d HostName
Create an ARP Entry
arp -s HostName Address [ temp ] [ pub ]
Import ARP Entries from Another File
arp -f FileName
Description
The arp command displays and modifies the Internet-to-adapter ad-
dress translation tables used by the Address Resolution Proto-
col. The arp command displays the current ARP entry for the host
specified by the HostName variable. The host may be specified by
name or number, using Internet dotted decimal notation.
Flags
-a Displays all of the current ARP entries. Use the crash com-
mand to look at KMEM or UMUnix variables.
-d HostName Deletes an entry for the host specified by the
HostName variable if the user has root user authority.
-f FileName Causes the file specified by the FileName variable to
be read and multiple entries to be set in the ARP tables.
Entries in the file should be in the form:
Type HostName AdapterAddress [route] [temp] [pub]
where
Type Specifies the type of hardware address as follows:
ether for an Ethernet interface
802.3 for an 802.3 interface
802.5 for a Token-Ring interface
HostName Specifies the remote host.
AdapterAddress Specifies the hardware address of the adapter for
this host as six hexadecimal bytes separated by colons. Use the
netstat -v command to display the local hardware ad-
dress.
route Specifies the route for a Token-Ring interface as defined in
the Token-Ring header.
temp Specifies that this ARP table entry is temporary. The table
entry is permanent if this argument is omitted.
pub Specifies that this table entry is to be published, and that
this system will act as an ARP server responding to requests for
HostName, even though the host address is not
its own.
-s HostName AdapterAddress [temp] [pub] Creates an ARP entry for
the host specified by the HostName variable with the adapter ad-
dress specified by the AdapterAddress variable. The adapter ad-
dress is given as 6 hex bytes separated by colons. The line must
be in the following format:
Type HostName AdapterAddress [route] [temp] [pub]
where
Type Specifies the type of hardware address as follows:
ether for an Ethernet interface
802.3 for an 802.3 interface
802.5 for a Token-Ring interface
HostName Specifies the host name for which to create an entry.
AdapterAddress Specifies the hardware address of the adapter for
this host as 6 hexadecimal bytes separated by colons. Use the
netstat -v command to display the local hardware ad-
dress.
route Specifies the route for a Token-Ring interface as defined in
the Token-Ring header.
temp Specifies that this ARP table entry is temporary. The table
entry is permanent if this argument is omitted.
pub Specifies that this table entry is to be published, and that
this system will act as an ARP server responding to requests for
HostName, even though the host address is not
its own.
Examples
1. To add a single entry to the arp mapping tables until the next
time the system is restarted, enter:
arp -s 802.3 host2 0:dd:0:a:85:0 temp
2. To delete a map table entry for the specified host with the arp
command, enter:
arp -d host1 flag
Implementation Specifics
This command is part of TCP/IP in Network Support Facilities in
AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
Glossary Terms: dotted decimal, host, protocol.
Understanding Protocols for TCP/IP.
Related Information
Address Resolution Protocol.
The crash command, ifconfig command, netstat command.
The inetd daemon.
mknamsv Command
Purpose
Configures TCP/IP-based name service on a host for a client.
Syntax
mknamsv -a {"Attribute=Value..." | -A FileName}
Description
The mknamsv high-level command configures a TCP/IP instance to
use a name server. It calls the namerslv low-level command to
configure the resolv.conf file appropriately.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit mknamerslv
Flags
-A FileName Specifies the name of the file containing named daemon
initialization information.
-a "Attribute=Value..." Specifies a list of attributes with
corresponding values to be used for updating the named server in-
itialization files in the database. Attributes available are:
Domain domain name
NameServer Internet address of name server in dotted decimal for-
mat.
Examples
1. To configure the name server initialization files, enter the
command in the following format:
mknamsv -a"domain=austin.ibm.com nameserver=192.9.200.1"
In this example the domain name and name server address are up-
dated. The previous domain and name server are overwritten.
2. To configure name server initialization files according to in-
formation in another file, enter the command in the following
format:
mknamsv -A namsv.file
In this example, the file that contains the configuration infor-
mation is namsv.file.
Implementation Specifics
This command is part of TCP/IP in Network Support Facilities in
AIX Base Operating System (BOS) Runtime.
File
/etc/ resolv.conf Contains DOMAIN name server information for lo-
cal resolver routines.
Suggested Reading
Prerequisite Information
Glossary Terms: client, host, name server, server.
Understanding Naming for TCP/IP.
Configuring Name Servers for TCP/IP.
Related Information
Understanding the SMIT Interface for TCP/IP.
The namerslv command.
1
uux Command
Purpose
Runs a command on another AIX or UNIX-based system.
Syntax
uux [ -c| -C] [ -n| -z] [ -] [ -aName] [ -b] [ -gGrade] [] [ -r] [ -sFile] [ -xDebugLevel] CommandString
-p] [ -r] [ -sFile] [ -xDebugLevel] CommandString
Description
The uux command is a Basic Networking Utilities (BNU) command
that runs a specified command on a specified AIX or other UNIX-
based system while enabling the user to continue working on the
local system. Before running the requested command, the uux com-
mand gathers any necessary files from the designated systems.
The user can direct the output from the command to a specific
file on a specific system. For security reasons, many installa-
tions permit the uux command to run only the rmail command.
The uux commands on other systems create execute (X.*) files that
run AIX commands on the local system. In addition, the uux com-
mand on the local system creates both command (C.*) files and
data (D.*) files for transfer to other systems. Execute files
contain the command string to be executed on the designated sys-
tem. Command files contain the same information as those created
by the uucp command. Data files either contain the data for a
remote command execution or else become X.* files on remote sys-
tems for remote command executions.
The full path name of an execute file is a form of the following:
/var/spool/uucp/System/X.SystemNxxxx
After creating the files in the spooling directory, the uux com-
mand calls the uucico daemon to transfer the files from the
spooling directory on the local system to the designated remote
system. Once the files are transferred, the uuxqt daemon on the
remote system executes the CommandString on the specified system,
placing any output from the command in the file designated by the
original uux command request.
The CommandString argument is made up of one or more arguments
that look like an AIX command line, except that CommandString ar-
gument may be prefixed by the name of the remote system in the
form System!. The default System is the local system. Unless
the user entering the uux command includes the -n flag, the com-
mand notifies that user if the remote system does not run the
command. This response comes by mail from the remote system.
Source and Destination File Names
* When specifying the destination of the output of a command, the
uux command can be entered in either one of the following
formats:
- uux [Options] "CommandString> Destination"
- uux [Options] CommandString\ {Destination\}.
* Destination names can be either of the following:
- A full path name.
- A full path name preceded by \~User, where User is a login name
on the specified system. The uux command replaces this path name
with the user's login directory.
* The shell pattern-matching characters ? (question mark), * (as-
terisk), and [ ... ] (brackets) can be used in the path name of a
source file (such as files compared by the diff command); the
appropriate system expands them. However, using the * character
may occasionally produce unpredictable or unanticipated results.
Shell pattern-matching characters should not be used in the des-
tination path name.
* Place either two backslashes (\ . . . \) or a pair of quota-
tion marks (" . . . ") around pattern-matching characters in a
path name so the local shell cannot interpret them before the uux
command sends the command to a designated system.
* If you are using the special shell characters > (greater than),
< (less than), ; (semicolon), or | (vertical bar) in a path
name, place either \ . . . \ or " . . . " around the individual
character or around the entire command string.
* Do not use the shell redirection characters << or >> in a path
name.
* The uux command attempts to move all files specified on the com-
mand line to the designated system. Enclose the names of all
output files in parentheses so that the uux command does not try
to transfer them.
* When specifying a System, always place it before the
CommandString argument in the entry. System
names can contain only ASCII characters.
* The ! (exclamation point) preceding the name of the local system
in a command is optional. If you choose to include the ! to run
a command on the local system using files from two different re-
mote systems, use ! instead of System! to represent the local
system, and add System! as the first entry in any path name on
the remote systems.
* The exclamation point representing a system in BNU syntax has a
different meaning in C shells. When running the uux command in a
C shell, place a \ (backslash) before the exclamation point in a
system name.
Note: The notation \~ (tilde) is the shorthand way of specifying
the public spooling directory, /var/spool/uucppublic.
Flags
- Makes the standard input to the uux command the standard input
to the CommandString argument.
-aName Replaces the user ID of the person issuing the command with
the user ID specified with the Name variable.
-b Returns standard input to the command if the exit status is not
zero.
-c Transfers the source files to the destination on the specified
system. The source files are copied into the spooling directory,
and the uucico daemon is invoked immediately. This flag is the
default.
-C Transfers the source files to the spool directory. After a set
period of time (specified in the uusched program), the uucico
daemon attempts to transfer the files to the destination on the
specified computer.
Occasionally, there are problems in transferring a source file;
for example, the remote computer may not be working or the login
attempt may fail. In such cases, the file remains in the spool
directory until it is either transferred successfully or removed
by the uucleanup command.
-gGrade Specifies when the files are to be transmitted during a
particular connection. The Grade variable specifies a single
number (0 through 9) or letter (A through Z, a through z); lower
ASCII-sequence characters cause the files to be transmitted ear-
lier than do higher sequence characters. The number 0 is the
highest (earliest) grade; z is the lowest (latest). The default
is N.
-j Displays the job identification number of the process that is
running the command on the specified system. Use this job ID
with the BNU uustat command to check the status of the command
or with the uustat -k flag to terminate the process.
-n Prevents user notification by the mail command of the success
or failure of a command. The default is to notify the user if
the command fails.
-p Uses the standard input to the uux command as the standard in-
put to the CommandString argument. A - (minus) has the same ef-
fect.
-r Prevents the starting of the spooling program that transfers
files between systems. The default is to start the spooling pro-
gram.
-sFile Reports the status of the transfer in a file specified by
the File variable on the designated system. File names can con-
tain only ASCII characters.
-xDebugLevel Displays debugging information on the screen of the
local system. The DebugLevel variable must be a number from 0 to
9. A higher number gives a more detailed report.
-z Notifies the user if the command completes successfully. This
flag is the opposite of the system default, which is to notify
the user only in the event of a failure.
Examples
1. To run the qprt command on a remote system, enter:
uux merlin!qprt /reports/memos/lance
In this example, the remote file /reports/memos/lance is printed
on remote system merlin. Since neither the -n nor -z flag is
specified, the uux command notifies the user only if the remote
system fails to run the command. The response comes by the mail
command from the remote system.
2. To run commands on two remote systems, enter the information on
separate command lines:
uux merlin!qprt /reports/memos/lance
uux zeus!qprt /test/examples/examp1
In this example, the remote /reports/memos/lance file is printed
on remote system merlin, and the remote /test/examples/examp1
file is printed on remote system zeus. Since neither the -n nor
-z flag is specified, the uux command notifies the user only if
the remote system fails to run the command. The response comes
by the mail command from the remote system.
3. To queue a job that compares a file on the local system with a
file on a remote system, using the diff command on the local
system, and get the job ID of the job, enter:
uux -j "/bin/diff /usr/amy/f1 hera!/u/amy/f2 > \~/f1.diff"
In this example, the /usr/amy/f1 file on the local system is com-
pared to the /u/amy/f2 file on the remote system hera and the
output is placed in the f1.diff file in the local public directo-
ry (the full path name of this file is
/var/spool/uucppublic/f1.diff). The destina-
tion name must be entered either preceded by a > with the whole
command string enclosed in " " (quotation marks) or entered en-
closed in braces and backslashes, as \{ DestinationName \}.
The -j flag causes the uux command to return the BNU job ID of
the job.
4. To use the diff command on the local system to compare files
that are located on two different remote systems, enter:
uux "!/bin/diff hera!/usr/amy/f1 venus!/u/amy/f2 > !f1.diff"
In this example, the /usr/amy/f1 file from the remote system hera
is compared to the /u/amy/f2 file from the remote system venus
and the output is placed in the file f1.diff, located in the
current working directory on the local system.
The output file must be write-enabled. If you are uncertain
about the permission status of a specific target output file,
direct the results to the public directory. The exclamation
points representing the local system are optional. The destina-
tion name must be entered either preceded by a > with the whole
command string enclosed in " " (quotation marks) or entered en-
closed in braces and backslashes, as \{ DestinationName \}.
5. To execute the diff command on two separate files from dif-
ferent systems, enter:
uux "hera!/bin/diff /tmp/out1 zeus/tmp/out2 > \~/DF"
In this example, the diff file is on the remote system hera. The
first source file is on the remote system hera, and the second-
file is on the system zeus. (zeus may be the local system or
another remote system.) The output is directed to the file DF in
the public directory on the local system.
6. To specify an output file on a different remote system, enter:
uux hera!uucp venus!/u/amy/f1 \{merlin!/u/geo/test\}
In this example, the uucp command is run on the remote system
hera, and the /u/amy/f1 file, stored on system
venus, is sent to user geo on system merlin as
test. The destination name is entered enclosed
in braces and backslashes.
7. To get selected fields from a file on a remote system and place
them in a file on the local system, enter:
uux "cut -f1 -d: hera\!/etc/passwd > \~/passw.cut"
In this example, the cut command is run on the local system.
The first field from each line of the password file on system
hera is placed in the passw.cut file in the
public directory on the local system. The uux command is running
in a C shell, so a \ (backslash) must precede the exclamation
point in the name of the remote system.
Implementation Specifics
This command is part of the Basic Network Utilities Program (BNU)
in BOS Extensions 1 of AIX Base Operating System.
Files
/usr/bin/uux Specifies the command pathname.
/var/spool/uucp Is the spooling directory.
/var/spool/uucppublic Is the public directory.
Suggested Reading
Prerequisite Information
Glossary Terms: directory, file, remote system
Related Information
The ct command, cu command, mail command, rmail command, uu-
cleanup command, uucp command, uuname command, uupick
command, uustat command, uuto command, qprt command.
The sendmail daemon, uucico daemon, uuxqt daemon.
1
hostname Command
Purpose
Sets or displays the name of the current host system.
Syntax
hostname [ HostName ] [ -s ]
Description
The hostname command displays the name of the current host sys-
tem. Only users with root user authority can set the host name.
The mkdev command and the chdev commands also set the host name
permanently. Use the mkdev command when you are defining the
TCP/IP instance for the first time.
You can use the System Management Interface Tool (SMIT) to set
the host name permanently. To use SMIT, enter:
smit mkhostname
Flag
-s Trims any domain information from the printed name.
Parameter
HostName Sets the primary name of the host.
Note: You must have root user authority to use the HostName
parameter.
Implementation Specifics
This command is part of TCP/IP in Network Support Facilities in
AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
Glossary Terms: host, name server, network address.
Understanding Naming for TCP/IP.
Related Information
The chdev command, gethostname command, mkdev command,
sethostname command.
1
errdead Command
Purpose
Extracts error records from a system dump.
Syntax
errdead
Description
The errdead command extracts error records from a system dump
containing the internal buffer maintained by the /dev/error file.
The errdead command extracts the error records from the dump file
and adds those error records directly to the system error log.
The error log daemon need not be running when the errdead command
is run.
Example
1. To create a dump image file from the previous system dump,
enter:
/usr/lib/errdead /usr/adm/ras/dumpfile
Implementation Specifics
The errdead command invokes the system dump format utility
/usr/adm/ras/dmprtns/dmpfmt -x -C errlg -A to extract
the log buffer from the dump image.
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
The Error Logging Overview.
The following glossary entries: buffer, command, daemon,
dump, error log, extract, file, format, image, log, system
dump, system, user.
Related Information
The errdemon daemon.
The errclear command, errinstall command, errlogger command,
errmsg command, errpt command, errstop command, errup-
date command.
The Error Logging Overview.
1
lssrc Command
Purpose
Gets the status of a subsystem, a group of subsystems, or a sub-
server.
Syntax
Status All
lssrc [ -h Host ] -a
Group Status
lssrc [ -h Host ] -g GroupName
Subsystem Status
lssrc [ -h Host ] [ -l ] -s Subsystem
Status by PID
lssrc [ -h Host ] [ -l ] -p Subsystem PID
Subserver Status
lssrc [ -h Host ] [ -l ] -t Type [ -p SubsystemPID ] [ -o
Object ] [ -P SubserverPID ]
Description
The lssrc command sends a request to the System Resource Con-
troller to get status on a subsystem, a group of subsystems, or
all subsystems. The lssrc command sends a subsystem request
packet to the daemon to be forwarded to the subsystem for a sub-
server status or a long subsystem status.
When the -l flag is absent, the status request is assumed to be
a short status. A short status of a subsystem, group of subsys-
tems, or all subsystems is handled by the System Resource Con-
troller.
When the -l flag is present for a subsystem, a status request is
taken to the subsystem and the subsystem sends the status back.
The -l flag is supported only for those subsystems not using
signals as their communication method. For either a long or
short status of a subserver, the subsystem is sent a status re-
quest packet, and the subsystem sends the status back.
Flags
-a Specifies that status is requested for all subsystems.
-g GroupName Specifies a group of subsystems to get status for.
The command is unsuccessful if the GroupName name is not con-
tained in the subsystem object class.
-h Host Specifies the foreign host on which this status action is
requested.
-l Specifies that a long subsystem or a long subserver status is
requested. Long status requires that a status request be sent to
the subsystem; it is the responsibility of the subsystem to re-
turn the status.
-o Object Specifies that a subserver Object is passed to the sub-
system as a character string.
-p SubsystemPID Specifies a particular instance of the
SubsystemPID parameter to get status for, or a
particular instance of the subsystem to which the status sub-
server request is to be taken.
-P SubserverPID Specifies that a SubserverPID is to be passed to
the subsystem as a character string.
-s Subsystem Specifies a subsystem to get status for. The
Subsystem name can be the actual subsystem name
or the synonym name for the subsystem. The command is unsuccess-
ful if the Subsystem name is not contained in the subsystem ob-
ject class.
-t Type Specifies a subserver to get status for. The command is
unsuccessful if the subserver Type is not contained in the sub-
server object class.
Examples
1. To get the status of all subsystems on the local machine,
enter:
lssrc -a
This gets the status of all subsystems known on the local
machine.
2. To get the status of all subsystems on a foreign host, enter:
lssrc -h zork -a
This gets the status of all subsystems known on the zork machine.
3. To get the status of the srctest subsystem, enter:
lssrc -s srctest
This gets the status of all instances of the srctest subsystem on
the local machine.
4. To get the status of the subsystem by PID, enter:
lssrc -p 1234
This gets the status of the subsystem with the subsystem PID of
1234 on the local machine.
5. To get the status of the tcpip subsystem group, enter:
lssrc -g tcpip
This gets the status of all instances of subsystems in the tcpip
group on the local machine.
6. To get the status of the tester subserver, enter:
lssrc -t tester -p 1234
This gets the status of tester subserver that belongs to the
srctest subsystem with the subsystem PID of
1234 on the local machine.
7. To get the status of the subsystem by PID, enter:
lssrc -l -p 1234
This gets the long status of the subsystem with the PID of 1234.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/etc/objrepos/SRCsubsys Specifies the SRC Subsystem Configuration
Object Class.
/etc/objrepos/SRCsubsvr Specifies the SRC Subserver Configuration
Object Class.
/etc/services Defines the sockets and protocols used for Internet
services.
/dev/SRC Specifies the AF_UNIX socket file.
Suggested Reading
Prerequisite Information
Glossary Terms: subsystem, subserver, object class.
The System Resource Controller Overview gives an explanation of
subsystems, subservers, and the System Resource Controller.
Related Information
The System Resource Controller Overview gives an explanation of
subsystems, subservers, and the System Resource Controller.
1
ps630 Command
Purpose
Converts Diablo 630 print files to PostScript format.
Syntax
ps630 [ -f Bodyfont ] [ -p File ] [ -s Pitch ] [ -F Boldfont
] [ File... ]
Description
The ps630 command converts Diablo 630 format print files to
PostScript format for printing on a
PostScript printer. If no File variable is
specified, the ps630 command reads from standard input. By de-
fault, the PostScript file is sent to the standard output.
The ps630 command can convert nroff files generated with the
-Txerox flag. Typewheel emulation information
can be specified as options. Font specifications (for bold and
regular) are PostScript font names (such asTimes-Roman, Times-
Bold, Courier-Bold, Courier-BoldOblique). Ten, twelve, or fif-
teen characters per inch can be selected.
Some applications produce ``bold'' by double-striking a charac-
ter. This will not appear as bold when translated into
PostScript format. Only the bold produced by issuing
the proper Diablo command sequence (Esc-O) will result in bold
characters.
The output of the ps630 command cannot be page-reversed. Times-
Roman and Helvetica are narrow fonts that may look squeezed if no
adjustment of page width is made by the application.
The following Diablo 630 commands are not supported: print
suppression, HY-Plot, extended character set, downloading print
wheel information or program mode, page lengths other than 11
inches, paper feeder control, hammer energy control, remote diag-
nostic, backward printing control.
Note: The Diablo 630 command for ``reverse printing'' is support-
ed.
Flags
-fBodyfont Sets the font to be used for normal printing. The de-
fault is Courier.
-pFile Causes the PostScript file to be written to the file
specified by the File parameter rather than to the standard out-
put.
-sPitch Selects type size for printing (both the regular and bold
fonts are scaled to this size). Pitch is in characters per inch
and must be one of 10, 12, or 15. The default is 12.
-FBoldfont Sets the font to be used for boldface. The default is
Courier-Bold.
Environment Variables
PSLIBDIR Path name of a directory to use instead of /usr/lib/ps
for ps630 prologue.
Related Information
The enscript command, command.
1
stty Command (BSD)
Purpose
Sets, resets, or reports workstation operating parameters.
Syntax
stty Option
Description
The stty command (BSD) sets certain workstation I/O options for
the device that is the current standard input. The stty command
(BSD) writes its output to the device that is the current stan-
dard output. If no options are specified, it reports the speed
of the terminal and the settings of any options that are dif-
ferent from their defaults.
The stty command (BSD) is called by the line-discipline-
independent stty command when the stty command encounters options
it does not recognize. Unrecognized options are passed as param-
eters to the line-discipline-dependent stty command associated
with the terminal's active line discipline. When Berkeley is the
active line descipline, the stty command passes parameters to the
stty command (BSD).
Note: The stty command (BSD) does not make compatibility checks on
any parameter combinations.
Flags
all Reports all normally used option settings.
cbreak Makes each character available to the read subroutine as
received with no erase and kill processing, but all other pro-
cessing, such as interrupt and suspend is performed.
-cbreak Makes characters available to read only when a new-line
character is received.
cooked See the -raw option.
echo Echoes back every character typed.
-echo Does not echo characters.
ek Sets erase and kill characters to the # (pound sign) and @ (at
sign), respectively.
even Allows even parity input.
-even Does not allow even parity input.
everything Everything the stty command knows about is printed.
lcase Maps uppercase to lowercase characters.
-lcase Does not map case.
odd Allows odd parity input.
-odd Does not allow odd parity inputs.
nl Accepts only a new-line character to end lines.
-nl Allows carriage return for new-line characters, and output
CR/LF for carriage return or new-line characters.
raw Allows raw mode input (no input processing, such as erase,
kill, or interrupt); parity bit passed back.
-raw Does not allow raw mode.
speed Prints only the terminal speed to standard output.
size Prints the terminal (window) sizes to standard output (first
rows and then columns).
tabs Preserves tabs.
-tabs Replaces tabs with spaces when printing.
tandem Enables flow control so that the system sends out the stop
character when its internal queue is in danger of overflowing on
input. Sends the start character when the system is ready to ac-
cept further input.
-tandem Disables stop/start flow control.
The following options take a character argument, c. You can also
specify c as `u' or `undef', which sets the value to be unde-
fined. The value '\^x', a two-character sequence, is also inter-
pereted as a control character, with '\^?' representing delete.
erase c Sets erase character to the key sequence specified by c
(default Ctrl-H).
kill c Sets kill character to the key sequence specified by c
(default (Ctrl-U).
intr c Sets interrupt character to the key sequence specified by c
(default (Ctrl-C).
quit c Sets quit character to the key sequence specified by c (de-
fault Ctrl-\).
start c Sets start character to the key sequence specified by c
(default Ctrl-Q).
stop c Sets stop character to the key sequence specified by c (de-
fault Ctrl-S).
eof c Sets end-of-file character to the key sequence specified by
c (default Ctrl-D). This character is an addi-
tional character causing wakeup.
brk c Sets break character to the key sequence specified by c (de-
fault undefined). This character is an additional character
causing wakeup.
cr0, cr1, cr2, cr3 Selects the style of delay for carriage return.
n10, n11, n12, n13 Selects the style of delay for line feed.
tab0, tab1, tab2, tab3 Selects the style of delay for tab.
ff0, ff1 Selects the style of delay for form feed.
bs0, bs1 Selects the style of delay for back space.
tty33 Sets all modes suitable for the Teletype Corporation Model
33 terminal.
tty37 Sets all modes suitable for the Teletype Corporation Model
37 terminal.
vt05 Sets all modes suitable for the Digital Equipment Corp. VT05
terminal.
dec Sets all modes suitable for the Digital Equipment Corp.
operating systems users (erase, kill, and interrupt characters to
\^?, \^U, and \^C, decctlq and ``newcrt'').
tn300 Sets all modes suitable for a General Electric TermiNet 300.
ti700 Sets all modes suitable for Texas Instruments 700-series
terminals.
tek Sets all modes suitable for Tektronix 4014 terminals.
0 Hangs up the phone line immediately.
50, 75, 110, 134, 200, 300, 600, 1200, 1800, 2400, 4800, 9600,
19200, 38400, exta, extb Sets baud rate to the
number given, if possible. (All speeds are not supported by all
hardware interfaces.)
rows n Records the terminal's size as having n rows.
columns n Records the terminal's size as having n columns. This
command can be abbreviated: cols n.
The standard (new) Berkeley terminal driver that supports the job
control processing of the C shell (the csh command) and the Korn
shell (the ksh command) is fully described in Understanding the
Berkeley (sgtty.h File) Line Discipline. The following options
apply to the new Berkeley terminal driver:
new Uses new device driver (switching to the new driver flushes
type ahead).
crt Sets options for a display ( crtbs, ctlecho and, if >= 1200
baud, crterase and crtkill).
crtbs Echoes backspaces on erase characters.
prterase Prints terminal echoes erased characters backwards within
\ (backslash) and / (slash).
crterase Wipes out erased characters with backspace-space-
backspace.
-crterase Leaves erased characters visible; just backspace.
crtkill Wipes out input on line kill as specified by the crterase
option.
-crtkill Echoes a line-kill character and a new-line character on
line kill.
ctlecho Echoes control characters as \^x (and deletes as \^?).
Prints two backspaces following the EOT character (Ctrl-D).
-ctlecho Echoes control characters as themselves. In Cooked mode,
EOT (Ctrl-D) is not echoed.
decctlq Specifies that after output is suspended (normally by
\^S), only a start character (normally \^Q) restarts it. This is
compatible with DEC's vendor-supplied systems.
-decctkq Specifies that after output is suspended, it can be res-
tarted by typing any character. The start character restarts
output without providing any input. (This is the default.)
tostop Specifies that background jobs stop if they attempt termi-
nal output.
-tostop Specifies that output is allowed from background jobs to
the terminal.
tilde Converts \~ (tilde) to ` (grave) on output (for Hazeltine
terminals).
-tilde Does not convert \~ (tilde) to ` (grave) on output.
flusho Specifies that output is being discarded because the user
pressed the Ctrl-O key sequence (internal state bit).
-flusho Specifies that output is not being discarded.
pendin Specifies that input is pending after a switch from the
cbreak to the cooked option, and will be input again
when a read becomes pending or when more input arrives (internal
state bit).
-pendin Specifies that input is not pending.
pass8 Passes all 8 bits through on input, in any mode.
-pass8 Strips the 0200 bit on input except in raw mode.
mdmbuf Starts or stops output on carrier transitions (not imple-
mented).
-mdmbuf Returns error if write attempted after carrier drops.
litout Sends output characters without any processing.
-litout Does normal output processing, inserting delays, and so
on.
nohang Specifies that a hang-up signal not be sent if the carrier
drops.
-nohang Sends a hang-up signal to the control process group when
the carrier drops.
etxack Diablo-style ETX/ACK handshaking (not implemented).
The following special characters are applicable only to the new
terminal device driver and are not normally changed.
susp c Sets suspend process character to the key sequence speci-
fied by c (default Ctrl-Z).
dsusp c Sets delayed suspend process character to the key sequence
specified by c (default Ctrl-Y).
rprnt c Sets reprint line character to the key sequence specified
by c (default Ctrl-R).
flush c Sets flush output character to the key sequence specified
by c (default Ctrl-O).
werase c Sets word erase character to the key sequence specified
by c (default Ctrl-W).
lnext c Sets literal next character to the key sequence specified
by c (default Ctrl-V).
Examples
1. To switch to the standard (new) terminal driver, enter:
stty new
2. To display everything the stty command knows about tty5, enter:
stty everything < /dev/tty5
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Related Information
The tabs command, tset command, csh command, ksh command,
stty command, stty command (POSIX).
The terminfo File, tty Special File.
The TTY Subsystem Overview., National Language Support Over-
view.
Understanding the Berkeley (sgtty.h File) Line Discipline.
1
x_chg_net Command
Purpose
Changes an existing Xstation network type.
Syntax
x_def_net -bFile -dDirectory [-gAddress] -hType [-iAddress]
[-mMask] -nTypeName -sNumber
Description
The x_chg_net command changes, for the current host, the charac-
teristics of the Xstation network type specified by the TypeName
parameter, and stores the changed definition in the /etc/bootptab
file. The TypeName parameter must contain x_st_mgr. as a prefix,
for example, x_st_mgr.ether, and be used with the -n flag.
Flags
-bFile Specifies the name of the boot file.
-dDirectory Specifies the home directory of the boot file.
-gAddress Specifies the gateway address (the internet address of
the gateway host). This parameter is used to establish a connec-
tion to another host on the network.
-hType Specifies the type of network hardware. The Type parameter
can be ethernet, or tokenring or ieee802.
-iAddress Specifies the internet (IP) address of the bootserver
host. This identifies the bootserver host on the network.
-mMask Specifies the subnet mask.
-nTypeName Specifies the name of the network type. The TypeName
parameter must contain the prefix x_st_mgr. and can include an
identifier for the type of hardware network, such as ether (for
ethernet), tr (for token ring) or 802 (for IEEE 802.3). The net-
work type is stored in the /etc/bootptab file.
-sNumber Specifies the number of the server port in hexadecimal
notation. This usually is 1b58 and is in the /etc/services file.
Security
User management is responsible for evaluation, selection, and im-
plementation of security features.
Example
To change the characteristics of a network type named
x_st_mgr.ether, enter a command like the fol-
lowing:
x_chg_net -nx_st_mgr.ether -bbootfile \
-d/usr/lpp/x_st_mgr/bin -hethernet -s1b58
In this example, the characteristics include the following: the
bootfile name is bootfile, the bootfile home directory is
/usr/lpp/x_st_mgr/bin, the network type is
ethernet and the server port number is 1b58.
Implementation Specifics
This command is part of AIX Xstation Manager/6000.
Files
/etc/bootptab The boot protocol table.
Suggested Reading
Prerequisite Information
Glossary Terms: boot, current host, gateway host, host,
Internet Protocol (IP), network, port, protocol, server,
subnet address mask.
Related Information
The bootpd command, x_add_trm_120 command, x_add_trm_130 com-
mand, x_chg_trm_120 command, x_chg_trm_130 command, x_def_net
command, x_ls_trm command, x_ls_net command, x_rm_net command,
x_rm_trm command, xset command.
