fsconfig – configuring a file server|
service name |
filsys name device
copydev from–dev to–dev
When an fs(4) file server's configuration has not been set, or
by explicit request early in the server's initialization (see
fs(8)), the server enters `config mode'. The commands described
here apply only in that mode. They establish configuration constants
that are typically valid for the life of the server, and therefore
need be run only once. If the non–volatile RAM on the server gets
erased, it will be necessary to recreate the configuration.|
The configuration information is stored in block zero on a device whose device string is written in non–volatile RAM. The config and nvram commands identify the device on which the information is recorded. The config command also erases any previous configuration.
The filsys command configures a file system on device and calls it name. Name is used as the specifier in attach messages to connect to that file system. (The file system main is the one attached to if the specifier is null; see attach(5)).
The rest of the configuration commands record IP addresses: the
file server's address (ip), the local gateway's (ipgw), the local
authentication server's (ipauth), the local subnet mask (ipmask),
and the address of a system running an SNTP server (ipsntp). Ipauth
is no longer used. If the server has more than one
network interface, a digit may be appended to the keywords ip,
ipgw and ipmask to indicate the interface number; zero is the
The ream command initializes the named file system. It overwrites any previous file system on the same device and creates an empty root directory on the device. If name is main, the file server, until the next reboot, will accept wstat messages (see stat(5)) that change the owner and group of files, to enable initializing a fresh file system from a mkfs(8) archive.
For the recover command, the named file system must be a cached WORM. Recover clears the associated magnetic cache and initializes the file system, effectively resetting its contents to the last dump.
Allow turns off all permission checking; use with caution.
Readonly disables all writing to all devices. This is useful for trying dangerous experiments.
Noauth disables authentication.
Noattach prevents attachs.
Copyworm will copy a file system named main to one named output, block by block, and loop. It knows how to read a fake worm file system.
Copydev will copy the device from–dev to the device to–dev. block by block, and panic.
Halt will cause the server to immediately exit and reboot.
The various configuration commands only record what to do; they
write no data to disk. The command end exits config mode and begins
running the file server proper. The server will then perform whatever
I/O is required to establish the configuration.
Initialize a file server kgbsun with a single file system interleaved
between SCSI targets 3 and 4.|
Ken Thompson, ``The Plan 9 File Server''.|