Freebsd in A Nutshell
Freebsd in A Nutshell
Welcome to FreeBSD! This handbook covers the installation and day to day use of FreeBSD Release 3.2. This
manual is a work in progress and is the work of many individuals. Many sections do not yet exist and some of those
that do exist need to be updated. If you are interested in helping with this project, send email to the FreeBSD
documentation project mailing list <[email protected]>. The latest version of this document is always
available from the FreeBSD World Wide Web server (http://www.FreeBSD.org/). It may also be downloaded in a
variety of formats and compression options from the FreeBSD FTP server (ftp://ftp.FreeBSD.org/pub/FreeBSD/doc)
or one of the numerous mirror sites. You may also want to Search the Handbook
(http://www.FreeBSD.org/search.html).
Redistribution and use in source (SGML DocBook) and compiled forms (SGML, HTML, PDF, PostScript, RTF and so forth) with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code (SGML DocBook) must retain the above copyright notice, this list of conditions
and the following disclaimer as the first lines of this file unmodified.
2. Redistributions in compiled form (transformed to other DTDs, converted to PDF, PostScript, RTF and other
formats) must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
Important: THIS DOCUMENTATION IS PROVIDED BY THE FREEBSD DOCUMENTATION PROJECT "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE FREEBSD DOCUMENTATION PROJECT BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Table of Contents
I. Getting Started .....................................................................................................................................24
1. Introduction..................................................................................................................................25
FreeBSD in a Nutshell............................................................................................................25
A Brief History of FreeBSD...................................................................................................27
FreeBSD Project Goals...........................................................................................................29
The FreeBSD Development Model ........................................................................................29
About the Current Release......................................................................................................31
2. Installing FreeBSD ......................................................................................................................34
Supported Configurations.......................................................................................................36
Disk Controllers ............................................................................................................36
Ethernet cards................................................................................................................39
Miscellaneous devices ..................................................................................................41
Preparing for the Installation ..................................................................................................42
Before installing from CDROM ...................................................................................42
Before installing from Floppy.......................................................................................43
Before installing from a MS-DOS partition..................................................................44
Before installing from QIC/SCSI Tape.........................................................................44
Before installing over a network...................................................................................44
Preparing for NFS installation.............................................................................46
Preparing for FTP Installation.............................................................................46
Installing FreeBSD .................................................................................................................47
MS-DOS Users Questions and Answers ...............................................................................48
3. Unix Basics ..................................................................................................................................50
The Online Manual.................................................................................................................50
GNU Info Files .......................................................................................................................51
4. Installing Applications: The Ports collection ..............................................................................52
Why Have a Ports Collection?................................................................................................52
How Does the Ports Collection Work?...................................................................................53
Getting a FreeBSD Port..........................................................................................................55
Compiling ports from CDROM ....................................................................................55
Compiling ports from the Internet ................................................................................55
Skeletons.................................................................................................................................57
Makefile .....................................................................................................................57
The files directory .....................................................................................................58
The patches directory.................................................................................................58
The pkg directory .........................................................................................................58
What to do when a port does not work...................................................................................59
Some Questions and Answers ................................................................................................59
3
Making a port yourself ...........................................................................................................65
Quick Porting ................................................................................................................65
Writing the Makefile ........................................................................................66
Writing the description files ................................................................................66
COMMENT ....................................................................................................66
DESCR.........................................................................................................67
PLIST.........................................................................................................67
Creating the checksum file ..................................................................................68
Testing the port....................................................................................................68
Checking your port with portlint ...................................................................69
Submitting the port..............................................................................................69
Slow Porting..................................................................................................................69
How things work .................................................................................................70
Getting the original sources.................................................................................71
Modifying the port ..............................................................................................71
Patching ...............................................................................................................72
Configuring..........................................................................................................72
Handling user input .............................................................................................72
Configuring the Makefile ..............................................................................................73
The original source..............................................................................................73
DISTNAME ............................................................................................................73
PKGNAME ..............................................................................................................73
CATEGORIES .......................................................................................................73
MASTER_SITES ...................................................................................................74
PATCHFILES .......................................................................................................75
MAINTAINER .......................................................................................................75
Dependencies ......................................................................................................75
LIB_DEPENDS............................................................................................75
RUN_DEPENDS............................................................................................76
BUILD_DEPENDS .......................................................................................77
FETCH_DEPENDS .......................................................................................77
DEPENDS ....................................................................................................77
Common dependency variables .................................................................77
Notes on dependencies ..............................................................................78
Building mechanisms ..........................................................................................78
Special considerations...................................................................................................79
ldconfig ............................................................................................................79
ELF support ..................................................................................................................79
Moving a.out libraries out of the way .................................................................80
Format .................................................................................................................80
4
PORTOBJFORMAT .................................................................................................80
Building shared libraries .....................................................................................80
LIB_DEPENDS .....................................................................................................81
PLIST ..................................................................................................................81
ldconfig ............................................................................................................81
MASTERDIR ...................................................................................................................82
Shared library versions .................................................................................................83
Manpages ......................................................................................................................83
Ports that require Motif.................................................................................................84
REQUIRES_MOTIF ...............................................................................................84
MOTIFLIB ............................................................................................................85
X11 fonts.......................................................................................................................85
Info files ........................................................................................................................85
The pkg/ subdirectory..................................................................................................90
MESSAGE ..............................................................................................................90
INSTALL ..............................................................................................................90
REQ ......................................................................................................................91
Changing PLIST based on make variables .........................................................91
Changing the names of files in the pkg subdirectory..........................................91
Licensing Problems.......................................................................................................92
Upgrading .....................................................................................................................93
Dos and Donts.............................................................................................................93
Strip Binaries.......................................................................................................93
INSTALL_* macros ............................................................................................94
WRKDIR ................................................................................................................94
WRKDIRPREFIX ...................................................................................................94
Differentiating operating systems and OS versions ............................................94
Writing something after bsd.port.mk ..............................................................98
Install additional documentation .........................................................................99
DIST_SUBDIR ...................................................................................................100
Package information..........................................................................................100
RCS strings........................................................................................................101
Recursive diff ....................................................................................................101
PREFIX ..............................................................................................................101
Subdirectories....................................................................................................102
Cleaning up empty directories...........................................................................102
UIDs ..................................................................................................................103
Do things rationally...........................................................................................103
Respect CFLAGS ................................................................................................103
Configuration files .............................................................................................104
5
Portlint...............................................................................................................104
Feedback............................................................................................................104
Miscellanea........................................................................................................104
If you are stuck. . . .............................................................................................104
A Sample Makefile ..................................................................................................104
Automated package list creation.................................................................................106
Package Names ...........................................................................................................107
Categories ...................................................................................................................109
Current list of categories ...................................................................................109
Choosing the right category ..............................................................................112
Changes to this document and the ports system .........................................................112
That is It, Folks!..........................................................................................................112
II. System Administration.....................................................................................................................114
5. Configuring the FreeBSD Kernel...............................................................................................115
Why Build a Custom Kernel?...............................................................................................115
Building and Installing a Custom Kernel .............................................................................115
The Configuration File .........................................................................................................117
Mandatory Keywords..................................................................................................117
General Options ..........................................................................................................119
Filesystem Options .....................................................................................................120
Basic Controllers and Devices ....................................................................................122
SCSI Device Support ..................................................................................................124
Console, Bus Mouse, Keyboard, and X Server Support .............................................126
Serial and Parallel Ports ..............................................................................................127
Networking .................................................................................................................128
Sound cards.................................................................................................................131
Pseudo-devices............................................................................................................133
Joystick, PC Speaker, Miscellaneous..........................................................................134
Making Device Nodes ..........................................................................................................134
If Something Goes Wrong....................................................................................................135
6. Security ......................................................................................................................................138
DES, MD5, and Crypt ..........................................................................................................138
Recognizing your crypt mechanism .........................................................................138
S/Key ....................................................................................................................................139
Secure connection initialization..................................................................................140
Insecure connection initialization ...............................................................................141
Diversion: a login prompt ...........................................................................................141
Generating a single one-time password ......................................................................142
Generating multiple one-time passwords....................................................................143
Restricting use of UNIX passwords............................................................................143
6
Kerberos................................................................................................................................144
Creating the initial database........................................................................................144
Making it all run..........................................................................................................146
Creating the server file ................................................................................................147
Populating the database...............................................................................................148
Testing it all out ..........................................................................................................149
Adding su privileges...................................................................................................150
Using other commands ...............................................................................................152
Firewalls ...............................................................................................................................152
What is a firewall?.......................................................................................................153
Packet filtering routers.......................................................................................153
Proxy servers .....................................................................................................154
What does IPFW allow me to do? ..............................................................................154
Enabling IPFW on FreeBSD.......................................................................................154
Configuring IPFW.......................................................................................................155
Altering the IPFW rules ....................................................................................156
Listing the IPFW rules ......................................................................................159
Flushing the IPFW rules....................................................................................160
Clearing the IPFW packet counters...................................................................160
Example commands for ipfw ......................................................................................160
Building a packet filtering firewall..............................................................................161
7. Printing.......................................................................................................................................163
What the Spooler Does.........................................................................................................163
Why You Should Use the Spooler ........................................................................................163
Setting Up the Spooling System...........................................................................................164
Simple Printer Setup.............................................................................................................164
Hardware Setup...........................................................................................................164
Ports and Cables ................................................................................................165
Parallel Ports......................................................................................................165
Serial Ports ........................................................................................................166
Software Setup ............................................................................................................166
Kernel Configuration.........................................................................................167
Adding /dev Entries for the Ports...........................................................167
Setting the Communication Mode for the Parallel Port...........................168
Checking Printer Communications..........................................................169
Checking a Parallel Printer.............................................................170
Checking a Serial Printer ...............................................................170
Enabling the Spooler: The /etc/printcap File ............................................171
Naming the Printer...................................................................................172
Suppressing Header Pages .......................................................................173
7
Making the Spooling Directory ...............................................................173
Identifying the Printer Device..................................................................175
Configuring Spooler Communication Parameters ...................................175
Installing the Text Filter...........................................................................176
Trying It Out ............................................................................................178
Troubleshooting .......................................................................................178
Using Printers .......................................................................................................................182
Printing Jobs ...............................................................................................................183
Checking Jobs .............................................................................................................183
Removing Jobs............................................................................................................184
Beyond Plain Text: Printing Options ..........................................................................186
Formatting and Conversion Options..................................................................186
Job Handling Options........................................................................................187
Header Page Options .........................................................................................188
Administrating Printers...............................................................................................189
Advanced Printer Setup ........................................................................................................191
Filters ..........................................................................................................................191
How Filters Work ..............................................................................................192
Accommodating Plain Text Jobs on PostScript Printers ...................................195
Simulating PostScript on Non-PostScript Printers............................................196
Conversion Filters .............................................................................................198
Why Install Conversion Filters? ..............................................................198
Which Conversions Filters Should I Install? ...........................................198
Installing Conversion Filters....................................................................199
More Conversion Filter Examples ...........................................................200
Automated Conversion: An Alternative To Conversion Filters...............204
Output Filters.....................................................................................................204
lpf: a Text Filter...............................................................................................205
Header Pages...............................................................................................................205
Enabling Header Pages......................................................................................206
Controlling Header Pages..................................................................................207
Accounting for Header Pages............................................................................208
Header Pages on PostScript Printers .................................................................209
Networked Printing .....................................................................................................212
Printers Installed on Remote Hosts ...................................................................213
Printers with Networked Data Stream Interfaces ..............................................215
Restricting Printer Usage ............................................................................................216
Restricting Multiple Copies ..............................................................................216
Restricting Access To Printers ..........................................................................217
Controlling Sizes of Jobs Submitted .................................................................218
8
Restricting Jobs from Remote Printers..............................................................219
Accounting for Printer Usage .....................................................................................221
Quick and Dirty Printer Accounting .................................................................221
How Can You Count Pages Printed? .................................................................224
Alternatives to the Standard Spooler ....................................................................................224
Acknowledgments ................................................................................................................225
8. Disks ..........................................................................................................................................227
Using sysinstall.....................................................................................................................227
Using command line utilities................................................................................................228
* Using Slices .............................................................................................................228
Dedicated ....................................................................................................................228
* Non-traditional Drives .......................................................................................................228
* Zip Drives ................................................................................................................229
* Jaz Drives.................................................................................................................229
* Sequest Drives..........................................................................................................229
9. Backups......................................................................................................................................230
* What about backups to floppies?.......................................................................................230
Tape Media ...........................................................................................................................230
4mm (DDS: Digital Data Storage)..............................................................................230
8mm (Exabyte)............................................................................................................231
QIC..............................................................................................................................231
* Mini-Cartridge .........................................................................................................232
DLT .............................................................................................................................232
Using a new tape for the first time ..............................................................................232
Backup Programs..................................................................................................................233
Dump and Restore.......................................................................................................233
Tar ...............................................................................................................................233
Cpio.............................................................................................................................234
Pax...............................................................................................................................234
Amanda .......................................................................................................................234
Do nothing ..................................................................................................................234
Which Backup Program is Best? ................................................................................235
Emergency Restore Procedure ....................................................................................235
Before the Disaster ............................................................................................235
After the Disaster ..............................................................................................239
* I did not prepare for the Disaster, What Now?...............................................240
10. Disk Quotas..............................................................................................................................241
Configuring Your System to Enable Disk Quotas ................................................................241
Setting Quota Limits.............................................................................................................242
Checking Quota Limits and Disk Usage ..............................................................................243
9
* Quotas over NFS ...............................................................................................................244
11. The X Window System ............................................................................................................245
12. PC Hardware compatibility......................................................................................................246
Resources on the Internet .....................................................................................................246
Sample Configurations .........................................................................................................246
Jordans Picks..............................................................................................................246
Motherboards ....................................................................................................247
Disk Controllers ................................................................................................247
Disk drives.........................................................................................................248
CDROM drives..................................................................................................248
CD Recordable (WORM) drives .......................................................................248
Tape drives.........................................................................................................248
Video Cards .......................................................................................................249
Monitors ............................................................................................................249
Networking........................................................................................................249
Serial..................................................................................................................250
Audio.................................................................................................................250
Video .................................................................................................................250
Core/Processing....................................................................................................................250
Motherboards, busses, and chipsets ............................................................................251
* ISA .................................................................................................................251
* EISA ...............................................................................................................250
* VLB................................................................................................................251
PCI.....................................................................................................................251
CPUs/FPUs .................................................................................................................252
P6 class (Pentium Pro/Pentium II) ....................................................................252
Pentium class.....................................................................................................252
Clock speeds ............................................................................................253
The AMD K6 Bug ...................................................................................254
* 486 class .........................................................................................................254
* 386 class .........................................................................................................254
286 class ............................................................................................................254
* Memory....................................................................................................................254
* BIOS ........................................................................................................................254
Input/Output Devices............................................................................................................254
* Video cards...............................................................................................................255
* Sound cards..............................................................................................................255
Serial ports and multiport cards ..................................................................................255
The UART: What it is and how it works ...........................................................255
Synchronous Serial Transmission............................................................255
10
Asynchronous Serial Transmission .........................................................256
Other UART Functions ............................................................................257
The RS232-C and V.24 Standards ...........................................................257
RS232-C Bit Assignments (Marks and Spaces) ............................257
RS232-C Break Signal ...................................................................258
RS232-C DTE and DCE Devices ..................................................258
RS232-C Pin Assignments.............................................................259
Bits, Baud and Symbols...........................................................................261
The IBM Personal Computer UART .......................................................262
National Semiconductor UART Family Tree.................................263
The NS16550AF and the PC16550D are the same thing...............264
National Semiconductor Part Numbering System .........................265
Other Vendors and Similar UARTs .........................................................265
8250/16450/16550 Registers ...................................................................268
Beyond the 16550A UART......................................................................269
Configuring the sio driver................................................................................270
Digi International (DigiBoard) PC/8 .......................................................270
Boca 16 ....................................................................................................271
Configuring the cy driver ..................................................................................273
Configuring the si driver ..................................................................................274
* Parallel ports ............................................................................................................275
* Modems....................................................................................................................275
* Network cards ..........................................................................................................275
* Keyboards ................................................................................................................275
* Mice .........................................................................................................................276
* Other ........................................................................................................................276
Storage Devices ....................................................................................................................276
Using ESDI hard disks................................................................................................276
Concepts of ESDI..............................................................................................276
Physical connections................................................................................276
Device addressing ....................................................................................277
Termination..............................................................................................277
Using ESDI disks with FreeBSD ......................................................................277
ESDI speed variants.................................................................................277
Stay on track ............................................................................................277
Hard or soft sectoring ..............................................................................278
Low level formatting................................................................................278
Translations..............................................................................................279
Spare sectoring.........................................................................................279
Bad block handling ..................................................................................280
11
Kernel configuration ................................................................................280
Particulars on ESDI hardware ...........................................................................281
Adaptec 2320 controllers.........................................................................281
Western Digital WD1007 controllers ......................................................281
Ultrastor U14F controllers.......................................................................282
Further reading ..................................................................................................282
Thanks to... ........................................................................................................282
What is SCSI? .............................................................................................................282
Components of SCSI.........................................................................................283
SCSI bus types...................................................................................................284
Single ended buses...................................................................................285
Differential buses .....................................................................................285
Terminators ..............................................................................................286
Terminator power.....................................................................................287
Device addressing ....................................................................................288
Bus layout ................................................................................................288
Using SCSI with FreeBSD................................................................................289
About translations, BIOSes and magic....................................................289
SCSI subsystem design............................................................................290
Kernel configuration ................................................................................291
Tuning your SCSI kernel setup................................................................293
Rogue SCSI devices.................................................................................294
Multiple LUN devices .............................................................................294
Tagged command queueing .....................................................................295
Busmaster host adapters ..........................................................................295
Tracking down problems ...................................................................................296
Further reading ..................................................................................................296
* Disk/tape controllers ................................................................................................298
* SCSI ...............................................................................................................298
* IDE .................................................................................................................298
* Floppy.............................................................................................................298
Hard drives..................................................................................................................298
SCSI hard drives................................................................................................299
Rotational speed.......................................................................................299
Form factor ..............................................................................................300
Interface ...................................................................................................300
* IDE hard drives...............................................................................................300
Tape drives ..................................................................................................................300
General tape access commands .........................................................................301
Controller Interfaces..........................................................................................301
12
SCSI drives........................................................................................................301
4mm (DAT: Digital Audio Tape) .............................................................301
8mm (Exabyte) ........................................................................................302
QIC (Quarter-Inch Cartridge) ..................................................................302
DLT (Digital Linear Tape) .......................................................................302
Mini-Cartridge .........................................................................................302
Autoloaders/Changers..............................................................................302
* IDE drives.......................................................................................................302
Floppy drives .....................................................................................................303
* Parallel port drives..........................................................................................303
Detailed Information .........................................................................................303
Archive Anaconda 2750 ..........................................................................303
Archive Python 28454 .............................................................................304
Archive Python 04687 .............................................................................304
Archive Viper 60......................................................................................304
Archive Viper 150....................................................................................305
Archive Viper 2525..................................................................................305
Conner 420R............................................................................................306
Conner CTMS 3200.................................................................................306
DEC TZ87
(http://www.digital.com/info/Customer-Update/931206004.txt.html)
306
Exabyte EXB-2501
(http://www.Exabyte.COM:80/Products/Minicartridge/2501/Rfeatures.html)
307
Exabyte EXB-8200..................................................................................307
Exabyte EXB-8500..................................................................................308
Exabyte EXB-8505
(http://www.Exabyte.COM:80/Products/8mm/8505XL/Rfeatures.html)
308
Hewlett-Packard HP C1533A ..................................................................308
Hewlett-Packard HP 1534A.....................................................................309
Hewlett-Packard HP C1553A Autoloading DDS2 ..................................310
Hewlett-Packard HP 35450A...................................................................311
Hewlett-Packard HP 35470A...................................................................311
Hewlett-Packard HP 35480A...................................................................312
Sony SDT-5000
(http://www.sel.sony.com/SEL/ccpg/storage/tape/t5000.html)......312
Tandberg TDC 3600 ................................................................................312
Tandberg TDC 3620 ................................................................................313
13
Tandberg TDC 3800 ................................................................................313
Tandberg TDC 4222 ................................................................................313
Wangtek 5525ES......................................................................................314
Wangtek 6200 ..........................................................................................314
* Problem drives................................................................................................314
CD-ROM drives ..........................................................................................................314
* Other ........................................................................................................................315
* Other ..................................................................................................................................315
* PCMCIA ..................................................................................................................315
13. Localization .............................................................................................................................316
Russian Language (KOI8-R encoding) ................................................................................316
Console Setup .............................................................................................................316
Locale Setup................................................................................................................316
Login Class Method ..........................................................................................317
How to do it with vipw(8)........................................................................317
How to do it with adduser(8) ...................................................................317
How to do it with pw(8)...........................................................................318
Shell Startup Files Method................................................................................318
Printer Setup................................................................................................................318
MSDOS FS and Russian file names ...........................................................................318
X Window Setup .........................................................................................................319
German Language (ISO 8859-1) ..........................................................................................320
III. Network Communications..............................................................................................................321
14. Serial Communications............................................................................................................322
Serial Basics .........................................................................................................................322
Terminals ..............................................................................................................................322
Uses and Types of Terminals ......................................................................................323
Dumb Terminals ................................................................................................323
PCs Acting As Terminals ..................................................................................324
X Terminals .......................................................................................................324
Cables and Ports..........................................................................................................324
Cables ................................................................................................................324
Null-modem cables..................................................................................324
Standard RS-232C Cables .......................................................................325
Ports...................................................................................................................325
Kinds of Ports ..........................................................................................325
Port Names...............................................................................................326
Configuration ..............................................................................................................326
Adding an Entry to /etc/ttys ........................................................................327
Specifying the getty Type .............................................................................327
14
Specifying the Default Terminal Type ..............................................................328
Enabling the Port...............................................................................................329
Specifying Secure Ports ....................................................................................329
Force init to Reread /etc/ttys ...................................................................330
Debugging your connection ........................................................................................330
Dialin Service .......................................................................................................................331
Prerequisites................................................................................................................331
FreeBSD Version...............................................................................................332
Terminology ......................................................................................................332
External vs. Internal Modems ...........................................................................332
Modems and Cables ..........................................................................................333
Serial Interface Considerations .........................................................................334
Quick Overview ..........................................................................................................334
Kernel Configuration ..................................................................................................334
Device Special Files....................................................................................................336
Making Device Special Files.............................................................................336
Configuration Files .....................................................................................................337
/etc/gettytab ...............................................................................................337
Locked-Speed Config ..............................................................................338
Matching-Speed Config ...........................................................................338
/etc/ttys .......................................................................................................339
Locked-Speed Config ..............................................................................340
Matching-Speed Config ...........................................................................340
/etc/rc.serial or /etc/rc.local ...........................................................341
Modem Settings ..........................................................................................................341
Locked-speed Config.........................................................................................342
Matching-speed Config .....................................................................................343
Checking the Modems Configuration ..............................................................343
Troubleshooting ..........................................................................................................343
Checking out the FreeBSD system....................................................................343
Try Dialing In ....................................................................................................344
Acknowledgments.......................................................................................................345
Dialout Service .....................................................................................................................345
Why cannot I run tip or cu?......................................................................................345
My stock Hayes modem is not supported, what can I do?..........................................346
How am I expected to enter these AT commands? .....................................................346
The @ sign for the pn capability does not work! .........................................................347
How can I dial a phone number on the command line?..............................................347
Do I have to type in the bps rate every time I do that? ...............................................347
I access a number of hosts through a terminal server. ................................................347
15
Can tip try more than one line for each site? ..............................................................348
Why do I have to hit CTRL+P twice to send CTRL+P once?....................................348
Suddenly everything I type is in UPPER CASE?? .....................................................349
How can I do file transfers with tip?.........................................................................349
How can I run zmodem with tip? .............................................................................349
Setting Up the Serial Console...............................................................................................349
Introduction.................................................................................................................350
6 Steps to Set up the Serial Console ...........................................................................350
Summary .....................................................................................................................354
Case 1: You set the flags to 0x10 for sio0 .........................................................354
Case 2: You set the flags to 0x30 for sio0 .........................................................355
Tips for the Serial Console..........................................................................................355
Setting A Faster Serial Port Speed ....................................................................355
Using Serial Port Other Than sio0 For The Console.......................................355
Entering the DDB Debugger from the Serial Line............................................356
Getting a Login Prompt on the Serial Console .................................................356
Changing Console from the Boot Loader ...................................................................357
Setting Up the Serial Console ...........................................................................357
Using Serial Port Other than sio0 for the Console ..........................................358
Caveats ........................................................................................................................358
15. PPP and SLIP...........................................................................................................................360
Setting up User PPP..............................................................................................................360
Before you start...........................................................................................................360
Building a ppp ready kernel........................................................................................361
Check the tun device ...................................................................................................362
Name Resolution Configuration .................................................................................363
Edit the /etc/host.conf file .........................................................................363
Edit the /etc/hosts(5) file .............................................................................363
Edit the /etc/resolv.conf file.....................................................................364
ppp Configuration.......................................................................................................364
PPP and Static IP addresses ..............................................................................364
PPP and Dynamic IP addresses .........................................................................366
Receiving incoming calls with ppp ...................................................................368
Which getty?............................................................................................368
PPP permissions.......................................................................................368
Setting up a PPP shell for dynamic-IP users ...........................................369
Setting up a PPP shell for static-IP users.................................................370
Setting up ppp.conf for dynamic-IP users ...............................................370
Setting up ppp.conf for static-IP users .................................................370
More on mgetty, AutoPPP, and MS extensions .....................................371
16
mgetty and AutoPPP ....................................................................371
MS extensions ................................................................................372
PAP and CHAP authentication..........................................................................372
Changing your ppp configuration on the fly .....................................................373
Final system configuration..........................................................................................374
Summary .....................................................................................................................375
Acknowledgments.......................................................................................................376
Setting up Kernel PPP ..........................................................................................................376
Working as a PPP client ..............................................................................................377
Working as a PPP server .............................................................................................380
Setting up a SLIP Client .......................................................................................................385
Things you have to do only once ................................................................................385
Making a SLIP connection..........................................................................................387
How to shutdown the connection................................................................................387
Troubleshooting ..........................................................................................................388
Setting up a SLIP Server ......................................................................................................389
Prerequisites................................................................................................................389
Quick Overview ..........................................................................................................390
An Example of a SLIP Server Login.................................................................390
Kernel Configuration ..................................................................................................390
Sliplogin Configuration...............................................................................................391
slip.hosts Configuration ..............................................................................392
slip.login Configuration ..............................................................................393
slip.logout Configuration ............................................................................394
Routing Considerations...............................................................................................395
Static Routes......................................................................................................395
Running gated .................................................................................................395
Acknowledgments.......................................................................................................397
16. Advanced Networking .............................................................................................................398
Gateways and Routes............................................................................................................398
An example .................................................................................................................398
Default routes..............................................................................................................400
Dual homed hosts........................................................................................................401
Routing propagation....................................................................................................401
Troubleshooting ..........................................................................................................402
NFS.......................................................................................................................................402
Diskless Operation................................................................................................................403
Setup Instructions........................................................................................................404
Using Shared / and /usr filesystems ........................................................................406
Compiling netboot for specific setups.........................................................................406
17
ISDN.....................................................................................................................................406
ISDN Cards.................................................................................................................407
ISDN Terminal Adapters ............................................................................................407
Standalone ISDN Bridges/Routers .............................................................................408
17. Electronic Mail ........................................................................................................................411
Basic Information .................................................................................................................411
User program ..............................................................................................................411
Mailhost Server Daemon ............................................................................................411
DNS Name Service ................................................................................................411
POP Servers ................................................................................................................412
Configuration........................................................................................................................412
Basic............................................................................................................................412
Mail for your Domain (Network). ..............................................................................413
Setting up UUCP. ........................................................................................................414
FAQ.......................................................................................................................................417
Why do I have to use the FQDN for hosts on my site? ..............................................417
Sendmail says mail loops back to myself ...................................................................418
How can I do E-Mail with a dialup PPP host?............................................................418
IV. Advanced topics...............................................................................................................................420
18. The Cutting Edge: FreeBSD-current and FreeBSD-stable......................................................421
Staying Current with FreeBSD.............................................................................................421
What is FreeBSD-current?..........................................................................................421
Who needs FreeBSD-current? ....................................................................................421
What is FreeBSD-current not?....................................................................................421
Using FreeBSD-current ..............................................................................................422
Staying Stable with FreeBSD...............................................................................................423
What is FreeBSD-stable?............................................................................................423
Who needs FreeBSD-stable? ......................................................................................424
Using FreeBSD-stable ................................................................................................424
Synchronizing Source Trees over the Internet......................................................................425
Anonymous CVS ........................................................................................................426
Introduction .......................................................................................................426
Using Anonymous CVS ....................................................................................427
Examples ...........................................................................................................429
Other Resources ................................................................................................430
CTM ...........................................................................................................................430
Why should I use CTM?...................................................................................430
What do I need to use CTM?............................................................................431
Starting off with CTM for the first time ...........................................................431
Using CTM in your daily life ...........................................................................432
18
Keeping your local changes ..............................................................................432
Other interesting CTM options.........................................................................433
Finding out exactly what would be touched by an update.......................433
Making backups before updating.............................................................433
Restricting the files touched by an update ...............................................433
Future plans for CTM .......................................................................................434
Miscellaneous stuff............................................................................................434
Thanks!..............................................................................................................434
CVSup ........................................................................................................................435
Introduction .......................................................................................................435
Installation.........................................................................................................435
CVSup Configuration........................................................................................436
Running CVSup................................................................................................442
CVSup File Collections ....................................................................................443
For more information ........................................................................................450
Using make world to rebuild your system .........................................................................450
19. Contributing to FreeBSD .........................................................................................................451
What Is Needed ....................................................................................................................451
High priority tasks.......................................................................................................451
Medium priority tasks .................................................................................................453
Low priority tasks .......................................................................................................454
Smaller tasks ...............................................................................................................454
Work through the PR database....................................................................................455
How to Contribute ................................................................................................................455
Bug reports and general commentary .........................................................................455
Changes to the documentation ....................................................................................456
Changes to existing source code .................................................................................456
New code or major value-added packages..................................................................457
Money, Hardware or Internet access...........................................................................459
Donating funds ..................................................................................................459
Donating hardware ............................................................................................460
Donating Internet access ...................................................................................460
Donors Gallery .....................................................................................................................460
Core Team Alumni ...............................................................................................................463
Derived Software Contributors.............................................................................................464
Additional FreeBSD Contributors ........................................................................................464
386BSD Patch Kit Patch Contributors .................................................................................500
20. Source Tree Guidelines and Policies .......................................................................................505
MAINTAINER on Makefiles...................................................................................................505
Contributed Software............................................................................................................505
19
Encumbered files ..................................................................................................................508
Shared Libraries....................................................................................................................509
21. Adding New Kernel Configuration Options ............................................................................511
Whats a Kernel Option, Anyway? .......................................................................................511
Now What Do I Have to Do for it?.......................................................................................512
22. Kernel Debugging ....................................................................................................................514
Debugging a Kernel Crash Dump with kgdb .......................................................................514
Debugging a crash dump with DDD ....................................................................................517
Post-mortem Analysis of a Dump ........................................................................................518
On-line Kernel Debugging Using DDB ...............................................................................518
On-line Kernel Debugging Using Remote GDB ..................................................................521
Debugging a Console Driver ................................................................................................523
23. Linux Emulation ......................................................................................................................524
How to Install the Linux Emulator .......................................................................................524
Installing Linux Emulation in 2.1-STABLE ...............................................................524
Installing Linux Emulation in 2.2.2-RELEASE and later ..........................................525
Installing Linux Runtime Libraries.............................................................................526
Installing using the linux_base port ..................................................................526
Installing libraries manually..............................................................................526
How to install additional shared libraries..........................................................527
Configuring the ld.so for FreeBSD 2.2-RELEASE and later....................528
Installing Linux ELF binaries .....................................................................................530
Configuring the host name resolver ............................................................................530
Finding the necessary files ..........................................................................................531
How to Install Mathematica on FreeBSD.............................................................................532
Unpacking the Mathematica distribution....................................................................533
Obtaining your Mathematica Password ......................................................................533
Bugs ............................................................................................................................535
Acknowledgments.......................................................................................................535
How does the emulation work? ............................................................................................535
24. FreeBSD Internals....................................................................................................................538
The FreeBSD Booting Process.............................................................................................538
Loading a kernel .........................................................................................................538
Determine the root filesystem .....................................................................................538
Initialize user-land things............................................................................................539
Interesting combinations.............................................................................................539
PC Memory Utilization ........................................................................................................540
DMA: What it Is and How it Works.....................................................................................541
A Sample DMA transfer .............................................................................................542
DMA Page Registers and 16Meg address space limitations.......................................544
20
DMA Operational Modes and Settings.......................................................................545
Programming the DMA ..............................................................................................547
DMA Port Map ...........................................................................................................548
0x000x1f DMA Controller #1 (Channels 0, 1, 2 and 3) .................................548
0xc00xdf DMA Controller #2 (Channels 4, 5, 6 and 7)..................................549
0x800x9f DMA Page Registers.......................................................................550
0x4000x4ff 82374 Enhanced DMA Registers ................................................551
The FreeBSD VM System....................................................................................................555
Management of physical memoryvm_page_t .......................................................555
The unified buffer cachevm_object_t ..................................................................556
Filesystem I/Ostruct buf ...................................................................................556
Mapping Page Tables - vm_map_t, vm_entry_t .........................................................557
KVM Memory Mapping .............................................................................................557
Tuning the FreeBSD VM system................................................................................557
V. Appendices.........................................................................................................................................560
25. Obtaining FreeBSD..................................................................................................................561
CD-ROM Publishers.............................................................................................................561
FTP Sites ..............................................................................................................................561
CTM Sites.............................................................................................................................569
CVSup Sites..........................................................................................................................570
AFS Sites ..............................................................................................................................575
26. Bibliography ............................................................................................................................577
Books & Magazines Specific to FreeBSD............................................................................577
Users Guides .......................................................................................................................577
Administrators Guides ........................................................................................................578
Programmers Guides...........................................................................................................578
Operating System Internals ..................................................................................................579
Security Reference................................................................................................................580
Hardware Reference .............................................................................................................580
UNIX History .......................................................................................................................581
Magazines and Journals........................................................................................................581
27. Resources on the Internet.........................................................................................................583
Mailing lists ..........................................................................................................................583
List summary ..............................................................................................................583
How to subscribe.........................................................................................................585
List charters.................................................................................................................586
Usenet newsgroups ...............................................................................................................593
BSD specific newsgroups ...........................................................................................593
Other Unix newsgroups of interest .............................................................................593
X Window System ......................................................................................................594
21
World Wide Web servers ......................................................................................................594
Email Addresses ...................................................................................................................596
Shell Accounts......................................................................................................................596
28. FreeBSD Project Staff..............................................................................................................597
The FreeBSD Core Team .....................................................................................................597
The FreeBSD Developers .....................................................................................................597
The FreeBSD Documentation Project ..................................................................................602
Who Is Responsible for What...............................................................................................604
29. PGP keys..................................................................................................................................606
Officers .................................................................................................................................606
FreeBSD Security Officer <[email protected]> .........................606
Warner Losh <[email protected]> ..........................................................................606
Core Team members.............................................................................................................607
Satoshi Asami <[email protected]> ...................................................................607
Jonathan M. Bresler <[email protected]> ..............................................................608
Andrey A. Chernov <[email protected]>.............................................................609
Jordan K. Hubbard <[email protected]> ................................................................610
Poul-Henning Kamp <[email protected]> .............................................................611
Rich Murphey <[email protected]> .....................................................................612
John Polstra <[email protected]> ...........................................................................612
Guido van Rooij <[email protected]>................................................................613
Peter Wemm <[email protected]>......................................................................614
Jrg Wunsch <[email protected]>......................................................................615
Developers ............................................................................................................................616
Wolfram Schneider <[email protected]> ...........................................................616
Brian Somers <[email protected]> ....................................................................617
22
List of Examples
16-1. Branch office or Home network .....................................................................................................409
16-2. Head office or other lan..................................................................................................................409
18-1. Checking out something from -current (ls(1)) and deleting it again:.............................................429
18-2. Checking out the version of ls(1) in the 2.2-stable branch: ...........................................................429
18-3. Creating a list of changes (as unidiffs) to ls(1) ..............................................................................429
18-4. Finding out what other module names can be used: ......................................................................430
23
I. Getting Started
Chapter 1. Introduction
FreeBSD is a 4.4BSD-Lite2 based operating system for Intel architecture (x86) and DEC Alpha based
computer systems. For an overview of FreeBSD, see FreeBSD in a nutshell. For a history of the project,
read a brief history of FreeBSD. To see a description of the latest release, read about the current release.
If you are interested in contributing something to the FreeBSD project (code, equipment, sacks of
unmarked bills), please see about contributing to FreeBSD.
FreeBSD in a Nutshell
FreeBSD is a state of the art operating system for computer systems based on both the Intel CPU
architecture, which includes the 386 and 486 and Pentium processors (both SX and DX versions) and the
DEC Alpha architecture. Intel compatible CPUs from AMD to Cyrix are supported as well. FreeBSD
provides you with many advanced features previously available only on much more expensive
computers. These features include:
Preemptive multitasking with dynamic priority adjustment to ensure smooth and fair sharing of the
computer between applications and users.
Multiuser access means that many people can use a FreeBSD system simultaneously for a variety of
things. System peripherals such as printers and tape drives are also properly SHARED BETWEEN
ALL users on the system.
Complete TCP/IP networking including SLIP, PPP, NFS and NIS support. This means that your
FreeBSD machine can inter-operate easily with other systems as well act as an enterprise server,
providing vital functions such as NFS (remote file access) and e-mail services or putting your
organization on the Internet with WWW, ftp, routing and firewall (security) services.
Memory protection ensures that applications (or users) cannot interfere with each other. One
application crashing will not affect others in any way.
FreeBSD is a 32-bit operating system and was designed as such from the ground up.
The industry standard X Window System (X11R6) provides a graphical user interface (GUI) for the
cost of a common VGA card and monitor and comes with full sources.
Binary compatibility with many programs built for SCO, BSDI, NetBSD, Linux and 386BSD.
Hundreds of ready-to-run applications are available from the FreeBSD ports and packages collection.
Why search the net when you can find it all right here?
Thousands of additional and easy-to-port applications available on the Internet. FreeBSD is source
code compatible with most popular commercial Unix systems and thus most applications require few,
25
Chapter 1. Introduction
Internet Services: The robust TCP/IP networking built into FreeBSD makes it an ideal platform for a
variety of Internet services such as:
FTP servers
World Wide Web servers
Gopher servers
Electronic Mail servers
26
Chapter 1. Introduction
USENET News
Bulletin Board Systems
And more...
You can easily start out small with an inexpensive 386 class PC and upgrade as your enterprise grows.
Education: Are you a student of computer science or a related engineering field? There is no better
way of learning about operating systems, computer architecture and networking than the hands on,
under the hood experience that FreeBSD can provide. A number of freely available CAD,
mathematical and graphic design packages also make it highly useful to those whose primary interest
in a computer is to get other work done!
Research: With source code for the entire system available, FreeBSD is an excellent platform for
research in operating systems as well as other branches of computer science. FreeBSDs freely
available nature also makes it possible for remote groups to collaborate on ideas or shared
development without having to worry about special licensing agreements or limitations on what may
be discussed in open forums.
Networking: Need a new router? A name server (DNS)? A firewall to keep people out of your internal
network? FreeBSD can easily turn that unused 386 or 486 PC sitting in the corner into an advanced
router with sophisticated packet filtering capabilities.
X Window workstation: FreeBSD is a fine choice for an inexpensive X terminal solution, either using
the freely available XFree86 server or one of the excellent commercial servers provided by X Inside.
Unlike an X terminal, FreeBSD allows many applications to be run locally, if desired, thus relieving
the burden on a central server. FreeBSD can even boot diskless, making individual workstations
even cheaper and easier to administer.
Software Development: The basic FreeBSD system comes with a full complement of development
tools including the renowned GNU C/C++ compiler and debugger.
FreeBSD is available in both source and binary form on CDROM and via anonymous ftp. See Obtaining
FreeBSD for more details.
27
Chapter 1. Introduction
remember the early working title for the project being 386BSD 0.5 or 386BSD Interim in reference
to that fact.
386BSD was Bill Jolitzs operating system, which had been up to that point suffering rather severely
from almost a years worth of neglect. As the patchkit swelled ever more uncomfortably with each
passing day, we were in unanimous agreement that something had to be done and decided to try and
assist Bill by providing this interim cleanup snapshot. Those plans came to a rude halt when Bill Jolitz
suddenly decided to withdraw his sanction from the project and without any clear indication of what
would be done instead.
It did not take us long to decide that the goal remained worthwhile, even without Bills support, and so
we adopted the name FreeBSD, coined by David Greenman. Our initial objectives were set after
consulting with the systems current users and, once it became clear that the project was on the road to
perhaps even becoming a reality, I contacted Walnut Creek CDROM with an eye towards improving
FreeBSDs distribution channels for those many unfortunates without easy access to the Internet. Walnut
Creek CDROM not only supported the idea of distributing FreeBSD on CD but went so far as to provide
the project with a machine to work on and a fast Internet connection. Without Walnut Creek CDROMs
almost unprecedented degree of faith in what was, at the time, a completely unknown project, it is quite
unlikely that FreeBSD would have gotten as far, as fast, as it has today.
The first CDROM (and general net-wide) distribution was FreeBSD 1.0, released in December of 1993.
This was based on the 4.3BSD-Lite (Net/2) tape from U.C. Berkeley, with many components also
provided by 386BSD and the Free Software Foundation. It was a fairly reasonable success for a first
offering, and we followed it with the highly successful FreeBSD 1.1 release in May of 1994.
Around this time, some rather unexpected storm clouds formed on the horizon as Novell and U.C.
Berkeley settled their long-running lawsuit over the legal status of the Berkeley Net/2 tape. A condition
of that settlement was U.C. Berkeleys concession that large parts of Net/2 were encumbered code and
the property of Novell, who had in turn acquired it from AT&T some time previously. What Berkeley got
in return was Novells blessing that the 4.4BSD-Lite release, when it was finally released, would be
declared unencumbered and all existing Net/2 users would be strongly encouraged to switch. This
included FreeBSD, and the project was given until the end of July 1994 to stop shipping its own Net/2
based product. Under the terms of that agreement, the project was allowed one last release before the
deadline, that release being FreeBSD 1.1.5.1.
FreeBSD then set about the arduous task of literally re-inventing itself from a completely new and rather
incomplete set of 4.4BSD-Lite bits. The Lite releases were light in part because Berkeleys CSRG had
removed large chunks of code required for actually constructing a bootable running system (due to
various legal requirements) and the fact that the Intel port of 4.4 was highly incomplete. It took the
project until November of 1994 to make this transition, at which point it released FreeBSD 2.0 to the net
and on CDROM (in late December). Despite being still more than a little rough around the edges, the
release was a significant success and was followed by the more robust and easier to install FreeBSD
2.0.5 release in June of 1995.
28
Chapter 1. Introduction
We released FreeBSD 2.1.5 in August of 1996, and it appeared to be popular enough among the ISP and
commercial communities that another release along the 2.1-stable branch was merited. This was
FreeBSD 2.1.7.1, released in February 1997 and capping the end of mainstream development on
2.1-stable. Now in maintenance mode, only security enhancements and other critical bug fixes will be
done on this branch (RELENG_2_1_0).
FreeBSD 2.2 was branched from the development mainline (-current) in November 1996 as the
RELENG_2_2 branch, and the first full release (2.2.1) was released in April, 1997. Further releases
along the 2.2 branch were done in the Summer and Fall of 97, the latest being 2.2.7 which appeared in
late July of 98. The first official 3.0 release appeared in October, 1998 and the last release on the 2.2
branch, 2.2.8, appeared in November, 1998.
The tree branched again on Jan 20, 1999. This led to 4.0-current and a 3.x-stable branch, from which 3.1
was released on February 15th, 1999 and 3.2 was released on May 15, 1999.
Long term development projects will continue to take place in the 4.0-current branch and SNAPshot
releases of 4.0 on CDROM (and, of course, on the net).
29
Chapter 1. Introduction
The development of FreeBSD is a very open and flexible process, FreeBSD being literally built from the
contributions of hundreds of people around the world, as can be seen from our list of contributors. We
are constantly on the lookout for new developers and ideas, and those interested in becoming more
closely involved with the project need simply contact us at the FreeBSD technical discussions mailing
list <[email protected]>. Those who prefer to work more independently are also
accommodated, and they are free to use our FTP facilities at ftp.FreeBSD.org
(ftp://ftp.FreeBSD.org/pub/FreeBSD/incoming) to distribute their own patches or work-in-progress
sources. The FreeBSD announcements mailing list <[email protected]> is also
available to those wishing to make other FreeBSD users aware of major areas of work.
Useful things to know about the FreeBSD project and its development process, whether working
independently or in close cooperation:
30
Chapter 1. Introduction
Some core team members also have specific areas of responsibility, meaning that they are
committed to ensuring that some large portion of the system works as advertised.
Note: Most members of the core team are volunteers when it comes to FreeBSD development
and do not benefit from the project financially, so commitment should also not be
misconstrued as meaning guaranteed support. The board of directors analogy above is not
actually very accurate, and it may be more suitable to say that these are the people who gave
up their lives in favor of FreeBSD against their better judgement! ;)
Outside contributors
Last, but definitely not least, the largest group of developers are the users themselves who provide
feedback and bug-fixes to us on an almost constant basis. The primary way of keeping in touch with
FreeBSDs more non-centralized development is to subscribe to the FreeBSD technical discussions
mailing list <[email protected]> (see mailing list info) where such things are
discussed.
The list of those who have contributed something which made its way into our source tree is a long
and growing one, so why not join it by contributing something back to FreeBSD today? :-)
Providing code is not the only way of contributing to the project; for a more complete list of things
that need doing, please refer to the how to contribute section in this handbook.
In summary, our development model is organized as a loose set of concentric circles. The centralized
model is designed for the convenience of the users of FreeBSD, who are thereby provided with an easy
way of tracking one central code base, not to keep potential contributors out! Our desire is to present a
stable operating system with a large set of coherent application programs that the users can easily install
and use, and this model works very well in accomplishing that.
All we ask of those who would join us as FreeBSD developers is some of the same dedication its current
people have to its continued success!
31
Chapter 1. Introduction
buffer cache that not only increases performance, but reduces FreeBSDs memory footprint, making a
5MB configuration a more acceptable minimum. Other enhancements include full NIS client and server
support, transaction TCP support, dial-on-demand PPP, an improved SCSI subsystem, ISDN support,
support for ATM, FDDI and Fast Ethernet (100Mbit) adapters, improved support for the Adaptec 2940
(WIDE and narrow) and many hundreds of bug fixes.
We have also taken the comments and suggestions of many of our users to heart and have attempted to
provide what we hope is a more sane and easily understood installation process. Your feedback on this
(constantly evolving) process is especially welcome!
In addition to the base distributions, FreeBSD offers a new ported software collection with hundreds of
commonly sought-after programs. At the end of April 1999 there were more than 2300 ports! The list of
ports ranges from http (WWW) servers, to games, languages, editors and almost everything in between.
The entire ports collection requires approximately 50MB of storage, all ports being expressed as deltas
to their original sources. This makes it much easier for us to update ports, and greatly reduces the disk
space demands made by the older 1.0 ports collection. To compile a port, you simply change to the
directory of the program you wish to install, type make all followed by make install after
successful compilation and let the system do the rest. The full original distribution for each port you
build is retrieved dynamically off the CDROM or a local ftp site, so you need only enough disk space to
build the ports you want. (Almost) every port is also provided as a pre-compiled package which can be
installed with a simple command (pkg_add) by those who do not wish to compile their own ports from
source.
A number of additional documents which you may find very helpful in the process of installing and
using FreeBSD may now also be found in the /usr/share/doc directory on any machine running
FreeBSD 2.1 or later. You may view the locally installed manuals with any HTML capable browser
using the following URLs:
You can also visit the master (and most frequently updated) copies at http://www.FreeBSD.org.
The core of FreeBSD does not contain DES code which would inhibit its being exported outside the
United States. There is an add-on package to the core distribution, for use only in the United States, that
contains the programs that normally use DES. The auxiliary packages provided separately can be used
by anyone. A freely (from outside the U.S.) exportable European distribution of DES for our non-U.S.
users also exists and is described in the FreeBSD FAQ (../FAQ/FAQ.html).
32
Chapter 1. Introduction
If password security for FreeBSD is all you need, and you have no requirement for copying encrypted
passwords from different hosts (Suns, DEC machines, etc) into FreeBSD password entries, then
FreeBSDs MD5 based security may be all you require! We feel that our default security model is more
than a match for DES, and without any messy export issues to deal with. If you are outside (or even
inside) the U.S., give it a try!
33
Chapter 2. Installing FreeBSD
So, you would like to try out FreeBSD on your system? This section is a quick-start guide for what you
need to do. FreeBSD can be installed from a variety of media including CD-ROM, floppy disk, magnetic
tape, an MS-DOS partition and, if you have a network connection, via anonymous ftp or NFS.
Regardless of the installation media you choose, you can get started by creating the installation disks as
described below. Booting your computer into the FreeBSD installer, even if you are not planning on
installing FreeBSD right away, will provide important information about compatibility between
FreeBSD and your hardware which may, in turn, dictate which installation options are even possible. It
can also provide early clues to any compatibility problems which could prevent FreeBSD running on
your system at all.
If you plan on installing via anonymous FTP then the installation floppies are all you need to download
and createthe installation program itself will handle any further required downloading directly (using
an ethernet connection, a modem and ppp dialip #, etc).
For more information on obtaining the latest FreeBSD distributions, please see Obtaining FreeBSD in
the Appendix.
So, to get the show on the road, follow these steps:
1. Review the supported configurations section of this installation guide to be sure that your hardware
is supported by FreeBSD. It may be helpful to make a list of any special cards you have installed,
such as SCSI controllers, Ethernet adapters or sound cards. This list should include relevant
configuration parameters such as interrupts (IRQ) and IO port addresses.
2. If you are installing FreeBSD from CDROM media then you have several different installation
options:
If the CD has been mastered with El Torrito boot support and your system supports direct booting
from CDROM (and many older systems do not), simply insert the CD into the drive and boot
directly from it.
If you are running DOS and have the proper drivers to access your CD, run the install.bat script
provided on the CD. This will attempt to boot into the FreeBSD installation straight from DOS.
Note: You must do this from actual DOS and not a Windows DOS box.
If you also want to install FreeBSD from your DOS partition (perhaps because your CDROM
drive is completely unsupported by FreeBSD) then run the setup program first to copy the
appropriate files from the CD to your DOS partition, afterwards running install.
34
Chapter 2. Installing FreeBSD
If either of the two proceeding methods work then you can simply skip the rest of this section,
otherwise your final option is to create a set of boot floppies from the floppies\kern.flp and
floppies\mfsroot.flp imagesproceed to step 4 for instructions on how to do this.
3. If you do not have a CDROM distribution then simply read the installation boot image information
(ftp://ftp.FreeBSD.org/pub/FreeBSD/3.2-RELEASE/floppies/README.TXT) to find out what files
you need to download first.
4. Make the installation boot disks from the image files:
The fdimage program will format the A: drive and then copy the kern.flp image onto it
(assuming that you are at the top level of a FreeBSD distribution and the floppy images live in the
floppies subdirectory, as is typically the case).
disk_device is the /dev entry for the floppy drive. On FreeBSD systems, this is /dev/rfd0
for the A: drive and /dev/rfd1 for the B: drive.
5. With the kern.flp in the A: drive, reboot your computer. The next request you should get is for the
mfsroot.flp floppy, after which the installation will proceed normally.
If you do not type anything at the boot prompt which appears during this process, FreeBSD will
automatically boot with its default configuration after a delay of about five seconds. As FreeBSD
boots, it probes your computer to determine what hardware is installed. The results of this probing is
displayed on the screen.
6. When the booting process is finished, The main FreeBSD installation menu will be displayed.
35
Chapter 2. Installing FreeBSD
your hardware has been reconfigured, you will most likely need to use the configuration editor to tell
FreeBSD where things are.
It is also possible that a probe for a device not present will cause a later probe for another device that is
present to fail. In that case, the probes for the conflicting driver(s) should be disabled.
Warning: Do not disable any device you will need during installation, such as your screen (sc0). If
the installation wedges or fails mysteriously after leaving the configuration editor, you have probably
removed or changed something that you should not have. Simply reboot and try again.
Supported Configurations
FreeBSD currently runs on a wide variety of ISA, VLB, EISA and PCI bus based PCs, ranging from
386sx to Pentium class machines (though the 386sx is not recommended). Support for generic IDE or
ESDI drive configurations, various SCSI controller, network and serial cards is also provided.
A minimum of four megabytes of RAM is required to run FreeBSD. To run the X Window System, eight
megabytes of RAM is the recommended minimum.
Following is a list of all disk controllers and Ethernet cards currently known to work with FreeBSD.
Other configurations may very well work, and we have simply not received any indication of this.
Disk Controllers
36
Chapter 2. Installing FreeBSD
BT-948
BT-958
BT-958D
BT-946C
BT-956C
BT-956CD
BT-445C
BT-747C
BT-757C
BT-757CD
BT-545C
BT-540CF
37
Chapter 2. Installing FreeBSD
BT-445S
BT-747S
BT-747D
BT-757S
BT-757D
BT-545S
BT-542D
BT-742A
BT-542B
BT-742A
BT-542B
AMI FastDisk controllers that are true BusLogic MultiMaster clones are also supported.
DPT SmartCACHE Plus, SmartCACHE III, SmartRAID III, SmartCACHE IV and SmartRAID IV
SCSI/RAID controllers are supported. The DPT SmartRAID/CACHE V is not yet supported.
Compaq Intelligent Disk Array Controllers: IDA, IDA-2, IAES, SMART, SMART-2/E, Smart-2/P,
SMART-2SL, Smart Array 3200, Smart Array 3100ES and Smart Array 221.
SymBios (formerly NCR) 53C810, 53C810a, 53C815, 53C820, 53C825a, 53C860, 53C875, 53C875j,
53C885, 53C895 and 53C896 PCI SCSI controllers:
ASUS SC-200
Data Technology DTC3130 (all variants)
Diamond FirePort (all)
NCR cards (all)
Symbios cards (all)
Tekram DC390W, 390U and 390F
Tyan S1365
QLogic 1020, 1040, 1040B, 1080, 1240 and 2100 SCSI and Fibre Channel Adapters
38
Chapter 2. Installing FreeBSD
Tekram DC390 and DC390T controllers (maybe other cards based on the AMD 53c974 as well).
NCR5380/NCR53400 ("ProAudio Spectrum") SCSI controller.
UltraStor 14F, 24F and 34F SCSI controllers.
Seagate ST01/02 SCSI controllers.
Future Domain 8xx/950 series SCSI controllers.
WD7000 SCSI controller.
Adaptec 1510 series ISA SCSI controllers (not for bootable devices)
Adaptec 152x series ISA SCSI controllers
Adaptec AIC-6260 and AIC-6360 based boards, which includes the AHA-152x and SoundBlaster
SCSI cards.
Ethernet cards
39
Chapter 2. Installing FreeBSD
SMC Elite 16 WD8013 Ethernet interface, and most other WD8003E, WD8003EBT, WD8003W,
WD8013W, WD8003S, WD8003SBT and WD8013EBT based clones. SMC Elite Ultra and 9432TX
based cards are also supported.