1
mkgroup Command
Purpose
Creates a new group.
Syntax
mkgroup [ -a ] [ -A ] Group
Description
The mkgroup command creates a new group account with the name
specified by the Group parameter. The group name must be an al-
phanumeric character string of 8 characters or less that begins
with an alphabetic character, and cannot be the ALL or default
keywords.
A standard user group is created unless the -a flag is used to
create an administrative group.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit mkgroup
Flags
-a Creates an administrative group. Only the root user can use
this flag.
-A Sets the invoker of the command as the group administrator.
Otherwise, the administrators are as defined in the adms stanza
of the /etc/security/group file.
Security
Access Control:This command should be a standard user program.
The command should have the trusted computing base attribute and
run setuid to the root user to access the user database.
Files Accessed:
Mode File
r /etc/passwd
rw /etc/group
rw /etc/security/group
rw /etc/security/.ids
Auditing Events:
Event Information
GROUP_Create group
Examples
1. To create a new group account called finance, enter:
mkgroup finance
2. To create a new administrative group account named finance,
enter:
mkgroup -a finance
Only the root user can give this command.
3. To set the invoker of the command as the group administrator,
enter:
mkgroup -A finance
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/mkgroup Specifies the path to the mkgroup command.
/etc/group Contains the basic attributes of groups.
/etc/security/group Contains the extended attributes of groups.
/etc/passwd Contains basic user information.
/etc/security/passwd Contains password information.
/etc/security/.ids Contains standard and administrative user IDs
and group IDs.
Suggested Reading
Prerequisite Information
The following glossary entries: access, character, group,
keyword, parameter, path, program, root user, setuid,
trusted computing base, user.
Security Introduction describes the identification and authenti-
cation of users, discretionary access control, the trusted com-
puting base, and auditing.
Related Information
The chgroup command, chgrpmem command, chuser command,
lsgroup command, lsuser command, mkgroup command,
mkuser command, passwd command, pwdadm command,
rmgroup command, rmuser command, setgroups command,
setsenv command.
1
rpcgen Command
Purpose
Generates C code to implement an RPC protocol.
Syntax
Generate Four Types of Output Files for a File
/usr/bin/rpcgen InputFile
Generate a Specific Output File for a File
rpcgen { -c | -h | -l | -m } [ -o OutputFile ] [ InputFile ]
Generate a Server-Side File for TCP or UDP
rpcgen { -s Transport ... } [ -o OutputFile ] [ InputFile ]
Description
The rpcgen command generates C code to implement a Remote Pro-
cedure Call (RPC) protocol. The input to rpcgen is a language
similar to C known as RPC Language.
The first syntax structure is the most commonly used form for the
rpcgen command where it takes an input file and generates four
output files. For example, if the InputFile is named proto.x,
then the rpcgen command generates the following:
proto.h A header file
proto_xdr.c XDR routines
proto_svc.c Server-side stubs
proto_clnt.c Client-side stubs.
Use the other syntax structures when you want to generate a par-
ticular output file rather than all four output files.
The cpp command, a C preprocessor, is run on all input files be-
fore they are actually interpreted by the rpcgen command. There-
fore, all the cpp directives are legal within an rpcgen input
file. For each type of output file, the rpcgen command defines a
special cpp symbol for use by the rpcgen programmer:
RPC_HDR Defined when compiling into header files
RPC_XDR Defined when compiling into XDR routines
RPC_SVC Defined when compiling into server-side stubs
RPC_CLNT Defined when compiling into client-side stubs.
In addition, rpcgen does some preprocessing of its own. Any line
beginning with a % (percent sign) passes directly into the output
file, uninterpreted by the rpcgen command.
To create your own XDR routines, leave the data types undefined.
For every data type that is undefined, the rpcgen command assumes
that a routine exists by prepending xdr_ to the name of the unde-
fined type.
Notes:
1. Nesting is not supported. As a work-around, structures can be
declared at top-level, with their names used inside other struc-
tures in order to achieve the same effect.
2. Name clashes can occur when using program definitions, since
the apparent scoping does not really apply. Most of these can be
avoided by giving unique names for programs, versions, pro-
cedures, and types.
Flags
-c Compiles into XDR routines.
-h Compiles into C data definitions (a header file).
-l Compiles into client-side stubs.
-m Compiles into server-side stubs, but does not generate a main
routine. This option is useful for doing call-back routines and
for writing a main routine to do initialization.
-o OutputFile Specifies the name of the output file. If none is
specified, standard output is used.
-s Transport Compiles into server-side stubs, using given tran-
sport. The supported transports are udp and tcp. This option
may be invoked more than once to compile a server that serves
multiple transports.
Implementation Specifics
This command is part of NFS in Network Support Facilities in Base
Operating System Runtime.
Suggested Reading
Prerequisite Information
Glossary Terms: client, scope, server.
For more information about NFS, see Network File System (NFS)
Overview for System Management.
Related Information
The cpp command.
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.
Remote Procedure Call (RPC) Overview for Programming.
1
nl Command
Purpose
Numbers lines in a file.
Syntax
nl [ -bType ] [ -fType ] [ -hType ] [ -lNumber ] [
-dDelimiter ] [ -iNumber ] [ -nFormat ] [
-vNumber ] [ -wNumber ] [ -p ] [
-s[Separator ] ] [ File ]
Description
The nl command reads the File parameter (standard input by de-
fault), numbers the lines in the input, and writes the numbered
lines to standard output. In the output, the nl command numbers
the lines on the left according to the flags you specify on the
command line.
The input test must be written in logical pages. Each logical
page has a header, a body, and a footer section (you can have
empty sections). Unless you use the -p flag, the nl command
resets the line numbers at the start of each logical page. You
can set line-numbering flags independently for the header, body,
and footer sections (for example, no numbering of header and
footer lines while numbering text lines only in the body).
Signal the start of logical page sections with lines in the file
that contain only the following delimiter characters:
Line Contents Start Of
\:\:\: Header
\:\: Body
\: Footer
You can name only one file on the command line. You can list the
flags and the file name in any order.
Flags
All the parameters are set by default. Use the following flags
to change these default settings. Except for the -s flag, enter
a flag without a parameter to see its default value.
-bType Chooses which body section lines to number. The recognized
Type parameter values are:
a Numbers all lines.
t Does not number blank lines (default).
n Does not number any lines.
pPattern Numbers only those lines containing the specified Pattern
parameter.
-dDelimiter Uses the two characters specified by the Delimiter
parameter as the delimiters for the start of a logical page sec-
tion. The default characters are \: (backslash followed by a
colon). You may specify two ASCII characters, two 1-byte extend-
ed characters, or one extended character. If you enter only one
1-byte character after the -d flag, the second character remains
the default ( a colon). If you want to use a backslash as a del-
imiter, enter two backslashes (\\).
-fType Chooses which logical page footer lines to number. The
possible values for the Type parameter are the same as the -b
flag. The default value of the Type parameter is n (no
lines numbered).
-hType Chooses which logical page header lines to number. The
possible values for the Type parameter are the same as the -b
flag. The default value of the Type parameteris n (no
lines numbered).
-iNumber Increments logical page line numbers by the number speci-
fied in the Number parameter. The default value of the Number
parameter is 1.
-lNumber Uses the value specified in the Number parameter as the
number of blank lines to count as one. For example, -l3 only
numbers the third adjacent blank line. The default value of the
Number parameter is 2. This flag can only be
used in documents where the -ba flag is used.
-nFormat Uses the value of the Format parameter as the line
numbering format. Recognized formats are:
ln Left-justified, leading zeros suppressed.
rn Right-justified, leading zeros suppressed (default).
rz Right-justified, leading zeros kept.
-p Does not restart numbering at logical page delimiters.
-s[Separator] Separates the text from its line number by the char-
acter specified in the Separator parameter. The default value of
the Separator parameter is a tab character. If you enter the -s
flag without a parameter, there is no separation between the line
number and its text.
-vNumber Sets the initial logical page line number to the value
specified by the Number parameter, The default value of the
Number parameter is 1.
-wNumber Uses the value specified by the Number parameter as the
number of characters in the line number. The default value of
the Number parameter is 6.
Examples
1. To number only the non-blank lines:
nl chap1
This displays a numbered listing of chap1, numbering only the
non-blank lines in the body sections. If chap1 contains no
\:\:\+:, or \: delimiters, then the entire file is considered
the body.
2. To number all lines:
nl -ba chap1
This numbers all the lines in the body sections, including blank
lines. This form of the nl command is adequate for most uses.
3. To specify a different line number format:
nl -i10 -nrz -s:: -v10 -w4 chap1
This numbers the lines of chap1 starting with ten (-v10) and
counting by tens (-i10). It displays four digits for each number
(-w4), including leading zeros (-nrz). The line numbers are
separated from the text by two colons (-s : :).
For example, if chap1 contains the text:
A not-so-important
note to remember:
You can't kill time
without injuring eternity.
then the numbered listing is:
0010::A not-so-important
0020::note to remember
0030::You can't kill time
0040::without injuring eternity.
Note that the blank line was not numbered. To do this, use the
-ba flag as shown in example 2.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/usr/bin/nl Specifies the nl command file.
Suggested Reading
Prerequisite Information
The following glossary entries: standard input and standard
output.
Files Overview introduces you to files and the way you can work
with them.
Input and Output Overview describes how to redirect input and
output.
Related Information
The pr command.
2
xtalk Command
Purpose
Enables you to communicate with another person over an X.25 net-
work.
Syntax
xtalk [ -n] [ -l EntryName ] [ -q | -s ]
Description
The xtalk command provides a panel-driven environment where you
can make or receive a call and then either talk to another person
by typing messages on a panel, or send and receive files. You
can have the details of the other people with whom you want to
communicate in an address list. The xtalk command also enables
you to view, change, add to, and delete from the address list.
The -l flag tells xtalk to listen for incoming calls for the
EntryName specified. The EntryName is the name
of an entry in the routing list.
With the -n flag, the xtalk command starts a process running in
the background to listen for incoming calls.
Flags
-n Runs the xtalk process in the background.
-l Listens for calls for the routing list entry specified by the
EntryName variable.
-q Displays the title panel for 2 seconds.
-s Does not display the title panel.
Examples
1. To listen for incoming calls for one person whose details are
specified in the routing list entry named USER2, enter:
xtalk -n -l USER2
2. To listen for incoming calls; make or receive calls; talk to
another person; send or receive files; view, change, add to, or
delete from the address list, enter:
xtalk -l USER2
3. To make or receive calls; talk to another person; send or re-
ceive files; view, change, add to, or delete from the address
list; but not listen for calls, enter:
xtalk
Implementation Specifics
This command is part of X.25 Application in AIX BOS Extensions 2.
Files
/etc/xtalk.names Contains the systemwide xtalk address list,
which can be used by all users on the system to route outgoing
calls.
$HOME/xtalk.names Contains the individual user's xtalk address
list used to route outgoing calls.
/etc/xrt.names Contains the X.25 routing list, used to route in-
coming calls.
./OtherUserName.log Names the message logging file. The
OtherUserName variable specifies the address-
list name of the user with whom messages were exchanged, or the
last eight digits of the other user's network user address.
Suggested Reading
Prerequisite Information
Glossary Terms: address list, call, listen, outgoing call,
routing list.
Using the xtalk Command.
Related Information
X.25 Overview.
How to Get xtalk to Listen for Calls, How to Make a Call with
xtalk, How to Receive a Call with xtalk, How to Have an xtalk
Conversation, How to Log an xtalk Conversation, How to Transfer
Files with xtalk, How to End a Call with xtalk, How to Manage
xtalk Address Lists, How to Manage the X.25 Routing List.
The xcomms command, xroute command, xmanage command, xmonitor
command, mail command, talk command, ftp command.
2
rmserver Command
Purpose
Removes a subserver definition from the subserver object class.
Syntax
rmserver -t Type
Description
The rmserver command removes an existing subserver definition
from the subserver object class.
Flag
-t Type Specifies the subserver name that uniquely identifies the
existing subserver to be removed. The rmserver command is unsuc-
cessful if the Type name is not known in the subserver object
class.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/etc/objrepos/SRCsubsvr Specifies the SRC Subserver Configuration
Object Class.
Suggested Reading
Prerequisite Information
Glossary Terms: subserver, object class.
The System Resource Controller Overview gives an explanation of
subsystems, subservers, and the System Resource Controller.
Related Information
The chserver command, mkserver command.
The System Resource Controller Overview gives an explanation of
subsystems, subservers, and the System Resource Controller.
2
nvdmconf Command
Purpose
Displays the menu that is used to create or update the NetView
Distribution Manager (NetView DM) catcher (also known as agent or
downstream server) configuration file.
Syntax
nvdmconf
Description
When you invoke the nvdmconf command, the menu titled Configura-
tion File Maintenance Program appears on the screen. This menu
enables you to create or update the six corresponding information
fields in the NetView DM catcher configuration profile. Each
term in the left menu column identifies one of these information
fields. New information is entered in the fields the right of
each colon.
Note: A list of applicable options (enclosed in parentheses and
separated by commas) is provided along the right side of the
menu.
Use the up-down arrow keys (or the tab key) to move from menu
field to menu field. Use the alphanumeric keys to enter new in-
formation. Then press the F6 key to update the NetView DM catch-
er configuration file. Press the F3 key to return to the AIX
command prompt.
Note: Press the F5 key to refresh the menu screen with the infor-
mation stored in the /usr/lpp/nvdm/nvdmrel.cnf configuration
file.
Menu Fields
Field 1: LU Name for Relay This field is the LU name in the LU0
configuration of the LU that is to be used for NetView DM commun-
ications. The default is NDMLU.
Field 2: DSN Case Conversion This field indicates your DSN (Data
Set Names) case conversion choice.
Note: The Data Set Names of the files in question are specified in
the S/370 host NetView DM commands.
Enter L in this field to change the case of the DSN to all lower
case characters, or enter U to change the case of the DSN to all
upper case characters.
Note: The default is to leave the field blank, which results in no
DSN case conversion.
Field 3: Log File Option This field indicates your Log File Option
choice. Enter Y in this field to create log messages for all
NetView DM catcher transactions and errors on the console screen.
Enter N in this field if no messages are wanted.
Field 4: Default Path for Data Files This field contains the de-
fault path to be used for all data files referenced by S/370 host
NetView DM commands. (This pathname should not end with a trail-
ing slash.) Once set, this path serves as the path for all data
sets referenced by S/370 host NetView DM that do not have a
specified path.
Note: The default is to take the path statement specified in the
S/370 host NetView DM commands. See the section for Dataset
Name Processing for the nvdmrelay Command for related informa-
tion.
Field 5: File Conversion Option This field indicates your File
Conversion Option choice. Enter Y in this field if you want file
conversions or file renaming to be done on all data sets sent or
received from the S/370 host system. Enter N in this field if no
file conversion or renaming should be done.
Field 6: Line Re-open Delay in Secs This field sets the time in-
terval in seconds that the NetView DM catcher delays before try-
ing to reopen the communication link to the S/370 host in the
event of a communication link failure.
Security
Privilege Control: root authority
Implementation Specifics
This command is part of AIX Network Management/6000.
Files
/usr/lpp/nvdm/nvdmrel.cnf NetView DM Configuration Information
/usr/lpp/lu0/lu0.cnf LU0 Configuration File
Suggested Reading
Prerequisite Information
The Alert Manager Overview for Network Management contains in-
formation about the Alert Manager program.
Related Information
The nvdmconvCommand the nvdmrelay Command and the lu0config
Command.
The Host Command Facility Catcher and NetView DM Catcher Over-
view for Network Management contains additional information about
these two programs.
List of Alert Manager Commands for Network Management.
2
gettable Command
Purpose
Gets NIC format host tables from a host.
Syntax
gettable [ -v ] Host [ OutFile ]
Description
The gettable command is used to obtain the Network Information
Center (NIC) standard host tables from a server indicated by the
Host parameter. The tables, if retrieved, are
placed in the file indicated by the OutFile parameter.
The gettable command opens a TCP connection to the port indicated
in the service specification for the Host parameter. A request
is then made for all names and the resultant information is
placed in the output file.
The gettable command is best used in conjunction with the htable
command, which converts the NIC standard file format to that used
by the network library lookup routines.
Flag
-v Gets just the version number instead of the complete host table
and puts the output in the OutFile file or, by default, in a file
named the hosts.txt file.
Parameters
Host The name of the host machine to use in getting the host
tables.
OutFile The name of the file to use for placing the host tables.
The default is the hosts.txt file.
Implementation Specifics
This command is part of TCP/IP in Network Support Facilities in
AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
Glossary Terms: daemon, server.
Transmission Control Protocol (TCP) and Understanding Protocols
for TCP/IP.
Related Information
The htable command.
2
tlog Command
Purpose
Tests an AUTOLOG script.
Syntax
tlog SessionName
Description
The tlog command tests an AUTOLOG script with an existing emula-
tor session to aid in debugging any problems with the logon or
logoff scripts.
The user invokes an emulator session and notes the session name
from the operator information area. An emulator SHELL key is
used to create a subshell, and the tlog command is invoked. The
user will be prompted for the logonid string (unless specified in
the session profile) and for the password string. The tlog com-
mand issues a message that testing of the logon script is to be-
gin in three seconds. This allows the user enough time to switch
back to the emulator session if running in another AIX virtual
terminal and observe the behavior of the logon script. By
switching back and forth between the emulator session and the AIX
virtual terminal running the tlog command, both the behavior of
the script and any messages issued by the test program can be
seen easily.
Return Value
After the logon script completes, the tlog command issues a mes-
sage indicating the exit status from the script. If the status
is non zero, the test program terminates. Otherwise, a prompt is
displayed requesting the user to press the Enter key to continue
testing.
After the Enter key is pressed, a message is displayed indicating
that testing of the logoff script is to begin in 3 seconds. The
user can again observe the behavior of the script. After the
logoff script completes, the exit status of the script is
displayed and the test program terminates.
Parameter
SessionName Specifies the session in use by the e789 HCON emulator
from [a-z]. Capital letters are interpreted as lowercase
letters.
Implementation Specifics
The tlog command is part of the AIX 3270 Host Connection Pro-
gram/6000 (HCON).
File
/usr/bin directory Contains the tlog command.
Suggested Reading
Prerequisite Information
HCON Overview for Programming introduces the HCON programming
facilities.
Related Information
Understanding HCON Session Profiles discusses HCON display and
printer sessions.
Understanding Host Logon Procedures introduces manual and au-
tomatic logon procedures, and discusses the AUTOLOG facility.
Understanding the HCON Application Programming Interface (API)
discusses the API and how it is used to write programs, Under-
standing the File Transfer Program Interface discusses transfer-
ring files between the RISC System/6000 and a host system.
Using AUTOLOG Procedures with the HCON API outlines logging on to
and off of a host system with an API application.
2
x_add_trm_120 Command
Purpose
Adds an Xstation 120 to the host.
Syntax
x_add_trm_120 120 Name TypeName Address Server Time Device Pan
Mode Host Program
Description
The x_add_trm_120 command adds the Xstation 120 specified by the
Name parameter to the current host, and stores
the configuration in the /usr/lpp/x_st_mgr/bin/x_st_mgrd.cf file,
the /usr/lpp/x_st_mgr/bin/x_st_mgrd.tmty file, and the
/etc/bootptab file.
Mandatory parameters are:
120 Specifies the Xstation model. This command can be used only
for an Xstation 120.
Name Specifies the name of the Xstation. The Name parameter can
be up to 8 characters long and include the lower case letters a
through z, the numbers 0 through 9, the - (dash) and the .
(period). Name can be a user name, such as taylor, or a group
name with a number appended, such as graphs-2, and should identi-
fy an Xstation by its location in the work place or by the pri-
mary user's name. Name is stored in the /etc/hosts file.
Note: Name should not start with a lowercase or an uppercase o or
a lowercase or uppercase x, followed by an octal or hexadecimal
numeric. These characters are interpreted as octal or hexade-
cimal numbers, instead of as a terminal name. In the examples x3
and xE4, the 3 and the E4 are hexadecimal numerics.
TypeName Specifies the name you create to identify the type of
network protocol. The TypeName parameter must contain the prefix
x_st_mgr. and can include an identifier for the type of network
protocol, such as ether (for ethernet), tr (for token ring) or
802 (for IEEE 802.3). An example is
x_st_mgr.ether. The name of the network type is
stored in the /etc/bootptab file.
Address Specifies the hardware address of the Xstation. This ad-
dress appears on the LAN Statistics screen of the Xstation. Each
Xstation has a unique 6-byte hexadecimal hardware address, in
XXXXXXXXXXXX format, and cannot be changed by the user.
Server Identifies the Xstation as a primary or secondary boot
server. Two options are valid: y for a primary server and n for
a secondary server.
Time Specifies the number of seconds a boot server must wait be-
fore answering a boot-protocol broadcast request. The valid
number for a primary server is 00, since there is no delay time.
For a secondary server, refer to the number range in SMIT.
Device Specifies the input device. Device must be mouse or
tablet.
Pan Specifies whether the hardware pan feature is enabled or dis-
abled. The hardware pan feature allows the Xstation to use all
the additional video memory for a display area that appears when
the user pans the cursor to the edge of the screen. Two options
are valid: y enables and n disables the pan feature.
Mode Specifies the mode used by X Display Manager Control Protocol
(XDMCP). XDMCP uses the xdm program to facilitate the connection
of an X terminal to a remote host. XDMCP also allows the user to
turn an Xterminal off and on again and still maintain an esta-
blished connection to the remote host. Valid options are:
broadcast Sends a message to the network and waits for an xdmcp
host to respond.
direct Directs a request to an xdmcp manager known to the Xsta-
tion.
indirect Sends an indirect request to an xdmcp manager that main-
tains a list of xdmcp hosts. The manager assigns an xdmcp host
to respond to the Xstation.
off No X Display Manager Control Protocol (XDMCP).
Host Specifies the internet (IP) address of the xdmcp host used
for direct or indirect communication with the Xstation. Valid
options are none or the internet address of an xdmcp host. If
XDMCP is not used or if broadcast mode is used, the value of Host
is none. The internet address of an xdmcp host must be specified
if Mode is direct or indirect.
Program Identifies the startup program. This program should be
the aixterm command with selected options. The startup configura-
tion is stored in the /usr/lpp/x_st_mgr/bin/x_st_mgrd.cf file.
Security
User management is responsible for evaluation, selection, and im-
plementation of security features.
Example
To add Xstation taylor to the current host as a primary server,
enter a command like the following:
x_add_trm_120 120 taylor x_st_mgr.ether 10005ac38e9 y \
00 mouse n off none \
/usr/bin/X11/bin/aixterm -W \
-e /usr/lpp/x_st_mgr/bin/login
Xstation taylor is added to the current host, as defined by the
parameters: model 120, a network type of ethernet, a hardware ad-
dress of 10005ac38e9, primary server status, no delay time, input
from a mouse, no hardware pan feature, xdmcpmode off, no host
name, and a startup program that runs the aixterm command with
two options. The aixterm -W -e Program command initializes the
Enhanced X-Windows terminal emulator with the mouse cursor in the
center of the window, and runs the login command to initialize a
user session.
Implementation Specifics
This command is part of AIX Xstation Manager/6000.
Files
/usr/lpp/x_st_mgr/bin/x_st_mgrd.cf The Xstation Manager configura-
tion file.
/usr/lpp/x_st_mgr/bin/x_st_mgrd.tmty The terminal list file.
/etc/bootptab The boot protocol table.
Suggested Reading
Prerequisite Information
Glossary Terms: boot, current host, gateway host, host,
Internet Protocol (IP), network, port, protocol, server,
subnet address mask.
Related Information
The aixterm command, bootpd command, login command,
x_add_trm_130 command, x_chg_net command, x_chg_trm_120
command, x_chg_trm_130 command, x_def_net command, x_ls_trm
command, x_ls_net command, x_rm_net command, x_rm_trm command,
xset command.
2
piopredef Command
Purpose
Creates a predefined printer data-stream definition.
Syntax
piopredef [ -r] -dQueueDeviceName -q PrintQueueName
-s DataStreamType -t PrinterType
Description
The piopredef command creates a predefined printer data-stream
definition from a virtual printer definition. It can be thought
of as the inverse of the mkvirprt command. The mkvirprt command
copies a predefined printer data stream definition to create a
virtual printer definition, which can then be customized as
desired. The piopredef command, however, copies a customized
virtual printer definition to create a predefined printer data
stream definition.
The piopredef command can be used to create a predefined printer
definition for an unsupported printer that accepts a print data
stream similar to that of a supported printer. For example, a
virtual printer definition for an IBM 4201-3 Proprinter III can
be created with the mkvirprt command, displayed with the
lsvirprt command, modified as necessary for the unsup-
ported printer with the chvirprt command, and then specified
with the piopredef command to create a predefined definition for
the unsupported printer.
The new predefined printer definition can then be specified with
a mkvirprt command to generate additional virtual printers for
the unsupported printer type on the same computer, or transported
to other computers and used there.
Flags
-d QueueDeviceName Specifieswith the QueueDeviceName variable the
spooler of the customized virtual printer definition to be used
to create the predefined printer definition.
-q PrintQueueName Specifieswith the PrintQueueName variable the
spooler of the virtual printer definition to be used to create
the predefined printer definition.
-r Specifies that if the -s flag and the -t flag specify a prede-
fined printer definition that already exists, the existing one
should be replaced.
-s DataStreamType Specifies with the DataStreamType variable the
printer for the predefined printer definition to be created.
Example data stream types are:
asc IBM extended ASCII
gl Hewlett-Packard GL
pcl Hewlett-Packard PCL
ps PostScript
630 Diablo 630
855 Texas Instruments 855.
-t PrinterType Specifies the printer type for the predefined
printer definition to be created. Examples of existing printer
types are: 4201-3, hplj-2, ti2115, and so on.
Note: If no flags are specified, the command syntax is displayed.
Example
To create a new predefined printer definition from an existing
virtual printer definition for the virtual printer, enter:
piopredef -d mypro -q proq -s asc -t 9234-2
The attributes for the virtual printer assigned to the mypro
queue device on the proq print queue are copied to create a new
predefined printer definition for the 9234-2 printer (asc data
stream).
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/etc/piopredef file Command file.
/usr/lpd/pio/predef/* directory Predefined printer data stream at-
tribute files. File names are in the format:
PrinterType.DataStreamType.
/usr/lpd/pio/custom/* directory Customized virtual printer attri-
bute files. File names are in the format:
PrintQueueName:QueueDeviceName.
Suggested Reading
Prerequisite Information
Glossary Terms: data stream, virtual printer.
The Printer Overview for System Management explains the concepts
of managing the print subsystem, such as Understanding the Print
Spooler and Understanding the Printer Backend.
The Queuing System Overview for System Management . explains the
concepts needed to configure print queues, queue devices, and
virtual printers, as well as information about managing jobs al-
ready in the print queue.
Related Information
Printer Addition Management Subsystem: Programming Overview
explains the concepts you need to add a new printer to
the system.
How to Add a Printer Using the Virtual Printer Commands explains
how to add a printer that closely emulates a supported printer.
How to Add a Printer Using the Printer Colon File explains how
to add a new printer that emulates several data streams or that
does not closely emulate an existing printer.
Printer Code Page Translation Tables describes the two-stage
process of translating code points in the print file to code
points for the printer.
Printer Colon File Conventions lists the conventions for printer
and attribute names and values in colon files.
Printer Colon File Escape Sequences describes the embedded
references and logic for attribute values in the printer back-
end's database colon files that are placed in the attribute
string.
Printer Specific Information provides configuration and use in-
formation for specific printers.
Virtual Printer Attribute Values provides an overview of the at-
tribute values that reside in the colon files in the Predefined
and Customized database directories.
Printer Support Provided with AIX Version 3 lists the printer
classes supported by AIX for RISC System/6000 and printers that
are representative of those classes.
Printer Backend Overview for Programming presents the concepts
you need to write your own printer backend.
2
pac Command
Purpose
Prepares printer/plotter accounting records.
Syntax
/usr/bin/pac [ -c ] [ -m ] [ -p Price ] [ -P Printer ] [ -q
File] [ -r ] [ -s ] [ Name ... ]
Description
The pac command prepares printer/plotter accounting records for
each user of the selected printer or for the users specified by
the Name parameter. For printer choices, see the -P flag.
The unit of measure is the number of pages, with the exception of
rasher devices, for which feet of paper is measured. Output is
expressed both as the number of units used and the charge in dol-
lars. For information on the charge (price) per unit, see the -p
flag.
Flags
-c Sorts the output by price instead of alphabetically by user.
-m Groups all the printing charges for a user, regardless of the
host machine.
-p Price Specifies the price, in dollars, charged per unit of out-
put. Alternatively, the system charges $0.02 per unit.
-P Printer Specifies the printer for which accounting records are
prepared. Alternatively, the system selects the printer named by
the PRINTER environment variable, or the default value lp0.
-qFile Specifies the queue configuration file. The default value
is /usr/bin/qconfig.
-r Reverses the sorting order, so that records are sorted alpha-
betically from z to a, or in descending order by price.
-s Summarizes the accounting information in a summary file. This
flag is needed for busy systems.
Examples
1. To produce printer/plotter accounting information for all users
of the lp0 printer, enter:
/usr/bin/pac
The command displays the number of printed pages and the charge,
sorted by user. This assumes that there is no PRINTER environ-
ment variable.
2. To collect printer/plotter accounting records in a summary
file, enter:
/usr/bin/pac -s
3. To produce printer/plotter accounting information for
smith, jones and greene from
the lp12 printer enter:
/usr/bin/pac -Plp12 smith jones greene
Implementation Specifics
This command is part of Accounting Services in AIX BOS Extensions
2 and is provided for compatibility with Berkeley Software Dis-
tribution (BSD) systems.
Files
/usr/bin/pac The path to the pac command.
/usr/bin/qconfig The path to the file.
/usr/adm/?acct Contains raw accounting files.
/usr/adm/?_sum Contains summary accounting files.
Suggested Reading
Prerequisite Information
The following glossary entries: accounting system, default
value, default, directory, flag, output, parameter, path,
record, system, user, value.
How to Set Up an Accounting System describes the steps you must
take to establish an Accounting System.
Accounting Overview describes the Accounting System, the
preparation of daily and monthly reports, and the accounting
files.
Related Information
The acct/* command, acctcms command, acctcom command, acctcon
command, acctmerg command, acctprc command, runacct command.
2
chsnaobj Command
Purpose
Changes the description of a currently defined profile in the SNA
configuration database.
Syntax
chsnaobj -t ObjectType [ SubOptions ] ProfileName
Description
The chsnaobj command changes the description of the ObjectType
and ProfileName profile in the SNA configuration database. The
fields that are changed depend on the ObjectType selected and are
specified by the field attribute options described below. The
ProfileName parameter specifies the name of the
SNA configuration database entry to be changed.
The SubOptions parameter specifies the possible flags the user
may choose within the ObjectType class. Refer to the mksnaobj
and chsnaobj Object Classes for more information on the different
flags associated with each ObjectType.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit chsnaobj
Flags
-t ObjectType Specifies the profile type to be changed. The
SubOptions parameter is a subset of field attribute op-
tions based on ObjectType selected.
Example
In order to make local LU profile LU20 CP Session Capable, enter
the following command:
chsnaobj -t local_lu -u lu6.2 -p yes LU20
Refer to the mksnaobj and chsnaobj Object Classes for more in-
formation on the different flags associated with each ObjectType.
Implementation Specifics
This command is part of AIX Systems Network Architecture Ser-
vices/6000.
This command is not available for Japanese Language Support.
Files
/usr/bin Directory in which the chsnaobj command resides.
Suggested Reading
Related Information
The mksnaobj command, rmsnaobj command.
The mksnaobj and chsnaobj Object Classes.
The System Management Interface Tool (SMIT) Overview.
2
learn Command
Purpose
Provides computer aided instruction courses and practice for us-
ing files, editors, macros, and other features.
Syntax
learn [ -Directory] [Subject | LessonNumber]
Description
The learn command provides computer aided instruction courses and
practice for using files, editors, macros, and other features.
To invoke this command, type learn. If this is the first time
you are invoking the learn command, you are guided through a
series of questions to determine what type of instruction you
want to receive.
To enter the learn command in a specific lesson, use a numeric
value, Number following the learn command. If this is not the
first time you are invoking the learn command, you are positioned
at the place where you last terminated your learn command ses-
sion.
To bypass questions, you can enter a Subject or a Lesson. In
order to enter a Lesson, you must know the Lesson number that you
received in a previous learn command session. If you do not know
the Lesson number, you can enter the Lesson number as a Subject.
The learn command searches for the first lesson containing the
Subject you specified. The following are the
subjects you can specify:
* Files
* Editors
* More files
* Macros
* EQN
* C.
Subcommands
The bye command terminates a learn command session and the where
command tells you of your progress, with where m telling you
more. The command again re-displays the text of the lesson and
again Lesson lets you review Lesson. The command hint
prints the last part of the lesson script used to evaluate a
response, while hint m prints the whole lesson script.
Flag
-Directory Allows you to exercise a script in a nonstandard place.
Example
To take the online lesson about Files, type:
learn files
You will then be prompted for further input.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/usr/bin Subtree for all dependent directories and files.
/usr/tmp/pl** Playpen directories.
$HOME/.learnrc Startup information.
Suggested Reading
Prerequisite Information
The following glossary entry: computer aided instruction.
Related Information
The ex command.
Shells Overview.
3
sendbug Command
Purpose
Mails a system bug report to a specified address.
Syntax
sendbug [ Address ]
Description
The sendbug command is a shell script to assist the user in com-
posing and mailing bug reports in the correct format.
The sendbug command invokes the editor specified by the EDITOR
environment variable on a temporary copy of the bug re-
port format outline. The default editor is vi.
Fill out the appropriate fields in the bug report format outline
and exit the editor. The sendbug command mails the completed re-
port to the address specified by the Address parameter. The de-
fault address is POSTMASTER.
File
/usr/lib/bugformat Contains the bug report outline.
Suggested Reading
Prerequisite Information
Glossary Terms: address, editor, shell script.
Message Handler (MH) Overview for System Management.
Related Information
The bugfiler command, env command, sendmail command.
Editing a File with the vi Editor.
3
ruptime Command
Purpose
Shows the status of each host on a network.
Syntax
ruptime [ -a] [ -r] [ -l | -t | -u]
Description
The ruptime command displays the status of each host that is on a
local network and is running the rwhod daemon. The status lines
are sorted by host name unless the -l, -t, or -u flag is indi-
cated. The status information is provided in packets broadcast
once every 3 minutes by each network host running the rwhod dae-
mon. Any activity (such as power to a host being turned on or
off) that takes place between broadcasts is not reflected until
the next broadcast. Hosts for which no status information is re-
ceived for 11 minutes are reported as down.
Output is in the following fomat: hostname, status, time, number
of users, and load average. Load average represents the load
averages over 5, 10, and 15 minute intervals prior to a server's
transmission. The load averages are multiplied by 10 to
represent the value in decimal format.
Flags
-a Includes all users. Without this flag, users whose sessions
are idle an hour or more are not included.
-l Sorts the list by the load average.
-r Reverses the sort order. The -r flag should be used with the
-l, -t or -u flag.
-t Sorts the list by the uptime.
-u Sorts the list by the number of users.
Examples
1. To get a status report on the hosts on the local network,
enter:
ruptime
Information similar to the following is displayed:
host1 up 5:15, 4 users, load 0.09, 0.04, 0.04
host2 up 7:45, 3 users, load 0.08, 0.07, 0.04
host7 up 7:43, 1 user, load 0.06, 0.12, 0.11
2. To get a status report sorted by load average, enter:
ruptime -l
Information similar to the following is displayed:
host2 up 7:45, 3 users, load 0.08, 0.07, 0.04
host1 up 5:18, 4 users, load 0.07, 0.07, 0.04
host7 up 7:43, 1 user, load 0.06, 0.12, 0.11
Implementation Specifics
This command is part of the TCP/IP Facility in Network Facilities
of AIX for RISC System/6000.
Files
/var/spool/rwho/whod.* Indicates data files received from remote
rwhod daemons.
/usr/ucb/ruptime Command executable file.
Suggested Reading
Prerequisite Information
Glossary Terms: host, network, daemon.
Network Overview.
Related Information
The rwho command.
The rwhod daemon.
3
lsitab Command
Purpose
Lists records in the /etc/inittab file.
Syntax
lsitab { -a | Identifier}
Description
The lsitab command displays a record in the /etc/inittab file.
It allows you to list either a specific record with the
Identifier field, or all records in the
/etc/inittab file. The Identifier field is a field of
one to fourteen characters used to uniquely identify an object.
If the Identifier field is not unique, the command is unsuccess-
ful.
Flag
-a Specifies that all stanzas in the /etc/inittab file are list-
ed.
Example
1. To list the record in /etc/inittab file for tty2, enter:
lsitab "tty002"
The output is: tty002:2:respawn:/etc/getty /dev/tty2
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/etc/inittab Directory where the lsitab command resides.
/etc/filesystems File that contains the file system stanzas.
Suggested Reading
Prerequisite Information
The following glossary entries: record.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
Related Information
The init command.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
3
troff Command
Purpose
Formats text for printing on typesetting devices.
Syntax
troff [ -a -i -q -z ] [ -F Directory ] [ -n Number ] [
-o List ] [ -r ANumber ] [ -s Number ] [
-T Name ] [ -mm | -me | -mptx | -ms | -man
| -mv ] [ File... | - ]
Description
The troff command reads one or more files and formats the text
for printing on a phototypesetter or comparable device. If no
File... parameter or - (minus) flag is specified
as the last parameter, standard input is read by default.
Notes:
1. The troff command uses Eastern Standard Time (EST). Depending
on the time of year and the local time zone, the date that the
troff command generates can be incorrect by as
much as one day.
2. The .tl request cannot be used before the first break-
producing request in the input to the troff command.
Flags
-a Sends a printable ASCII approximation of the results to stan-
dard output.
-i Reads standard input after there are no more files.
-q Calls the simultaneous input/output mode of the .rd request.
-z Prints only messages generated by .tm (workstation message)
requests.
-FDirectory Accesses font information from the Directory/devName
directory instead of the default /usr/lib/font/devName (where
Name is given by the -T flag).
-nNumber Numbers the first printed page with the value specified
by the Number variable.
-oList Prints only pages specified by the List variable, which
consists of a comma-separated list of page numbers and ranges:
* A range of Start-Stop means print pages Start through Stop. For
example, 9-15 prints pages 9 through 15.
* An initial -Stop means print from the beginning to page Stop.
* A final Start- means print from page Start to the end.
* A combination of page numbers and ranges prints the specified
pages. For example, -3,6-8,10,12- prints from the beginning
through page 3, pages 6 through 8, page 10, and page 12 to the
end.
Note: When this flag is used in a pipeline (for example, with one
or more of the pic, eqn, or tbl commands) you may receive a
broken pipe message if the last page in the document is
not specified in the List variable. This broken pipe message is
not an indication of any problem and can be ignored.
-rANumber Sets the register specified by the A variable to the
specified number. The A variable value must have a one-character
ASCII name.
-sNumber Generates output to make the typesetter stop every speci-
fied number of pages.
-TName Prepares the output for the specified printing device.
Alternatively, the TYPESETTER environment variable may be set.
Note: You will get a bad point size message if your device does
not support a point size that you specified. The troff command
will use the closest valid point size to continue formatting.
-man Selects the man macro-processing package.
-me Selects the me macro-processing package.
-mm Selects the mm macro-processing package.
-mptx Selects the mptx macro-processing package.
-ms Selects the ms macro-processing package.
-mv Selects the mv macro-processing package.
- Forces input to be read from standard input.
Implementation Specifics
This command is part of Formatting Tools in the Text Formatting
System of AIX for RISC System/6000.
Files
/usr/lib/tmac/tmac.* file Contains the pointers to standard macro
files.
/usr/lib/macros/* file Denotes standard macro files.
/usr/lib/font/dev*/* file Contains the font width tables.
/usr/tmp/trtmp* file Denotes a temporary file.
Suggested Reading
Prerequisite Information
Glossary Terms: ASCII, broken pipe message, standard input,
standard output, phototypesetter, pipeline, register.
Related Information
The eqn command, grap command, mmt command, nroff command,
pic command, tbl command, and tc command.
The nroff/troff requests.
The me marcro package, ms macro package, man macro package,
mm macro package, mptx macro package, mv macro package.
3
lsquedev Command
Purpose
Displays the device stanza name.
Syntax
lsquedev [ -c] -qName -d Name
Description
The lsquedev command displays the name of the queue stanza and
associated attributes.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit lsquedev
For a more precise entry into a certain part of the Devices path
in SMIT, see Devices in SMIT .
Flags
-c Specifies colon output format for use by SMIT.
-d Name Specifies the Name of the device stanza that is displayed.
-q Name Specifies the Name of the queue containing the device
stanza that is displayed.
Examples
1. To display device stanza dlp0 on the lp0 queue, enter:
lsquedev -q lp0 -d dlp0
A listing similar to the following is displayed:
dlp0:
FILE = /dev/lp0
BACKEND = /usr/lpd/piobe
2. To display device stanza dlp0 on the lp0 queue in colon format,
enter:
lsquedev -c -qlp0 -d dlp0
A listing similar to the following is displayed:
file:access:feed:header:trailer:backend:align
dlp0:/dev/lp0:read:never:never:never:/usr/lpd/piobe:TRUE
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/lsquedev Command file.
/usr/lpd/qconfig Configuration file.
Suggested Reading
Prerequisite Information
Glossary Terms: queue, queue device, queue stanza, stanza.
The System Management Interface Tool (SMIT) Overview describes
the SMIT application.
The Devices Overview for System Management explains adding,
changing, moving, and removing devices.
The Printer and Queue Overview descirbes how the system handles
printed output. Included are descriptions of how to do various
print functions using SMIT, such as starting a print job and
showing the status of a print job.
The Printer Overview for System Management explains the concepts
needed for managing the print subsystem, such as Understanding
the Print Spooler and Understanding the Printer Backend.
The Queuing System Overview for System Management explains the
concepts needed to configure print queues, queue devices, and
virtual printers, as well as information about managing jobs al-
ready in the print queue.
Related Information
The lsque command, chquedev command, mkquedev command,
rmquedev command.
The printf subroutine.
The smit command explains how to run the smit command, what
flags to use to vary the output, and how to use the smit.script
and smit.log files.
The qconfig file.
List of Changeable Attributes for Devices describes specific at-
tributes and their possible values.
How to Add a Printer Using the Virtual Printer Commands explains
how to add a printer that closely emulates a supported printer.
How to Add a Printer Using the Printer Colon File explains how
to add a new printer that emulates several data streams or that
does not closely emulate an existing printer.
Printer Code Page Translation Tables describes the two-stage
process of translating code points in the print file to code
points for the printer.
Printer Colon File Conventions lists the conventions that have
been established for printer and attribute names and values in
colon files.
Printer Colon File Escape Sequences describes the embedded
references and logic for attribute values in the printer back-
end's database colon files that are placed in the attribute
string.
Printer Specific Information provides configuration and use in-
formation for specific printers.
Printer Support Provided with AIX Version 3 lists the printer
classes supported by AIX for RISC System/6000 and printers that
are representative of those classes.
Virtual Printer Attribute Values provides an overview of the at-
tribute values that reside in the colon files in the Predefined
and Customized database directories.
3
install_mh Command
Purpose
Sets up mailbox directories.
Syntax
install_mh [ -auto ]
Description
The install_mh command sets up mailbox directories. The
install_mh command is designed to be called by
other programs, not run directly by the user.
The install_mh command runs automatically the first time you run
any Message Handler (MH) command. The install_mh command prompts
you for the name of your mail directory. If the directory does
not exist, the install_mh command asks you if it should be creat-
ed. The install_mh command creates the $HOME/.mh_profile file
and places the Path: profile entry in it. This entry
identifies the location of your mailbox by specifying the direc-
tory path for your MH directory, UserMHDirectory.
Flag
-auto Creates the standard MH path without prompting.
Implementation Specifics
This command is part of Message Handler in the Base Operating
System (BOS) Extensions 1 of AIX for RISC System/6000.
File
$HOME/.mh_profile Contains the MH user profile.
Suggested Reading
Prerequisite Information
Glossary Terms: mailbox, profile.
Message Handler (MH) Overview for System Management.
Related Information
The .mh_profile file.
3
mark Command
Purpose
Creates, modifies, and displays message sequences.
Syntax
mark [ +Folder ] [ -list ] [ [ -sequence Name ]
[ Message ... ] [ -add | -delete ] [ -zero |
-nozero ] [ -public | -nopublic ] ]
Description
The mark command creates, deletes, adds, and lists the messages
in a sequence. The mark command by default, lists all of the se-
quences and their messages for the current folder. If you use
the -add or -delete flag, you must also use the -sequence flag.
When all messages are deleted from a sequence, the mark command
removes the sequence name from the folder.
To create a new sequence, enter the -sequence flag with the name
of the sequence you want to create. The mark command creates the
sequence starting with the current message. By default, the mark
command places the sequence in the current folder. If you speci-
fy a folder, that folder becomes the current folder.
Flags
-add Adds messages to a sequence. The -add flag is the default.
If you do not specify a message, the mark command uses the
current message.
Note: You can only use this flag with the -sequence flag.
-delete Deletes messages from a sequence. If you do not specify a
message, the current message is deleted by default.
Note: You can only use this flag with the -sequence flag.
+Folder Specifies the folder.
-help Displays help information for the command.
-list Displays the messages in a sequence. By default, the -list
flag displays all the sequence names and messages defined for the
current folder. To see a specific sequence, use the -sequence
flag with the -list flag.
Message Specifies a message in a sequence. You can specify more
than one message at a time. Messages can be identified with fol-
lowing references:
Number Number of the message
all All the messages in a folder
cur or . Current message. This is the default.
first First message in a folder
last Last message in a folder
next Message immediately after the current message
prev Message immediately before the current message
If the -list flag is used, the default for the Messages parameter
is all. Otherwise, the default is the current message.
-nopublic Restricts a sequence to your usage. The -nopublic flag
does not restrict the messages in the sequence, only the sequence
itself. This option is the default if the folder is write-
protected from other users.
-nozero Modifies the sequence by adding or deleting only the
specified messages. This flag is the default.
-public Makes a sequence available to other users. The -public
flag does not make protected messages available, only the se-
quence itself. This flag is the default if the folder is not
write-protected from other users.
-sequence Name Specifies a sequence for the -list, -add, and
-delete flags.
-zero Clears a sequence of all messages except the current mes-
sage. When the -delete flag is also specified, the -zero flag
places all of the messages from the folder into the sequence be-
fore deleting any messages.
Profile Entries
The following entry is found in the UserMHDirectory/context file:
Current-Folder: Specifies the default current folder.
The following entry is found in the $HOME/.mh_profile file:
Path: Specifies the MH directory.
Examples
1. To see the list of all the sequences defined for the current
folder, enter:
mark
The system displays a message similar to the following:
cur: 94
test: 1-3 7 9
In this example, message 94 is the current message number in the
current folder. The message sequence called test includes mes-
sage numbers 1, 2, 3, 7, and 9.
2. To see the list of all the sequences defined for the meetings
folder, enter:
mark +meetings
The system displays a message similar to the following:
cur: 5
dates: 12 15 19
3. To create a new message sequence called schedule in the current
folder, enter:
mark -sequence schedule
The system displays the shell prompt to indicate that the
schedule sequence was created. By default the
system adds the current message to the new sequence.
4. To delete message 10 from the schedule sequence, enter:
mark -sequence schedule 10 -delete
Implementation Specifics
This command is part of Message Handler in the Base Operating
System (BOS) Extensions 1 of AIX for RISC System/6000.
Files
$HOME/.mh_profile file Specifies the MH user profile.
/usr/bin/mark file Contains the executable form of the mark com-
mand.
Suggested Reading
Prerequisite Information
Glossary Terms: default, file, flag, folder, format, mes-
sage.
Message Handler (MH) Overview.
Mail Overview.
Related Information
The pick command.
The mh_alias file format, mh_profile file format.
3
lsscreen Command
Purpose
Sends the contents on the display screen to a file.
Syntax
lscreen [ -n PathName ]
Description
The lsscreen command appends the contents of a display screen to
a file. If no file is specified, it writes to standard output.
To put the screen contents into the /u/mary/myscreen file, enter:
lsscreen -n /u/mary/myscreen
Note: This command is usable only on a High Function Terminal
(HFT).
Flags
-n PathName Designates the full path name of the file in which to
append the screen contents.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/lsscreen Contains the command file.
Suggested Reading
Prerequisite Information
Glossary terms: default.
HFT Subsystem Conceptual Introduction.
Related Information
The Query (HFQUERY) ioctl Operation.
3
ypmatch Command
Purpose
Displays the values of given keys within an NIS map.
Syntax
Display Key Values for an NIS Map
/usr/bin/ypmatch [ -d Domain ] [ -k ] [ -t ] Key ... MapName
Display the NIS Map Nickname Table
/usr/bin/ypmatch -x
Description
The ypmatch command displays the values associated with one or
more keys within an NIS map. Use the MapName parameter to speci-
fy either the name or nickname of the map you want to search.
When you specify multiple keys in the Key parameter, the system
searches the same map for all of the keys. Since pattern match-
ing is not available, match the capitalization and length of each
key exactly. If the system does not find a match for the key or
keys you specify, a diagnostic message is displayed.
Flags
-d Specifies a domain other than the default domain.
-k Prints a key followed by a colon before printing the value of
the key. This is useful only if the keys are not duplicated in
the values or if you have specified so many keys that the output
could be confusing.
-t Inhibits translation of nickname to map name.
-x Displays the map nickname table. This lists the nicknames (as
specified by the MapName parameter) the command knows of and in-
dicates the map name associated with each nickname.
Example
To display the value associated with a particular key, enter:
ypmatch -d ibm -k host1 hosts
In this example, the ypmatch command displays the value of the
host1 key from the hosts map in the ibm domain.
Implementation Specifics
This command is part of NFS in Network Support Facilities in Base
Operating System Runtime.
Suggested Reading
Prerequisite Information
Glossary Terms: domain, key, parameter.
For information about managing NIS, see Network Information Ser-
vice (NIS) Overview for System Management.
Related Information
The ypcat command.
Network File System (NFS) Overview for System Management.
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.
3
rmque Command
Purpose
Removes a printer queue from the system.
Syntax
rmque -q Name
Description
The rmque command removes a queue from the system configuration
by deleting the queue stanza named by the -q flag from the
qconfig file. All queue devices must be deleted using
the rmquedev command before entering this command.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit rmque
For a more precise entry into a certain part of the Devices path
in SMIT, see Devices in SMIT .
Note: Do not edit the qconfig file while there are active jobs in
any queue. Editing includes both manual editing and use of the
chque, mkque, rmque, mkquedev, rmquedev, or
chquedev commands. It is recommended that all
changes to the qconfig file be made using these commands. Howev-
er, if manual editing is desired, first issue the enq -G command
to bring the queuing system and the qdaemon to a halt after all
jobs are processed. Then edit the qconfig file and restart the
qdaemon with the new configuration.
Flag
-q Name Specifies the name of the queue to be removed.
Example
To remove printer queue lp0, enter:
rmque -q lp0
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/rmque Contains the command file.
/usr/lpd/qconfig Contains the configuration file.
Suggested Reading
Prerequisite Information
Glossary Terms: queue stanza, queue device.
The System Management Interface Tool (SMIT) Overview explains
the SMIT application.
The Devices Overview for System Management describes adding,
changing, moving, and removing devices.
The Printer and Queue Overview presents an overview of how the
system handles printed output. Included are descriptions of how
to do various print functions using SMIT, such as starting a
print job and showing the status of a print job.
The Printer Overview for System Management explains the concepts
needed for managing the print subsystem, such as Understanding
the Print Spooler and Understanding the Printer Backend.
The Queuing System Overview for System Management explains the
concepts needed to configure print queues, queue devices, and
virtual printers, as well as information about managing jobs al-
ready in the print queue.
Related Information
The chque command, lsque command, mkque command, rmquedev
command.
The smit command tells how to run the smit command, what flags
to use to vary the output, and how to use the smit.script and
smit.log files.
The qconfig file.
4
nroff Command
Purpose
Formats text for printing on typewriter-like devices and line
printers.
Syntax
nroff [ -o List ] [ -n Number ] [ -s Number ] [ -r ANumber ]
[ -i -q -z -e -h ] [ -T Name ]
[ -u Number ] [ -man -me -mm
-mptx -ms ] [ File... | - ]
Description
The nroff command reads one or more files for printing on type-
writer-like devices and line printers. If no File... parameter
is specified or the - (minus) flag is specified as the last
parameter, standard input is read by default.
The col command may be required to postprocess nroff output in
certain cases.
Flags
-e Produces equally-spaced words in adjusted lines, using the full
resolution of a particular terminal.
-h Uses output tabs during horizontal spacing to speed output and
reduce the output character count. Tab settings are assumed to
be every eight nominal character widths.
-i Reads standard input after reading all specified files.
-man Selects the man macro processing package.
-me Selects the me macro processing package.
-mm Selects the mm macro processing package.
-mptx Selects the mptx macro processing package.
-ms Selects the ms macro processing package.
-nNumber Assigns the specified number to the first printed page.
-oList Prints only those pages specified by the List variable,
which consists of a comma-separated list of page numbers and
ranges, as follows:
* A range of Start-Stop means print pages Start through Stop. For
example, 9-15 prints pages 9 through 15.
* An initial -Stop means print from the beginning to page Stop.
* A final Start- means print from page Start to the end.
* A combination of page numbers and ranges prints the specified
pages. For example, -3, 6-8,10,12- prints the beginning through
page 3, pages 6 through 8, page 10, and page 12 to the end.
Note: When the -oList flag is used in a pipeline (as with one or
more of the eqn or tbl commands) you may receive a broken pipe
message if the last page in the document is not
specified in the List parameter. This broken pipe message is not
an indication of any problem and can be ignored.
-q Calls the simultaneous input/output mode of the .rd request.
-rANumber Sets register A to the specified number. The value
specified by the A variable must have a one-character ASCII name.
-sNumber Stops every specified number of pages (the default is 1).
The nroff command halts every specified number of pages to allow
paper loading or changing, then resumes upon receipt of a
linefeed or newline character. This flag does not work in pipe-
lines; for example, with the mm command. When the nroff command
halts between pages, an ASCII BEL character is sent to the works-
tation.
-TName Prepares the output for the specified printing device.
Terminal Names for Phototypesetter or Comparable Devices gives
possible Name variable values. The default is 37.
Note: The IBM 4019 and the HP Laser Jet II printer both have non-
printable areas at the top and bottom of a page. If a file is
targeted for these printers, be sure to define top and bottom
margins (for example, by formatting with -mm) so that all output
will be positioned within the printable page.
- Forces input to be read from standard input.
Terminal Names for Text Formatting
Terminal Names for Typewriter-like Devices and Line Printers
The following Name variable values of supported devices are used
with the -TName flag of the nroff command for AIX international
extended characters, as well as English-language characters, di-
gits, and symbols:
hplj Hewlett-Packard LaserJet II.
ibm3812 IBM 3812 Pageprinter II.
ibm3816 IBM 3816 Pageprinter.
ibm4019 IBM 4019 LaserPrinter.
37 Teletype Model 37 terminal (default) for terminal viewing only.
This device does not support extended characters, which are in-
putted by the NCesc form or the \[N] form. Inputting Extended
Characters gives more information.
lp Generic name for printers that can underline and tab. All text
sent to the lp value using reverse line feeds (for example, text
that includes tables) must be processed with the col command.
This device does not support extended characters which input by
the NCesc form or the \[N] form. Inputting Extended Characters
gives more specific information.
ppds Generic Name for printers which support the personal printer
data streams such as the IBM Quietwriter III, IBM Quickwriter,
and IBM Proprinters.
ibm5575 IBM 5575 Kanji Printer (provided for Japanese Language
Support).
ibm5577 IBM 5577 Kanji Printer (provided for Japanese Language
Support).
For completeness of the Text Formatting System, the following
devices are shipped as is from the AT&T Distribution. No support
is provided for these tables.
2631 Hewlett-Packard 2631 printer in regular mode
2631-c Hewlett-Packard 2631 printer in compressed mode
2631-e Hewlett-Packard 2631 printer in expanded mode
300 DASI-300 printer
300-12 DASI-300 terminal set to 12 characters per inch
382 DTC-382
4000a Trendata 4000a terminal (4000A)
450 DASI-450 (Diablo Hyterm) printer
450-12 DASI-450 terminal set to 12 characters per inch
832 Anderson Jacobson 832 terminal
8510 C.ITOH printer
tn300 GE Terminet 300 terminal
X Printers equipped with a TX print train
300s DASI-300s printer (300S)
300s-12 DASI-300s printer set to 12 characters per inch (300S-12).
Terminal Names for Phototypesetter or Comparable Devices
The following Name variable values of supported devices are used
with the -TName flag of the troff command for AIX international
extended characters:
ibm3812 IBM 3812 Pageprinter II
ibm3816 IBM 3816 Pageprinter
hplj Hewlett-Packard LaserJet II with K cartridge
ibm5587G IBM 5587-G01 Kanji Printer (for Japanese Language Sup-
port).
In addition, it is possible to set the TYPESETTER environment
variable to one of the preceding values instead of using the
-TName flag of the troff command.
-uNumber Sets the bold factor (number of character overstrokes)
for the third font position (bold) to the specified number, or to
0 (zero) if the Number variable is missing.
-z Prints only messages generated by .tm (workstation message)
request.
Implementation Specifics
This command is part of Formatting Tools in the Text Formatting
System of AIX for RISC System/6000.
Files
/usr/lib/tmac/tmac.* file Contains pointers to standard macro
files.
/usr/lib/macros/*b file Contains standard macro files.
/usr/lib/nterm/* file Contains the terminal driving tables for the
nroff command.
/usr/pub/terminals file Contains a list of supported terminals.
Suggested Reading
Prerequisite Information
Glossary Terms: ASCII, BEL character, broken pipe message,
linefeed, newline, request, pipeline, standard input.
Related Information
The col command, mm command, neqn command, tbl command.
The man macro package, me macro package, mm macro package,
mptx macro package, ms macro package.
The nroff/troff requests.
4
pwdck Command
Purpose
Verifies the correctness of local authentication information.
Syntax
pwdck { -p | -n | -t | -y } {ALL | User ... }
Description
The pwdck command verifies the correctness of the password infor-
mation in the user database files, by checking the definitions
for ALL the users or for the users specified by the User parame-
ter. If more than one user is specified, there must be a space
between the names. You must select a flag to indicate whether
the system should try to fix erroneous attributes. The following
attributes are checked for locally defined users:
/etc/passwd file
entry Checks to ensure that each entry is readable and that it
contains at least two colons (:). If you indicate that the sys-
tem should fix errors, the entire entry is discarded.
passwd Checks to ensure that the password field is an ! (exclama-
tion mark). If you indicate that the system should fix errors,
it transfers the information in the password field to the
/etc/security/passwd file, updates the
lastupdate attribute in the /etc/security/passwd
file, and then replaces the password field in the /etc/passwd
file with an ! (exclamation mark).
user Checks to ensure that the username field starts with an al-
phabetic character, contains only alphanumeric characters, and
does not contain the ALL, default, or * key words. If you indi-
cate that the system should fix errors, it removes this user's
entry line from the /etc/passwd file. If the username starts
with a + or a - symbol, the user is not locally defined, and
checks are not performed.
/etc/security/passwd file
line Checks to ensure that each line is readable and is part of a
stanza. Any invalid line is discarded.
password Checks to ensure that the password attribute exists and
is not blank, if passwords are required on the system. If you
indicate that the system should fix errors, the password is set
to * (asterisk), and the lastupdate attribute is discarded. In
general, passwords are required if either of the minalpha or
minother password restrictions are set to non-
zero values in the /etc/security/login.cfg file. If a user's
flags attribute specifies the NOCHECK keyword, a
password is not required for this user, and the check is ignored.
lastupdate Checks to ensure that the lastupdate attribute exists
for a valid non-blank password, and that its time is prior to the
current time. If you indicate that the system should fix errors,
the lastupdate attribute is discarded or updated, depending on
the password attribute. The lastupdate attribute is discarded if
the password attribute doesn't exist, or equals a blank or an *
(asterisk). Otherwise, the lastupdate time is set to the current
time.
flags Checks to ensure that the flags attribute contains only the
keywords ADMIN, ADMCHG, and NOCHECK. If you indicate that the
system should fix errors, it deletes any undefined flags.
/etc/security/user file
auth1 Checks to ensure that each SYSTEM;authname entry defined for
a local user has an authname entry in the /etc/security/passwd
file. If you indicate that the system should fix errors, a stan-
za is added to the /etc/security/passwd file for each missing en-
try, in the following format:
authname:
password = *
If a user's entry and a default entry both are missing from the
/etc/security/user file, the system assumes the
following values and the check on auth1 is performed:
auth1 = SYSTEM;user
auth2 Checks to ensure that each SYSTEM;authname entry defined for
a local user has an authname entry in the /etc/security/passwd
file. If you indicate that the system should fix errors, an en-
try is added for each missing entry.
If a user's entry and a default entry both are missing from the
/etc/security/user file, the system assumes the following values
and the check on auth2 is performed:
auth2 = NONE
When ALL is specified, the pwdck command checks to ensure that
each stanza in the /etc/security/passwd file corresponds to an
authentication name of a local user as a SYSTEM;authname entry in
the /etc/security/user file. If you indicate that the system
should fix errors, a stanza which does not correspond to an auth-
name entry in the /etc/security/user file is discarded from the
/etc/security/passwd file.
The pwdck command locks the /etc/passwd file and the
/etc/security/passwd file when it updates them.
If either of these files are locked by another process, the pwdck
command waits a few minutes for the files to be unlocked, and
terminates if this doesn't happen.
The pwdck command checks to see if the /etc/passwd file and the
/etc/security/passwd file are modified by anoth-
er process while the current pwdck process is running. If you
indicate that the system should fix errors, the pwdck command up-
dates the /etc/passwd file and the /etc/security/passwd file, and
may overwrite any changes made by the other process.
The pwdck command also checks to see if the database management
password files (the etc/passwd.dir file and the /etc/passwd.pag
file) are up-to-date or newer than the system password files (the
/etc/passwd file and the /etc/security/passwd file). If the da-
tabase management password files are out-of-date, a warning mes-
sage appears indicating that the root user should run the
mkpasswd command.
Generally, the sysck command calls the pwdck command as part of
the verification of a trusted-system installation. In addition,
the root user or a member of the security group can enter the
command.
Flags
-n Reports errors but does not fix them.
-p Fixes errors but does not report them.
-t Reports errors and asks if they should be fixed.
-y Fixes errors and reports them.