DEC EtherWORKS III NICs (DE203, DE204, and DE205)
DEC EtherWORKS II NICs (DE200, DE201, DE202, and DE422)
DEC DC21040/DC21041/DC21140 based NICs:
ASUS PCI-L101-TB
Accton ENI1203
Cogent EM960PCI
Compex CPXPCI/32C
D-Link DE-530
DEC DE435
DEC DE450
Danpex EN-9400P3
JCIS Condor JC1260
Kingston KNE100TX
Linksys EtherPCI
Mylex LNP101
SMC EtherPower 10/100 (Model 9332)
SMC EtherPower (Model 8432)
SMC EtherPower (2)
Znyx ZX314
Znyx ZX342
40
Chapter 2. Installing FreeBSD
Note: FreeBSD does not currently support PnP (plug-n-play) features present on some ethernet
cards. If your card has PnP and is giving you problems, try disabling its PnP features.
Miscellaneous devices
41
Chapter 2. Installing FreeBSD
42
Chapter 2. Installing FreeBSD
Before removing the CD again, also note that it is necessary to first type: umount /cdrom. Do not just
remove it from the drive!
Note: Before invoking the installation, be sure that the CDROM is in the drive so that the install probe
can find it. This is also true if you wish the CDROM to be added to the default system configuration
automatically during the install (whether or not you actually use it as the installation media).
Finally, if you would like people to be able to FTP install FreeBSD directly from the CDROM in your
machine, you will find it quite easy. After the machine is fully installed, you simply need to add the
following line to the password file (using the vipw command):
ftp:*:99:99::0:0:FTP:/cdrom:/nonexistent
Anyone with network connectivity to your machine (and permission to log into it) can now chose a
Media type of FTP and type in: ftp://your machine after picking Other in the ftp sites menu.
Then you can mount and write to them like any other file system.
43
Chapter 2. Installing FreeBSD
After you have formatted the floppies, you will need to copy the files onto them. The distribution files are
split into chunks conveniently sized so that 5 of them will fit on a conventional 1.44MB floppy. Go
through all your floppies, packing as many files as will fit on each one, until you have got all the
distributions you want packed up in this fashion. Each distribution should go into a subdirectory on the
floppy, e.g.: a:\bin\bin.aa, a:\bin\bin.ab, and so on.
Once you come to the Media screen of the install, select Floppy and you will be prompted for the rest.
C:\> md c:\freebsd
C:\> xcopy /s e:\bin c:\freebsd\bin\
C:\> xcopy /s e:\manpages c:\freebsd\manpages\
Assuming that C: is where you have free space and E: is where your CDROM is mounted.
For as many DISTS you wish to install from MS-DOS (and you have free space for), install each one
under c:\freebsd the BIN dist is only the minimal requirement.
# cd /freebsd/distdir
# tar cvf /dev/rwt0 dist1 ... dist2
When you go to do the installation, you should also make sure that you leave enough room in some
temporary directory (which you will be allowed to choose) to accommodate the full contents of the tape
you have created. Due to the non-random access nature of tapes, this method of installation requires
quite a bit of temporary storage. You should expect to require as much temporary storage as you have
stuff written on tape.
Note: When going to do the installation, the tape must be in the drive before booting from the boot
floppy. The installation probe may otherwise fail to find it.
44
Chapter 2. Installing FreeBSD
Serial port
SLIP or PPP
Parallel port
PLIP (laplink cable)
Ethernet
A standard ethernet controller (includes some PCMCIA).
SLIP support is rather primitive, and limited primarily to hard-wired links, such as a serial cable running
between a laptop computer and another computer. The link should be hard-wired as the SLIP installation
does not currently offer a dialing capability; that facility is provided with the PPP utility, which should be
used in preference to SLIP whenever possible.
If you are using a modem, then PPP is almost certainly your only choice. Make sure that you have your
service providers information handy as you will need to know it fairly soon in the installation process.
You will need to know how to dial your ISP using the AT commands specific to your modem, as the
PPP dialer provides only a very simple terminal emulator. If you are using PAP or CHAP, you will need
to type the necessary set authname and set authkey commands before typing term. Refer to the
user-ppp handbook and FAQ (../FAQ/userppp.html) entries for further information. If you have
problems, logging can be directed to the screen using the command set log local ....
If a hard-wired connection to another FreeBSD (2.0R or later) machine is available, you might also
consider installing over a laplink parallel port cable. The data rate over the parallel port is much higher
than what is typically possible over a serial line (up to 50k/sec), thus resulting in a quicker installation.
Finally, for the fastest possible network installation, an ethernet adaptor is always a good choice!
FreeBSD supports most common PC ethernet cards, a table of supported cards (and their required
settings) is provided in Supported Hardware. If you are using one of the supported PCMCIA ethernet
cards, also be sure that it is plugged in before the laptop is powered on! FreeBSD does not,
unfortunately, currently support hot insertion of PCMCIA cards during installation.
You will also need to know your IP address on the network, the netmask value for your address class, and
the name of your machine. Your system administrator can tell you which values to use for your particular
network setup. If you will be referring to other hosts by name rather than IP address, you will also need a
name server and possibly the address of a gateway (if you are using PPP, it is your providers IP address)
45
Chapter 2. Installing FreeBSD
to use in talking to it. If you do not know the answers to all or most of these questions, then you should
really probably talk to your system administrator first before trying this type of installation.
Once you have a network link of some sort working, the installation can continue over NFS or FTP.
In FreeBSDs /etc/exports file, this is controlled by the -alldirs option. Other NFS servers may
have different conventions. If you are getting Permission Denied messages from the server then it is
likely that you do not have this enabled properly.
ftp://165.113.121.81/pub/FreeBSD/3.2-RELEASE
FTP Active
For all FTP transfers, use Active mode. This will not work through firewalls, but will often work
with older ftp servers that do not support passive mode. If your connection hangs with passive mode
46
Chapter 2. Installing FreeBSD
FTP Passive
For all FTP transfers, use Passive mode. This allows the user to pass through firewalls that do not
allow incoming connections on random port addresses.
Note: Active and passive modes are not the same as a proxy connection, where a proxy FTP
server is listening and forwarding FTP requests!
For a proxy FTP server, you should usually give name of the server you really want as a part of the
username, after an @-sign. The proxy server then fakes the real server. An example: Say you want to
install from ftp.FreeBSD.org, using the proxy FTP server foo.bar.com, listening on port 1234.
In this case, you go to the options menu, set the FTP username to [email protected], and the
password to your e-mail address. As your installation media, you specify FTP (or passive FTP, if the
proxy support it), and the URL ftp://foo.bar.com:1234/pub/FreeBSD
/pub/FreeBSD from ftp.FreeBSD.org is proxied under foo.bar.com, allowing you to install from
that machine (which fetch the files from ftp.FreeBSD.org as your installation requests them).
Installing FreeBSD
Once you have taken note of the appropriate preinstallation steps, you should be able to install FreeBSD
without any further trouble.
Should this not be true, then you may wish to go back and re-read the relevant preparation section above
for the installation media type you are trying to use, perhaps there is a helpful hint there that you missed
the first time? If you are having hardware trouble, or FreeBSD refuses to boot at all, read the Hardware
Guide provided on the boot floppy for a list of possible solutions.
The FreeBSD boot floppies contain all the on-line documentation you should need to be able to navigate
through an installation and if it does not then we would like to know what you found most confusing.
Send your comments to the FreeBSD documentation project mailing list
<[email protected]>. It is the objective of the FreeBSD installation program (sysinstall) to
be self-documenting enough that painful step-by-step guides are no longer necessary. It may take us a
little while to reach that objective, but that is the objective!
Meanwhile, you may also find the following typical installation sequence to be helpful:
47
Chapter 2. Installing FreeBSD
1. Boot the kern.flp floppy and, when asked, remove it and insert the mfsroot.flp floppy and hit
return. After a boot sequence which can take anywhere from 30 seconds to 3 minutes, depending on
your hardware, you should be presented with a menu of initial choices. If the kern.flp floppy does
not boot at all, or the boot hangs at some stage, go read the Q&A section of the Hardware Guide for
possible causes.
2. Press F1. You should see some basic usage instructions on the menu system and general navigation.
If you have not used this menu system before then please read this thoroughly!
3. Select the Options item and set any special preferences you may have.
4. Select a Novice, Custom or Express install, depending on whether or not you would like the
installation to help you through a typical installation, give you a high degree of control over each
step of the installation or simply whizz through it (using reasonable defaults when possible) as fast
as possible. If you have never used FreeBSD before then the Novice installation method is most
recommended.
5. The final configuration menu choice allows you to further configure your FreeBSD installation by
giving you menu-driven access to various system defaults. Some items, like networking, may be
especially important if you did a CDROM/Tape/Floppy installation and have not yet configured your
network interfaces (assuming you have any). Properly configuring such interfaces here will allow
FreeBSD to come up on the network when you first reboot from the hard disk.
48
Chapter 2. Installing FreeBSD
No. If you are using a utility such as Stacker(tm) or DoubleSpace(tm), FreeBSD will only be able to use
whatever portion of the filesystem you leave uncompressed. The rest of the filesystem will show up as
one large file (the stacked/dblspaced file!). Do not remove that file! You will probably regret it greatly!
It is probably better to create another uncompressed MS-DOS primary partition and use this for
communications between MS-DOS and FreeBSD.
Can I mount my MS-DOS extended partitions?
Yes. DOS extended partitions are mapped in at the end of the other slices in FreeBSD, e.g. your D:
drive might be /dev/da0s5, your E: drive /dev/da0s6, and so on. This example assumes, of course,
that your extended partition is on SCSI drive 0. For IDE drives, substitute wd for da appropriately. You
otherwise mount extended partitions exactly like you would mount any other DOS drive, e.g.:
49
Chapter 3. Unix Basics
% man command
command is the name of the command you wish to learn about. For example, to learn more about ls
command type:
% man ls
1. User commands
2. System calls and error numbers
3. Functions in the C libraries
4. Device drivers
5. File formats
6. Games and other diversions
7. Miscellaneous information
8. System maintenance and operation commands
9. Kernel developers
In some cases, the same topic may appear in more than one section of the on-line manual. For example,
there is a chmod user command and a chmod() system call. In this case, you can tell the man command
which one you want by specifying the section:
% man 1 chmod
This will display the manual page for the user command chmod. References to a particular section of the
on-line manual are traditionally placed in parenthesis in written documentation, so chmod(1) refers to the
chmod user command and chmod(2) refers to the system call.
50
Chapter 3. Unix Basics
This is fine if you know the name of the command and simply wish to know how to use it, but what if
you cannot recall the command name? You can use man to search for keywords in the command
descriptions by using the -k switch:
% man -k mail
With this command you will be presented with a list of commands that have the keyword mail in their
descriptions. This is actually functionally equivalent to using the apropos command.
So, you are looking at all those fancy commands in /usr/bin but do not even have the faintest idea
what most of them actually do? Simply do a
% cd /usr/bin; man -f *
or
% cd /usr/bin; whatis *
% info
51
Chapter 4. Installing Applications: The Ports
collection
Contributed by James Raynard <[email protected] >.
The FreeBSD Ports collection allows you to compile and install a very wide range of applications with a
minimum of effort.
For all the hype about open standards, getting a program to work on different versions of Unix in the real
world can be a tedious and tricky business, as anyone who has tried it will know. You may be lucky
enough to find that the program you want will compile cleanly on your system, install itself in all the
right places and run flawlessly out of the box, but this is unfortunately rather rare. With most
programs, you will find yourself doing a fair bit of head-scratching, and there are quite a few programs
that will result in premature greying, or even chronic alopecia...
Some software distributions have attacked this problem by providing configuration scripts. Some of
these are very clever, but they have an unfortunate tendency to triumphantly announce that your system
is something you have never heard of and then ask you lots of questions that sound like a final exam in
system-level Unix programming (Does your systems gethitlist function return a
const pointer to a fromboz or a pointer to a const fromboz? Do you have
Foonix style unacceptable exception handling? And if not, why not?).
Fortunately, with the Ports collection, all the hard work involved has already been done, and you can just
type make install and get a working program.
1. Programs that some people cannot live without and other people cannot stand, such as a certain
Lisp-based editor.
2. Programs which are too specialised to put in the base system (CAD, databases).
3. Programs which fall into the I must have a look at that when I get a spare minute category, rather
than system-critical ones (some languages, perhaps).
4. Programs that are far too much fun to be supplied with a serious operating system like FreeBSD ;-)
5. However many programs you put in the base system, people will always want more, and a line has
to be drawn somewhere (otherwise FreeBSD distributions would become absolutely enormous).
52
Chapter 4. Installing Applications: The Ports collection
Obviously it would be unreasonable to expect everyone to port their favourite programs by hand (not to
mention a tremendous amount of duplicated work), so the FreeBSD Project came up with an ingenious
way of using standard tools that would automate the process.
Incidentally, this is an excellent illustration of how the Unix way works in practice by combining a set
of simple but very flexible tools into something very powerful.
Note: If you are trying this at home, you will need to be root.
# cd /usr/ports/devel/ElectricFence
# make install
>> Checksum OK for ElectricFence-2.0.5.tar.gz.
===> Extracting for ElectricFence-2.0.5
===> Patching for ElectricFence-2.0.5
===> Applying FreeBSD patches for ElectricFence-2.0.5
===> Configuring for ElectricFence-2.0.5
53
Chapter 4. Installing Applications: The Ports collection
To avoid confusing the issue, I have completely removed the build output.
If you tried this yourself, you may well have got something like this at the start:-
# make install
>> ElectricFence-2.0.5.tar.gz doesnt seem to exist on this system.
>> Attempt-
ing to fetch from ftp://ftp.doc.ic.ac.uk/Mirrors/sunsite.unc.edu/pub/Linux/devel/lang/c/.
The make program has noticed that you did not have a local copy of the source code and tried to FTP it
down so it could get the job done. I already had the source handy in my example, so it did not need to
fetch it.
Lets go through this and see what the make program was doing.
1. Locate the source code tarball. If it is not available locally, try to grab it from an FTP site.
2. Run a checksum test on the tarball to make sure it has not been tampered with, accidentally
truncated, downloaded in ASCII mode, struck by neutrinos while in transit, etc.
3. Extract the tarball into a temporary work directory.
4. Apply any patches needed to get the source to compile and run under FreeBSD.
5. Run any configuration script required by the build process and correctly answer any questions it
asks.
6. (Finally!) Compile the code.
7. Install the program executable and other supporting files, man pages, etc. under the /usr/local
hierarchy (unless this is an X11 program, then it will be under /usr/X11R6), where they will not
get mixed up with system programs. This also makes sure that all the ports you install will go in the
same place, instead of being flung all over your system.
54
Chapter 4. Installing Applications: The Ports collection
8. Register the installation in a database. This means that, if you do not like the program, you can
cleanly remove all traces of it from your system.
Scroll up to the make output and see if you can match these steps to it. And if you were not impressed
before, you should be by now!
PORTSDIR= /cdrom/ports
DISTDIR= /tmp/distfiles
WRKDIRPREFIX= /tmp
Substitute /tmp for any place you have enough free space. Then, just cd to the appropriate subdirectory
under /cdrom/ports and type make install as usual. WRKDIRPREFIX will cause the port to be build
under /tmp/cdrom/ports; for instance, games/oneko will be built under
/tmp/cdrom/ports/games/oneko.
Note: There are some ports for which we cannot provide the original source in the CDROM due to
licensing limitations. In that case, you will need to look at the section on Compiling ports using an
Internet connection.
55
Chapter 4. Installing Applications: The Ports collection
# cd /usr/ports
# mkdir databases
# cd databases
# ftp ftp.FreeBSD.org
[log in as ftp and give your email address when asked for a
password. Remember to use binary (also known as image) mode!]
ftp> cd /pub/FreeBSD/ports/ports/databases
ftp> get gnats.tar
[tars up the gnats skeleton for us]
ftp> quit
# tar xf gnats.tar
[extract the gnats skeleton]
# cd gnats
# make install
[build and install gnats]
What happened here? We connected to the FTP server in the usual way and went to its databases
sub-directory. When we gave it the command get gnats.tar, the FTP server tarred up the gnats
directory for us.
We then extracted the gnats skeleton and went into the gnats directory to build the port. As we explained
earlier, the make process noticed we did not have a copy of the source locally, so it fetched one before
extracting, patching and building it.
Let us try something more ambitious now. Instead of getting a single port skeleton, we will get a whole
sub-directory, for example all the database skeletons in the ports collection. It looks almost the same:-
# cd /usr/ports
# ftp ftp.FreeBSD.org
[log in as ftp and give your email address when asked for a
password. Remember to use binary (also known as image) mode!]
ftp> cd /pub/FreeBSD/ports/ports
ftp> get databases.tar
[tars up the databases directory for us]
ftp> quit
# tar xf databases.tar
56
Chapter 4. Installing Applications: The Ports collection
With half a dozen straightforward commands, we have now got a set of database programs on our
FreeBSD machine! All we did that was different from getting a single port skeleton and building it was
that we got a whole directory at once, and compiled everything in it at once. Pretty impressive, no?
If you expect to be installing many ports, it is probably worth downloading all the ports directories.
Skeletons
A team of compulsive hackers who have forgotten to eat in a frantic attempt to make a deadline?
Something unpleasant lurking in the FreeBSD attic? No, a skeleton here is a minimal framework that
supplies everything needed to make the ports magic work.
Makefile
The most important component of a skeleton is the Makefile. This contains various statements that
specify how the port should be compiled and installed. Here is the Makefile for ElectricFence:-
DISTNAME= ElectricFence-2.0.5
CATEGORIES= devel
MASTER_SITES= ${MASTER_SITE_SUNSITE}
MASTER_SITE_SUBDIR= devel/lang/c
MAINTAINER= [email protected]
MAN3= libefence.3
do-install:
${INSTALL_DATA} ${WRKSRC}/libefence.a ${PREFIX}/lib
57
Chapter 4. Installing Applications: The Ports collection
.include <bsd.port.mk>
The lines beginning with a "#" sign are comments for the benefit of human readers (as in most Unix
script files).
DISTNAME specifies the name of the tarball, but without the extension.
CATEGORIES states what kind of program this is. In this case, a utility for developers. See the categories
section of this handbook for a complete list.
MASTER_SITES is the URL(s) of the master FTP site, which is used to retrieve the tarball if it is not
available on the local system. This is a site which is regarded as reputable, and is normally the one from
which the program is officially distributed (in so far as any software is "officially" distributed on the
Internet).
MAINTAINER is the email address of the person who is responsible for updating the skeleton if, for
example a new version of the program comes out.
Skipping over the next few lines for a minute, the line .include <bsd.port.mk> says that the other
statements and commands needed for this port are in a standard file called bsd.port.mk. As these are
the same for all ports, there is no point in duplicating them all over the place, so they are kept in a single
standard file.
This is probably not the place to go into a detailed examination of how Makefiles work; suffice it to say
that the line starting with MAN3 ensures that the ElectricFence man page is compressed after installation,
to help conserve your precious disk space. The original port did not provide an install target, so the
three lines from do-install ensure that the files produced by this port are placed in the correct
destination.
58
Chapter 4. Installing Applications: The Ports collection
1. Fix it yourself. Technical details on how ports work can be found in Porting applications.
2. Gripe. This is done by e-mail only! Send such e-mail to the maintainer of the port, first. Type make
maintainer or read the Makefile to find the maintainers email address. Remember to include
the name/version of the port (copy the $Id: line from the Makefile), and the output leading up-to
the error, inclusive. If you do not get a satisfactory response, you can try filing a bug report with
send-pr.
3. Forget it. This is the easiest for most very few of the programs in ports can be classified as
essential!
4. Grab the pre-compiled package from a ftp server. The master package collection is on FreeBSDs
FTP server in the packages directory (ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/packages/), though
check your local mirror first, please! These are more likely to work (on the whole) than trying to
compile from source and a lot faster besides! Use the pkg_add(1) program to install a package file
on your system.
59
Chapter 4. Installing Applications: The Ports collection
1. The licensing conditions on some software distributions require that they be distributed as source
code, not binaries.
2. Some people do not trust binary distributions. At least with source code you can (in theory) read
through it and look for potential problems yourself.
3. If you have some local patches, you will need the source to add them yourself.
4. You might have opinions on how a program should be compiled that differ from the person who
did the package some people have strong views on what optimisation setting should be used,
whether to build debug versions and then strip them or not, etc. etc.
5. Some people like having code around, so they can read it if they get bored, hack around with it,
borrow from it (licence terms permitting, of course!) and so on.
6. If you aint got the source, it aint software! ;-)
Q. What is a patch?
A. A patch is a small (usually) file that specifies how to go from one version of a file to another. It
contains text that says, in effect, things like delete line 23, add these two lines after line 468 or
change line 197 to this. Also known as a diff, since it is generated by a program of that name.
Q. And a checksum?
60
Chapter 4. Installing Applications: The Ports collection
A. It is a number generated by adding up all the data in the file you want to check. If any of the
characters change, the checksum will no longer be equal to the total, so a simple comparison will
allow you to spot the difference. (In practice, it is done in a more complicated way to spot problems
like position-swapping, which will not show up with a simplistic addition).
Q. I did what you said for compiling ports from a CDROM and it worked great until I tried to install
the kermit port:-
# make install
>> cku190.tar.gz doesnt seem to exist on this system.
>> Attempting to fetch from ftp://kermit.columbia.edu/kermit/archives/.
Q. I did that, but when I tried to put it into /usr/ports/distfiles I got some error about not
having permission.
A. The ports mechanism looks for the tarball in /usr/ports/distfiles, but you will not be able to
copy anything there because it is sym-linked to the CDROM, which is read-only. You can tell it to
look somewhere else by doing
# make DISTDIR=/where/you/put/it install
Q. Does the ports scheme only work if you have everything in /usr/ports? My system administrator
says I must put everything under /u/people/guests/wurzburger, but it does not seem to work.
A. You can use the PORTSDIR and PREFIX variables to tell the ports mechanism to use different
directories. For instance,
# make PORTSDIR=/u/people/guests/wurzburger/ports install
will combine the two (it is too long to fit on the page if I write it in full, but I am sure you get the idea).
61
Chapter 4. Installing Applications: The Ports collection
If you do not fancy typing all that in every time you install a port (and to be honest, who would?), it is
a good idea to put these variables into your environment.
Q. I do not have a FreeBSD CDROM, but I would like to have all the tarballs handy on my system so I
do not have to wait for a download every time I install a port. Is there an easy way to get them all at
once?
A. To get every single tarball for the ports collection, do
# cd /usr/ports
# make fetch
and for just one port well, I think you have guessed already.
Q. I know it is probably faster to fetch the tarballs from one of the FreeBSD mirror sites close by. Is
there any way to tell the port to fetch them from servers other than ones listed in the
MASTER_SITES?
A. Yes. If you know, for example, ftp.FreeBSD.org is much closer than sites listed in
MASTER_SITES, do as following example.
# cd /usr/ports/directory
# make MAS-
TER_SITE_OVERRIDE=ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/ fetch
Q. I want to know what files make is going to need before it tries to pull them down.
A. make fetch-list will display a list of the files needed for a port.
Q. Is there any way to stop the port from compiling? I want to do some hacking on the source before I
install it, but it is a bit tiresome having to watch it and hit control-C every time.
A. Doing make extract will stop it after it has fetched and extracted the source code.
Q. I am trying to make my own port and I want to be able to stop it compiling until I have had a
chance to see if my patches worked properly. Is there something like make extract, but for patches?
A. Yep, make patch is what you want. You will probably find the PATCH_DEBUG option useful as
well. And by the way, thank you for your efforts!
Q. I have heard that some compiler options can cause bugs. Is this true? How can I make sure that I
compile ports with the right settings?
62
Chapter 4. Installing Applications: The Ports collection
A. Yes, with version 2.6.3 of gcc (the version shipped with FreeBSD 2.1.0 and 2.1.5), the -O2 option
could result in buggy code unless you used the -fno-strength-reduce option as well. (Most of the
ports do not use -O2). You should be able to specify the compiler options used by something like
# make CFLAGS=-O2 -fno-strength-reduce install
or by editing /etc/make.conf, but unfortunately not all ports respect this. The surest way is to do
make configure, then go into the source directory and inspect the Makefiles by hand, but this can
get tedious if the source has lots of sub-directories, each with their own Makefiles.
Q. There are so many ports it is hard to find the one I want. Is there a list anywhere of what ports are
available?
A. Look in the INDEX file in /usr/ports. If you would like to search the ports collection for a
keyword, you can do that too. For example, you can find ports relevant to the LISP programming
language using:
% cd /usr/ports
% make search key=lisp
Q. I went to install the foo port but the system suddenly stopped compiling it and starting compiling
the bar port. What is going on?
A. The foo port needs something that is supplied with bar for instance, if foo uses graphics, bar
might have a library with useful graphics processing routines. Or bar might be a tool that is needed to
compile the foo port.
Q. I installed the grizzle program from the ports and frankly it is a complete waste of disk space. I
want to delete it but I do not know where it put all the files. Any clues?
A. No problem, just do
# pkg_delete grizzle-6.5
Q. Hang on a minute, you have to know the version number to use that command. You do not
seriously expect me to remember that, do you??
A. Not at all, you can find it out by doing
# pkg_info -a | grep grizzle
Information for grizzle-6.5:
grizzle-6.5 -
the combined piano tutorial, LOGO interpreter and shoot em up arcade game.
63
Chapter 4. Installing Applications: The Ports collection
Q. Talking of disk space, the ports directory seems to be taking up an awful lot of room. Is it safe to go
in there and delete things?
A. Yes, if you have installed the program and are fairly certain you will not need the source again,
there is no point in keeping it hanging around. The best way to do this is
# cd /usr/ports
# make clean
which will go through all the ports subdirectories and delete everything except the skeletons for each
port.
Q. I tried that and it still left all those tarballs or whatever you called them in the distfiles
directory. Can I delete those as well?
A. Yes, if you are sure you have finished with them, those can go as well.
Q. I like having lots and lots of programs to play with. Is there any way of installing all the ports in
one go?
A. Just do
# cd /usr/ports
# make install
Q. OK, I tried that, but I thought it would take a very long time so I went to bed and left it to get on
with it. When I looked at the computer this morning, it had only done three and a half ports. Did
something go wrong?
A. No, the problem is that some of the ports need to ask you questions that we cannot answer for you
(eg Do you want to print on A4 or US letter sized paper?) and they need to have someone on hand to
answer them.
Q. I really do not want to spend all day staring at the monitor. Any better ideas?
A. OK, do this before you go to bed/work/the local park:-
# cd /usr/ports
# make -DBATCH install
This will install every port that does not require user input. Then, when you come back, do
# cd /usr/ports
# make -DIS_INTERACTIVE install
Q. At work, we are using frobble, which is in your ports collection, but we have altered it quite a bit
to get it to do what we need. Is there any way of making our own packages, so we can distribute it
more easily around our sites?
64
Chapter 4. Installing Applications: The Ports collection
A. No problem, assuming you know how to make patches for your changes:-
# cd /usr/ports/somewhere/frobble
# make extract
# cd work/frobble-2.8
[Apply your patches]
# cd ../..
# make package
Q. This ports stuff is really clever. I am desperate to find out how you did it. What is the secret?
A. Nothing secret about it at all, just look at the bsd.ports.mk and bsd.ports.subdir.mk files in
your makefiles directory. (file://localhost/usr/ports/Mk/)
Note: Readers with an aversion to intricate shell-scripts are advised not to follow this link...)
Note: Only a fraction of the overridable variables (VAR) are mentioned in this document. Most (if not
all) are documented at the start of bsd.port.mk. This file users a non-standard tab setting. Emacs
and Vim should recognise the setting on loading the file. Both vi and ex can be set to use the
correct value by typing :set tabstop=4 once the file has been loaded.
Quick Porting
This section tells you how to do a quick port. In many cases, it is not enough, but we will see.
65
Chapter 4. Installing Applications: The Ports collection
First, get the original tarball and put it into DISTDIR, which defaults to /usr/ports/distfiles.
Note: The following assumes that the software compiled out-of-the-box, i.e., there was absolutely no
change required for the port to work on your FreeBSD box. If you needed to change something, you
will have to refer to the next section too.
DISTNAME= oneko-1.1b
CATEGORIES= games
MASTER_SITES= ftp://ftp.cs.columbia.edu/archives/X11R5/contrib/
MAINTAINER= [email protected]
MAN1= oneko.1
MANCOMPRESSED= yes
USE_IMAKE= yes
.include <bsd.port.mk>
See if you can figure it out. Do not worry about the contents of the $Id$ line, it will be filled in
automatically by CVS when the port is imported to our main ports tree. You can find a more detailed
example in the sample Makefile section.
66
Chapter 4. Installing Applications: The Ports collection
COMMENT
This is the one-line description of the port. Please do not include the package name (or version number
of the software) in the comment. The comment should begin with a capital, and end without a period.
Here is an example:
DESCR
This is a longer description of the port. One to a few paragraphs concisely explaining what the port does
is sufficient.
Note: This is not a manual or an in-depth description on how to use or compile the port! Please be
careful if you are copying from the README or manpage; too often they are not a concise description
of the port or are in an awkward format (e.g., manpages have justified spacing). If the ported
software has an official WWW homepage, you should list it here. Prefix one of the websites with
WWW: so that automated tools will work correctly.
It is recommended that you sign your name at the end of this file, as in:
This is a port of oneko, in which a cat chases a poor mouse all over
the screen.
:
(etc.)
WWW: http://www.oneko.org/
- Satoshi
[email protected]
PLIST
This file lists all the files installed by the port. It is also called the packing list because the package is
generated by packing the files listed here. The pathnames are relative to the installation prefix (usually
/usr/local or /usr/X11R6). If you are using the MANn variables (as you should be), do not list any
manpages here.
Here is a small example:
bin/oneko
lib/X11/app-defaults/Oneko
67
Chapter 4. Installing Applications: The Ports collection
lib/X11/oneko/cat1.xpm
lib/X11/oneko/cat2.xpm
lib/X11/oneko/mouse.xpm
@dirrm lib/X11/oneko
Refer to the pkg_create(1) man page for details on the packing list.
Note: You should list all the files, but not the name directories, in the list. Also, if the port creates
directories for itself during installation, make sure to add @dirrm lines as necessary to remove them
when the port is deleted.
It is recommended that you keep all the filenames in this file sorted alphabetically. It will make
verifying the changes when you upgrade the port much easier.
Creating a packing list manually can be a very tedious task. If the port installs a large numbers of
files, creating the packing list automatically might save time.
1. make install
2. make package
3. make deinstall
4. pkg_add package-name
68
Chapter 4. Installing Applications: The Ports collection
5. make deinstall
6. make reinstall
7. make package
Make sure that there are not any warnings issued in any of the package and deinstall stages, After
step 3, check to see if all the new directories are correctly deleted. Also, try using the software after step
4, to ensure that is works correctly when installed from a package.
One more time, do not include the original source distfile, the work directory, or the package you built
with make package.
Note: In the past, we asked you to upload new port submissions in our ftp site (ftp.FreeBSD.org).
This is no longer recommended as read access is turned off on that incoming/ directory of that site
due to the large amount of pirated software showing up there.
We will look at your port, get back to you if necessary, and put it in the tree. Your name will also appear
in the list of Additional FreeBSD contributors on the FreeBSD Handbook and other files. Isnt that
great?!? :)
69
Chapter 4. Installing Applications: The Ports collection
Slow Porting
Ok, so it was not that simple, and the port required some modifications to get it to work. In this section,
we will explain, step by step, how to modify it to get it to work with the ports paradigm.
1. The fetch target is run. The fetch target is responsible for making sure that the tarball exists
locally in DISTDIR. If fetch cannot find the required files in DISTDIR it will look up the URL
MASTER_SITES, which is set in the Makefile, as well as our main ftp site at
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/, where we put sanctioned distfiles as backup. It
will then attempt to fetch the named distribution file with FETCH, assuming that the requesting site
has direct access to the Internet. If that succeeds, it will save the file in DISTDIR for future use and
proceed.
2. The extract target is run. It looks for your ports distribution file (typically a gzipd tarball) in
DISTDIR and unpacks it into a temporary subdirectory specified by WRKDIR (defaults to work).
3. The patch target is run. First, any patches defined in PATCHFILES are applied. Second, if any
patches are found in PATCHDIR (defaults to the patches subdirectory), they are applied at this time
in alphabetical order.
4. The configure target is run. This can do any one of many different things.
The above are the default actions. In addition, you can define targets pre-something or
post-something , or put scripts with those names, in the scripts subdirectory, and they will be run
before or after the default actions are done.
For example, if you have a post-extract target defined in your Makefile, and a file pre-build in the
scripts subdirectory, the post-extract target will be called after the regular extraction actions, and
70
Chapter 4. Installing Applications: The Ports collection
the pre-build script will be executed before the default build rules are done. It is recommended that
you use Makefile targets if the actions are simple enough, because it will be easier for someone to
figure out what kind of non-default action the port requires.
The default actions are done by the bsd.port.mk targets do-something . For example, the commands
to extract a port are in the target do-extract. If you are not happy with the default target, you can fix it
by redefining the do-something target in your Makefile.
Note: The main targets (e.g., extract, configure, etc.) do nothing more than make sure all the
stages up to that one are completed and call the real targets or scripts, and they are not intended to
be changed. If you want to fix the extraction, fix do-extract, but never ever touch extract!
Now that you understand what goes on when the user types make, let us go through the recommended
steps to create the perfect port.
If your port requires some additional patches that are available on the Internet, fetch them too and put
them in DISTDIR. Do not worry if they come from a site other than where you got the main source
tarball, we have a way to handle these situations (see the description of PATCHFILES below).
71
Chapter 4. Installing Applications: The Ports collection
Note: Unless explicitly stated, patch files, scripts, and other files you have created and contributed to
the FreeBSD ports collection are assumed to be covered by the standard BSD copyright conditions.
Patching
In the preparation of the port, files that have been added or changed can be picked up with a recursive
diff for later feeding to patch. Each set of patches you wish to apply should be collected into a file named
patch-xx where xx denotes the sequence in which the patches will be applied these are done in
alphabetical order, thus aa first, ab second and so on. These files should be stored in PATCHDIR, from
where they will be automatically applied. All patches should be relative to WRKSRC (generally the
directory your ports tarball unpacks itself into, that being where the build is done). To make fixes and
upgrades easier, you should avoid having more than one patch fix the same file (e.g., patch-aa and
patch-ab both changing WRKSRC/foobar.c).
Configuring
Include any additional customization commands to your configure script and save it in the scripts
subdirectory. As mentioned above, you can also do this as Makefile targets and/or scripts with the
name pre-configure or post-configure.
72
Chapter 4. Installing Applications: The Ports collection
It is also recommended that if there are reasonable default answers to the questions, you check the
PACKAGE_BUILDING variable and turn off the interactive script when it is set. This will allow us to build
the packages for CD-ROMs and ftp.
DISTNAME
You should set DISTNAME to be the base name of your port. The default rules expect the distribution file
list (DISTFILES) to be named DISTNAMEEXTRACT_SUFX which, if it is a normal tarball, is going to be
something like foozolix-1.0.tar.gz for a setting of DISTNAME=foozolix-1.0.
The default rules also expect the tarball(s) to extract into a subdirectory called work/DISTNAME, e.g.
work/foozolix-1.0/.
All this behavior can be overridden, of course; it simply represents the most common time-saving
defaults. For a port requiring multiple distribution files, simply set DISTFILES explicitly. If only a subset
of DISTFILES are actual extractable archives, then set them up in EXTRACT_ONLY, which will override
the DISTFILES list when it comes to extraction, and the rest will be just left in DISTDIR for later use.
PKGNAME
If DISTNAME does not conform to our guidelines for a good package name, you should set the PKGNAME
73
Chapter 4. Installing Applications: The Ports collection
variable to something better. See the abovementioned guidelines for more details.
CATEGORIES
When a package is created, it is put under /usr/ports/packages/All and links are made from one or
more subdirectories of /usr/ports/packages. The names of these subdirectories are specified by the
variable CATEGORIES. It is intended to make life easier for the user when he is wading through the pile
of packages on the ftp site or the CD-ROM. Please take a look at the existing categories and pick the
ones that are suitable for your port.
This list also determines where in the ports tree the port is imported. If you put more than one category
here, it is assumed that the port files will be put in the subdirectory with the name in the first category.
See the categories section for more discussion about how to pick the right categories.
If you port truly belongs to something that is different from all the existing ones, you can even create a
new category name. In that case, please send mail to the FreeBSD ports mailing list
<[email protected]> to propose a new category.
Note: There is no error checking for category names. make package will happily create a new
directory if you mistype the category name, so be careful!
MASTER_SITES
Record the directory part of the ftp/http-URL pointing at the original tarball in MASTER_SITES. Do not
forget the trailing slash (/)!
The make macros will try to use this specification for grabbing the distribution file with FETCH if they
cannot find it already on the system.
It is recommended that you put multiple sites on this list, preferably from different continents. This will
safeguard against wide-area network problems, and we are even planning to add support for
automatically determining the closest master site and fetching from there!
If the original tarball is part of one of the following popular archives: X-contrib, GNU, Perl CPAN, TeX
CTAN, or Linux Sunsite, you refer to those sites in an easy compact form using
MASTER_SITE_XCONTRIB, MASTER_SITE_GNU, MASTER_SITE_PERL_CPAN,
MASTER_SITE_TEX_CTAN, and MASTER_SITE_SUNSITE. Simply set MASTER_SITE_SUBDIR to the
path with in the archive. Here is an example:
MASTER_SITES= ${MASTER_SITE_XCONTRIB}
MASTER_SITE_SUBDIR= applications
74
Chapter 4. Installing Applications: The Ports collection
The user can also set the MASTER_SITE_* variables in /etc/make.conf to override our choices, and
use their favorite mirrors of these popular archives instead.
PATCHFILES
If your port requires some additional patches that are available by ftp or http, set PATCHFILES to the
names of the files and PATCH_SITES to the URL of the directory that contains them (the format is the
same as MASTER_SITES).
If the patch is not relative to the top of the source tree (i.e., WKRSRC) because it contains some extra
pathnames, set PATCH_DIST_STRIP accordingly. For instance, if all the pathnames in the patch have an
extra foozolix-1.0/ in front of the filenames, then set PATCH_DIST_STRIP=-p1.
Do not worry if the patches are compressed, they will be decompressed automatically if the filenames
end with .gz or .Z.
If the patch is distributed with some other files, such as documentation, in a gzipd tarball, you cannot just
use PATCHFILES. If that is the case, add the name and the location of the patch tarball to DISTFILES
and MASTER_SITES. Then, from the pre-patch target, apply the patch either by running the patch
command from there, or copying the patch file into the PATCHDIR directory and calling it patch-xx .
Note: Note the tarball will have been extracted alongside the regular source by then, so there is no
need to explicitly extract it if it is a regular gzipd or compressd tarball. If you do the latter, take extra
care not to overwrite something that already exists in that directory. Also do not forget to add a
command to remove the copied patch in the pre-clean target.
MAINTAINER
Set your mail-address here. Please. :)
For detailed description of the responsibility of maintainers, refer to MAINTAINER on Makefiles
section.
Dependencies
Many ports depend on other ports. There are five variables that you can use to ensure that all the required
bits will be on the users machine. There are also some pre-supported dependency variables for common
cases, plus a few more to control the behaviour of dependencies.
75
Chapter 4. Installing Applications: The Ports collection
LIB_DEPENDS
This variable specifies the shared libraries this port depends on. It is a list of lib:dir[:target] tuples
where lib is the name of the shared library, and dir is the directory in which to find it in case it is not
available, and target is the target to call in that directory. For example,
LIB_DEPENDS=
jpeg.9:${PORTSDIR}/graphics/jpeg:install
will check for a shared jpeg library with major version 9, and descend into the graphics/jpeg
subdirectory of your ports tree to build and install it if it is not found. The target part can be omitted if
it is equal to DEPENDS_TARGET (which defaults to install).
Note: The lib part is an argument given to ldconfig -r | grep -wF. There shall be no regular
expressions in this variable.
The dependency is checked twice, once from within the extract target and then from within the
install target. Also, the name of the dependency is put in to the package so that pkg_add will
automatically install it if it is not on the users system.
RUN_DEPENDS
This variable specifies executables or files this port depends on during run-time. It is a list of
path:dir[:target] tuples where path is the name of the executable or file, and dir is the directory
in which to find it in case it is not available, and target is the target to call in that directory. If path
starts with a slash (/), it is treated as a file and its existence is tested with test -e; otherwise, it is
assumed to be an executable, and which -s is used to determine if the program exists in the users
search path.
For example,
RUN_DEPENDS= ${PREFIX}/etc/innd:${PORTSDIR}/news/inn \
wish8.0:${PORTSDIR}/x11-toolkits/tk80
will check if the file or directory /usr/local/etc/innd exists, and build and install it from the
news/inn subdirectory of the ports tree if it is not found. It will also see if an executable called
wish8.0 is in your search path, and descend into the x11-toolkits/tk80 subdirectory of your ports
tree to build and install it if it is not found.
Note: In this case, innd is actually an executable; if an executable is in a place that is not expected
to be in a normal users search path, you should use the full pathname.
76
Chapter 4. Installing Applications: The Ports collection
The dependency is checked from within the install target. Also, the name of the dependency is put in
to the package so that pkg_add will automatically install it if it is not on the users system. The target
part can be omitted if it is the same DEPENDS_TARGET.
BUILD_DEPENDS
This variable specifies executables or files this port requires to build. Like RUN_DEPENDS, it is a list of
path:dir[:target] tuples. For example,
BUILD_DEPENDS=
unzip:${PORTSDIR}/archivers/unzip
will check for an executable called unzip, and descend into the archivers/unzip subdirectory of
your ports tree to build and install it if it is not found.
Note: build here means everything from extracting to compilation. The dependency is checked
from within the extract target. The target part can be omitted if it is the same as DEPENDS_TARGET
FETCH_DEPENDS
This variable specifies executables or files this port requires to fetch. Like the previous two, it is a list of
path:dir[:target] tuples. For example,
FETCH_DEPENDS=
ncftp2:${PORTSDIR}/net/ncftp2
will check for an executable called ncftp2, and descend into the net/ncftp2 subdirectory of your
ports tree to build and install it if it is not found.
The dependency is checked from within the fetch target. The target part can be omitted if it is the
same as DEPENDS_TARGET.
DEPENDS
If there is a dependency that does not fall into either of the above four categories, or your port requires to
have the source of the other port extracted in addition to having them installed, then use this variable.
This is a list of dir[:target], as there is nothing to check, unlike the previous four. The target part
can be omitted if it is the same as DEPENDS_TARGET.
77
Chapter 4. Installing Applications: The Ports collection
Notes on dependencies
As mentioned above, the default target to call when a dependency is required is DEPENDS_TARGET. It
defaults to install. This is a user variable; is is never defined in a ports Makefile. If your port needs
a special way to handle a dependency, use the :target part of the *_DEPENDS variables instead of
redefining DEPENDS_TARGET.
When you type make clean, its dependencies are automatically cleaned too. If you do not wish this to
happen, define the variable NOCLEANDEPENDS in your environment.
To depend on another port unconditionally, it is customary to use the string nonexistent as the first
field of BUILD_DEPENDS or RUN_DEPENDS. Use this only when you need to the to get to the source of
the other port. You can often save compilation time by specifying the target too. For instance
BUILD_DEPENDS= /nonexistent:${PORTSDIR}/graphics/jpeg:extract
Building mechanisms
If your package uses GNU make, set USE_GMAKE=yes. If your package uses configure, set
HAS_CONFIGURE=yes. If your package uses GNU configure, set GNU_CONFIGURE=yes (this implies
HAS_CONFIGURE). If you want to give some extra arguments to configure (the default argument list
-prefix=${PREFIX} for GNU configure and empty for non-GNU configure), set those extra
arguments in CONFIGURE_ARGS. If your package uses GNU autoconf, set USE_AUTOCONF=yes. This
implies GNU_CONFIGURE, and will cause autoconf to be run before configure.
78
Chapter 4. Installing Applications: The Ports collection
If your package is an X application that creates Makefiles from Imakefiles using imake, then set
USE_IMAKE=yes. This will cause the configure stage to automatically do an xmkmf -a. If the -a flag is
a problem for your port, set XMKMF=xmkmf. If the port uses imake but does not understand the
install.man target, NO_INSTALL_MANPAGES=yes should be set. In addition, the author of the
original port should be shot. :>
If your ports source Makefile has something else than all as the main build target, set ALL_TARGET
accordingly. Same goes for install and INSTALL_TARGET.
Special considerations
There are some more things you have to take into account when you create a port. This section explains
the most common of those.
ldconfig
If your port installs a shared library, add a post-install target to your Makefile that runs
${LDCONFIG} -m on the directory where the new library is installed (usually PREFIX/lib) to register it
into the shared library cache.
Also, add a matching @exec /sbin/ldconfig -m and @unexec /sbin/ldconfig -R pair to your
pkg/PLIST file so that a user who installed the package can start using the shared library immediately
and deinstallation will not cause the system to still believe the library is there. These lines should
immediately follow the line for the shared library itself, as in:
lib/libtvl80.so.1
@exec /sbin/ldconfig -m %D/lib
@unexec /sbin/ldconfig -R
Never, ever, ever add a line that says ldconfig without any arguments to your Makefile or
pkg/PLIST. This will reset the shared library cache to the contents of /usr/lib only, and will royally
screw up the users machine ("Help, xinit does not run anymore after I install this port!"). Anybody who
does this will be shot and cut in 65,536 pieces by a rusty knife and have is liver chopped out by a bunch
of crows and will eternally rot to death in the deepest bowels of hell (not necessarily in that order. . . )
ELF support
Since FreeBSD is moving to ELF shortly after 3.0-RELEASE, we need to convert many ports that build
shared libraries to support ELF. Complicating this task is that a 3.0 system can run as both ELF and
79
Chapter 4. Installing Applications: The Ports collection
a.out, and we wish to unofficially support the 2.2 as long as possible. Below are the guidelines on how to
convert a.out only ports to support both a.out and ELF compilation.
Some part of this list is only applicable during the conversion, but will be left here for awhile for
reference in case you have come across some old port you wish to upgrade.
Format
The ports tree will build packages in the format the machine is in. This means a.out for 2.2 and a.out or
ELF for 3.0 depending on what objformat returns. Also, once users move a.out libraries to a
subdirectory, building a.out libraries will be unsupported. (I.e., it may still work if you know what you
are doing, but you are on your own.)
Note: If a port only works for a.out, set BROKEN_ELF to a string describing the reason why. Such
ports will be skipped during a build on an ELF system.
PORTOBJFORMAT
bsd.port.mk will set PORTOBJFORMAT to aout or elf and export it in the environments
CONFIGURE_ENV, SCRIPTS_ENV and MAKE_ENV. (Its always going to be aout in
2.2-STABLE). It is also passed to PLIST_SUB as PORTOBJFORMAT=${PORTOBJFORMAT}. (See
comment on ldconfig lines below.)
The variable is set using this line in bsd.port.mk:
Ports make processes should use this variable to decide what to do. However, if the ports configure
script already automatically detects an ELF system, it is not necessary to refer to PORTOBJFORMAT.
80
Chapter 4. Installing Applications: The Ports collection
You need to install a symlink from libfoo.so to libfoo.so.N to make ELF linkers happy. Since it
should be listed in PLIST too, and it wont hurt in the a.out case (some ports even require the link for
dynamic loading), you should just make this link regardless of the setting of PORTOBJFORMAT.
LIB_DEPENDS
All port Makefiles are edited to remove minor numbers from LIB_DEPENDS, and also to have the regexp
support removed. (E.g., foo\\.1\\.\\(33|40\\) becomes foo.2.) They will be matched using
grep -wF.
PLIST
PLIST should contain the short (ELF) shlib names if the a.out minor number is zero, and the long (a.out)
names otherwise. bsd.port.mk will automatically add .0 to the end of short shlib lines if
PORTOBJFORMAT equals aout, and will delete the minor number from long shlib names if
PORTOBJFORMAT equals elf.
In cases where you really need to install shlibs with two versions on an ELF system or those with one
version on an a.out system (for instance, ports that install compatibility libraries for other operating
systems), define the variable NO_FILTER_SHLIBS. This will turn off the editing of PLIST mentioned in
the previous paragraph.
ldconfig
The ldconfig line in Makefiles should read:
81
Chapter 4. Installing Applications: The Ports collection
This is to ensure that the correct ldconfig will be called depending on the format of the package, not
the default format of the system.
MASTERDIR
If your port needs to build slightly different versions of packages by having a variable (for instance,
resolution, or paper size) take different values, create one subdirectory per package to make it easier for
users to see what to do, but try to share as many files as possible between ports. Typically you only need
a very short Makefile in all but one of the directories if you use variables cleverly. In the sole
Makefiles, you can use MASTERDIR to specify the directory where the rest of the files are. Also, use a
variable as part of PKGNAME so the packages will have different names.
This will be best demonstrated by an example. This is part of japanese/xdvi300/Makefile;
PKGNAME= ja-xdvi${RESOLUTION}-17
:
# default
RESOLUTION?= 300
.if ${RESOLUTION} != 118 && ${RESOLUTION} != 240 && \
${RESOLUTION} != 300 && ${RESOLUTION} != 400
@${ECHO} "Error: invalid value for RESOLUTION: \"${RESOLUTION}\""
@${ECHO} "Possible values are: 118, 240, 300 (default) and 400."
@${FALSE}
.endif
japanese/xdvi300 also has all the regular patches, package files, etc. If you type make there, it will
take the default value for the resolution (300) and build the port normally.
As for other resolutions, this is the entire xdvi118/Makefile;
RESOLUTION= 118
MASTERDIR= ${.CURDIR}/../xdvi300
.include ${MASTERDIR}/Makefile
82
Chapter 4. Installing Applications: The Ports collection
Manpages
The MAN[1-9LN] variables will automatically add any manpages to pkg/PLIST (this means you must
not list manpages in the PLISTsee generating PLIST for more). It also makes the install stage
automatically compress or uncompress manpages depending on the setting of NOMANCOMPRESS in
/etc/make.conf.
If your port tries to install multiple names for manpages using symlinks or hardlinks, you must use the
MLINKS variable to identify these. The link installed by your port will be destroyed and recreated by
bsd.port.mk to make sure it points to the correct file. Any manpages listed in MLINKS must not be
listed in the PLIST.
To specify whether the manpages are compressed upon installation, use the MANCOMPRESSED variable.
This variable can take three values, yes, no and maybe. yes means manpages are already installed
compressed, no means they are not, and maybe means the software already respects the value of
83
Chapter 4. Installing Applications: The Ports collection
MAN1= foo.1
MAN3= bar.3
MAN4= baz.4
MLINKS= foo.1 alt-name.8
MANLANG= "" ja
MAN3PREFIX= ${PREFIX}/share/foobar
MANCOMPRESSED= yes
${PREFIX}/man/man1/foo.1.gz
${PREFIX}/man/ja/man1/foo.1.gz
${PREFIX}/share/foobar/man/man3/bar.3.gz
${PREFIX}/share/foobar/man/ja/man3/bar.3.gz
${PREFIX}/man/man4/baz.4.gz
${PREFIX}/man/ja/man4/baz.4.gz
84
Chapter 4. Installing Applications: The Ports collection
REQUIRES_MOTIF
If your port requires Motif, define this variable in the Makefile. This will prevent people who do not own
a copy of Motif from even attempting to build it.
MOTIFLIB
This variable will be set by bsd.port.mk to be the appropriate reference to the Motif library. Please
patch the source to use this wherever the Motif library is referenced in the Makefile or Imakefile.
There are two common cases:
If the port refers to the Motif library as -lXm in its Makefile or Imakefile, simply substitute
${MOTIFLIB} for it.
X11 fonts
If your port installs fonts for the X Window system, put them in X11BASE/lib/X11/fonts/local.
This directory is new to XFree86 release 3.3.3. If it does not exist, please create it, and print out a
message urging the user to update their XFree86 to 3.3.3 or newer, or at least add this directory to the
font path in /etc/XF86Config.
Info files
The new version of texinfo (included in 2.2.2-RELEASE and onwards) contains a utility called
install-info to add and delete entries to the dir file. If your port installs any info documents, please
follow this instructions so your port/package will correctly update the users PREFIX/info/dir file.
(Sorry for the length of this section, but is it imperative to weave all the info files together. If done
correctly, it will produce a beautiful listing, so please bear with me!
First, this is what you (as a porter) need to know
% install-info -help
install-info [OPTION]... [INFO-FILE [DIR-FILE]]
85
Chapter 4. Installing Applications: The Ports collection
Options:
-delete Delete existing entries in INFO-FILE;
dont insert any new entries.
:
-entry=TEXT Insert TEXT as an Info directory entry.
:
-section=SEC Put this files entries in section SEC of the directory. :
Note: This program will not actually install info files; it merely inserts or deletes entries in the dir file.
Heres a seven-step procedure to convert ports to use install-info. I will use editors/emacs as an
example.
1. Look at the texinfo sources and make a patch to insert @dircategory and @direntry statements
to files that do not have them. This is part of my patch:
-- ./man/vip.texi.org Fri Jun 16 15:31:11 1995
+++ ./man/vip.texi Tue May 20 01:28:33 1997
@@ -2,6 +2,10 @@
@setfilename ../info/vip
@settitle VIP
+@dircategory The Emacs editor and associated tools
+@direntry
+* VIP: (vip). A VI-emulation for Emacs.
+@end direntry
@iftex
@finalout
:
The format should be self-explanatory. Many authors leave a dir file in the source tree that contains
all the entries you need, so look around before you try to write your own. Also, make sure you look
into related ports and make the section names and entry indentations consistent (we recommend that
all entry text start at the 4th tab stop).
Note: Note that you can put only one info entry per file because of a bug in install-info
-delete that deletes only the first entry if you specify multiple entries in the <@direntry>
section.
86
Chapter 4. Installing Applications: The Ports collection
You can give the dir entries to install-info as arguments (-section and -entry) instead of
patching the texinfo sources. I do not think this is a good idea for ports because you need to
duplicate the same information in three places (Makefile and @exec/@unexec of PLIST; see
below). However, if you have a Japanese (or other multibyte encoding) info files, you will have to
use the extra arguments to install-info because makeinfo cannot handle those texinfo sources.
(See Makefile and PLIST of japanese/skk for examples on how to do this).
2. Go back to the port directory and do a make clean; make and verify that the info files are
regenerated from the texinfo sources. Since the texinfo sources are newer than the info files, they
should be rebuilt when you type make; but many Makefiles do not include correct dependencies
for info files. In emacs case, I had to patch the main Makefile.in so it will descend into the man
subdirectory to rebuild the info pages.
-- ./Makefile.in.org Mon Aug 19 21:12:19 1996
+++ ./Makefile.in Tue Apr 15 00:15:28 1997
@@ -184,7 +184,7 @@
# Subdirectories to make recursively. lisp is not included
# because the compiled lisp files are part of the distribution
# and you cannot remake them without installing Emacs first.
-SUBDIR = lib-src src
+SUBDIR = lib-src src man
+all: info
info: $(INFO_TARGETS)
dvi: $(DVI_TARGETS)
The second hunk was necessary because the default target in the man subdir is called info, while
the main Makefile wants to call all. I also deleted the installation of the info info file because
we already have one with the same name in /usr/share/info (that patch is not shown here).