Security
Access Control:
This command should grant execute (x) access to the root user and
members of the security group. The command should be setuid to
the root user, to read and write the authentication information,
and have the trusted computing base attribute.
Files Accessed:
Mode File
rw /etc/passwd
r /etc/security/user
rw /etc/security/passwd
r /etc/security/login.cfg
Auditing Events
Event Information
PASSWORD_Check User, Error/Fix, Status
PASSWORD_Checkerr File/User, Error, Status
Examples
1. To verify that all local users have valid passwords, enter:
pwdck -y ALL
This reports errors, and fixes them.
2. To ensure that user ariel has a valid stanza in the
/etc/security/passwd file, enter:
pwdck -y ariel
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/pwdck Specifies the path to the pwdck command.
/etc/passwd Contains the basic user attributes.
etc/security/passwd Contains password information.
etc/security/user Contains the extended attributes of users.
/etc/security/login.cfg Contains configuration information and
password restrictions.
Suggested Reading
Prerequisite Information
The following glossary entries: access, attribute, default,
enter, group, group name, ID, installation, kernel, member,
parameter, path, setuid, system, trusted computing base,
user, value, verify.
Security Introduction describes the identification and authenti-
cation of users, discretionary access control, the trusted com-
puting base, and auditing.
Related Information
The grpck command, mkpasswd command, sysck command, usrck
command.
4
inetexp Command
Purpose
Takes the InetServ object class as input and creates or updates
the /etc/inetd.conf and /etc/services files.
Syntax
inetexp
Description
Any time the Object Data Manager (ODM) InetServ object class is
updated, the inetexp command must be called to create or update
the contents of the /etc/ inetd.conf and /etc/ services files to
make sure that their contents remain the same. It is important
to make sure their contents always reflect the same information
because System Resource Controller (SRC) and the inetd daemon use
the information from the ODM object class. When the ODM object
is updated by the inetserv command, the inetexp export routine is
automatically called.
Implementation Specifics
This command is part of TCP/IP in Network Support Facilities in
AIX Base Operating System (BOS) Runtime.
Files
/etc/ inetd.conf Contains configuration information for inetd
Internet service requests.
/etc/ services Contains socket and protocol definitions used for
Internet services.
Suggested Reading
Prerequisite Information
Glossary Term: daemon.
The ODM Overview.
Related Information
The inetimp command, inetd command, inetserv command.
The /etc/inetd.conf file, /etc/services file.
4
tsort Command
Purpose
Sorts an unordered list of ordered pairs (a topological sort).
Syntax
tsort [File]
Description
The tsort command reads from File or standard input an unordered
list of ordered pairs, builds a completely ordered list, and
writes it to standard output.
The input File should contain pairs of nonempty strings separated
by blanks. Pairs of different items indicate a relative order.
Pairs of identical items indicate presence, but no relative ord-
er. You can use the tsort command to sort the output of the
lorder command.
If File contains an odd number of fields, an appropriate error
message is displayed.
Example
The following example creates a properly ordered library:
1. To create a subroutine library, enter:
lorder charin.o scanfld.o scan.o scanln.o \ | tsort
| xargs ar qv libsubs.a
This creates a subroutine library named libsubs.a that contains
charin.o, scanfld.o, scan.o, and scanln.o. The ordering of the
object modules in the library is important. The lorder and tsort
commands together add the subroutines to the library in the prop-
er order.
2. Suppose that scan.o calls scanfld.o and scanln.o. scanfld.o
also calls charin.o. First, the lorder command creates a list of
pairs that shows these dependencies:
charin.o charin.o
scanfld.o scanfld.o
scan.o scan.o
scanln.o scanln.o
scanfld.o charin.o
scanln.o charin.o
scan.o scanfld.o
3. Next, the | (vertical bar) sends this list to the tsort com-
mand, which converts it into the ordering needed:
scan.o
scanfld.o
scanln.o
charin.o
Note that each module precedes the module it calls. charin.o,
which does not call another module, is last.
4. The second | then sends this list to the xargs command, which
constructs and runs the following ar command:
ar qv libsubs.a scan.o scanfld.o scanln.o charin.o
This ar command creates the properly ordered library.
Implementation Specifics
This command is part of Application Development Toolkit in AIX
Base Application Development Toolkit.
Files
/bin/tsort The tsort command.
/usr/bin/tsort Symbolic link to the tsort command.
Suggested Reading
Prerequisite Information
The following glossary entries: library.
Commands Overview
Related Information
The ar command, lorder command, and xargs command.
4
units Command
Purpose
Converts units in one measure to equivalent units in another
measure.
Syntax
units [-] [FileName]
Description
The units command converts quantities expressed in one measure-
ment to their equivalents in another. The units command is an
interactive command. It prompts you for the unit you want to
convert from and the unit you want to convert to . This command
only does multiplicative scale changes. That is, it can convert
from one value to another only when the conversion is done with a
multiplication factor. For example, it cannot convert between
degrees Fahrenheit and degrees Celsius, because the value of 32
must be added or subtracted in the conversion.
You can specify a quantity as a multiplicative combination of un-
its, optionally preceded by a numeric multiplier.
Indicate powers by entering suffixed positive integers and indi-
cate division by / (slash).
The units command recognizes lb as a unit of mass, but considers
pound to be the British pound sterling. Com-
pound names are run together (such as lightyear). Prefix British
units differing from their American counterparts with br
(brgallon for instance). The /usr/lib/unittab
file contains a complete list of the units that the units command
uses.
Most familiar units, abbreviations, and metric prefixes are
recognized by the units command, together with the following:
pi Ratio of circumference to diameter
c Speed of light
e Charge on an electron
g Acceleration of gravity
force Same as g
mole Avogadro's number
water Pressure head per unit height of water
au Astronomical unit.
To start the units command, enter:
units
Now you can try the following examples. In these examples, the
text that you enter is shown in bold type and the output from the
units command is shown in non-bold type.
Examples
1. To display conversion factors:
you have: in
you want: cm
* 2.540000e+00
/ 3.937008e-01
The output from the units command tells you to multiply the
number of inches by 2.540000e+00 to get centimeters, and to mul-
tiply the number of centimeters by 3.937008e-01 to get inches.
These numbers are in standard exponential notation, so
3.937008e-01 means 3.937008 x 10-1, which is
the same as 0.3937008. The second number is always the recipro-
cal of the first; for example, 2.54 equals 1/0.3937008.
2. To convert a measurement to different units:
you have: 5 years
you want: microsec
* 1.577846e+14
/ 6.337753e-15
The output shows that 5 years equals 1.577846 x 1014 mi-
croseconds, and that one microsecond equals 6.337753 x 10-15
years.
3. To give fractions in measurements:
you have: 1|3 mi
you want: km
* 5.364480e-01
/ 1.864114e+00
The | (vertical bar) indicates division, so 1|3 means one-third.
This shows that one-third mile is the same as 0.536448 kilome-
ters.
4. To include exponents in measurements:
you have: 1.2-5 gal
you want: floz
* 1.536000e-03
/ 6.510417e+02
The expression 1.2-5 gal is the equivalent of 1.2 x 10-5. Do not
type an e before the exponent. This example shows that 1.2 x 10-
5 (0.000012) gallons equal 1.536 x 10-3 (0.001536) fluid ounces.
5. To specify complex units:
you have: gram centimeter/second2
you want: kg-m/sec2
* 1.000000e-05
/ 1.000000e+05
The units gram centimeter/second2 mean "grams x centime-
ters/second2." Similarly, kg-m/sec2 means "kilo-
grams x meters/sec2," which is often read as "kilogram-meters per
seconds squared." .
6. If the units you specify after you have and you want are incom-
patible:
you have: ft
you want: lb
conformability
3.048000e-01 m
4.535924e-01 kg
The message conformability means the units you specified cannot
be converted. Feet measure length, and pounds measure mass, so
converting from one to the other does not make sense. Therefore,
the units command displays the equivalent of each value in stan-
dard units.
In other words, this example shows that one foot equals 0.3048
meters and that one pound equals 0.4535924 kilograms. The units
command shows the equivalents in meters and kilograms because the
command considers these units to be standard measures of length
and mass.
Implementation Specifics
Japanese Language Support: This command is not available for
Japanese Language Support.
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/usr/bin/units The units command.
/usr/lib/unittab
Suggested Reading
Prerequisite Information
The following glossary entry: interactive.
4
hostid Command
Purpose
Sets or displays the identifier of the current local host.
Syntax
hostid [ HexNumber | InternetAddress | HostName ]
Description
The hostid command displays the identifier (either a unique host
name or a numeric argument) of the current local host as a hexa-
decimal number. This numeric value is expected to be unique
across all hosts and is commonly set to the address of the host
specified by the InternetAddress or HostName parameter. The root
user can set the hostid command by specifying a hexadecimal
number for the HexNumber, InternetAddress, or HostName parameter.
The host id is set to the hostname by the /etc/rc.net file.
Parameters
HexNumber A unique hexadecimal number representing the current lo-
cal host.
InternetAddress An Internet address representing the current local
host.
HostName A symbolic name that maps to a unique host.
Examples
1. To set the identifier of the local host to the local Internet
address with the hostid command, enter the command in the follow-
ing format:
hostid 192.9.200.3
0xc009c803
The hostid command converts the Internet address 192.9.200.3 into
the hexadecimal representation 0xc009c803, and then sets the lo-
cal host (your workstation connected to a network) to this ad-
dress.
2. To display the identifier of the local host, enter:
hostid
0xc009c803
The hostid command displays the identifier of the host as a hexa-
decimal number.
Implementation Specifics
This command is part of TCP/IP in Network Support Facilities in
AIX Base Operating System (BOS) Runtime.
File
/etc/rc.net Specifies automatic login information for the ftp and
rexec commands.
Suggested Reading
Prerequisite Information
Glossary Terms: host, network address.
Understanding Addressing for TCP/IP.
Related Information
The gethostid subroutine, sethostid subroutine.
The rc.net file.
The hostname command.
4
chps Command
Purpose
Changes attributes of a paging space.
Syntax
chps [ -s LogicalPartitions] [ -a{ y | n}] PagingSpace
Description
The chps command changes attributes of a specific paging space.
The PagingSpace parameter specifies the name of the paging space
to be changed.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit chps
Flags
-a Specifies to use a paging space at the next system restart.
y Specifies that the paging space is configured at subsequent sys-
tem restarts.
n Specifies that the paging space is not configured at subsequent
system restarts.
-s LogicalPartitions Specifies the number of logical partitions to
add.
Examples
1. To change the size of the myvg paging space , enter:
chps -s4 myvg
This adds four logical partitions to the myvg paging space.
2. To specify that the PS02 paging space is used and configured at
subsequent system restarts, enter:
chps -a y PS02
This specifies the PS02 paging space to be used and configured at
subsequent system restarts.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/etc/swapspaces Specifies the paging space devices activated by
the swapon -a command.
Suggested Reading
Prerequisite Information
The following glossary entries: paging space, logical volume.
The Paging Space Overview explains paging space and its alloca-
tion policies.
The File Systems Overview provides information on working with
files.
Related Information
The lsps command, mkps command, rmps command, swapon command.
The Paging Space Overview explains paging space and its alloca-
tion policies.
The File Systems Overview provides information on working with
files.
The System Management Interface Tool (SMIT) Overview explains
the structure, main menus, and tasks that are done with SMIT.
Using SMIT explains SMIT screens, how to navigate in the
screens, and how to enter data.
4
dump Command
Purpose
Dumps selected parts of an object file.
Syntax
dump [ -a -c -d -g -h -l -n -o -p
-H -R -T ] [[[ -zName [,Number]] [ +zNumber]] ...] [[
+tIndex [ -tIndex]] ...] File [File...]
Note: Do not put a space between the -z Name flag and the ,Number
parameter.
Description
The dump command dumps selected parts of the specified File
parameter. The dump command accepts object files, archive object
files, and executable files. The dump command writes information
in character, hexadecimal, octal, or decimal representation.
Flags
-a Dumps the archive header of each member of each specified ar-
chive.
-c Dumps the string table.
-d Dumps the raw data for each section.
-g Dumps the global symbols in the archive symbol table.
-h Dumps section headers.
-l Dumps line number information
-n Dumps all loader section information.
-o Dumps each optional header.
-p Suppresses header printing.
-r Dumps relocation information.
-s Dumps the raw data for each selection.
-t Dumps symbol table entries.
-tIndex Dumps only the index symbol table entry specified with the
Index parameter. Use the -t flag with the +t flag to specify a
range of symbol table entries.
+tIndex Dumps the symbol entry in the range that ends with the
Index parameter. The range starts at the first symbol
table entry or at the entry specified by the -t flag.
-u Underlines the name of the File parameter.
-v Dumps the information in symbolic representation rather than
numeric. Any flag except the -o flag and -s flag can be used
with the -v flag.
-zName[,Number] Dumps line number entries for the Name parameter
or a range of line number entries that starts at the specified
number. You can use a blank to replace the comma that separates
the Name and Number parameters if the entire argument is quoted.
+zNumber Dumps all line numbers up to the Number parameter.
-H Dumps the header of the loader section. The -H flag applies
only to executable files.
-R Dumps the relocation entries for the leader section. The -R
flag applies only to executable files.
-T Dumps the symbol table entries for the loader section. The -T
flag applies only to executable files.
Examples
1. To dump the string table of the a.out file, enter:
dump -c a.out
2. To dump the contents of an XCOFF data section to standard out-
put, enter:
dump -d a.out
3. To dump the object file headers, enter:
dump -o a.out
4. To dump line number information for the a.out file, enter:
dump -l a.out
5. To dump relocation information for the a.out file, enter:
dump -r a.out
6. To dump the contents of the a.out object file text section,
enter:
dump -s a.out
7. To dump symbol table information for the a.out object file,
enter:
dump -t a.out
8. To print symbol table entries 20 to 31 without header informa-
tion, enter:
dump -p -t20 +30 a.out
Implementation Specifics
This command is part of Application Development Toolkit in AIX
Base Application Development Toolkit.
Suggested Reading
Prerequisite Information
The following glossary entries: Extended Common Object File For-
mat (XCOFF), archive, argument, character, entry, executable
files, file, flag, format, header, hexadecimal, index,
member, numeric, object file, octal, output, parameter,
string, table, text.
Related Information
The ar command, nm command, size command.
The a.out file, ar file.
4
lsvg Command
Purpose
Displays information about volume groups.
Syntax
lsvg [ -o ] | [ -n DescriptorPhysicalVolume ] | [ -i ] [ -l |
-M | -p ] VolumeGroup...
Description
The lsvg command displays information about volume groups. If
you use the VolumeGroup parameter, only the information for that
volume group is displayed. If you do not use the VolumeGroup
parameter, a list of the names of all defined volume groups is
displayed.
Note: When information from the Device Configuration Database is
unavailable, some of the fields will have the undefined string
????. The lsvg command attempts to obtain as
much information as possible from the description area when it is
given a logical volume identifier.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit lsvg
Flags
If no flags are specified, the following status is displayed:
Volume group Name of the volume group. Volume group names must be
a system-wide unique name, and can range from 1 to 15 characters.
Volume group state State of the volume group. If the volume group
is activated with the varyonvg command, the state is either
on/full (indicating all physical volumes are active) or
on/partial (indicating all physical volumes are
not active). If the volume group is not activated with the
varyonvg command, the state is off.
Permission Access permission: read-only or read-write.
Max LVs Maximum number of logical volumes allowed in the volume
group.
LVs Number of logical volumes currently in the volume group.
Open LVs Number of logical volumes within the volume group that
are currently open.
Total PVs Total number of physical volumes within the volume
group.
Active PVs Number of physical volumes that are currently active.
VG Identifier The volume group identifier.
PP Size Size of each physical partition.
Total PPs Total number of physical partitions within the volume
group.
Free PPs Number of physical partitions not allocated.
Alloc PPs Number of physical partitions currently allocated to
logical volumes.
Quorum Number of physical volumes needed for a majority.
VGDS Number of volume group descriptor areas within the volume
group.
Auto-on Automatic activation at IPL (yes or no).
-p Lists the following information for each physical volume within
VolumeGroup:
Physical volume A physical volume within the group.
PVstate State of the physical volume.
Total PPs Total number of physical partitions on the physical
volume.
Free PPs Number of free physical partitions on the physical
volume.
Distribution The number of physical partitions allocated within
each section of the physical volume: inside edge, back middle,
center, front middle and outside edge of the physical volume.
-l Lists the following information for each logical volume within
VolumeGroup:
LV A logical volume within the volume group.
Type Logical volume type.
LPs Number of logical partitions in the logical volume.
PPs Number of physical partitions used by the logical volume.
PVs Number of physical volumes used by the logical volume.
Logical volume state State of the logical volume. Open/stale in-
dicates the logical volume is open but contains partitions that
are not current. Open/syncd indicates the logical volume is open
and synchronized. Closed indicates the logical volume has not
been opened.
Mount Point File system mount point for the logical volume, if ap-
plicable.
-i Reads volume group names from standard input.
-M Lists the following fields for each logical volume on the phy-
sical volume:
PVname:PPnum [LVname: LPnum [:Copynum] [PPstate]]
PVname Name of the physical volume as specified by the system.
PPnum Physical partition number. Physical partition numbers can
range from 1 to 1016.
LVname Name of the logical volume to which the physical partitions
are allocated. Logical volume names must be system-wide unique
names, and can range from 1 to 64 characters.
LPnum Logical partition number. Logical partition numbers can
range from 1 to 64,000.
Copynum Mirror number.
PPstate Only the physical partitions on the physical volume that
are not current are shown as stale.
-n DescriptorPhysicalVolume Accesses information from the specif-
ic descriptor area of DescriptorPhysicalVolume. The information
may not be current, since the information accessed with the -n
flag has not been validated for the logical volumes. If you do
not use the -n flag, the descriptor area from the physical volume
that holds the most validated information is accessed, and there-
fore the information that is displayed is current. The volume
group need not be active when you use this flag.
-o Lists only the active volume groups (those that are varied on).
An active volume group is one that is available for use.
Examples
1. To display the names of all active volume groups, enter:
lsvg -o
2. To display the names of all volume groups within the system,
enter:
lsvg
3. To display information about volume group vg02, enter:
lsvg vg02
The characteristics and status of both the logical and physical
partitions of volume group vg02 are displayed.
4. To display the names, characteristics and status of all the
logical volumes in volume group vg02, enter:
lsvg -l vg02
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/etc Directory where the lsvg command resides.
Suggested Reading
Prerequisite Information
The following glossary entries: logical volume, logical parti-
tion, physical volume, physical partition, volume group.
The Logical Volume Storage Overview explains the Logical Volume
Manager, physical volumes, logical volumes, volume groups, organ-
ization, ensuring data integrity, and understanding the alloca-
tion characteristics.
Related Information
The chvg command, lspv command, lslv command, varyonvg com-
mand.
The Logical Volume Storage Overview explains the Logical Volume
Manager, physical volumes, logical volumes, volume groups, organ-
ization, ensuring data integrity, and understanding the alloca-
tion characteristics.
The System Management Interface Tool (SMIT) Overview explains
the structure, main menus, and tasks that are done with SMIT.
Using SMIT explains SMIT screens, how to navigate in the
screens, and how to enter data.
4
emrcv Command (MVS/TSO)
Purpose
Receives files from an MVS/TSO host session.
Syntax
emrcv [ -a] [ -m] [ -r] [ -t] [ -v] [ -fFile] [ -wSeconds] -T"
DataSetName [( MemberName ] [/ Password] [ TEXT] [
ASCII ] [ CRLF ] "
Description
The emrcv command (MVS/TSO) receives MVS/TSO host files on your
workstation.
Flags
-? Displays the help screen for the emrcv command. Do not use -?
with any other flag.
-a Attaches a host file to the end of your workstation file. You
must specify append when -fFile is the same as an existing
workstation file name, or the file being transferred will replace
the workstation file.
-fFile Specifies the workstation file (path and file name) to be
received. File may be any valid AIX Operating System file. If
you do not specify this parameter, the system uses stdout. (By
default, stdout corresponds to a display screen.)
-m Monitors the file transfer process and displays the current se-
quence number, duration, and number of bytes transferred.
-r Allows the TEXT host option to translate each host line-
separator to an AIX Operating System newline, but suppresses
EBCDIC to ASCII translation.
-t Times the file transfer process and displays the duration in
seconds.
-v Displays the product name, provides information about other
flags, and periodically displays information about the file being
transferred.
-wSeconds Specifies the maximum amount of time to wait for a host
response if the transmission stops before it is complete. The
value of Seconds must be a number from 1 to 200. The default is
25 seconds.
-T" " A required command line parameter that specifies the host
information string for MVS/TSO. Put the information string in-
side the quotation marks. Optional host parameters may be in-
cluded in the string.
Host Required Parameters
Note: Host required parameters should be specified without spaces
separating them.
DataSetName A required positional parameter (the MVS/TSO file
name). Single quotation marks may surround the combined data set
name and MemberName to show that the user ID is not prefixed.
(MemberName) The member name from which to read the file if the
data set is a partitioned data set. The data set must exist.
/Password Required if password protection was specified for the
MVS/TSO data set.
Optional Host Parameters
ASCII Specifies that a host file be converted from EBCDIC to
ASCII form during file transfer. The conversion occurs at the
host, and the host uses the EBCDIC to ASCII translation table.
CRLF Specifies that carriage return/line feed characters are line
separators and that they be inserted during file transfer.
TEXT Converts EBCDIC characters to ASCII, and host line-
separator characters to AIX Operating System newline characters.
This makes an EBCDIC file readable at your workstation. The
conversion occurs at the workstation and the EBCDIC to ASCII
translation table is used. If you use the TEXT option, you do
not need to use the ASCII or CRLF options.
Examples
1. To display help information for the emrcv command (MVS/TSO),
enter:
emrcv -?
2. To receive host data set member tso.samples(example1) as AIX
file example1 with EBCDIC to ASCII translation, enter:
emrcv -fexample1 -T"tso.samples(example1) TEXT"
In the above example, the host data set member
tso.samples(example1) is received as AIX file (
-f) example1. EBCDIC to ASCII translation ( TEXT) makes the host
file readable at the workstation.
3. To receive host data set member tso.samples(example1) as AIX
file example1, monitor the process, set a 30-second host timeout,
with EBCDIC to ASCII translation, enter:
emrcv -m -w30 -fexample1 -T"tso.samples(example1) TEXT"
In the above example, the host data set member
tso.samples(example1) is received as AIX file (
-f) example1. The process is monitored ( -m) and a 30-second
host timeout ( -w) is set. EBCDIC to ASCII translation ( TEXT)
makes the host file readable at the workstation.
4. To receive host data set member tso.samples(example1) with the
password mypwd on the dataset, as AIX file example1, with EBCDIC
to ASCII translation, enter:
emrcv -fexample1 -T"tso.samples(example1)/mypwd TEXT"
In the above example, the host data set member
tso.samples(example1)
with the password mypwd is received a
-f) example1. EBCDIC to ASCII transla-
tion makes the host file readable at the workstation.
5. To receive host sequential data set tso.files.text1 as AIX file
/u/jdoe/text1, with EBCDIC to ASCII translation, and host line-
separator characters replaced with ASCII carriage return/line
feed characters, enter:
emrcv -f/u/jdoe/text1 -T"tso.files.text1 ASCII CRLF"
In the above example, the host sequential data
set tso.files.text1 is received as AIX file (
-f) /u/jdoe/text1. EBCDIC to ASCII tr
ASCII) is used and host line-separator characters have
been replaced with ASCII carriage return/line feed characters (
CRLF).
Implementation Specifics
This command is part of AIX 3278/79 Emulation/6000.
File
/usr/lib/em78 directory Contains the EM78 program.
Suggested Reading
Prerequisite Information
Glossary Terms: ASCII, EBCDIC, directory, file, host,
parameter.
For information on using the EM78 program, see 3278/79 Emulation
Overview.
Related Information
The em78 command starts the EM78 program; the emkey command
customizes the keyboard mapping, color, and field attributes for
the EM78 emulator; the emrcv (VM/CMS), emsend (MVS/TSO), and
emsend (VM/CMS) commands also transfer files between a host and a
workstation.
5
termdef Command
Purpose
Queries terminal characteristics.
Syntax
termdef [ -c | -l | -t ]
Description
The termdef command identifies the current display type, the ac-
tive lines setting, or the current columns setting. This
simplifies the task of resetting the
lines and columns when you switch fonts and the task of resetting
the $TERM environment variable when you switch displays. The
terminfo file defines the default number of lines and
columns for each display, but the lines and columns can change
depending upon which font is currently active. In addition, the
$TERM environment variable does not automatical-
ly reflect the display currently being used.
Flags
-c Returns the current column value.
-l Returns the current line value.
-t Returns the name of the current display (the default action).
Example
To set the $TERM environment variable according to the value of
the currently active display, the following lines could be added
to a login profile (the /etc/profile file):
TERM_DEFAULT=hft
TERM=`termdef`
TERM=${TERM:-$TERM_DEFAULT}
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/termdef Command file.
/etc/profile Login profile.
Suggested Reading
Related Information
The terminfo file.
The hft special file.
5
mhmail Command
Purpose
Sends or receives mail.
Syntax
mhmail User ... [ -cc User ... ] [ -from User ... ] [ -sub-
ject "String" ] [
-body "String" ]
Description
The mhmail command composes, sends, and incorporates messages.
To incorporate a message, enter the mhmail command without any
flags. The default folder is $HOME/inbox.
If you specify user addresses, the mhmail command accepts text
from your terminal and composes a message. You can end the mes-
sage text by pressing the Ctrl-D key sequence. The mhmail com-
mand sends a copy of the message to each specified address.
Flags
-body "String" Sends a message with the specified string as the
body. You must enclose the string in quotes. When you specify
the -body flag, the mhmail command does not accept text
from the terminal.
-cc User... Sends a copy of the message to the specified users.
The mhmail command puts the addresses in the cc: field.
-from User... Places the specified user address in the From: field
of the message.
-help Displays help information for the command.
-subject "String" Places the specified text string in the Subject:
field of the message.
Examples
1. To incorporate new mail into the default mail folder,
$USER/Mail/inbox, enter:
mhmail
The system displays a message similar to the following:
Incorporating new mail into inbox...
65+ 04/08 jim@athena.a Meeting <<The meeting will
66 04/08 jim@athena.a Schedule <<Schedule change
In this example, two messages are incorporated into the inbox
file. The subject of the first message is Meeting, and the first
line starts with the words The meeting will. The subject of the
second message is Schedule, and the first line starts with the
words Schedule change.
2. To send a message regarding a schedule change to user jamie on
system venus, enter:
mhmail jamie@venus -subject "Schedule Change"
The system waits for you to enter the text of the message. After
completing the last line of the text, press the Enter key and
then the Ctrl-D key sequence to send the message.
Implementation Specifics
This command is part of Message Handler in the Base Operating
System (BOS) Extensions 1 of AIX for RISC System/6000.
Files
/var/Mail/$USER file Defines the location of the mail drop.
/usr/bin/mhmail file Contains the executable form of the mhmail
command.
Suggested Reading
Prerequisite Information
Glossary Terms: default, file, flag, folder, format, mes-
sage.
Message Handler (MH) Overview.
Mail Overview.
Related Information
The inc command, post command.
The mh_alias file format, mh_profile file format.
5
uucp Command
Purpose
Copies files from one AIX system to another AIX or UNIX system.
Syntax
uucp [ -c| -C] [ -d| -f] [ -gGrade] [ -j] [ -m] [ -nUser ] [
[ -sFile] [ -xDebugLevel] SourceFile...
DestinationFile...
Description
The uucp command is a Basic Networking Utilities (BNU) command
that copies one or more source files from one AIX system to one
or more destination files on another UNIX system. Files can be
copied within a local system, between a local and a remote sys-
tem, and between two remote systems.
The uucp command accomplishes the file transfer in two steps:
first, by creating a command ( C.*) file in the spooling directo-
ry on the local computer and then by calling the uucico daemon
to send the request to the specified computer. Command files in-
clude information such as the full path name of the source and
destination files and the sender's login name. The full path
name of a command file is a form of the following:
/var/spool/uucp/SystemName/C.SystemNameNxxxx
where N is the grade of the request and xxxx is the hexadecimal
sequence number used by BNU.
If the uucp command is used with the -C flag to copy the files
to the spool directory for transfer, the uucp command creates not
only a command file, but also a data ( D.*) file that contains
the actual source file. The full path name of a data file is a
form of the following:
/var/spool/uucp/SystemName/D.SystemNamexxxx###
Once the command files (and data files, if necessary) are creat-
ed, the uucp command then calls the uucico daemon, which in turn
attempts to contact the remote computer to deliver the files.
It is useful to issue the uuname command to determine the exact
name of the remote system before issuing the uucp command. The
uulog command provides information about uucp activities
with another system.
Source and Destination File Names
* File names and system names can contain only ASCII characters.
Each can either be a path name on the local system or have the
following form:
SystemName! PathName
where SystemName is taken from a list of system names that BNU
knows about.
* The destination SystemName can also be a list of names, such as
the following:
SystemName!SystemName! . . . ! SystemName!PathName
In this case, an attempt is made to send the file using the
specified route to the destination. Make sure that intermediate
nodes in this route are willing to forward information, and that
they actually talk to the next system.
* The shell pattern-matching characters ? (question mark), * (as-
terisk), and [ . . . ] (brackets and ellipsis) can be used in the
path names of the source file; the appropriate system expands
them. The shell pattern-matching characters should not be used
in the path name of the destination file.
* If the DestinationFile is a directory rather than a file, the
uucp command uses the last part of the SourceFile name to
name the transferred file on the remote system.
Path Names
Path names for the SourceFile and DestinationFile parameters can
contain only ASCII characters. Paths for the source file can be
one of the following:
* A full path name
* A relative path name
Paths for the DestinationFile parameter can be in the forms for
the SourceFile parameter, or can be one of the following:
* A path name preceded by \~User (for example, \~jkimble) where
User is a login name on the remote system. The specified
user's login directory is then considered the destination of the
transfer. If the user specifies an invalid login name, the files
are transferred to the public directory, /var/spool/uucppublic,
which is the default.
* A path name preceded by \~/Destination, where Destination is ap-
pended to /var/spool/uucppublic. The destination is treated as a
file name unless more than one file is being transferred by the
request, the destination already exists as a directory on the re-
mote system, or the destination is specified as a directory.
To specify the destination as a directory, follow the destination
name with a / (slash). For example, \~/amy/ as the destination
creates the directory /user/spool/uucppublic/amy, if it does not
already exist, and puts the requested files in that directory.
Permissions
* The system administrator should restrict the access to local
files by users on other systems.
* When transmitting files, the uucp command preserves execute per-
missions and grants read and write permissions to the owner, the
group, and all others. (The uucp command owns the file.)
* Sending files to arbitrary DestinationFile path names on other
systems or getting files from arbitrary SourceFile path names on
other systems often fails because of security restrictions. The
files specified in the path name must give read or write permis-
sion not only for the same group of users but also for any group.
* Protected files and files in protected directories owned by the
requestor can be sent by the uucp command.
Flags
-c Copies the source files to the spooling directory and immedi-
ately invokes the uucico daemon, so that the files are
transferred right away. This flag is the default and cannot be
used with the -C flag.
-C Copies local files to the spool directory for transfer.
Depending on the configuration of the Poll and Systems files
and on how often the uusched daemon is run, the files may be
transferred immediately on demand polling or in the future.