3. If there is a place in the Makefile that is installing the dir file, delete it. Your port may not be
doing it. Also, remove any commands that are otherwise mucking around with the dir file.
-- ./Makefile.in.org Mon Aug 19 21:12:19 1996
+++ ./Makefile.in Mon Apr 14 23:38:07 1997
@@ -368,14 +368,8 @@
87
Chapter 4. Installing Applications: The Ports collection
88
Chapter 4. Installing Applications: The Ports collection
.include <bsd.port.mk>
Do not use anything other than /usr/share/info/dir and the above command to create a new
info file. In fact, I would add the first three lines of the above patch to bsd.port.mk if you (the
porter) would not have to do it in PLIST by yourself anyway.
6. Edit PLIST and add equivalent @exec statements and also @unexec for pkg_delete. You do not
need to delete info/dir with @unexec.
Index: pkg/PLIST
===================================================================
RCS file: /usr/cvs/ports/editors/emacs/pkg/PLIST,v
retrieving revision 1.15
diff -u -r1.15 PLIST
-- PLIST 1997/03/04 08:04:00 1.15
+++ PLIST 1997/05/20 10:25:12 1.17
@@ -16,7 +14,15 @@
man/man1/etags.1.gz
man/man1/ctags.1.gz
+@unexec install-info -delete %D/info/emacs %D/info/dir
:
+@unexec install-info -delete %D/info/ccmode %D/info/dir
info/cl
info/cl-1
@@ -87,6 +94,18 @@
info/viper-3
info/viper-4
+@exec [ -f %D/info/dir ] || sed -
ne 1,/Menu:/p /usr/share/info/dir > %D/info/dir
+@exec install-info %D/info/emacs %D/info/dir
89
Chapter 4. Installing Applications: The Ports collection
:
+@exec install-info %D/info/ccmode %D/info/dir
libexec/emacs/19.34/i386-freebsd/cvtmail
libexec/emacs/19.34/i386-freebsd/digest-doc
Note: The @unexec install-info -delete commands have to be listed before the info files
themselves so they can read the files. Also, the @exec install-info commands have to be
after the info files and the @exec command that creates the the dir file.
7. Test and admire your work. :). Check the dir file before and after each step.
MESSAGE
If you need to display a message to the installer, you may place the message in pkg/MESSAGE. This
capability is often useful to display additional installation steps to be taken after a pkg_add or to display
licensing information.
Note: The pkg/MESSAGE file does not need to be added to pkg/PLIST. Also, it will not get
automatically printed if the user is using the port, not the package, so you should probably display it
from the post-install target yourself.
INSTALL
If your port needs to execute commands when the binary package is installed with pkg_add you can do
this via the pkg/INSTALL script. This script will automatically be added to the package, and will be run
twice by pkg_add. The first time will as INSTALL ${PKGNAME} PRE-INSTALL and the second time as
INSTALL ${PKGNAME} POST-INSTALL. $2 can be tested to determine which mode the script is being
run in. The PKG_PREFIX environmental variable will be set to the package installation directory. See
pkg_add(1) for additional information.
Note: This script is not run automatically if you install the port with make install. If you are
depending on it being run, you will have to explicitly call it from your ports Makefile.
90
Chapter 4. Installing Applications: The Ports collection
REQ
If your port needs to determine if it should install or not, you can create a pkg/REQ requirements
script. It will be invoked automatically at installation/deinstallation time to determine whether or not
installation/deinstallation should proceed.
OCTAVE_VERSION= 2.0.13
PLIST_SUB= OCTAVE_VERSION=${OCTAVE_VERSION}
in the Makefile and use %%OCTAVE_VERSION%% wherever the version shows up in PLIST. That way,
when you upgrade the port, you will not have to change dozens (or in some cases, hundreds) of lines in
the PLIST.
This substitution (as well as addition of any man pages) will be done between the do-install and
post-install targets, by reading from PLIST and writing to TMPPLIST (default:
WRKDIR/.PLIST.mktmp). So if your port builds PLIST on the fly, do so in or before do-install.
Also, if your port needs to edit the resulting file, do so in post-install to a file named TMPPLIST.
91
Chapter 4. Installing Applications: The Ports collection
Please change these variables rather than overriding PKG_ARGS. If you change PKG_ARGS, those files
will not correctly be installed in /var/db/pkg upon install from a port.
Licensing Problems
Some software packages have restrictive licenses or can be in violation to the law (PKPs patent on
public key crypto, ITAR (export of crypto software) to name just two of them). What we can do with
them varies a lot, depending on the exact wordings of the respective licenses.
Note: It is your responsibility as a porter to read the licensing terms of the software and make sure
that the FreeBSD project will not be held accountable of violating them by redistributing the source or
compiled binaries either via ftp or CD-ROM. If in doubt, please contact the FreeBSD ports mailing list
<[email protected]>.
There are two variables you can set in the Makefile to handle the situations that arise frequently:
1. If the port has a do not sell for profit type of license, set the variable NO_CDROM to a string
describing the reason why. We will make sure such ports will not go into the CD-ROM come release
time. The distfile and package will still be available via ftp.
2. If the resulting package needs to be built uniquely for each site, or the resulting binary package
cannot be distributed due to licensing; set the variable NO_PACKAGE to a string describing the reason
why. We will make sure such packages will not go on the ftp site, nor into the CD-ROM come
release time. The distfile will still be included on both however.
3. If the port has legal restrictions on who can use it (e.g., crypto stuff) or has a no commercial use
license, set the variable RESTRICTED to be the string describing the reason why. For such ports, the
distfiles/packages will not be available even from our ftp sites.
92
Chapter 4. Installing Applications: The Ports collection
Note: The GNU General Public License (GPL), both version 1 and 2, should not be a problem for
ports.
Note: If you are a committer, make sure you update the ports/LEGAL file too.
Upgrading
When you notice that a port is out of date compared to the latest version from the original authors, first
make sure you have the latest port. You can find them in the ports/ports-current directory of the
ftp mirror sites. You may also use CVSup to keep your whole ports collection up-to-date, as described in
the section called CVSup Configuration in Chapter 18.
The next step is to send a mail to the maintainer, if one is listed in the ports Makefile. That person may
already be working on an upgrade, or have a reason to not upgrade the port right now (because of, for
example, stability problems of the new version).
If the maintainer asks you to do the upgrade or there is not any such person to begin with, please make
the upgrade and send the recursive diff (either unified or context diff is fine, but port committers appear
to prefer unified diff more) of the new and old ports directories to us (e.g., if your modified port directory
is called superedit and the original as in our tree is superedit.bak, then send us the result of diff
-ruN superedit.bak superedit). Please examine the output to make sure all the changes make
sense. The best way to send us the diff is by including it to send-pr(1) (category ports). Please mention
any added or deleted files in the message, as they have to be explicitly specified to CVS when doing a
commit. If the diff is more than about 20KB, please compress and uuencode it; otherwise, just include it
in as is in the PR.
Note: Once again, please use diff(1) and not shar(1) to send updates to existing ports!
93
Chapter 4. Installing Applications: The Ports collection
Strip Binaries
Do strip binaries. If the original source already strips the binaries, fine; otherwise you should add a
post-install rule to to it yourself. Here is an example;
post-install:
strip ${PREFIX}/bin/xdl
Use the file(1) command on the installed executable to check whether the binary is stripped or not. If it
does not say not stripped, it is stripped.
INSTALL_* macros
Do use the macros provided in bsd.port.mk to ensure correct modes and ownership of files in your
own *-install targets. They are:
WRKDIR
Do not write anything to files outside WRKDIR. WRKDIR is the only place that is guaranteed to be writable
during the port build (see compiling ports from CDROM for an example of building ports from a
read-only tree). If you need to modify some file in PKGDIR, do so by redefining a variable, not by writing
over it.
WRKDIRPREFIX
Make sure your port honors WRKDIRPREFIX. Most ports do not have to worry about this. In particular, if
you are referring to a WRKDIR of another port, note that the correct location is
WRKDIRPREFIXPORTSDIR/subdir/name/work not PORTSDIR/subdir/name/work or
.CURDIR/../../subdir/name/work or some such.
94
Chapter 4. Installing Applications: The Ports collection
Also, if you are defining WRKDIR yourself, make sure you prepend ${WKRDIRPREFIX}${.CURDIR} in
the front.
to the proper place in the .c file. We believe that every system that defines these two symbols has
sys/param.h. If you find a system that does not, we would like to know. Please send mail to the
FreeBSD ports mailing list <[email protected]>.
Another way is to use the GNU Autoconf style of doing this:
#ifdef HAVE_SYS_PARAM_H
#include <sys/param.h>
#endif
Do not forget to add -DHAVE_SYS_PARAM_H to the CFLAGS in the Makefile for this method.
Once you have sys/param.h included, you may use:
to detect if the code is being compiled on a 4.3 Net2 code base or newer (e.g. FreeBSD 1.x, 4.3/Reno,
NetBSD 0.9, 386BSD, BSD/386 1.1 and below).
Use:
to detect if the code is being compiled on a 4.4 code base or newer (e.g. FreeBSD 2.x, 4.4, NetBSD 1.0,
BSD/386 2.0 or above).
95
Chapter 4. Installing Applications: The Ports collection
The value of the BSD macro is 199506 for the 4.4BSD-Lite2 code base. This is stated for informational
purposes only. It should not be used to distinguish between versions of FreeBSD based only on 4.4-Lite
vs. versions that have merged in changes from 4.4-Lite2. The __FreeBSD__ macro should be used
instead.
Use sparingly:
__FreeBSD__ is defined in all versions of FreeBSD. Use it if the change you are making only affects
FreeBSD. Porting gotchas like the use of sys_errlist[] vs strerror() are Berkeleyisms, not
FreeBSD changes.
In FreeBSD 2.x, __FreeBSD__ is defined to be 2. In earlier versions, it is 1. Later versions will bump
it to match their major version number.
If you need to tell the difference between a FreeBSD 1.x system and a FreeBSD 2.x or 3.x system,
usually the right answer is to use the BSD macros described above. If there actually is a FreeBSD
specific change (such as special shared library options when using ld) then it is OK to use
__FreeBSD__ and #if __FreeBSD__ > 1 to detect a FreeBSD 2.x and later system. If you need
more granularity in detecting FreeBSD systems since 2.0-RELEASE you can use the following:
#if __FreeBSD__ >= 2
#include <osreldate.h>
# if __FreeBSD_version >= 199504
/* 2.0.5+ release specific code here */
# endif
#endif
Release __FreeBSD_version
2.0-RELEASE 119411
2.1-CURRENTs 199501, 199503
2.0.5-RELEASE 199504
2.2-CURRENT before 2.1 199508
2.1.0-RELEASE 199511
2.2-CURRENT before 2.1.5 199512
2.1.5-RELEASE 199607
2.2-CURRENT before 2.1.6 199608
2.1.6-RELEASE 199612
2.1.7-RELEASE 199612
2.2-RELEASE 220000
2.2.1-RELEASE 220000 (no change)
96
Chapter 4. Installing Applications: The Ports collection
97
Chapter 4. Installing Applications: The Ports collection
Note: Note that 2.2-STABLE sometimes identifies itself as 2.2.5-STABLE after the
2.2.5-RELEASE. The pattern used to be year followed by the month, but we decided to change it to a
more straightforward major/minor system starting from 2.2. This is because the parallel development
on several branches made it infeasible to classify the releases simply by their real release dates. If
you are making a port now, you do not have to worry about old -CURRENTs; they are listed here just
for your reference.
In the hundreds of ports that have been done, there have only been one or two cases where
__FreeBSD__ should have been used. Just because an earlier port screwed up and used it in the wrong
place does not mean you should do so too.
Note: You need to include either the pre.mk/post.mk pair or bsd.port.mk only; do not mix these
two.
bsd.port.pre.mk only defines a few variables, which can be used in tests in the Makefile,
bsd.port.post.mk defines the rest.
Here are some important variables defined in bsd.port.pre.mk (this is not the complete list, please
read bsd.port.mk for the complete list).
Variable Description
ARCH The architecture as returned by uname -m (e.g.,
i386)
98
Chapter 4. Installing Applications: The Ports collection
Note: If you have to define the variables USE_IMAKE, USE_X_PREFIX, or MASTERDIR, do so before
including bsd.port.pre.mk.
Here are some examples of things you can write after bsd.port.pre.mk;
# software already makes link for ELF, but not for a.out
post-install:
.if ${PORTOBJFORMAT} == "aout"
${LN} -sf liblinpack.so.1.0 ${PREFIX}/lib/liblinpack.so
.endif
99
Chapter 4. Installing Applications: The Ports collection
post-install target.
Create a new directory for your port. The directory name should reflect what the port is. This usually
means PKGNAME minus the version part. However, if you think the user might want different versions of
the port to be installed at the same time, you can use the whole PKGNAME.
Make the installation dependent to the variable NOPORTDOCS so that users can disable it in
/etc/make.conf, like this:
post-install:
.if !defined(NOPORTDOCS)
${MKDIR}${PREFIX}/share/doc/xv
${INSTALL_MAN} ${WRKSRC}/docs/xvdocs.ps ${PREFIX}/share/doc/xv
.endif
Do not forget to add them to pkg/PLIST too! (Do not worry about NOPORTDOCS here; there is currently
no way for the packages to read variables from /etc/make.conf.)
Also you can use the pkg/MESSAGE file to display messages upon installation. See the using
pkg/MESSAGE section for details.
DIST_SUBDIR
Do not let your port clutter /usr/ports/distfiles. If your port requires a lot of files to be fetched, or
contains a file that has a name that might conflict with other ports (e.g., Makefile), set DIST_SUBDIR
to the name of the port (PKGNAME without the version part should work fine). This will change DISTDIR
from the default /usr/ports/distfiles to /usr/ports/distfiles/DIST_SUBDIR, and in effect
puts everything that is required for your port into that subdirectory.
It will also look at the subdirectory with the same name on the backup master site at ftp.FreeBSD.org.
(Setting DISTDIR explicitly in your Makefile will not accomplish this, so please use DIST_SUBDIR.)
Note: This does not affect the MASTER_SITES you define in your Makefile.
Package information
Do include package information, i.e. COMMENT, DESCR, and PLIST, in pkg.
100
Chapter 4. Installing Applications: The Ports collection
Note: Note that these files are not used only for packaging anymore, and are mandatory now, even if
NO_PACKAGE is set.
RCS strings
Do not put RCS strings in patches. CVS will mangle them when we put the files into the ports tree, and
when we check them out again, they will come out different and the patch will fail. RCS strings are
surrounded by dollar ($) signs, and typically start with $Id or $RCS.
Recursive diff
Using the recurse (-r) option to diff to generate patches is fine, but please take a look at the resulting
patches to make sure you do not have any unnecessary junk in there. In particular, diffs between two
backup files, Makefiles when the port uses Imake or GNU configure, etc., are unnecessary and
should be deleted. If you had to edit configure.in and run autoconf to regenerate configure, do
not take the diffs of configure (it often grows to a few thousand lines!); define USE_AUTOCONF=yes
and take the diffs of configure.in.
Also, if you had to delete a file, then you can do it in the post-extract target rather than as part of the
patch. Once you are happy with the resulting diff, please split it up into one source file per patch file.
PREFIX
Do try to make your port install relative to PREFIX. (The value of this variable will be set to LOCALBASE
(default /usr/local), unless USE_X_PREFIX or USE_IMAKE is set, in which case it will be X11BASE
(default /usr/X11R6).)
Not hard-coding /usr/local or /usr/X11R6 anywhere in the source will make the port much more
flexible and able to cater to the needs of other sites. For X ports that use imake, this is automatic;
otherwise, this can often be done by simply replacing the occurrences of /usr/local (or /usr/X11R6
for X ports that do not use imake) in the various scripts/Makefiles in the port to read PREFIX, as this
variable is automatically passed down to every stage of the build and install processes.
Do not set USE_X_PREFIX unless your port truly require it (i.e., it links against X libs or it needs to
reference files in X11BASE).
The variable PREFIX can be reassigned in your Makefile or in the users environment. However, it is
strongly discouraged for individual ports to set this variable explicitly in the Makefiles.
Also, refer to programs/files from other ports with the variables mentioned above, not explicit pathnames.
For instance, if your port requires a macro PAGER to be the full pathname of less, use the compiler flag:
101
Chapter 4. Installing Applications: The Ports collection
-DPAGER=\"${PREFIX}/bin/less\"
or
-DPAGER=\"${LOCALBASE}/bin/less\"
Subdirectories
Try to let the port put things in the right subdirectories of PREFIX. Some ports lump everything and put it
in the subdirectory with the ports name, which is incorrect. Also, many ports put everything except
binaries, header files and manual pages in the a subdirectory of lib, which does not bode well with the
BSD paradigm. Many of the files should be moved to one of the following: etc (setup/configuration
files), libexec (executables started internally), sbin (executables for superusers/managers), info
(documentation for info browser) or share (architecture independent files). See man hier(7) for details,
the rules governing /usr pretty much apply to /usr/local too. The exception are ports dealing with
USENET news. They may use PREFIX/news as a destination for their files.
:
lib/X11/oneko/pixmaps/cat.xpm
lib/X11/oneko/sounds/cat.au
:
@dirrm lib/X11/oneko/pixmaps
@dirrm lib/X11/oneko/sounds
@dirrm lib/X11/oneko
However, sometimes @dirrm will give you errors because other ports also share the same subdirectory.
You can call rmdir from @unexec to remove only empty directories without warning.
This will neither print any error messages nor cause pkg_delete to exit abnormally even if
PREFIX/share/doc/gimp is not empty due to other ports installing some files in there.
102
Chapter 4. Installing Applications: The Ports collection
UIDs
If your port requires a certain user to be on the installed system, let the pkg/INSTALL script call pw to
create it automatically. Look at net/cvsup-mirror for an example.
If your port must use the same user/group ID number when it is installed a binary package as when it was
compiled, then you must choose a free UID from 50 to 99 and register it below. Look at japanese/Wnn
for an example.
Make sure you do not use a UID already used by the system or other ports. This is the current list of
UIDs between 50 and 99.
Please include a notice when you submit a port (or an upgrade) that reserves a new UID or GID in this
range. This allows us to keep the list of reserved IDs up to date.
Do things rationally
The Makefile should do things simply and reasonably. If you can make it a couple of lines shorter or
more readable, then do so. Examples include using a make .if construct instead of a shell if construct,
not redefining do-extract if you can redefine EXTRACT* instead, and using GNU_CONFIGURE instead
of CONFIGURE_ARGS += -prefix=${PREFIX}.
103
Chapter 4. Installing Applications: The Ports collection
Respect CFLAGS
The port should respect the CFLAGS variable. If it does not, please add NO_PACKAGE=ignores cflags
to the Makefile.
Configuration files
If your port requires some configuration files in PREFIX/etc, do not just install them and list them in
pkg/PLIST. That will cause pkg_delete to delete files carefully edited by the user and a new
installation to wipe them out.
Instead, install sample files with a suffix (filename.sample will work well) and print out a message
pointing out that the user has to copy and edit the file before the software can be made to work.
Portlint
Do check your work with portlint before you submit or commit it.
Feedback
Do send applicable changes/patches to the original author/maintainer for inclusion in next release of the
code. This will only make your job that much easier for the next release.
Miscellanea
The files pkg/DESCR, pkg/COMMENT, and pkg/PLIST should each be double-checked. If you are
reviewing a port and feel they can be worded better, do so.
Do not copy more copies of the GNU General Public License into our system, please.
Please be careful to note any legal issues! Do not let us illegally distribute software!
104
Chapter 4. Installing Applications: The Ports collection
A Sample Makefile
Here is a sample Makefile that you can use to create a new port. Make sure you remove all the extra
comments (ones between brackets)!
It is recommended that you follow this format (ordering of variables, empty lines between sections, etc.).
This format is designed so that the most important information is easy to locate. We recommend that you
use portlint to check the Makefile.
[section to describe the port itself and the master site - DISTNAME
is always first, followed by PKGNAME (if necessary), CATEGORIES,
and then MASTER_SITES, which can be followed by MASTER_SITE_SUBDIR.
After those, one of EXTRACT_SUFX or DISTFILES can be specified too.]
DISTNAME= xdvi
PKGNAME= xdvi-pl18
CATEGORIES= print
[do not forget the trailing slash ("/")!
if you are not using MASTER_SITE_* macros]
MASTER_SITES= ${MASTER_SITE_XCONTRIB}
MASTER_SITE_SUBDIR= applications
[set this if the source is not in the standard ".tar.gz" form]
EXTRACT_SUFX= .tar.Z
105
Chapter 4. Installing Applications: The Ports collection
privileges) who a user can contact for questions and bug reports - this
person should be the porter or someone who can forward questions to the
original porter reasonably promptly. If you really do not want to have
your address here, set it to "[email protected]".]
MAINTAINER= [email protected]
post-patch:
i need to do something after patch, great
pre-install:
and then some more stuff before installing, wow
106
Chapter 4. Installing Applications: The Ports collection
# touch PLIST
Next, create a new set of directories which your port can be installed, and install any dependencies.
If your port honours PREFIX (which it should) you can then install the port and create the package list.
You must also add any newly created directories to the packing list.
Finally, you need to tidy up the packing list by hand. I lied when I said this was all automated. Manual
pages should be listed in the ports Makefile under MANn, and not in the package list. User
configuration files should be removed, or installed as filename.sample. Any libraries installed by the
port should be listed as specified in the ldconfig section.
Package Names
The following are the conventions you should follow in naming your packages. This is to have our
package directory easy to scan, as there are already lots and lots of packages and users are going to turn
away if they hurt their eyes!
The package name should look like language-name-compiled.specifics-version.numbers.
If your DISTNAME does not look like that, set PKGNAME to something in that format.
1. FreeBSD strives to support the native language of its users. The language- part should be a two
letter abbreviation of the natural language defined by ISO-639 if the port is specific to a certain
language. Examples are ja for Japanese, ru for Russian, vi for Vietnamese, zh for Chinese, ko for
Korean and de for German.
107
Chapter 4. Installing Applications: The Ports collection
2. The name part should be all lowercases, except for a really large package (with lots of programs in
it). Things like XFree86 (yes there really is a port of it, check it out) and ImageMagick fall into this
category. Otherwise, convert the name (or at least the first letter) to lowercase. If the capital letters
are important to the name (for example, with one-letter names like R or V) you may use capital
letters at your discretion. There is a tradition of naming Perl 5 modules by prepending p5- and
converting the double-colon separator to a hyphen; for example, the Data::Dumper module
becomes p5-Data-Dumper. If the software in question has numbers, hyphens, or underscores in its
name, you may include them as well (like kinput2).
3. If the port can be built with different hardcoded defaults (usually part of the directory name in a
family of ports), the -compiled.specifics part should state the compiled-in defaults (the
hyphen is optional). Examples are papersize and font units.
4. The version string should be a period-separated list of integers and single lowercase alphabetics.
The only exception is the string pl (meaning patchlevel), which can be used only when there are
no major and minor version numbers in the software.
Here are some (real) examples on how to convert a DISTNAME into a suitable PKGNAME:
108
Chapter 4. Installing Applications: The Ports collection
If there is absolutely no trace of version information in the original source and it is unlikely that the
original author will ever release another version, just set the version string to 1.0 (like the piewm
example above). Otherwise, ask the original author or use the date string (yy.mm.dd ) as the version.
Categories
As you already know, ports are classified in several categories. But for this to work, it is important that
porters and users understand what each category and how we decide what to put in each category.
Note: For non-virtual categories, you will find a one-line description in the pkg/COMMENT file in that
subdirectory (e.g., archivers/pkg/COMMENT).
Category Description
afterstep* Ports to support AfterStep window manager
archivers Archiving tools.
astro Astronomical ports.
audio Sound support.
benchmarks Benchmarking utilities.
biology Biology-related software.
cad Computer aided design tools.
chinese Chinese language support.
comms Communication software. Mostly software to talk
to your serial port.
converters Character code converters.
databases Databases.
deskutils Things that used to be on the desktop before
computers were invented.
109
Chapter 4. Installing Applications: The Ports collection
110
Chapter 4. Installing Applications: The Ports collection
111
Chapter 4. Installing Applications: The Ports collection
Language specific categories always come first. For example, if your port installs Japanese X11 fonts,
then your CATEGORIES line would read japanese x11-fonts.
Specific categories win over less-specific ones. For instance, an HTML editor should be listed as www
editors, not the other way around. Also, you do not need to list net when the port belongs to either
of irc, mail, mbone, news, security, or www.
x11 is used as a secondary category only when the primary category is a natural language. In
particular, you should not put x11 in the category line for X applications.
If your port truly does not belong anywhere else, put it in misc.
If you are not sure about the category, please put a comment to that effect in your send-pr submission
so we can discuss it before import it. (If you are a committer, send a note FreeBSD ports mailing list
<[email protected]> so we can discuss it firsttoo often new ports are imported to a
wrong category only to be moved right away.)
112
Chapter 4. Installing Applications: The Ports collection
113
II. System Administration
114
Chapter 5. Configuring the FreeBSD Kernel
Contributed by Jake Hamby <[email protected]>. 6 October 1995.
This large section of the handbook discusses the basics of building your own custom kernel for
FreeBSD. This section is appropriate for both novice system administrators and those with advanced
Unix experience.
It will take less time to boot because it does not have to spend time probing for hardware which you do
not have.
A custom kernel often uses less memory, which is important because the kernel is the one process
which must always be present in memory, and so all of that unused code ties up pages of RAM that
your programs would otherwise be able to use. Therefore, on a system with limited RAM, building a
custom kernel is of critical importance.
Finally, there are several kernel options which you can tune to fit your needs, and device driver support
for things like sound cards which you can include in your kernel but are not present in the GENERIC
kernel.
115
Chapter 5. Configuring the FreeBSD Kernel
Note: If there is not a /usr/src/sys directory on your system, then the kernel source has not been
been installed. The easiest way to do this is by running /stand/sysinstall as root, choosing
Configure, then Distributions, then src, then sys.
Next, move to the i386/conf directory and copy the GENERIC configuration file to the name you want
to give your kernel. For example:
# cd /usr/src/sys/i386/conf
# cp GENERIC MYKERNEL
Traditionally, this name is in all capital letters and, if you are maintaining multiple FreeBSD machines
with different hardware, it is a good idea to name it after your machines hostname. We will call it
MYKERNEL for the purpose of this example.
Note: You must execute these and all of the following commands under the root account or you will
get permission denied errors.
Now, edit MYKERNEL with your favorite text editor. If you are just starting out, the only editor available
will probably be vi, which is too complex to explain here, but is covered well in many books in the
bibliography. However, FreeBSD does offer an easier editor called ee which, if you are a beginner,
should be your editor of choice. Feel free to change the comment lines at the top to reflect your
configuration or the changes you have made to differentiate it from GENERIC.
If you have build a kernel under SunOS or some other BSD operating system, much of this file will be
very familiar to you. If you are coming from some other operating system such as DOS, on the other
hand, the GENERIC configuration file might seem overwhelming to you, so follow the descriptions in the
Configuration File section slowly and carefully.
Note: If you are trying to upgrade your kernel from an older version of FreeBSD, you will probably
have to get a new version of config(8) from the same place you got the new kernel sources. It is
located in /usr/src/usr.sbin, so you will need to download those sources as well. Re-build and
install it before running the next commands.
When you are finished, type the following to compile and install your kernel:
# /usr/sbin/config MYKERNEL
# cd ../../compile/MYKERNEL
# make depend
# make
# make install
The new kernel will be copied to the root directory as /kernel and the old kernel will be moved to
/kernel.old. Now, shutdown the system and reboot to use your kernel. In case something goes wrong,
116
Chapter 5. Configuring the FreeBSD Kernel
there are some troubleshooting instructions at the end of this document. Be sure to read the section
which explains how to recover in case your new kernel does not boot.
Note: If you have added any new devices (such as sound cards) you may have to add some device
nodes to your /dev directory before you can use them.
Quoting numbers: In all versions of FreeBSD up to and including 3-stable, config(8) required that
any strings in the configuration file that contained numbers used as text had to be enclosed in double
quotes.
Where numbers are used as numbers, as in maxusers 64, the quotation marks are not required.
This requirement was removed in FreeBSD-current (the 4.0 release candidate).
The examples here include the quote marks ("). If you are building a kernel on a -current system you
should omit them.
117
Chapter 5. Configuring the FreeBSD Kernel
Mandatory Keywords
These keywords are required in every kernel you build.
machine arch
The first keyword is machine, which, since FreeBSD only runs on Intel 386 (and compatible) chips
and DEC Alpha processors, will be either i386 or alpha.
cpu "cpu_type"
The next keyword is cpu, which includes support for each CPU supported by FreeBSD. The
possible values of cpu_type for i386 systems include:
I386_CPU
I486_CPU
I586_CPU
I686_CPU
The values available for cpu_type for Alpha systems include:
EV4
EV5
Multiple instances of the cpu line may be present with different values of cpu_type as are present
in the GENERIC kernel. For a custom kernel, it is best to specify only the cpu you have. If, for
example, you have an Intel Pentium, use I586_CPU for cpu_type.
ident machine_name
Next, we have ident, which is the identification of the kernel. You should change this from
GENERIC to whatever you named your kernel, in this example, MYKERNEL. The value you put in
ident will print when you boot up the kernel, so it is useful to give a kernel a different name if you
want to keep it separate from your usual kernel (if you want to build an experimental kernel, for
example). Note that, as with machine and cpu, enclose your kernels name in quotation marks if it
contains any numbers.
Since this name is passed to the C compiler as a -D switch, do not use names like DEBUG, or
something that could be confused with another machine or CPU name, like vax.
118
Chapter 5. Configuring the FreeBSD Kernel
maxusers number
This file sets the size of a number of important system tables. This number is supposed to be
roughly equal to the number of simultaneous users you expect to have on your machine. However,
under normal circumstances, you will want to set maxusers to at least 4, especially if you are using
the X Window System or compiling software. The reason is that the most important table set by
maxusers is the maximum number of processes, which is set to 20 + 16 * maxusers, so if you
set maxusers to 1, then you can only have 36 simultaneous processes, including the 18 or so that
the system starts up at boot time, and the 15 or so you will probably create when you start the X
Window System. Even a simple task like reading a man page will start up nine processes to filter,
decompress, and view it. Setting maxusers to 4 will allow you to have up to 84 simultaneous
processes, which should be enough for anyone. If, however, you see the dreaded proc table full error
when trying to start another program, or are running a server with a large number of simultaneous
users (like Walnut Creek CDROMs FTP site), you can always increase this number and rebuild.
Note: maxuser does not limit the number of users which can log into your machine. It simply
sets various table sizes to reasonable values considering the maximum number of users you
will likely have on your system and how many processes each of them will be running. One
keyword which does limit the number of simultaneous remote logins is pseudo-device pty 16.
General Options
These lines provide kernel support for various filesystems and other options.
options MATH_EMULATE
This line allows the kernel to simulate a math co-processor if your computer does not have one (386
or 486SX). If you have a Pentium, a 486DX, or a 386 or 486SX with a separate 387 or 487 chip,
you can comment this line out.
119
Chapter 5. Configuring the FreeBSD Kernel
Note: The normal math co-processor emulation routines that come with FreeBSD are not very
accurate. If you do not have a math co-processor, and you need the best accuracy, I
recommend that you change this option to GPL_MATH_EMULATE to use the superior GNU math
support, which is not included by default for licensing reasons.
options "COMPAT_43"
Compatibility with 4.3BSD. Leave this in; some programs will act strangely if you comment this
out.
options BOUNCE_BUFFERS
ISA devices and EISA devices operating in an ISA compatibility mode can only perform DMA
(Direct Memory Access) to memory below 16 megabytes. This option enables such devices to work
in systems with more than 16 megabytes of memory.
options UCONSOLE
Allow users to grab the console, useful for X Windows. For example, you can create a console
xterm by typing xterm -C, which will display any write, talk, and other messages you receive,
as well as any console messages sent by the kernel.
options SYSVSHM
This option provides for System V shared memory. The most common use of this is the XSHM
extension in X Windows, which many graphics-intensive programs (such as the movie player
XAnim, and Linux DOOM) will automatically take advantage of for extra speed. If you use the X
Window System, you will definitely want to include this.
options SYSVSEM
Support for System V semaphores. Less commonly used but only adds a few hundred bytes to the
kernel.
options SYSVMSG
Support for System V messages. Again, only adds a few hundred bytes to the kernel.
Note: The ipcs(1) command will tell will list any processes using each of these System V
facilities.
120
Chapter 5. Configuring the FreeBSD Kernel
Filesystem Options
These options add support for various filesystems. You must include at least one of these to support the
device you boot from; typically this will be FFS if you boot from a hard drive, or NFS if you are booting
a diskless workstation from Ethernet. You can include other commonly-used filesystems in the kernel,
but feel free to comment out support for filesystems you use less often (perhaps the MS-DOS
filesystem?), since they will be dynamically loaded from the Kernel Module directory /modules the first
time you mount a partition of that type.
options FFS
The basic hard drive filesystem; leave it in if you boot from the hard disk.
options NFS
Network Filesystem. Unless you plan to mount partitions from a Unix file server over Ethernet, you
can comment this out.
options MSDOSFS
MS-DOS Filesystem. Unless you plan to mount a DOS formatted hard drive partition at boot time,
you can safely comment this out. It will be automatically loaded the first time you mount a DOS
partition, as described above. Also, the excellent mtools software (in the ports collection) allows
you to access DOS floppies without having to mount and unmount them (and does not require
MSDOSFS at all).
options "CD9660"
ISO 9660 filesystem for CD-ROMs. Comment it out if you do not have a CD-ROM drive or only
mount data CDs occasionally (since it will be dynamically loaded the first time you mount a data
CD). Audio CDs do not need this filesystem.
options PROCFS
Process filesystem. This is a pretend filesystem mounted on /proc which allows programs like
ps(1) to give you more information on what processes are running.
options MFS
Memory-mapped file system. This is basically a RAM disk for fast storage of temporary files,
useful if you have a lot of swap space that you want to take advantage of. A perfect place to mount
an MFS partition is on the /tmp directory, since many programs store temporary data here. To
121
Chapter 5. Configuring the FreeBSD Kernel
mount an MFS RAM disk on /tmp, add the following line to /etc/fstab and then reboot or type
mount /tmp:
/dev/wd1s2b /tmp mfs rw 0 0
Note: Replace the /dev/wd1s2b with the name of your swap partition, which will be listed in
your /etc/fstab as follows:
/dev/wd1s2b none swap sw 0 0
Note: Also, the MFS filesystem can not be dynamically loaded, so you must compile it into your
kernel if you want to experiment with it.
options "EXT2FS"
Linuxs native file system. With ext2fs support you are able to read and write to Linux partitions.
This is useful if you dual-boot FreeBSD and Linux and want to share data between the two systems.
options QUOTA
Enable disk quotas. If you have a public access system, and do not want users to be able to overflow
the /home partition, you can establish disk quotas for each user. Refer to the Disk Quotas section
for more information.
controller isa0
All PCs supported by FreeBSD have one of these. If you have an IBM PS/2 (Micro Channel
Architecture), then you cannot run FreeBSD at this time.
controller pci0
Include this if you have a PCI motherboard. This enables auto-detection of PCI cards and
gatewaying from the PCI to the ISA bus.
122
Chapter 5. Configuring the FreeBSD Kernel
controller fdc0
Floppy drive controller: fd0 is the A: floppy drive, and fd1 is the B: drive. ft0 is a QIC-80 tape
drive attached to the floppy controller. Comment out any lines corresponding to devices you do not
have.
Note: QIC-80 tape support requires a separate filter program called ft(8), see the manual page
for details.
controller wdc0
This is the primary IDE controller. wd0 and wd1 are the master and slave hard drive, respectively.
wdc1 is a secondary IDE controller where you might have a third or fourth hard drive, or an IDE
CD-ROM. Comment out the lines which do not apply (if you have a SCSI hard drive, you will
probably want to comment out all six lines, for example).
device wcd0
This device provides IDE CD-ROM support. Be sure to leave wdc0 uncommented, and wdc1 if you
have more than one IDE controller and your CD-ROM is on the second one card. To use this, you
must also include the line options ATAPI.
npx0 is the interface to the floating point math unit in FreeBSD, either the hardware co-processor or
the software math emulator. It is not optional.
device wt0 at isa? port 0x300 bio irq 5 drq 1 vector wtintr
123
Chapter 5. Configuring the FreeBSD Kernel
SCSI Controllers
The next ten or so lines include support for different kinds of SCSI controllers. Comment out all
except for the one(s) you have:
controller uha0 at isa? port "IO_UHA0" bio irq ? drq 5 vector uhaintr
UltraStor 14F and 34F
controller ahc0
Adaptec 274x/284x/294x
Adaptec 174x
controller aha0 at isa? port "IO_AHA0" bio irq ? drq 5 vector ahaintr
Adaptec 154x
124
Chapter 5. Configuring the FreeBSD Kernel
controller sea0 at isa? bio irq 5 iomem 0xc8000 iosiz 0x2000 vector
seaintr
controller wds0 at isa? port 0x350 bio irq 15 drq 6 vector wdsintr
controller ncr0
options SCSI_DELAY=15000
This causes the kernel to pause 15 seconds before probing each SCSI device in your system. If you
only have IDE hard drives, you can ignore this, otherwise you will probably want to lower this
number, perhaps to 5 seconds, to speed up booting. Of course if you do this, and FreeBSD has
trouble recognizing your SCSI devices, you will have to raise it back up.
controller scbus0
If you have any SCSI controllers, this line provides generic SCSI support. If you do not have SCSI,
you can comment this, and the following three lines, out.
device da0
device sa0
device cd0
125
Chapter 5. Configuring the FreeBSD Kernel
Note that the number 0 in the above entries is slightly misleading: all these devices are
automatically configured as they are found, regardless of how many of them are hooked up to the
SCSI bus(es), and which target IDs they have.
If you want to wire down specific target IDs to particular devices, refer to the appropriate section
of the LINT kernel config file.
sc0 is the default console driver, which resembles an SCO console. Since most full-screen
programs access the console through a terminal database library like termcap, it should not matter
much whether you use this or vt0, the VT220 compatible console driver. When you log in, set your
TERM variable to scoansi if full-screen programs have trouble running under this console.
The keyboard controller atkbdc provides I/O services for the AT keyboard and PS/2 style pointing
devices. This controller is required by the keyboard driver atkbd and the PS/2 pointing device
driver psm.
The keyboard driver atkbd and the pointing device driver psm may ask the atkbdc driver to
reset the devices during the boot process. It sometimes takes a long time before these devices
respond to the reset command. These options control how long the atkbdc driver should wait
before giving up the driver will wait X * Y milliseconds at most. If the drivers seem unable
to detect devices, you may want to increase these values. The default values are 200
milliseconds for X and 5 for Y.
Sets the debug level to N . The default value is zero, which suppresses all debugging output.
Note: There can only be one atkbdc device configured into the system.
126
Chapter 5. Configuring the FreeBSD Kernel
options "PCVT_FREEBSD=210"
options XSERVER
Only applicable with the vt0 console driver. This includes code required to run the XFree86
X Window Server under the vt0 console driver.
Use this device if you have a Logitech or ATI InPort bus mouse card.
Note: If you have a serial mouse, ignore these two lines, and instead, make sure the
appropriate serial port is enabled (probably COM1).
device psm0 at isa? port "IO_KBD" conflicts tty irq 12 vector psmintr
Use this device if your mouse plugs into the PS/2 mouse port.
127
Chapter 5. Configuring the FreeBSD Kernel
lpt0 through lpt2 are the three printer ports you could conceivably have. Most people just have
one, though, so feel free to comment out the other two lines if you do not have them.
Networking
FreeBSD, as with Unix in general, places a big emphasis on networking. Therefore, even if you do not
have an Ethernet card, pay attention to the mandatory options and the dial-up networking support.
options INET
Networking support. Leave it in even if you do not plan to be connected to a network. Most
programs require at least loopback networking (i.e. making network connections within your PC) so
this is essentially mandatory.
Ethernet cards
The next lines enable support for various Ethernet cards. If you do not have a network card, you can
comment out all of these lines. Otherwise, you will want to leave in support for your particular
Ethernet card(s):
device cs0
128
Chapter 5. Configuring the FreeBSD Kernel
device de0
Ethernet adapters based on Digital Equipment DC21040, DC21041 or DC21140 chips
device fxp0
device vx0
3Com 3C590 and 3C595 (buggy)
device cx0 at isa? port 0x240 net irq 15 drq 7 vector cxintr
device ed0 at isa? port 0x280 net irq 5 iomem 0xd8000 vector edintr
Western Digital and SMC 80xx and 8216; Novell NE1000 and NE2000; 3Com 3C503; HP PC
Lan Plus (HP27247B and HP27252A)
3Com 3C505
device ie0 at isa? port 0x360 net irq 7 iomem 0xd0000 vector ieintr
AT&T StarLAN 10 and EN100; 3Com 3C507; unknown NI5210; Intel EtherExpress 16
129
Chapter 5. Configuring the FreeBSD Kernel
device le0 at isa? port 0x300 net irq 5 iomem 0xd0000 vector le_intr
Digital Equipment EtherWorks 2 and EtherWorks 3 (DEPCA, DE100, DE101, DE200, DE201,
DE202, DE203, DE204, DE205, DE422)
device lnc0 at isa? port 0x300 net irq 10 drq 0 vector lncintr
device xl0
device ze0 at isa? port 0x300 net irq 5 iomem 0xd8000 vector zeintr
device zp0 at isa? port 0x300 net irq 10 iomem 0xd8000 vector zpintr
Note: With certain cards (notably the NE2000) you will have to change the port and/or IRQ
since there is no standard location for these cards.
pseudo-device loop
loop is the generic loopback device for TCP/IP. If you telnet or FTP to localhost (a.k.a.
127.0.0.1) it will come back at you through this pseudo-device. Mandatory.
pseudo-device ether
ether is only needed if you have an Ethernet card and includes generic Ethernet protocol code.
pseudo-device sl number
sl is for SLIP (Serial Line Internet Protocol) support. This has been almost entirely supplanted by
PPP, which is easier to set up, better suited for modem-to-modem connections, as well as more
powerful. The number after sl specifies how many simultaneous SLIP sessions to support. This
handbook has more information on setting up a SLIP client or server.
130
Chapter 5. Configuring the FreeBSD Kernel
tun is used by the user-mode PPP software. This program is easy to set up and very fast. It also has
special features such as automatic dial-on-demand. The number after tun specifies the number of
simultaneous PPP sessions to support. See the user-mode PPP section of the handbook for more
information.
Berkeley packet filter. This pseudo-device allows network interfaces to be placed in promiscuous
mode, capturing every packet on a broadcast network (e.g. an ethernet). These packets can be
captured to disk and/or examined with the tcpdump(1) program. Note that implementation of this
capability can seriously compromise your overall network security. The number after bpfilter is
the number of interfaces that can be examined simultaneously. Optional, not recommended except
for those who are fully aware of the potential pitfalls. Not all network cards support this capability.
Sound cards
This is the first section containing lines that are not in the GENERIC kernel. To include sound card
support, you will have to copy the appropriate lines from the LINT kernel (which support for every
device) as follows:
controller snd0
Generic sound driver code. Required for all of the following sound cards except pca.
device sb0 at isa? port 0x220 irq 7 conflicts drq 1 vector sbintr
131
Chapter 5. Configuring the FreeBSD Kernel
Note: If your SoundBlaster is on a different IRQ (such as 5), change irq 7 to, for example, irq
5 and remove the conflicts keyword.
Note: If your SB16 is on a different 16-bit DMA channel (such as 6 or 7), change the drq 5
keyword appropriately.
SoundBlaster 16 MIDI interface. If you have a SoundBlaster 16, you must include this line, or the
kernel will not compile.
Gravis Ultrasound.
AdLib FM-synthesis audio. Include this line for AdLib, SoundBlaster, and ProAudioSpectrum
users, if you want to play MIDI songs with a program such as playmidi (in the ports collection).
Digital audio through PC speaker. This is going to be very poor sound quality and quite
CPU-intensive, so you have been warned (but it does not require a sound card).
132
Chapter 5. Configuring the FreeBSD Kernel
Pseudo-devices
Pseudo-device drivers are parts of the kernel that act like device drivers but do not correspond to any
actual hardware in the machine. The network-related pseudo-devices are in that section, while the
remainder are here.
pseudo-device gzip
gzip allows you to run FreeBSD programs that have been compressed with gzip. The programs in
/stand are compressed so it is a good idea to have this option in your kernel.
Note: The gzip feature currently only works with a.out binaries.
pseudo-device log
pty is a pseudo-terminal or simulated login port. It is used by incoming telnet and rlogin
sessions, xterm, and some other applications such as emacs. The number indicates the number of
ptys to create. If you need more than GENERIC default of 16 simultaneous xterm windows and/or
remote logins, be sure to increase this number accordingly, up to a maximum of 256.
Snoop device. This pseudo-device allows one terminal session to watch another using the watch(8)
command. Note that implementation of this capability has important security and privacy
implications. The number after snp is the total number of simultaneous snoop sessions. Optional.
133
Chapter 5. Configuring the FreeBSD Kernel
pseudo-device vn
Vnode driver. Allows a file to be treated as a device after being set up with the vnconfig(8)
command. This driver can be useful for manipulating floppy disk images and using a file as a swap
device (e.g. an MS Windows swap file). Optional.
Concatenated disks. This pseudo-device allows you to concatenate multiple disk partitions into one
large meta-disk. The number after ccd is the total number of concatenated disks (not total
number of disks that can be concatenated) that can be created. (See ccd(4) and ccdconfig(8) man
pages for more details.) Optional.
PC joystick device.
pseudo-device speaker
Supports IBM BASIC-style noises through the PC speaker. Some fun programs which use this are
/usr/sbin/spkrtest, which is a shell script that plays some simple songs, and
/usr/games/piano which lets you play songs using the keyboard as a simple piano (this file only
exists if you have installed the games package). Also, the excellent text role-playing game
NetHack (in the ports collection) can be configured to use this device to play songs when you play
musical instruments in the game.
See also the pca0 device.
134
Chapter 5. Configuring the FreeBSD Kernel
device. The shell script /dev/MAKEDEV, which is executed when you first install the operating system,
creates nearly all of the device nodes supported. However, it does not create all of them, so when you
add support for a new device, it pays to make sure that the appropriate entries are in this directory, and if
not, add them. Here is a simple example:
Suppose you add the IDE CD-ROM support to the kernel. The line to add is:
controller wcd0
This means that you should look for some entries that start with wcd0 in the /dev directory, possibly
followed by a letter, such as c, or preceded by the letter r, which means a raw device. It turns out that
those files are not there, so I must change to the /dev directory and type:
# sh MAKEDEV wcd0
When this script finishes, you will find that there are now wcd0c and rwcd0c entries in /dev so you
know that it executed correctly.
For sound cards, the command:
# sh MAKEDEV snd0
Note: When creating device nodes for devices such as sound cards, if other people have access to
your machine, it may be desirable to protect the devices from outside access by adding them to the
/etc/fbtab file. See man fbtab for more information.
Follow this simple procedure for any other non-GENERIC devices which do not have entries.
Note: All SCSI controllers use the same set of /dev entries, so you do not need to create these.
Also, network cards and SLIP/PPP pseudo-devices do not have entries in /dev at all, so you do not
have to worry about these either.
135
Chapter 5. Configuring the FreeBSD Kernel
Note: If you are having trouble building a kernel, make sure to keep a GENERIC, or some other
kernel that is known to work on hand as a different name that will not get erased on the next
build. You cannot rely on kernel.old because when installing a new kernel, kernel.old is
overwritten with the last installed kernel which may be non-functional. Also, as soon as
possible, move the working kernel to the proper kernel location or commands such as ps(1)
will not work properly. The proper command to unlock the kernel file that make installs (in order
to move another kernel back permanently) is:
# chflags noschg /kernel
And, if you want to lock your new kernel into place, or any file for that matter, so that it cannot
be moved or tampered with:
# chflags schg /kernel
136
Chapter 5. Configuring the FreeBSD Kernel
137
Chapter 6. Security
138
Chapter 6. Security
and are coded in a 64-character alphabet which does not include the $ character, so a relatively short
string which doesnt begin with a dollar sign is very likely a DES password.
Determining which library is being used on your system is fairly easy for most programs, except for
those like init which are statically linked. (For those programs, the only way is to try them on a known
password and see if it works.) Programs which use crypt are linked against libcrypt, which for each
type of library is a symbolic link to the appropriate implementation. For example, on a system using the
DES versions:
% ls -l /usr/lib/libcrypt*
lrwxr-xr-x 1 root wheel 13 Mar 19 06:56 libcrypt.a -> libdescrypt.a
lrwxr-xr-x 1 root wheel 18 Mar 19 06:56 libcrypt.so.2.0 -
> libdescrypt.so.2.0
lrwxr-xr-x 1 root wheel 15 Mar 19 06:56 libcrypt_p.a -> libdescrypt_p.a
On a system using the MD5-based libraries, the same links will be present, but the target will be
libscrypt rather than libdescrypt.
S/Key
Contributed by Garrett Wollman <[email protected] > 25 September 1995.
S/Key is a one-time password scheme based on a one-way hash function (in our version, this is MD4 for
compatibility; other versions have used MD5 and DES-MAC). S/Key has been a standard part of all
FreeBSD distributions since version 1.1.5, and is also implemented on a large and growing number of
other systems. S/Key is a registered trademark of Bell Communications Research, Inc.
There are three different sorts of passwords which we will talk about in the discussion below. The first is
your usual UNIX-style or Kerberos password; we will call this a UNIX password. The second sort is
the one-time password which is generated by the S/Key key program and accepted by the keyinit
program and the login prompt; we will call this a one-time password. The final sort of password is the
secret password which you give to the key program (and sometimes the keyinit program) which it
uses to generate one-time passwords; we will call it a secret password or just unqualified password.
The secret password does not necessarily have anything to do with your UNIX password (while they can
be the same, this is not recommended). While UNIX passwords are limited to eight characters in length,
your S/Key secret password can be as long as you like; I use seven-word phrases. In general, the S/Key
system operates completely independently of the UNIX password system.
There are in addition two other sorts of data involved in the S/Key system; one is called the seed or
(confusingly) key, and consists of two letters and five digits, and the other is the iteration count and
is a number between 100 and 1. S/Key constructs a one-time password from these components by
139
Chapter 6. Security
concatenating the seed and the secret password, then applying a one-way hash (the RSA Data Security,
Inc., MD4 secure hash function) iteration-count times, and turning the result into six short English words.
The login and su programs keep track of the last one-time password used, and the user is authenticated
if the hash of the user-provided password is equal to the previous password. Because a one-way hash
function is used, it is not possible to generate future one-time passwords having overheard one which
was successfully used; the iteration count is decremented after each successful login to keep the user and
login program in sync. (When you get the iteration count down to 1, it is time to reinitialize S/Key.)
There are four programs involved in the S/Key system which we will discuss below. The key program
accepts an iteration count, a seed, and a secret password, and generates a one-time password. The
keyinit program is used to initialized S/Key, and to change passwords, iteration counts, or seeds; it
takes either a secret password, or an iteration count, seed, and one-time password. The keyinfo
program examines the /etc/skeykeys file and prints out the invoking users current iteration count and
seed. Finally, the login and su programs contain the necessary logic to accept S/Key one-time
passwords for authentication. The login program is also capable of disallowing the use of UNIX
passwords on connections coming from specified addresses.
There are four different sorts of operations we will cover. The first is using the keyinit program over a
secure connection to set up S/Key for the first time, or to change your password or seed. The second
operation is using the keyinit program over an insecure connection, in conjunction with the key
program over a secure connection, to do the same. The third is using the key program to log in over an
insecure connection. The fourth is using the key program to generate a number of keys which can be
written down or printed out to carry with you when going to some location without secure connections to
anywhere (like at a conference).
% keyinit
Updating wollman: ) these will not appear if you
Old key: ha73895 ) have not used S/Key before
Reminder - Only use this method if you are directly connected.
If you are using telnet or rlogin exit with no password and use keyinit -s.
Enter secret password: ) I typed my pass phrase here
Again secret password: ) I typed it again ID
140
Chapter 6. Security
There is a lot of information here. At theEnter secret password: prompt, you should enter some
password or phrase (I use phrases of minimum seven words) which will be needed to generate login
keys. The line starting ID gives the parameters of your particular S/Key instance: your login name, the
iteration count, and seed. When logging in with S/Key, the system will remember these parameters and
present them back to you so you do not have to remember them. The last line gives the particular
one-time password which corresponds to those parameters and your secret password; if you were to
re-login immediately, this one-time password is the one you would use.
% keyinit -s
Updating wollman: Old key: kh94741
Reminder you need the 6 English words from the skey command.
Enter sequence count from 1 to 9999: 100 ) I typed this
Enter new key [default kh94742]:
s/key 100 kh94742
To accept the default seed (which the keyinit program confusingly calls a key), press return. Then
move over to your secure connection or S/Key desk accessory, and give it the same parameters:
Now switch back over to the insecure connection, and copy the one-time password generated by key
over to the keyinit program:
The rest of the description from the previous section applies here as well.
141
Chapter 6. Security
% telnet himalia
Trying 18.26.0.186...
Connected to himalia.lcs.mit.edu.
Escape character is ^].
s/key 92 hi52030
Password:
Note that, before prompting for a password, the login program prints out the iteration number and seed
which you will need in order to generate the appropriate key. You will also find a useful feature (not
shown here): if you press return at the password prompt, the login program will turn echo on, so you can
see what you are typing. This can be extremely useful if you are attempting to type in an S/Key by hand,
such as from a printout.
If this machine were configured to disallow UNIX passwords over a connection from my machine, the
prompt would have also included the annotation (s/key required), indicating that only S/Key
one-time passwords will be accepted.
142
Chapter 6. Security
This is the easiest mechanism if you have a trusted machine. There is a Java S/Key key applet, The Java
OTP Calculator (http://www.cs.umd.edu/~harry/jotp/src.html), that you can download and run locally on
any Java supporting browser.
% key -n 25 57 zz99999
Reminder - Do not use this program while logged in via telnet or rlogin.
Enter secret password:
33: WALT THY MALI DARN NIT HEAD
34: ASK RICE BEAU GINA DOUR STAG
...
56: AMOS BOWL LUG FAT CAIN INCH
57: GROW HAYS TUN DISH CAR BALM
The -n 25 requests twenty-five keys in sequence; the 57 indicates the ending iteration number; and the
rest is as before. Note that these are printed out in reverse order of eventual use. If you are really
paranoid, you might want to write the results down by hand; otherwise you can cut-and-paste into lpr.
Note that each line shows both the iteration count and the one-time password; you may still find it handy
to scratch off passwords as you use them.
143
Chapter 6. Security
The first line (permit internet) allows users whose IP source address (which is vulnerable to
spoofing) matches the specified value and mask, to use UNIX passwords. This should not be considered
a security mechanism, but rather, a means to remind authorized users that they are using an insecure
network and need to use S/Key for authentication.
The second line (permit user) allows the specified user to use UNIX passwords at any time.
Generally speaking, this should only be used for people who are either unable to use the key program,
like those with dumb terminals, or those who are uneducable.
The third line (permit port) allows all users logging in on the specified terminal line to use UNIX
passwords; this would be used for dial-ups.
Kerberos
Contributed by Mark Murray <[email protected] > (based on contribution by Mark Dapoz
<[email protected]>).
Kerberos is a network add-on system/protocol that allows users to authenticate themselves through the
services of a secure server. Services such as remote login, remote copy, secure inter-system file copying
and other high-risk tasks are made considerably safer and more controllable.
The following instructions can be used as a guide on how to set up Kerberos as distributed for FreeBSD.
However, you should refer to the relevant manual pages for a complete description.
In FreeBSD, the Kerberos is not that from the original 4.4BSD-Lite, distribution, but eBones, which had
been previously ported to FreeBSD 1.1.5.1, and was sourced from outside the USA/Canada, and is thus
available to system owners outside those countries.
For those needing to get a legal foreign distribution of this software, please do not get it from a USA or
Canada site. You will get that site in big trouble! A legal copy of this is available from
ftp.internat.FreeBSD.org, which is in South Africa and an official FreeBSD mirror site.
# cd /etc/kerberosIV
144
Chapter 6. Security
# ls
README krb.conf krb.realms
If any additional files (such as principal.* or master_key) exist, then use the kdb_destroy
command to destroy the old Kerberos database, of if Kerberos is not running, simply delete the extra
files.
You should now edit the krb.conf and krb.realms files to define your Kerberos realm. In this case the
realm will be GRONDAR.ZA and the server is grunt.grondar.za. We edit or create the krb.conf file:
# cat krb.conf
GRONDAR.ZA
GRONDAR.ZA grunt.grondar.za admin server
CS.BERKELEY.EDU okeeffe.berkeley.edu
ATHENA.MIT.EDU kerberos.mit.edu
ATHENA.MIT.EDU kerberos-1.mit.edu
ATHENA.MIT.EDU kerberos-2.mit.edu
ATHENA.MIT.EDU kerberos-3.mit.edu
LCS.MIT.EDU kerberos.lcs.mit.edu
TELECOM.MIT.EDU bitsy.mit.edu
ARC.NASA.GOV trident.arc.nasa.gov
In this case, the other realms do not need to be there. They are here as an example of how a machine may
be made aware of multiple realms. You may wish to not include them for simplicity.
The first line names the realm in which this system works. The other lines contain realm/host entries.
The first item on a line is a realm, and the second is a host in that realm that is acting as a key
distribution centre. The words admin server following a hosts name means that host also provides an
administrative database server. For further explanation of these terms, please consult the Kerberos man
pages.
Now we have to add grunt.grondar.za to the GRONDAR.ZA realm and also add an entry to put all
hosts in the .grondar.za domain in the GRONDAR.ZA realm. The krb.realms file would be updated
as follows:
# cat krb.realms
grunt.grondar.za GRONDAR.ZA
.grondar.za GRONDAR.ZA
.berkeley.edu CS.BERKELEY.EDU
.MIT.EDU ATHENA.MIT.EDU
.mit.edu ATHENA.MIT.EDU
Again, the other realms do not need to be there. They are here as an example of how a machine may be
made aware of multiple realms. You may wish to remove them to simplify things.
145
Chapter 6. Security
The first line puts the specific system into the named realm. The rest of the lines show how to default
systems of a particular subdomain to a named realm.
Now we are ready to create the database. This only needs to run on the Kerberos server (or Key
Distribution Centre). Issue the kdb_init command to do this:
# kdb_init
Realm name [defaultATHENA.MIT.EDU ]: GRONDAR.ZA
You will be prompted for the database Master Password.
It is important that you NOT FORGET this password.
Now we have to save the key so that servers on the local machine can pick it up. Use the kstash
command to do this.
# kstash
# kdb_edit
Opening database...
146
Chapter 6. Security
147
Chapter 6. Security
# ext_srvtab grunt
Enter Kerberos master key:
Now, this command only generates a temporary file which must be renamed to srvtab so that all the
server can pick it up. Use the mv command to move it into place on the original system:
# mv grunt-new-srvtab srvtab
If the file is for a client system, and the network is not deemed safe, then copy the client-new-srvtab
to removable media and transport it by secure physical means. Be sure to rename it to srvtab in the
clients /etc/kerberosIV directory, and make sure it is mode 600:
# mv grumble-new-srvtab srvtab
# chmod 600 srvtab
# kdb_edit
Opening database...
148
Chapter 6. Security
# kerberos &
Kerberos server starting
Sleep forever on error
Log file is /var/log/kerberos.log
Current Kerberos master key version is 1.
149
Chapter 6. Security
Now we can try using the kinit command to get a ticket for the id jane that we created above:
% kinit jane
MIT Project Athena (grunt.grondar.za)
Kerberos Initialization for "jane"
Password:
Try listing the tokens using klist to see if we really have them:
% klist
Ticket file: /tmp/tkt245
Principal: [email protected]
Now try changing the password using passwd to check if the kpasswd daemon can get authorization to
the Kerberos database:
% passwd
realm GRONDAR.ZA
Old password for jane:
New Password for jane:
Verifying password
New Password for jane:
Password changed.
Adding su privileges
Kerberos allows us to give each user who needs root privileges their own separate supassword. We
could now add an id which is authorized to su to root. This is controlled by having an instance of root
associated with a principal. Using kdb_edit we can create the entry jane.root in the Kerberos
database:
# kdb_edit
Opening database...
150
Chapter 6. Security
# kinit jane.root
MIT Project Athena (grunt.grondar.za)
Kerberos Initialization for "jane.root"
Password:
# cat /root/.klogin
[email protected]
% su
Password:
# klist
Ticket file: /tmp/tkt_root_245
Principal: [email protected]
151
Chapter 6. Security
# cat /root/.klogin
[email protected]
Likewise, if a user has in their own home directory lines of the form:
% cat ~/.klogin
[email protected]
[email protected]
This allows anyone in the GRONDAR.ZA realm who has authenticated themselves to jane or jack (via
kinit, see above) access to rlogin to janes account or files on this system (grunt) via rlogin, rsh
or rcp.
For example, Jane now logs into another system, using Kerberos:
% kinit
MIT Project Athena (grunt.grondar.za)
Password:
%prompt.user; rlogin grunt
Last login: Mon May 1 21:14:47 from grumble
Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
The Regents of the University of California. All rights reserved.
Or Jack logs into Janes account on the same machine (Jane having set up the .klogin file as above, and
the person in charge of Kerberos having set up principal jack with a null instance:
% kinit
% rlogin grunt -l jane
MIT Project Athena (grunt.grondar.za)
Password:
Last login: Mon May 1 21:16:55 from grumble
Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD BUILT-19950429 (GR386) #0: Sat Apr 29 17:50:09 SAT 1995
152
Chapter 6. Security
Firewalls
Contributed by Gary Palmer <[email protected] > and Alex Nash <[email protected] >.
Firewalls are an area of increasing interest for people who are connected to the Internet, and are even
finding applications on private networks to provide enhanced security. This section will hopefully
explain what firewalls are, how to use them, and how to use the facilities provided in the FreeBSD kernel
to implement them.
Note: People often think that having a firewall between your companies internal network and the Big
Bad Internet will solve all your security problems.
It may help, but a poorly setup firewall system is more of a security risk than not having one at all. A
firewall can only add another layer of security to your systems, but they will not be able to stop a really
determined cracker from penetrating your internal network. If you let internal security lapse because
you believe your firewall to be impenetrable, you have just made the crackers job that bit easier.
What is a firewall?
There are currently two distinct types of firewalls in common use on the Internet today. The first type is
more properly called a packet filtering router, where the kernel on a multi-homed machine chooses
whether to forward or block packets based on a set of rules. The second type, known as proxy servers,
rely on daemons to provide authentication and to forward packets, possibly on a multi-homed machine
which has kernel packet forwarding disabled.
Sometimes sites combine the two types of firewalls, so that only a certain machine (known as a bastion
host) is allowed to send packets through a packet filtering router onto an internal network. Proxy services
are run on the bastion host, which are generally more secure than normal authentication mechanisms.
FreeBSD comes with a kernel packet filter (known as IPFW), which is what the rest of this section will
concentrate on. Proxy servers can be built on FreeBSD from third party software, but there is such a
variety of proxy servers available that it would be impossible to cover them in this document.
153
Chapter 6. Security
action could be to drop the packet, to forward the packet, or even to send an ICMP message back to the
originator. Only the first match counts, as the rules are searched in order. Hence, the list of rules can be
referred to as a rule chain.
The packet matching criteria varies depending on the software used, but typically you can specify rules
which depend on the source IP address of the packet, the destination IP address, the source port number,
the destination port number (for protocols which support ports), or even the packet type (UDP, TCP,
ICMP, etc).
Proxy servers
Proxy servers are machines which have had the normal system daemons (telnetd, ftpd, etc) replaced with
special servers. These servers are called proxy servers as they normally only allow onward connections
to be made. This enables you to run (for example) a proxy telnet server on your firewall host, and people
can telnet in to your firewall from the outside, go through some authentication mechanism, and then gain
access to the internal network (alternatively, proxy servers can be used for signals coming from the
internal network and heading out).
Proxy servers are normally more secure than normal servers, and often have a wider variety of
authentication mechanisms available, including one-shot password systems so that even if someone
manages to discover what password you used, they will not be able to use it to gain access to your
systems as the password instantly expires. As they do not actually give users access to the host machine,
it becomes a lot more difficult for someone to install backdoors around your security system.
Proxy servers often have ways of restricting access further, so that only certain hosts can gain access to
the servers, and often they can be set up so that you can limit which users can talk to which destination
machine. Again, what facilities are available depends largely on what proxy software you choose.
154
Chapter 6. Security
IPFW, and the same commands and techniques should be used in this situation.
options IPFIREWALL
options IPFIREWALL_VERBOSE
Enables code to allow logging of packets through syslogd(8). Without this option, even if you
specify that packets should be logged in the filter rules, nothing will happen.
options IPFIREWALL_VERBOSE_LIMIT=10
Limits the number of packets logged through syslogd(8) on a per entry basis. You may wish to use
this option in hostile environments in which you want to log firewall activity, but do not want to be
open to a denial of service attack via syslog flooding.
When a chain entry reaches the packet limit specified, logging is turned off for that particular entry.
To resume logging, you will need to reset the associated counter using the ipfw(8) utility:
# ipfw zero 4500
Previous versions of FreeBSD contained an IPFIREWALL_ACCT option. This is now obsolete as the
firewall code automatically includes accounting facilities.
Configuring IPFW
The configuration of the IPFW software is done through the ipfw(8) utility. The syntax for this
command looks quite complicated, but it is relatively simple once you understand its structure.
There are currently four different command categories used by the utility: addition/deletion, listing,
flushing, and clearing. Addition/deletion is used to build the rules that control how packets are accepted,
155
Chapter 6. Security
rejected, and logged. Listing is used to examine the contents of your rule set (otherwise known as the
chain) and packet counters (accounting). Flushing is used to remove all entries from the chain. Clearing
is used to zero out one or more accounting entries.
There is one valid flag when using this form of the command:
-N
Resolve addresses and service names in output.
The command given can be shortened to the shortest unique form. The valid commands are:
add
Add an entry to the firewall/accounting rule list
delete
Delete an entry from the firewall/accounting rule list
Previous versions of IPFW used separate firewall and accounting entries. The present version provides
packet accounting with each firewall entry.
If an index value is supplied, it used to place the entry at a specific point in the chain. Otherwise, the
entry is placed at the end of the chain at an index 100 greater than the last chain entry (this does not
include the default policy, rule 65535, deny).
The log option causes matching rules to be output to the system console if the kernel was compiled with
IPFIREWALL_VERBOSE.
reject
Drop the packet, and send an ICMP host or port unreachable (as appropriate) packet to the source.
156
Chapter 6. Security
allow
Pass the packet on as normal. (aliases: pass and accept)
deny
Drop the packet. The source is not notified via an ICMP message (thus it appears that the packet
never arrived at the destination).
count
Update packet counters but do not allow/deny the packet based on this rule. The search continues
with the next chain entry.
all
Matches any IP packet
icmp
Matches ICMP packets
tcp
Matches TCP packets
udp
Matches UDP packets
You can only specify port in conjunction with protocols which support ports (UDP and TCP).
The via is optional and may specify the IP address or domain name of a local IP interface, or an
interface name (e.g. ed0) to match only packets coming through this interface. Interface unit numbers
can be specified with an optional wildcard. For example, ppp* would match all kernel PPP interfaces.
The syntax used to specify an address/mask is:
157
Chapter 6. Security
address
or
address/mask-bits
or
address:mask-pattern
A valid hostname may be specified in place of the IP address. mask-bits is a decimal number
representing how many bits in the address mask should be set. e.g. specifying 192.216.222.1/24 will
create a mask which will allow any address in a class C subnet (in this case, 192.216.222) to be matched.
mask-pattern is an IP address which will be logically ANDed with the address given. The keyword
any may be used to specify any IP address.
port-port
to specify a range of ports. You may also combine a single range with a list, but the range must always
be specified first.
The options available are:
frag
Matches if the packet is not the first fragment of the datagram.
in
Matches if the packet is on the way in.
out
Matches if the packet is on the way out.
158
Chapter 6. Security
ipoptions spec
Matches if the IP header contains the comma separated list of options specified in spec. The
supported list of IP options are: ssrr (strict source route), lsrr (loose source route), rr (record
packet route), and ts (timestamp). The absence of a particular option may be denoted with a
leading !.
established
Matches if the packet is part of an already established TCP connection (i.e. it has the RST or ACK
bits set). You can optimize the performance of the firewall by placing established rules early in the
chain.
setup
Matches if the packet is an attempt to establish a TCP connection (the SYN bit set is set but the
ACK bit is not).
tcpflags flags
Matches if the TCP header contains the comma separated list of flags. The supported flags are
fin, syn, rst, psh, ack, and urg. The absence of a particular flag may be indicated by a leading !.
icmptypes types
Matches if the ICMP type is present in the list types. The list may be specified as any
combination of ranges and/or individual types separated by commas. Commonly used ICMP types
are: 0 echo reply (ping reply), 3 destination unreachable, 5 redirect, 8 echo request (ping request),
and 11 time exceeded (used to indicate TTL expiration as with traceroute(8)).
There are three valid flags when using this form of the command:
-a
While listing, show counter values. This option is the only way to see accounting counters.
159
Chapter 6. Security
-t
Display the last match times for each chain entry. The time listing is incompatible with the input
syntax used by the ipfw(8) utility.
-N
Attempt to resolve given addresses and service names.
ipfw flush
This causes all entries in the firewall chain to be removed except the fixed default policy enforced by the
kernel (index 65535). Use caution when flushing rules, the default deny policy will leave your system cut
off from the network until allow entries are added to the chain.
When used without an index argument, all packet counters are cleared. If an index is supplied, the
clearing operation only affects a specific chain entry.
The next example denies and logs any TCP traffic from the entire crackers.org network (a class C) to
the nice.people.org machine (any port).
160
Chapter 6. Security
If you do not want people sending X sessions to your internal network (a subnet of a class C), the
following command will do the necessary filtering:
# ipfw -a list
# ipfw -a l
You can also see the last time a chain entry was matched with:
# ipfw -at l
Note: The following suggestions are just that: suggestions. The requirements of each firewall are
different and I cannot tell you how to build a firewall to meet your particular requirements.
When initially setting up your firewall, unless you have a test bench setup where you can configure your
firewall host in a controlled environment, I strongly recommend you use the logging version of the
commands and enable logging in the kernel. This will allow you to quickly identify problem areas and
cure them without too much disruption. Even after the initial setup phase is complete, I recommend
using the logging for of deny as it allows tracing of possible attacks and also modification of the
firewall rules if your requirements alter.
Note: If you use the logging versions of the accept command, it can generate large amounts of log
data as one log line will be generated for every packet that passes through the firewall, so large
ftp/http transfers, etc, will really slow the system down. It also increases the latencies on those
packets as it requires more work to be done by the kernel before the packet can be passed on.
syslogd with also start using up a lot more processor time as it logs all the extra data to disk, and it
could quite easily fill the partition /var/log is located on.
You should enable your firewall from /etc/rc.conf.local or /etc/rc.conf. The associated
manpage explains which knobs to fiddle and lists some preset firewall configurations. If you do not use a
161
Chapter 6. Security
preset configuration, ipfw list will output the current ruleset into a file that you can pass to rc.conf.
If you do not use /etc/rc.conf.local or /etc/rc.conf to enable your firewall, it is important to
make sure your firewall is enabled before any IP interfaces are configured.
The next problem is what your firewall should actually do! This is largely dependent on what access to
your network you want to allow from the outside, and how much access to the outside world you want to
allow from the inside. Some general rules are:
Block all incoming access to ports below 1024 for TCP. This is where most of the security sensitive
services are, like finger, SMTP (mail) and telnet.
Block all incoming UDP traffic. There are very few useful services that travel over UDP, and what
useful traffic there is is normally a security threat (e.g. Suns RPC and NFS protocols). This has its
disadvantages also, since UDP is a connectionless protocol, denying incoming UDP traffic also blocks
the replies to outgoing UDP traffic. This can cause a problem for people (on the inside) using external
archie (prospero) servers. If you want to allow access to archie, youll have to allow packets coming
from ports 191 and 1525 to any internal UDP port through the firewall. ntp is another service you may
consider allowing through, which comes from port 123.
Block traffic to port 6000 from the outside. Port 6000 is the port used for access to X11 servers, and
can be a security threat (especially if people are in the habit of doing xhost + on their workstations).
X11 can actually use a range of ports starting at 6000, the upper limit being how many X displays you
can run on the machine. The upper limit as defined by RFC 1700 (Assigned Numbers) is 6063.
Check what ports any internal servers use (e.g. SQL servers, etc). It is probably a good idea to block
those as well, as they normally fall outside the 1-1024 range specified above.
Another checklist for firewall configuration is available from CERT at
ftp://ftp.cert.org/pub/tech_tips/packet_filtering
As I said above, these are only guidelines. You will have to decide what filter rules you want to use on
your firewall yourself. I cannot accept ANY responsibility if someone breaks into your network, even if
you follow the advice given above.
162
Chapter 7. Printing
Contributed by Sean Kelly <[email protected]> 30 September 1995
In order to use printers with FreeBSD, you will need to set them up to work with the Berkeley line
printer spooling system, also known as the LPD spooling system. It is the standard printer control system
in FreeBSD. This section introduces the LPD spooling system, often simply called LPD.
If you are already familiar with LPD or another printer spooling system, you may wish to skip to section
Setting up the spooling system.
It controls access to attached printers and printers attached to other hosts on the network.
It enables users to submit files to be printed; these submissions are known as jobs.
It prevents multiple users from accessing a printer at the same time by maintaining a queue for each
printer.
It can print header pages (also known as banner or burst pages) so users can easily find jobs they have
printed in a stack of printouts.
It takes care of communications parameters for printers connected on serial ports.
It can send jobs over the network to another LPD spooler on another host.
It can run special filters to format jobs to be printed for various printer languages or printer capabilities.
It can account for printer usage.
Through a configuration file, and by providing the special filter programs, you can enable the LPD
system to do all or some subset of the above for a great variety of printer hardware.
LPD prints jobs in the background; you do not have to wait for data to be copied to the printer.
163
Chapter 7. Printing
LPD can conveniently run a job to be printed through filters to add date/time headers or convert a
special file format (such as a TeX DVI file) into a format the printer will understand. You will not have
to do these steps manually.
Many free and commercial programs that provide a print feature usually expect to talk to the spooler
on your system. By setting up the spooling system, you will more easily support other software you
may later add or already have.
See section Simple Printer Setup to learn how to connect a printer, tell LPD how to communicate with
it, and print plain text files to the printer.
See section Advanced Printer Setup to find out how to print a variety of special file formats, to print
header pages, to print across a network, to control access to printers, and to do printer accounting.
Section Hardware Setup gives some hints on connecting the printer to a port on your computer.
Section Software Setup shows how to setup the LPD spooler configuration file /etc/printcap.
If you are setting up a printer that uses a network protocol to accept data to print instead of a serial or
parallel interface, see Printers With Networked Data Stream Interaces.
Although this section is called Simple Printer Setup, it is actually fairly complex. Getting the printer to
work with your computer and the LPD spooler is the hardest part. The advanced options like header
pages and accounting are fairly easy once you get the printer working.
Hardware Setup
This section tells about the various ways you can connect a printer to your PC. It talks about the kinds of
ports and cables, and also the kernel configuration you may need to enable FreeBSD to speak to the
164
Chapter 7. Printing
printer.
If you have already connected your printer and have successfully printed with it under another operating
system, you can probably skip to section Software Setup.
Serial interfaces use a serial port on your computer to send data to the printer. Serial interfaces are
common in the computer industry and cables are readily available and also easy to construct. Serial
interfaces sometimes need special cables and might require you to configure somewhat complex
communications options.
Parallel interfaces use a parallel port on your computer to send data to the printer. Parallel interfaces
are common in the PC market. Cables are readily available but more difficult to construct by hand.
There are usually no communications options with parallel interfaces, making their configuration
exceedingly simple.
Parallel interfaces are sometimes known as Centronics interfaces, named after the connector type on
the printer.
In general, serial interfaces are slower than parallel interfaces. Parallel interfaces usually offer just
one-way communication (computer to printer) while serial gives you two-way. Many newer parallel
ports can also receive data from the printer, but only few printers need to send data back to the computer.
And FreeBSD does not support two-way parallel communication yet.
Usually, the only time you need two-way communication with the printer is if the printer speaks
PostScript. PostScript printers can be very verbose. In fact, PostScript jobs are actually programs sent to
the printer; they need not produce paper at all and may return results directly to the computer. PostScript
also uses two-way communication to tell the computer about problems, such as errors in the PostScript
program or paper jams. Your users may be appreciative of such information. Furthermore, the best way
to do effective accounting with a PostScript printer requires two-way communication: you ask the printer
for its page count (how many pages it has printed in its lifetime), then send the users job, then ask again
for its page count. Subtract the two values and you know how much paper to charge the user.
So, which interface should you use?
If you need two-way communication, use a serial port. FreeBSD does not yet support two-way
communication over a parallel port.
If you do not need two-way communication and can pick parallel or serial, prefer the parallel
interface. It keeps a serial port free for other peripheralssuch as a terminal or a modemand is
faster most of the time. It is also easier to configure.
165
Chapter 7. Printing
Parallel Ports
To hook up a printer using a parallel interface, connect the Centronics cable between the printer and the
computer. The instructions that came with the printer, the computer, or both should give you complete
guidance.
Remember which parallel port you used on the computer. The first parallel port is /dev/lpt0 to
FreeBSD; the second is /dev/lpt1, and so on.
Serial Ports
To hook up a printer using a serial interface, connect the proper serial cable between the printer and the
computer. The instructions that came with the printer, the computer, or both should give you complete
guidance.
If you are unsure what the proper serial cable is, you may wish to try one of the following alternatives:
A modem cable connects each pin of the connector on one end of the cable straight through to its
corresponding pin of the connector on the other end. This type of cable is also known as a
DTE-to-DCE cable.
A null-modem cable connects some pins straight through, swaps others (send data to receive data, for
example), and shorts some internally in each connector hood. This type of cable is also known as a
DTE-to-DTE cable.
A serial printer cable, required for some unusual printers, is like the null modem cable, but sends
some signals to their counterparts instead of being internally shorted.
You should also set up the communications parameters for the printer, usually through front-panel
controls or DIP switches on the printer. Choose the highest bps (bits per second, sometimes baud rate)
rate that both your computer and the printer can support. Choose 7 or 8 data bits; none, even, or odd
parity; and 1 or 2 stop bits. Also choose a flow control protocol: either none, or XON/XOFF (also known
as in-band or software) flow control. Remember these settings for the software configuration that
follows.
Software Setup
This section describes the software setup necessary to print with the LPD spooling system in FreeBSD.
166
Chapter 7. Printing
1. Configure your kernel, if necessary, for the port you are using for the printer; section Kernel
Configuration tells you what you need to do.
2. Set the communications mode for the parallel port, if you are using a parallel port; section Setting
the Communication Mode for the Parallel Port gives details.
3. Test if the operating system can send data to the printer. Section Checking Printer Communications
gives some suggestions on how to do this.
4. Set up LPD for the printer by modifying the file /etc/printcap. Section The /etc/printcap File
shows you how.
Kernel Configuration
The operating system kernel is compiled to work with a specific set of devices. The serial or parallel
interface for your printer is a part of that set. Therefore, it might be necessary to add support for an
additional serial or parallel port if your kernel is not already configured for one.
To find out if the kernel you are currently using supports a serial interface, type:
Where N is the number of the serial port, starting from zero. If you see output similar to the following:
Where N is the number of the parallel port, starting from zero. If you see output similar to the following
167
Chapter 7. Printing
1. Become root with the su(1) command. Enter the root password when prompted.
2. Change to the /dev directory:
# cd /dev
3. Type:
# ./MAKEDEV port
Where port is the device entry for the port you want to make. Use lpt0 for the first parallel port,
lpt1 for the second, and so on; use ttyd0 for the first serial port, ttyd1 for the second, and so on.
4. Type:
# ls -l port
The interrupt-driven method is the default with the GENERIC kernel. With this method, the operating
system uses an IRQ line to determine when the printer is ready for data.
The polled method directs the operating system to repeatedly ask the printer if it is ready for more
data. When it responds ready, the kernel sends more data.
The interrupt-driven method is somewhat faster but uses up a precious IRQ line. You should use
whichever one works.
You can set the communications mode in two ways: by configuring the kernel or by using the
lptcontrol(8) program.
To set the communications mode by configuring the kernel:
1. Edit your kernel configuration file. Look for or add an lpt0 entry. If you are setting up the second
parallel port, use lpt1 instead. Use lpt2 for the third port, and so on.
168
Chapter 7. Printing
2. Save the file. Then configure, build, and install the kernel, then reboot. See kernel configuration for
more details.
1. Type:
# lptcontrol -i -u N
You could put these commands in your /etc/rc.local file to set the mode each time your system
boots. See lptcontrol(8) for more information.
%!PS
100 100 moveto 300 300 lineto stroke
310 310 moveto /Helvetica findfont 12 scalefont setfont
(Is this thing working?) show
showpage
169
Chapter 7. Printing
Note: When this document refers to a printer language, I am assuming a language like PostScript,
and not Hewlett Packards PCL. Although PCL has great functionality, you can intermingle plain text
with its escape sequences. PostScript cannot directly print plain text, and that is the kind of printer
language for which we must make special accommodations.
If the printer can print plain text, then use lptest(1). Type:
# lptest > /dev/lptN
If the printer understands PostScript or other printer language, then send a small program to the
printer. Type:
# cat > /dev/lptN
Then, line by line, type the program carefully as you cannot edit a line once you have pressed
RETURN or ENTER. When you have finished entering the program, press CONTROL+D, or
whatever your end of file key is.
Alternatively, you can put the program in a file and type:
# cat file > /dev/lptN
Where file is the name of the file containing the program you want to send to the printer.
You should see something print. Do not worry if the text does not look right; we will fix such things later.
170
Chapter 7. Printing
Where port is the device entry for the serial port (ttyd0, ttyd1, etc.), bps-rate is the
bits-per-second rate at which the printer communicates, and parity is the parity required by the
printer (either even, odd, none, or zero).
Here is a sample entry for a printer connected via a serial line to the third serial port at 19200 bps
with no parity:
printer:dv=/dev/ttyd2:br#19200:pa=none
If this step does not work, edit the file /etc/remote again and try using /dev/cuaaN instead of
/dev/ttydN .
If the printer can print plain text, then use lptest(1). Type:
~$lptest
If the printer understands PostScript or other printer language, then send a small program to the
printer. Type the program, line by line, very carefully as backspacing or other editing keys may be
significant to the printer. You may also need to type a special end-of-file key for the printer so it
knows it received the whole program. For PostScript printers, press CONTROL+D.
Alternatively, you can put the program in a file and type:
~>file
Where file is the name of the file containing the program. After tip(1) sends the file, press any
required end-of-file key.
You should see something print. Do not worry if the text does not look right; we will fix that later.
171
Chapter 7. Printing
You configure LPD by editing the file /etc/printcap. The LPD spooling system reads this file each
time the spooler is used, so updates to the file take immediate effect.
The format of the printcap(5) file is straightforward. Use your favorite text editor to make changes to
/etc/printcap. The format is identical to other capability files like /usr/share/misc/termcap
and /etc/remote. For complete information about the format, see the cgetent(3).
The simple spooler configuration consists of the following steps:
1. Pick a name (and a few convenient aliases) for the printer, and put them in the /etc/printcap file;
see Naming the Printer.
2. Turn off header pages (which are on by default) by inserting the sh capability; see Suppressing
Header Pages.
3. Make a spooling directory, and specify its location with the sd capability; see Making the Spooling
Directory.
4. Set the /dev entry to use for the printer, and note it in /etc/printcap with the lp capability; see
Identifying the Printer Device. Also, if the printer is on a serial port, set up the communication
parameters with the fs, fc, xs, and xc capabilities; see Configuring Spooler Communications
Parameters.
5. Install a plain text input filter; see Installing the Text Filter
6. Test the setup by printing something with the lpr(1) command; see Trying It Out and
Troubleshooting.
Note: Language-based printers, such as PostScript printers, cannot directly print plain text. The
simple setup outlined above and described in the following sections assumes that if you are installing
such a printer you will print only files that the printer can understand.
Users often expect that they can print plain text to any of the printers installed on your system. Programs
that interface to LPD to do their printing usually make the same assumption. If you are installing such a
printer and want to be able to print jobs in the printer language and print plain text jobs, you are strongly
urged to add an additional step to the simple setup outlined above: install an automatic
plain-text-to-PostScript (or other printer language) conversion program. Section Accommodating Plain
Text Jobs on PostScript Printers tells how to do this.
172
Chapter 7. Printing
At least one of the printers specified in the /etc/printcap should have the alias lp. This is the default
printers name. If users do not have the PRINTER environment variable nor specify a printer name on
the command line of any of the LPD commands, then lp will be the default printer they get to use.
Also, it is common practice to make the last alias for a printer be a full description of the printer,
including make and model.
Once you have picked a name and some common aliases, put them in the /etc/printcap file. The
name of the printer should start in the leftmost column. Separate each alias with a vertical bar and put a
colon after the last alias.
In the following example, we start with a skeletal /etc/printcap that defines two printers (a Diablo
630 line printer and a Panasonic KX-P4455 PostScript laser printer):
#
# /etc/printcap for host rose
#
rattan|line|diablo|lp|Diablo 630 Line Printer:
In this example, the first printer is named rattan and has as aliases line, diablo, lp, and Diablo
630 Line Printer. Since it has the alias lp, it is also the default printer. The second is named
bamboo, and has as aliases ps, PS, S, panasonic, and Panasonic KX-P4455 PostScript v51.4.
#
# /etc/printcap for host rose - no header pages anywhere
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:
173
Chapter 7. Printing
Note how we used the correct format: the first line starts in the leftmost column, and subsequent lines are
indented with a single TAB. Every line in an entry except the last ends in a backslash character.
# mkdir /var/spool/printer-name
However, if you have a lot of printers on your network, you might want to put the spooling directories
under a single directory that you reserve just for printing with LPD. We will do this for our two example
printers rattan and bamboo:
# mkdir /var/spool/lpd
# mkdir /var/spool/lpd/rattan
# mkdir /var/spool/lpd/bamboo
Note: If you are concerned about the privacy of jobs that users print, you might want to protect the
spooling directory so it is not publicly accessible. Spooling directories should be owned and be
readable, writable, and searchable by user daemon and group daemon, and no one else. We will do
this for our example printers:
Finally, you need to tell LPD about these directories using the /etc/printcap file. You specify the
pathname of the spooling directory with the sd capability:
#
# /etc/printcap for host rose - added spooling directories
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:sd=/var/spool/lpd/rattan:
174
Chapter 7. Printing
Note that the name of the printer starts in the first column but all other entries describing the printer
should be indented with a tab and each line escaped with a backslash.
If you do not specify a spooling directory with sd, the spooling system will use /var/spool/lpd as a
default.
#
# /etc/printcap for host rose - identified what devices to use
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:sd=/var/spool/lpd/rattan:\
:lp=/dev/lpt0:
If you do not specify the lp capability for a printer in your /etc/printcap file, LPD uses /dev/lp as
a default. /dev/lp currently does not exist in FreeBSD.
If the printer you are installing is connected to a parallel port, skip to the section Installing the Text
Filter. Otherwise, be sure to follow the instructions in the next section.
175
Chapter 7. Printing
It lets you try different communication parameters by simply editing the /etc/printcap file; you do
not have to recompile the filter program.
It enables the spooling system to use the same filter program for multiple printers which may have
different serial communication settings.
The following /etc/printcap capabilities control serial communication parameters of the device
listed in the lp capability:
br#bps-rate
Sets the communications speed of the device to bps-rate, where bps-rate can be 50, 75, 110,
134, 150, 200, 300, 600, 1200, 1800, 2400, 4800, 9600, 19200, or 38400 bits-per-second.
fc#clear-bits
Clears the flag bits clear-bits in the sgttyb structure after opening the device.
fs#set-bits
xc#clear-bits
xs#set-bits
For more information on the bits for the fc, fs, xc, and xs capabilities, see the file
/usr/include/sys/ioctl_compat.h.
When LPD opens the device specified by the lp capability, it reads the flag bits in the sgttyb structure;
it clears any bits in the fc capability, then sets bits in the fs capability, then applies the resultant setting.
It does the same for the local mode bits as well.
Let us add to our example printer on the sixth serial port. We will set the bps rate to 38400. For the flag
bits, we will set the TANDEM, ANYP, LITOUT, FLUSHO, and PASS8 flags. For the local mode bits,
we will set the LITOUT and PASS8 flags:
176
Chapter 7. Printing
#!/bin/sh
#
# if-simple - Simple text input filter for lpd
# Installed in /usr/local/libexec/if-simple
#
# Simply copies stdin to stdout. Ignores all filter arguments.
And then tell LPD to use it by specifying it with the if capability in /etc/printcap. We will add it to
the two printers we have so far in the example /etc/printcap:
#
# /etc/printcap for host rose - added text filter
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:sd=/var/spool/lpd/rattan:\ :lp=/dev/lpt0:\
:if=/usr/local/libexec/if-simple:
177
Chapter 7. Printing
Trying It Out
You have reached the end of the simple LPD setup. Unfortunately, congratulations are not quite yet in
order, since we still have to test the setup and correct any problems. To test the setup, try printing
something. To print with the LPD system, you use the command lpr(1), which submits a job for printing.
You can combine lpr(1) with the lptest(1) program, introduced in section Checking Printer
Communications to generate some test text.
To test the simple LPD setup:
Type:
Where printer-name is a the name of a printer (or an alias) specified in /etc/printcap. To test the
default printer, type lpr(1) without any -P argument. Again, if you are testing a printer that expects
PostScript, send a PostScript program in that language instead of using lptest(1). You can do so by
putting the program in a file and typing lpr file.
For a PostScript printer, you should get the results of the program. If you are using lptest(1), then your
results should look like the following:
!"#$%&()*+,-./01234
"#$%&()*+,-./012345
#$%&()*+,-./0123456
$%&()*+,-./01234567
%&()*+,-./012345678
To further test the printer, try downloading larger programs (for language-based printers) or running
lptest(1) with different arguments. For example, lptest 80 60 will produce 60 lines of 80 characters
each.
If the printer did not work, see the next section, Troubleshooting.
Troubleshooting
After performing the simple test with lptest(1), you might have gotten one of the following results
instead of the correct printout:
178
Chapter 7. Printing
If this is the case, the printer was probably waiting to see if there was any more data for your job
before it printed anything. To fix this problem, you can have the text filter send a FORM FEED
character (or whatever is necessary) to the printer. This is usually sufficient to have the printer
immediately print any text remaining in its internal buffer. It is also useful to make sure each print
job ends on a full sheet, so the next job does not start somewhere on the middle of the last page of
the previous job.
The following replacement for the shell script /usr/local/libexec/if-simple prints a form
feed after it sends the job to the printer:
#!/bin/sh
#
# if-simple - Simple text input filter for lpd
# Installed in /usr/local/libexec/if-simple
#
# Simply copies stdin to stdout. Ignores all filter arguments.
# Writes a form feed character (\f) after printing job.
You have become another victim of the staircase effect, caused by conflicting interpretations of
what characters should indicate a new-line. UNIX-style operating systems use a single character:
ASCII code 10, the line feed (LF). MS-DOS, OS/2, and others uses a pair of characters, ASCII code
10 and ASCII code 13 (the carriage return or CR). Many printers use the MS-DOS convention for
representing new-lines.
When you print with FreeBSD, your text used just the line feed character. The printer, upon seeing a
line feed character, advanced the paper one line, but maintained the same horizontal position on the
page for the next character to print. That is what the carriage return is for: to move the location of
the next character to print to the left edge of the paper.
Here is what FreeBSD wants your printer to do:
179
Chapter 7. Printing
Use the printers configuration switches or control panel to alter its interpretation of these
characters. Check your printers manual to find out how to do this.
Note: If you boot your system into other operating systems besides FreeBSD, you may have
to reconfigure the printer to use a an interpretation for CR and LF characters that those other
operating systems use. You might prefer one of the other solutions, below.
Have FreeBSDs serial line driver automatically convert LF to CR+LF. Of course, this works with
printers on serial ports only. To enable this feature, set the CRMOD bit in fs capability in the
/etc/printcap file for the printer.
Send an escape code to the printer to have it temporarily treat LF characters differently. Consult
your printers manual for escape codes that your printer might support. When you find the proper
escape code, modify the text filter to send the code first, then send the print job.
Here is an example text filter for printers that understand the Hewlett-Packard PCL escape codes.
This filter makes the printer treat LF characters as a LF and CR; then it sends the job; then it
sends a form feed to eject the last page of the job. It should work with nearly all Hewlett Packard
printers.
#!/bin/sh
#
# hpif - Simple text input filter for lpd for HP-PCL based printers
# Installed in /usr/local/libexec/hpif
#
# Simply copies stdin to stdout. Ignores all filter arguments.
# Tells printer to treat LF as CR+LF. Ejects the page when done.
Here is an example /etc/printcap from a host called orchid. It has a single printer attached to
its first parallel port, a Hewlett Packard LaserJet 3Si named teak. It is using the above script as
its text filter:
#
# /etc/printcap for host orchid
#
teak|hp|laserjet|Hewlett Packard LaserJet 3Si:\
:lp=/dev/lpt0:sh:sd=/var/spool/lpd/teak:mx#0:\
:if=/usr/local/libexec/hpif:
180
Chapter 7. Printing
If the printer supports XON/XOFF flow control, have FreeBSD use it by specifying the
TANDEM bit in the fs capability.
If the printer supports carrier flow control, specify the MDMBUF bit in the fs capability. Make
sure the cable connecting the printer to the computer is correctly wired for carrier flow control.
If the printer does not support any flow control, use some combination of the NLDELAY,
TBDELAY, CRDELAY, VTDELAY, and BSDELAY bits in the fs capability to add appropriate
delays to the stream of data sent to the printer.
It printed garbage.
The printer printed what appeared to be random garbage, but not the desired text.
This is usually another symptom of incorrect communications parameters with a serial printer.
Double-check the bps rate in the br capability, and the parity bits in the fs and fc capabilities;
make sure the printer is using the same settings as specified in the /etc/printcap file.
181
Chapter 7. Printing
Nothing happened.
If nothing happened, the problem is probably within FreeBSD and not the hardware. Add the log
file (lf) capability to the entry for the printer you are debugging in the /etc/printcap file. For
example, here is the entry for rattan, with the lf capability:
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:sd=/var/spool/lpd/rattan:\
:lp=/dev/lpt0:\
:if=/usr/local/libexec/if-simple:\
:lf=/var/log/rattan.log
Then, try printing again. Check the log file (in our example, /var/log/rattan.log) to see any
error messages that might appear. Based on the messages you see, try to correct the problem.
If you do not specify a lf capability, LPD uses /dev/console as a default.
Using Printers
This section tells you how to use printers you have setup with FreeBSD. Here is an overview of the
user-level commands:
lpr(1)
Print jobs
lpq(1)
Check printer queues
lprm(1)
Remove jobs from a printers queue
There is also an administrative command, lpc(8), described in the section Administrating the LPD
Spooler, used to control printers and their queues.
All three of the commands lpr(1), lprm(1), and lpq(1) accept an option -P printer-name to specify on
which printer/queue to operate, as listed in the /etc/printcap file. This enables you to submit,
remove, and check on jobs for various printers. If you do not use the -P option, then these commands
182
Chapter 7. Printing
use the printer specified in the PRINTER environment variable. Finally, if you do not have a PRINTER
environment variable, these commands default to the printer named lp.
Hereafter, the terminology default printer means the printer named in the PRINTER environment
variable, or the printer named lp when there is no PRINTER environment variable.
Printing Jobs
To print files, type:
This prints each of the listed files to the default printer. If you list no files, lpr(1) reads data to print from
standard input. For example, this command prints some important system files:
This example prints a long listing of the current directory to the printer named rattan:
% ls -l | lpr -P rattan
Because no files were listed for the lpr(1) command, lpr read the data to print from standard input,
which was the output of the ls -l command.
The lpr(1) command can also accept a wide variety of options to control formatting, apply file
conversions, generate multiple copies, and so forth. For more information, see the section Printing
Options.
Checking Jobs
When you print with lpr(1), the data you wish to print is put together in a package called a print job,
which is sent to the LPD spooling system. Each printer has a queue of jobs, and your job waits in that
queue along with other jobs from yourself and from other users. The printer prints those jobs in a
first-come, first-served order.
To display the queue for the default printer, type lpq(1). For a specific printer, use the -P option. For
example, the command
% lpq -P bamboo
183
Chapter 7. Printing
shows the queue for the printer named bamboo. Here is an example of the output of the lpq command:
This shows three jobs in the queue for bamboo. The first job, submitted by user kelly, got assigned job
number 9. Every job for a printer gets a unique job number. Most of the time you can ignore the job
number, but you will need it if you want to cancel the job; see section Removing Jobs for details.
Job number nine consists of two files; multiple files given on the lpr(1) command line are treated as part
of a single job. It is the currently active job (note the word active under the Rank column), which
means the printer should be currently printing that job. The second job consists of data passed as the
standard input to the lpr(1) command. The third job came from user mary; it is a much larger job. The
pathname of the files shes trying to print is too long to fit, so the lpq(1) command just shows three dots.
The very first line of the output from lpq(1) is also useful: it tells what the printer is currently doing (or at
least what LPD thinks the printer is doing).
The lpq(1) command also support a -l option to generate a detailed long listing. Here is an example of
lpq -l:
Removing Jobs
If you change your mind about printing a job, you can remove the job from the queue with the lprm(1)
command. Often, you can even use lprm(1) to remove an active job, but some or all of the job might still
get printed.
To remove a job from the default printer, first use lpq(1) to find the job number. Then type:
% lprm job-number
184
Chapter 7. Printing
To remove the job from a specific printer, add the -P option. The following command removes job
number 10 from the queue for the printer bamboo:
% lprm -P bamboo 10
lprm -
Removes all jobs (for the default printer) belonging to you.
lprm user
Removes all jobs (for the default printer) belonging to user. The superuser can remove other
users jobs; you can remove only your own jobs.
lprm
With no job number, user name, or - appearing on the command line, lprm(1) removes the currently
active job on the default printer, if it belongs to you. The superuser can remove any active job.
Just use the -P option with the above shortcuts to operate on a specific printer instead of the default. For
example, the following command removes all jobs for the current user in the queue for the printer named
rattan:
% lprm -P rattan -
Note: If you are working in a networked environment, lprm(1) will let you remove jobs only from the
host from which the jobs were submitted, even if the same printer is available from other hosts. The
following command sequence demonstrates this:
185
Chapter 7. Printing
These options apply to every file in the job, so you cannot mix (say) DVI and ditroff files together in a
job. Instead, submit the files as separate jobs, using a different conversion option for each job.
Note: All of these options except -p and -T require conversion filters installed for the destination
printer. For example, the -d option requires the DVI conversion filter. Section Conversion Filters
gives details.
-c
-d
-f
-g
-i number
Indent the output by number columns; if you omit number, indent by 8 columns. This option
works only with certain conversion filters.
186
Chapter 7. Printing
Note: Do not put any space between the -i and the number.
-l
-n
-p
Format plain text with pr(1) before printing. See pr(1) for more information.
-T title
Use title on the pr(1) header instead of the file name. This option has effect only when used with
the -p option.
-t
-v
Here is an example: this command prints a nicely formatted version of the ls(1) manual page on the
default printer:
187
Chapter 7. Printing
-# copies
Produce a number of copies of each file in the job instead of just one copy. An administrator may
disable this option to reduce printer wear-and-tear and encourage photocopier usage. See section
Restricting Multiple Copies.
This example prints three copies of parser.c followed by three copies of parser.h to the default
printer:
% lpr -#3 parser.c parser.h
-m
Send mail after completing the print job. With this option, the LPD system will send mail to your
account when it finishes handling your job. In its message, it will tell you if the job completed
successfully or if there was an error, and (often) what the error was.
-s
Do not copy the files to the spooling directory, but make symbolic links to them instead.
If you are printing a large job, you probably want to use this option. It saves space in the spooling
directory (your job might overflow the free space on the filesystem where the spooling directory
resides). It saves time as well since LPD will not have to copy each and every byte of your job to
the spooling directory.
There is a drawback, though: since LPD will refer to the original files directly, you cannot modify
or remove them until they have been printed.
Note: If you are printing to a remote printer, LPD will eventually have to copy files from the local
host to the remote host, so the -s option will save space only on the local spooling directory, not
the remote. It is still useful, though.
-r
Remove the files in the job after copying them to the spooling directory, or after printing them with
the -s option. Be careful with this option!
188
Chapter 7. Printing
-C text
Replace the hostname on the header page with text. The hostname is normally the name of the
host from which the job was submitted.
-J text
Replace the job name on the header page with text. The job name is normally the name of the first
file of the job, or stdin if you are printing standard input.
-h
Do not print any header page.
Note: At some sites, this option may have no effect due to the way header pages are
generated. See Header Pages for details.
Administrating Printers
As an administrator for your printers, you have had to install, set up, and test them. Using the lpc(8)
command, you can interact with your printers in yet more ways. With lpc(8), you can
189
Chapter 7. Printing
In general, you have to have root privileges to use the lpc(8) command. Ordinary users can use the lpc(8)
command to get printer status and to restart a hung printer only.
Here is a summary of the lpc(8) commands. Most of the commands takes a printer-name argument
to tell on which printer to operate. You can use all for the printer-name to mean all printers listed
in /etc/printcap.
abort printer-name
Cancel the current job and stop the printer. Users can still submit jobs if the queues enabled.
clean printer-name
Remove old files from the printers spooling directory. Occasionally, the files that make up a job are
not properly removed by LPD, particularly if there have been errors during printing or a lot of
administrative activity. This command finds files that do not belong in the spooling directory and
removes them.
disable printer-name
Disable queuing of new jobs. If the printers started, it will continue to print any jobs remaining in
the queue. The superuser (root) can always submit jobs, even to a disabled queue.
This command is useful while you are testing a new printer or filter installation: disable the queue
and submit jobs as root. Other users will not be able to submit jobs until you complete your testing
and re-enable the queue with the enable command.
Take a printer down. Equivalent to disable followed by stop. The message appears as the
printers status whenever a user checks the printers queue with lpq(1) or status with lpc status.
enable printer-name
Enable the queue for a printer. Users can submit jobs but the printer will not print anything until it is
started.
help command-name
Print help on the command command-name. With no command-name, print a summary of the
commands available.
190
Chapter 7. Printing
restart printer-name
Start the printer. Ordinary users can use this command if some extraordinary circumstance hangs
LPD, but they cannot start a printer stopped with either the stop or down commands. The restart
command is equivalent to abort followed by start.
start printer-name
Start the printer. The printer will print jobs in its queue.
stop printer-name
Stop the printer. The printer will finish the current job and will not print anything else in its queue.
Even though the printer is stopped, users can still submit jobs to an enabled queue.
Rearrange the queue for printer-name by placing the jobs with the listed job numbers or the
jobs belonging to username at the top of the queue. For this command, you cannot use all as the
printer-name.
up printer-name
Bring a printer up; the opposite of the down command. Equivalent to start followed by enable.
lpc(8) accepts the above commands on the command line. If you do not enter any commands, lpc(8)
enters an interactive mode, where you can enter commands until you type exit, quit, or end-of-file.
Filters
Although LPD handles network protocols, queuing, access control, and other aspects of printing, most of
the real work happens in the filters. Filters are programs that communicate with the printer and handle its
device dependencies and special requirements. In the simple printer setup, we installed a plain text
filteran extremely simple one that should work with most printers (section Installing the Text Filter).
191
Chapter 7. Printing
However, in order to take advantage of format conversion, printer accounting, specific printer quirks, and
so on, you should understand how filters work. It will ultimately be the filters responsibility to handle
these aspects. And the bad news is that most of the time you have to provide filters yourself. The good
news is that many are generally available; when they are not, they are usually easy to write.
Also, FreeBSD comes with one, /usr/libexec/lpr/lpf, that works with many printers that can print
plain text. (It handles backspacing and tabs in the file, and does accounting, but that is about all it does.)
There are also several filters and filter components in the FreeBSD ports collection.
Here is what you will find in this section:
Section How Filters Work, tries to give an overview of a filters role in the printing process. You
should read this section to get an understanding of what is happening under the hood when LPD
uses filters. This knowledge could help you anticipate and debug problems you might encounter as
you install more and more filters on each of your printers.
LPD expects every printer to be able to print plain text by default. This presents a problem for
PostScript (or other language-based printers) which cannot directly print plain text. Section
Accommodating Plain Text Jobs on PostScript Printers tells you what you should do to overcome this
problem. I recommend reading this section if you have a PostScript printer.
PostScript is a popular output format for many programs. Even some people (myself included) write
PostScript code directly. But PostScript printers are expensive. Section Simulating PostScript on
Non-PostScript Printers tells how you can further modify a printers text filter to accept and print
PostScript data on a non-PostScript printer. I recommend reading this section if you do not have a
PostScript printer.
Section Conversion Filters tells about a way you can automate the conversion of specific file formats,
such as graphic or typesetting data, into formats your printer can understand. After reading this
section, you should be able to set up your printers such that users can type lpr -t to print troff data,
or lpr -d to print TeX DVI data, or lpr -v to print raster image data, and so forth. I recommend
reading this section.
Section Output Filters tells all about a not often used feature of LPD: output filters. Unless you are
printing header pages (see Header Pages), you can probably skip that section altogether.
Section lpf: a Text Filter describes lpf, a fairly complete if simple text filter for line printers (and
laser printers that act like line printers) that comes with FreeBSD. If you need a quick way to get
printer accounting working for plain text, or if you have a printer which emits smoke when it sees
backspace characters, you should definitely consider lpf.
192
Chapter 7. Printing
The text filter, confusingly called the input filter in LPD documentation, handles regular text printing.
Think of it as the default filter. LPD expects every printer to be able to print plain text by default, and
it is the text filters job to make sure backspaces, tabs, or other special characters do not confuse the
printer. If you are in an environment where you have to account for printer usage, the text filter must
also account for pages printed, usually by counting the number of lines printed and comparing that to
the number of lines per page the printer supports. The text filter is started with the following argument
list:
where
-c
width
is the value from the pw (page width) capability specified in /etc/printcap, default 132
length
is the value from the pl (page length) capability, default 66
indent
is the amount of the indentation from lpr -i, default 0
193
Chapter 7. Printing
login
is the account name of the user printing the file
host
is the host name from which the job was submitted
acct-file
is the name of the accounting file from the af capability.
A conversion filter converts a specific file format into one the printer can render onto paper. For
example, ditroff typesetting data cannot be directly printed, but you can install a conversion filter for
ditroff files to convert the ditroff data into a form the printer can digest and print. Section Conversion
Filters tells all about them. Conversion filters also need to do accounting, if you need printer
accounting. Conversion filters are started with the following arguments:
where pixel-width is the value from the px capability (default 0) and pixel-height is the value
from the py capability (default 0).
The output filter is used only if there is no text filter, or if header pages are enabled. In my experience,
output filters are rarely used. Section Output Filters describe them. There are only two arguments to
an output filter:
exit 0
If the filter printed the file successfully.
exit 1
If the filter failed to print the file but wants LPD to try to print the file again. LPD will restart a filter
if it exits with this status.
exit 2
If the filter failed to print the file and does not want LPD to try again. LPD will throw out the file.
194
Chapter 7. Printing
The text filter that comes with the FreeBSD release, /usr/libexec/lpr/lpf, takes advantage of the
page width and length arguments to determine when to send a form feed and how to account for printer
usage. It uses the login, host, and accounting file arguments to make the accounting entries.
If you are shopping for filters, see if they are LPD-compatible. If they are, they must support the
argument lists described above. If you plan on writing filters for general use, then have them support the
same argument lists and exit codes.
:if=/usr/local/libexec/psif:
You should also specify the rw capability; that tells LPD to open the printer in read-write mode.
If you have a parallel PostScript printer (and therefore cannot use two-way communication with the
printer, which lprps needs), you can use the following shell script as the text filter:
#!/bin/sh
#
# psif - Print PostScript or plain text on a PostScript printer
195
Chapter 7. Printing
read first_line
first_two_chars=expr "$first_line" : \(..\)
In the above script, textps is a program we installed separately to convert plain text to PostScript. You
can use any text-to-PostScript program you wish. The FreeBSD ports collection (see The Ports
Collection) includes a full featured text-to-PostScript program called a2ps that you might want to
investigate.
196
Chapter 7. Printing
Here is an example: the following script is a text filter for Hewlett Packard DeskJet 500 printers. For
other printers, substitute the -sDEVICE argument to the gs (Ghostscript) command. (Type gs -h to get
a list of devices the current installation of Ghostscript supports.)
#!/bin/sh
#
# ifhp - Print Ghostscript-simulated PostScript on a DeskJet 500
# Installed in /usr/local/libexec/hpif
#
# Treat LF as CR+LF:
#
printf "\033&k2G" || exit 2
#
# Read first two characters of the file
#
read first_line
first_two_chars=expr "$first_line" : \(..\)
#
/usr/local/bin/gs -dSAFER -dNOPAUSE -q -sDEVICE=djet500 -sOutputFile=- -
\
&& exit 0
else
#
# Plain text or HP/PCL, so just print it directly; print a form
# at the end to eject the last page.
#
197
Chapter 7. Printing
exit 2
Finally, you need to notify LPD of the filter via the if capability:
:if=/usr/local/libexec/hpif:
That is it. You can type lpr plain.text and lpr whatever.ps and both should print successfully.
Conversion Filters
After completing the simple setup described in Simple Printer Setup, the first thing you will probably
want to do is install conversion filters for your favorite file formats (besides plain ASCII text).
% dvips seaweed-analysis.dvi
% lpr seaweed-analysis.ps
By installing a conversion filter for DVI files, we can skip the hand conversion step each time by having
LPD do it for us. Now, each time we get a DVI file, we are just one step away from printing it:
% lpr -d seaweed-analysis.dvi
We got LPD to do the DVI file conversion for us by specifying the -d option. Section Formatting and
Conversion Options lists the conversion options.
For each of the conversion options you want a printer to support, install a conversion filter and specify its
pathname in /etc/printcap. A conversion filter is like the text filter for the simple printer setup (see
section Installing the Text Filter) except that instead of printing plain text, the filter converts the file into
a format the printer can understand.
198
Chapter 7. Printing
filter.