Occasionally, problems occur while transferring a source file;
for example, the remote computer may not be working or the login
attempt may fail. In such a case, the file remains in the spool
directory until it is either transferred successfully or removed
by a cleanup command.
This flag counteracts the -c flag.
-d Creates any intermediate directories needed to copy the source
files to the destination files on a remote system. Instead of
first creating a directory and then copying files to it, the uucp
command can be entered with the destination path name, and the
BNU Program will create the required directory. This flag is the
default and cannot be used with the -f flag.
-f Does not create intermediate directories during the file
transfer. This flag is used if the destination directory already
exists and you do not want BNU to write over it. This command
counteracts the -d flag.
-gGrade Specifies when the files are to be transmitted during a
particular connection. The Grade variable is a single number (0
to 9) or letter (A to Z, a to z); lower ASCII-sequence characters
cause the files to be transmitted earlier than do higher sequence
characters. The number 0 is the highest (earliest) grade; z is
the lowest (latest) grade. The default is N.
-j Displays the job identification number of the transfer opera-
tion on standard output. This job ID can be used with the uus-
tat or uuq command to obtain the status of a particular
job or with the uustat -k command or uuq -d command to terminate
the transfer before it is completed.
-m Sends a mail message to the requester when the source file is
successfully copied to the destination file on a remote system.
The message is sent to the requester's mailbox,
/var/mail/User. The mail com-
mand does not send a message for a local transfer.
The -m flag works only when sending files or receiving a single
file. It does not work when forwarding files.
-nUser Notifies the recipient on the remote system identified by
the User entry that a file has been sent. The mail system does
not send a message for a local transfer. User names can contain
only ASCII characters. Receiving multiple files specified by the
shell pattern-matching characters ? (question mark), * (aster-
isk), and [ . . . ] (brackets and ellipses) does not activate the
-n option.
-r Prevents the starting of the uucico file transfer daemon, even
if the command was issued at a time when calls to the remote sys-
tem are permitted. (By default, a call to the remote system is
attempted if the command is issued during a time period specified
in the Poll and Systems files.) The -r option is useful for de-
bugging.
-sFile Reports the status of the transfer to the specified file.
In this case, the File variable must designate a full path name.
-xDebugLevel Displays debugging information on the screen of the
local system. The DebugLevel variable is a number from 0 to 9.
The higher the number, the more detailed the report.
Examples
1. To copy a file from the local system to a remote system, enter:
uucp /u/geo/f1 hera!/u/geo/f1
In this example, the f1 file from the local system is copied to
remote system hera.
2. To copy a file from the remote system and place it in the pub-
lic directory, enter:
uucp hera!geo/f2 /var/spool/uucppublic/f2
In this example, the f2 file from remote system hera is copied
and placed in the public directory.
3. To copy a file from the remote system and place it in a direc-
tory other than the public directory, enter:
uucp hera!geo/f2 /u/geo/f2
In this example, the f2 file from the remote system hera is
copied to the /u/geo/f2 directory. The geo login directory must
allow write permission to members of the other group, for exam-
ple, with mode 777.
Implementation Specifics
This command is part of the Basic Network Utilities Program (BNU)
in BOS Extensions 1 of AIX Base Operating System.
Files
/usr/bin/uucp Command path name.
/usr/lib/uucp/ Poll File listing times when remote systems are au-
tomatically called (polled)
/usr/lib/uucp/Systems File describing accessible remote systems
/var/spool/uucp Spooling directory containing BNU status informa-
tion
/var/spool/uucppublic Public directory containing files awaiting
transfer by the uucico daemon
/var/spool/uucppublic/SystemName/ C.* Command files
/var/spool/uucppublic/SystemName/ D.* Data files.
Suggested Reading
Prerequisite Information
Glossary Terms: system, remote system
Related Information
The ct command, cu command, mail command, uuclean command,
uucleanup command, uulog command, uuname command,
uupick command, uuq command, uustat command, uuto com-
mand, uux command.
The uucico daemon, uusched daemon.
5
showsnf Command
Purpose
Prints the contents of a Server Natural Format (snf) font file.
Syntax
showsnf [ -v] [ -g] [ -L | -M] [ -l | -m] [ -pNumber] [
-uNumber] snfFontFile
Description
The showsnf utility command displays the contents of font files
in the Server Natural Format (snf) produced by the bdftosnf util-
ity command. It is used to verify that a font file has not been
corrupted or to convert the individual glyphs into arrays of
characters for proofreading or for conversion to some other for-
mat.
Flags
-v Indicates that character bearings and sizes should be printed.
-g Indicates that character glyph bitmaps should be printed.
-l Indicates that the bit order of the font is least significant
bit first.
-L Indicates that the byte order of the font is least significant
byte first.
-m Indicates that the bit order of the font is most significant
bit first.
-M Indicates that the byte order of the font is most significant
byte first.
-pNumber Specifies the glyph padding of the font. (Number = 1, 2,
4, or 8)
-uNumber Specifies the scanline unit padding of the font. (Number
= 1, 2, or 4)
Implementation Specifics
This command is part of AIXwindows Run Time Environment in
AIXwindows Environment/6000.
Suggested Reading
Prerequisite Information
Enhanced X-Windows Commands Overview
5
uudemon.admin Command
Purpose
Provides periodic information on the status of BNU file
transfers.
Syntax
uudemon.admin
Description
The /usr/lib/uucp/uudemon.admin command is a shell procedure that
mails status information about the Basic Networking Utilities
(BNU) activities to the uucp login ID at intervals specified in
the /usr/adm/cron/crontabs/uucp file. The command exe-
cutes both the uustat -p and the uustat -q commands:
* The -p flag instructs the uustat command to run the ps -flp com-
mand (process status, which generates a full, long list of speci-
fied process IDs) for all process ID (PID) numbers in the lock
files.
* The -q flag lists the jobs currently queued to run on each sys-
tem. These jobs either are waiting to execute or are in the pro-
cess of executing. If a status file exists for the system, its
date, time, and status information are reported.
Execute the uudemon.admin command at least once a day. The
uudemon.admin command is not enabled when you
install the BNU program. To run this command automatically, edit
the /usr/adm/cron/crontabs/uucp file, removing the comment char-
acter (#) from the beginning of the line that governs running
the uudemon.admin command.
Example
To run the uudemon.admin command automatically, edit the
/var/spool/cron/crontabs/uucp file and remove
the comment character (#) from the beginning of the
uudemon.admin command line. Change:
#48 8,12,16 * * * /bin/sh -c "/usr/lib/uucp/uudemon.admin > /dev/null"
to:
48 8, 12, 16 * * * /bin/sh -c "/usr/lib/uucp/uudemon.admin > /dev/null"
The 48 notation represents minutes, the 8,12,16 notation
represents hours based on the 24-hour clock, and the three aster-
isks (* * *) are placeholders representing the day of the month,
the month of the year, and the day of the week, respectively.
This line therefore instructs the cron daemon to run the
uudemon.admin command daily at 48 minutes past
the hours 800, 1200, and 1600-that is, at 8:48 a.m., 12:48 p.m.,
and 4:48 p.m. respectively.
Note: These run intervals are defaults. By altering them, you can
change the times at which the cron daemon executes the
uudemon.admin command to fit the needs of your
site.
Implementation Specifics
This command is part of the Basic Network Utilities Program (BNU)
in BOS Extensions 1 of AIX for RISC System/6000.
Files
/usr/lib/uucp directory Contains the uudemon.admin command and the
configuration files for BNU.
/etc/locks directory Contains lock files which prevent multiple
uses of devices and multiple calls to systems.
/var/spool/cron/crontabs/uucp file Schedules BNU jobs, including
the uudemon.admin command, for the cron daemon.
Suggested Reading
Prerequisite Information
Glossary Terms: shell procedure (shell script).
Using BNU Maintenance Commands
Related Information
The cron daemon.
The uustat command.
5
verifysna Command
Purpose
Verifies cross-dependencies within the SNA configuration data-
base.
Syntax
verifysna
Description
The verifysna command verifies cross-dependencies within the SNA
configuration database and reports all potential discrepancies to
the user.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit verifysna
Implementation Specifics
This command is part of AIX Systems Network Architecture Ser-
vices/6000.
This command is not available for Japanese Language Support.
Files
/usr/bin Directory in which the verifysna command resides.
Suggested Reading
Related Information
"Verifying Profiles"
The System Management Interface Tool (SMIT) Overview.
5
rptalert Command
Purpose
Generates an alert report that can be printed out on standard
output or any compatible printer. Also activates concurrent
alert reporting.
Syntax
rptalert [ [ [ -c [ -b ] ] -d -s -p PrintDevice -f File
-a AlertName -D MM/DD/YY MM/DD/YY
-N Number1 Number2 -F Node ... -X Node ... -R ]
Description
Alert reports are generated from the alert records stored in the
alert log specified in the AlertName parameter that follows the
-a flag. You can generate reports independent
of the Alert Manager program operation except when you request
the concurrent reporting option by setting the -c flag.
You can generate a history report of alerts from an alert log,
print the report on a compatible printer, display the report on
the screen, and save the report as a file.
Flags
-a AlertName The AlertName variable identifies the name of the
alert log whose alert records provide the information necessary
to generate an alert report. You can specify the alertlog_bak
file if you want a report based upon the previously-backed-up
alert log. The concurrent reporting option invoked by the -c
flag uses the alert log utilized by the currently-active Alert
Manager program. If the specified log does not exist, or if any
other log is specified for concurrent reporting, an error message
is returned. The alertlog log file is the default value for the
AlertName variable.
-b Rings the high function terminal (hft) bell five times whenever
an alert report is sent to standard output. The terminal bell
command is located in /usr/bin/tput/bel. This option is only
valid when the -c flag is also set. It is ignored when the -s
flag is set.
-c Activates the concurrent alert reporting option. As each alert
record is logged into the alert log, a corresponding report is
generated and sent to the standard output (your display screen)
or a specified printer.
Note: The Alert Manager program must be running before this com-
mand is invoked with the -c flag. If the Alert Manager program
is not running, an error message is returned.
-D MM/DD/YY MM/DD/YY Specifies the starting and ending date for
alert records to be used in generating an alert report. The
first MM/DD/YY variable specifies the starting date (in two-digit
month/day/year format). The second MM/DD/YY variable specifies
an ending date in the same format. The default option is to
select all the alert records in the alert log for report process-
ing. The following variations are permitted:
* If only one date is provided, the resulting alert report in-
cludes alert reports from the specified date to the current date.
* If the same date is repeated in both positions, a report is gen-
erated for that date only.
-d Requests the detailed report option. The default option is the
summary report.
-F Node ... The Node ... variable specifies the node ID's (node
numbers) of each of the alert records selected for generating an
alert report. You can specify a single node ID for a report of
the alerts generated only by that node. The default option is to
select alert records from all nodes for report processing.
Note: The value of the Node parameter is the name assigned to a
Network Management/6000 node by the uname -S command. The Alert
Manager program uses this name when building the hierarchical
subvector in generic alerts. Thus, the Alerts-Dynamic Display
screen of the Network Problem Determination Aid (NPDA) program in
the S/370 host NetView product displays the name under the
RESNAME field. Due to the architectural limitation by the SNA,
only the first eight characters are used for the field. There-
fore, the node ID may be truncated if the node ED value shown by
the uname -n command is longer than eight characters. If the
node is on the TCP/IP network, the user should set the node ID to
be the same as the TCP/IP hostname.
-f File The File variable identifies the name of the file in which
to save the generated alert report. You must supply the full
pathname for the file, including all preceding directories and
subdirectories. If the -c flag is also set, each alert report is
concatenated into the file as it is generated. The default is
not to save the alert report.
-N Number1 Number2 The Number1 variable specifies the starting se-
quence number of the alert records selected for generating an
alert report. The Number2 variable specifies the ending sequence
number. The default option is to select all the alert records in
the alert log for report processing. The following variations
are permitted:
* If only one sequence number is provided, the resulting alert re-
port includes alert reports from the specified sequence number to
the most recent alert record.
* If the same sequence number is repeated in both positions, a re-
port is generated for that record only.
-p PrintDevice The PrintDevice variable identifies the device on
which the alert report is printed. No validity check is made for
the entered print queue. The default option is to ignore this
flag and not print the report.
-R When this flag is set, the Alert Manager program cleans up the
Inter-Process Call (IPC) message queue, allowing a clean recovery
from a previously-halted rptalert -c command.
Note: The IPC message queue (created by a previous invocation of
the rptalert -c command) requires cleaning whenever the rptalert
process is halted (with CTRL-C or an AIX kill -9 command) before
it can shut down the IPC cleanly.
-s Supresses displaying the alert report on the screen. The de-
fault option is to display the report on the screen.
-X Node ... The Node ... variable specifies the node ID's (node
numbers) of each of the alert records to be excluded from the
alert report. You can specify a single node ID to exclude an in-
dividual node from the report. The default option is to include
alert records from all nodes for report processing.
Note: The -F flag and the -X flag are both useful for Alert
Manager collection point nodes. However, you can generate an
alert report at an entry point node using an alert log taken from
a collection point node or even using a history alert log merged
from several Alert Manager alert logs.
Security
Privilege Control: root user.
Examples
1. To run a concurrent alert report with the hft bell on and a de-
tailed report written to standard output (the display screen) as
well as printed on the lp0 line printer, invoke the following
variation of the rptalert command:
rptalert -c -b -d -p lp0
2. The following command generates a detailed alert report for the
prtserver and fileserver nodes for the month of April using the
alertlog_hist file, and puts the results into the
/u/netmgr/alert.aprilreport file. (The report
is not going to be printed on the display screen because the -s
flag is set):
rptalert -d -s -f /u/netmgr/alert.aprilreport -a alertlog_hist -D 04/01/90 04/30/90 -F prtserver fileserver
Implementation Specifics
This command is part of AIX Network Management/6000.
Files
/etc/objrepos/alertlog Alert Manager Alert Log File
/etc/objrepos/alertlog_bak Alert Manager Alert Log Backup File
Suggested Reading
Prerequisite Information
The Alert Manager Overview for Network Management contains addi-
tional information about network alerts.
Related Information
The startam command, stopam command.
List of Alert Manager Commands for Network Management.
5
test Command
Purpose
Evaluates conditional expressions.
Syntax
test Expression | [ Expression ]
Description
The test command evaluates Expression and, if its value is true,
returns a zero (true) exit value. Otherwise it returns a nonzero
(false) exit value. The test command also returns a nonzero exit
value if there are no parameters.
Note: In the second form of the command, the [ ] (square brackets)
must be surrounded by blank spaces.
The functions and operators are treated as separate parameters by
the test command. Expression refers to a statement that is
checked for a true or false condition. The following functions
are used to construct Expression:
-r Filename True if the specified file exists and has read permis-
sion.
-w Filename True if the specified file exists and has write per-
mission.
-x Filename True if the specified file exists and has execute per-
mission.
-f Filename True if the specified file exists and is a regular
file.
-d Filename True if the specified file exists and is a directory.
-c Filename True if the specified file exists and is a character
special file.
-b Filename True if the specified file exists and is a block spe-
cial file.
-p Filename True if the specified file exists and is a named pipe
(FIFO).
-u Filename True if the specified file exists and its set-user-ID
bit is set.
-g Filename True if the specified file exists and its set-group-ID
-k Filename True if the specified file exists and its sticky bit
is set.
-s Filename True if the specified file exists and has a size
greater than zero.
-t [FileDescriptor] True if the open file with the specified file
descriptor number (1 by default) is associated with a workstation
device.
-z String1 True if the length of string String1 is zero.
-n String1 True if the length of the string String1 is nonzero.
String1 = String2 True if strings String1 and String2 are identi-
cal.
String1 != String2 True if strings String1 and String2 are not
identical.
String1 True if String1 is not the null string.
Integer1 -eq Integer2 True if the integers Integer1 and Integer2
are algebraically equal. Any of the comparisons -ne, -gt, -ge,
-lt, and -le can be used in place of -eq.
These functions can be combined with the following operators:
! Unary negation operator.
-a Binary AND operator.
-o Binary OR operator (-a has higher precedence than -o).
\(Expression\) Parentheses for grouping.
Examples
1. To test whether a file exists and is not empty:
if test ! -s "$1"
then
echo $1 does not exist or is empty.
fi
If the file specified by the first positional parameter to the
shell procedure does not exist, an error message is displayed.
If $1 exists, it displays nothing. Note that there must be a
space between -s and the file name.
The double quotation marks around $1 ensure that the test works
properly even if the value of $1 is the empty string. If the
double quotation marks are omitted and $1 is the empty string,
the test command displays the error message test: param-
eter expected.
2. To do a complex comparison:
if [ $# -lt 2 -o ! -s "$1" ]
then
exit
fi
If the shell procedure was given fewer than two positional param-
eters or the file specified by $1 does not exist, then the shell
procedure is exited. The special shell variable $# represents
the number of positional parameters entered on the command line
that started this shell procedure.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/test The path to the test command.
/bin/bsh The path to the Bourne shell (bsh command).
/bin/csh The path to the C shell (csh command).
/bin/ksh The path to the Korn shell (ksh command).
/bin/sh The path to the default shell (sh command).
Suggested Reading
Prerequisite Information
The Shells Overview, which describes shells in general, defines
some terms that are helpful in understanding the AIX shells, and
describes some of the more useful shell functions.
Related Information
The bsh command, csh command, find command, ksh command, sh
command.
5
X Command
Purpose
Starts the X Server.
Syntax
X [ -a Number] [ -bp Color] [ -bs | -nobs] [ -c Number] [ -D
File] [ -f Number] [ -fc Font] [ -fn Font] [ -fp
Font] [ -help] [ -logo | nologo] [ -n :Number] [ -P[RowColumn]
Number] [ -p Number] [ -r | r] [ -s Number] [
-su] [ -T] [ -t Number] [ -to Number] ] [ -wm] [ -wp
Color] [ wrap | [ -wrapx] [ -wrapy]]
Description
The X command starts the X Server, which is a display server that
runs on computers with bitmapped terminals. The X Server distri-
butes user input to and accepts output requests from programs lo-
cated either on the host system or on systems connected to it
through a network.
You may specify one or more of the display devices. If no
display devices are specified, the device is assumed to be the
device of the current hft. If the user specifies more than one
display device, you must also specify the physical configuration
of the displays. This is accomplished through the -P (Physical
Location) flag. There must be one -P flag for each device. The
-P flag associates the row and column of the
device with the device number. The user can determine the device
number with the lsdisp command.
In the following example, the user has already performed the
lsdisp command. Its results are shown for each
display.
This is an example of a two-tiered physical layout. The -P flags
to specify this layout are:
-P11 4 -P12 2 -P21 1 -P22 3
In this example, when the mouse is traveling top to bottom in
Display 1 and reaches the border of Display 1 and Display 4, it
will continue into Display 4 at the same x position. When it
reaches the bottom edge of Display 4, if the -wrapy flag is set,
it will appear at the top edge of Display 1 in the same x
position. If the -wrapy flag is not set, it will stop.
Display Display
1 3
Display Display
4 2
The following information is an example of a single-tiered physi-
cal layout. The -P flags to specify this layout are:
-P11 3 -P12 1 -P13 2
In this example, when a mouse is traveling left to right in
Display 3 and reaches the border of Display 3 and 1, it will con-
tinue in Display 1 at the same y position. When it reaches the
border of Display 1 and Display 2, it will continue in Display 2
at the same y position. When it reaches the edge of Display 2,
if the -wrapx flag is set, it will appear at the left-most edge
of Display 3 in the same y position. If the -wrapx flag is not
set, it will stop.
Display Display Display
3 1 2
The following information is an example of an undefined physical
layout.
Display
1
Display Display
3 2
Flags
The following flags have default values supplied with the pro-
gram:
-a Number Specifies the acceleration, a multiplier for mouse move-
ment. For example, specifying 4 causes the cursor to move four
times as fast as the mouse. The default is 4 pixels. The speci-
fied value must be a positive value greater than zero.
-bp Color Specifies a Blackpixel color for the display. The de-
fault depends on the display.
-bs Enables backing store support on all screens. This is the de-
fault.
-c Number Specifies the key click volume. The default is -1 or
medium. The following values are supported:
0 off
1 - 33 low
-1 or 34 - 66 medium
67 - 100 high
-D File Specifies the full path name of the color definition data-
base file. The default is /usr/lpp/X11/rgb/rgb.
-f Number Specifies the beep volume. The default is -1 or medium.
The supported values are the same as those supported for the -c
Number flag.
-fc Font Specifies the cursor font for cursor glyphs and cursor
masks. The default depends on the operating system and the
display.
-fn Font Specifies the text font used as the default text font.
The default depends on the operating system and the display.
-fp Font Specifies the path for fonts.
-help Prints a usage message.
-logo Turns on the X Window System logo display in the screen
saver. There is currently no way to change this from a client.
-n :Number Specifies the connection number. Valid values for the
Number parameter are 0 to 255. The default is
the next available number. The Number parameter is used by pro-
grams to communicate with a specific X Server. For example, the
command:
X -n :18
specifies that communication to the activated X Server takes
place by unix:18 or by Hostname:18.
-nobs Disables backing store support on all screens. The -bs flag
is the default.
nologo Turns off the X Window System logo display in the screen
saver. There is currently no way to change this from a client.
-P[Row][Column] [Number] Specifies the physical positioning of the
displays. The Row parameter indicates the row the display is lo-
cated in. The Column parameter indicates the column of the
display. The Number parameter indicates the ID number of the
display as returned from the lsdisp command.
-p Number Specifies the time interval, in minutes, between changes
of the X Window System logo position. This flag is used with the
-s (screen saver timeout) flag to control the blanking of the
screen.
-r Disables auto repeat. The default is auto repeat enabled.
r Turns on auto repeat.
-s Number Specifies the number of minutes to wait until making the
display blank. The default is 10 minutes. A specified value
must be a number greater than 0, which is a valid value which
disables the screen saver.
-su Disables save under support on all screens.
-T Disables the Ctrl-Alt-Backspace key sequence that, by default,
terminates the X Server and all windows opened from it.
-t Number Specifies the mouse threshold. The default is 2 pixels.
Acceleration takes effect only if the mouse is moved beyond the
mouse threshold in one time interval and only applies to the
amount beyond the threshold.
-to Number Specifies the number of minutes to elapse between con-
nection checks. The default is 60 minutes. A specified value
must be a positive number greater than zero.
-wm Forces the default backing-store of all windows to have the
WhenMapped value. This is a convenient way of
getting backing store to apply to all windows.
-wp Color Specifies a Whitepixel color for the display. The de-
fault depends on the display.
-wrap Specifies the behavior of the mouse when its hot spot
reaches the left or right border or the top or bottom of any root
window. If this flag is set and the hot spot of the mouse
reaches the left border of the left-most root window, the mouse
is automatically positioned at the right border of the right-most
root window at the same y position. Conversely, if this flag is
set and the hot spot of the mouse reaches the right border of the
right-most root window, the mouse is automatically positioned at
the left border of the left-most root window at the same y
position. If this flag is not set, the mouse stops at
the left or right border of any root window. Or if this flag is
set and the hot spot of the mouse reaches the top border of the
top-most root window, the mouse is automatically positioned at
the bottom border of the bottom-most root window at the same x
position. Conversely, if this flag is set and the hot spot of
the mouse reaches the bottom border of the bottom-most root win-
dow, the mouse is automatically positioned at the top border of
the top-most root window at the same x position.
-wrapx Specifies the behavior of the mouse when its hot spot
reaches the left or right border of any root window. If this
flag is set and the hot spot of the mouse reaches the left border
of the left-most root window, the mouse is automatically posi-
tioned at the right border of the right-most root window at the
same y position. Conversely, if this flag is set and the hot
spot of the mouse reaches the right border of the right-most root
window, the mouse is automatically positioned at the left border
of the left-most root window at the same y position. If this
flag is not set, the mouse stops at the left or right border of
any root window.
-wrapy Specifies the behavior of the mouse when its hot spot
reaches the top or bottom border of any root window. If this
flag is set and the hot spot of the mouse reaches the top border
of the top-most root window, the mouse is automatically posi-
tioned at the bottom border of the bottom-most root window at the
same x position. Conversely, if this flag is set and the hot
spot of the mouse reaches the bottom border of the bottom-most
root window, the mouse is automatically positioned at the top
border of the top-most root window at the same x position. If
this flag is not set, the mouse stops at the top or bottom border
of any root window.
Implementation Specifics
This command is part of AIXwindows Run Time Environment in
AIXwindows Environment/6000.
Suggested Reading
Prerequisite Information
Enhanced X-Windows Commands Overview
Related Information
The aixterm command, xclock command, xhost command, xinit
command, xopen command.
The lsdisp shell command.
5
mesg Command
Purpose
Permits or refuses write messages.
Syntax
mesg [ n | y ]
Description
The mesg command controls whether other users on the system can
send messages to you with either the write command or the talk
command. Called without arguments, the mesg command displays the
current workstation message-permission setting. The shell start-
up process permits messages by default. You can override this
default action by including the line mesg n in your
$HOME/.profile file. A user with root user authority
can send write messages to any workstation, regardless of its
message permission setting. Message permission has no effect on
messages delivered through the electronic mail system ( send-
mail).
If you add mesg y to your $HOME/.profile, you will be able to re-
ceive messages from other users via the write command or the talk
command.
If you add mesg n to your $HOME/.profile, you will not be able to
receive messages from other users via the write command or the
talk command.
Flags
n Allows only the root user the permission to send messages to
your workstation. Use this form of the command to avoid having
others clutter your display with incoming messages.
y Allows all workstations on the local network the permission to
send messages to your workstation.
Examples
1. To allow only the root user the permission to send messages to
your workstation, enter:
mesg n
2. To allow everyone the permission to send messages to your
workstation, enter:
mesg y
3. To display what your current message permission setting is,
enter:
mesg
Information similar to the following is displayed:
is y
In the previous example, the current message permission setting
is y (allowing all users on the local network the permission to
send messages to your workstation). If you had changed the mes-
sage permission setting to n (allowing only the root user the
permission to send messages to your workstation), information
similar to the following would have been displayed:
is n
Implementation Specifics
This command is part of Base Operating System (BOS) Runtime of
AIX for RISC System/6000.
Files
/dev/tty* Supports the controlling terminal interface.
$HOME/.profile Controls start-up processes and daemons.
Suggested Reading
Prerequisite Information
Glossary Terms: default, network, shell, workstation.
Network Overview.
Related Information
The sendmail command, talk command, write command.
6
chsnalias Command
Purpose
Changes the description of an alias in the SNA configuration da-
tabase.
Syntax
chsnalias -t ObjectType [ -l NewAlias ] [ -n NewName ]
ObjectAlias
Description
The chsnalias command changes either or both of the following:
* The profile to which an alias refers
* The alias name of an existing alias in the SNA configuration da-
tabase.
The ObjectAlias parameter specifies the alias to be changed.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit chsnalias
Flags
-t ObjectType Specifies the profile type of the current alias.
-l NewAlias Specifies the changed alias name.
-n NewName Specifies the profile to which an alias refers.
Examples
1. To change the alias name of ATTACH to ETHATTCH, enter:
chsnalias -t attachment -l ETHATTCH ATTACH
2. To change the ETHATTCH alias from an alias for the Ethernet
profile ETHNET2 to an alias for the Ethernet profile ETHNET1,
enter:
chsnalias -t attachment -n ETHNET1 ETHATTCH
In this case, assume that ETHATTCH is an alias for ETHNET2.
Implementation Specifics
This command is part of AIX Systems Network Architecture Ser-
vices/6000.
This command is not available for Japanese Language Support.
Files
/usr/bin Directory in which the chsnalias command resides.
Suggested Reading
Related Information
The mksnalias command, rmsnalias command.
The System Management Interface Tool (SMIT) Overview.
6
xinit Command
Purpose
Starts an X Server and clients with a single command.
Syntax
xinit [XOptions]
Description
The xinit command is a shell script which starts the X Server and
any X client programs you need, specified by the XOptions param-
eter, as listed in the X command. The xinit command uses a cus-
tomizable shell script file which lists the X client programs to
invoke. The xinit command runs the shell script $HOME/.xinitrc
to start the client programs. If the $HOME/.xinitrc shell script
is not found, the xinit command invokes the shell script
/usr/lpp/X11/defaults/xinitrc. This default
xinitrc shell script invokes commands such as
the mwm (the window manager), the aixterm and the xclock com-
mands.
The xinit command performs the following operations:
* Starts an X Server on the current display
* Sets up the DISPLAY environment variable
* Executes the xinitrc file to start the X client programs.
Implementation Specifics
This command is part of AIXwindows Run Time Environment in
AIXwindows Environment/6000.
Suggested Reading
Prerequisite Information
Enhanced X-Windows Commands Overview
AIXwindows Window Manager Overview
Related Information
The aixterm command, the X command. and the xclock command.
6
sthcondmn Command
Purpose
Starts the hcondmn subsystem.
Syntax
sthcondmn
Description
The sthcondmn command starts the hcondmn subsystem. If the Sys-
tem Resource Controller (SRC) has not already been set up so that
the hcondmn subsystem will be started at IPL time, the sthcondmn
command also adds the necessary SRC instructions to the Object
Data Manager (ODM) database files.
The sthcondmn command can be used to start the subsystem after
installing the 3270 Host Connection Program (HCON), instead of
restarting the system. In addition, the sthcondmn command can be
used to start the hcondmn subsystem on a client of a codeserver,
if HCON is to be run in a codeserver environment.
Note: You must have root user authority to run the sthcondmn com-
mand.
Example
1. To start the hcondmn subsystem on a RISC System/6000, enter:
/usr/lib/hcon/sthcondmn
Implementation Specifics
This command is part of the AIX 3270 Host Connection Program/6000
(HCON).
File
/usr/lib/hcon/sthcondmn Complete path name of the sthcondmn com-
mand.
Suggested Reading
Prerequisite Information
Glossary Terms: client, subsystem.
Installing and Updating HCON outlines the procedures for instal-
ling HCON.
Understanding HCON Processes discusses the hcondmn subsystem.
Related Information
How to Install HCON discusses HCON installation procedures.
How to Set Up HCON in a Codeserver Environment provides informa-
tion on installing HCON on a codeserver.
How to Stop the hcondmn Subsystem discusses stopping the hcondmn
subsystem.
6
slattach Command
Purpose
Attaches serial lines as network interfaces.
Syntax
/etc/slattach [ +i | -i ] TTYName [ BaudRate [ Dial-
String ] ]
Description
The slattach command is used to assign a tty line to a network
interface.
Note: Only a person with net.config privileges may issue the
slattach command.
To detach the interface, use the ifconfig InterfaceName down
command after terminating the slattach command. The
InterfaceName parameter is the name that is
shown by the netstat command.
Note: You may also need to make an entry for the tty device in the
BNU /usr/lib/uucp/ Devices file.
Flags
+i Turns Internet Control Message Protocol ( ICMP) packet drop on.
With ICMP drop on, the connection drops any ICMP packets to be
sent.
-i Turns ICMP packet drop off. With ICMP drop off, the connection
sends all ICMP packets.
The default options is -i.
Parameters
TTYName A string of the form ttyxx or /dev/ttyxx.
BaudRate Sets the speed of the connection. The default speed is
9600.
DialString A string of expect/respond sequences using the BNU/UUCP
chat syntax.
Example
1. To attach the SLIP network interface to the tty1 port with a
direct connection, issue the following command:
./etc/slattach /dev/tty1
This command attaches tty1 to a network interface to be used by
the Serial Line Internet Protocol (SLIP).
2. To attach the SLIP network interface to tty1 using a modem con-
nection, issue the following command:
/etc/slattach /dev/tty1 9600 `""AT OK \pATF1 OK \pATDT34335 \
CONNECT""'
Implementation Specifics
This command is part of the TCP/IP in Network Support Facilities
in AIX Base Operating System (BOS) Runtime.
File
/usr/lib/uucp/ Devices Lists definitions of devices used for re-
mote connections.
Suggested Reading
Prerequisite Information
Glossary Terms: network address, network interface, protocol.
Understanding Network Interfaces for TCP/IP.
Related Information
The ifconfig command, netstat command.
6
pdelay Command
Purpose
Enables or reports the availability of delayed login ports.
Syntax
pdelay [ -a ] [ Device ]
Description
The pdelay command enables delayed ports. Delayed ports are en-
abled like shared ports, except that the login herald is not
displayed until you type one or more characters (usually carriage
returns). If a port is directly connected to a remote system or
connected to an intelligent modem, it is enabled as a delayed
port to prevent the getty command from talking to a getty on the
remote side or to the modem on a local connection. This action
conserves system resources. This statement is equivalent to
pdelay enabled=delay. If you do not specify a Device
parameter, the pdelay command reports the names of the
currently enabled ports.
Use the Device parameter to specify the ports to be enabled.
Permitted values for the Device parameter include:
* Full device name, such as the /dev/tty1 device.
* Simple device name, such as the tty1 device.
* Number such as 1 (one). This is equivalent to the /dev/tty1
device.
Flag
-a Enables all ports as delayed.
Example
To display the names of the delayed ports that are currently en-
abled, enter:
pdelay
Files
/etc/locks Contains lock files for the pshare and pdelay commands.
/etc/pdelay Specifies the command file.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
Glossary Terms: delayed port, enable, modem, port.
Related Information
The getty command, init command, pdisable command, penable
command, phold command, pshare command, pstart command.
6
whois Command
Purpose
Identifies a user by user ID or alias.
Syntax
whois [ .] [ !] [ name] [ name...]
whois help
Description
The whois command searches a user name directory and displays in-
formation about the user ID or nickname which was passed to it.
To obtain information, the whois command examines a user name
directory. The whois command tries to reach sri-nic.arpa and
will work only when this host is reached. Thus, this command
should be used only by users on ARPANET.
Note: If your network is on a national network, such as ARPANET,
the host name is hard-coded as "sri-nic.arpa". Your system ad-
ministrator can tell you if your particular network is connected
to a national network.
Flags
. Displays information for only the name that you entered.
! Displays help information for a nickname or handle ID that you
entered.
help Displays help information for the whois command.
Parameters
name Represents the user ID or nickname to perform a directory
search for.
name... Performs a wild card search for names that begin with the
letters before the ...
Examples
1. To display information about ARPANET registered users by the
name of Smith, enter:
whois Smith
2. To display information about ARPANET registered users that use
the handle Hobo, enter:
whois !Hobo
3. To display information about ARPANET registered users with the
name of John Smith, enter:
whois .Smith, John
4. To display information about ARPANET registered users whose
names or handles begin with the letters HEN, enter:
whois HEN...
5. To get help information for the whois command, enter:
whois help
Implementation Specifics
This command is part of the TCP/IP Facility in Network Facilities
of AIX for RISC System/6000.
Files
/etc/named.boot Contains configuration information for nameserver.
/usr/ucb/whois Command executable file.
Suggested Reading
Prerequisite Information
The following glossary terms: nickname, user ID, node.
Network Overview.
Related Information
The who command.
6
trace Daemon
Purpose
Records selected system events.
Syntax
trace [ -a | -f | -l] [ -d] [ -h] [ -j Event[,Event]] [ -k
Event[,Event]] [ -m Message] [
-oName] [ -o-] [ -s] [ -LSize] [ -TSize]
Description
The trace daemon configures a trace session and starts the col-
lection of system events. The data collected by the trace func-
tion is recorded in the trace log. A report from the trace log
can be generated with the trcrpt command.
By default, the trace daemon is interactive with subcommands for
controlling the trace session. Once a trace session is con-
sidered, use the trcoff and trcon subcommands to stop and restart
the collection of trace data.
You can use the System Management Interface Tool (SMIT) to run
the trace daemon. To use SMIT, enter:
smit trace
Flags
The trace daemon has three mode flags: -a, asynchronous mode,
trace does not accept subcommands; the -f, sin-
gle mode, the collection of trace data stops as soon as a full
buffer of trace data has been collected; -l flag, circular mode,
saves only the last buffer of trace data collected.
-a Runs trace in an asynchronous mode. The trace daemon does not
accept subcommands when run asynchronously. Use the trcstop com-
mand to stop the trace session.
-d Disables the automatic start of trace data collection. Delays
starting of trace data collection. Normally, the collection of
trace data starts automatically when you issue the trace daemon.
Use the trcon subcommand or the INTERRUPT signal to start the
collection of trace data.
-f Runs trace in an single mode. Causes the collection of trace
data to stop as soon as a full buffer of trace data is collected.
The trace data is then written to the trace log. Use the trcon
subcommand to restart trace data collection and capture another
full buffer of data. If you issue the trcoff subcommand before
the buffer is full, trace data collection is stopped and the
current contents of the buffer are written to the trace log.
-h Omits the header record from the trace log. Normally, the trace
daemon writes a header record with the date and time (from the
date command) at the beginning of the trace log,
the user's login identification (from the logname command), the
system name, version and release, the node identification, and
the machine identification (from the uname -a command), and a
user-defined message. At the beginning of the trace log, the in-
formation from the header record is included in the output of the
trcrpt command.
-j Event[,Event] Specifies the user-defined events for which you
want to collect trace data. The Event list items can be separated
by commas or enclosed in double quotation marks and separated by
commas or blanks.
-k Event[,Event] Specifies the user-defined events for which you
want to exclude trace data. The Event list items can be separated
by commas or enclosed in double quotation marks and separated by
commas or blanks.
-l Runs trace in an circular mode. Saves only the last buffer of
trace data collected. Causes the trace daemon to write trace
data to the trace log when the collection of trace data is
stopped. Use the trcoff subcommand to stop the collection of
trace data. In this mode, the trace data wraps within the in-
memory trace buffer. After the buffer fills up, each new trace
event is written over the oldest trace event in the buffer. The
buffer always contains the most recent events. When you stop
trace data collection using the trcoff subcommand, restart it us-
ing the trcon subcommand.
-m Message Specifies text to be included in the message field of
the trace log header record.
-o Name Overrides the /usr/adm/ras/trcfile default trace log file
and writes trace data to the Name file.
-o - Overrides the default trace log name and writes trace data to
standard output.
-s Stops tracing when the trace log fills. The trace daemon nor-
mally wraps the trace log when it fills up and continues to col-
lect trace data. This flag causes trace to stop trace data col-
lection and exit.
-L Size Overrides the default trace log file size of 1MB with the
value of the Size parameter.
Note: In the interactive and circular modes the log file size must
be at least twice the trace buffer size. In single mode the
trace buffer size must be smaller than the log file size.
-T Size Overrides the default trace buffer size of 128KB with the
value of the Size parameter.
Note: In the interactive and circular modes the buffer size must
be less than half the log file size. In single mode the trace
buffer size must be smaller than the log file size.
Subcommands
The following subcommands are used with the trace daemon to start
or stop trace data collection, run shell commands, or end a trace
session.
trcon Starts the collection of trace data.
trcoff Stops the collection of trace data.
q or quit Stops the collection of trace data and exits the trace
daemon.
! Command Runs the shell command specified by the Command
parameter.
? Displays the summary of trace daemon subcommands.
Signals
The INTERRUPT signal acts as a toggle to start and stop the col-
lection of trace data. Interruptions are set to SIG_IGN for the
traced process.
Examples
1. To trace system events during the run of the mycmd command,
enter:
trace
> !mycmd
> q
2. To trace the initial system events that occur during the run of
the mycmd command and include a message in the trace log header,
enter:
trace -f -m "Trace of initial system events during mycmd"
> !mycmd
> q
trace
> !mycmd1
> trcoff
> trcon
> !mycmd2
> trcoff
> q
File
/usr/adm/ras/trcfile Default trace log file.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
The Trace Facility Overview.
The following glossary entries: buffer, call, daemon, de-
fault, event, field, file, function, header record, header,
interactive, interrupt, kernel, list, log, message, mode,
option, output, parameter, process, record, run, session,
shell, signal, size, subcommand, system, text, toggle,
trace log, trace.
Related Information
The trchk subroutine, trcgen subroutine, trcstart subroutine,
trcon subroutine, trcoff subroutine, trcstop subroutine.
The trcgenk kernel service.
The Trace Facility Overview.
6
chvfs Command
Purpose
Changes entries in the /etc/vfs file.
Syntax
chvfs VFSEntry
Description
The chvfs command changes /etc/vfs file entries by specifying
the following fields within the VFSEntry parameter. The VFSEntry
parameter is composed of the following fields:
VFSName:VFSNumber:
Any of the fields in the VFSEntry can be null, with the exception
of the VFSName field. If all of the arguments are satisfactory,
the entry in the /etc/vfs file is changed.
Parameter
VFSEntry A string in the following format:
VFSName:VFSNumber:
VFSName The name of a virtual file system type.
VFSNumber The virtual file system type's internal number as known
by the kernel.
MountHelper The name of the back end used to mount a file system
of this type.
FileSystemHelper The name of the back end used by certain file
system specific commands to perform operations on a file system
of this type.
Example
1. To change the file system helper for the vfs entry named
newvfs, enter:
chvfs "newvfs:::/etc/helper/testhelper"
The missing fields are left unchanged.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/etc/vfs Contains descriptions of virtual file system types.
Suggested Reading
Prerequisite Information
The following glossary entries: stanza.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
Related Information
The lsvfs command, crvfs command, rmvfs command, mount com-
mand.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
6
tapechk Command
Purpose
Performs consistency checking of the streaming tape device.
Syntax
tapechk [ -? ] Number1 Number2
Description
The tapechk command performs rudimentary consistency checking on
an attached streaming tape device. Some hardware malfunctions
with a streaming tape drive can be detected by simply reading a
tape. The tapechk command provides a way to perform tape reads
on the file level.
Since the streaming tape drive cannot backspace over physical
data blocks or files, the tapechk command rewinds the tape to its
starting position prior to each check. This command either
checks data for the next number of files specified by the Number1
parameter or skips the next number of files specified by the
Number2 parameter. If you do not specify any parame-
ters, the tapechk command rewinds the tape and checks only the
first physical block.
The tapechk command uses the device in the TAPE environment vari-
able if it is defined. Otherwise, the default tape device is
/dev/rmt0.
Note: The backup command allows you to archive files selectively
or as an entire file system. It writes data as a continuous
stream terminated by a file mark, regardless of the number of
files specified. The tapechk command perceives each stream of
data as a single file. This is important when you specify numer-
ic parameters with the tapechk command.
Although you can use the tapechk command on any streaming tape
cartridge, it is primarily designed for checking tapes written by
the backup command.
Flag
-? Explains the format of the tapechk command.
Note: If you specify the -? flag, it must be specified before the
Number1 and Number2 parameters.
Example
To check the first three files on a streaming tape device, enter:
tapechk 3
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/usr/bin/tapechk Specifies the command file.
Suggested Reading
Prerequisite Information
Glossary terms: physical data block, streaming tape device.
Related Information
The backup command.
The rmt special file.
6
rusersd Daemon
Purpose
Responds to queries from the rusers command.
Syntax
/usr/etc/rpc.rusersd
Description
The rusersd daemon is a server that responds to queries from the
rusers command by returning a list of users
currently on the network. This daemon is normally invoked by the
inetd daemon.
Implementation Specifics
This daemon is part of NFS in Network Support Facilities in Base
Operating System Runtime.
Files
/etc/inetd.conf TCP/IP configuration file that starts RPC daemons
and other TCP/IP daemons
/etc/utmp Contains information on users logged into the system.
Suggested Reading
Prerequisite Information
Glossary Terms: daemon, server.
For more information about NFS, see Network File System (NFS)
Overview for System Management.
Related Information
The rusers command.
The inetd daemon.
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.
7
inc Command
Purpose
Incorporates new mail into a folder.
Syntax
inc [ + Folder ] [ -noaudit | -audit File ] [ -changecur |
-nochangecur ] [ -form FormFile | -format String ] [
-file File ] [ -truncate | -notruncate ] [
-nosilent | -silent ] [
-width Number ]
Description
The inc command incorporates incoming mail into a folder and then
outputs a list of the messages incorporated. A folder is an AIX
directory. By default, the inc command removes all of the new
messages from your mail drop and places them in the specified
folder. To incorporate new mail without deleting the mail drop,
use the -notruncate flag.
If the specified folder does not exist, the inc command prompts
you for permission to create it. The system creates the folder
as a subdirectory of the user's MH directory. The default folder
is inbox.
Note: If you do not have a Path: entry specified in your
.mh_profile file, the inc command creates the folder as
a subdirectory of the current directory.
The system assigns new messages consecutive message numbers
starting with the next highest number in the folder. Each new
message receives the protection code specified in the
Msg-Protect: entry in your .mh_profile file.
If the Msg-Protect: entry does not exist, a protection code of
644 is assigned. If the Unseen-Sequence: entry exists, new mes-
sages are added to each sequence specified by the entry.
Flags
-audit File Copies the current date to the specified file and ap-
pends the output of the inc command to the file.
-changecur Sets the first new message as the current message for
the specified folder. This flag is the default.
-file File Incorporates messages from the specified file instead
of the user's maildrop.
+Folder Specifies the folder to place new messages into. By de-
fault, the system creates a subdirectory called inbox in the
user's MH directory.
-form FormFile Identifies a file that contains an alternate output
format for the inc command.
-format String Specifies a string that defines an alternate output
format for the inc command.
-help Displays help information for the inc command.
-noaudit Suppresses recording of information about the incorpora-
tion of new messages. This is the default.
-nochangecur Prevents alteration of the current message for the
specified folder.
-nosilent Prompts the user for any necessary information. This
flag is the default.
-notruncate Prevents clearing of the mailbox or file from which
the inc command is taking new messages. If the -file flag is
specified, the -notruncate flag is the default.
-silent Prevents prompting by the inc command for information.
This flag is useful for running the inc command in the back-
ground.
-truncate Clears the mailbox or file from which the inc command is
taking new messages. If the -file flag is not specified, the
-truncate flag is the default.
-width Number Sets the number of columns in the command output.
The default is the width of the display.
Profile Entries
The following entries are entered in the
UserMhDirectory/.mh_profile file:
Alternate-Mailboxes: Specifies alternate mailboxes.
Folder-Protect: Sets the protection level for new folder direc-
tories.
Msg-Protect: Sets the protection level for new message files.
Path: Specifies the user's MH directory.
Unseen-Sequence: Specifies the sequences used to keep track of un-
seen messages.
Examples
1. To incorporate new mail into the default mail folder, inbox,
enter:
inc
If the inbox folder exists, the system displays a message similar
to the following:
Incorporating new mail into inbox...
65+ 04/08 jim@athena.a Meeting <<The meeting will
66 04/08 jim@athena.a Schedule <<Schedule change
In this example, two messages are incorporated into the inbox
folder. The subject of the first message is Meeting, and the
first line starts with the words The meeting will. The subject
of the second message is Schedule, and the first line starts with
the words Schedule change.
2. To incorporate new mail into a new folder called testcases,
enter:
inc +testcases
The system prompts you as follows:
Create folder "/u/mary/testcases"?
A message similar to the following is displayed:
Incorporating new mail into testcases...
67+ 04/08 jim@athena.a Meeting <<We will begin
68 04/08 jim@athena.a Schedule <<Schedule change
Implementation Specifics
This command is part of Message Handler in the Base Operating
System (BOS) Extensions 1 of AIX for RISC System/6000.
Files
$HOME/.mh_profile file Customizes the MH user profile.
/usr/lib/mh/mtstailor file Tailors the MH environment to the local
environment.
/var/mail/$USER file Speciefies the location of the mail
drop.
/usr/bin/inc file Contains the executable form of the inc command.
Suggested Reading
Prerequisite Information
Glossary Terms: default, file, flag, folder, format, mes-
sage.
Message Handler (MH) Overview.
Mail Overview.
Related Information
The mhmail command, post command, scan command.
The mh_alias file format, mh_profile file format.
7
sa1 Command
Purpose
Collects and stores binary data in the /usr/adm/sa/sadd file.
Syntax
sa1 [Interval Number]
Description
The sa1 command is a shell procedure variant of the sadc command.
The sa1 command collects and stores binary data in the
/usr/adm/sa/sadd file, where dd is the
day of the month. The Interval and Number parameters specify
that the record should be written Number times at Interval
seconds. If you do not specify these parameters, one record is
written. You must have permission to write in the /usr/adm/sa
directory to use this command.
The sa1 command is designed to be started automatically by the
cron command. If sa1 is not run daily from the
cron command, the sar command displays a message
about the non-existence of the /usr/lib/sa/sa1 data file.
Example
1. To create a daily record of sar activities and place in your
root crontab file, enter:
0 20 * * * /usr/lib/sa/sa1
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/usr/adm/sa Directory containing the daily data files.
/usr/adm/sa/sadd Daily data file, where the dd parameter is a
number representing the day of the month.
/usr/lib/sa/sa1 Data file.
Suggested Reading
Prerequisite Information
The following glossary entries: binary, file, procedure,
record, shell.
Related Information
The cron command, sadc command, sar command, sa2 command.
7
sysdumpdev Command
Purpose
Changes the primary or secondary dump device designation in a
running system.
Syntax
sysdumpdev -P { -p Device | -s Device}
sysdumpdev { -l | -p Device | -s Device | -L}
Description
The sysdumpdev command changes the primary or secondary dump dev-
ice designation temporarily in a system that is running. The
primary and secondary dump devices are designated in a system
configuration object. The new device designations are in effect
until the sysdumpdev command is run again, or the system is res-
tarted. To change the dump device designations permanently,
modify the system configuration object.
You can use the System Management Interface Tool (SMIT) to run
the sysdumpdev command. To use SMIT, enter:
smit sysdumpdev
Flags
-l Lists the current dump device assignments.
-p Device Permanently changes the primary dump device to the
specified device.
-s Device Permanently changes the secondary dump device to the
specified device.
-L Displays statistical information concerning the previous invo-
cation of dump, such as date and time of last dump, number of
blocks written, and completion status.
-P Makes permanent the dump device specified by -p or -s flags.
The -P flag can only be used with the -p or -s flags.
If no flags are used with the sysdumpdev command, the currently
designated dump devices are used.
Security
Access Control: Only the root user can run this command.
Examples
1. To display current dump device settings, enter:
sysdumpdev -l
2. To designate a logical volume (hd7) as the primary dump device,
enter:
sysdumpdev -p /dev/hd7
3. To designate a logical volume (hd7) as the secondary dump dev-
ice, enter:
sysdumpdev -s /dev/hd7
4. To display information from the previous dump invocation,
enter:
sysdumpdev -L
5. To permanently change the database object for the primary dump
device to /dev/newdisk1, enter:
sysdumpdev -P -p /dev/newdisk1
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
The following glossary entries: configuration, crash, device,
dump, run, system, user, volume.
Related Information
The crash command, sysdumpstart command.
7
ebxa Command
Purpose
Translates EBCDIC character data to AIX character data.
Syntax
ebxa < EBCDICInputFile > AIXOutputFile
Description
The ebxa command reads EBCDIC character data from standard input
and writes the translated AIX character data to standard output.
The EBCDICInputFile parameter is the name of a file which con-
tains EBCDIC text data and the AIXOutputFile is the name of the
file to which the translated data is written. The EBCDIC to AIX
translation is performed using the translation table named by the
value of the NLIN environment variable. If the NLIN environment
is not set or is not valid, the translation is performed using
the default universal translation. The genxlt command can be
used to create a translation table.
Example
1. To convert EBCDIC characters to AIX using the table created by
the genxlt command, enter:
ebxa < hostfile > hostfile.aixascii
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
The following glossary entries: EBCDIC character, EBCDIC,
character, environment variable, environment, file, input,
name, output, table, text, translation table, translation.
Related Information
The environment file.
The axeb command, genxlt command.
7
lslicense Command
Purpose
Displays the maximum number of users which can be concurrently
logged in.
Syntax
lslicense [ -c ]
Description
The lslicense command displays the number of users which can be
concurrently logged on according to the one time AIX license fee
for the system.
Flag
-c Puts the output in colon ( : ) form.
Examples
1. To display the number of licensed users, enter:
lslicense
2. To display the number of licensed users in a colon format,
enter:
lslicense -c
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
The following glossary entries: display, format, output, sys-
tem.
Related Information
The chlicense command.
7
x_chg_trm_120 Command
Purpose
Changes the characteristics of an Xstation 120.
Syntax
x_chg_trm_120 120 Name TypeName Address Server Time Device Pan
Mode Host Program
Description
The x_chg_trm_120 command changes, for the current host, the
characteristics of the Xstation specified by the Name parameter,
and stores the changed configuration in the
/usr/lpp/x_st_mgr/bin/x_st_mgrd.cf file, the
/usr/lpp/x_st_mgr/bin/x_st_mgrd.tmty file, and
the /etc/bootptab file.
Parameters that can be changed are:
120 Specifies the Xstation model. This command can be used only
for an Xstation 120.
Name Specifies the name of the Xstation. The Name parameter can
be up to 8 characters long and include the lower case letters a
through z, the numbers 0 through 9, the - (dash) and the .
(period). Name can be a user name, such as taylor, or a group
name with a number appended, such as graphs-2, and should identi-
fy an Xstation by its location in the work place or by the pri-
mary user's name. Name is stored in the /etc/hosts file.
Note: Name should not start with a lowercase or an uppercase o or
a lowercase or uppercase x, followed by an octal or hexadecimal
numeric. These characters are interpreted as octal or hexade-
cimal numbers, instead of as a terminal name. In the examples x3
and xE4, the 3 and the E4 are hexadecimal numerics.
TypeName Specifies the name you create to identify the type of
network protocol. The TypeName parameter must contain the prefix
x_st_mgr. and can include an identifier for the type of network
protocol, such as ether (for ethernet), tr (for token ring) or
802 (for IEEE 802.3). An example is
x_st_mgr.ether. The name of the network type is
stored in the /etc/bootptab file.
Address Specifies the hardware address of the Xstation. This ad-
dress appears on the LAN Statistics screen of the Xstation. Each
Xstation has a unique 6-byte hexadecimal hardware address, in
XXXXXXXXXXXX format, and cannot be changed by the user.
Server Identifies the Xstation as a primary or secondary boot
server. Two options are valid: y for a primary server and n for
a secondary server.
Time Specifies the number of seconds a boot server must wait be-
fore answering a boot-protocol broadcast request. The valid
number for a primary server is 00, since there is no delay time.
For a secondary server, refer to the number range in SMIT.
Device Specifies the input device. Device must be mouse or
tablet.
Pan Specifies whether the hardware pan feature is enabled or dis-
abled. The hardware pan feature allows the Xstation to use all
the additional video memory for a display area that appears when
the user pans the cursor to the edge of the screen. Two options
are valid: y enables and n disables the pan feature.
Mode Specifies the mode used by X Display Manager Control Protocol
(XDMCP). XDMCP uses the xdm program to facilitate the connection
of an X terminal to a remote host. XDMCP also allows the user to
turn an Xterminal off and on again and still maintain an esta-
blished connection to the remote host. Valid options are:
broadcast Sends a message to the network and waits for an xdmcp
host to respond.
direct Directs a request to an xdmcp manager known to the Xsta-
tion.
indirect Sends an indirect request to an xdmcp manager that main-
tains a list of xdmcp hosts. The manager assigns an xdmcp host
to respond to the Xstation.
off No X Display Manager Control Protocol (XDMCP).
Host Specifies the internet (IP) address of the xdmcp host used
for direct or indirect communication with the Xstation. Valid
options are none or the internet address of an xdmcp host. If
XDMCP is not used or if broadcast mode is used, the value of Host
is none. The internet address of an xdmcp host must be specified
if Mode is direct or indirect.
Program Identifies the startup program. This program should be
the aixterm command with selected options. The startup confi-
guration is stored in the /usr/lpp/x_st_mgr/bin/x_st_mgrd.cf
file.
Security
User management is responsible for evaluation, selection, and im-
plementation of security features.
Example
To change, the characteristics of Xstation xor1 for the current
host, so that the new hardware address is 10005ac9999 but the
other characteristics remain unchanged from those defined with
the x_add_trm_120 command, enter:
x_chg_trm_120 120 xor1 x_st_mgr.ether 10005ac9999 y \
00 mouse n off none \
/usr/bin/X11/bin/aixterm -W \
-e /usr/lpp/x_st_mgr/bin/login
It is necessary to repeat the previously defined parameters that
you do not want to change.
Implementation Specifics
This command is part of AIX Xstation Manager/6000.
Files
/usr/lpp/x_st_mgr/bin/x_st_mgrd.cf The Xstation Manager configura-
tion file.
/usr/lpp/x_st_mgr/bin/x_st_mgrd.tmty The terminal list file.
/etc/bootptab The boot protocol table.
Suggested Reading
Prerequisite Information
Glossary Terms: boot, current host, gateway host, host,
Internet Protocol (IP), network, port, protocol, server,
subnet address mask.
Related Information
The aixterm command, bootpd command, login command,
x_add_trm_120 command, x_add_trm_130 command, x_chg_net
command, x_chg_trm_130 command, x_def_net command, x_ls_trm
command, x_ls_net command, x_rm_net command, x_rm_trm command,
xset command.
7
biff Command
Purpose
Enables or disables mail notification during the current session.
Syntax
biff [ y | n]
Description
The biff command informs the system whether or not you want to be
notified when mail arrives during the current terminal session.
When mail notification is enabled, From and Subject header lines
and the first seven lines or 560 characters of the message are
displayed on the screen whenever mail arrives. The biff y com-
mand is often included in the $HOME/.login or $HOME/.profile file
to be executed each time the user logs in. The biff n command
disables notification.
The biff command operates asynchronously. For synchronous notif-
ication, use the MAIL variable of either the ksh command, bsh
command, or the csh command.
Flags
y Enables mail notification.
n Disables mail notification.
Examples
1. To display the current setting, enter:
biff
2. To be notified during the current terminal session whenever
mail arrives, enter the following statement in your $HOME/.login
or $HOME/.profile file:
biff y
The From and Subject header lines and the first seven lines or
560 characters of the message are displayed on the screen whenev-
er mail arrives.
Implementation Specifics
This command is part of the Base Operating System (BOS) Runtime
of AIX for RISC System/6000.
Files
$HOME/.login
$HOME/.profile
/usr/ucb/biff biff Command executable file
Suggested Reading
Prerequisite Information
Glossary Terms: directory, mail, message, profile, session,
terminal
Mail Overview.
Related Information
The comsat daemon, mail command.
7
next Command
Purpose
Shows the next message.
Syntax
next [ +Folder ] [ -header | -noheader ] [
-showproc CommandString | ]
-noshowproc ]
Description
The next command displays the number the system will assign to
the next message that is incorporated into a folder. This com-
mand is equivalent to the show command with next specified as the
message.
The next command links to the show program and also passes any
switches on to the showproc program. If you link to next and
call that link something other than next, your link will function
like the show command, rather than like the next command.
The show command passes any flags that it does not recognize to
the program performing the listing. Thus, you can specify flags
for the listing program, as well as the flags described in this
command section.
Flags
+Folder Specifies the folder that contains the message you want to
show.
-header Displays a one-line description of the message being
shown. The description includes the folder name and the message
number. This is the default.
-help Displays help information for the command.
-noheader Prevents display a one-line description of each message
being shown.
-noshowproc Uses the /bin/cat file to perform the listing. This
is the default.
-showproc CommandString Uses the specified command string to per-
form the listing.
Profile Entries
The following profile entries are part of the .mh_profile file:
Current-Folder: Sets your default current folder.
Path: Specifies your UserMhDirectory.
showproc: Specifies the program used to show messages.
Examples
1. To see the next message in the current folder, enter:
next
The system responds with a message similar to the following:
(Message schedule: 10)
The text of the message is also displayed. In this example, mes-
sage 10 in the current folder schedule is the next message.
2. To see the next message in the project folder, enter:
next +project
The system responds with the text of the message 5 and a header
similar to the following:
(Message project: 5)
Implementation Specifics
This command is part of Message Handler in the Base Operating
System (BOS) Extensions 1 of AIX for RISC System/6000.
Files
$HOME/.mh_profile file Specifies a user's MH profile.
/usr/bin/next file Contains the executable form of the next com-
mand.
Suggested Reading
Prerequisite Information
Glossary Terms: default, file, flag, folder, format, mes-
sage.
Message Handler (MH) Overview.
Mail Overview.
Related Information
The prev command, show command.
The mh_alias file format, mh_profile file format.
7
rmsnalias Command
Purpose
Removes the alias for a specified profile from the SNA configura-
tion database.
Syntax
rmsnalias -t ObjectType ObjectAlias
Description
The rmsnalias command removes the ObjectAlias for a profile of
type ObjectType from the SNA configuration database. The
ObjectAlias parameter specifies the name of the alias to
remove.
Flags
-t ObjectType Specifies the ObjectType of the profile for which
the alias is to be deleted.
Example
To remove an alias, using the rmsnalias command, enter:
rmsnalias -t attachment ETHATTCH
This removes the ETHATTCH alias from its attachment profile.
Implementation Specifics
This command is part of AIX Systems Network Architecture Ser-
vices/6000.
This command is not available for Japanese Language Support.
Files
/usr/bin Directory in which the rmsnalias command resides.
Suggested Reading
Related Information
The mksnalias command, chsnalias command.
7
lsmaster Command
Purpose
Displays the characteristics for the configuration of an NIS mas-
ter server.
Syntax
/usr/etc/lsmaster [ -c | -l ]
Description
The lsmaster command displays the characteristics of an NIS mas-
ter server. The host names of the slave servers are listed along
with the currently served domains.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit lsmaster
Flags
-c Specifies that the output should be in colon format. This flag
is the default.
-l Specifies that the output should be in list format.
Example
To list the NIS master server characteristics in colon format,
enter:
lsmaster -c
Implementation Specifics
This command is part of NFS in Network Support Facilities in Base
Operating System Runtime.
File
/etc/yp/domainname directory Contains the NIS maps for the NIS
domain.
Suggested Reading
Prerequisite Information
For information about managing NIS, see Network Information Ser-
vice (NIS) Overview for System Management.
Related Information
The chmaster command, mkmaster command, rmyp command, smit
command.
Network File System (NFS) Overview for System Management.
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.
System Management Interface Tool (SMIT) Overview.
8
crvfs Command
Purpose
Creates entries in the /etc/vfs file.
Syntax
crvfs VFSEntry
Description
The crvfs command adds /etc/vfs file entries by specifying
fields within the VFSEntry parameter. The VFSEntry parameter is
composed of the following fields:
VfsName:VfsNumber:MountHelper:FileSystemHelper.
Any of the fields in the VFSEntry parameter can be the NULL
value, with the exception of the VFSName field. If all the argu-
ments are satisfactory, and the VfsName entry given on the com-
mand line does not already exist, a new entry is created in the
/etc/vfs file.
Parameters
VFSEntry A string in the following format:
VfsName:VfsNumber:
VfsName The name of a virtual file system type.
VfsNumber The virtual file system type's internal number as known
by the kernel.
MountHelper The name of the back end used to mount a file system
of this type.
FileSystemHelper The name of the backend used by certain file
system specific commands to perform operations on a file system
of this type.