The following table summarizes the filters that LPD works with, their capability entries for the
/etc/printcap file, and how to invoke them with the lpr command:
In our example, using lpr -d means the printer needs a df capability in its entry in /etc/printcap.
Despite what others might contend, formats like FORTRAN text and plot are probably obsolete. At your
site, you can give new meanings to these or any of the formatting options just by installing custom filters.
For example, suppose you would like to directly print Printerleaf files (files from the Interleaf desktop
publishing program), but will never print plot files. You could install a Printerleaf conversion filter under
the gf capability and then educate your users that lpr -g mean print Printerleaf files.
#
# /etc/printcap for host rose - added df filter for bamboo
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:sd=/var/spool/lpd/rattan:\
:lp=/dev/lpt0:\
199
Chapter 7. Printing
:if=/usr/local/libexec/if-simple:
The DVI filter is a shell script named /usr/local/libexec/psdf. Here is that script:
#!bin/sh
#
# psdf - DVI to PostScript printer filter
# Installed in /usr/local/libexec/psdf
#
# Invoked by lpd when user runs lpr -d
#
exec /usr/local/bin/dvips -f | /usr/local/libexec/lprps "$@"
This script runs dvips in filter mode (the -f argument) on standard input, which is the job to print. It
then starts the PostScript printer filter lprps (see section Accommodating Plain Text Jobs on PostScript
Printers) with the arguments LPD passed to this script. lprps will use those arguments to account for
the pages printed.
#!/bin/sh
#
# hpvf - Convert GIF files into HP/PCL, then print
# Installed in /usr/local/libexec/hpvf
It works by converting the GIF file into a portable anymap, converting that into a portable graymap,
converting that into a portable bitmap, and converting that into LaserJet/PCL-compatible data.
200
Chapter 7. Printing
Here is the /etc/printcap file with an entry for a printer using the above filter:
#
# /etc/printcap for host orchid
#
teak|hp|laserjet|Hewlett Packard LaserJet 3Si:\
:lp=/dev/lpt0:sh:sd=/var/spool/lpd/teak:mx#0:\
:if=/usr/local/libexec/hpif:\
:vf=/usr/local/libexec/hpvf:
The following script is a conversion filter for troff data from the groff typesetting system for the
PostScript printer named bamboo:
#!/bin/sh
#
# pstf - Convert groffs troff data into PS, then print.
# Installed in /usr/local/libexec/pstf
#
exec grops | /usr/local/libexec/lprps "$@"
The above script makes use of lprps again to handle the communication with the printer. If the printer
were on a parallel port, we would use this script instead:
#!/bin/sh
#
# pstf - Convert groffs troff data into PS, then print.
# Installed in /usr/local/libexec/pstf
#
exec grops
That is it. Here is the entry we need to add to /etc/printcap to enable the filter:
:tf=/usr/local/libexec/pstf:
Here is an example that might make old hands at FORTRAN blush. It is a FORTRAN-text filter for any
printer that can directly print plain text. We will install it for the printer teak:
#!/bin/sh
#
# hprf - FORTRAN text filter for LaserJet 3si:
# Installed in /usr/local/libexec/hprf
#
201
Chapter 7. Printing
And we will add this line to the /etc/printcap for the printer teak to enable this filter:
:rf=/usr/local/libexec/hprf:
Here is one final, somewhat complex example. We will add a DVI filter to the LaserJet printer teak
introduced earlier. First, the easy part: updating /etc/printcap with the location of the DVI filter:
:df=/usr/local/libexec/hpdf:
Now, for the hard part: making the filter. For that, we need a DVI-to-LaserJet/PCL conversion program.
The FreeBSD ports collection (see The Ports Collection) has one: dvi2xx is the name of the package.
Installing this package gives us the program we need, dvilj2p, which converts DVI into LaserJet IIp,
LaserJet III, and LaserJet 2000 compatible codes.
dvilj2p makes the filter hpdf quite complex since dvilj2p cannot read from standard input. It wants
to work with a filename. What is worse, the filename has to end in .dvi so using /dev/fd/0 for
standard input is problematic. We can get around that problem by linking (symbolically) a temporary file
name (one that ends in .dvi) to /dev/fd/0, thereby forcing dvilj2p to read from standard input.
The only other fly in the ointment is the fact that we cannot use /tmp for the temporary link. Symbolic
links are owned by user and group bin. The filter runs as user daemon. And the /tmp directory has the
sticky bit set. The filter can create the link, but it will not be able clean up when done and remove it since
the link will belong to a different user.
Instead, the filter will make the symbolic link in the current working directory, which is the spooling
directory (specified by the sd capability in /etc/printcap). This is a perfect place for filters to do
their work, especially since there is (sometimes) more free disk space in the spooling directory than
under /tmp.
Here, finally, is the filter:
#!/bin/sh
#
# hpdf - Print DVI data on HP/PCL printer
# Installed in /usr/local/libexec/hpdf
#
# Define a function to clean up our temporary files. These exist
# in the current directory, which will be the spooling directory
# for the printer.
#
cleanup() {
rm -f hpdf$$.dvi
}
202
Chapter 7. Printing
#
# Define a function to handle fatal errors: print the given message
# and exit 2. Exiting with 2 tells LPD to do not try to reprint the
# job.
#
fatal() {
echo "$@" 1>&2
cleanup
exit 2
}
#
# If user removes the job, LPD will send SIGINT, so trap SIGINT
# (and a few other signals) to clean up after ourselves.
#
trap cleanup 1 2 15
#
# Make sure we are not colliding with any existing files.
#
cleanup
#
# Link the DVI input file to standard input (the file to print).
#
ln -s /dev/fd/0 hpdf$$.dvi || fatal "Cannot symlink /dev/fd/0"
#
# Make LF = CR+LF
#
printf "\033&k2G" || fatal "Cannot initialize printer"
#
# Convert and print. Return value from dvilj2p does not seem to be
# reliable, so we ignore it.
#
dvilj2p -M1 -q -e- dfhp$$.dvi
#
# Clean up and exit
#
cleanup
exit 0
203
Chapter 7. Printing
Output Filters
The LPD spooling system supports one other type of filter that we have not yet explored: an output filter.
An output filter is intended for printing plain text only, like the text filter, but with many simplifications.
If you are using an output filter but no text filter, then:
LPD starts an output filter once for the entire job instead of once for each file in the job.
LPD does not make any provision to identify the start or the end of files within the job for the output
filter.
LPD does not pass the users login or host to the filter, so it is not intended to do accounting. In fact, it
gets only two arguments:
Where width is from the pw capability and length is from the pl capability for the printer in
question.
Do not be seduced by an output filters simplicity. If you would like each file in a job to start on a
different page an output filter will not work. Use a text filter (also known as an input filter); see section
Installing the Text Filter. Furthermore, an output filter is actually more complex in that it has to examine
the byte stream being sent to it for special flag characters and must send signals to itself on behalf of
LPD.
However, an output filter is necessary if you want header pages and need to send escape sequences or
other initialization strings to be able to print the header page. (But it is also futile if you want to charge
204
Chapter 7. Printing
header pages to the requesting users account, since LPD does not give any user or host information to
the output filter.)
On a single printer, LPD allows both an output filter and text or other filters. In such cases, LPD will start
the output filter to print the header page (see section Header Pages) only. LPD then expects the output
filter to stop itself by sending two bytes to the filter: ASCII 031 followed by ASCII 001. When an output
filter sees these two bytes (031, 001), it should stop by sending SIGSTOP to itself. When LPDs done
running other filters, it will restart the output filter by sending SIGCONT to it.
If there is an output filter but no text filter and LPD is working on a plain text job, LPD uses the output
filter to do the job. As stated before, the output filter will print each file of the job in sequence with no
intervening form feeds or other paper advancement, and this is probably not what you want. In almost all
cases, you need a text filter.
The program lpf, which we introduced earlier as a text filter, can also run as an output filter. If you need
a quick-and-dirty output filter but do not want to write the byte detection and signal sending code, try
lpf. You can also wrap lpf in a shell script to handle any initialization codes the printer might require.
In order for lpf to do page accounting correctly, it needs correct values filled in for the pw and pl
capabilities in the /etc/printcap file. It uses these values to determine how much text can fit on a
page and how many pages were in a users job. For more information on printer accounting, see
Accounting for Printer Usage.
Header Pages
If you have lots of users, all of them using various printers, then you probably want to consider header
pages as a necessary evil.
Header pages, also known as banner or burst pages identify to whom jobs belong after they are printed.
They are usually printed in large, bold letters, perhaps with decorative borders, so that in a stack of
printouts they stand out from the real documents that comprise users jobs. They enable users to locate
205
Chapter 7. Printing
their jobs quickly. The obvious drawback to a header page is that it is yet one more sheet that has to be
printed for every job, their ephemeral usefulness lasting not more than a few minutes, ultimately finding
themselves in a recycling bin or rubbish heap. (Note that header pages go with each job, not each file in a
job, so the paper waste might not be that bad.)
The LPD system can provide header pages automatically for your printouts if your printer can directly
print plain text. If you have a PostScript printer, you will need an external program to generate the header
page; see Header Pages on PostScript Printers.
#!/bin/sh
#
# hpof - Output filter for Hewlett Packard PCL-compatible printers
# Installed in /usr/local/libexec/hpof
Specify the path to the output filter in the of capability. See Output Filters for more information.
Here is an example /etc/printcap file for the printer teak that we introduced earlier; we enabled
header pages and added the above output filter:
#
# /etc/printcap for host orchid
#
teak|hp|laserjet|Hewlett Packard LaserJet 3Si:\
:lp=/dev/lpt0:sd=/var/spool/lpd/teak:mx#0:\
:if=/usr/local/libexec/hpif:\
:vf=/usr/local/libexec/hpvf:\
:of=/usr/local/libexec/hpof:
Now, when users print jobs to teak, they get a header page with each job. If users want to spend time
searching for their printouts, they can suppress header pages by submitting the job with lpr -h; see
Header Page Options for more lpr(1) options.
206
Chapter 7. Printing
Note: LPD prints a form feed character after the header page. If your printer uses a different
character or sequence of characters to eject a page, specify them with the ff capability in
/etc/printcap.
k ll ll
k l l
k l l
k k eeee l l y y
k k e e l l y y
k k eeeeee l l y y
kk k e l l y y
k k e e l l y yy
k k eeee lll lll yyy y
y
y y
yyyy
ll
t l i
t l
oooo u u ttttt l ii n nnn eeee
o o u u t l i nn n e e
o o u u t l i n n eeeeee
o o u u t l i n n e
o o u uu t t l i n n e e
oooo uuu u tt lll iii n n eeee
207
Chapter 7. Printing
r o o ss eeeeee
r o o ss e
r o o s s e e
r oooo ssss eeee
Job: outline
Date: Sun Sep 17 11:04:58 1995
LPD appends a form feed after this text so the job starts on a new page (unless you have sf (suppress
form feeds) in the destination printers entry in /etc/printcap).
If you prefer, LPD can make a short header; specify sb (short banner) in the /etc/printcap file. The
header page will look like this:
Also by default, LPD prints the header page first, then the job. To reverse that, specify hl (header last) in
/etc/printcap.
208
Chapter 7. Printing
#!/bin/sh
#
# make-ps-header - make a PostScript header page on stdout
# Installed in /usr/local/libexec/make-ps-header
#
#
# These are PostScript units (72 to the inch). Modify for A4 or
# whatever size paper you are using:
#
page_width=612
209
Chapter 7. Printing
page_height=792
border=72
#
# Check arguments
#
if [ $# -ne 3 ]; then
echo "Usage: basename $0 <user> <host> <job>" 1>&2
exit 1
fi
#
# Save these, mostly for readability in the PostScript, below.
#
user=$1
host=$2
job=$3
date=date
#
# Send the PostScript code to stdout.
#
exec cat <<EOF
%!PS
%
% Make sure we do not interfere with users job that will follow
%
save
%
% Make a thick, unpleasant border around the edge of the paper.
%
$border $border moveto
$page_width $border 2 mul sub 0 rlineto
0 $page_height $border 2 mul sub rlineto
currentscreen 3 -1 roll pop 100 3 1 roll setscreen
$border 2 mul $page_width sub 0 rlineto closepath
0.8 setgray 10 setlinewidth stroke 0 setgray
%
% Display users login name, nice and large and prominent
%
/Helvetica-Bold findfont 64 scalefont setfont
$page_width ($user) stringwidth pop sub 2 div $page_height 200 sub moveto
210
Chapter 7. Printing
($user) show
%
% Now show the boring particulars
%
/Helvetica findfont 14 scalefont setfont
/y 200 def
[ (Job:) (Host:) (Date:) ] {
200 y moveto show /y y 18 sub def }
forall
%
% That is it
%
restore
showpage
EOF
Now, each of the conversion filters and the text filter can call this script to first generate the header page,
and then print the users job. Here is the DVI conversion filter from earlier in this document, modified to
make a header page:
#!/bin/sh
#
# psdf - DVI to PostScript printer filter
# Installed in /usr/local/libexec/psdf
#
# Invoked by lpd when user runs lpr -d
#
orig_args="$@"
fail() {
echo "$@" 1>&2
exit 2
}
211
Chapter 7. Printing
x|y) ;; # Ignore
n) login=$OPTARG ;;
h) host=$OPTARG ;;
*) echo "LPD started basename $0 wrong." 1>&2
exit 2
;;
esac
done
Notice how the filter has to parse the argument list in order to determine the user and host name. The
parsing for the other conversion filters is identical. The text filter takes a slightly different set of
arguments, though (see section How Filters Work).
As we have mentioned before, the above scheme, though fairly simple, disables the suppress header
page option (the -h option) to lpr. If users wanted to save a tree (or a few pennies, if you charge for
header pages), they would not be able to do so, since every filters going to print a header page with
every job.
To allow users to shut off header pages on a per-job basis, you will need to use the trick introduced in
section Accounting for Header Pages: write an output filter that parses the LPD-generated header page
and produces a PostScript version. If the user submits the job with lpr -h, then LPD will not generate a
header page, and neither will your output filter. Otherwise, your output filter will read the text from LPD
and send the appropriate header page PostScript code to the printer.
If you have a PostScript printer on a serial line, you can make use of lprps, which comes with an output
filter, psof, which does the above. Note that psof does not charge for header pages.
Networked Printing
FreeBSD supports networked printing: sending jobs to remote printers. Networked printing generally
refers to two different things:
Accessing a printer attached to a remote host. You install a printer that has a conventional serial or
parallel interface on one host. Then, you set up LPD to enable access to the printer from other hosts on
the network. Section Printers Installed on Remote Hosts tells how to do this.
212
Chapter 7. Printing
Accessing a printer attached directly to a network. The printer has a network interface in addition (or
in place of) a more conventional serial or parallel interface. Such a printer might work as follows:
It might understand the LPD protocol and can even queue jobs from remote hosts. In this case, it
acts just like a regular host running LPD. Follow the same procedure in section Printers Installed on
Remote Hosts to set up such a printer.
It might support a data stream network connection. In this case, you attach the printer to one host
on the network by making that host responsible for spooling jobs and sending them to the printer.
Section Printers with Networked Data Stream Interfaces gives some suggestions on installing such
printers.
1. Name the entry anything you want. For simplicity, though, you probably want to use the same name
and aliases as on the printer host.
2. Leave the lp capability blank, explicitly (:lp=:).
3. Make a spooling directory and specify its location in the sd capability. LPD will store jobs here
before they get sent to the printer host.
4. Place the name of the printer host in the rm capability.
5. Place the printer name on the printer host in the rp capability.
213
Chapter 7. Printing
That is it. You do not need to list conversion filters, page dimensions, or anything else in the
/etc/printcap file.
Here is an example. The host rose has two printers, bamboo and rattan. We will enable users on the
host orchid to print to those printers. Here is the /etc/printcap file for orchid (back from section
Enabling Header Pages). It already had the entry for the printer teak; we have added entries for the two
printers on the host rose:
#
# /etc/printcap for host orchid - added (remote) printers on rose
#
#
# teak is local; it is connected directly to orchid:
#
teak|hp|laserjet|Hewlett Packard LaserJet 3Si:\
:lp=/dev/lpt0:sd=/var/spool/lpd/teak:mx#0:\
:if=/usr/local/libexec/ifhp:\
:vf=/usr/local/libexec/vfhp:\
:of=/usr/local/libexec/ofhp:
#
# rattan is connected to rose; send jobs for rattan to rose:
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:lp=:rm=rose:rp=rattan:sd=/var/spool/lpd/rattan:
#
# bamboo is connected to rose as well:
#
bamboo|ps|PS|S|panasonic|Panasonic KX-P4455 PostScript v51.4:\
:lp=:rm=rose:rp=bamboo:sd=/var/spool/lpd/bamboo:
Now, users on orchid can print to rattan and bamboo. If, for example, a user on orchid typed
the LPD system on orchid would copy the job to the spooling directory /var/spool/lpd/bamboo and
note that it was a DVI job. As soon as the host rose has room in its bamboo spooling directory, the two
214
Chapter 7. Printing
LPDs would transfer the file to rose. The file would wait in roses queue until it was finally printed. It
would be converted from DVI to PostScript (since bamboo is a PostScript printer) on rose.
#!/usr/bin/perl
#
# netprint - Text filter for printer attached to network
# Installed in /usr/local/libexec/netprint
#
$#ARGV eq 1 || die "Usage: $0 <printer-hostname> <port-number>";
$printer_host = $ARGV[0];
$printer_port = $ARGV[1];
require sys/socket.ph;
215
Chapter 7. Printing
We can then use this script in various filters. Suppose we had a Diablo 750-N line printer connected to
the network. The printer accepts data to print on port number 5100. The host name of the printer is
scrivener. Here is the text filter for the printer:
#!/bin/sh
#
# diablo-if-net - Text filter for Diablo printer scrivener listening
# on port 5100. Installed in /usr/local/libexec/diablo-if-net
#
exec /usr/libexec/lpr/lpf "$@" | /usr/local/libexec/netprint scrivener 5100
If you feel multiple copies cause unnecessary wear and tear on your printers, you can disable the -#
option to lpr(1) by adding the sc capability to the /etc/printcap file. When users submit jobs with
the -# option, they will see:
Note that if you have set up access to a printer remotely (see section Printers Installed on Remote Hosts),
you need the sc capability on the remote /etc/printcap files as well, or else users will still be able to
submit multiple-copy jobs by using another host.
Here is an example. This is the /etc/printcap file for the host rose. The printer rattan is quite
hearty, so we will allow multiple copies, but the laser printer bamboos a bit more delicate, so we will
disable multiple copies by adding the sc capability:
#
# /etc/printcap for host rose - restrict multiple copies on bamboo
216
Chapter 7. Printing
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:sd=/var/spool/lpd/rattan:\
:lp=/dev/lpt0:\
:if=/usr/local/libexec/if-simple:
Now, we also need to add the sc capability on the host orchids /etc/printcap (and while we are at
it, let us disable multiple copies for the printer teak):
#
# /etc/printcap for host orchid - no multiple copies for local
# printer teak or remote printer bamboo
teak|hp|laserjet|Hewlett Packard LaserJet 3Si:\
:lp=/dev/lpt0:sd=/var/spool/lpd/teak:mx#0:sc:\
:if=/usr/local/libexec/ifhp:\
:vf=/usr/local/libexec/vfhp:\
:of=/usr/local/libexec/ofhp:
By using the sc capability, we prevent the use of lpr -#, but that still does not prevent users from
running lpr(1) multiple times, or from submitting the same file multiple times in one job like this:
There are many ways to prevent this abuse (including ignoring it) which you are free to explore.
217
Chapter 7. Printing
Users outside the group (including root) will be greeted with lpr: Not a member of the restricted group if
they try to print to the controlled printer.
As with the sc (suppress multiple copies) capability, you need to specify rg on remote hosts that also
have access to your printers, if you feel it is appropriate (see section Printers Installed on Remote Hosts).
For example, we will let anyone access the printer rattan, but only those in group artists can use
bamboo. Here is the familiar /etc/printcap for host rose:
#
# /etc/printcap for host rose - restricted group for bamboo
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:sd=/var/spool/lpd/rattan:\
:lp=/dev/lpt0:\
:if=/usr/local/libexec/if-simple:
Let us leave the other example /etc/printcap file (for the host orchid) alone. Of course, anyone on
orchid can print to bamboo. It might be the case that we only allow certain logins on orchid anyway,
and want them to have access to the printer. Or not.
Note: The limit applies to files in a job, and not the total job size.
218
Chapter 7. Printing
LPD will not refuse a file that is larger than the limit you place on a printer. Instead, it will queue as
much of the file up to the limit, which will then get printed. The rest will be discarded. Whether this is
correct behavior is up for debate.
Let us add limits to our example printers rattan and bamboo. Since those artists PostScript files tend
to be large, we will limit them to five megabytes. We will put no limit on the plain text line printer:
#
# /etc/printcap for host rose
#
#
# No limit on job size:
#
rattan|line|diablo|lp|Diablo 630 Line Printer:\
:sh:mx#0:sd=/var/spool/lpd/rattan:\
:lp=/dev/lpt0:\
:if=/usr/local/libexec/if-simple:
#
# Limit of five megabytes:
#
bamboo|ps|PS|S|panasonic|Panasonic KX-P4455 PostScript v51.4:\
:sh:sd=/var/spool/lpd/bamboo:sc:rg=artists:mx#5000:\
:lp=/dev/ttyd5:fs#0x82000e1:xs#0x820:rw:\
:if=/usr/local/libexec/psif:\
:df=/usr/local/libexec/psdf:
Again, the limits apply to the local users only. If you have set up access to your printers remotely, remote
users will not get those limits. You will need to specify the mx capability in the remote /etc/printcap
files as well. See section Printers Installed on Remote Hosts for more information on remote printing.
There is another specialized way to limit job sizes from remote printers; see section Restricting Jobs
from Remote Printers.
Host restrictions
You can control from which remote hosts a local LPD accepts requests with the files
/etc/hosts.equiv and /etc/hosts.lpd. LPD checks to see if an incoming request is from a
host listed in either one of these files. If not, LPD refuses the request.
219
Chapter 7. Printing
The format of these files is simple: one host name per line. Note that the file /etc/hosts.equiv
is also used by the ruserok(3) protocol, and affects programs like rsh(1) and rcp(1), so be careful.
For example, here is the /etc/hosts.lpd file on the host rose:
orchid
violet
madrigal.fishbaum.de
This means rose will accept requests from the hosts orchid, violet, and
madrigal.fishbaum.de. If any other host tries to access roses LPD, LPD will refuse them.
Size restrictions
You can control how much free space there needs to remain on the filesystem where a spooling
directory resides. Make a file called minfree in the spooling directory for the local printer. Insert
in that file a number representing how many disk blocks (512 bytes) of free space there has to be for
a remote job to be accepted.
This lets you insure that remote users will not fill your filesystem. You can also use it to give a
certain priority to local users: they will be able to queue jobs long after the free disk space has fallen
below the amount specified in the minfree file.
For example, let us add a minfree file for the printer bamboo. We examine /etc/printcap to
find the spooling directory for this printer; here is bamboos entry:
bamboo|ps|PS|S|panasonic|Panasonic KX-P4455 PostScript v51.4:\
:sh:sd=/var/spool/lpd/bamboo:sc:rg=artists:mx#5000:\
:lp=/dev/ttyd5:fs#0x82000e1:xs#0x820:rw:mx#5000:\
:if=/usr/local/libexec/psif:\
:df=/usr/local/libexec/psdf:
The spooling directory is the given in the sd capability. We will make three megabytes (which is
6144 disk blocks) the amount of free disk space that must exist on the filesystem for LPD to accept
remote jobs:
# echo 6144 > /var/spool/lpd/bamboo/minfree
User restrictions
You can control which remote users can print to local printers by specifying the rs capability in
/etc/printcap. When rs appears in the entry for a locally-attached printer, LPD will accept jobs
from remote hosts if the user submitting the job also has an account of the same login name on the
local host. Otherwise, LPD refuses the job.
This capability is particularly useful in an environment where there are (for example) different
departments sharing a network, and some users transcend departmental boundaries. By giving them
220
Chapter 7. Printing
accounts on your systems, they can use your printers from their own departmental systems. If you
would rather allow them to use only your printers and not your compute resources, you can give
them token accounts, with no home directory and a useless shell like /usr/bin/false.
Periodic accounting is the more common way, possibly because it is easier. Whenever someone prints
a job, the filter logs the user, host, and number of pages to an accounting file. Every month, semester,
year, or whatever time period you prefer, you collect the accounting files for the various printers, tally
up the pages printed by users, and charge for usage. Then you truncate all the logging files, starting
with a clean slate for the next period.
Timely accounting is less common, probably because it is more difficult. This method has the filters
charge users for printouts as soon as they use the printers. Like disk quotas, the accounting is
immediate. You can prevent users from printing when their account goes in the red, and might provide
a way for users to check and adjust their print quotas. But this method requires some database code
to track users and their quotas.
The LPD spooling system supports both methods easily: since you have to provide the filters (well, most
of the time), you also have to provide the accounting code. But there is a bright side: you have enormous
flexibility in your accounting methods. For example, you choose whether to use periodic or timely
accounting. You choose what information to log: user names, host names, job types, pages printed,
square footage of paper used, how long the job took to print, and so forth. And you do so by modifying
the filters to save this information.
221
Chapter 7. Printing
LPD starts lpf with page width and length arguments (from the pw and pl capabilities). lpf uses these
arguments to determine how much paper will be used. After sending the file to the printer, it then writes
an accounting entry in the accounting file. The entries look like this:
2.00 rose:andy
3.00 rose:kelly
3.00 orchid:mary
5.00 orchid:mary
2.00 orchid:zhang
You should use a separate accounting file for each printer, as lpf has no file locking logic built into it,
and two lpfs might corrupt each others entries if they were to write to the same file at the same time. A
easy way to insure a separate accounting file for each printer is to use af=acct in /etc/printcap.
Then, each accounting file will be in the spooling directory for a printer, in a file named acct.
When you are ready to charge users for printouts, run the pac(8) program. Just change to the spooling
directory for the printer you want to collect on and type pac. You will get a dollar-centric summary like
the following:
222
Chapter 7. Printing
-Pprinter
Which printer to summarize. This option works only if there is an absolute path in the af
capability in /etc/printcap.
-c
-m
Ignore host name in the accounting files. With this option, user smith on host alpha is the same
user smith on host gamma. Without, they are different users.
-pprice
Compute charges with price dollars per page or per foot instead of the price from the pc
capability in /etc/printcap, or two cents (the default). You can specify price as a floating
point number.
-r
-s
name ...
Print accounting information for the given user names only.
In the default summary that pac(8) produces, you see the number of pages printed by each user from
various hosts. If, at your site, host does not matter (because users can use any host), run pac -m, to
produce the following summary:
223
Chapter 7. Printing
To compute the dollar amount due, pac(8) uses the pc capability in the /etc/printcap file (default of
200, or 2 cents per page). Specify, in hundredths of cents, the price per page or per foot you want to
charge for printouts in this capability. You can override this value when you run pac(8) with the -p
option. The units for the -p option are in dollars, though, not hundredths of cents. For example,
# pac -p1.50
makes each page cost one dollar and fifty cents. You can really rake in the profits by using this option.
Finally, running pac -s will save the summary information in a summary accounting file, which is
named the same as the printers accounting file, but with _sum appended to the name. It then truncates
the accounting file. When you run pac(8) again, it rereads the summary file to get starting totals, then
adds information from the regular accounting file.
224
Chapter 7. Printing
Better network support, including built-in support for networked printers, NIS-maintained
printcaps, and NFS-mounted spooling directories
Sophisticated queue management, allowing multiple printers on a queue, transfer of jobs between
queues, and queue redirection
Remote printer control functions
Prioritization of jobs
Expansive security and access options
LPRng
LPRng, which purportedly means LPR: the Next Generation is a complete rewrite of PLP. Patrick
Powell and Justin Mason (the principal maintainer of PLP) collaborated to make LPRng. The main
site for LPRng is ftp://dickory.sdsu.edu/pub/LPRng.
Acknowledgments
I would like to thank the following people who have assisted in the development of this document:
225
Chapter 7. Printing
226
Chapter 8. Disks
Contributed by David OBrien <[email protected] > 26 April 1998
Lets say we want to add a new SCSI disk to a machine that currently only has a single drive. First turn
off the computer and install the drive in the computer following the instructions of the computer,
controller, and drive manufacturer. Due the wide variations of procedures to do this, the details are
beyond the scope of this document.
Login as user root. After youve installed the drive, inspect /var/run/dmesg.boot to ensure the new
disk was found. Continuing with our example, the newly added drive will be da1 and we want to mount
it on /1. (if you are adding an IDE drive substitute wd for da)
Because FreeBSD runs on IBM-PC compatible computers, it must take into account the PC BIOS
partitions. These are different from the traditional BSD partitions. A PC disk has up to four BIOS
partition entries. If the disk is going to be truly dedicated to FreeBSD, you can use the dedicated mode.
Otherwise, FreeBSD will have to live with in one of the PC BIOS partitions. FreeBSD calls the PC BIOS
partitions, slices so as not to confuse them with traditional BSD partitions. You may also use slices on a
disk that is dedicated to FreeBSD, but used in a computer that also has another operating system
installed. This is to not confuse the fdisk utility of the other operating system.
In the slice case the drive will be added as /dev/da1s1e. This is read as: SCSI disk, unit number 1
(second SCSI disk), slice 1 (PC BIOS partition 1), and e BSD partition. In the dedicated case, the drive
will be added simply as /dev/da1e.
Using sysinstall
You may use /stand/sysinstall to partition and label a new disk using its easy to use menus. Either
login as user root or use the su command. Run /stand/sysinstall and enter the Configure menu.
With in the FreeBSD Configuration Menu, scroll down and select the Partition item. Next you
should be presented with a list of hard drives installed in your system. If you do not see da1 listed, you
need to recheck your physical installation and dmesg output in the file /var/run/dmesg.boot.
Select da1 to enter the FDISK Partition Editor. Choose A to use the entire disk for FreeBSD.
When asked if you want to remain cooperative with any future possible operating systems, answer
YES. Write the changes to the disk using W. Now exit the FDISK editor using q. Next you will be asked
about the Master Boot Record. Since you are adding a disk to an already running system, choose None.
Next enter the Disk Label Editor. This is where you will create the traditional BSD partitions. A
disk can have up to eight partitions, labeled a-h. A few of the partition labels have special uses. The a
partition is used for the root partition (/). Thus only your system disk (e.g, the disk you boot from)
should have an a partition. The b partition is used for swap partitions, and you may have many disks
227
Chapter 8. Disks
with swap partitions. The c partition addresses the entire disk in dedicated mode, or the entire FreeBSD
slice in slice mode. The other partitions are for general use.
Sysinstalls Label editor favors the e partition for non-root, non-swap partitions. With in the Label editor,
create a single file system using C. When prompted if this will be a FS (file system) or swap, choose FS
and give a mount point (e.g, /mnt). When adding a disk in post-install mode, Sysinstall will not create
entries in /etc/fstab for you, so the mount point you specify isnt important.
You are now ready to write the new label to the disk and create a file system on it. Do this by hitting W.
Ignore any errors from Sysinstall that it could not mount the new partition. Exit the Label Editor and
Sysinstall completely.
The last step is to edit /etc/fstab to add an entry for your new disk.
* Using Slices
Dedicated
If you will not be sharing the new drive with another operating system, you may use the dedicated
mode. Remember this mode can confuse Microsoft operating systems; however, no damage will be done
by them. IBMs OS/2 however, will appropriate any partition it finds which it doesnt understand.
228
Chapter 8. Disks
* Non-traditional Drives
* Zip Drives
* Jaz Drives
* Sequest Drives
229
Chapter 9. Backups
Issues of hardware compatibility are among the most troublesome in the computer industry today and
FreeBSD is by no means immune to trouble. In this respect, FreeBSDs advantage of being able to run
on inexpensive commodity PC hardware is also its liability when it comes to support for the amazing
variety of components on the market. While it would be impossible to provide a exhaustive listing of
hardware that FreeBSD supports, this section serves as a catalog of the device drivers included with
FreeBSD and the hardware each drivers supports. Where possible and appropriate, notes about specific
products are included. You may also want to refer to the kernel configuration file section in this
handbook for a list of supported devices.
As FreeBSD is a volunteer project without a funded testing department, we depend on you, the user, for
much of the information contained in this catalog. If you have direct experience of hardware that does or
does not work with FreeBSD, please let us know by sending e-mail to the FreeBSD documentation
project mailing list <[email protected]>. Questions about supported hardware should be
directed to the FreeBSD general questions mailing list <[email protected]> (see
Mailing Lists for more information). When submitting information or asking a question, please
remember to specify exactly what version of FreeBSD you are using and include as many details of your
hardware as possible.
Tape Media
The major tape media are the 4mm, 8mm, QIC, mini-cartridge and DLT.
230
Chapter 9. Backups
capacity. Multi-drive tape library units can have 6 drives in a single cabinet with automatic tape
changing. Library capacities reach 240 GB.
4mm drives, like 8mm drives, use helical-scan. All the benefits and drawbacks of helical-scan apply to
both 4mm and 8mm drives.
Tapes should be retired from use after 2,000 passes or 100 full backups.
8mm (Exabyte)
8mm tapes are the most common SCSI tape drives; they are the best choice of exchanging tapes. Nearly
every site has an exabyte 2 GB 8mm tape drive. 8mm drives are reliable, convenient and quiet. Cartridges
are inexpensive and small (4.8 x 3.3 x 0.6 inches; 122 x 84 x 15 mm). One downside of 8mm tape is
relatively short head and tape life due to the high rate of relative motion of the tape across the heads.
Data thruput ranges from ~250kB/s to ~500kB/s. Data sizes start at 300 MB and go up to 7 GB.
Hardware compression, available with most of these drives, approximately doubles the capacity. These
drives are available as single units or multi-drive tape libraries with 6 drives and 120 tapes in a single
cabinet. Tapes are changed automatically by the unit. Library capacities reach 840+ GB.
Data is recorded onto the tape using helical-scan, the heads are positioned at an angle to the media
(approximately 6 degrees). The tape wraps around 270 degrees of the spool that holds the heads. The
spool spins while the tape slides over the spool. The result is a high density of data and closely packed
tracks that angle across the tape from one edge to the other.
QIC
QIC-150 tapes and drives are, perhaps, the most common tape drive and media around. QIC tape drives
are the least expensive "serious" backup drives. The downside is the cost of media. QIC tapes are
expensive compared to 8mm or 4mm tapes, up to 5 times the price per GB data storage. But, if your
needs can be satisfied with a half-dozen tapes, QIC may be the correct choice. QIC is the most common
tape drive. Every site has a QIC drive of some density or another. Therein lies the rub, QIC has a large
number of densities on physically similar (sometimes identical) tapes. QIC drives are not quiet. These
drives audibly seek before they begin to record data and are clearly audible whenever reading, writing or
seeking. QIC tapes measure (6 x 4 x 0.7 inches; 15.2 x 10.2 x 1.7 mm). Mini-cartridges, which also use
1/4" wide tape are discussed separately. Tape libraries and changers are not available.
Data thruput ranges from ~150kB/s to ~500kB/s. Data capacity ranges from 40 MB to 15 GB. Hardware
compression is available on many of the newer QIC drives. QIC drives are less frequently installed; they
are being supplanted by DAT drives.
231
Chapter 9. Backups
Data is recorded onto the tape in tracks. The tracks run along the long axis of the tape media from one
end to the other. The number of tracks, and therefore the width of a track, varies with the tapes capacity.
Most if not all newer drives provide backward-compatibility at least for reading (but often also for
writing). QIC has a good reputation regarding the safety of the data (the mechanics are simpler and more
robust than for helical scan drives).
Tapes should be retired from use after 5,000 backups.
* Mini-Cartridge
DLT
DLT has the fastest data transfer rate of all the drive types listed here. The 1/2" (12.5mm) tape is
contained in a single spool cartridge (4 x 4 x 1 inches; 100 x 100 x 25 mm). The cartridge has a swinging
gate along one entire side of the cartridge. The drive mechanism opens this gate to extract the tape
leader. The tape leader has an oval hole in it which the drive uses to "hook" the tape. The take-up spool is
located inside the tape drive. All the other tape cartridges listed here (9 track tapes are the only
exception) have both the supply and take-up spools located inside the tape cartridge itself.
Data thruput is approximately 1.5MB/s, three times the thruput of 4mm, 8mm, or QIC tape drives. Data
capacities range from 10GB to 20GB for a single drive. Drives are available in both multi-tape changers
and multi-tape, multi-drive tape libraries containing from 5 to 900 tapes over 1 to 20 drives, providing
from 50GB to 9TB of storage.
Data is recorded onto the tape in tracks parallel to the direction of travel (just like QIC tapes). Two tracks
are written at once. Read/write head lifetimes are relatively long; once the tape stops moving, there is no
relative motion between the heads and the tape.
The tape does not contain an Identifier Block (block number 0). All QIC tape drives since the adoption
of QIC-525 standard write an Identifier Block to the tape. There are two solutions:
mt fsf 1 causes the tape drive to write an Identifier Block to the tape.
232
Chapter 9. Backups
Backup Programs
The three major programs are dump(8), tar(1), and cpio(1).
Tar
tar(1) also dates back to Version 6 of ATT Unix (circa 1975). tar(1) operates in cooperation with the
filesystem; tar(1) writes files and directories to tape. tar(1) does not support the full range of options that
are available from cpio(1), but tar(1) does not require the unusual command pipeline that cpio(1) uses.
233
Chapter 9. Backups
Most versions of tar(1) do not support backups across the network. The GNU version of tar(1), which
FreeBSD utilizes, supports remote devices using the same syntax as rdump(8). To tar(1) to an Exabyte
tape drive connected to a Sun called komodo, use: /usr/bin/tar cf komodo:/dev/nrsa8 .
2>&1. For versions without remote device support, you can use a pipeline and rsh(1) to send the data to a
remote tape drive. (XXX add an example command)
Cpio
cpio(1) is the original Unix file interchange tape program for magnetic media. cpio(1) has options
(among many others) to perform byte-swapping, write a number of different archives format, and pipe
the data to other programs. This last feature makes cpio(1) and excellent choice for installation media.
cpio(1) does not know how to walk the directory tree and a list of files must be provided through stdin.
cpio(1) does not support backups across the network. You can use a pipeline and rsh(1) to send the data
to a remote tape drive. (XXX add an example command)
Pax
pax(1) is IEEE/POSIXs answer to tar(1) and cpio(1). Over the years the various versions of tar(1) and
cpio(1) have gotten slightly incompatible. So rather than fight it out to fully standardize them, POSIX
created a new archive utility. pax(1) attempts to read and write many of the various cpio(1) and tar(1)
formats, plus new formats of its own. Its command set more resembles cpio(1) than tar(1).
Amanda
Amanda (../ports/misc.html#amanda-2.4.0) (Advanced Maryland Network Disk Archiver) is a
client/server backup system, rather than a single program. An Amanda server will backup to a single
tape drive any number of computers that have Amanda clients and network communications with the
Amanda server. A common problem at locations with a number of large disks is the length of time
required to backup to data directly to tape exceeds the amount of time available for the task. Amanda
solves this problem. Amanda can use a "holding disk" to backup several filesystems at the same time.
Amanda creates "archive sets": a group of tapes used over a period of time to create full backups of all
the filesystems listed in Amandas configuration file. The "archive set" also contains nightly incremental
(or differential) backups of all the filesystems. Restoring a damaged filesystem requires the most recent
full backup and the incremental backups.
The configuration file provides fine control backups and the network traffic that Amanda generates.
Amanda will use any of the above backup programs to write the data to tape. Amanda is available as
either a port or a package, it is not installed by default.
234
Chapter 9. Backups
Do nothing
Do nothing is not a computer program, but it is the most widely used backup strategy. There are no
initial costs. There is no backup schedule to follow. Just say no. If something happens to your data, grin
and bear it!
If your time and your data is worth little to nothing, then Do nothing is the most suitable backup
program for your computer. But beware, Unix is a useful tool, you may find that within six months you
have a collection of files that are valuable to you.
Do nothing is the correct backup method for /usr/obj and other directory trees that can be exactly
recreated by your computer. An example is the files that comprise these handbook pages-they have been
generated from SGML input files. Creating backups of these HTML files is not necessary. The SGML
source files are backed up regularly.
235
Chapter 9. Backups
mount(8), and whichever backup program you use. These programs must be statically linked. If you use
dump(8), the floppy must contain restore(8).
Third, create backup tapes regularly. Any changes that you make after your last backup may be
irretrievably lost. Write-protect the backup tapes.
Fourth, test the floppies (either boot.flp and fixit.flp or the two custom bootable floppies you
made in step two.) and backup tapes. Make notes of the procedure. Store these notes with the bootable
floppy, the printouts and the backup tapes. You will be so distraught when restoring that the notes may
prevent you from destroying your backup tapes (How? In place of tar xvf /dev/rsa0, you might
accidently type tar cvf /dev/rsa0 and over-write your backup tape).
For an added measure of security, make bootable floppies and two backup tapes each time. Store one of
each at a remote location. A remote location is NOT the basement of the same office building. A number
of firms in the World Trade Center learned this lesson the hard way. A remote location should be
physically separated from your computers and disk drives by a significant distance.
An example script for creating a bootable floppy:
#!/bin/sh
#
# create a restore floppy
#
# format the floppy
#
PATH=/bin:/sbin:/usr/sbin:/usr/bin
fdformat -q fd0
if [ $? -ne 0 ]
then
echo "Bad floppy, please use a new one"
exit 1
fi
#
# newfs the one and only partition
#
newfs -t 2 -u 18 -l 1 -c 40 -i 5120 -m 5 -o space /dev/rfd0a
#
# mount the new floppy
#
236
Chapter 9. Backups
#
# create required directories
#
mkdir /mnt/dev
mkdir /mnt/bin
mkdir /mnt/sbin
mkdir /mnt/etc
mkdir /mnt/root
mkdir /mnt/mnt # for the root partition
mkdir /mnt/tmp
mkdir /mnt/var
#
# populate the directories
#
if [ ! -x /sys/compile/MINI/kernel ]
then
cat EOM
The MINI kernel does not exist, please create one.
Here is an example config file:
#
# MINI - A kernel to get FreeBSD on onto a disk.
#
machine "i386"
cpu "I486_CPU"
ident MINI
maxusers 5
config kernel root on da0 swap on da0 and da1 dumps on da0
controller isa0
controller pci0
controller fdc0 at isa? port "IO_FD1" bio irq 6 drq 2 vector fdintr
disk fd0 at fdc0 drive 0
237
Chapter 9. Backups
controller ncr0
controller scbus0
device da0
device da1
device da2
device sa0
cp -f /sys/compile/MINI/kernel /mnt
cp /root/.profile /mnt/root
cp -f /dev/MAKEDEV /mnt/dev
chmod 755 /mnt/dev/MAKEDEV
#
# create the devices nodes
#
cd /mnt/dev
238
Chapter 9. Backups
./MAKEDEV std
./MAKEDEV da0
./MAKEDEV da1
./MAKEDEV da2
./MAKEDEV sa0
./MAKEDEV pty0
cd /
#
# create minimum filesystem table
#
cat > /mnt/etc/fstab EOM
/dev/fd0a / ufs rw 1 1
EOM
#
# create minimum passwd file
#
cat > /mnt/etc/passwd EOM
root:*:0:0:Charlie &:/root:/bin/sh
EOM
#
# umount the floppy and inform the user
#
/sbin/umount /mnt
239
Chapter 9. Backups
If you are using the boot.flp and fixit.flp floppies, keep reading. Insert the boot.flp floppy in
the first floppy drive and boot the computer. The original install menu will be displayed on the screen.
Select the Fixit-Repair mode with CDROM or floppy. option. Insert the fixit.flp when
prompted. restore and the other programs that you need are located in /mnt2/stand.
Recover each filesystem separately.
Try to mount(8) (e.g. mount /dev/da0a /mnt) the root partition of your first disk. If the disklabel was
damaged, use disklabel(8) to re-partition and label the disk to match the label that your printed and
saved. Use newfs(8) to re-create the filesystems. Re-mount the root partition of the floppy read-write
(mount -u -o rw /mnt). Use your backup program and backup tapes to recover the data for this
filesystem (e.g. restore vrf /dev/sa0). Unmount the filesystem (e.g. umount /mnt) Repeat for
each filesystem that was damaged.
Once your system is running, backup your data onto new tapes. Whatever caused the crash or data loss
may strike again. An another hour spent now, may save you from further distress later.
240
Chapter 10. Disk Quotas
Contributed by Mike Pritchard <[email protected] >. 26 February 1996
Quotas are an optional feature of the operating system that allow you to limit the amount of disk space
and/or the number of files a user, or members of a group, may allocate on a per-file system basis. This is
used most often on timesharing systems where it is desirable to limit the amount of resources any one
user or group of users may allocate. This will prevent one user from consuming all of the available disk
space.
options QUOTA
The stock GENERIC kernel does not have this enabled by default, so you will have to configure, build and
install a custom kernel in order to use disk quotas. Please refer to the Configuring the FreeBSD Kernel
section for more information on kernel configuration.
Next you will need to enable disk quotas in /etc/sysconfig. This is done by changing the line:
quotas=NO
to:
quotas=YES
If you are running FreeBSD 2.2.2 or later, the configuration file will be /etc/rc.conf instead and the
variable name changed to:
check_quotas=YES
Finally you will need to edit /etc/fstab to enable disk quotas on a per-file system basis. This is where
you can either enable user or group quotas or both for all of your file systems.
To enable per-user quotas on a file system, add the userquota option to the options field in the
/etc/fstab entry for the file system you want to to enable quotas on. For example:
241
Chapter 10. Disk Quotas
Similarly, to enable group quotas, use the groupquota option instead of the userquota keyword. To
enable both user and group quotas, change the entry as follows:
By default the quota files are stored in the root directory of the file system with the names quota.user
and quota.group for user and group quotas respectively. See man fstab for more information. Even
though that man page says that you can specify an alternate location for the quota files, this is not
recommended since all of the various quota utilities do not seem to handle this properly.
At this point you should reboot your system with your new kernel. /etc/rc will automatically run the
appropriate commands to create the initial quota files for all of the quotas you enabled in /etc/fstab,
so there is no need to manually create any zero length quota files.
In the normal course of operations you should not be required to run the quotacheck, quotaon, or
quotaoff commands manually. However, you may want to read their man pages just to be familiar with
their operation.
# quota -v
You should see a one line summary of disk usage and current quota limits for each file system that quotas
are enabled on.
You are now ready to start assigning quota limits with the edquota command.
You have several options on how to enforce limits on the amount of disk space a user or group may
allocate, and how many files they may create. You may limit allocations based on disk space (block
quotas) or number of files (inode quotas) or a combination of both. Each of these limits are further
broken down into two categories: hard and soft limits.
A hard limit may not be exceeded. Once a user reaches their hard limit they may not make any further
allocations on the file system in question. For example, if the user has a hard limit of 500 blocks on a file
system and is currently using 490 blocks, the user can only allocate an additional 10 blocks. Attempting
to allocate an additional 11 blocks will fail.
Soft limits on the other hand can be exceeded for a limited amount of time. This period of time is known
as the grace period, which is one week by default. If a user stays over his or her soft limit longer than
their grace period, the soft limit will turn into a hard limit and no further allocations will be allowed.
When the user drops back below the soft limit, the grace period will be reset.
242
Chapter 10. Disk Quotas
The following is an example of what you might see when you run then edquota command. When the
edquota command is invoked, you are placed into the editor specified by the EDITOR environment
variable, or in the vi editor if the EDITOR variable is not set, to allow you to edit the quota limits.
# edquota -u test
You will normally see two lines for each file system that has quotas enabled. One line for the block
limits, and one line for inode limits. Simply change the value you want updated to modify the quota
limit. For example, to raise this users block limit from a soft limit of 50 and a hard limit of 75 to a soft
limit of 500 and a hard limit of 600, change:
to:
The new quota limits will be in place when you exit the editor.
Sometimes it is desirable to set quota limits on a range of uids. This can be done by use of the -p option
on the edquota command. First, assign the desired quota limit to a user, and then run edquota -p
protouser startuid-enduid. For example, if user test has the desired quota limits, the following
command can be used to duplicate those quota limits for uids 10,000 through 19,999:
The ability to specify uid ranges was added to the system after 2.1 was released. If you need this feature
on a 2.1 system, you will need to obtain a newer copy of edquota.
See man edquota for more detailed information.
243
Chapter 10. Disk Quotas
super-user may examine quotas and usage for other users, or for groups that they are not a member of.
The repquota command can be used to get a summary of all quotas and disk usage for file systems with
quotas enabled.
The following is some sample output from the quota -v command for a user that has quota limits on
two file systems.
On the /usr file system in the above example this user is currently 15 blocks over their soft limit of 50
blocks and has 5 days of their grace period left. Note the asterisk * which indicates that the user is
currently over their quota limit.
Normally file systems that the user is not using any disk space on will not show up in the output from the
quota command, even if they have a quota limit assigned for that file system. The -v option will display
those file systems, such as the /usr/var file system in the above example.
244
Chapter 11. The X Window System
Pending the completion of this section, please refer to documentation supplied by the The XFree86
Project, Inc (http://www.xfree86.org/).
245
Chapter 12. PC Hardware compatibility
Issues of hardware compatibility are among the most troublesome in the computer industry today and
FreeBSD is by no means immune to trouble. In this respect, FreeBSDs advantage of being able to run
on inexpensive commodity PC hardware is also its liability when it comes to support for the amazing
variety of components on the market. While it would be impossible to provide a exhaustive listing of
hardware that FreeBSD supports, this section serves as a catalog of the device drivers included with
FreeBSD and the hardware each drivers supports. Where possible and appropriate, notes about specific
products are included. You may also want to refer to the kernel configuration file section in this
handbook for a list of supported devices.
As FreeBSD is a volunteer project without a funded testing department, we depend on you, the user, for
much of the information contained in this catalog. If you have direct experience of hardware that does or
does not work with FreeBSD, please let us know by sending e-mail to the FreeBSD documentation
project mailing list <[email protected]>. Questions about supported hardware should be
directed to the FreeBSD general questions mailing list <[email protected]> (see
Mailing Lists for more information). When submitting information or asking a question, please
remember to specify exactly what version of FreeBSD you are using and include as many details of your
hardware as possible.
Sample Configurations
The following list of sample hardware configurations by no means constitutes an endorsement of a given
hardware vendor or product by The FreeBSD Project. This information is provided only as a public
service and merely catalogs some of the experiences that various individuals have had with different
hardware combinations. Your mileage may vary. Slippery when wet. Beware of dog.
246
Chapter 12. PC Hardware compatibility
Jordans Picks
I have had fairly good luck building workstation and server configurations with the following
components. I cant guarantee that you will too, nor that any of the companies here will remain best
buys forever. I will try, when I can, to keep this list up-to-date but cannot obviously guarantee that it
will be at any given time.
Motherboards
For Pentium Pro (P6) systems, Im quite fond of the Tyan (http://www.tyan.com/html/products.html)
S1668 dual-processor motherboard as well as the Intel PR440FX motherboard with on-board SCSI
WIDE and 100/10MB Intel Etherexpress NIC. You can build a dandy little single or dual processor
system (which is supported in FreeBSD 3.0) for very little cost now that the Pentium Pro 180/256K chips
have fallen so greatly in price, but no telling how much longer this will last.
For the Pentium II, Im rather partial to the ASUS (http://www.asus.com.tw) P2l97-S
(http://www.asus.com.tw/Products/Motherboard/Pentiumpro/P2l97-s/index.html) motherboard with the
on-board Adaptec SCSI WIDE controller.
For Pentium machines, the ASUS P55T2P4
(http://www.asus.com.tw/Products/Motherboard/Pentium/P55tp4/index.html) motherboard appears to be
a good choice for mid-to-high range Pentium server and workstation systems.
Those wishing to build more fault-tolerant systems should also be sure to use Parity memory or, for truly
24/7 applications, ECC memory.
Note: ECC memory does involve a slight performance trade-off (which may or may not be noticeable
depending on your application) but buys you significantly increased fault-tolerance to memory errors.
Disk Controllers
This one is a bit trickier, and while I used to recommend the Buslogic (http://www.buslogic.com)
controllers unilaterally for everything from ISA to PCI, now I tend to lean towards the Adaptec
(http://www.adaptec.com) 1542CF for ISA, Buslogic Bt747c for EISA and Adaptec 2940UW for PCI.
The NCR/Symbios cards for PCI have also worked well for me, though you need to make sure that your
motherboard supports the BIOS-less model if youre using one of those (if your card has nothing which
looks even vaguely like a ROM chip on it, youve probably got one which expects its BIOS to be on your
motherboard).
If you should find that you need more than one SCSI controller in a PCI machine, you may wish to
consider conserving your scarce PCI bus resources by buying the Adaptec 3940 card, which puts two
247
Chapter 12. PC Hardware compatibility
Note: There are two types of 3940 on the marketthe older model with AIC 7880 chips on it, and
the newer one with AIC 7895 chips. The newer model requires CAM
(http://www.FreeBSD.org/pub/FreeBSD/development/cam/) support which is not yet part of
FreeBSDyou have to add it, or install from one of the CAM binary snapshot release.
Disk drives
In this particular game of Russian roulette, Ill make few specific recommendations except to say SCSI
over IDE whenever you can afford it. Even in small desktop configurations, SCSI often makes more
sense since it allows you to easily migrate drives from server to desktop as falling drive prices make it
economical to do so. If you have more than one machine to administer then think of it not simply as
storage, think of it as a food chain! For a serious server configuration, theres not even any
argumentuse SCSI equipment and good cables.
CDROM drives
My SCSI preferences extend to SCSI CDROM drives as well, and while the Toshiba
(http://www.toshiba.com) drives have always been favourites of mine (in whatever speed is hot that
week), Im still fond of my good old Plextor (http://www.plextor.com) PX-12CS drive. Its only a 12
speed, but its offered excellent performance and reliability.
Generally speaking, most SCSI CDROM drives Ive seen have been of pretty solid construction and you
probably wont go wrong with an HP or NEC SCSI CDROM drive either. SCSI CDROM prices also
appear to have dropped considerably in the last few months and are now quite competitive with IDE
CDROMs while remaining a technically superior solution. I now see no reason whatsoever to settle for
an IDE CDROM drive if given a choice between the two.
248
Chapter 12. PC Hardware compatibility
Tape drives
Ive had pretty good luck with both 8mm drives
(http://www.Exabyte.COM:80/Products/8mm/8505XL/Rfeatures.html) from Exabyte
(http://www.exabyte.com) and 4mm (DAT) (http://www-dmo.external.hp.com:80/tape/_cpb0001.htm)
drives from HP (http://www.hp.com).
For backup purposes, Id have to give the higher recommendation to the Exabyte due to the more robust
nature (and higher storage capacity) of 8mm tape.
Video Cards
If you can also afford to buy a commercial X server for US$99 from Xi Graphics, Inc. (formerly X
Inside, Inc) (http://www.xig.com/) then I can heartily recommend the Matrox (http://www.matrox.com/)
Millenium II (http://www.matrox.com/mgaweb/brochure.htm) card. Note that support for this card is
also excellent with the XFree86 (http://www.xfree86.org/) server, which is now at version 3.3.2.
You also certainly cant go wrong with one of Number 9s (http://www.nine.com/) cards their S3
Vision 868 and 968 based cards (the 9FX series) also being quite fast and very well supported by
XFree86s S3 server. You can also pick up their Revolution 3D cards very cheaply these days, especially
if you require a lot of video memory.
Monitors
I have had very good luck with the Sony Multiscan 17seII monitors
(http://cons3.sel.sony.com/SEL/ccpg/display/ms17se2.html), as have I with the Viewsonic offering in the
same (Trinitron) tube. For larger than 17", all I can recommend at the time of this writing is to not spend
any less than U.S. $2,000 for a 21" monitor or $1,700 for a 20" monitor if thats what you really need.
There are good monitors available in the >=20" range and there are also cheap monitors in the >=20"
range. Unfortunately, very few are both cheap and good!
Networking
I can recommend the Intel EtherExpress Pro/100B card first and foremost, followed by the SMC
(http://www.smc.com/) Ultra 16 controller for any ISA application and the SMC EtherPower or Compex
ENET32 cards for slightly cheaper PCI based networking. In general, any PCI NIC based around DECs
DC21041 Ethernet controller chip, such as the Znyx ZX342 or DEC DE435/450, will generally work
quite well and can frequently be found in 2-port and 4-port version (useful for firewalls and routers),
though the Pro/100MB card has the edge when it comes to providing the best performance with lower
overhead.
249
Chapter 12. PC Hardware compatibility
If what youre looking for is the cheapest possible solution then almost any NE2000 clone will do a fine
job for very little cost.
Serial
If youre looking for high-speed serial networking solutions, then Digi International
(http://www.dgii.com/) makes the SYNC/570
(http://www.dgii.com/prodprofiles/profiles-prices/digiprofiles/digispecs/sync570.html) series, with
drivers now in FreeBSD-current. Emerging Technologies (http://www.etinc.com) also manufactures a
board with T1/E1 capabilities, using software they provide. I have no direct experience using either
product, however.
Multiport card options are somewhat more numerous, though it has to be said that FreeBSDs support for
Cyclades (http://www.cyclades.com/)s products is probably the tightest, primarily as a result of that
companys commitment to making sure that we are adequately supplied with evaluation boards and
technical specs. Ive heard that the Cyclom-16Ye offers the best price/performance, though Ive not
checked the prices lately. Other multiport cards Ive heard good things about are the BOCA and AST
cards, and Stallion Technologies (http://www.stallion.com/) apparently offers an unofficial driver for
their cards at this (ftp://ftp.stallion.com/drivers/unsupported/freebsd/stalbsd-0.0.4.tar.gz) location.
Audio
I currently use a Creative Labs (http://www.creaf.com/) AWE32 though just about anything from
Creative Labs will generally work these days. This is not to say that other types of sound cards dont also
work, simply that I have little experience with them (I was a former GUS fan, but Graviss soundcard
situation has been dire for some time).
Video
For video capture, there are two good choices any card based on the Brooktree BT848 chip, such as
the Hauppage or WinTV boards, will work very nicely with FreeBSD. Another board which works for
me is the Matrox (http://www.matrox.com/) Meteor (http://www.matrox.com/imgweb/meteor.htm) card.
FreeBSD also supports the older video spigot card from Creative Labs, but those are getting somewhat
difficult to find. Note that the Meteor frame grabber card will not work with motherboards based on the
440FX chipset! See the motherboard reference section for details. In such cases, its better to go with a
BT848 based board.
250
Chapter 12. PC Hardware compatibility
Core/Processing
* ISA
* EISA
* VLB
PCI
Contributed by David OBrien <[email protected] > from postings by Rodney Grimes
<[email protected] >. 25 April 1995.
Continuing updates by Jordan K. Hubbard <[email protected] >. Last update on 26 August 1996.
Of the Intel PCI chip sets, the following list describes various types of known-brokenness and the degree
of breakage, listed from worst to best.
Mercury:
Cache coherency problems, especially if there are ISA bus masters behind the ISA to PCI bridge
chip. Hardware flaw, only known work around is to turn the cache off.
251
Chapter 12. PC Hardware compatibility
Neptune:
Can not run more than 2 bus master devices. Admitted Intel design flaw. Workarounds include do
not run more than 2 bus masters, special hardware design to replace the PCI bus arbiter (appears on
Intel Altair board and several other Intel server group MBs). And of course Intels official answer,
move to the Triton chip set, we fixed it there.
Orion:
Early versions of this chipset suffered from a PCI write-posting bug which can cause noticeable
performance degradation in applications where large amounts of PCI bus traffic is involved. B0
stepping or later revisions of the chipset fixed this problem.
440FX (http://developer.intel.com/design/pcisets/desktop.htm#440FX):
This Pentium Pro (http://www.intel.com/procs/ppro/index.htm) support chipset seems to work well,
and does not suffer from any of the early Orion chipset problems. It also supports a wider variety of
memory, including ECC and parity. The only known problem with it is that the Matrox Meteor
frame grabber card doesnt like it.
CPUs/FPUs
Contributed by Satoshi Asami <[email protected] >. 26 December 1997.
252
Chapter 12. PC Hardware compatibility
Pentium class
The Intel Pentium (P54C), Pentium MMX (P55C), AMD K6 and Cyrix/IBM 6x86MX processors are all
reported to work with FreeBSD. I will not go into details of which processor is faster than what, there are
zillions of web sites on the Internet that tells you one way or another. :)
Note: Various CPUs have different voltage/cooling requirements. Make sure your motherboard can
supply the exact voltage needed by the CPU. For instance, many recent MMX chips require split
voltage (e.g., 2.9V core, 3.3V I/O). Also, some AMD and Cyrix/IBM chips run hotter than Intel chips.
In that case, make sure you have good heatsink/fans (you can get the list of certified parts from their
web pages).
Clock speeds
Contributed by Rodney Grimes <[email protected] >. 1 October 1996.
Updated by Satoshi Asami <[email protected] >. 27 December 1997.
Pentium class machines use different clock speeds for the various parts of the system. These being the
speed of the CPU, external memory bus, and the PCI bus. It is not always true that a faster processor
will make a system faster than a slower one, due to the various clock speeds used. Below is a table
showing the differences:
Rated CPU MHz External Clock and External to Internal PCI Bus Clock MHz
Memory Bus MHz Clock Multiplier
60 60 1.0 30
66 66 1.0 33
75 50 1.5 25
90 60 1.5 30
100 50 2 25
100 66 1.5 33
120 60 2 30
133 66 2 33
150 60 2.5 30 (Intel, AMD)
150 75 2 37.5 (Cyrix/IBM
6x86MX)
166 66 2.5 33
180 60 3 30
200 66 3 33
253
Chapter 12. PC Hardware compatibility
233 66 3.5 33
As can be seen the best parts to be using are the 100, 133, 166, 200 and 233, with the exception that at a
multiplier of 3 or more the CPU starves for memory.
* 486 class
* 386 class
286 class
Sorry, FreeBSD does not run on 80286 machines. It is nearly impossible to run todays large
full-featured UNIXes on such hardware.
* Memory
The minimum amount of memory you must have to install FreeBSD is 5 MB. Once your system is up
and running you can build a custom kernel that will use less memory. If you use the boot4.flp you can
get away with having only 4 MB.
254
Chapter 12. PC Hardware compatibility
* BIOS
Input/Output Devices
* Video cards
* Sound cards
255
Chapter 12. PC Hardware compatibility
256
Chapter 12. PC Hardware compatibility
257
Chapter 12. PC Hardware compatibility
even when multiple word are transmitted back to back. This guarantees that sender and receiver can
resynchronize their clocks regardless of the content of the data bits that are being transmitted.
The idle time between Stop and Start bits does not have to be an exact multiple (including zero) of the bit
rate of the communication link, but most UARTs are designed this way for simplicity.
In RS232-C, the "Marking" signal (a 1) is represented by a voltage between -2 VDC and -12 VDC, and a
"Spacing" signal (a 0) is represented by a voltage between 0 and +12 VDC. The transmitter is supposed
to send +12 VDC or -12 VDC, and the receiver is supposed to allow for some voltage loss in long cables.
Some transmitters in low power devices (like portable computers) sometimes use only +5 VDC and -5
VDC, but these values are still acceptable to a RS232-C receiver, provided that the cable lengths are
short.
Note: Breaks cannot be generated from paper tape or from any other byte value, since bytes are
always sent with Start and Stop bit. The UART is usually capable of generating the continuous
Spacing signal in response to a special command from the host processor.
258
Chapter 12. PC Hardware compatibility
259
Chapter 12. PC Hardware compatibility
260
Chapter 12. PC Hardware compatibility
261
Chapter 12. PC Hardware compatibility
line using a Synchronous transmission method. This means that the Stop, Start, and Parity bits added by
the UART in the DTE (the computer) were removed by the modem before transmission by the sending
modem. When these bytes are received by the remote modem, the remote modem adds Start, Stop and
Parity bits to the words, converts them to a serial format and then sends them to the receiving UART in
the remote computer, who then strips the Start, Stop and Parity bits.
The reason all these extra conversions are done is so that the two modems can perform error correction,
which means that the receiving modem is able to ask the sending modem to resend a block of data that
was not received with the correct checksum. This checking is handled by the modems, and the DTE
devices are usually unaware that the process is occurring.
By striping the Start, Stop and Parity bits, the additional bits of data that the two modems must share
between themselves to perform error-correction are mostly concealed from the effective transmission
rate seen by the sending and receiving DTE equipment. For example, if a modem sends ten 7-bit words
to another modem without including the Start, Stop and Parity bits, the sending modem will be able to
add 30 bits of its own information that the receiving modem can use to do error-correction without
impacting the transmission speed of the real data.
The use of the term Baud is further confused by modems that perform compression. A single 8-bit word
passed over the telephone line might represent a dozen words that were transmitted to the sending
modem. The receiving modem will expand the data back to its original content and pass that data to the
receiving DTE.
Modern modems also include buffers that allow the rate that bits move across the phone line (DCE to
DCE) to be a different speed than the speed that the bits move between the DTE and DCE on both ends
of the conversation. Normally the speed between the DTE and DCE is higher than the DCE to DCE
speed because of the use of compression by the modems.
Because the number of bits needed to describe a byte varied during the trip between the two machines
plus the differing bits-per-seconds speeds that are used present on the DTE-DCE and DCE-DCE links,
the usage of the term Baud to describe the overall communication speed causes problems and can
misrepresent the true transmission speed. So Bits Per Second (bps) is the correct term to use to describe
the transmission rate seen at the DCE to DCE interface and Baud or Bits Per Second are acceptable
terms to use when a connection is made between two systems with a wired connection, or if a modem is
in use that is not performing error-correction or compression.
Modern high speed modems (2400, 9600, 14,400, and 19,200bps) in reality still operate at or below 2400
baud, or more accurately, 2400 Symbols per second. High speed modem are able to encode more bits of
data into each Symbol using a technique called Constellation Stuffing, which is why the effective bits per
second rate of the modem is higher, but the modem continues to operate within the limited audio
bandwidth that the telephone system provides. Modems operating at 28,800 and higher speeds have
variable Symbol rates, but the technique is the same.
262
Chapter 12. PC Hardware compatibility
INS8250
This part was used in the original IBM PC and IBM PC/XT. The original name for this part was the
INS8250 ACE (Asynchronous Communications Element) and it is made from NMOS technology.
The 8250 uses eight I/O ports and has a one-byte send and a one-byte receive buffer. This original
UART has several race conditions and other flaws. The original IBM BIOS includes code to work
around these flaws, but this made the BIOS dependent on the flaws being present, so subsequent
parts like the 8250A, 16450 or 16550 could not be used in the original IBM PC or IBM PC/XT.
INS8250-B
This is the slower speed of the INS8250 made from NMOS technology. It contains the same
problems as the original INS8250.
INS8250A
An improved version of the INS8250 using XMOS technology with various functional flaws
corrected. The INS8250A was used initially in PC clone computers by vendors who used clean
263
Chapter 12. PC Hardware compatibility
BIOS designs. Because of the corrections in the chip, this part could not be used with a BIOS
compatible with the INS8250 or INS8250B.
INS82C50A
This is a CMOS version (low power consumption) of the INS8250A and has similar functional
characteristics.
NS16450
Same as NS8250A with improvements so it can be used with faster CPU bus designs. IBM used this
part in the IBM AT and updated the IBM BIOS to no longer rely on the bugs in the INS8250.
NS16C450
This is a CMOS version (low power consumption) of the NS16450.
NS16550
Same as NS16450 with a 16-byte send and receive buffer but the buffer design was flawed and
could not be reliably be used.
NS16550A
Same as NS16550 with the buffer flaws corrected. The 16550A and its successors have become the
most popular UART design in the PC industry, mainly due it its ability to reliably handle higher data
rates on operating systems with sluggish interrupt response times.
NS16C552
This component consists of two NS16C550A CMOS UARTs in a single package.
PC16550D
Same as NS16550A with subtle flaws corrected. This is revision D of the 16550 family and is the
latest design available from National Semiconductor.
264
Chapter 12. PC Hardware compatibility
digits are the week in that year when the part was packaged. If you have a NS16550AFN, it is probably a
few years old.)
The new numbers are like PC16550DV, with minor differences in the suffix letters depending on the
package material and its shape. (A description of the numbering system can be found below.)
It is important to understand that in some stores, you may pay $15(US) for a NS16550AFN made in
1990 and in the next bin are the new PC16550DN parts with minor fixes that National has made since the
AFN part was in production, the PC16550DN was probably made in the past six months and it costs half
(as low as $5(US) in volume) as much as the NS16550AFN because they are readily available.
As the supply of NS16550AFN chips continues to shrink, the price will probably continue to increase
until more people discover and accept that the PC16550DN really has the same function as the old part
number.
The g is the product grade field. If an I precedes the package-type letter, it indicates an industrial
grade part, which has higher specs than a standard part but not as high as Military Specification
(Milspec) component. This is an optional field.
So what we used to call a NS16550AFN (DIP Package) is now called a PC16550DN or PC16550DIN.
265
Chapter 12. PC Hardware compatibility
microprocessor, and the emulated UART will frequently have a hidden buffer consisting of several
hundred bytes. Because of the size of the buffer, these emulations can be as reliable as a 16550A in their
ability to handle high speed data. However, most operating systems will still report that the UART is
only a 8250A or 16450, and may not make effective use of the extra buffering present in the emulated
UART unless special drivers are used.
Some modem makers are driven by market forces to abandon a design that has hundreds of bytes of
buffer and instead use a 16550A UART so that the product will compare favorably in market
comparisons even though the effective performance may be lowered by this action.
A common misconception is that all parts with 16550A written on them are identical in performance.
There are differences, and in some cases, outright flaws in most of these 16550A clones.
When the NS16550 was developed, the National Semiconductor obtained several patents on the design
and they also limited licensing, making it harder for other vendors to provide a chip with similar features.
Because of the patents, reverse-engineered designs and emulations had to avoid infringing the claims
covered by the patents. Subsequently, these copies almost never perform exactly the same as the
NS16550A or PC16550D, which are the parts most computer and modem makers want to buy but are
sometimes unwilling to pay the price required to get the genuine part.
Some of the differences in the clone 16550A parts are unimportant, while others can prevent the device
from being used at all with a given operating system or driver. These differences may show up when
using other drivers, or when particular combinations of events occur that were not well tested or
considered in the Windows driver. This is because most modem vendors and 16550-clone makers use the
Microsoft drivers from Windows for Workgroups 3.11 and the Microsoft MSD utility as the primary tests
for compatibility with the NS16550A. This over-simplistic criteria means that if a different operating
system is used, problems could appear due to subtle differences between the clones and genuine
components.
National Semiconductor has made available a program named COMTEST that performs compatibility
tests independent of any OS drivers. It should be remembered that the purpose of this type of program is
to demonstrate the flaws in the products of the competition, so the program will report major as well as
extremely subtle differences in behavior in the part being tested.
In a series of tests performed by the author of this document in 1994, components made by National
Semiconductor, TI, StarTech, and CMD as well as megacells and emulations embedded in internal
modems were tested with COMTEST. A difference count for some of these components is listed below.
Because these tests were performed in 1994, they may not reflect the current performance of the given
product from a vendor.
It should be noted that COMTEST normally aborts when an excessive number or certain types of
problems have been detected. As part of this testing, COMTEST was modified so that it would not abort
no matter how many differences were encountered.
266
Chapter 12. PC Hardware compatibility
Note: To date, the author of this document has not found any non-National parts that report zero
differences using the COMTEST program. It should also be noted that National has had five versions
of the 16550 over the years and the newest parts behave a bit differently than the classic
NS16550AFN that is considered the benchmark for functionality. COMTEST appears to turn a blind
eye to the differences within the National product line and reports no errors on the National parts
(except for the original 16550) even when there are official erratas that describe bugs in the A, B and
C revisions of the parts, so this bias in COMTEST must be taken into account.
It is important to understand that a simple count of differences from COMTEST does not reveal a lot
about what differences are important and which are not. For example, about half of the differences
reported in the two modems listed above that have internal UARTs were caused by the clone UARTs not
supporting five- and six-bit character modes. The real 16550, 16450, and 8250 UARTs all support these
modes and COMTEST checks the functionality of these modes so over fifty differences are reported.
However, almost no modern modem supports five- or six-bit characters, particularly those with
error-correction and compression capabilities. This means that the differences related to five- and six-bit
character modes can be discounted.
Many of the differences COMTEST reports have to do with timing. In many of the clone designs, when
the host reads from one port, the status bits in some other port may not update in the same amount of
time (some faster, some slower) as a real NS16550AFN and COMTEST looks for these differences. This
means that the number of differences can be misleading in that one device may only have one or two
differences but they are extremely serious, and some other device that updates the status registers faster
or slower than the reference part (that would probably never affect the operation of a properly written
driver) could have dozens of differences reported.
COMTEST can be used as a screening tool to alert the administrator to the presence of potentially
267
Chapter 12. PC Hardware compatibility
incompatible components that might cause problems or have to be handled as a special case.
If you run COMTEST on a 16550 that is in a modem or a modem is attached to the serial port, you need
to first issue a ATE0&W command to the modem so that the modem will not echo any of the test
characters. If you forget to do this, COMTEST will report at least this one difference:
8250/16450/16550 Registers
The 8250/16450/16550 UART occupies eight contiguous I/O port addresses. In the IBM PC, there are
two defined locations for these eight ports and they are known collectively as COM1 and COM2. The
makers of PC-clones and add-on cards have created two additional areas known as COM3 and COM4,
but these extra COM ports conflict with other hardware on some systems. The most common conflict is
with video adapters that provide IBM 8514 emulation.
COM1 is located from 0x3f8 to 0x3ff and normally uses IRQ 4 COM2 is located from 0x2f8 to 0x2ff
and normally uses IRQ 3 COM3 is located from 0x3e8 to 0x3ef and has no standardized IRQ COM4 is
located from 0x2e8 to 0x2ef and has no standardized IRQ.
A description of the I/O ports of the 8250/16450/16550 UART is provided below.
268
Chapter 12. PC Hardware compatibility
269
Chapter 12. PC Hardware compatibility
ST16650
By default this part is similar to the NS16550A, but an extended 32-byte send and receive buffer can
be optionally enabled. Made by Startech.
TIL16660
By default this part behaves similar to the NS16550A, but an extended 64-byte send and receive
buffer can be optionally enabled. Made by Texas Instruments.
Hayes ESP
This proprietary plug-in card contains a 2048-byte send and receive buffer, and supports data rates
to 230.4Kbit/sec. Made by Hayes.
In addition to these dumb UARTs, many vendors produce intelligent serial communication boards.
This type of design usually provides a microprocessor that interfaces with several UARTs, processes and
buffers the data, and then alerts the main PC processor when necessary. Because the UARTs are not
directly accessed by the PC processor in this type of communication system, it is not necessary for the
vendor to use UARTs that are compatible with the 8250, 16450, or the 16550 UART. This leaves the
designer free to components that may have better performance characteristics.
270
Chapter 12. PC Hardware compatibility
The trick in setting this up is that the MSB of the flags represent the last SIO port, in this case 11 so flags
are 0xb05.
Boca 16
Contributed by Don Whiteside <[email protected] >. 26 August 1995.
The procedures to make a Boca 16 port board with FreeBSD are pretty straightforward, but you will
need a couple things to make it work:
1. You either need the kernel sources installed so you can recompile the necessary options or you will
need someone else to compile it for you. The 2.0.5 default kernel does not come with multiport
support enabled and you will need to add a device entry for each port anyways.
2. Two, you will need to know the interrupt and IO setting for your Boca Board so you can set these
options properly in the kernel.
One important note the actual UART chips for the Boca 16 are in the connector box, not on the
internal board itself. So if you have it unplugged, probes of those ports will fail. I have never tested
booting with the box unplugged and plugging it back in, and I suggest you do not either.
If you do not already have a custom kernel configuration file set up, refer to Kernel Configuration for
general procedures. The following are the specifics for the Boca 16 board and assume you are using the
kernel name MYKERNEL and editing with vi.
271
Chapter 12. PC Hardware compatibility
The flags entry must be changed from this example unless you are using the exact same sio
assignments. Flags are set according to 0xM YY where M indicates the minor number of the master
port (the last port on a Boca 16) and YY indicates if FIFO is enabled or disabled(enabled), IRQ
sharing is used(yes) and if there is an AST/4 compatible IRQ control register(no). In this example,
flags 0x1005
indicates that the master port is sio16. If I added another board and assigned sio17 through sio28,
the flags for all 16 ports on that board would be 0x1C05, where 1C indicates the minor number of
the master port. Do not change the 05 setting.
3. Save and complete the kernel configuration, recompile, install and reboot. Presuming you have
successfully installed the recompiled kernel and have it set to the correct address and IRQ, your boot
message should indicate the successful probe of the Boca ports as follows: (obviously the sio
numbers, IO and IRQ could be different)
sio1 at 0x100-0x107 flags 0x1005 on isa
sio1: type 16550A (multiport)
sio2 at 0x108-0x10f flags 0x1005 on isa
sio2: type 16550A (multiport)
sio3 at 0x110-0x117 flags 0x1005 on isa
sio3: type 16550A (multiport)
sio4 at 0x118-0x11f flags 0x1005 on isa
sio4: type 16550A (multiport)
sio5 at 0x120-0x127 flags 0x1005 on isa
sio5: type 16550A (multiport)
sio6 at 0x128-0x12f flags 0x1005 on isa
sio6: type 16550A (multiport)
sio7 at 0x130-0x137 flags 0x1005 on isa
sio7: type 16550A (multiport)
sio8 at 0x138-0x13f flags 0x1005 on isa
sio8: type 16550A (multiport)
sio9 at 0x140-0x147 flags 0x1005 on isa
sio9: type 16550A (multiport)
sio10 at 0x148-0x14f flags 0x1005 on isa
sio10: type 16550A (multiport)
sio11 at 0x150-0x157 flags 0x1005 on isa
sio11: type 16550A (multiport)
sio12 at 0x158-0x15f flags 0x1005 on isa
sio12: type 16550A (multiport)
sio13 at 0x160-0x167 flags 0x1005 on isa
272
Chapter 12. PC Hardware compatibility
If you do not want or need callout devices for some reason, you can dispense with making the cua*
devices.
5. If you want a quick and sloppy way to make sure the devices are working, you can simply plug a
modem into each port and (as root)
# echo at > ttyd*
for each device you have made. You should see the RX lights flash for each working port.
1. Add the cy device to your kernel configuration (note that your irq and iomem settings may differ).
device cy0 at isa? tty irq 10 iomem 0xd4000 iosiz 0x2000 vector cyintr
273
Chapter 12. PC Hardware compatibility
# cd /dev
# for i in 0 1 2 3 4 5 6 7;do ./MAKEDEV cuac$i ttyc$i;done
4. If appropriate, add dialup entries to /etc/ttys by duplicating serial device (ttyd) entries and using
ttyc in place of ttyd. For example:
ttyc0 "/usr/libexec/getty std.38400" unknown on insecure
ttyc1 "/usr/libexec/getty std.38400" unknown on insecure
ttyc2 "/usr/libexec/getty std.38400" unknown on insecure
...
ttyc7 "/usr/libexec/getty std.38400" unknown on insecure
274
Chapter 12. PC Hardware compatibility
To configure an ISA host card, add the following line to your kernel configuration file, changing the
numbers as appropriate:
Valid IRQ numbers are 9, 10, 11, 12 and 15 for SX ISA host cards and 11, 12 and 15 for SI/XIO ISA
host cards.
To configure an EISA or PCI host card, use this line:
device si0
After adding the configuration entry, rebuild and install your new kernel.
After rebooting with the new kernel, you need to make the device nodes in /dev. The MAKEDEV script
will take care of this for you. Count how many total ports you have and type:
# cd /dev
# ./MAKEDEV ttyAnn cuaAnn
Change the terminal type as appropriate. For modems, dialup or unknown is fine.
* Parallel ports
* Modems
* Network cards
* Keyboards
275
Chapter 12. PC Hardware compatibility
* Mice
* Other
Storage Devices
Concepts of ESDI
Physical connections
The ESDI interface uses two cables connected to each drive. One cable is a 34 pin flat cable edge
connector that carries the command and status signals from the controller to the drive and vice-versa.
The command cable is daisy chained between all the drives. So, it forms a bus onto which all drives are
connected.
The second cable is a 20 pin flat cable edge connector that carries the data to and from the drive. This
cable is radially connected, so each drive has its own direct connection to the controller.
276
Chapter 12. PC Hardware compatibility
To the best of my knowledge PC ESDI controllers are limited to using a maximum of 2 drives per
controller. This is compatibility feature(?) left over from the WD1003 standard that reserves only a
single bit for device addressing.
Device addressing
On each command cable a maximum of 7 devices and 1 controller can be present. To enable the
controller to uniquely identify which drive it addresses, each ESDI device is equipped with jumpers or
switches to select the devices address.
On PC type controllers the first drive is set to address 0, the second disk to address 1. Always make sure
you set each disk to an unique address! So, on a PC with its two drives/controller maximum the first
drive is drive 0, the second is drive 1.
Termination
The daisy chained command cable (the 34 pin cable remember?) needs to be terminated at the last drive
on the chain. For this purpose ESDI drives come with a termination resistor network that can be removed
or disabled by a jumper when it is not used.
So, one and only one drive, the one at the farthest end of the command cable has its terminator
installed/enabled. The controller automatically terminates the other end of the cable. Please note that this
implies that the controller must be at one end of the cable and not in the middle.
277
Chapter 12. PC Hardware compatibility
Stay on track
Mainstream ESDI drives use 34 to 36 sectors per track. Most (older) controllers cannot handle more than
this number of sectors. Newer, higher capacity, drives use higher numbers of sectors per track. For
instance, I own a 670 Mb drive that has 54 sectors per track.
In my case, the controller could not handle this number of sectors. It proved to work well except that it
only used 35 sectors on each track. This meant losing a lot of disk space.
Once again, check the documentation of your hardware for more info. Going out-of-spec like in the
example might or might not work. Give it a try or get another more capable controller.
278
Chapter 12. PC Hardware compatibility
Stay away from low-level formatters that mark all sectors of a track as bad as soon as they find one bad
sector. Not only does this waste space, it also and more importantly causes you grief with bad144 (see
the section on bad144).
Translations
Translations, although not exclusively a ESDI-only problem, might give you real trouble. Translations
come in multiple flavors. Most of them have in common that they attempt to work around the limitations
posed upon disk geometries by the original IBM PC/AT design (thanks IBM!).
First of all there is the (in)famous 1024 cylinder limit. For a system to be able to boot, the stuff (whatever
operating system) must be in the first 1024 cylinders of a disk. Only 10 bits are available to encode the
cylinder number. For the number of sectors the limit is 64 (0-63). When you combine the 1024 cylinder
limit with the 16 head limit (also a design feature) you max out at fairly limited disk sizes.
To work around this problem, the manufacturers of ESDI PC controllers added a BIOS prom extension
on their boards. This BIOS extension handles disk I/O for booting (and for some operating systems all
disk I/O) by using translation. For instance, a big drive might be presented to the system as having 32
heads and 64 sectors/track. The result is that the number of cylinders is reduced to something below
1024 and is therefore usable by the system without problems. It is noteworthy to know that FreeBSD
does not use the BIOS after its kernel has started. More on this later.
A second reason for translations is the fact that most older system BIOSes could only handle drives with
17 sectors per track (the old ST412 standard). Newer system BIOSes usually have a user-defined drive
type (in most cases this is drive type 47).
Warning: Whatever you do to translations after reading this document, keep in mind that if you have
multiple operating systems on the same disk, all must use the same translation
While on the subject of translations, I have seen one controller type (but there are probably more like
this) offer the option to logically split a drive in multiple partitions as a BIOS option. I had select 1 drive
== 1 partition because this controller wrote this info onto the disk. On power-up it read the info and
presented itself to the system based on the info from the disk.
Spare sectoring
Most ESDI controllers offer the possibility to remap bad sectors. During/after the low-level format of the
disk bad sectors are marked as such, and a replacement sector is put in place (logically of course) of the
bad one.
In most cases the remapping is done by using N-1 sectors on each track for actual data storage, and
sector N itself is the spare sector. N is the total number of sectors physically available on the track. The
279
Chapter 12. PC Hardware compatibility
idea behind this is that the operating system sees a perfect disk without bad sectors. In the case of
FreeBSD this concept is not usable.
The problem is that the translation from bad to good is performed by the BIOS of the ESDI controller.
FreeBSD, being a true 32 bit operating system, does not use the BIOS after it has been booted. Instead, it
has device drivers that talk directly to the hardware.
So: dont use spare sectoring, bad block remapping or whatever it may be called by the controller
manufacturer when you want to use the disk for FreeBSD.
Note: The restriction is not that only the root filesystem must be within the 1024 cylinder limit, but
rather the entire slice that contains the root filesystem.
Kernel configuration
ESDI disks are handled by the same wddriver as IDE and ST412 MFM disks. The wd driver should work
for all WD1003 compatible interfaces.
Most hardware is jumperable for one of two different I/O address ranges and IRQ lines. This allows you
to have two wd type controllers in one system.
280
Chapter 12. PC Hardware compatibility
When your hardware allows non-standard strappings, you can use these with FreeBSD as long as you
enter the correct info into the kernel config file. An example from the kernel config file (they live in
/sys/i386/conf BTW).
281
Chapter 12. PC Hardware compatibility
To get it to work, I had to disable the sector translation and the WD1007s onboard BIOS. This implied I
could not use the low-level formatter built into this BIOS. Instead, I grabbed WDFMT.EXE from
www.wdc.com Running this formatted my drive just fine.
Further reading
If you intend to do some serious ESDI hacking, you might want to have the official standard at hand:
The latest ANSI X3T10 committee document is: Enhanced Small Device Interface (ESDI)
[X3.170-1990/X3.170a-1991] [X3T10/792D Rev 11]
On Usenet the newsgroup comp.periphs (news:comp.periphs) is a noteworthy place to look for more info.
The World Wide Web (WWW) also proves to be a very handy info source: For info on Adaptec ESDI
controllers see http://www.adaptec.com/. For info on Western Digital controllers see
http://www.wdc.com/.
Thanks to...
Andrew Gordon for sending me an Adaptec 2320 controller and ESDI disk for testing.
What is SCSI?
Copyright 1995, Wilko Bulte <[email protected]>. July 6, 1996.
SCSI is an acronym for Small Computer Systems Interface. It is an ANSI standard that has become one
of the leading I/O buses in the computer industry. The foundation of the SCSI standard was laid by
Shugart Associates (the same guys that gave the world the first mini floppy disks) when they introduced
the SASI bus (Shugart Associates Standard Interface).
After some time an industry effort was started to come to a more strict standard allowing devices from
different vendors to work together. This effort was recognized in the ANSI SCSI-1 standard. The SCSI-1
standard (approx 1985) is rapidly becoming obsolete. The current standard is SCSI-2 (see Further
reading), with SCSI-3 on the drawing boards.
282
Chapter 12. PC Hardware compatibility
In addition to a physical interconnection standard, SCSI defines a logical (command set) standard to
which disk devices must adhere. This standard is called the Common Command Set (CCS) and was
developed more or less in parallel with ANSI SCSI-1. SCSI-2 includes the (revised) CCS as part of the
standard itself. The commands are dependent on the type of device at hand. It does not make much sense
of course to define a Write command for a scanner.
The SCSI bus is a parallel bus, which comes in a number of variants. The oldest and most used is an 8 bit
wide bus, with single-ended signals, carried on 50 wires. (If you do not know what single-ended means,
do not worry, that is what this document is all about.) Modern designs also use 16 bit wide buses, with
differential signals. This allows transfer speeds of 20Mbytes/second, on cables lengths of up to 25
meters. SCSI-2 allows a maximum bus width of 32 bits, using an additional cable. Quickly emerging are
Ultra SCSI (also called Fast-20) and Ultra2 (also called Fast-40). Fast-20 is 20 million transfers per
second (20 Mbytes/sec on a 8 bit bus), Fast-40 is 40 million transfers per second (40 Mbytes/sec on a 8
bit bus). Most hard drives sold today are single-ended Ultra SCSI (8 or 16 bits).
Of course the SCSI bus not only has data lines, but also a number of control signals. A very elaborate
protocol is part of the standard to allow multiple devices to share the bus in an efficient manner. In
SCSI-2, the data is always checked using a separate parity line. In pre-SCSI-2 designs parity was
optional.
In SCSI-3 even faster bus types are introduced, along with a serial SCSI busses that reduces the cabling
overhead and allows a higher maximum bus length. You might see names like SSA and Fiberchannel in
this context. None of the serial buses are currently in widespread use (especially not in the typical
FreeBSD environment). For this reason the serial bus types are not discussed any further.
As you could have guessed from the description above, SCSI devices are intelligent. They have to be to
adhere to the SCSI standard (which is over 2 inches thick BTW). So, for a hard disk drive for instance
you do not specify a head/cylinder/sector to address a particular block, but simply the number of the
block you want. Elaborate caching schemes, automatic bad block replacement etc are all made possible
by this intelligent device approach.
On a SCSI bus, each possible pair of devices can communicate. Whether their function allows this is
another matter, but the standard does not restrict it. To avoid signal contention, the 2 devices have to
arbitrate for the bus before using it.
The philosophy of SCSI is to have a standard that allows older-standard devices to work with
newer-standard ones. So, an old SCSI-1 device should normally work on a SCSI-2 bus. I say Normally,
because it is not absolutely sure that the implementation of an old device follows the (old) standard
closely enough to be acceptable on a new bus. Modern devices are usually more well-behaved, because
the standardization has become more strict and is better adhered to by the device manufacturers.
Generally speaking, the chances of getting a working set of devices on a single bus is better when all the
devices are SCSI-2 or newer. This implies that you do not have to dump all your old stuff when you get
that shiny 2GB disk: I own a system on which a pre-SCSI-1 disk, a SCSI-2 QIC tape unit, a SCSI-1
283
Chapter 12. PC Hardware compatibility
helical scan tape unit and 2 SCSI-1 disks work together quite happily. From a performance standpoint
you might want to separate your older and newer (=faster) devices however.
Components of SCSI
As said before, SCSI devices are smart. The idea is to put the knowledge about intimate hardware details
onto the SCSI device itself. In this way, the host system does not have to worry about things like how
many heads are hard disks has, or how many tracks there are on a specific tape device. If you are curious,
the standard specifies commands with which you can query your devices on their hardware particulars.
FreeBSD uses this capability during boot to check out what devices are connected and whether they need
any special treatment.
The advantage of intelligent devices is obvious: the device drivers on the host can be made in a much
more generic fashion, there is no longer a need to change (and qualify!) drivers for every odd new device
that is introduced.
For cabling and connectors there is a golden rule: get good stuff. With bus speeds going up all the time
you will save yourself a lot of grief by using good material.
So, gold plated connectors, shielded cabling, sturdy connector hoods with strain reliefs etc are the way to
go. Second golden rule: do no use cables longer than necessary. I once spent 3 days hunting down a
problem with a flaky machine only to discover that shortening the SCSI bus by 1 meter solved the
problem. And the original bus length was well within the SCSI specification.
284
Chapter 12. PC Hardware compatibility
With a minor amount of imagination one can usually imagine what is meant.
Wide is a bit ambiguous, it can indicate 16 or 32 bit buses. As far as I know, the 32 bit variant is not (yet)
in use, so wide normally means 16 bit.
Fast means that the timing on the bus is somewhat different, so that on a narrow (8 bit) bus 10
Mbytes/sec are possible instead of 5 Mbytes/sec for slow SCSI. As discussed before, bus speeds of 20
and 40 million transfers/second are also emerging (Fast-20 == Ultra SCSI and Fast-40 == Ultra2 SCSI).
Note: The data lines > 8 are only used for data transfers and device addressing. The transfers of
commands and status messages etc are only performed on the lowest 8 data lines. The standard
allows narrow devices to operate on a wide bus. The usable bus width is negotiated between the
devices. You have to watch your device addressing closely when mixing wide and narrow.
Note: If some devices on your bus use fast to communicate your bus must adhere to the length
restrictions for fast buses!
It is obvious that with the newer fast-SCSI devices the bus length can become a real bottleneck. This is
why the differential SCSI bus was introduced in the SCSI-2 standard.
For connector pinning and connector types please refer to the SCSI-2 standard (see Further reading)
itself, connectors etc are listed there in painstaking detail.
Beware of devices using non-standard cabling. For instance Apple uses a 25pin D-type connecter (like
the one on serial ports and parallel printers). Considering that the official SCSI bus needs 50 pins you
can imagine the use of this connector needs some creative cabling. The reduction of the number of
ground wires they used is a bad idea, you better stick to 50 pins cabling in accordance with the SCSI
standard. For Fast-20 and 40 do not even think about buses like this.
285
Chapter 12. PC Hardware compatibility
Differential buses
A differential SCSI bus has a maximum length of 25 meters. Quite a difference from the 3 meters for a
single-ended fast-SCSI bus. The idea behind differential signals is that each bus signal has its own return
wire. So, each signal is carried on a (preferably twisted) pair of wires. The voltage difference between
these two wires determines whether the signal is asserted or de-asserted. To a certain extent the voltage
difference between ground and the signal wire pair is not relevant (do not try 10 kVolts though).
It is beyond the scope of this document to explain why this differential idea is so much better. Just accept
that electrically seen the use of differential signals gives a much better noise margin. You will normally
find differential buses in use for inter-cabinet connections. Because of the lower cost single ended is
mostly used for shorter buses like inside cabinets.
There is nothing that stops you from using differential stuff with FreeBSD, as long as you use a
controller that has device driver support in FreeBSD. As an example, Adaptec marketed the AHA1740 as
a single ended board, whereas the AHA1744 was differential. The software interface to the host is
identical for both.
Terminators
Terminators in SCSI terminology are resistor networks that are used to get a correct impedance
matching. Impedance matching is important to get clean signals on the bus, without reflections or
ringing. If you once made a long distance telephone call on a bad line you probably know what
reflections are. With 20Mbytes/sec traveling over your SCSI bus, you do not want signals echoing back.
Terminators come in various incarnations, with more or less sophisticated designs. Of course, there are
internal and external variants. Many SCSI devices come with a number of sockets in which a number of
resistor networks can (must be!) installed. If you remove terminators from a device, carefully store them.
You will need them when you ever decide to reconfigure your SCSI bus. There is enough variation in
even these simple tiny things to make finding the exact replacement a frustrating business. There are also
SCSI devices that have a single jumper to enable or disable a built-in terminator. There are special
terminators you can stick onto a flat cable bus. Others look like external connectors, or a connector hood
without a cable. So, lots of choice as you can see.
There is much debate going on if and when you should switch from simple resistor (passive) terminators
to active terminators. Active terminators contain slightly more elaborate circuit to give cleaner bus
signals. The general consensus seems to be that the usefulness of active termination increases when you
have long buses and/or fast devices. If you ever have problems with your SCSI buses you might consider
trying an active terminator. Try to borrow one first, they reputedly are quite expensive.
Please keep in mind that terminators for differential and single-ended buses are not identical. You should
not mix the two variants.
OK, and now where should you install your terminators? This is by far the most misunderstood part of
286
Chapter 12. PC Hardware compatibility
SCSI. And it is by far the simplest. The rule is: every single line on the SCSI bus has 2 (two) terminators,
one at each end of the bus. So, two and not one or three or whatever. Do yourself a favor and stick to this
rule. It will save you endless grief, because wrong termination has the potential to introduce highly
mysterious bugs. (Note the potential here; the nastiest part is that it may or may not work.)
A common pitfall is to have an internal (flat) cable in a machine and also an external cable attached to
the controller. It seems almost everybody forgets to remove the terminators from the controller. The
terminator must now be on the last external device, and not on the controller! In general, every
reconfiguration of a SCSI bus must pay attention to this.
Note: Termination is to be done on a per-line basis. This means if you have both narrow and wide
buses connected to the same host adapter, you need to enable termination on the higher 8 bits of
the bus on the adapter (as well as the last devices on each bus, of course).
What I did myself is remove all terminators from my SCSI devices and controllers. I own a couple of
external terminators, for both the Centronics-type external cabling and for the internal flat cable
connectors. This makes reconfiguration much easier.
On modern devices, sometimes integrated terminators are used. These things are special purpose
integrated circuits that can be dis/en-abled with a control pin. It is not necessary to physically remove
them from a device. You may find them on newer host adapters, sometimes they are software
configurable, using some sort of setup tool. Some will even auto-detect the cables attached to the
connectors and automatically set up the termination as necessary. At any rate, consult your
documentation!
Terminator power
The terminators discussed in the previous chapter need power to operate properly. On the SCSI bus, a
line is dedicated to this purpose. So, simple huh?
Not so. Each device can provide its own terminator power to the terminator sockets it has on-device. But
if you have external terminators, or when the device supplying the terminator power to the SCSI bus line
is switched off you are in trouble.
The idea is that initiators (these are devices that initiate actions on the bus, a discussion follows) must
supply terminator power. All SCSI devices are allowed (but not required) to supply terminator power.
To allow for un-powered devices on a bus, the terminator power must be supplied to the bus via a diode.
This prevents the backflow of current to un-powered devices.
To prevent all kinds of nastiness, the terminator power is usually fused. As you can imagine, fuses might
blow. This can, but does not have to, lead to a non functional bus. If multiple devices supply terminator
power, a single blown fuse will not put you out of business. A single supplier with a blown fuse certainly
287
Chapter 12. PC Hardware compatibility
will. Clever external terminators sometimes have a LED indication that shows whether terminator power
is present.
In newer designs auto-restoring fuses that reset themselves after some time are sometimes used.
Device addressing
Because the SCSI bus is, ehh, a bus there must be a way to distinguish or address the different devices
connected to it.
This is done by means of the SCSI or target ID. Each device has a unique target ID. You can select the ID
to which a device must respond using a set of jumpers, or a dip switch, or something similar. Some SCSI
host adapters let you change the target ID from the boot menu. (Yet some others will not let you change
the ID from 7.) Consult the documentation of your device for more information.
Beware of multiple devices configured to use the same ID. Chaos normally reigns in this case. A pitfall
is that one of the devices sharing the same ID sometimes even manages to answer to I/O requests!
For an 8 bit bus, a maximum of 8 targets is possible. The maximum is 8 because the selection is done
bitwise using the 8 data lines on the bus. For wide buses this increases to the number of data lines
(usually 16).
Note: A narrow SCSI device can not communicate with a SCSI device with a target ID larger than 7.
This means it is generally not a good idea to move your SCSI host adapters target ID to something
higher than 7 (or your CD-ROM will stop working).
The higher the SCSI target ID, the higher the priority the devices has. When it comes to arbitration
between devices that want to use the bus at the same time, the device that has the highest SCSI ID will
win. This also means that the SCSI host adapter usually uses target ID 7. Note however that the lower 8
IDs have higher priorities than the higher 8 IDs on a wide-SCSI bus. Thus, the order of target IDs is: [7 6
.. 1 0 15 14 .. 9 8] on a wide-SCSI system. (If you you are wondering why the lower 8 have higher
priority, read the previous paragraph for a hint.)
For a further subdivision, the standard allows for Logical Units or LUNs for short. A single target ID
may have multiple LUNs. For example, a tape device including a tape changer may have LUN 0 for the
tape device itself, and LUN 1 for the tape changer. In this way, the host system can address each of the
functional units of the tape changer as desired.
Bus layout
SCSI buses are linear. So, not shaped like Y-junctions, star topologies, rings, cobwebs or whatever else
people might want to invent. One of the most common mistakes is for people with wide-SCSI host
adapters to connect devices on all three connecters (external connector, internal wide connector, internal
288
Chapter 12. PC Hardware compatibility
narrow connector). Dont do that. It may appear to work if you are really lucky, but I can almost
guarantee that your system will stop functioning at the most unfortunate moment (this is also known as
Murphys law).
You might notice that the terminator issue discussed earlier becomes rather hairy if your bus is not linear.
Also, if you have more connectors than devices on your internal SCSI cable, make sure you attach
devices on connectors on both ends instead of using the connectors in the middle and let one or both ends
dangle. This will screw up the termination of the bus.
The electrical characteristics, its noise margins and ultimately the reliability of it all are tightly related to
linear bus rule.
Stick to the linear bus rule!
289
Chapter 12. PC Hardware compatibility
this is a show-stopper for disks greater than 1 GB. With disk capacities going up all the time this is
causing problems.
Fortunately, the solution is simple: just use another translation, e.g. with 128 heads instead of 32. In
most cases new SCSI BIOS versions are available to upgrade older SCSI host adapters. Some newer
adapters have an option, in the form of a jumper or software setup selection, to switch the translation the
SCSI BIOS uses.
It is very important that all operating systems on the disk use the same translation to get the right idea
about where to find the relevant partitions. So, when installing FreeBSD you must answer any questions
about heads/cylinders etc using the translated values your host adapter uses.
Failing to observe the translation issue might lead to un-bootable systems or operating systems
overwriting each others partitions. Using fdisk you should be able to see all partitions.
You might have heard some talk of lying devices? Older FreeBSD kernels used to report the geometry
of SCSI disks when booting. An example from one of my systems:
290
Chapter 12. PC Hardware compatibility
are wondering where you can find this stuff, it all lives in /sys/scsi. See the man pages in section 4 for
more details.
The multi level design allows a decoupling of low-level bit banging and more high level stuff. Adding
support for another piece of hardware is a much more manageable problem.
Kernel configuration
Dependent on your hardware, the kernel configuration file must contain one or more lines describing
your host adapter(s). This includes I/O addresses, interrupts etc. Consult the man page for your adapter
driver to get more info. Apart from that, check out /sys/i386/conf/LINT for an overview of a kernel
config file. LINT contains every possible option you can dream of. It does not imply LINT will actually
get you to a working kernel at all.
Although it is probably stating the obvious: the kernel config file should reflect your actual hardware
setup. So, interrupts, I/O addresses etc must match the kernel config file. During system boot messages
will be displayed to indicate whether the configured hardware was actually found.
Note: Note that most of the EISA/PCI drivers (namely ahb, ahc, ncr and amd will automatically
obtain the correct parameters from the host adapters themselves at boot time; thus, you just need to
write, for instance, controller ahc0.
An example loosely based on the FreeBSD 2.2.5-Release kernel config file LINT with some added
comments (between []):
291
Chapter 12. PC Hardware compatibility
The example above tells the kernel to look for a ahc (Adaptec 274x) controller, then for an NCR/Symbios
board, and so on. The lines following the controller specifications tell the kernel to configure specific
devices but only attach them when they match the target ID and LUN specified on the corresponding bus.
Wired down devices get first shot at the unit numbers so the first non wired down device, is allocated
the unit number one greater than the highest wired down unit number for that kind of device. So, if
you had a SCSI tape at target ID 2 it would be configured as st2, as the tape at target ID 6 is wired down
to unit number 1.
Note: Wired down devices need not be found to get their unit number. The unit number for a wired
down device is reserved for that device, even if it is turned off at boot time. This allows the device to
be turned on and brought on-line at a later time, without rebooting. Notice that a devices unit number
has no relationship with its target ID on the SCSI bus.
Below is another example of a kernel config file as used by FreeBSD version < 2.0.5. The difference
with the first example is that devices are not wired down. Wired down means that you specify which
SCSI target belongs to which device.
A kernel built to the config file below will attach the first SCSI disk it finds to sd0, the second disk to sd1
etc. If you ever removed or added a disk, all other devices of the same type (disk in this case) would
move around. This implies you have to change /etc/fstab each time.
292
Chapter 12. PC Hardware compatibility
Although the old style still works, you are strongly recommended to use this new feature. It will save you
a lot of grief whenever you shift your hardware around on the SCSI buses. So, when you re-use your old
trusty config file after upgrading from a pre-FreeBSD2.0.5.R system check this out.
controller scbus0
Both examples support SCSI disks. If during boot more devices of a specific type (e.g. sd disks) are
found than are configured in the booting kernel, the system will simply allocate more devices,
incrementing the unit number starting at the last number wired down. If there are no wired down
devices then counting starts at unit 0.
Use man 4 scsi to check for the latest info on the SCSI subsystem. For more detailed info on host
adapter drivers use eg man 4 ahc for info on the Adaptec 294x driver.
293
Chapter 12. PC Hardware compatibility
This line sets the delay time to 15 seconds. On my own system I had to use 3 seconds minimum to get
my trusty old CD-ROM drive to be recognized. Start with a high value (say 30 seconds or so) when you
have problems with device recognition. If this helps, tune it back until it just stays working.
Feb 25 21:03:34 yedi /kernel: ahb0 targ 5 lun 0: <TANDBERG TDC 3600 -
06:>
Feb 25 21:03:34 yedi /kernel: st0: Tandberg tdc3600 is a known rogue
Mar 29 21:16:37 yedi /kernel: aha0 targ 5 lun 0: <ARCHIVE VIPER 150 21247-
005>
Mar 29 21:16:37 yedi /kernel: st1: Archive Viper 150 is a known rogue
For instance, there are devices that respond to all LUNs on a certain target ID, even if they are actually
only one device. It is easy to see that the kernel might be fooled into believing that there are 8 LUNs at
that particular target ID. The confusion this causes is left as an exercise to the reader.
The SCSI subsystem of FreeBSD recognizes devices with bad habits by looking at the INQUIRY
response they send when probed. Because the INQUIRY response also includes the version number of
the device firmware, it is even possible that for different firmware versions different workarounds are
used. See e.g. /sys/scsi/st.c and /sys/scsi/scsiconf.c for more info on how this is done.
This scheme works fine, but keep in mind that it of course only works for devices that are known to be
weird. If you are the first to connect your bogus Mumbletech SCSI CD-ROM you might be the one that
has to define which workaround is needed.
After you got your Mumbletech working, please send the required workaround to the FreeBSD
development team for inclusion in the next release of FreeBSD. Other Mumbletech owners will be
grateful to you.
294
Chapter 12. PC Hardware compatibility
This means that any devices with LUNs != 0 are not normally found during device probe on system boot.
To work around this problem you must add an appropriate entry in /sys/scsi/scsiconf.c and rebuild your
kernel.
Look for a struct that is initialized like below:
{
T_DIRECT, T_FIXED, "MAXTOR", "XT-4170S", "B5A",
"mx1", SC_ONE_LU
}
For you Mumbletech BRIDGE2000 that has more than one LUN, acts as a SCSI disk and has firmware
revision 123 you would add something like:
{
T_DIRECT, T_FIXED, "MUMBLETECH", "BRIDGE2000", "123",
"sd", SC_MORE_LUS
}
The kernel on boot scans the inquiry data it receives against the table and acts accordingly. See the
source for more info.
295
Chapter 12. PC Hardware compatibility
This is of course an advantage for a multitasking operating system like FreeBSD. It must be noted
however that there might be some rough edges.
For instance an Adaptec 1542 controller can be set to use different transfer speeds on the host bus (ISA
or AT in this case). The controller is settable to different rates because not all motherboards can handle
the higher speeds. Problems like hangups, bad data etc might be the result of using a higher data transfer
rate then your motherboard can stomach.
The solution is of course obvious: switch to a lower data transfer rate and try if that works better.
In the case of a Adaptec 1542, there is an option that can be put into the kernel config file to allow
dynamic determination of the right, read: fastest feasible, transfer rate. This option is disabled by default:
Check the man pages for the host adapter that you use. Or better still, use the ultimate documentation
(read: driver source).
296
Chapter 12. PC Hardware compatibility
copious debugging output with which to confuse the gurus. See man 4 scsi for more exact
information. Also look at man 8 scsi.
Further reading
If you intend to do some serious SCSI hacking, you might want to have the official standard at hand:
Approved American National Standards can be purchased from ANSI at
13th Floor
11 West 42nd Street
New York
NY 10036
Sales Dept: (212) 642-4900
You can also buy many ANSI standards and most committee draft documents from Global Engineering
Documents,
Many X3T10 draft documents are available electronically on the SCSI BBS (719-574-0424) and on the
ncrinfo.ncr.com anonymous ftp site.
Latest X3T10 committee documents are:
297
Chapter 12. PC Hardware compatibility
SCSI: Understanding the Small Computer System Interface, written by NCR Corporation. Available
from: Prentice Hall, Englewood Cliffs, NJ, 07632 Phone: (201) 767-5937 ISBN 0-13-796855-8
Basics of SCSI, a SCSI tutorial written by Ancot Corporation Contact Ancot for availability
information at: Phone: (415) 322-5322 Fax: (415) 322-0455
SCSI Interconnection Guide Book, an AMP publication (dated 4/93, Catalog 65237) that lists the
various SCSI connectors and suggests cabling schemes. Available from AMP at (800) 522-6752 or
(717) 564-0100
Fast Track to SCSI, A Product Guide written by Fujitsu. Available from: Prentice Hall, Englewood
Cliffs, NJ, 07632 Phone: (201) 767-5937 ISBN 0-13-307000-X
The SCSI Bench Reference, The SCSI Encyclopedia, and the SCSI Tutor, ENDL Publications,
14426 Black Walnut Court, Saratoga CA, 95070 Phone: (408) 867-6642
Zadian SCSI Navigator (quick ref. book) and Discover the Power of SCSI (First book along with
a one-hour video and tutorial book), Zadian Software, Suite 214, 1210 S. Bascom Ave., San Jose, CA
92128, (408) 293-0800
On Usenet the newsgroups comp.periphs.scsi (news:comp.periphs.scsi) and comp.periphs
(news:comp.periphs) are noteworthy places to look for more info. You can also find the SCSI-Faq there,
which is posted periodically.
Most major SCSI device and host adapter suppliers operate ftp sites and/or BBS systems. They may be
valuable sources of information about the devices you own.
* Disk/tape controllers
* SCSI
* IDE
* Floppy
298
Chapter 12. PC Hardware compatibility
Hard drives
Rotational speed
Rotational speeds of SCSI drives sold today range from around 4,500RPM to 10,000RPM. Most of them
are either 5,400RPM or 7,200RPM. Even though the 7,200RPM drives can generally transfer data faster,
they run considerably hotter than their 5,400RPM counterparts. A large fraction of todays disk drive
malfunctions are heat-related. If you do not have very good cooling in your PC case, you may want to
stick with 5,400RPM or slower drives.
Note that newer drives, with higher areal recording densities, can deliver much more bits per rotation
than older ones. Todays top-of-line 5,400RPM drives can sustain a throughput comparable to
7,200RPM drives of one or two model generations ago. The number to find on the spec sheet for
bandwidth is internal data (or transfer) rate. It is usually in megabits/sec so divide it by 8 and youll get
the rough approximation of how much megabytes/sec you can get out of the drive.
(If you are a speed maniac and want a 10,000RPM drive for your cute little peecee, be my guest;
however, those drives become extremely hot. Dont even think about it if you dont have a fan blowing
air directly at the drive or a properly ventilated disk enclosure.)