Example
1. To create a new vfs entry called newvfs, enter:
crvfs "newvfs:4:none:/etc/helpers/newvfshelper"
This creates the newvfs entry.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/etc/vfs Contains descriptions of virtual file system types.
Suggested Reading
Prerequisite Information
The following glossary entries: stanza.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
The Mounting Overview explains mounting files and directories,
mount points, and automatic mounts.
Related Information
The lsvfs command, chvfs command, rmvfs command, mount com-
mand.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
The Mounting Overview explains mounting files and directories,
mount points, and automatic mounts.
8
restore Command
Purpose
Copies previously backed-up file systems, created by the backup
command, from a remote machine's device.
Syntax
restore [ -b Number1] [ -fDevice] [ -q] [ -r] [ -s Number2] [ -t]
[ -T] [ -v] [ -x] [ [ -B] [ -h] [ -i] [ -m] [ -R] [ -y] | [ -d] [] [ -X Number3]] [File]
-M] [ -X Number3]] [File]
Note: Do not specify the File parameter when using the -r, -R,
or -T flag. The -M flag can only be specified if the -x or -X
flags are also specified.
Description
The restore command reads files written by the backup command
from a backup medium and restores them to a file system. Use it
to restore files backed up on a local system.
Generally, you do not need to determine the format used when
files were backed up because the restore command does that for
you. However, if you choose any flags that require your
knowledge of the backup format, first use the -t flag to deter-
mine which of the following formats apply:
* Backup by i-node number, which is created when an AIX Version 3
file system is backed up by i-node number.
* Backup by name, which is created when specific files are backed
up by name or when AIX Version 2 file systems are backed up by
i-node number.
When you do not specify a restore device with the -f flag, the
restore command reads files from the /dev/rfd0
default device. For more information on using tape dev-
ices see the rmt special file.
The File parameter is the path name (absolute or relative) of the
file that is displayed when using the -T flag. If you do not
specify the File parameter, everything on the backup medium is
restored.
Notes:
1. Files must be restored using the same method by which they were
backed up. For example, if a file system was backed up by name,
it must be restored by name.
2. When more than one diskette is required, the restore command
reads the one mounted, prompts the user for a new one, and waits
for the user's response. After inserting the new diskette, press
the Enter key to continue restoring files.
3. When restoring a backup by i-node number, the restore command
creates and uses a file named restoresymtable. This file is
created in the file system being restored. The file is necessary
for the restore command to do incremental i-node restores, and
should not be removed if such incremental i-node restore is used.
4. Do not use a no-rewind tape device for restoring, unless the
-s flag is specified.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit restore
Flags
-B Specifies that data being restored is from standard input.
Normally, the restore command examines the actual backup medium
to determine the backup format. When piping the data to the
restore command, this examination cannot occur.
The -B flag indicates that standard input is in the AIX Version 3
backup by i-node number.
-b Number1 Specifies the number of blocks to read in a single in-
put operation. If you do not specify this flag, the restore com-
mand selects a default value appropriate for the physical device
you have selected. Larger values of the Number1 parameter result
in larger physical transfers from tape devices. The number of
blocks must be a multiple of the physical block size of the dev-
ice being used. The restore command always ignores the value of
the -b flag when it reads a diskette; the input is al-
ways read in clusters that occupy a complete track.
-d Indicates that if the File parameter is a directory, all files
in that directory should be restored. In this case, the name of
each restored file is always its name as shown by the restore -T
command. The -d flag is used when the data is in the AIX Version
2 backup by i-node number or by name format.
-fDevice Specifies the input device. Specify the Device parameter
as a file name (such as the /dev/rmt0 file) to get input from the
named device or specify - (minus) to get input from the standard
input device. The - (minus) feature enables you to pipe the out-
put of a dd command to the restore command.
-h Specifies that only the actual directory is restored, not the
files it contains. The -h flag is used when the data is in the
AIX Version 3 backup by i-node number.
-i Specifies the start of the interactive mode. This flag allows
you to restore selected files from the backup. The -i flag is
used when the data is in the AIX Version 3 backup by i-node
number. The subcommands for the -i flag are:
ls [Directory1] Specifies that within the Directory1 parameter,
directory names are displayed with a / (slash) after the name,
and files to be restored are displayed with an * (asterisk) be-
fore the name. If the -v flag is used, the i-node number of
each file and directory is also displayed. If the Directory1
parameter is not specified, the current directory is used.
cd Directory2 Changes the current directory to the Directory2
parameter.
pwd Displays the full path name of the current directory.
add [File1] Specifies the File1 parameter to restore. If the
File1 parameter is a directory, that directory
and all its files are restored (unless the -h flag is used).
Files that are restored are displayed with an * (asterisk) before
the name by the ls subcommand. If the File1 parameter is not
specified, the current directory is added to the list.
delete [File2] Specifies the File2 parameter to be ignored in re-
store. If the File2 parameter is a directory, that directory and
all its files are not restored (unless the -h flag is used). If
the File2 parameter is not specified, the current directory is
deleted from the extraction list.
extract Specifies the restoration of all files displayed with an *
(asterisk) before the name by the ls subcommand.
setmodes Specifies that all files restored have their owner,
modes, and times set rather than using this information as it re-
sides on the backup medium.
verbose Specifies that the i-node numbers of all restored files
are displayed with the ls subcommand. Information about each
file is also displayed as it is restored. The next call of the
verbose subcommand turns verbose off.
help Specifies that a summary of the subcommands is displayed.
quit Specifies that the restore command stops running immediately,
even if all requested files are not restored.
-M Specifies that the access and modification times of restored
files are to be set to the time of restoration. The default ac-
tion (when the -M flag is not specified) is to set the access and
modification times to the file times on the backup medium. If a
restored file is an archive, the modification times in all the
member headers are also set to the time of restoration. You can
specify this flag only when you are restoring individually named
files. The -M flag is used when the data is in the AIX Version 2
backup by i-node or by name format. The -M flag can only be
specified if the -x or -X flags are also specified.
-m Specifies that files are restored by i-node number rather than
by path name. The -m flag is used when the data is in the AIX
Version 3 backup by i-node format.
-q Specifies that the removable medium is ready to use. In this
case, the restore command proceeds without prompting you to
prepare the removable medium.
-r Restores an entire file system. Do not specify the File param-
eter when using the -r and -R flags.
Warning: If this procedure is not carefully followed, the entire
file system may be damaged. If you are restoring a full (level
0) backup, run the mkfs command to create an empty file system
before doing the restore. If you are restoring an incremental
backup at, for example level 2, run the mkfs command, restore
the appropriate level 0 backup, then the level 1 backup, and fi-
nally the level 2 backup. As an added safety precaution, run the
fsck command after you restore each backup level.
-R Used when restoring a by i-node backup to specify that the
restore command requests a specific volume in a
multi-volume set of backup medium when restoring an entire file
system. The -R flag provides the ability to resume a previously
interrupted restore. Do not specify the File parameter
when using the -r and -R flags.
-s Number2 Specifies that multiple backups are on the backup tape
and that the restore command skips to the backup represented by
the Number2 parameter. The Number2 parameter must be in the
range of 1 to 100. To restore multiple backups from tape, a no-
rewind tape device must be specified. The Number2 parameter is
relative to your position on the tape. For example, to restore
the 5th and 9th backups from a 100 count backup tape, commands
would use the -s5 flag to get to the 5th backup then the -s4 flag
to get to the 9th backup.
Note: Do not use a no-rewind tape device for restoring, unless the
-s flag is specified.
-t Displays the table of contents for files backed up by i-node
and displays header information for files backed up by name or
backed up by i-node under the AIX Version 2 system. You can use
this flag to determine the backup format of the files.
-T Displays the table of contents for the backed up files. If the
backup was made by name (the backup -i command), the names
displayed are the ones you provided to the backup command. If
the backup was made by i-node, the restore command displays the
file name. The names are relative to the root ( / ) directory of
the file system backed up. The only exception is the root ( / )
directory itself.
Note: Do not use the -T flag and the -t flag together, they are
mutually exclusive.
-v Reports the progress of the restoration as it proceeds.
-X Number3 Used when restoring from backup by name media and
specifies the starting volume number. If you specify the File
parameter when using the -X flag, the restore command processes
only the files you request and prompts you to prepare the next
volume only if the requested files are continued on that volume.
If you do not specify the File parameter, the restore command
processes all files on that volume and prompts you to prepare the
next volumes. This is used with the AIX Version 3 by-name back-
ups.
-x Restores individually named files. If no names are given, all
files on that medium are restored. The names must be in the same
form as the names shown by the restore -T command. With a name
backup, the restore command gives the restored file whatever name
was supplied when the file was backed up. If the original name
was specified relative to the current directory, the restore com-
mand creates a file relative to the current directory. The
restore command automatically creates any needed
directories. When using this flag you are prompted for the be-
ginning volume number.
-y Specifies that the restore command does not ask whether it
should stop the restore if a tape error is encountered. The
restore command attempts to skip over bad
blocks. The -y flag is used when the data is in the AIX Version
3 backup by i-node format.
-? Specifies that the usage message is displayed.
Examples
1. To list the names of files previously backed up, enter:
restore -T
Information is read from the /dev/rfd0efault backup device. If
individual files are backed up, only the file names are
displayed. If an entire file system is backed up, the i-node
number is also shown.
2. To restore files to the main file system, enter:
restore -x -v
The -x flag extracts all the files from the backup medium and
restores them to their proper places in the file system. The -v
flag displays a progress report as each file is restored. If a
file system backup is being restored, the files are named with
their i-node numbers. Otherwise, just the names are displayed.
3. To copy selected files, enter:
restore -xv /u/mike/manual/chap1
This command extracts the /u/mike/manual/chap1 file from the
backup medium and restores it. To work properly, the
/u/mike/manual/chap1 file must be a name that
can be displayed by the restore -T command.
4. To copy all the files in a directory, enter:
restore -xdv manual
This command restores the manual directory and the files in it.
If it does not exist, a directory named manual is created in the
current directory to hold the files being restored.
5. To restore an entire file system backup, enter:
mkfs /dev/hd1
mount /dev/hd1 /filesys
cd /filesys
restore -r
This command restores an entire file system backup onto the
/dev/hd1 file. It destroys and replaces any
file system that was previously stored on the /dev/hd1 file. If
the backup was made using incremental file system backups, re-
store the backups in increasing backup-level order (for example,
0, 1, 2 ).
6. To improve performance on streaming tape, pipe the dd command
to the restore command by entering:
dd if=/dev/rmt0 bs=30b | restore- -x -f -
The dd command copies the files from an input file that is a
streaming tape device (if=/dev/rmt0) and specifies a file size of
30 blocks (bs=30b). The output is piped to the restore command
which gets the input from the standard input device ( -f) and re-
stores by name ( -x).
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/dev/rfd0 Default restore device.
/etc Directory where the restore command resides.
Suggested Reading
Prerequisite Information
The following glossary entries: i-node number, mount.
The Backup Overview provides information on different methods of
backing up, restoring process, different types of backup media,
and guidelines for backup policies.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
The Directories Overview explains working with directories and
path names.
The Files Overview provides information on working with files.
Related Information
The backup command, mkfs command, fsck command, dd command.
The filesystems file, backup file, rmt special file.
The Backup Overview provides information on different methods of
backing up, restoring process, different types of backup media,
and guidelines for backup policies.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
The Directories Overview explains working with directories and
path names.
The Files Overview provides information on working with files.
The System Management Interface Tool (SMIT) Overview explains
the structure, main menus, and tasks that are done with SMIT.
Using SMIT explains SMIT screens, how to navigate in the
screens, and how to enter data.
8
dc Command
Purpose
Provides an interactive desk calculator for doing arbitrary-
precision integer arithmetic.
Syntax
dc [File]
Description
The dc command is an arbitrary-precision arithmetic calculator.
The dc command takes its input from the File parameter or stan-
dard input until it reads an end-of-file character. It writes to
standard output. It operates on decimal integers, but you can
specify an input base, output base, and a number of fractional
digits to be maintained. The dc command is structured as a
stacking, reverse Polish calculator.
The bc command is a preprocessor for the dc command. It pro-
vides infix notation and a syntax similar to the C language,
which implements functions and control structures for programs.
Subcommands
Number Pushes the specified value onto the stack. A Number is an
unbroken string of the digits 0-9. To specify a negative number,
precede it with _ (underscore). A number can contain a decimal
point.
+ - / * % \^ Adds (+), subtracts (-), multiplies (*), divides (/),
remainders (%), or exponentiates (\^ ) the top two values on the
stack. The dc command pops the top two entries off the stack and
pushes the result on the stack in their place. The dc command
ignores fractional parts of an exponent.
sx Pops the top of the stack and stores it in a register named x,
where the x variable can be any character.
Sx Treats the x variable as a stack. It pops the top of the main
stack and pushes that value onto the stack represented by the x
variable.
lx Pushes the value in the register represented by the x variable
on the stack. The register represented by the x variable is not
changed. All registers start with a value of 0.
Lx Treats the x variable as a stack and pops its top value onto
the main stack.
d Duplicates the top value on the stack.
p Displays the top value on the stack. The top value remains un-
changed. The p interprets the top of the stack as an ASCII
string, removes it, and displays it.
P Interprets the top of the stack as a string, removes it, and
displays it.
f Displays all values on the stack.
q Exits the program. If the dc command is running a string, it
pops the recursion level by two.
Q Pops the top value on the stack and on the string execution lev-
el by that value.
x Treats the top element of the stack as a character string and
runs it as a string of dc commands.
X Replaces the number on the top of the stack with its scale fac-
tor.
[ String ] Puts the bracketed String parameter onto the top of the
stack.
[ = | > | < ] x Pops the top two elements of the stack and com-
pares them. Evaluates the register represented by the x variable
as if it obeys the stated relation.
v Replaces the top element on the stack by its square root. Any
existing fractional part of the option is taken into account, but
otherwise, the scale factor is ignored.
! Interprets the rest of the line as an AIX command.
c Cleans the stack: the dc command pops all values on the stack.
i Pops the top value on the stack and uses that value as the
number radix for further input.
I Pushes the input base on the top of the stack.
o Pops the top value on the stack and uses that value as the
number radix for further output.
O Pushes the output base on the top of the stack.
k Pops the top of the stack, and uses that value as a nonnegative
scale factor. The appropriate number of places is displayed on
output and is maintained during multiplication, division, and ex-
ponentiation. The interaction of scale factor, input base, and
output base is reasonable if all are changed together.
z Pushes the number of elements in the stack onto the stack.
Z Replaces the top number in the stack with the number of digits
in that number.
? Gets and runs a line of input.
;: The bc command uses these characters for array operations.
Examples
1. To use the dc command as a calculator:
You: 1 4 / p
System: 0
You: 1 k [ Keep 1 decimal place ]s.
1 4 / p
System: 0.2
You: 3 k [ Keep 3 decimal places ]s.
1 4 / p
System: 0.250
You: 16 63 5 / + p
System: 28.600
You: 16 63 5 + / p
System: 0.235
You can enter the comments (enclosed in [ ]s.), but they are pro-
vided only for your information.
When you enter the dc command expressions directly from the key-
board, press Ctrl-D to end the bc command session and return to
the shell command line.
2. To load and run a dc program file:
You: dc prog.dc
5 lf x p [ 5 factorial ]s.
System: 120
You: 10 lf x p [ 10 factorial ]s.
System: 3628800
This entry interprets the dc program saved in prog.dc, then reads
from the workstation keyboard. The lf x evaluates the function
stored in register f, which could be defined in the prog.c pro-
gram file as:
[ f: compute the factorial of n ]s.
[ (n = the top of the stack) ]s.
[ If 1>n do b; If 1<n do r ]s.
[d 1 >b d 1 <r] sf
[ Return f(n) = 1 ]s.
[d - 1 +] sb
[ Return f(n) = n * f(n-1) ]s.
[d 1 - lf x *] sr
You can create dc program files with a text editor or with the
-c (compile) flag of the bc command. When you enter the
dc command expressions directly from the keyboard, press
Ctrl-D to end the bc command session and return to the shell com-
mand line.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/usr/bin/dc The dc command.
Suggested Reading
Prerequisite Information
The following glossary entries: standard input, standard output
and shell.
Related Information
The bc command.
8
chcursor Command
Purpose
Changes the shape of the cursor used by the current virtual ter-
minal.
Syntax
chcursor -s Number
Description
The chcursor command changes the shape of the cursor used in the
currently active virtual terminal. Six cursor shapes are avail-
able:
Cursor Shape Value
No cursor 0
Single underscore 1
Double underscore 2
Illuminated character cell (lower half) 3
Mid-character line 4
Illuminated full-character cell 5
Note: This command is usable only on a High Function Terminal
(HFT).
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT enter:
smit chcursor
For a more precise entry into a certain part of the Devices path
in SMIT, see Devices in SMIT.
Flags
-s Number Specifies the shape of the cursor for the current virtu-
al terminal. Number is an integer from 0 through 5.
Example
To change the cursor shape to a mid-character line (or - (dash)),
enter:
chcursor -s4
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/chcursor Command file.
Suggested Reading
Prerequisite Information
Glossary terms: cursor, virtual terminal.
HFT Subsystem Conceptual Introduction.
Related Information
The smit command tells how to run the smit command, what flags
to use to vary the output, and how to use the smit.script and
smit.log files.
Changing HFT/Virtual Terminal Characteristics Using SMIT
discusses modifying the characteristics of certain devices using
SMIT.
8
help Command
Purpose
Provides information for new users.
Syntax
help
Description
The help command presents a one page display of information for
new users. Information is available for the following topics:
* Concatenating or displaying files
* Editing lines interactively
* Sending and receiving mail
* Reading system messages
* Changing password file information
* Identifying current users of the system
* Sending messages to the other users on the system
* Displaying the contents of directories
* Viewing information on the Source Code Control System
* Setting terminal modes.
Example
To obtain help, type help and the following appears:
The commands:
man -k keyword lists commands relevant to a keyword
man command prints out the manual pages for a command;
other basic commands are:
cat -concatenates files (and just prints them out)
ex -text editor
finger -user information lookup directory
ls -lists contents of a directory
mail -sends and receives mail
msgs -system messages and junk mail
passwd -changes login password
sccshelp -views information on the Source Code Control System
tset -sets terminal modes
who -who is on the system
write -writes to another user
You could find programs about mail by the command: man -k mail
And print out the man command documentation via: man mail
You can log out by typing exit.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
The following glossary entries: concatenate and Source Code
Control System.
Related Information
The cat command, ex command, finger command, ls command,
mail command, msgs command, passwd command, sccshelp
command, tset command, who command, write command.
8
emkey Command
Purpose
Creates a new customization profile for the 3278/79 Emulation
(EM78) program.
Syntax
emkey [ -iFile] [ -oFile]
Description
The emkey command allows you to change the keyboard layout,
select different field attribute modes, and use different colors
on a color display. You can do this by modifying copies of the
default (emdefs.p) or alternate (emaltdefs.p) customization
files, and issuing the emkey command to produce a new customiza-
tion profile.
Flags
-? Displays the help screen for the emkey command. Do not use the
-? flag with any other flags.
-iFile Specifies the location of the customization file to be
used. The File variable can be any valid AIX file identifier and
should contain EM78 profile information. The file can be in any
directory as long as you have read access to the file. The de-
fault value for the File variable is emdefs.p in your current
directory.
-oFile Specifies where to write the customization profile. The
File variable can be any valid AIX file identif-
ier, provided you have write permission in the directory. The
default value for the File variable is emkeys.o in your current
directory.
Examples
1. To display help information for the emkey command, enter:
emkey -?
2. To issue the emkey command using the customization file in the
current directory, enter:
emkey
The above example reads the emdefs.p customization file from the
current directory and creates the emkeys.o keyboard profile in
the current directory.
3. To create the alternate customization profile, make sure that
you have write permission in your current directory, and enter:
emkey -i/usr/lib/em78/emaltdefs.p
When the command is completed a message is displayed. To use the
new profile, issue the em78 command with the -k flag, and the
name of the alternate profile (emkeys.o) as follows:
em78 -kemkeys.o
The alternate customization profile (emkeys.o) is now active.
Note: The em78 command -k flag is required only if the profile
to be used is named something other than $HOME/emkeys.o.
4. To issue the emkey command using the -i and -o flags to select
the input customization file and the output profile, enter:
emkey -i/usr/lib/em78/emaltdefs.p -o/usr/jdoe/emaltkeys.o
The above example reads the user definition file
/usr/lib/em78/emaltdefs.p and produces the keyboard definition
file /usr/jdoe/emaltkeys.o.
Implementation Specifics
This command is part of AIX 3278/79 Emulation/6000.
Files
/usr/lib/em78 3278/79 Emulation Program directory.
/usr/lib/em78/emdefs.p 3278/79 Emulation Program default user de-
finitions file.
/usr/lib/em78/emaltdefs.p 3278/79 Emulation Program alternate user
definitions file.
Suggested Reading
Prerequisite Information
Glossary Terms: default, default value, directory, file,
profile.
For more information on emulators, see Emulators Overview.
For more information on using the EM78 program, see 3278/79 Emu-
lation Overview.
Related Information
The em78 command starts the EM78 program; the emrcv(MVS/TSO),
emrcv (VM/CMS), emsend (MVS/TSO), and emsend (VM/CMS) commands
transfer files between a host and a workstation.
For more information on EM78 customization, read Customizing
3278/79 Emulation.
8
talkd Daemon
Purpose
Provides the server function for the talk command.
Syntax
The talkd daemon is normally started by the inetd daemon. It
can also be controlled from the command line using SRC commands.
talkd [ -s ]
Description
The talkd daemon is the server that notifies a user (the callee)
that someone else (the caller) wants to initiate a conversation.
The daemon sets up the conversation if the callee accepts the in-
vitation. The caller initiates the conversation by executing the
talk command specifying the callee. The callee accepts the in-
vitation by executing the talk command specifying the caller.
The talkd daemon listens at the socket defined in the InetServ
object class. When the talkd daemon receives a LOOK_UP request
from a local or remote talk process, the talkd daemon scans its
internal invitation table for an entry that pairs the client pro-
cess (the local or remote talk process) with a caller.
If no entry exists in the invitation table, the talkd daemon as-
sumes that the client process is the caller. The talkd daemon
then receives the client process's ANNOUNCE request. The talkd
daemon broadcasts an invitation on the remote computer where the
callee first logged in (unless the caller specifies a particular
tty device). This terminal usually is the console, but it may be
another terminal.
Otherwise, the invitation is sent to the terminal that the second
user first logged into. This usually is the console, but it may
be another terminal.
Note: If the user being called is running AIXwindows and has no
other terminals open, the talkd daemon cannot send an invitation.
The user must have opened at least one other HFT besides that in
which AIXwindows is running.
If an entry does exist in the talkd daemon's internal invitation
table, the talkd daemon assumes that the client is the callee.
The talkd daemon returns the appropriate rendezvous address to
the talk process for the callee. The callee process then estab-
lishes a stream connection with the caller process.
Note: The talkd daemon uses the Talk 4.3 protocol, which is not
compatible with 4.2 versions of the talk process. The subserver
name for the 4.3 protocol is ntalk.
Changes to the talkd daemon should be made using the System
Management Interface Tool (SMIT); the talkd daemon is started by
default. The inetd daemon no longer reads the /etc/inetd.conf
file, although this file still exists. Instead, the inetd daemon
gets its information from the InetServ object class (stored in
the ODM). This object class is a combination of the information
in the /etc/inetd.conf file and the /etc/services file. InetServ
is created at install time from information in these two files.
If you have already set up the talkd daemon using the
/etc/inetd.conf file, or if you are accustomed
to using this file and want to continue doing so, you can. How-
ever, the InetServ object class and the /etc/services and
/etc/inetd.conf files must be kept in sync. If
you configure the fingerd daemon using SMIT, the inetexp command
will be run automatically. If you modify the /etc/inetd.conf or
the /etc/services file, you will need to run the inetimp command
to apply those changes to the InetServ object class. Then run
the refresh -s inetd command to update immediately the inetd dae-
mon.
Debugging messages are sent to the syslogd daemon.
The talkd daemon should be controlled using the System Resource
Controller (SRC) or the System Management Interface Tool (SMIT).
Entering talkd at the command line is not recommended.
Manipulating the talkd Daemon with the System Resource Controller
The talkd daemon is an inetd subserver controlled by the System
Resource Controller ( SRC). The talkd daemon is a member of the
tcpip system group. The talkd daemon is enabled by default and
can be manipulated by SRC commands.
Use the following SRC commands to manipulate the talkd daemon:
startsrc Starts a subsystem, group of subsystems, or a subserver.
stopsrc Stops a subsystem, group of subsystems, or a subserver.
traceson Enables tracing of a subsystem, group of subsystems, or
a subserver.
tracesoff Disables tracing of a subsystem, group of subsystems,
or a subserver.
lssrc Gets the status of a subsystem, group of subsystems, or a
subserver.
Flag
-s Turns on socket-level debugging.
Examples
1. To start the talkd daemon, enter the following:
startsrc -t ntalk
This command starts the daemon. The -t flag specifies that the
subserver that follows is to be started.
2. To stop the talkd daemon normally, enter the following:
stopsrc -t ntalk
This command stops the daemon. The -t flag specifies that the
subserver that follows is to be stopped.
3. To get a short status report from the talkd daemon, enter the
following:
lssrc -t ntalk
This command returns the name of the daemon, the process ID of
the daemon, and the state of the daemon (active or inactive).
4. To enable tracing for the talkd daemon, enter the following:
traceson -t ntalk
This command enables socket level debugging. Use the trpt com-
mand to look at the output of this example command.
Implementation Specifics
This daemon is part of TCP/IP in Network Support Facilities in
AIX Base Operating System (BOS) Runtime.
Files
/etc/services Defines Internet socket assignments.
/etc/utmp Contains data about users currently logged in.
/etc/inetd.conf Contains the configuration information for the
inetd daemon.
Suggested Reading
Prerequisite Information
Glossary Terms: client, daemon, server, subserver, subsys-
tem.
Understanding the TCP/IP Daemons, Understanding SRC Control of
TCP/IP Daemons.
Related Information
The inetd daemon, syslogd daemon.
The inetserv command, talk command.
8
rmgroup Command
Purpose
Removes a group.
Syntax
rmgroup Name
Description
The rmgroup command removes a group specified by the Name parame-
ter, as well as all the attributes defined for that group. The
users within a group are not removed from the system. If the
group is the primary group for any user, it cannot be removed un-
less you redefine the user's primary group with the chuser
command, which alters the /etc/passwd file.
The group name must already exist as an alphanumeric string of 8
characters or less that begins with an alphabetic character, and
cannot be the ALL or default keywords.
Only the root user can remove an administrative group or a group
with administrative users as members.
You can use the System Management Interface Tool (SMIT) to run
this command. To use SMIT, enter:
smit rmgroup
Security
Access Control: This command should grant execute (x) access only
to the root user and members of the security group. The command
should have the trusted computing base attribute and run setuid
to the root user to access the user database.
Files Accessed:
Mode File
r /etc/passwd
rw /etc/group
rw /etc/security/group
Auditing Events:
Event Information
GROUP_Remove group
Example
1. To remove the finance group, enter:
rmgroup finance
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/rmgroup Specifies the path to the rmgroup command.
/etc/group Contains the basic attributes of groups.
/etc/security/group Contains the extended attributes of groups.
Suggested Reading
Prerequisite Information
The following glossary entries: access, attribute, character,
group, keyword, parameter, path, primary group, program,
root user, setuid, trusted computing base, user.
Security Introduction describes the identification and authenti-
cation of users, discretionary access control, the trusted com-
puting base, and auditing.
Related Information
The chfn command, chgrpmem command, chsh command, chgroup
command, chuser command, lsgroup command, lsuser command,
mkgroup command, mkuser command, passwd command,
pwdadm command, rmuser command, setgroups command,
setsenv command.
8
pwdadm Command
Purpose
Administers users' passwords.
Syntax
pwdadm [ -f Flags | -q ] User
Description
The pwdadm command administers users' passwords. The root user
or a member of the security group can supply or change the pass-
word of the user specified by the User parameter, provided the
invoker of the command gives his own password when queried. When
the command executes, it sets the ADMCHG attribute. This forces
the user to change the password the next time a login command or
an su command is given for the user.
The root user or a member of the security group should not change
their personal password with this command. Only the root user
can change password information for administrative users, those
users that have the admin attribute set to true in the
/etc/security/user file.
When this command is executed, the password field for the user in
the /etc/passwd file is set to ! (exclamation point), indicating
that an encrypted version of the password is in the
/etc/security/passwd file. The ADMCHG attribute
is set when the root user or a member of the security group
changes a user's password with the pwdadm command or with the
passwd command.
A new password must be defined according to the rules in the
pw_restrictions stanza of the /etc/security/login.cfg file, un-
less the -f NOCHECK flag is included. By including the -f flag
with the pwdadm command, the root user or a member of the securi-
ty group can set attributes that change the password rules. If
there is no password entry in the /etc/security/passwd file when
the -f flag is used, the password field in the /etc/passwd file
is set to ! (exclamation point) and an * (asterisk) appears in
the password= field to indicate that no password has been set.
The -q flag permits the root user or members of the security
group to query password information. Only the status of the las-
tupdate attribute and the flags attribute appear. The
encrypted password remains hidden.
Flags
-f Flags Specifies the flags attribute of a password. The Flags
parameter must be a list of comma-separated attributes from the
following list:
NOCHECK Signifies that new passwords need not follow the guide-
lines established in the pw_restrictions stanza of the
/etc/security/login.cfg file for password compo-
sition.
ADMIN Specifies that password information may be changed only by
the root user. Only the root user can enable or disable this at-
tribute.
ADMCHG Resets the ADMCHG attribute without changing the user's
password. This forces the user to change passwords the next time
a login command or an su command is given for the user. The at-
tribute is cleared when the user specified by the User parameter
resets the password.
-q Queries the status of the password. The values of the
lastupdate attribute and the flags attribute ap-
pear.
Security
Access Control: Only the root user and members of the security
group should have execute (x) access to this command. The com-
mand should have the trusted computing base attribute and be
setuid to the root user to have write (w) access to the
/etc/passwd file, the /etc/security/passwd file,
and other user database files.
Files Accessed:
Mode File
rw /etc/passwd
rw /etc/security/passwd
r /etc/security/login.cfg
Auditing Events:
Event Information
PASSWORD_Change user
PASSWORD_Flags user, flags
Examples
1. To set a password for user susan, member of the security group
enters:
pwdadm susan
When prompted, the user who invoked the command must give his own
password before Susan's password can be changed.
2. To query the password status for user susan, a member of the
security group enters:
pwdadm -q susan
Values for the lastupdate attribute and the flags attribute ap-
pear: The following example shows what appears when the NOCHECK
and ADMCHG flags attributes are in effect:
susan
lastupdate=
flags= NOCHECK,ADMCHG
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/bin/pwdadm Specifies the path to the pwdadm command.
/etc/passwd Contains the basic user attributes.
/etc/security/passwd Contains password information.
/etc/security/login.cfg Contains configuration information.
Suggested Reading
Prerequisite Information
The following glossary entries: access, attribute, encrypt,
flag, group, parameter, password, root user, security,
setuid, stanza, trusted computing base.
Security Introduction describes the identification and authenti-
cation of users, discretionary access control, the trusted com-
puting base, and auditing.
Related Information
The passwd command.
8
last Command
Purpose
Displays information about previous log ins.