Obviously, the latest 10,000RPM drives and 7,200RPM drives can deliver more data than the latest
5,400RPM drives, so if absolute bandwidth is the necessity for your applications, you have little choice
but to get the faster drives. Also, if you need low latency, faster drives are better; not only do they usually
have lower average seek times, but also the rotational delay is one place where slow-spinning drives can
never beat a faster one. (The average rotational latency is half the time it takes to rotate the drive once;
thus, its 3 milliseconds for 10,000RPM drives, 4.2ms for 7,200RPM drives and 5.6ms for 5,400RPM
drives.) Latency is seek time plus rotational delay. Make sure you understand whether you need low
latency or more accesses per second, though; in the latter case (e.g., news servers), it may not be optimal
to purchase one big fast drive. You can achieve similar or even better results by using the ccd
(concatenated disk) driver to create a striped disk array out of multiple slower drives for comparable
overall cost.
299
Chapter 12. PC Hardware compatibility
Make sure you have adequate air flow around the drive, especially if you are going to use a fast-spinning
drive. You generally need at least 1/2" (1.25cm) of spacing above and below a drive. Understand how the
air flows through your PC case. Most cases have the power supply suck the air out of the back. See
where the air flows in, and put the drive where it will have the largest volume of cool air flowing around
it. You may need to seal some unwanted holes or add a new fan for effective cooling.
Another consideration is noise. Many 7,200 or faster drives generate a high-pitched whine which is quite
unpleasant to most people. That, plus the extra fans often required for cooling, may make 7,200 or faster
drives unsuitable for some office and home environments.
Form factor
Most SCSI drives sold today are of 3.5" form factor. They come in two different heights; 1.6"
(half-height) or 1" (low-profile). The half-height drive is the same height as a CD-ROM drive.
However, dont forget the spacing rule mentioned in the previous section. If you have three standard 3.5"
drive bays, you will not be able to put three half-height drives in there (without frying them, that is).
Interface
The majority of SCSI hard drives sold today are Ultra or Ultra-wide SCSI. The maximum bandwidth of
Ultra SCSI is 20MB/sec, and Ultra-wide SCSI is 40MB/sec. There is no difference in max cable length
between Ultra and Ultra-wide; however, the more devices you have on the same bus, the sooner you will
start having bus integrity problems. Unless you have a well-designed disk enclosure, it is not easy to
make more than 5 or 6 Ultra SCSI drives work on a single bus.
On the other hand, if you need to connect many drives, going for Fast-wide SCSI may not be a bad idea.
That will have the same max bandwidth as Ultra (narrow) SCSI, while electronically its much easier to
get it right. My advice would be: if you want to connect many disks, get wide SCSI drives; they
usually cost a little more but it may save you down the road. (Besides, if you cant afford the cost
difference, you shouldnt be building a disk array.)
There are two variant of wide SCSI drives; 68-pin and 80-pin SCA (Single Connector Attach). The SCA
drives dont have a separate 4-pin power connector, and also read the SCSI ID settings through the
80-pin connector. If you are really serious about building a large storage system, get SCA drives and a
good SCA enclosure (dual power supply with at least one extra fan). They are more electronically sound
than 68-pin counterparts because there is no stub of the SCSI bus inside the disk canister as in arrays
built from 68-pin drives. They are easier to install too (you just need to screw the drive in the canister,
instead of trying to squeeze in your fingers in a tight place to hook up all the little cables (like the SCSI
ID and disk activity LED lines).
300
Chapter 12. PC Hardware compatibility
Tape drives
Contributed by Jonathan M. Bresler <[email protected] >. 2 July 1996.
Controller Interfaces
There are several different interfaces that support tape drives. The interfaces are SCSI, IDE, Floppy and
Parallel Port. A wide variety of tape drives are available for these interfaces. Controllers are discussed in
Disk/tape controllers.
SCSI drives
The st(4) driver provides support for 8mm (Exabyte), 4mm (DAT: Digital Audio Tape), QIC
(Quarter-Inch Cartridge), DLT (Digital Linear Tape), QIC Minicartridge and 9-track (remember the big
reels that you see spinning in Hollywood computer rooms) tape drives. See the st(4) manual page for a
detailed description.
The drives listed below are currently being used by members of the FreeBSD community. They are not
the only drives that will work with FreeBSD. They just happen to be the ones that we use.
301
Chapter 12. PC Hardware compatibility
HP 35480A
SDT-5000
Wangtek 6200
8mm (Exabyte)
EXB-8200
EXB-8500
EXB-8505
Mini-Cartridge
Conner CTMS 3200
Exabyte 2501
Autoloaders/Changers
Hewlett-Packard HP C1553A Autoloading DDS2
302
Chapter 12. PC Hardware compatibility
* IDE drives
Floppy drives
Conner 420R
Detailed Information
! if (np->latetime>4) {
/*
** Although we tried to wake it up,
303
Chapter 12. PC Hardware compatibility
-- 4831,4836 ---
};
! if (np->latetime>1200) {
/*
** Although we tried to wake it up,
304
Chapter 12. PC Hardware compatibility
Archive Viper 60
The boot message identifier for this drive is ARCHIVE VIPER 60 21116 -007 type 1 removable
SCSI 1
305
Chapter 12. PC Hardware compatibility
Conner 420R
The boot message identifier for this drive is Conner tape.
This is a floppy controller, minicartridge tape drive.
Native capacity is XXXX
Data transfer rate is XXX
The drive uses QIC-80 tape cartridges.
Reported by: Mark Hannon <[email protected]>
306
Chapter 12. PC Hardware compatibility
This drive is identical to the Quantum DLT2000. The drive firmware can be set to emulate several
well-known drives, including an Exabyte 8mm drive.
Reported by: Wilko Bulte <[email protected]>
Exabyte EXB-2501
(http://www.Exabyte.COM:80/Products/Minicartridge/2501/Rfeatures.html)
The boot message identifier for this drive is EXABYTE EXB-2501
This is a mini-cartridge tape drive.
Native capacity is 1GB when using MC3000XL minicartridges.
Data transfer rate is XXX
This drive can read and write DC2300 (550MB), DC2750 (750MB), MC3000 (750MB), and
MC3000XL (1GB) minicartridges.
WARNING: This drive does not meet the SCSI-2 specifications. The drive locks up completely in
response to a SCSI MODE_SELECT command unless there is a formatted tape in the drive. Before
using this drive, set the tape blocksize with
Before using a minicartridge for the first time, the minicartridge must be formated. FreeBSD
2.1.0-RELEASE and earlier:
(Alternatively, fetch a copy of the scsiformat shell script from FreeBSD 2.1.5/2.2.) FreeBSD 2.1.5
and later:
# /sbin/scsiformat -q -w /dev/rst0.ctl
Exabyte EXB-8200
The boot message identifier for this drive is EXABYTE EXB-8200 252X type 1 removable SCSI 1
This is an 8mm tape drive.
Native capacity is 2.3GB.
Data transfer rate is 270kB/s.
307
Chapter 12. PC Hardware compatibility
This drive is fairly slow in responding to the SCSI bus during boot. A custom kernel may be required (set
SCSI_DELAY to 10 seconds).
There are a large number of firmware configurations for this drive, some have been customized to a
particular vendors hardware. The firmware can be changed via EPROM replacement.
Production of this drive has been discontinued.
Reported by: Mike Smith <[email protected]>
Exabyte EXB-8500
The boot message identifier for this drive is EXABYTE EXB-8500-85Qanx0 0415 type 1
removable SCSI 2
This is an 8mm tape drive which supports compression, and is upward compatible with the EXB-5200
and EXB-8500.
Native capacity is 5GB.
The drive supports hardware data compression.
Data transfer rate is 300kB/s.
Reported by: Glen Foster <[email protected]>
Hewlett-Packard HP C1533A
The boot message identifier for this drive is HP C1533A 9503 type 1 removable SCSI 2.
This is a DDS-2 tape drive. DDS-2 means hardware data compression and narrower tracks for increased
data capacity.
Native capacity is 4GB when using 120m tapes. This drive supports hardware data compression.
Data transfer rate is 510kB/s.
308
Chapter 12. PC Hardware compatibility
This drive is used in Hewlett-Packards SureStore 6000eU and 6000i tape drives and C1533A DDS-2
DAT drive.
The drive has a block of 8 dip switches. The proper settings for FreeBSD are: 1 ON; 2 ON; 3 OFF; 4
ON; 5 ON; 6 ON; 7 ON; 8 ON.
Switch 3 controls MRS (Media Recognition System). MRS tapes have stripes on the transparent leader.
These identify the tape as DDS (Digital Data Storage) grade media. Tapes that do not have the stripes
will be treated as write-protected. Switch 3 OFF enables MRS. Switch 3 ON disables MRS.
See HP SureStore Tape Products (http://www.hp.com/tape/c_intro.html) and Hewlett-Packard Disk and
Tape Technical Information (http://www.impediment.com/hp/hp_technical.html) for more information
on configuring this drive.
Warning: Quality control on these drives varies greatly. One FreeBSD core-team member has returned 2
of these drives. Neither lasted more than 5 months.
Reported by: Stefan Esser <[email protected]>
Hewlett-Packard HP 1534A
The boot message identifier for this drive is HP HP35470A T503 type 1 removable SCSI 2
Sequential-Access density code 0x13, variable blocks.
This is a DDS-1 tape drive. DDS-1 is the original DAT tape format.
Native capacity is 2GB when using 90m tapes.
Data transfer rate is 183kB/s.
The same mechanism is used in Hewlett-Packards SureStore 2000i
(http://www.dmo.hp.com/tape/sst2000.htm) tape drive, C35470A DDS format DAT drive, C1534A DDS
format DAT drive and HP C1536A DDS format DAT drive.
309
Chapter 12. PC Hardware compatibility
The HP C1534A DDS format DAT drive has two indicator lights, one green and one amber. The green
one indicates tape action: slow flash during load, steady when loaded, fast flash during read/write
operations. The amber one indicates warnings: slow flash when cleaning is required or tape is nearing
the end of its useful life, steady indicates an hard fault. (factory service required?)
Reported by Gary Crutcher <[email protected]>
#!/bin/sh
PATH="/sbin:/usr/sbin:/bin:/usr/bin"; export PATH
usage()
{
echo "Usage: dds_changer [123456ne] raw-device-name
echo "1..6 = Select cartridge"
echo "next cartridge"
echo "eject magazine"
exit 2
}
if [ $# -ne 2 ] ; then
usage
fi
cdb3=0
cdb4=0
310
Chapter 12. PC Hardware compatibility
cdb5=0
case $1 in
[123456])
cdb3=$1
cdb4=1
;;
n)
;;
e)
cdb5=0x80
;;
?)
usage
;;
esac
Hewlett-Packard HP 35450A
The boot message identifier for this drive is HP HP35450A -A C620 type 1 removable SCSI 2
Sequential-Access density code 0x13
This is a DDS-1 tape drive. DDS-1 is the original DAT tape format.
Native capacity is 1.2GB.
Data transfer rate is 160kB/s.
Reported by: mark thompson <[email protected]>
Hewlett-Packard HP 35470A
The boot message identifier for this drive is HP HP35470A 9 09 type 1 removable SCSI 2
This is a DDS-1 tape drive. DDS-1 is the original DAT tape format.
Native capacity is 2GB when using 90m tapes.
Data transfer rate is 183kB/s.
The same mechanism is used in Hewlett-Packards SureStore 2000i
(http://www.dmo.hp.com/tape/sst2000.htm) tape drive, C35470A DDS format DAT drive, C1534A DDS
format DAT drive, and HP C1536A DDS format DAT drive.
311
Chapter 12. PC Hardware compatibility
Warning: Quality control on these drives varies greatly. One FreeBSD core-team member has returned 5
of these drives. None lasted more than 9 months.
Reported by: David Dawes <[email protected]> (9 09)
Hewlett-Packard HP 35480A
The boot message identifier for this drive is HP HP35480A 1009 type 1 removable SCSI 2
Sequential-Access density code 0x13.
This is a DDS-DC tape drive. DDS-DC is DDS-1 with hardware data compression. DDS-1 is the
original DAT tape format.
Native capacity is 2GB when using 90m tapes. It cannot handle 120m tapes. This drive supports
hardware data compression. Please refer to the section on HP C1533A for the proper switch settings.
Data transfer rate is 183kB/s.
This drive is used in Hewlett-Packards SureStore 5000eU (http://www.dmo.hp.com/tape/sst5000.htm)
and 5000i (http://www.dmo.hp.com/tape/sst5000.htm) tape drives and C35480A DDS format DAT drive..
This drive will occasionally hang during a tape eject operation (mt offline). Pressing the front panel
button will eject the tape and bring the tape drive back to life.
WARNING: HP 35480-03110 only. On at least two occasions this tape drive when used with FreeBSD
2.1.0, an IBM Server 320 and an 2940W SCSI controller resulted in all SCSI disk partitions being lost.
The problem has not be analyzed or resolved at this time.
Native capacity is 4GB when using 120m tapes. This drive supports hardware data compression.
Data transfer rate is depends upon the model or the drive. The rate is 630kB/s for the SONY SDT-5000
327M while compressing the data. For the SONY SDT-5000 3.02, the data transfer rate is 225kB/s.
In order to get this drive to stream, set the blocksize to 512 bytes (mt blocksize 512) reported by
Kenneth Merry [email protected]
SONY SDT-5000 327M information reported by Charles Henrich [email protected]
312
Chapter 12. PC Hardware compatibility
313
Chapter 12. PC Hardware compatibility
This drives quirks are known and pre-compiled into the scsi tape device driver (st(4)) beginning with
FreeBSD 2.2-current. For previous versions of FreeBSD, use mt to read one block from the tape, rewind
the tape, and then execute the backup program (mt fsr 1; mt rewind; dump ...)
Data transfer rate is 600kB/s (vendor claim with compression), 350 KB/s can even be reached in
start/stop mode. The rate decreases for smaller cartridges.
Reported by: Jrg Wunsch <[email protected]>
Wangtek 5525ES
The boot message identifier for this drive is WANGTEK 5525ES SCSI REV7 3R1 type 1 removable
SCSI 1 density code 0x11, 1024-byte blocks
Wangtek 6200
The boot message identifier for this drive is WANGTEK 6200-HS 4B18 type 1 removable SCSI 2
Sequential-Access density code 0x13
314
Chapter 12. PC Hardware compatibility
* Problem drives
CD-ROM drives
Contributed by David OBrien <[email protected] >. 23 November 1997.
As mentioned in Jordans Picks Generally speaking those in The FreeBSD Project prefer SCSI CDROM
drives over IDE CDROM drives. However not all SCSI CDROM drives are equal. Some feel the quality
of some SCSI CDROM drives have been deteriorating to that of IDE CDROM drives. Toshiba used to be
the favored stand-by, but many on the SCSI mailing list have found displeasure with the 12x speed
XM-5701TA as its volume (when playing audio CDROMs) is not controllable by the various audio
player software.
Another area where SCSI CDROM manufacturers are cutting corners is adherence to the SCSI
specification. Many SCSI CDROMs will respond to multiple LUNs for its target address. Known
violators include the 6x Teac CD-56S 1.0D.
* Other
* Other
* PCMCIA
315
Chapter 13. Localization
Console Setup
to move character codes used for mouse cursor off KOI8-R pseudographics range.
2. Russian console entry in /etc/rc.conf should looks like:
keymap=ru.koi8-r
keychange="61 ^[[K"
scrnmap=koi8-r2cp866
font8x16=cp866b-8x16
font8x14=cp866-8x14
font8x8=cp866-8x8
Note: ^[ means that real ESC character must be entered into /etc/rc.conf, not just ^[ string.
This tuning means KOI8-R keyboard with Alternative screen font mapped to KOI8-R encoding to
preserve pseudographics, Gray Delete key remapped to match Russian termcap(5) entry for
FreeBSD console.
RUS/LAT switch will be CapsLock. Old CapsLock function still available via Shift+CapsLock.
CapsLock LED will indicate RUS mode, not CapsLock mode.
3. For each ttyv? entry in /etc/ttys change terminal type from cons25 to cons25r, i.e. each
entry should looks like:
ttyv0 "/usr/libexec/getty Pc" cons25r on secure
316
Chapter 13. Localization
Locale Setup
There is two environment variables for locale setup:
user:password:1111:11:russian:0:0:User Name:/home/user:/bin/csh
Set
defaultclass = russian
in /etc/adduser.conf (you must enter default class for all non-Russian users in this case);
Alternative variant will be answering russian each time when you see
Enter login class: default []:
317
Chapter 13. Localization
/etc/profile:
/etc/csh.login:
/usr/share/skel/dot.profile:
/usr/share/skel/dot.login:
Printer Setup
Since most printers with Russian characters comes with hardware code page CP866, special output filter
needed for KOI8-R -> CP866 conversion. Such filter installed by default as
/usr/libexec/lpr/ru/koi2alt. So, Russian printer /etc/printcap entry should looks like:
318
Chapter 13. Localization
X Window Setup
Step by step instructions:
Note: Russian KOI8-R locale may not work with old XFree86 releases (lower than 3.3). XFree86
port from /usr/ports/x11/XFree86 already have most recent XFree86 version, so it will work,
if you install XFree86 from this port. XFree86 version shipped with the latest FreeBSD
distribution should work too (check XFree86 version number not less than 3.3 first).
there. This port install latest version of KOI8-R fonts. XFree86 3.3 already have some KOI8-R fonts, but
this ones scaled better.
Check find "Files" section in your /etc/XF86Config, following lines must be before any other
FontPath entries:
FontPath "/usr/X11R6/lib/X11/fonts/cyrillic/misc"
FontPath "/usr/X11R6/lib/X11/fonts/cyrillic/75dpi"
FontPath "/usr/X11R6/lib/X11/fonts/cyrillic/100dpi"
If you use high resolution video mode, swap 75 dpi and 100 dpi lines.
3. To activate Russian keyboard add
XkbKeymap "xfree86(ru)"
line into "Keyboard" section in your /etc/XF86Config, also make sure that XkbDisable is turned
off (commented out) there.
319
Chapter 13. Localization
RUS/LAT switch will be CapsLock. Old CapsLock function still available via Shift+CapsLock
(in LAT mode only).
Note: Russian XKB keyboard may not work with old XFree86 versions, see locale note for more
info. Russian XKB keyboard may not work with non-localized applications too, minimally
localized application should call XtSetLanguageProc (NULL, NULL, NULL); function early in
the program.
320
III. Network Communications
321
Chapter 14. Serial Communications
Serial Basics
Assembled from FAQ.
This section should give you some general information about serial ports. If you do not find what you
want here, check into the Terminal and Dialup sections of the handbook.
The ttydX (or cuaaX ) device is the regular device you will want to open for your applications. When a
process opens the device, it will have a default set of terminal I/O settings. You can see these settings
with the command
# stty -a -f /dev/ttyd1
When you change the settings to this device, the settings are in effect until the device is closed. When it
is reopened, it goes back to the default set. To make changes to the default set, you can open and adjust
the settings of the initial state device. For example, to turn on CLOCAL mode, 8 bits, and XON/XOFF
flow control by default for ttyd5, do:
A good place to do this is in /etc/rc.serial. Now, an application will have these settings by default
when it opens ttyd5. It can still change these settings to its liking, though.
You can also prevent certain settings from being changed by an application by making adjustments to the
lock state device. For example, to lock the speed of ttyd5 to 57600 bps, do
Now, an application that opens ttyd5 and tries to change the speed of the port will be stuck with 57600
bps.
Naturally, you should make the initial state and lock state devices writable only by root. The MAKEDEV
script does not do this when it creates the device entries.
Terminals
Contributed by Sean Kelly <[email protected]> 28 July 1996
322
Chapter 14. Serial Communications
Terminals provide a convenient and low-cost way to access the power of your FreeBSD system when
you are not at the computers console or on a connected network. This section describes how to use
terminals with FreeBSD.
Dumb terminals
PCs acting as terminals
X terminals
The remaining subsections describe each kind.
Dumb Terminals
Dumb terminals are specialized pieces of hardware that let you connect to computers over serial lines.
They are called dumb because they have only enough computational power to display, send, and
receive text. You cannot run any programs on them. It is the computer to which you connect them that
has all the power to run text editors, compilers, email, games, and so forth.
There are hundreds of kinds of dumb terminals made by many manufacturers, including Digital
Equipment Corporations VT-100 and Wyses WY-75. Just about any kind will work with FreeBSD.
Some high-end terminals can even display graphics, but only certain software packages can take
advantage of these advanced features.
Dumb terminals are popular in work environments where workers do not need access to graphic
applications such as those provided by the X Window System.
323
Chapter 14. Serial Communications
X Terminals
X terminals are the most sophisticated kind of terminal available. Instead of connecting to a serial port,
they usually connect to a network like Ethernet. Instead of being relegated to text-only applications, they
can display any X application.
We introduce X terminals just for the sake of completeness. However, this chapter does not cover setup,
configuration, or use of X terminals.
Cables
Because terminals use serial ports, you need to use serialalso known as RS-232Ccables to connect
the terminal to the FreeBSD system.
There are a couple of kinds of serial cables. Which one youll use depends on the terminal you want to
connect:
If you are connecting a personal computer to act as a terminal, use a null-modem cable. A null-modem
cable connects two computers or terminals together.
If you have an actual terminal, your best source of information on what cable to use is the
documentation that accompanied the terminal. If you do not have the documentation, then try a
null-modem cable. If that does not work, then try a standard cable.
324
Chapter 14. Serial Communications
Also, the serial port on both the terminal and your FreeBSD system must have connectors that will fit the
cable you are using.
Null-modem cables
A null-modem cable passes some signals straight through, like signal ground, but switches other
signals. For example, the send data pin on one end goes to the receive data pin on the other end.
If you like making your own cables, here is a table showing a recommended way to construct a
null-modem cable for use with terminals. This table shows the RS-232C signal names and the pin
numbers on a DB-25 connector.
Note: For DCD to RTS, connect pins 4 to 5 internally in the connector hood, and then to pin 8 in the
remote hood.
Ports
Serial ports are the devices through which data is transferred between the FreeBSD host computer and
the terminal. This section describes the kinds of ports that exist and how they are addressed in FreeBSD.
325
Chapter 14. Serial Communications
Kinds of Ports
Several kinds of serial ports exist. Before you purchase or construct a cable, you need to make sure it
will fit the ports on your terminal and on the FreeBSD system.
Most terminals will have DB25 ports. Personal computers, including PCs running FreeBSD, will have
DB25 or DB9 ports. If you have a multiport serial card for your PC, you may have RJ-12 or RJ-45 ports.
See the documentation that accompanied the hardware for specifications on the kind of port in use. A
visual inspection of the port often works, too.
Port Names
In FreeBSD, you access each serial port through an entry in the /dev directory. There are two different
kinds of entries:
Callin ports are named /dev/ttydX where X is the port number, starting from zero. Generally, you
use the callin port for terminals. Callin ports require that the serial line assert the data carrier detect
(DCD) signal to work.
Callout ports are named /dev/cuaaX . You usually do not use the callout port for terminals, just for
modems. You may use the callout port if the serial cable or the terminal does not support the carrier
detect signal.
See the sio(4) manual page for more information.
If you have connected a terminal to the first serial port (COM1 in DOS parlance), then you want to use
/dev/ttyd0 to refer to the terminal. If it is on the second serial port (also known as COM2), it is
/dev/ttyd1, and so forth.
Note that you may have to configure your kernel to support each serial port, especially if you have a
multiport serial card. See Configuring the FreeBSD Kernel for more information.
Configuration
This section describes what you need to configure on your FreeBSD system to enable a login session on
a terminal. It assumes you have already configured your kernel to support the serial port to which the
terminal is connectedand that you have connected it.
In a nutshell, you need to tell the init process, which is responsible for process control and
initialization, to start a getty process, which is responsible for reading a login name and starting the
login program.
326
Chapter 14. Serial Communications
To do so, you have to edit the /etc/ttys file. First, use the su command to become root. Then, make
the following changes to /etc/ttys:
1. Add an line to /etc/ttys for the entry in the /dev directory for the serial port if it is not already
there.
2. Specify that /usr/libexec/getty be run on the port, and specify the appropriate getty type
from the /etc/gettytab file.
3. Specify the default terminal type.
4. Set the port to on.
5. Specify whether the port should be secure.
6. Force init to reread the /etc/ttys file.
As an optional step, you may wish to create a custom getty type for use in step 2 by making an entry
in /etc/gettytab. This document does not explain how to do so; you are encouraged to see the
gettytab(5) and the getty(8) manual pages for more information.
The remaining sections detail how to do these steps. We will use a running example throughout these
sections to illustrate what we need to do. In our example, we will connect two terminals to the system: a
Wyse-50 and a old 286 IBM PC running Procomm terminal software emulating a VT-100 terminal. We
connect the Wyse to the second serial port and the 286 to the sixth serial port (a port on a multiport serial
card).
For more information on the /etc/ttys file, see the ttys(5) manual page.
327
Chapter 14. Serial Communications
ttyd5
Note that the second fieldwhere we specify what program to runappears in quotes. This is
important, otherwise the type argument to getty might be interpreted as the next field.
328
Chapter 14. Serial Communications
In our example, the Wyse-50 is a Wyse-50 type of terminal (although it can emulate others, we will leave
it in Wyse-50 mode). The 286 PC is running Procomm which will be set to emulate a VT-100. Here are
the pertinent yet unfinished entries from the /etc/ttys file:
So, naturally, you want an on in this field. Here again is the /etc/ttys file. We have turned each port
on.
By marking a port as secure, the terminal will allow root in. People who know the root password will
just login as root. You will not have the potentially useful login and su command records.
Which should you use?
329
Chapter 14. Serial Communications
Just use insecure. Use insecure even for terminals not in public user areas or behind locked doors. It
is quite easy to login and use su if you need superuser privileges.
Here finally are the completed entries in the /etc/ttys file, with comments added to describe where
the terminals are:
# kill -HUP 1
330
Chapter 14. Serial Communications
Make sure that a getty process is running and serving the terminal. Type
#
ps -axww|grep getty
to get a list of running getty processes. You should see an entry for the terminal. For example, the
display
22189 d1 Is+ 0:00.03 /usr/libexec/getty std.38400 ttyd1
shows that a getty is running on the second serial port ttyd1 and is using the std.38400 entry in
/etc/gettytab.
If no getty process is running, make sure you have enabled the port in /etc/ttys. Make sure you
have run kill -HUP 1.
Dialin Service
Contributed by Guy Helmer <[email protected]>.
This document provides suggestions for configuring a FreeBSD system to handle dialup modems. This
document is written based on the authors experience with FreeBSD versions 1.0, 1.1, and 1.1.5.1 (and
experience with dialup modems on other UNIX-like operating systems); however, this document may
not answer all of your questions or provide examples specific enough to your environment. The author
cannot be responsible if you damage your system or lose data due to attempting to follow the suggestions
here.
Prerequisites
To begin with, the author assumes you have some basic knowledge of FreeBSD. You need to have
FreeBSD installed, know how to edit files in a UNIX-like environment, and how to look up manual
331
Chapter 14. Serial Communications
pages on the system. As discussed below, you will need certain versions of FreeBSD, and knowledge of
some terminology & modem and cabling.
FreeBSD Version
First, it is assumed that you are using FreeBSD version 1.1 or higher (including versions 2.x). FreeBSD
version 1.0 included two different serial drivers, which complicates the situation. Also, the serial device
driver (sio) has improved in every release of FreeBSD, so more recent versions of FreeBSD are
assumed to have better and more efficient drivers than earlier versions.
Terminology
A quick rundown of terminology:
bps
Bits per Second the rate at which data is transmitted
DTE
Data Terminal Equipment for example, your computer
DCE
Data Communications Equipment your modem
RS-232
EIA standard for serial communications via hardware
If you need more information about these terms and data communications in general, the author
remembers reading that The RS-232 Bible (anybody have an ISBN?) is a good reference.
When talking about communications data rates, the author does not use the term baud. Baud refers to
the number of electrical state transitions that may be made in a period of time, while bps (bits per
second) is the correct term to use (at least it does not seem to bother the curmudgeons quite a much).
332
Chapter 14. Serial Communications
lighted indicators that display the state of important RS-232 signals. Blinking lights impress visitors, but
lights are also very useful to see whether a modem is operating properly.
Internal modems usually lack non-volatile RAM, so their configuration may be limited only to setting
DIP switches. If your internal modem has any signal indicator lights, it is probably difficult to view the
lights when the systems cover is in place.
You know how to connect your modem to your computer so that the two can communicate (unless you
have an internal modem, which does not need such a cable)
You are familiar with your modems command set, or know where to look up needed commands
You know how to configure your modem (probably via a terminal communications program) so you
can set the non-volatile RAM parameters
The first, connecting your modem, is usually simple most straight-through serial cables work without
any problems. You need to have a cable with appropriate connectors (DB-25 or DB-9, male or female)
on each end, and the cable must be a DCE-to-DTE cable with these signals wired:
333
Chapter 14. Serial Communications
commands for USR Sportster 14,400 external modems will be given, which you may be able to use as a
reference for your own modems commands.
Lastly, you will need to know how to setup your modem so that it will work well with FreeBSD. Like
other UNIX-like operating systems, FreeBSD uses the hardware signals to find out when a call has been
answered or a line has been hung up and to hangup and reset the modem after a call. FreeBSD avoids
sending commands to the modem or watching for status reports from the modem. If you are familiar
with connecting modems to PC-based bulletin board systems, this may seem awkward.
Quick Overview
Here is the process that FreeBSD follows to accept dialup logins. A getty process, spawned by init,
patiently waits to open the assigned serial port (/dev/ttyd0, for our example). The command ps ax
might show this:
When a user dials the modems line and the modems connect, the CD line is asserted by the modem. The
kernel notices that carrier has been detected and completes gettys open of the port. getty sends a
login: prompt at the specified initial line speed. getty watches to see if legitimate characters are
received, and, in a typical configuration, if it finds junk (probably due to the modems connection speed
being different than gettys speed), getty tries adjusting the line speeds until it receives reasonable
characters.
We hope getty finds the correct speed and the user sees a login: prompt. After the user enters his/her
login name, getty executes /usr/bin/login, which completes the login by asking for the users
password and then starting the users shell.
Lets dive into the configuration...
334
Chapter 14. Serial Communications
Kernel Configuration
FreeBSD kernels typically come prepared to search for four serial ports, known in the PC-DOS world as
COM1:, COM2:, COM3:, and COM4:. FreeBSD can presently also handle dumb multiport serial
interface cards, such as the Boca Board 1008 and 2016 (please see the manual page sio(4) for kernel
configuration information if you have a multiport serial card). The default kernel only looks for the
standard COM ports, though.
To see if your kernel recognizes any of your serial ports, watch for messages while the kernel is booting,
or use the /sbin/dmesg command to replay the kernels boot messages. In particular, look for messages
that start with the characters sio. Hint: to view just the messages that have the word sio, use the
command:
For example, on a system with four serial ports, these are the serial-port specific kernel boot messages:
If your kernel does not recognize all of your serial ports, you will probably need to configure a custom
FreeBSD kernel for your system.
Please see the BSD System Managers Manual chapter on Building Berkeley Kernels with Config [the
source for which is in /usr/src/share/doc/smm] and FreeBSD Configuration Options [in
/sys/conf/options and in /sys/arch/conf/options.arch, with arch for example being i386]
for more information on configuring and building kernels. You may have to unpack the kernel source
distribution if have not installed the system sources already (srcdist/srcsys.?? in FreeBSD 1.1,
srcdist/sys.?? in FreeBSD 1.1.5.1, or the entire source distribution in FreeBSD 2.0) to be able to
configure and build kernels.
Create a kernel configuration file for your system (if you have not already) by cding to
/sys/i386/conf. Then, if you are creating a new custom configuration file, copy the file GENERICAH
(or GENERICBT, if you have a BusTek SCSI controller on FreeBSD 1.x) to YOURSYS, where YOURSYS is
the name of your system, but in upper-case letters. Edit the file, and change the device lines:
335
Chapter 14. Serial Communications
You can comment-out or completely remove lines for devices you do not have. If you have a multiport
serial board, such as the Boca Board BB2016, please see the sio(4) man page for complete information
on how to write configuration lines for multiport boards. Be careful if you are using a configuration file
that was previously used for a different version of FreeBSD because the device flags have changed
between versions.
Note: port "IO_COM1" is a substitution for port 0x3f8, IO_COM2 is 0x2f8, IO_COM3 is 0x3e8, and
IO_COM4 is 0x2e8, which are fairly common port addresses for their respective serial ports; interrupts
4, 3, 5, and 9 are fairly common interrupt request lines. Also note that regular serial ports cannot
share interrupts on ISA-bus PCs (multiport boards have on-board electronics that allow all the
16550As on the board to share one or two interrupt request lines).
When you are finished adjusting the kernel configuration file, use the program config as documented in
Building Berkeley Kernels with Config and the config(8) manual page to prepare a kernel building
directory, then build, install, and test the new kernel.
MAKEDEV not only creates the /dev/ttyd? device special files, but also creates the /dev/cua0? (and
all of the initializing and locking special files under FreeBSD 1.1.5 and up) and removes the hardwired
336
Chapter 14. Serial Communications
These permissions allow the user uucp and users in the group dialer to use the call-out devices.
Configuration Files
There are three system configuration files in the /etc directory that you will probably need to edit to
allow dialup access to your FreeBSD system. The first, /etc/gettytab, contains configuration
information for the /usr/libexec/getty daemon. Second, /etc/ttys holds information that tells
/sbin/init what tty devices should have getty processes running on them. Lastly, you can place
port initialization commands in the /etc/rc.serial script if you have FreeBSD 1.1.5.1 or higher;
otherwise, you can initialize ports in the /etc/rc.local script.
There are two schools of thought regarding dialup modems on UNIX. One group likes to configure their
modems and system so that no matter at what speed a remote user dials in, the local computer-to-modem
RS-232 interface runs at a locked speed. The benefit of this configuration is that the remote user always
sees a system login prompt immediately. The downside is that the system does not know what a users
true data rate is, so full-screen programs like Emacs will not adjust their screen-painting methods to
make their response better for slower connections.
The other school configures their modems RS-232 interface to vary its speed based on the remote users
connection speed. For example, V.32bis (14.4 Kbps) connections to the modem might make the modem
run its RS-232 interface at 19.2 Kbps, while 2400 bps connections make the modems RS-232 interface
run at 2400 bps. Because getty does not understand any particular modems connection speed
reporting, getty gives a login: message at an initial speed and watches the characters that come back
in response. If the user sees junk, it is assumed that they know they should press the <Enter> key until
they see a recognizable prompt. If the data rates do not match, getty sees anything the user types as
junk, tries going to the next speed and gives the login: prompt again. This procedure can continue ad
nauseum, but normally only takes a keystroke or two before the user sees a good prompt. Obviously, this
login sequence does not look as clean as the former locked-speed method, but a user on a low-speed
connection should receive better interactive response from full-screen programs.
337
Chapter 14. Serial Communications
The author will try to give balanced configuration information, but is biased towards having the modems
data rate follow the connection rate.
/etc/gettytab
/etc/gettytab is a termcap(5)-style file of configuration information for getty(8). Please see the
gettytab(5) manual page for complete information on the format of the file and the list of capabilities.
Locked-Speed Config
If you are locking your modems data communications rate at a particular speed, you probably will not
need to make any changes to /etc/gettytab.
Matching-Speed Config
You will need to setup an entry in /etc/gettytab to give getty information about the speeds you
wish to use for your modem. If you have a 2400 bps modem, you can probably use the existing D2400
entry. This entry already exists in the FreeBSD 1.1.5.1 gettytab file, so you do not need to add it
unless it is missing under your version of FreeBSD:
#
# Fast dialup terminals, 2400/1200/300 rotary (can start either way)
#
D2400|d2400|Fast-Dial-2400:\
:nx=D1200:tc=2400-baud:
3|D1200|Fast-Dial-1200:\
:nx=D300:tc=1200-baud:
5|D300|Fast-Dial-300:\
:nx=D2400:tc=300-baud:
If you have a higher speed modem, you will probably need to add an entry in /etc/gettytab; here is
an entry you could use for a 14.4 Kbps modem with a top interface speed of 19.2 Kbps:
#
# Additions for a V.32bis Modem
#
um|V300|High Speed Modem at 300,8-bit:\
:nx=V19200:tc=std.300:
un|V1200|High Speed Modem at 1200,8-bit:\
:nx=V300:tc=std.1200:
uo|V2400|High Speed Modem at 2400,8-bit:\
:nx=V1200:tc=std.2400:
up|V9600|High Speed Modem at 9600,8-bit:\
338
Chapter 14. Serial Communications
:nx=V2400:tc=std.9600:
uq|V19200|High Speed Modem at 19200,8-bit:\
:nx=V9600:tc=std.19200:
On FreeBSD 1.1.5 and later, this will result in 8-bit, no parity connections. Under FreeBSD 1.1, add
:np: parameters to the std.xxx entries at the top of the file for 8 bits, no parity; otherwise, the default
is 7 bits, even parity.
The example above starts the communications rate at 19.2 Kbps (for a V.32bis connection), then cycles
through 9600 bps (for V.32), 2400 bps, 1200 bps, 300 bps, and back to 19.2 Kbps. Communications rate
cycling is implemented with the nx= (next table) capability. Each of the lines uses a tc= (table
continuation) entry to pick up the rest of the standard settings for a particular data rate.
If you have a 28.8 Kbps modem and/or you want to take advantage of compression on a 14.4 Kbps
modem, you need to use a higher communications rate than 19.2 Kbps. Here is an example of a
gettytab entry starting a 57.6 Kbps:
#
# Additions for a V.32bis or V.34 Modem
# Starting at 57.6 Kbps
#
vm|VH300|Very High Speed Modem at 300,8-bit:\
:nx=VH57600:tc=std.300:
vn|VH1200|Very High Speed Modem at 1200,8-bit:\
:nx=VH300:tc=std.1200:
vo|VH2400|Very High Speed Modem at 2400,8-bit:\
:nx=VH1200:tc=std.2400:
vp|VH9600|Very High Speed Modem at 9600,8-bit:\
:nx=VH2400:tc=std.9600:
vq|VH57600|Very High Speed Modem at 57600,8-bit:\
:nx=VH9600:tc=std.57600:
If you have a slow CPU or a heavily loaded system and you do not have 16550A-based serial ports, you
may receive sio silo errors at 57.6 Kbps.
/etc/ttys
/etc/ttys is the list of ttys for init to monitor. /etc/ttys also provides security information to
login (user root may only login on ttys marked secure). See the manual page for ttys(5) for more
information.
339
Chapter 14. Serial Communications
You will need to either modify existing lines in /etc/ttys or add new lines to make init run getty
processes automatically on your new dialup ports. The general format of the line will be the same,
whether you are using a locked-speed or matching-speed configuration:
The first item in the above line is the device special file for this entry ttyd0 means /dev/ttyd0 is
the file that this getty will be watching. The second item, "/usr/libexec/getty xxx" (xxx will
be replaced by the initial gettytab capability) is the process init will run on the device. The third
item, dialup, is the default terminal type. The fourth parameter, on, indicates to init that the line is
operational. There can be a fifth parameter, secure, but it should only be used for terminals which are
physically secure (such as the system console).
The default terminal type (dialup in the example above) may depend on local preferences. dialup is
the traditional default terminal type on dialup lines so that users may customize their login scripts to
notice when the terminal is dialup and automatically adjust their terminal type. However, the author
finds it easier at his site to specify vt102 as the default terminal type, since the users just use VT102
emulation on their remote systems.
After you have made changes to /etc/ttys, you may send the init process a HUP signal to re-read
the file. You can use the command
# kill -1
1
to send the signal. If this is your first time setting up the system, though, you may want to wait until your
modem(s) are properly configured and connected before signaling init.
Locked-Speed Config
For a locked-speed configuration, your ttys entry needs to have a fixed-speed entry provided to getty.
For a modem whose port speed is locked at 19.2 Kbps, the ttys entry might look like this:
If your modem is locked at a different data rate, substitute the appropriate name for the std.speed
entry for std.19200 from /etc/gettytab for your modems data rate.
Matching-Speed Config
In a matching-speed configuration, your ttys entry needs to reference the appropriate beginning
auto-baud (sic) entry in /etc/gettytab. For example, if you added the above suggested entry for a
340
Chapter 14. Serial Communications
matching-speed modem that starts at 19.2 Kbps (the gettytab entry containing the V19200 starting
point), your ttys entry might look like this:
/etc/rc.serial or /etc/rc.local
High-speed modems, like V.32, V.32bis, and V.34 modems, need to use hardware (RTS/CTS) flow
control. You can add stty commands to /etc/rc.serial on FreeBSD 1.1.5.1 and up, or
/etc/rc.local on FreeBSD 1.1, to set the hardware flow control flag in the FreeBSD kernel for the
modem ports.
For example, on a sample FreeBSD 1.1.5.1 system, /etc/rc.serial reads:
#!/bin/sh
#
# Serial port initial configuration
This sets the termios flag crtscts on serial port #1s (COM2:) dialin and dialout initialization devices.
On an old FreeBSD 1.1 system, these entries were added to /etc/rc.local to set the crtscts flag on
the devices:
Since there is no initialization device special file on FreeBSD 1.1, one has to just set the flags on the sole
device special file and hope the flags are not cleared by a miscreant.
Modem Settings
If you have a modem whose parameters may be permanently set in non-volatile RAM, you will need to
use a terminal program (such as Telix under PC-DOS or tip under FreeBSD) to set the parameters.
341
Chapter 14. Serial Communications
Connect to the modem using the same communications speed as the initial speed getty will use and
configure the modems non-volatile RAM to match these requirements:
ATZ
AT&C1&D2&H1&I0&R2&W
You might also want to take this opportunity to adjust other settings in the modem, such as whether it
will use V.42bis and/or MNP5 compression.
The USR Sportster 14,400 external modem also has some DIP switches that need to be set; for other
modems, perhaps you can use these settings as an example:
342
Chapter 14. Serial Communications
the command or returns a result code. I have heard this sequence can result in a extended, silly
conversation between getty and the modem.
Locked-speed Config
For a locked-speed configuration, you will need to configure the modem to maintain a constant
modem-to-computer data rate independent of the communications rate. On a USR Sportster 14,400
external modem, these commands will lock the modem-to-computer data rate at the speed used to issue
the commands:
ATZ
AT&B1&W
Matching-speed Config
For a variable-speed configuration, you will need to configure your modem to adjust its serial port data
rate to match the incoming call rate. On a USR Sportster 14,400 external modem, these commands will
lock the modems error-corrected data rate to the speed used to issue the commands, but allow the serial
port rate to vary for non-error-corrected connections:
ATZ
AT&B2&W
Troubleshooting
Here are a few steps you can follow to check out the dialup modem on your system.
343
Chapter 14. Serial Communications
and the modem has not accepted a call yet, this means that getty has completed its open on the
communications port. This could indicate a problem with the cabling or a mis-configured modem,
because getty should not be able to open the communications port until CD (carrier detect) has been
asserted by the modem.
If you do not see any getty processes waiting to open the desired ttyd? port, double-check your
entries in /etc/ttys to see if there are any mistakes there. Also, check the log file
/var/log/messages to see if there are any log messages from init or getty regarding any problems.
If there are any messages, triple-check the configuration files /etc/ttys and /etc/gettytab, as well
as the appropriate device special files /dev/ttyd?, for any mistakes, missing entries, or missing device
special files.
Try Dialing In
Try dialing into the system; be sure to use 8 bits, no parity, 1 stop bit on the remote system. If you do not
get a prompt right away, or get garbage, try pressing <Enter> about once per second. If you still do not
see a login: prompt after a while, try sending a BREAK. If you are using a high-speed modem to do the
dialing, try dialing again after locking the dialing modems interface speed (via AT&B1 on a USR
Sportster, for example).
If you still cannot get a login: prompt, check /etc/gettytab again and double-check that
The initial capability name specified in /etc/ttys for the line matches a name of a capability in
/etc/gettytab
344
Chapter 14. Serial Communications
Acknowledgments
Thanks to these people for comments and advice:
Dialout Service
Information integrated from FAQ.
The following are tips to getting your host to be able to connect over the modem to another computer.
This is appropriate for establishing a terminal session with a remote host.
This is useful to log onto a BBS.
This kind of connection can be extremely helpful to get a file on the Internet if you have problems with
PPP. If you need to ftp something and PPP is broken, use the terminal session to ftp it. Then use zmodem
to transfer it to your machine.
345
Chapter 14. Serial Communications
You do not have to run this command for cu, since cu is just a hard link to tip.
The Hayes driver is not smart enough to recognize some of the advanced features of newer
modemsmessages like BUSY, NO DIALTONE, or CONNECT 115200 will just confuse it. You should
turn those messages off when you use tip (using ATX0&W).
Also, the dial timeout for tip is 60 seconds. Your modem should use something less, or else tip will
think there is a communication problem. Try ATS7=45&W.
Actually, as shipped tip does not yet support it fully. The solution is to edit the file tipconf.h in the
directory /usr/src/usr.bin/tip/tip Obviously you need the source distribution to do this.
Edit the line #define HAYES 0 to #define HAYES 1. Then make and make install. Everything
works nicely after that.
cuaa0:dv=/dev/cuaa0:br#19200:pa=none
Use the highest bps rate your modem supports in the br capability. Then, type tip cuaa0 and you will
be connected to your modem.
If there is no /dev/cuaa0 on your system, do this:
# cd /dev
# MAKEDEV cuaa0
# cu -lline -sspeed
line is the serial port (e.g./dev/cuaa0) and speed is the speed (e.g.57600). When you are done
entering the AT commands hit ~. to exit.
346
Chapter 14. Serial Communications
pn=\@
and type:
# cu 5551234 -s 115200
347
Chapter 14. Serial Communications
pain|pain.deep13.com|Forresters machine:\
:cm=CONNECT pain\n:tc=deep13:
muffin|muffin.deep13.com|Franks machine:\
:cm=CONNECT muffin\n:tc=deep13:
deep13:Gizmonics Institute terminal server:\
:dv=/dev/cua02:br#38400:at=hayes:du:pa=none:pn=5551234:
will let you type tip pain or tip muffin to connect to the hosts pain or muffin; and tip deep13 to
get to the terminal server.
Can tip try more than one line for each site?
This is often a problem where a university has several modem lines and several thousand students trying
to use them...
Make an entry for your university in /etc/remote and use @ for the pn capability:
big-university:\
:pn=\@:tc=dialout
dialout:\
:dv=/dev/cuaa3:br#9600:at=courier:du:pa=none:
big-university 5551111
big-university 5551112
big-university 5551113
big-university 5551114
tip will try each one in the listed order, then give up. If you want to keep retrying, run tip in a while
loop.
348
Chapter 14. Serial Communications
You can have the force character be whatever you want by specifying the following in your
$HOME/.tiprc file:
force=<single-char>
force=^^
raisechar=^^
The ^^ is SHIFT+CTRL+6.
~p local-file [remote-file]
~t remote-file [local-file]
There is no error checking, so you probably should use another protocol, like zmodem.
349
Chapter 14. Serial Communications
Introduction
The FreeBSD/i386 operating system can boot on a system with only a dumb terminal on a serial port as a
console. Such a configuration should be useful for two classes of people; system administrators who
wish to install FreeBSD on a dedicated file/compute/terminal server machines that have no keyboard or
monitor attached, and developers who want to debug the kernel or device drivers.
Starting from version 3.1, FreeBSD/i386 employs a three stage bootstrap. The first two stages are in the
boot block code which is stored at the beginning of the FreeBSD slice on the boot disk. The boot block
will then load and run the boot loader (/boot/loader) as the third stage code. (See boot(8) and
loader(8) for more details on the boot process.)
In order to set up the serial console you must configure the boot block code, the boot loader code and the
kernel.
In FreeBSD version 3.0, the boot loader does not exist and there are only two stages in the bootstrap; the
boot blocks directly load the kernel into memory. If you are using FreeBSD 3.0, then you should
disregard any reference to the boot loader in this section. You can still use the serial port as a console.
FreeBSD versions 2.X are quite different from 3.X, in that the serial port driver, sio(4), must be
configured in a different way. This chapter will not describe the settings for version 2.X systems. If you
are using these older versions of FreeBSD, please consult
/sys/i386/boot/biosboot/README.serial instead.
350
Chapter 14. Serial Communications
If your computer complains about the error, but boots anyway, then you do not have to do anything
special. (One machine with a Phoenix BIOS that I have here merely says Keyboard failed then
continues to boot normally.)
If your computer refuses to boot without a keyboard attached then you will have to configure the
BIOS so that it ignores this error (if it can). Consult your motherboards manual for details on how
to do this.
Tip: Setting the keyboard to Not installed in the BIOS setup does not mean that you will not be
able to use your keyboard. All this does is tell the BIOS not to probe for a keyboard at power-on
so that it will not complain if the keyboard is not plugged in. You can leave the keyboard plugged
in even with this flag set to Not installed and the keyboard will still work.
Note: If your system has a PS/2 mouse, chances are very good that you may have to unplug
your mouse as well as your keyboard. This is because PS/2 mice share some hardware with the
keyboard, and leaving the mouse plugged in can fool the keyboard probe into thinking the
keyboard is still there. It is said that a Gateway 2000 Pentium 90Mhz system with an AMI BIOS
that behaves this way. In general this is not a problem since the mouse is not much good without
the keyboard anyway.
0x10
Enables console support for this unit. The other console flags are ignored unless this is set.
Currently, at most one unit can have console support; the first one (in config file order) with this
flag set is preferred. This option alone will not make the serial port the console. Set the
following flag or use the -h option described below, together with this flag.
351
Chapter 14. Serial Communications
0x20
Forces this unit to be the console (unless there is another higher priority console), regardless of
the -h option discussed below. This flag replaces the COMCONSOLE option in FreeBSD versions
2.X. The flag 0x20 must be used together with the 0x10 flag.
0x40
Reserves this unit (in conjunction with 0x10) and makes the unit unavailable for normal access.
You should not set this flag to the serial port unit which you want to use as the serial console.
The only use of this flag is to designate the unit for kernel remote debugging. See Chapter 22
for more information on remote debugging.
Note: In FreeBSD 4.0-CURRENT or later the semantics of the flag 0x40 are slightly
different and there is another flag to specify a serial port for remote debugging.
Example:
device sio0 at isa? port "IO_COM1" tty flags 0x10 irq 4
-h
Toggles internal and serial consoles. You can use this to switch console devices. For instance, if
you boot from the internal (video) console, you can use -h to direct the boot loader and the
kernel to use the serial port as its console device. Alternatively, if you boot from the serial port,
you can use the -h to tell the boot loader and the kernel to use the video display as the console
instead.
-D
Toggles single and dual console configurations. In the single configuration the console will be
either the internal console (video display) or the serial port, depending on the state of the -h
option above. In the dual console configuration, both the video display and the serial port will
become the console at the same time, regardless of the state of the -h option. However, that the
352
Chapter 14. Serial Communications
dual console configuration takes effect only during the boot block is running. Once the boot
loader gets control, the console specified by the -h option becomes the only console.
-P
Makes the boot block probe the keyboard. If no keyboard is found, the -D and -h options are
automatically set.
Note: Due to space constraints in the current version of the boot blocks, the -P option is
capable of detecting extended keyboards only. Keyboards with less than 101 keys (and
without F11 and F12 keys) may not be detected. Keyboards on some laptop computers
may not be properly found because of this limitation. If this is to be the case with your
system, you have to abandon using the -P option. Unfortunately there is no workaround for
this problem.
Use either the -P option to select the console automatically, or the -h option to activate the serial
console.
You may include other options described in boot(8) as well.
The options, except for -P, will be passed to the boot loader (/boot/loader). The boot loader will
determine which of the internal video or the serial port should become the console by examining the
state of the -h option alone. This means that if you specify the -D option but not the -h option in
/boot.config, you can use the serial port as the console only during the boot block; the boot
loader will use the internal video display as the console.
6. Boot the machine.
When you start your FreeBSD box, the boot blocks will echo the contents of /boot.config to the
console. For example;
/boot.config: -P
Keyboard: no
The second line appears only if you put -P in /boot.config and indicates presence/absence of the
keyboard. These messages go to either serial or internal console, or both, depending on the option in
/boot.config.
353
Chapter 14. Serial Communications
After the above messages, there will be a small pause before the boot blocks continue loading the
boot loader and before any further messages printed to the console. Under normal circumstances,
you do not need to interrupt the boot blocks, but you may want to do so in order to make sure things
are set up correctly.
Hit any key, other than Enter/Return, at the console to interrupt the boot process. The boot blocks
will then prompt you for further action. You should now see something like:
FreeBSD/i386 BOOT
Default: 0:wd(0,a)/boot/loader
boot:
Verify the above message appears on either the serial or internal console or both, according to the
options you put in /boot.config. If the message appears in the correct console, hit Enter/Return
to continue the boot process.
If you want the serial console but you do not see the prompt on the serial terminal, something is
wrong with your settings. In the meantime, you enter -h and hit Enter/Return (if possible) to tell the
boot block (and then the boot loader and the kernel) to choose the serial port for the console. Once
the system is up, go back and check what went wrong.
After the boot loader is loaded and you are in the third stage of the boot process you can still switch
between the internal console and the serial console by setting appropriate environment variables in the
boot loader. See the section called Changing Console from the Boot Loader.
Summary
Here is the summary of various settings discussed in this section and the console eventually selected.
354
Chapter 14. Serial Communications
BOOT_COMCONSOLE_SPEED=19200
If the serial console is configured in some other way than by booting with -h, or if the serial console
used by the kernel is different from the one used by the boot blocks, then you must also add the
following option to the kernel configuration file and compile a new kernel:
options CONSPEED=19200
355
Chapter 14. Serial Communications
or
device sio1 at isa? port "IO_COM2" tty flags 0x30 irq 3
The console flags for the other serial ports should not be set.
4. Recompile and install the boot blocks:
# cd /sys/boot/i386/boot2
# make
# make install
options BREAK_TO_DEBUGGER
options DDB
356
Chapter 14. Serial Communications
ttyd0 through ttyd3 corresponds to COM1 through COM4. Change off to on for the desired port. If you
have changed the speed of the serial port, you need to change std.9600 to match the current setting,
e.g. std.19200.
You may also want to change the terminal type from unknown to the actual type of your serial terminal.
After editing the file, you must kill -HUP 1 to make this change take effect.
set console=comconsole
This will take effect regardless of the settings in the boot block discussed in the previous section.
You had better put the above line as the first line of /boot/loader.rc so as to see boot messages on
the serial console as early as possible.
Likewise, you can specify the internal console as:
set console=vidconsole
357
Chapter 14. Serial Communications
If you do not set the boot loader environment variable console, the boot loader, and subsequently the
kernel, will use whichever console indicated by the -h option in the boot block.
In versions 3.2 or later, you may specify the console in /boot/loader.conf.local or
/boot/loader.conf, rather than in /boot/loader.rc. In this method your /boot/loader.rc
should look like:
include /boot/loader.4th
start
console=comconsole
or
console=vidconsole
Note: At the moment, the boot loader has no option equivalent to the -P option in the boot block, and
there is no provision to automatically select the internal console and the serial console based on the
presence of the keyboard.
Caveats
The idea here is to allow people to set up dedicated servers that require no graphics hardware or attached
keyboards. Unfortunately, while (most?) every system will let you boot without a keyboard, there are
quite a few that will not let you boot without a graphics adapter. Machines with AMI BIOSes can be
configured to boot with no graphics adapter installed simply by changing the graphics adapter setting in
the CMOS configuration to Not installed.