Syntax
last [ -Number ] [ Name ... ] [ Terminal ... ]
Description
The last command displays, in reverse chronological order, all
previous log ins and log offs still recorded in the /usr/adm/wtmp
file. The /usr/adm/wtmp file collects login and log out records
as these events occur and holds them until the records are pro-
cessed by the acctcon1 and acctcon2 commands as part of the daily
reporting procedures.
The list can be restricted to:
* The number of lines specified by the -Number parameter.
* Log ins or log offs by the users specified by the Name parameter
* Log ins or log offs from the terminals specified by the Terminal
parameter.
A terminal can be named fully or abbreviated as a tty. For exam-
ple, you can specify either the tty0 terminal or the 0 terminal.
For each process, the last command displays the:
* Time the session began
* Duration
* Terminal (Tty) used.
If applicable, the following information is included:
* Terminations due to re-booting.
* Sessions that are still continuing.
If the last command is interrupted, it indicates how far the
search has progressed in the /usr/adm/wtmp file. If interrupted
with a quit signal, the command indicates how far the search has
progressed and then continues the search.
Examples
1. To display all the recorded log ins and log offs by user root
from the console terminal, enter:
last root console
2. To display the time between re-boots of the system, enter:
last re-boot
The re-boot pseudo-user logs in when the system re-boots.
Implementation Specifics
This command is part of Accounting Services in AIX BOS Extensions
2 and is provided for compatibility with Berkeley Software Dis-
tribution (BSD) systems.
Files
/usr/ucb/last The path to the last command.
/usr/adm/wtmp Contains connect-time accounting data, including log
in, log off, and shutdown records.
Suggested Reading
Prerequisite Information
The following glossary entries: accounting system, flag, log
in, log out, parameter, path, procedure, process, record,
root user, session, user.
How to Set Up an Accounting System describes the steps you must
take to establish an Accounting System.
Accounting Overview describes the Accounting System, the
preparation of daily and monthly reports, and the accounting
files.
Related Information
The acctcon command, lastlogin command in the acct/* commands.
9
bellmail Command
Purpose
Sends messages to system users and displays messages from system
users.
Syntax
bellmail -e [ -dDirectoryPath | -fFile] [ -p] [ -q] [ -r] [ -t]
User. . .
Description
The bellmail command with no flags writes to standard output, one
message at a time, all stored mail addressed to your login name.
Following each message, the bellmail command prompts you with a ?
(question mark). Press the Enter key to display the next mail
message, or enter one of the bellmail subcommands that control
the disposition of the message.
When sending mail, specify the User parameter, and then the
bellmail command reads a message from standard
input until you press END OF FILE (Ctrl-D) or enter a line con-
taining only a . (period). It prefixes this message with the
sender's name, the date and time of the message (its postmark),
and then adds this message to the user's mailbox.
The action of the bellmail command can be modified in two ways by
manipulating the /var/mail/UserID mailbox file:
* The default permission assignment for "others" is "all permis-
sions denied" (660). If you change this permission to
"read/write", the system preserves the file, even when it is emp-
ty, to maintain the desired permissions.
Note: The default mode for the mailbox file is 660. If this mode
is changed, you will not be able to remove the file.
* You can edit the file to contain as its first line:
Forward to person
This causes all messages sent to the User parameter to be sent to
the Person parameter instead. The Forward to feature is espe-
cially useful for sending all of a person's mail to a particular
machine in a network environment.
To specify a recipient on a remote system accessible through
uucp, prefix the system name and an exclamation
mark (!) to the User parameter. The uucp command contains addi-
tional information about addressing remote systems.
Note: In order to use the remote mail function, uucp must be com-
pletely configured.
Flags
-dDirectoryPath Saves mail in the named directory instead of the
default directory, /var/mail. Cannot be specified with the
-fFile flag.
-e Does not display any messages. This flag causes the bellmail
command to return an exit value of 0 if the user has mail, an
exit value of 1 if there is no mail.
-fFile Saves mail in the named File parameter instead of in the
default mail file, $HOME/mbox. Cannot be specified with the
-dDirectoryPath flag.
-p Displays mail without prompting for a disposition code. This
flag does not delete, copy, or forward any messages.
-q Causes the bellmail command to exit when you press INTERRUPT
(Ctrl - C). Normally, pressing INTERRUPT (Ctrl - C)
stops only the message being displayed. (In this case, the next
message sometimes is not displayed until you enter the p subcom-
mand.)
-r Displays mail in first-in, first-out order.
-t Prefixes each message with the names of all recipients of the
mail. (Normally, only the individual recipient's name displays
as addressee.)
Usually, the User parameter is a name recognized by the login
command. If the system does not recognize one or more of the
specified User parameters or if the bellmail command is inter-
rupted during input, the bellmail command saves the message in
the $HOME/dead.letter file to allow for editing and resending.
Subcommands
The following subcommands control message disposition:
+ Displays the next mail message (the same as pressing the Enter
key).
- Displays the previous message.
!Command Runs the specified AIX command.
* Displays a subcommand summary.
d Deletes the current message and displays the next message.
m User Forwards the message to the named User parameter.
p Displays the current message again.
q Writes any mail not yet deleted to the /var/mail/UserID
file and exits. Pressing END OF FILE (Ctrl-D) has the same ef-
fect.
s [File] Saves the message in the named File parameter instead of
in the default mail file, $HOME/mbox.
w [File] Saves the message, without its postmark, in the specified
File parameter instead of in the default mail file $HOME/mbox.
x Writes all mail unchanged to /var/mail/UserID and exits.
Examples
1. To send mail to other users, enter:
bellmail tom rachel
Don't forget the meeting tomorrow at 9:30 a.m.
Press Ctrl-D at the end of the message. In this example, the
system mails the message to users tom and rachel.
2. To send a file to another user, enter:
bellmail lance <proposal
In this example, the file proposal is sent to user lance.
3. To display your mail, enter:
bellmail
After the most recent message is displayed, a ? (question mark)
indicates that the bellmail command is waiting for one of the
bellmail subcommands. Enter help or an *
(asterisk) to list the subcommands available.
4. To save a message or a file to the default mail file, enter:
bellmail
This command displays each message mailed to you. Press the
Enter key after the ? prompt until the desired file is displayed.
When the appropriate file is displayed, enter:
s
In this example, the file is saved in the default mail file,
$HOME/mbox.
5. To save a message or a file to a specific file, enter:
bellmail
This command displays each message mailed to you. Press the
Enter key after the ? prompt until the desired file is displayed.
When the appropriate file is displayed, enter:
s mycopy
In this example, the file is saved in a file named mycopy, in-
stead of in the default mail file.
Implementation Specifics
This command is part of the Base Operating System (BOS) Runtime
of AIX for RISC System/6000.
Files
$HOME/dead.letter Unmailable text
$HOME/mbox Your personal mailbox
/var/mail/*.lock Lock for mail directory
/var/mail/UserID Default system mailbox for UserID
/usr/bin/bellmail Bellmail program.
Suggested Reading
Prerequisite Information
Glossary Terms: edit, mail, message, parameter, remote sys-
tem
Mail Overview.
Related Information
The mail command, uucp command.
Using Mailboxes and Mail Folders.
Editors Overview.
9
from command
Purpose
To determine whom mail is from.
Syntax
from [ -s Sender] [User]
Description
The from command displays the message headings in your mailbox
file to show you whom mail is from. If you specify User, the
User mailbox is examined instead of your own
(provided that you have read permission to User's mailbox).
Flags
-s Sender Prints message headers only for mail sent by Sender.
Examples
1. To display the message headings in your mailbox, enter:
from
The names of the senders and message dates are displayed.
2. To display the message headings for mail sent by a specific
user, enter:
from -s dale
In this example, only the message headings of the messages sent
from user dale are displayed.
3. To display the message headings in a specific user's mailbox,
enter:
from dawn
In this example, the message headings from user dawn's mailbox
are displayed (provided that you have read permission to user
Dawn's mailbox).
Implementation Specifics
This command is part of the Base Operating System (BOS) Runtime
of AIX for RISC System/6000.
Files
/var/mail/* System mailboxes for all users
/usr/bin/from User mailbox files
Suggested Reading
Prerequisite Information
Glossary Terms: file, mail, mailbox, message.
Mail Overview.
Related Information
The mail command.
9
trcupdate Command
Purpose
Adds, replaces, or deletes trace report format templates.
Syntax
trcupdate [ -o] [ -tFile] [ -v] [ -xIDList]
Description
The trcupdate command adds, replaces, or deletes trace report
format templates in /etc/trcfmt. The trcupdate command creates
an undo file in the current directory named File.undo.trc.
The trcupdate command adds the extension .trc to the file name
and reads update commands from that file. The undo file is input
to the trcupdate command if the -o (override) flag is specified.
When the -o flag is specified, the trcupdate command undoes the
changes previously made to the file.
The first field of each template contains an operator:
+ To add or replace a template. The field that follows this
operator contains the template to be replaced.
- To delete a template. The second field after this operator con-
tains the hook ID of the template to delete. Delete operations
are performed before add, or replace operations.
A sample trace file:
* /etc/trcfmt
+ 15A 1.0 new_fmt
- 1B3
- A14
When adding or replacing, the trcupdate command compares the ver-
sion numbers of each input template with the version number of
the template with the same hook ID. If the version number of the
input template is later than the version of the existing tem-
plate, the trcupdate command replaces the old template with the
input template. If a template does not exist, then the input
template is added to the file.
The trcupdate command will not modify the /etc/trcfmt file if it
detects a syntax error in the update file.
Flags
-o Overrides the old template with the input template without ver-
ifying the version number of either template.
-t File Specifies a file, instead of /etc/trcfmt, to be used as
the template file.
-v Prints the file names as each file is opened.
-x IDList Extracts the templates specified in the IDList from the
template file and writes them to standard output. The IDList
parameter lists the hook IDs.
Security
Access Control: Only the root user can run this command.
Examples
1. To add a template, enter:
trcupdate
* /etc/trcfmt
+ 15A 1.0 new_fmt
2. To delete a template, enter:
trcupdate
* /etc/trcfmt
- 15A 1.0 new_fmt
3. To replace a template, enter:
trcupdate
* /etc/trcfmt
+ 15A 1.0 new_fmt
File
/etc/trcfmt Trace format file.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Prerequisite Information
The Trace Facility Overview.
The following glossary entries: ID, current directory, delete,
directory, field, file, filename, flag, format, hook ID,
operator, output, parameter, syntax error, syntax, template,
trace.
Related Information
The trace daemon.
The trcdead command, trcrpt command.
The Trace Facility Overview.
9
tar Command
Purpose
Manipulates archives.
Syntax
tar { -c | -r | -t | -u | -x} [ -b Blocks] [ -B] [ -C Direc-
tory ] [ -d] [ -F] [ -h] [ -i] [ -L InputList] [ -l] [
-m] [ -N Blocks] [ -p] [ -s] [ -v] [ -w] [-Number] [ -f
Archive] [ -S Blocksb | -S Feet |
-S Feet @ Density] [File ... | Directory ...]
Description
The tar command writes files to, or retrieves files from an ar-
chive storage medium. The files used by the tar command are
represented by the File parameter. The tar command looks for ar-
chives on the default device (usually tape), unless you specify
another device with the -f flag. If you use a relative path
when specifying the File parameter, the path name must not be
more the 256 characters, and file names within the path name must
not be longer than 100 characters and must not contain blanks.
When writing to an archive, the tar command uses a temporary file
(the /tmp/tar* file) and maintains in memory a table of files
with several links. You receive an error message if the tar com-
mand cannot create the temporary file or if there is not enough
memory available to hold the link tables.
Notes:
1. When the storage device is an ordinary file or a block special
file, the -u and -r flags backspace. However, raw magnetic
tape devices do not support backspacing. So when the storage
device is a raw magnetic tape, the -u and -r flags rewind the
tape, open it, and then read it again.
2. Records are one block long on block magnetic tape, but they are
typically less than half as dense on raw magnetic tape. As a
result, although a blocked raw tape must be read twice, the total
amount of tape motion is less than when reading one-block records
from a block magnetic tape once.
3. The structure of a streaming tape device does not support the
addition of information at the end of a tape. Consequently when
the storage device is a streaming tape, the -u and -r flags are
not valid options. An attempt to use these flags results in the
following error message:
tar: Update and Replace options not valid for a
streaming tape drive.
4. There is no way to ask for any occurrence of a file other than
the last.
5. There is no recovery from tape errors.
6. The transfer of data from a RISC System/6000 to an RT via 150
MB 1/4-inch cartridge tape requires tape error detection to be
set to CRC rather than ECC before the data is written on the
tape. Tape error detection can be modified through smit using
the following path: <devices> <tape drive> <change/show charac-
teristics of a tape drive> <150 MB 1/4-inch tape drive> <enable
ecc> <set to no>.
For more information on using tape devices see the rmt special
file.
Flags
You must supply one of the following five function flags to con-
trol the actions of the tar command:
-c Creates a new archive and writes the File parameter at the be-
ginning of the archive.
-r Writes the File parameter at the end of the archive. Since the
structure of a streaming tape device does not support the addi-
tion of information at the end of a tape, this option is not a
valid flag when the archived storage device is a streaming tape.
-t Lists the files in the order in which they appear in the ar-
chive. Files can be listed more than once.
-u Adds the File parameter to the end of the archive only if it is
not in the archive already or if it has been modified since being
written to the archive. Since the structure of a streaming tape
device does not support the addition of information at the end of
a tape, this is not a valid flag when the archived storage device
is a streaming tape.
-x Extracts the File parameter from the archive. If you specify
the Directory parameter, the tar command extracts all files in
that directory from the archive. If you do not specify the File
or Directory parameters, the tar command extracts all of the
files from the archive. When an archive contains multiple copies
of the same file, the tar command extracts only the last one and
overwrites all earlier ones. If you are a user with root user
authority, the tar command creates all files and directories with
the same user and group IDs as on the tape. If you do not have
root user authority, the files and directories have your user and
group IDs.
The other optional flags to the tar command are listed as fol-
lows. Except where otherwise described, a Directory parameter
refers to all the files and subdirectories, recursively, within
that directory. Flags without corresponding parameters can ap-
pear separately or be grouped together. Flags that take parame-
ters can have them adjacent to the flag letter or as the entire
following argument.
-B Forces input and output blocking to 20 blocks per record. With
this option, the tar command can work across communications chan-
nels where blocking may not be maintained.
-b Blocks Specifies the number of 512-byte blocks per record.
Both the default and the maximum is 20, which is appropriate for
tape records. Due to the size of inter-record gaps, tapes writ-
ten with large blocking factors can hold much more data than
tapes with only one block per record.
The block size is determined automatically when tapes are read
(the -x or -t function flags). When archives are updated with
the -u and -r functions, the existing record size is used. The
tar command writes archives using the specified value of the
Blocks parameter only when creating new archives
with the -c flag.
For output to ordinary files with the -f flag, you can save disk
space by using a blocking factor that matches the size of disk
blocks (for example, the -b4 flag for 2048-byte disk blocks).
Ordinary files must be read using the same blocking factor used
when they are created.
-C Directory If a file name is preceded by the -C Directory flag,
the tar command performs a chdir subroutine to that file name.
This allows multiple directories not related by a close common
parent to be archived, using short relative path names. For ex-
ample, to archive files from the /usr/include and /etc
directories, you might use the following command: tar
c -C /usr/include File1 File2 -C /etc File3 File4 This command
should refer only to absolute path names, which requires that
users list each individual file after the -C flag.
-d Makes separate entries for directories, blocks and character
special files, and first-in-first-out (FIFO) piped processes.
Normally, the tar command writes only ordinary files to an ar-
chive and extracts only ordinary files and the directories re-
quired to contain them as determined by the path names in the ar-
chive. When writing to an archive with the -d flag, the tar com-
mand makes it possible to preserve the directory permission codes
and to restore empty directories, special files, and first-in-
first-out (FIFO) piped processes with the -x flag.
Note: Although anyone can archive special files, only a user with
root user authority can extract them from an archive.
-F Checks the file type before archiving. Source Code Control
Systems (SCCS), Revision Control Systems (RCS), files named core,
errs, a.out, and files ending in .o (dot o) are not archived.
-f Archive Uses the Archive parameter as the archive to be read or
written. When this flag is not specified, the tar command uses a
system-dependent default file name of the form /dev/rmt0. If the
Archive parameter specified is - (minus), the tar command writes
to standard output or reads from standard input. If you write to
standard output, the -c flag must be used.
-h Forces the tar command to follow symbolic links as if they were
normal files or directories. Normally, the tar command does not
follow symbolic links.
-i Ignores header checksum errors. The tar command writes a file
header containing a checksum for each file in the archive. When
this flag is not specified, the system verifies the contents of
the header blocks by recomputing the checksum and stops with a
directory checksum error when a mismatch occurs. When this flag
is specified, the tar command logs the error and then scans for-
ward until it finds a valid header block. This permits restoring
files from later volumes of a multi-volume archive without read-
ing earlier volumes.
-L InputList Writes the files listed in the InputList parameter to
the archive. The InputList parameter should contain one file
name per line. Files and directories from the InputList parame-
ter are treated recursively. If you include the name of a direc-
tory in the InputList parameter, the tar command writes the
directory to the archive as well as the files and subdirectories
to the archive. If you also list files or directories on the
command line, the contents of the InputList parameter are includ-
ed after the tar command has written all the files or the direc-
tories and their subdirectories to the archive.
-l Writes error messages to standard output if the tar command
cannot resolve all of the links to the archived files. When you
do not specify this flag, the system does not display these mes-
sages.
-m Uses the time of extraction as the modification time. The de-
fault is to preserve the modification time of the files.
-N Blocks Allows the tar command to use very large clusters of
blocks when it deals with streaming tape archives. Note however,
that on input, the tar command cannot automatically determine the
block size of tapes with very long block sizes created with this
flag. In the absence of a -N Blocks flag, the largest block size
that the tar command can automatically determine is 20 blocks.
-p Says to restore fields to their original modes, ignoring the
present umask. The setuid permissions and sticky information are
also restored to the user with root user authority.
-s Tries to create a symbolic link If the tar command is unsuc-
cessful in its attempt to link (regular link) two files with the
-s flag.
-S Blocksb, -S Feet, -S Feet @Density Specifies the number of 512-
byte blocks per volume (first format), independent of the tape
blocking factor. You can also specify the size of the tape in
feet by using the second form, in which case the tar command as-
sumes a default Density parameter. The third form allows you to
specify both tape length and density. Feet are assumed to be 11
inches long to be conservative. This flag lets you deal more
easily with multi-volume tape archives, where the tar command
must be able to determine how many blocks fit on each volume.
Note: Tape drives vary in density capabilities. The Density
parameter calculates the amount of data a system can fit on a
tape.
-v Lists the name of each file as it is processed. With the -t
flag, -v gives more information about the tape entries, including
file sizes, times of last modification, User Number (UID), Group
Number (GID), and permissions.
-w Displays the action to be taken, followed by the file name, and
then waits for user confirmation. If the response begins with a
y or Y, the action is performed. If the
response is not affirmative, the file is ignored.
-Number Uses the /dev/rmt number file instead of the default. For
example, the -2 flag is the same as -f/dev/rmt2 file. In AIX
systems with multi-density tape drive this flag allows select-
ing a particular density.
Examples
1. To write the file1 and file2 files to a new archive on the de-
fault tape drive, enter:
tar -c file1 file2
2. To extract all files in the /tmp directory from the archive
file on the /dev/rmt2 tape device and use the time of extraction
as the modification time, enter:
tar -xm -f/dev/rmt2 /tmp
3. To create a new archive file that contains the file1 file and
pass the archive file to the dd command to be written to
the /dev/rmt1 device, enter:
tar -cvf - file1 | dd of=/dev/rmt1
4. To display the names of the files in the out.tar disk archive
file on the current directory, enter:
tar -vtf out.tar
5. To expand the fil.tar.z compressed archive file, to pass the
file to the tar command, and extract all files from the expanded
archive file, enter:
cat fil.tar.z | tar -xvf -
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Japanese Language Support Information
An affirmative response in Japanese Language Support matches one
of the elements in the YESSTR environment variable.
Files
/dev/rmt0 Default tape device.
/bin/tar The tar command.
/usr/bin/tar Symbolic link to the tar command.
/tmp/tar* Temporary file.
Suggested Reading
Prerequisite Information
The following glossary entries: block special file, streaming
tape drive, pipe, . (dot), symbolic link, checksum, umask,
setuid permissions, user number (UID).
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
The Directories Overview explains working with directories and
path names.
The Files Overview provides information on working with files.
Related Information
The dd command, cat command.
The rmt special file.
The File Systems Overview explains file system types, manage-
ment, structure, and maintenance.
The Directories Overview explains working with directories and
path names.
The Files Overview provides information on working with files.
9
4014 Command
Purpose
Formats a full-page, 66-line screen display for a Tektronix 4014
workstation.
Syntax
4014 [ -t | -c Number | -n ] [ -p Number [ I | i ] ] [ File ]
Description
The 4014 command reads File (standard input by default) and
writes a 66-line page display to standard output. It also
divides the screen into a specified number of columns, adding an
eight-space page offset when it uses the default single-column
format. It interprets tabs, spaces, backspaces, and TELETYPE
Model 37 half-line and reverse-line sequences correctly. At the
end of each page, the 4014 command waits for a line feed from the
keyboard before continuing. While the 4014 command is waiting,
you can send commands to the shell by entering !AIX-Cmd, where
AIX-Cmd is an AIX for RISC System/6000 command.
Flags
-cNumber Divides the screen into Number columns and waits after
the last column. The default is a single, full page-width
column.
-n Starts displaying at the current cursor position and does not
erase the screen.
-pNumber Sets page length to Number lines (l, the default) or to
Number inches (i).
-t Does not wait between pages.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
File
/etc/passwd Password file.
Suggested Reading
Prerequisite Information
Glossary Terms: standard input, standard output, workstation.
Related Information
The pr command, tc command, troff command.
9
hconutil Command
Purpose
Starts the HCON Utility Program.
Syntax
hconutil [ -c ColorInputFile ] [ -k KeyboardInputFile ] [
-C ColorOutputFile ] [
-K KeyboardOutputFile ]
Description
The hconutil command starts the HCON Utility Program, which al-
lows users to perform various productivity functions. Users can
redefine the HCON color and keyboard definition tables, perform
explicit file transfer requests, logon to and logoff of active
HCON sessions, and add, modify, or display AUTOLOG scripts using
the genprof command.
The hconutil command can be invoked from the command line or by
using the HCONUTIL key from within the HCON emulator. If the
utility is invoked from the emulator, it uses the color and key-
board files defined in the session profile as the input and out-
put files. When invoked from the command line, the utility uses
the definition files specified by the -c, -C, -k, and -K flags.
The system prompts the user for all other information needed to
perform file transfer requests, logon to or logoff of active HCON
sessions, and add, modify, or display AUTOLOG scripts.
Flags
-c ColorInputFile Names the valid color definition file to be used
as input for the utility. If an input file is not specified,
then the default file /usr/lib/hcon/e789_ctbl is used.
-k KeyboardInputFile Names the valid keyboard definition file to
be used as input for the utility. If an input file is not speci-
fied, then the default file /usr/lib/hcon/e789_ktbl is used.
-C ColorOutputFile Names the color definition output file. If an
output file is not specified, the new color table is stored in
the $HOME/e789_ctbl file.
-K KeyboardOutputFile Names the keyboard definition output file.
If an output file is not specified, the new keyboard table is
stored in the $HOME/e789_ktbl file.
Note: If the utility is invoked from within the HCON emulator, it
uses the color and keyboard files defined in the session profile
as the input and output files.
Examples
1. To start the HCON utility from the command line, enter:
hconutil
The HCON Utility Program is started with the default tables for
color and keyboard definitions.
2. To use a different keyboard table with the HCON Utility Pro-
gram, enter:
hconutil -k /u/kaye/keyboard1 -K /u/kaye/keyboard2
The utility reads the /u/kaye/keyboard1 file for the original
keyboard settings and writes the new settings to the
/u/kaye/keyboard2 file.
Implementation Specifics
This command is part of IBM AIX 3270 Host Connection Program/6000
(HCON).
Files
/usr/bin directory Contains the hconutil command.
/usr/lib/hcon directory Contains HCON files.
/usr/lib/hcon/ e789_ctbl file Contains the default binary color
definition table.
/usr/lib/hcon/ e789_ktbl file Contains the default binary keyboard
definition table.
Suggested Reading
Prerequisite Information
Glossary Terms: emulator, HCON.
Using the HCON Utility Program describes the HCON utility
screens and function keys and discusses the uses of the utility
program.
Related Information
The e789 command initiates display and printer emulation ses-
sions. Use the fxfer command to perform file transfers. Use
the genprof command to add, modify, or display AUTOLOG scripts.
The tlog command tests AUTOLOG scripts.
Understanding HCON File Transfers discusses the fxfer command
and file transfer procedures.
Customizing HCON Color and Keyboard Tables provides information
about using the hconutil command for color and keyboard customi-
zation.
Understanding HCON Host Logon Procedures outlines automatic and
manual logon procedures.
9
tic Command
Purpose
Translates the terminfo files from source to compiled format.
Syntax
tic
Description
The tic command translates the terminfo files from the source
format into the compiled format. The tic command places the
results in the /usr/lib/terminfo directory. If the TERMINFO en-
vironment variable is set, the results are placed there instead
of in /usr/lib/terminfo directory.
The tic command compiles all terminfo descriptions in Files.
When the tic command finds a use= field, it searches first the
current file, then the. /terminfo.src master file.
The total compiled entries cannot exceed 4096 bytes and the name
field cannot exceed 128 bytes.
Flag
-vNumber Writes trace information on the progress of the tic com-
mand. Number is an integer that increases the level of
the verbosity.
File
/usr/lib/terminfo/?/* Compiled terminal capability database.
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Suggested Reading
Related Information
The curses subroutine library.
The terminfo file.
9
cut Command
Purpose
Writes out selected fields from each line of a file.
Syntax
cut { -cList | -fList [ -s -dCharacter ]} [File ...]
Description
The cut command cuts columns from a table or fields from each
line of a file, and writes these columns or fields to standard
output. If you do not specify a file name, the cut command reads
standard input.
You must specify either the -c or -f flag. The List parameter
is a comma-separated and/or minus-separated list of integer field
numbers (in increasing order). The minus separator indicates
ranges. Some sample List parameters are 1,4,7; 1-3,8; -5,10
(short for 1-5,10); and 3- (short for third through last
field). The fields specified by the List parameter can be a
fixed number of character positions, or the length can vary from
line to line and be marked with a field delimiter character, such
as a tab character.
You can also use the grep command to make horizontal cuts
through a file and the paste command to put the files back to-
gether. To change the order of columns in a file use the cut and
the paste commands.
Flags
-cList Specifies character positions. For example, if you specify
-c1-72, the cut command writes out the first 72 characters in
each line of the file. Note that there is no space between -c
and the List parameter.
-dCharacter Uses the character specified by the Character parame-
ter as the field delimiter when you specify the -f flag. You
must put quotation marks around characters with special meaning
to the shell, such as the space character.
-fList Specifies a list of fields assumed to be separated in the
file by a delimiter character, which is by default the tab char-
acter. For example, if you specify -f1,7, the cut command writes
out only the first and seventh fields of each line. If a line
contains no field delimiters, the cut command passes them through
intact (useful for table subheadings), unless you specify the -s
flag.
-s Suppresses lines that do not contain delimiter characters (use
only with the -f flag).
Example
To display several fields of each line of a file:
cut -f1,5 -d: /etc/passwd
This displays the login name and full user name fields of the
system password file. These are the first and fifth fields
(-f1,5) separated by colons (-d:).
For example, if the /etc/passwd file looks like this:
su:*:0:0:User with special privileges:/:/bin/sh
daemon:*:1:1::/etc:
bin:*:2:2::/bin:
sys:*:3:3::/usr/src:
adm:*:4:4:System Administrator:/usr/adm:/bin/sh
pierre:*:200:200:Pierre Harper:/u/pierre:/bin/sh
joan:*:202:200:Joan Brown:/u/joan:/bin/sh
the cut command produces:
su:User with special privileges
daemon:
bin:
sys:
adm:System Administrator
pierre:Pierre Harper
joan:Joan Brown
Implementation Specifics
Japanese Language Support Information: Character can either be
any ASCII character, or any SJIS character.
This command is part of AIX Base Operating System (BOS) Runtime.
File
/bin/cut cut command.
Suggested Reading
Prerequisite Information
The following glossary entries: standard input, standard out-
put, and shell.
Files Overview describes what files are and how they are stored
by the operating system.
The Input and Output Overview describes how to redirect input
and output.
Related Information
The grep command, paste command, and sh command.
9
logname Command
Purpose
Displays login name.
Syntax
logname
Description
The logname command will dsplay the login name of the current
process. This is the same name that the user used login with and
corresponds to the LOGNAME in the system state environment. This
variable is only set when the user logs into the system.
The logname command will fail if the specified user does not ex-
ist or if it cannot read the user or group information.
Security
Installation:
Access Control: This program is installed as a normal user pro-
gram in the Trusted Computing Base..
Example
To display your login name to standard output, type:
logname
Implementation Specifics
This command is part of AIX Base Operating System (BOS) Runtime.
Files
/etc/profile System profile.
/bin/logname logname command.
Suggested Reading
Prerequisite Information
The following glossary entry: standard output.
Related Information
The getty command, the login command, the setgroups command,
the setsenv command, the su command, and the tsm command.
9
mksnmppw Command
Purpose
Produces a binary encrypted object file for use by the SNMP agent
daemon.
Syntax
mksnmppw File
Description
The mksnmppw command processes the records in the file specified
by the File parameter to produce a binary encrypted object file
for use by the SNMP agent daemon. The output file is always
named /etc/snmpd.pw.
The smpl.pwinput file provides a sample input file to the
mksnmppw command. The purpose of encryption is
to permit a single host to administer the creation and network
distribution of the /etc/snmpd.pw file to one or more agent
hosts.
Note: For further information, see RFC 1098, which defines the
SNMP protocol for creating requests for MIB information and for-
matting responses.
Parameter
File Specifies the source file that contains the information to be
encrypted.
Implementation Specifics
This command is part of Simple Network Management Protocol Agent
Applications in Network Support Facilities in AIX Base Operating
System (BOS) Runtime.
Files
/usr/lpp/snmpd/smpl.pwinput Sample input file shipped with the
SNMP agent daemon
/etc/snmpd.pw Encrypted binary resource file.
Suggested Reading
Prerequisite Information
Understanding the Simple Network Management Protocol (SNMP),
Understanding the SNMP Daemon.
xgmon Overview for Programmers.
Related Information
The snmpd command.
The smpl.pwinput file.
10
bootparamd Daemon
Purpose
Provides information necessary for booting to diskless clients.
Syntax
/usr/etc/rpc.bootparamd [ -d ]
Description
The bootparamd daemon is a server process that provides informa-
tion necessary for booting to diskless clients. It consults ei-
ther the bootparams database or the /etc/bootparams file if the
NIS service is not running.
Flags
-d Displays the debugging information.
Implementation Specifics
This daemon is part of NFS in Network Support Facilities in Base
Operating System Runtime.
File
/etc/bootparams Contains the list of client entries that diskless
clients use for booting.
Suggested Reading
Prerequisite Information
Glossary Terms: client, server.
For more information about NFS, see Network File System (NFS)
Overview for System Management.
Related Information
Alphabetical List of NFS and NIS Daemons and Commands, Func-
tional List of NFS and NIS Daemons and Commands.