However, many machines do not support this option and will refuse to boot if you have no display
hardware in the system. With these machines, youll have to leave some kind of graphics card plugged
358
Chapter 14. Serial Communications
in, (even if its just a junky mono board) although you will not have to attach a monitor into it. You might
also try installing an AMI BIOS.
359
Chapter 15. PPP and SLIP
If your connection to the Internet is through a modem, or you wish to provide other people with dialup
connections to the Internet using FreeBSD, you have the option of using PPP or SLIP. Furthermore, two
varieties of PPP are provided: user (sometimes referred to as iijppp) and kernel. The procedures for
configuring both types of PPP, and for setting up SLIP are described in this chapter.
This is a user process PPP software package. Normally, PPP is implemented as a part of the kernel (e.g. as
managed by pppd) and it is thus somewhat hard to debug and/or modify its behavior. However, in this
implementation PPP is done as a user process with the help of the tunnel device driver (tun).
In essence, this means that rather than running a PPP daemon, the ppp program can be run as and when
desired. No PPP interface needs to be compiled into the kernel, as the program can use the generic tunnel
device to get data into and out of the kernel.
From here on out, user ppp will be referred to simply as ppp unless a distinction needs to be made
between it and any other PPP client/server software such as pppd. Unless otherwise stated, all
commands in this section should be executed as root.
There are a large number of enhancements in version 2 of ppp. You can discover what version you have
by running ppp with no arguments and typing show version at the prompt. It is a simple matter to
upgrade to the latest version of ppp (under any version of FreeBSD) by downloading the latest archive
via www.Awfulhak.org (http://www.Awfulhak.org/ppp.html).
360
Chapter 15. PPP and SLIP
Your login name and password. This can be either a regular unix style login/password pair, or a PPP
PAP or CHAP login/password pair.
The IP addresses of one or more nameservers. Normally, you will be given two IP numbers. You must
have this information for PPP version 1.x unless you run your own nameserver. From version 2
onwards, PPP supports nameserver address negotiation. If your ISP supports this, then using the
command enable dns in your config file will tell PPP to set the nameservers for you.
The following information may have been supplied by your ISP, but is not strictly necessary:
The IP address of your ISPs gateway. The gateway is the machine to which you will connect and will
be set up as your default route. If your ISP hasnt given you this number, we can make one up and
your ISPs PPP server will tell us the correct value when we connect.
This IP number is referred to as HISADDR by ppp.
Your ISPs netmask. If your ISP hasnt given you this information, you can safely use a netmask of
255.255.255.0.
If your ISP allocates you a static IP address and hostname then you can enter this information.
Otherwise, we simply let the peer assign whatever IP number it sees fit.
If you do not have any of the required information, contact your ISP and make sure they provide it to you.
pseudo-device tun 1
in it somewhere. The stock GENERIC kernel has this as standard, so if you have not installed a custom
kernel or you do not have a /sys directory, you do not have to change anything.
If your kernel configuration file does not have this line in it, or you need to configure more than one tun
device (for example, if you are setting up a server and could have 16 dialup ppp connections at any one
time then you will need to use 16 instead of 1), then you should add the line, re-compile, re-install and
boot the new kernel. Please refer to the Configuring the FreeBSD Kernel section for more information on
kernel configuration.
You can check how many tunnel devices your current kernel has by typing the following:
361
Chapter 15. PPP and SLIP
# ifconfig -a
tun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
inet 200.10.100.1 -> 203.10.100.24 netmask 0xffffffff
tun1: flags=8050<POINTOPOINT,RUNNING,MULTICAST> mtu 576
tun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
inet 203.10.100.1 -> 203.10.100.20 netmask 0xffffffff
tun3: flags=8010<POINTOPOINT,MULTICAST> mtu 1500
This case shows four tunnel devices, two of which are currently configured and being used. It should be
noted that the RUNNING flag above indicates that the interface has been used at some pointit is not an
error if your interface does not show up as RUNNING.
If you have a kernel without the tun device, and you can not rebuild it for some reason, all is not lost.
You should be able to dynamically load the code. Refer to the appropriate modload(8) and lkm(4) pages
for further details.
You may also wish to take this opportunity to configure a firewall. Details can be found in the Firewalls
section.
# cd /dev
# ./MAKEDEV tun0
If you require 16 tunnel devices in your kernel, you will need to create more than just tun0:
# cd /dev
# ./MAKEDEV tun15
Also, to confirm that the kernel is configured correctly, the following command should give the indicated
output:
# ifconfig tun0
tun0: flags=8050<POINTOPOINT,RUNNING,MULTICAST> mtu 1500
The RUNNING flag may not yet be set, in which case you will see:
362
Chapter 15. PPP and SLIP
# ifconfig tun0
tun0: flags=8010<POINTOPOINT,MULTICAST> mtu 1500
hosts
bind
These instructs the resolver to first look in the file /etc/hosts, and then to consult the DNS if the name
was not found.
127.0.0.1 localhost
10.0.0.1 foo.bar.com foo
The first line defines the alias localhost as a synonym for the current machine. Regardless of your
own IP address, the IP address for this line should always be 127.0.0.1. The second line maps the
name foo.bar.com (and the shorthand foo) to the IP address 10.0.0.1.
If your provider allocates you a static IP address and name, then use these in place of the 10.0.0.1
entry.
363
Chapter 15. PPP and SLIP
nameserver x.x.x.x
nameserver y.y.y.y
domain bar.com
The x.x.x.x and y.y.y.y addresses are those given to you by your ISP. Add as many nameserver
lines as your ISP provides. The domain line defaults to your hostnames domain, and is probably
unnecessary. Refer to the resolv.conf manual page for details of other possible entries in this file.
If you are running PPP version 2 or greater, the enable dns command will tell PPP to request that your
ISP confirms the nameserver values. If your ISP supplies different addresses (or if there are no
nameserver lines in /etc/resolv.conf), PPP will rewrite the file with the ISP-supplied values.
ppp Configuration
Both user ppp and pppd (the kernel level implementation of PPP) use configuration files located in the
/etc/ppp directory. The sample configuration files provided are a good reference for user ppp, so dont
delete them.
Configuring ppp requires that you edit a number of files, depending on your requirements. What you put
in them depends to some extent on whether your ISP allocates IP addresses statically (i.e., you get given
one IP address, and always use that one) or dynamically (i.e., your IP address can be different for each
PPP session).
Note: Lines that end in a : start in the first column, all other lines should be indented as shown
using spaces or tabs.
1 default:
2 set device /dev/cuaa0
3 set speed 115200
4 set dial "ABORT BUSY ABORT NO\\sCARRIER TIMEOUT 5 \"\" ATE1Q0 OK-AT-
OK \\dATDT\\TTIMEOUT 40 CONNECT"
364
Chapter 15. PPP and SLIP
5 provider:
6 set phone "(0123) 456 7890"
7 set login "TIMEOUT 10 \"\" \"\" gin:-gin: foo word: bar col: ppp"
8 set timeout 300
9 set ifaddr x.x.x.x y.y.y.y 255.255.255.0 0.0.0.0
10 add default HISADDR
11 enable dns
Do not include the line numbers, they are just for reference in this discussion.
Line 1:
Identifies the default entry. Commands in this entry are executed automatically when ppp is run.
Line 2:
Identifies the device to which the modem is connected. COM1: is /dev/cuaa0 and COM2: is
/dev/cuaa1.
Line 3:
Sets the speed you want to connect at. If 115200 doesnt work (it should with any reasonably new
modem), try 38400 instead.
Line 4:
The dial string. User PPP uses an expect-send syntax similar to the chat(8) program. Refer to the
manual page for information on the features of this language.
Line 5:
Identifies an entry for a provider called provider.
Line 6:
Sets the phone number for this provider. Multiple phone numbers may be specified using the : or |
character as a separator. The difference between these separators is described in ppp(8). To
summarize, if you want to rotate through the numbers, use the :. If you want to always attempt to
dial the first number first and only use the other numbers if the first number fails, use the |. Always
quote the entire set of phone numbers as shown.
365
Chapter 15. PPP and SLIP
Line 7:
The login string is of the same chat-like syntax as the dial string. In this example, the string works
for a service whose login session looks like this:
J. Random Provider
login: foo
password: bar
protocol: ppp
You will need to alter this script to suit your own needs. When you write this script for the first
time, you should enable chat logging to ensure that the conversation is going as expected.
If youre using PAP or CHAP, there will be no login at this point, so your login string can be left
blank. See PAP and CHAP authentication for further details.
Line 8:
Sets the default timeout (in seconds) for the connection. Here, the connection will be closed
automatically after 300 seconds of inactivity. If you never want to timeout, set this value to zero.
Line 9:
Sets the interface addresses. The string x.x.x.x should be replaced by the IP address that your
provider has allocated to you. The string y.y.y.y should be replaced by the IP address that your
ISP indicated for their gateway (the machine to which you connect). If your ISP hasnt given you a
gateway address, use 10.0.0.2/0. If you need to use a guessed address, make sure that you
create an entry in /etc/ppp/ppp.linkup as per the instructions for PPP and Dynamic IP
addresses. If this line is omitted, ppp cannot run in -auto or -dynamic mode.
Line 10:
Adds a default route to your ISPs gateway. The special word HISADDR is replaced with the gateway
address specified on line 9. It is important that this line appears after line 9, otherwise HISADDR will
not yet be initialized.
Line 11:
This line tells PPP to ask your ISP to confirm that your nameserver addresses are correct. If your
ISP supports this facility, PPP can then update /etc/resolv.conf with the correct nameserver
entries.
It is not necessary to add an entry to ppp.linkup when you have a static IP address as your routing
table entries are already correct before you connect. You may however wish to create an entry to invoke
programs after connection. This is explained later with the sendmail example.
366
Chapter 15. PPP and SLIP
Again, do not include the line numbers, they are just for reference in this discussion. Indentation of at
least one space is required.
Line 9:
The number after the / character is the number of bits of the address that ppp will insist on. You
may wish to use IP numbers more appropriate to your circumstances, but the above example will
always work.
The last argument (0.0.0.0) tells PPP to negotiate using address 0.0.0.0 rather than 10.0.0.1.
Do not use 0.0.0.0 as the first argument to set ifaddr as it prevents PPP from setting up an
initial route in -auto mode.
If you are running version 1.x of PPP, you will also need to create an entry in /etc/ppp/ppp.linkup.
ppp.linkup is used after a connection has been established. At this point, ppp will know what IP
addresses should really be used. The following entry will delete the existing bogus routes, and create
correct ones:
1 provider:
2 delete ALL
3 add 0 0 HISADDR
Line 1:
On establishing a connection, ppp will look for an entry in ppp.linkup according to the following
rules: First, try to match the same label as we used in ppp.conf. If that fails, look for an entry for
the IP number of our gateway. This entry is a four-octet IP style label. If we still havent found an
entry, look for the MYADDR entry.
367
Chapter 15. PPP and SLIP
Line 2:
This line tells ppp to delete all existing routes for the acquired tun interface (except the direct route
entry).
Line 3:
This line tells ppp to add a default route that points to HISADDR. HISADDR will be replaced with the
IP number of the gateway as negotiated in the IPCP.
Version 2 of PPP introduces sticky routes. Any add or delete lines that contain MYADDR or HISADDR
will be remembered, and any time the actual values of MYADDR or HISADDR change, the routes will be
re-applied. This removes the necessity of repeating these lines in ppp.linkup.
enable proxy
in your ppp.conf file. You should also confirm that the /etc/rc.conf file (this file used to be called
/etc/sysconfig) contains the following:
gateway=YES
Which getty?
Configuring FreeBSD for Dialup Services provides a good description on enabling dialup services using
getty.
An alternative to getty is mgetty (http://www.leo.org/~doering/mgetty/index.html), a smarter version of
getty designed with dialup lines in mind.
The advantages of using mgetty is that it actively talks to modems, meaning if port is turned off in
/etc/ttys then your modem wont answer the phone.
Later versions of mgetty (from 0.99beta onwards) also support the automatic detection of PPP streams,
allowing your clients script-less access to your server.
368
Chapter 15. PPP and SLIP
PPP permissions
ppp must normally be run as user id 0. If however you wish to allow ppp to run in server mode as a
normal user by executing ppp as described below, that user must be given permission to run ppp by
adding them to the network group in /etc/group.
You will also need to give them access to one or more sections of the configuration file using the allow
command:
If this command is used in the default section, it gives the specified users access to everything.
#!/bin/sh
IDENT=echo $0 | sed -e s/^.*-\(.*\)$/\1/
CALLEDAS="$IDENT"
TTY=tty
This script should be executable. Now make a symbolic link called ppp-dialup to this script using the
following commands:
# ln -s ppp-shell /etc/ppp/ppp-dialup
You should use this script as the shell for all your dialup ppp users. This is an example from
/etc/password for a dialup PPP user with username pchilds. (remember dont directly edit the
password file, use vipw)
369
Chapter 15. PPP and SLIP
Create a /home/ppp directory that is world readable containing the following 0 byte files
# ln -s /etc/ppp/ppp-shell /etc/ppp/ppp-fred
# ln -s /etc/ppp/ppp-shell /etc/ppp/ppp-sam
# ln -s /etc/ppp/ppp-shell /etc/ppp/ppp-mary
Each of these users dialup accounts should have their shell set to the symbolic link created above. (ie.
marys shell should be /etc/ppp/ppp-mary).
default:
set debug phase lcp chat
set timeout 0
ttyd0:
set ifaddr 203.14.100.1 203.14.100.20 255.255.255.255
enable proxy
ttyd1:
set ifaddr 203.14.100.1 203.14.100.21 255.255.255.255
enable proxy
The default: section is loaded for each session. For each dialup line enabled in /etc/ttys create an
entry similar to the one for ttyd0: above. Each line should get a unique IP address from your pool of IP
addresses for dynamic users.
370
Chapter 15. PPP and SLIP
fred:
set ifaddr 203.14.100.1 203.14.101.1 255.255.255.255
sam:
set ifaddr 203.14.100.1 203.14.102.1 255.255.255.255
mary:
set ifaddr 203.14.100.1 203.14.103.1 255.255.255.255
The file /etc/ppp/ppp.linkup should also contain routing information for each static IP user if
required. The line below would add a route for the 203.14.101.0 class C via the clients ppp link.
fred:
add 203.14.101.0 netmask 255.255.255.0 HISADDR
sam:
add 203.14.102.0 netmask 255.255.255.0 HISADDR
mary:
add 203.14.103.0 netmask 255.255.255.0 HISADDR
Configuring and compiling mgetty with the AUTO_PPP option enabled allows mgetty to detect the LCP
phase of PPP connections and automatically spawn off a ppp shell. However, since the default
login/password sequence does not occur it is necessary to authenticate users using either PAP or CHAP.
This section assumes the user has successfully configured, compiled, and installed a version of mgetty
with the AUTO_PPP option (v0.99beta or later)
Make sure your /usr/local/etc/mgetty+sendfax/login.config file has the following in it:
/AutoPPP/ - - /etc/ppp/ppp-pap-dialup
This will tell mgetty to run the ppp-pap-dialup script for detected PPP connections.
Create a file called /etc/ppp/ppp-pap-dialup containing the following (the file should be
executable):
371
Chapter 15. PPP and SLIP
#!/bin/sh
exec /usr/sbin/ppp -direct pap$IDENT
For each dialup line enabled in /etc/ttys create a corresponding entry in /etc/ppp/ppp.conf. This
will happily co-exist with the definitions we created above.
pap:
enable pap
set ifaddr 203.14.100.1 203.14.100.20-203.14.100.40
enable proxy
Each user logging in with this method will need to have a username/password in
/etc/ppp/ppp.secret file, or alternatively add the
enable passwdauth
MS extensions
It is possible to configure PPP to supply DNS and NetBIOS nameserver addresses on demand.
To enable these extensions with PPP version 1.x, the following lines might be added to the relevant
section of /etc/ppp/ppp.conf.
enable msext
set ns 203.14.100.1 203.14.100.2
set nbns 203.14.100.5
accept dns
set dns 203.14.100.1 203.14.100.2
set nbns 203.14.100.5
This will tell the clients the primary and secondary name server addresses, and a netbios nameserver host.
In version 2 and above, if the set dns line is omitted, PPP will use the values found in
/etc/resolv.conf.
372
Chapter 15. PPP and SLIP
7 set login
...
12 set authname MyUserName
13 set authkey MyPassword
As always, do not include the line numbers, they are just for reference in this discussion. Indentation of
at least one space is required.
Line 7:
Your ISP will not normally require that you log into the server if youre using PAP or CHAP. You
must therefore disable your "set login" string.
Line 12:
This line specifies your PAP/CHAP user name. You will need to insert the correct value for
MyUserName.
Line 13:
This line specifies your PAP/CHAP password. You will need to insert the correct value for
MyPassword. You may want to add an additional line
15 accept PAP
or
15 accept CHAP
to make it obvious that this is the intention, but PAP and CHAP are both accepted by default.
373
Chapter 15. PPP and SLIP
This will tell PPP to listen to the specified unix-domain socket, asking clients for the specified password
before allowing access. The %d in the name is replaced with the tun device number that is in use.
Once a socket has been set up, the pppctl(8) program may be used in scripts that wish to manipulate the
running program.
hostname=foo.bar.com
If your ISP has supplied you with a static IP address and name, its probably best that you use this name
as your host name.
Look for the network_interfaces variable. If you want to configure your system to dial your ISP on
demand, make sure the tun0 device is added to the list, otherwise remove it.
Note: The ifconfig_tun0 variable should be empty, and a file called /etc/start_if.tun0 should
be created. This file should contain the line
This script is executed at network configuration time, starting your ppp daemon in automatic mode. If
you have a LAN for which this machine is a gateway, you may also wish to use the -alias switch.
Refer to the manual page for further details.
router_enable=NO (/etc/rc.conf)
router=NO (/etc/sysconfig)
374
Chapter 15. PPP and SLIP
It is important that the routed daemon is not started (its started by default) as routed tends to delete
the default routing table entries created by ppp.
It is probably worth your while ensuring that the sendmail_flags line does not include the -q option,
otherwise sendmail will attempt to do a network lookup every now and then, possibly causing your
machine to dial out. You may try:
sendmail_flags="-bd"
The upshot of this is that you must force sendmail to re-examine the mail queue whenever the ppp link
is up by typing:
# /usr/sbin/sendmail -q
You may wish to use the !bg command in ppp.linkup to do this automatically:
1 provider:
2 delete ALL
3 add 0 0 HISADDR
4 !bg sendmail -bd -q30m
If you dont like this, it is possible to set up a dfilter to block SMTP traffic. Refer to the sample files
for further details.
All that is left is to reboot the machine.
After rebooting, you can now either type
# ppp
and then dial provider to start the PPP session, or, if you want ppp to establish sessions
automatically when there is outbound traffic (and you havent created the start_if.tun0 script), type
Summary
To recap, the following steps are necessary when setting up ppp for the first time:
Client side:
375
Chapter 15. PPP and SLIP
3. Create an entry in /etc/ppp/ppp.conf. The pmdemand example should suffice for most ISPs.
4. If you have a dynamic IP address, create an entry in /etc/ppp/ppp.linkup.
5. Update your /etc/rc.conf (or sysconfig) file.
6. Create a start_if.tun0 script if you require demand dialing.
Server side:
Acknowledgments
This section of the handbook was last updated on Monday Aug 10, 1998 by Brian Somers
<[email protected]>
Thanks to the following for their input, comments & suggestions:
Nik Clayton <[email protected]>
Dirk-Willem van Gulik <[email protected]>
Peter Childs <[email protected]>
376
Chapter 15. PPP and SLIP
1. as a client, i.e. you want to connect your machine to outside world via PPP serial connection or
modem line.
2. as a server, i.e. your machine is located on the network and used to connect other computers using
PPP.
In both cases you will need to set up an options file (/etc/ppp/options or ~/.ppprc if you have
more then one user on your machine that uses PPP).
You also will need some modem/serial software (preferably kermit) so you can dial and establish
connection with remote host.
defaultroute # put this if you want that PPP server will be your
# default router
To connect:
1. Dial to the remote host using kermit (or other modem program) enter your user name and password
(or whatever is needed to enable PPP on the remote host)
2. Exit kermit (without hanging up the line).
3. enter:
# /usr/src/usr.sbin/pppd.new/pppd /dev/tty01 19200
377
Chapter 15. PPP and SLIP
Now your computer is connected with PPP. If the connection fails for some reasons you can add the
debug option to the /etc/ppp/options file and check messages on the console to track the problem
#!/bin/sh
ps ax |grep pppd |grep -v grep
pid=ps ax |grep pppd |grep -v grep|awk {print $1;}
if [ "X${pid}" != "X" ] ; then
echo killing pppd, PID= ${pid}
kill ${pid}
fi
ps ax |grep kermit |grep -v grep
pid=ps ax |grep kermit |grep -v grep|awk {print $1;}
if [ "X${pid}" != "X" ] ; then
echo killing kermit, PID= ${pid}
kill -9 ${pid}
fi
kermit -y /etc/ppp/kermit.dial
pppd /dev/tty01 19200
/etc/ppp/kermit.dial is kermit script that dials and makes all necessary authorization on the remote
host. (Example of such script is attached to the end of this document)
Use the following /etc/ppp/pppdown script to disconnect the PPP line:
#!/bin/sh
pid=ps ax |grep pppd |grep -v grep|awk {print $1;}
if [ X${pid} != "X" ] ; then
echo killing pppd, PID= ${pid}
kill -TERM ${pid}
fi
378
Chapter 15. PPP and SLIP
kermit -y /etc/ppp/kermit.hup
/etc/ppp/ppptest
#!/bin/sh
pid=ps ax| grep pppd |grep -v grep|awk {print $1;}
if [ X${pid} != "X" ] ; then
echo pppd running: PID= ${pid-NONE}
else
echo No pppd running.
fi
set -x
netstat -n -I ppp0
ifconfig ppp0
pau 1
out +++
inp 5 OK
out ATH0\13
echo \13
exit
/dev/cuaa1 115200
379
Chapter 15. PPP and SLIP
/etc/ppp/login.chat.script:
Once these are installed and modified correctly, all you need to do is
# pppd
380
Chapter 15. PPP and SLIP
#!/bin/sh
ps ax |grep pppd |grep -v grep
pid=ps ax |grep pppd |grep -v grep|awk {print $1;}
if [ "X${pid}" != "X" ] ; then
echo killing pppd, PID= ${pid}
kill ${pid}
fi
ps ax |grep kermit |grep -v grep
pid=ps ax |grep kermit |grep -v grep|awk {print $1;}
if [ "X${pid}" != "X" ] ; then
echo killing kermit, PID= ${pid}
kill -9 ${pid}
fi
# run ppp
pppd /dev/tty01 19200
#!/bin/sh
ps ax |grep pppd |grep -v grep
pid=ps ax |grep pppd |grep -v grep|awk {print $1;}
if [ "X${pid}" != "X" ] ; then
echo killing pppd, PID= ${pid}
kill ${pid}
fi
ps ax |grep kermit |grep -v grep
pid=ps ax |grep kermit |grep -v grep|awk {print $1;}
if [ "X${pid}" != "X" ] ; then
echo killing kermit, PID= ${pid}
kill -9 ${pid}
fi
381
Chapter 15. PPP and SLIP
kermit -y /etc/ppp/kermit.noans
pau 1
out +++
inp 5 OK
out ATH0\13
inp 5 OK
echo \13
out ATS0=1\13 ; change this to out ATS0=0\13 if you want to disable
; autoanswer mod
inp 5 OK
echo \13
exit
This /etc/ppp/kermit.dial script is used for dialing and authorizing on remote host. You will need
to customize it for your needs. Put your login and password in this script, also you will need to change
input statement depending on responses from your modem and remote host.
;
; put the com line attached to the modem here:
;
set line /dev/tty01
;
; put the modem speed here:
;
set speed 19200
set file type binary ; full 8 bit file xfer
382
Chapter 15. PPP and SLIP
383
Chapter 15. PPP and SLIP
:look
clear ; Clear unread characters from input buffer
increment \%x ; Count the seconds
input 1 {CONNECT }
if success goto sllogin
reinput 1 {NO CARRIER\13\10}
if success goto sldial
reinput 1 {NO DIALTONE\13\10}
if success goto slnodial
reinput 1 {\255}
if success goto slhup
reinput 1 {\127}
if success goto slhup
if < \%x 60 goto look
else goto slhup
:sllogin ; login
assign \%x 0 ; zero the time counter
pause 1
echo Looking for login prompt.
:slloop
increment \%x ; Count the seconds
clear ; Clear unread characters from input buffer
output \13
;
; put your expected login prompt here:
;
input 1 {Username: }
if success goto sluid
reinput 1 {\255}
if success goto slhup
reinput 1 {\127}
if success goto slhup
if < \%x 10 goto slloop ; try 10 times to get a login prompt
else goto slhup ; hang up and start again if 10 failures
:sluid
;
; put your userid here:
;
output ppp-login\13
input 1 {Password: }
;
; put your password here:
384
Chapter 15. PPP and SLIP
;
output ppp-password\13
input 1 {Entering SLIP mode.}
echo
quit
:slnodial
echo \7No dialtone. Check the telephone line!\7
exit 1
; local variables:
; mode: csh
; comment-start: "; "
; comment-start-skip: "; "
; end:
pseudo-device sl 1
in your kernels config file. It is included in the GENERIC kernel, so this will not be a problem unless you
deleted it.
385
Chapter 15. PPP and SLIP
1. Add your home machine, the gateway and nameservers to your /etc/hosts file. Mine looks like
this:
127.0.0.1 localhost loghost
136.152.64.181 silvia.HIP.Berkeley.EDU silvia.HIP silvia
136.152.64.1 inr-3.Berkeley.EDU inr-3 slip-gateway
128.32.136.9 ns1.Berkeley.edu ns1
128.32.136.12 ns2.Berkeley.edu ns2
By the way, silvia is the name of the car that I had when I was back in Japan (it is called 2?0SX here
in U.S.).
2. Make sure you have hosts before bind in your /etc/host.conf. Otherwise, funny things may
happen.
3. Edit the file /etc/rc.conf. Note that you should edit the file /etc/sysconfig instead if you are
running FreeBSD previous to version 2.2.2.
2. Add sl0 to the list of network interfaces by changing the line that says:
network_interfaces="lo0"
to:
network_interfaces="lo0 sl0"
to:
defaultrouter=slip-gateway
386
Chapter 15. PPP and SLIP
As you can see, these set up the nameserver hosts. Of course, the actual domain names and
addresses depend on your environment.
5. Set the password for root and toor (and any other accounts that does not have a password). Use
passwd, do not edit the /etc/passwd or /etc/master.passwd files!
6. Reboot your machine and make sure it comes up with the correct hostname.
1. Dial up, type slip at the prompt, enter your machine name and password. The things you need to
enter depends on your environment. I use kermit, with a script like this:
# kermit setup
set modem hayes
set line /dev/modem
set speed 115200
set parity none
set flow rts/cts
set terminal bytesize 8
set file type binary
# The next macro will dial up and login
define slip dial 643-9600, input 10 =>, if failure stop, -
output slip\x0d, input 10 Username:, if failure stop, -
output silvia\x0d, input 10 Password:, if failure stop, -
output ***\x0d, echo \x0aCONNECTED\x0a
(of course, you have to change the hostname and password to fit yours). Then you can just type
slip from the kermit prompt to get connected.
Note: Leaving your password in plain text anywhere in the filesystem is generally a BAD idea.
Do it at your own risk. I am just too lazy.
2. Leave the kermit there (you can suspend it by z) and as root, type:
# slattach -h -c -s 115200 /dev/modem
If you are able to ping hosts on the other side of the router, you are connected! If it does not work,
you might want to try -a instead of -c as an argument to slattach.
387
Chapter 15. PPP and SLIP
(as root) to kill slattach. Then go back to kermit (fg if you suspended it) and exit from it (q).
The slattach man page says you have to use ifconfig sl0 down to mark the interface down, but this
does not seem to make any difference for me. (ifconfig sl0 reports the same thing.)
Some times, your modem might refuse to drop the carrier (mine often does). In that case, simply start
kermit and quit it again. It usually goes out on the second try.
Troubleshooting
If it does not work, feel free to ask me. The things that people tripped over so far:
Not using -c or -a in slattach (I have no idea why this can be fatal, but adding this flag solved the
problem for at least one person)
Using s10 instead of sl0 (might be hard to see the difference on some fonts).
Try ifconfig sl0 to see your interface status. I get:
# ifconfig sl0
sl0: flags=10<POINTOPOINT>
inet 136.152.64.181 -> 136.152.64.1 netmask ffffff00
Also, netstat -r will give the routing table, in case you get the "no route to host" messages from
ping. Mine looks like:
# netstat -r
Routing tables
Destination Gate-
way Flags Refs Use IfaceMTU Rtt Netmasks:
(root node)
(root node)
388
Chapter 15. PPP and SLIP
Prerequisites
This document is very technical in nature, so background knowledge is required. It is assumed that you
are familiar with the TCP/IP network protocol, and in particular, network and node addressing, network
address masks, subnetting, routing, and routing protocols, such as RIP. Configuring SLIP services on a
dial-up server requires a knowledge of these concepts, and if you are not familiar with them, please read
a copy of either Craig Hunts TCP/IP Network Administration published by OReilly & Associates, Inc.
(ISBN Number 0-937175-82-X), or Douglas Comers books on the TCP/IP protocol.
It is further assumed that you have already setup your modem(s) and configured the appropriate system
files to allow logins through your modems. If you have not prepared your system for this yet, please see
the tutorial for configuring dialup services; if you have a World-Wide Web browser available, browse the
list of tutorials at http://www.FreeBSD.org/; otherwise, check the place where you found this document
for a document named dialup.txt or something similar. You may also want to check the manual pages
for sio(4) for information on the serial port device driver and ttys(5), gettytab(5), getty(8), & init(8) for
information relevant to configuring the system to accept logins on modems, and perhaps stty(1) for
information on setting serial port parameters (such as clocal for directly-connected serial interfaces).
389
Chapter 15. PPP and SLIP
Quick Overview
In its typical configuration, using FreeBSD as a SLIP server works as follows: a SLIP user dials up your
FreeBSD SLIP Server system and logs in with a special SLIP login ID that uses
/usr/sbin/sliplogin as the special users shell. The sliplogin program browses the file
/etc/sliphome/slip.hosts to find a matching line for the special user, and if it finds a match,
connects the serial line to an available SLIP interface and then runs the shell script
/etc/sliphome/slip.login to configure the SLIP interface.
Shelmerg:password:1964:89::0:0:Guy Helmer -
SLIP:/usr/users/Shelmerg:/usr/sbin/sliplogin
When Shelmerg logs in, sliplogin will search /etc/sliphome/slip.hosts for a line that had a
matching user ID; for example, there may be a line in /etc/sliphome/slip.hosts that reads:
sliplogin will find that matching line, hook the serial line into the next available SLIP interface, and
then execute /etc/sliphome/slip.login like this:
If all goes well, /etc/sliphome/slip.login will issue an ifconfig for the SLIP interface to which
sliplogin attached itself (slip interface 0, in the above example, which was the first parameter in the
list given to slip.login) to set the local IP address (dc-slip), remote IP address (sl-helmer),
network mask for the SLIP interface (0xfffffc00), and any additional flags (autocomp). If something
goes wrong, sliplogin usually logs good informational messages via the daemon syslog facility,
which usually goes into /var/log/messages (see the manual pages for syslogd(8) and syslog.conf(5),
and perhaps check /etc/syslog.conf to see to which files syslogd is logging).
OK, enough of the examples let us dive into setting up the system.
Kernel Configuration
FreeBSDs default kernels usually come with two SLIP interfaces defined (sl0 and sl1); you can use
390
Chapter 15. PPP and SLIP
The sl0 and sl1 interfaces shown in netstat -is output indicate that there are two SLIP interfaces
built into the kernel. (The asterisks after the sl0 and sl1 indicate that the interfaces are down.)
However, FreeBSDs default kernels do not come configured to forward packets (ie, your FreeBSD
machine will not act as a router) due to Internet RFC requirements for Internet hosts (see RFCs 1009
[Requirements for Internet Gateways], 1122 [Requirements for Internet Hosts Communication
Layers], and perhaps 1127 [A Perspective on the Host Requirements RFCs]), so if you want your
FreeBSD SLIP Server to act as a router, you will have to edit the /etc/rc.conf file (called
/etc/sysconfig in FreeBSD releases prior to 2.2.2) and change the setting of the gateway variable to
YES. If you have an older system which predates even the /etc/sysconfig file, then add the following
command:
sysctl -w net.inet.ip.forwarding = 1
pseudo-device sl 2
This is the line that defines the number of SLIP devices available in the kernel; the number at the end of
the line is the maximum number of SLIP connections that may be operating simultaneously.
Please refer to Configuring the FreeBSD Kernel for help in reconfiguring your kernel.
Sliplogin Configuration
As mentioned earlier, there are three files in the /etc/sliphome directory that are part of the
configuration for /usr/sbin/sliplogin (see sliplogin(8) for the actual manual page for sliplogin):
slip.hosts, which defines the SLIP users & their associated IP addresses; slip.login, which
391
Chapter 15. PPP and SLIP
usually just configures the SLIP interface; and (optionally) slip.logout, which undoes slip.logins
effects when the serial connection is terminated.
slip.hosts Configuration
/etc/sliphome/slip.hosts contains lines which have at least four items, separated by whitespace:
#
# login local-addr remote-addr mask opt1 opt2
# (normal,compress,noicmp)
#
Shelmerg dc-slip sl-helmerg 0xfffffc00 autocomp
392
Chapter 15. PPP and SLIP
If you are going to use a separate subnet for your SLIP clients, you will need to allocate the subnet
number out of your assigned IP network number and assign each of your SLIP clients IP numbers out of
that subnet. Then, you will probably either need to configure a static route to the SLIP subnet via your
SLIP server on your nearest IP router, or install gated on your FreeBSD SLIP server and configure it to
talk the appropriate routing protocols to your other routers to inform them about your SLIP servers route
to the SLIP subnet.
Otherwise, if you will use the proxy ARP method, you will need to assign your SLIP clients IP
addresses out of your SLIP servers Ethernet subnet, and you will also need to adjust your
/etc/sliphome/slip.login and /etc/sliphome/slip.logout scripts to use arp(8) to manage
the proxy-ARP entries in the SLIP servers ARP table.
slip.login Configuration
The typical /etc/sliphome/slip.login file looks like this:
#!/bin/sh -
#
# @(#)slip.login 5.1 (Berkeley) 7/1/90
#
# generic login file for a slip line. sliplogin invokes this with
# the parameters:
# 1 2 3 4 5 6 7-n
# slipunit ttyspeed loginname local-addr remote-addr mask opt-args
#
/sbin/ifconfig sl$1 inet $4 $5 netmask $6
This slip.login file merely ifconfigs the appropriate SLIP interface with the local and remote
addresses and network mask of the SLIP interface.
If you have decided to use the proxy ARP method (instead of using a separate subnet for your SLIP
clients), your /etc/sliphome/slip.login file will need to look something like this:
#!/bin/sh -
#
# @(#)slip.login 5.1 (Berkeley) 7/1/90
#
# generic login file for a slip line. sliplogin invokes this with
# the parameters:
# 1 2 3 4 5 6 7-n
# slipunit ttyspeed loginname local-addr remote-addr mask opt-args
#
393
Chapter 15. PPP and SLIP
The additional line in this slip.login, arp -s $5 00:11:22:33:44:55 pub, creates an ARP
entry in the SLIP servers ARP table. This ARP entry causes the SLIP server to respond with the SLIP
servers Ethernet MAC address whenever a another IP node on the Ethernet asks to speak to the SLIP
clients IP address.
When using the example above, be sure to replace the Ethernet MAC address (00:11:22:33:44:55)
with the MAC address of your systems Ethernet card, or your proxy ARP will definitely not work!
You can discover your SLIP servers Ethernet MAC address by looking at the results of running
netstat -i; the second line of the output should look something like:
This indicates that this particular systems Ethernet MAC address is 00:02:c1:28:5f:4a the
periods in the Ethernet MAC address given by netstat -i must be changed to colons and leading
zeros should be added to each single-digit hexadecimal number to convert the address into the form that
arp(8) desires; see the manual page on arp(8) for complete information on usage.
slip.logout Configuration
/etc/sliphome/slip.logout is not strictly needed (unless you are implementing proxy ARP), but
if you decide to create it, this is an example of a basic slip.logout script:
#!/bin/sh -
#
# slip.logout
#
# logout file for a slip line. sliplogin invokes this with
# the parameters:
# 1 2 3 4 5 6 7-n
# slipunit ttyspeed loginname local-addr remote-addr mask opt-args
#
/sbin/ifconfig sl$1 down
394
Chapter 15. PPP and SLIP
If you are using proxy ARP, you will want to have /etc/sliphome/slip.logout remove the ARP
entry for the SLIP client:
#!/bin/sh -
#
# @(#)slip.logout
#
# logout file for a slip line. sliplogin invokes this with
# the parameters:
# 1 2 3 4 5 6 7-n
# slipunit ttyspeed loginname local-addr remote-addr mask opt-args
#
/sbin/ifconfig sl$1 down
# Quit answering ARP requests for the SLIP client
/usr/sbin/arp -d $5
The arp -d $5 removes the ARP entry that the proxy ARP slip.login added when the SLIP client
logged in.
It bears repeating: make sure /etc/sliphome/slip.logout has the execute bit set for after you
create it (ie, chmod 755 /etc/sliphome/slip.logout).
Routing Considerations
If you are not using the proxy ARP method for routing packets between your SLIP clients and the rest
of your network (and perhaps the Internet), you will probably either have to add static routes to your
closest default router(s) to route your SLIP client subnet via your SLIP server, or you will probably need
to install and configure gated on your FreeBSD SLIP server so that it will tell your routers via
appropriate routing protocols about your SLIP subnet.
Static Routes
Adding static routes to your nearest default routers can be troublesome (or impossible, if you do not have
authority to do so...). If you have a multiple-router network in your organization, some routers, such as
Cisco and Proteon, may not only need to be configured with the static route to the SLIP subnet, but also
need to be told which static routes to tell other routers about, so some expertise and
troubleshooting/tweaking may be necessary to get static-route-based routing to work.
395
Chapter 15. PPP and SLIP
Running gated
An alternative to the headaches of static routes is to install gated on your FreeBSD SLIP server and
configure it to use the appropriate routing protocols (RIP/OSPF/BGP/EGP) to tell other routers about
your SLIP subnet. You can use gated from the ports collection or retrieve and build it yourself from the
GateD anonymous ftp site (ftp://ftp.gated.merit.edu/research.and.development/gated/); I believe the
current version as of this writing is gated-R3_5Alpha_8.tar.Z, which includes support for FreeBSD
out-of-the-box. Complete information and documentation on gated is available on the Web starting at
the Merit GateD Consortium (http://www.gated.merit.edu/). Compile and install it, and then write a
/etc/gated.conf file to configure your gated; here is a sample, similar to what the author used on a
FreeBSD SLIP server:
#
# gated configuration file for dc.dsu.edu; for gated version 3.5alpha5
# Only broadcast RIP information for xxx.xxx.yy out the ed Ethernet interface
#
#
# tracing options
#
traceoptions "/var/tmp/gated.output" replace size 100k files 2 general ;
rip yes {
interface sl noripout noripin ;
interface ed ripin ripout version 1 ;
traceoptions route ;
} ;
#
# Turn on a bunch of tracing info for the interface to the kernel:
kernel {
traceoptions remnants request routes info interface ;
} ;
#
# Propagate the route to xxx.xxx.yy out the Ethernet interface via RIP
#
396
Chapter 15. PPP and SLIP
The above sample gated.conf file broadcasts routing information regarding the SLIP subnet
xxx.xxx.yy via RIP onto the Ethernet; if you are using a different Ethernet driver than the ed driver,
you will need to change the references to the ed interface appropriately. This sample file also sets up
tracing to /var/tmp/gated.output for debugging gateds activity; you can certainly turn off the
tracing options if gated works OK for you. You will need to change the xxx.xxx.yys into the
network address of your own SLIP subnet (be sure to change the net mask in the proto direct clause
as well).
When you get gated built and installed and create a configuration file for it, you will need to run gated
in place of routed on your FreeBSD system; change the routed/gated startup parameters in
/etc/netstart as appropriate for your system. Please see the manual page for gated for information
on gateds command-line parameters.
Acknowledgments
Thanks to these people for comments and advice regarding this tutorial:
Piero Serini
<[email protected]>
397
Chapter 16. Advanced Networking
An example
To illustrate different aspects of routing, we will use the following example which is the output of the
command netstat -r:
The first two lines specify the default route (which we will cover in the next section) and the localhost
route.
The interface (Netif column) that it specifies to use for localhost is lo0, also known as the loopback
device. This says to keep all traffic for this destination internal, rather than sending it out over the LAN,
since it will only end up back where it started anyway.
The next thing that stands out are the 0:e0:... addresses. These are ethernet hardware addresses.
FreeBSD will automatically identify any hosts (test0 in the example) on the local ethernet and add a
route for that host, directly to it over the ethernet interface, ed0. There is also a timeout (Expire
398
Chapter 16. Advanced Networking
column) associated with this type of route, which is used if we fail to hear from the host in a specific
amount of time. In this case the route will be automatically deleted. These hosts are identified using a
mechanism known as RIP (Routing Information Protocol), which figures out routes to local hosts based
upon a shortest path determination.
FreeBSD will also add subnet routes for the local subnet (10.20.30.255 is the broadcast address for
the subnet 10.20.30, and foobar.com is the domain name associated with that subnet). The
designation link#1 refers to the first ethernet card in the machine. You will notice no additional
interface is specified for those.
Both of these groups (local network hosts and local subnets) have their routes automatically configured
by a daemon called routed. If this is not run, then only routes which are statically defined (ie. entered
explicitly) will exist.
The host1 line refers to our host, which it knows by ethernet address. Since we are the sending host,
FreeBSD knows to use the loopback interface (lo0) rather than sending it out over the ethernet interface.
The two host2 lines are an example of what happens when we use an ifconfig alias (see the section of
ethernet for reasons why we would do this). The => symbol after the lo0 interface says that not only are
we using the loopback (since this is address also refers to the local host), but specifically it is an alias.
Such routes only show up on the host that supports the alias; all other hosts on the local network will
simply have a link#1 line for such.
The final line (destination subnet 224) deals with MultiCasting, which will be covered in a another
section.
The other column that we should talk about are the Flags. Each route has different attributes that are
described in the column. Below is a short table of some of these flags and their meanings:
399
Chapter 16. Advanced Networking
Default routes
When the local system needs to make a connection to remote host, it checks the routing table to
determine if a known path exists. If the remote host falls into a subnet that we know how to reach
(Cloned routes), then the system checks to see if it can connect along that interface.
If all known paths fail, the system has one last option: the default route. This route is a special type of
gateway route (usually the only one present in the system), and is always marked with a c in the flags
field. For hosts on a local area network, this gateway is set to whatever machine has a direct connection
to the outside world (whether via PPP link, or your hardware device attached to a dedicated data line).
If you are configuring the default route for a machine which itself is functioning as the gateway to the
outside world, then the default route will be the gateway machine at your Internet Service Providers
(ISP) site.
Let us look at an example of default routes. This is a common configuration:
The hosts Local1 and Local2 are at your site, with the formed being your PPP connection to your ISPs
Terminal Server. Your ISP has a local network at their site, which has, among other things, the server
where you connect and a hardware device (T1-GW) attached to the ISPs Internet feed.
The default routes for each of your machines will be:
A common question is Why (or how) would we set the T1-GW to be the default gateway for Local1,
rather than the ISP server it is connected to?.
Remember, since the PPP interface is using an address on the ISPs local network for your side of the
connection, routes for any other machines on the ISPs local network will be automatically generated.
Hence, you will already know how to reach the T1-GW machine, so there is no need for the intermediate
step of sending traffic to the ISP server.
As a final note, it is common to use the address ...1 as the gateway address for your local network. So
400
Chapter 16. Advanced Networking
(using the same example), if your local class-C address space was 10.20.30 and your ISP was using
10.9.9 then the default routes would be:
Routing propagation
We have already talked about how we define our routes to the outside world, but not about how the
outside world finds us.
We already know that routing tables can be set up so that all traffic for a particular address space (in our
examples, a class-C subnet) can be sent to a particular host on that network, which will forward the
packets inbound.
When you get an address space assigned to your site, your service provider will set up their routing
tables so that all traffic for your subnet will be sent down your PPP link to your site. But how do sites
across the country know to send to your ISP?
There is a system (much like the distributed DNS information) that keeps track of all assigned
address-spaces, and defines their point of connection to the Internet Backbone. The Backbone are the
main trunk lines that carry Internet traffic across the country, and around the world. Each backbone
401
Chapter 16. Advanced Networking
machine has a copy of a master set of tables, which direct traffic for a particular network to a specific
backbone carrier, and from there down the chain of service providers until it reaches your network.
It is the task of your service provider to advertise to the backbone sites that they are the point of
connection (and thus the path inward) for your site. This is known as route propagation.
Troubleshooting
Sometimes, there is a problem with routing propagation, and some sites are unable to connect to you.
Perhaps the most useful command for trying to figure out where a routing is breaking down is the
traceroute(8) command. It is equally useful if you cannot seem to make a connection to a remote
machine (i.e. ping(8) fails).
The traceroute(8) command is run with the name of the remote host you are trying to connect to. It will
show the gateway hosts along the path of the attempt, eventually either reaching the target host, or
terminating because of a lack of connection.
For more information, see the manual page for traceroute(8).
NFS
Contributed by John Lind <[email protected] >.
Certain Ethernet adapters for ISA PC systems have limitations which can lead to serious network
problems, particularly with NFS. This difficulty is not specific to FreeBSD, but FreeBSD systems are
affected by it.
The problem nearly always occurs when (FreeBSD) PC systems are networked with high-performance
workstations, such as those made by Silicon Graphics, Inc., and Sun Microsystems, Inc. The NFS mount
will work fine, and some operations may succeed, but suddenly the server will seem to become
unresponsive to the client, even though requests to and from other systems continue to be processed.
This happens to the client system, whether the client is the FreeBSD system or the workstation. On many
systems, there is no way to shut down the client gracefully once this problem has manifested itself. The
only solution is often to reset the client, because the NFS situation cannot be resolved.
Though the correct solution is to get a higher performance and capacity Ethernet adapter for the
FreeBSD system, there is a simple workaround that will allow satisfactory operation. If the FreeBSD
system is the server, include the option -w=1024 on the mount from the client. If the FreeBSD system is
the client, then mount the NFS file system with the option -r=1024. These options may be specified
using the fourth field of the fstab entry on the client for automatic mounts, or by using the -o
parameter of the mount command for manual mounts.
402
Chapter 16. Advanced Networking
It should be noted that there is a different problem, sometimes mistaken for this one, when the NFS
servers and clients are on different networks. If that is the case, make certain that your routers are
routing the necessary UDP information, or you will not get anywhere, no matter what else you are doing.
In the following examples, fastws is the host (interface) name of a high-performance workstation, and
freebox is the host (interface) name of a FreeBSD system with a lower-performance Ethernet adapter.
Also, /sharedfs will be the exported NFS filesystem (see man exports), and /project will be the
mount point on the client for the exported file system. In all cases, note that additional options, such as
hard or soft and bg may be desirable in your application.
Examples for the FreeBSD system (freebox) as the client: in /etc/fstab on freebox:
Nearly any 16-bit Ethernet adapter will allow operation without the above restrictions on the read or
write size.
For anyone who cares, here is what happens when the failure occurs, which also explains why it is
unrecoverable. NFS typically works with a block size of 8k (though it may do fragments of smaller
sizes). Since the maximum Ethernet packet is around 1500 bytes, the NFS block gets split into
multiple Ethernet packets, even though it is still a single unit to the upper-level code, and must be
received, assembled, and acknowledged as a unit. The high-performance workstations can pump out the
packets which comprise the NFS unit one right after the other, just as close together as the standard
allows. On the smaller, lower capacity cards, the later packets overrun the earlier packets of the same
unit before they can be transferred to the host and the unit as a whole cannot be reconstructed or
acknowledged. As a result, the workstation will time out and try again, but it will try again with the
entire 8K unit, and the process will be repeated, ad infinitum.
By keeping the unit size below the Ethernet packet size limitation, we ensure that any complete Ethernet
packet received can be acknowledged individually, avoiding the deadlock situation.
Overruns may still occur when a high-performance workstations is slamming data out to a PC system,
but with the better cards, such overruns are not guaranteed on NFS units. When an overrun occurs, the
403
Chapter 16. Advanced Networking
units affected will be retransmitted, and there will be a fair chance that they will be received, assembled,
and acknowledged.
Diskless Operation
Contributed by Martin Renters <[email protected] >.
netboot.com/netboot.rom allow you to boot your FreeBSD machine over the network and run
FreeBSD without having a disk on your client. Under 2.0 it is now possible to have local swap.
Swapping over NFS is also still supported.
Supported Ethernet cards include: Western Digital/SMC 8003, 8013, 8216 and compatibles;
NE1000/NE2000 and compatibles (requires recompile)
Setup Instructions
1. Find a machine that will be your server. This machine will require enough disk space to hold the
FreeBSD 2.0 binaries and have bootp, tftp and NFS services available. Tested machines:
3. Set up a TFTP server (on same machine as bootp server) to provide booting information to client.
The name of this file is cfg.X.X.X.X (or /tftpboot/cfg.X.X.X.X , it will try both) where
X.X.X.X is the IP address of the client. The contents of this file can be any valid netboot
commands. Under 2.0, netboot has the following commands:
404
Chapter 16. Advanced Networking
And on HP-UX:
/rootfs/myclient -root=myclient.mydomain
/swapfs -root=myclient.mydomain
5. If you are swapping over NFS (completely diskless configuration) create a swap file for your client
using dd. If your swapfs command has the arguments /swapfs and the size 20000 as in the
example above, the swapfile for myclient will be called /swapfs/swap.X.X.X.X where
X.X.X.X is the clients IP addr, eg:
# dd if=/dev/zero of=/swapfs/swap.192.1.2.4 bs=1k count=20000
Also, the clients swap space might contain sensitive information once swapping starts, so make sure
to restrict read and write access to this file to prevent unauthorized access:
405
Chapter 16. Advanced Networking
6. Unpack the root filesystem in the directory the client will use for its root filesystem
(/rootfs/myclient in the example above).
On HP-UX systems: The server should be running HP-UX 9.04 or later for HP9000/800 series
machines. Prior versions do not allow the creation of device files over NFS.
When extracting /dev in /rootfs/myclient, beware that some systems (HPUX) will not
create device files that FreeBSD is happy with. You may have to go to single user mode on the
first bootup (press control-c during the bootup phase), cd /dev and do a sh ./MAKEDEV all
from the client to fix this.
7. Run netboot.com on the client or make an EPROM from the netboot.rom file
ISDN
Last modified by Bill Lloyd <[email protected]>.
A good resource for information on ISDN technology and hardware is Dan Kegels ISDN Page
(http://alumni.caltech.edu/~dank/isdn/).
A quick simple roadmap to ISDN follows:
If you live in Europe I suggest you investigate the ISDN card section.
If you are planning to use ISDN primarily to connect to the Internet with an Internet Provider on a
dialup non-dedicated basis, I suggest you look into Terminal Adapters. This will give you the most
406
Chapter 16. Advanced Networking
ISDN Cards
Contributed by Hellmuth Michaelis <[email protected] >.
This section is really only relevant to ISDN users in countries where the DSS1/Q.931 ISDN standard is
supported.
Some growing number of PC ISDN cards are supported under FreeBSD 2.2.x and up by the isdn4bsd
driver package. It is still under development but the reports show that it is successfully used all over
Europe.
The latest isdn4bsd version is available from ftp://[email protected]/pub/, the main isdn4bsd ftp
site (you have to log in as user isdn4bsd , give your mail address as the password and change to the
pub directory. Anonymous ftp as user ftp or anonymous will not give the desired result).
Isdn4bsd allows you to connect to other ISDN routers using either IP over raw HDLC or by using
synchronous PPP. A telephone answering machine application is also available.
Many ISDN PC cards are supported, mostly the ones with a Siemens ISDN chipset (ISAC/HSCX),
support for other chipsets (from Motorola, Cologne Chip Designs) is currently under development. For
an up-to-date list of supported cards, please have a look at the README
(ftp://[email protected]/pub/README) file.
In case you are interested in adding support for a different ISDN protocol, a currently unsupported ISDN
PC card or otherwise enhancing isdn4bsd, please get in touch with <[email protected]>.
A majordomo maintained mailing list is available. To join the list, send mail to
<[email protected]> and specify:
subscribe freebsd-isdn
407
Chapter 16. Advanced Networking
Most TAs use the standard hayes modem AT command set, and can be used as a drop in replacement for
a modem.
A TA will operate basically the same as a modem except connection and throughput speeds will be much
faster than your old modem. You will need to configure PPP exactly the same as for a modem setup.
Make sure you set your serial speed as high as possible.
The main advantage of using a TA to connect to an Internet Provider is that you can do Dynamic PPP. As
IP address space becomes more and more scarce, most providers are not willing to provide you with a
static IP anymore. Most standalone routers are not able to accommodate dynamic IP allocation.
TAs completely rely on the PPP daemon that you are running for their features and stability of
connection. This allows you to upgrade easily from using a modem to ISDN on a FreeBSD machine, if
you already have PPP setup. However, at the same time any problems you experienced with the PPP
program and are going to persist.
If you want maximum stability, use the kernel PPP option, not the user-land iijPPP.
The following TAs are know to work with FreeBSD.
408
Chapter 16. Advanced Networking
Network is 10 Base T Ethernet. Connect router to network cable with AUI/10BT transceiver, if
necessary.
--Sun workstation
|
--FreeBSD box
|
--Windows 95 (Do not admit to owning it)
|
Standalone router
|
ISDN BRI line
If your home/branch office is only one computer you can use a twisted pair crossover cable to connect to
the standalone router directly.
409
Chapter 16. Advanced Networking
One large advantage of most routers/bridges is that they allow you to have 2 separate independent PPP
connections to 2 separate sites at the same time. This is not supported on most TAs, except for
specific(expensive) models that have two serial ports. Do not confuse this with channel bonding, MPP
etc.
This can be very useful feature, for example if you have an dedicated internet ISDN connection at your
office and would like to tap into it, but dont want to get another ISDN line at work. A router at the office
location can manage a dedicated B channel connection (64Kbs) to the internet, as well as a use the other
B channel for a separate data connection. The second B channel can be used for dialin, dialout or
dynamically bond(MPP etc.) with the first B channel for more bandwidth.
An Ethernet bridge will also allow you to transmit more than just IP traffic, you can also send IPX/SPX
or whatever other protocols you use.
410
Chapter 17. Electronic Mail
Contributed by Bill Lloyd <[email protected]>.
Electronic Mail configuration is the subject of many System Administration books. If you plan on doing
anything beyond setting up one mailhost for your network, you need industrial strength help.
Some parts of E-Mail configuration are controlled in the Domain Name System (DNS). If you are going
to run your own own DNS server check out /etc/namedb and man -k named for more information.
Basic Information
These are the major programs involved in an E-Mail exchange. A mailhost is a server that is
responsible for delivering and receiving all email for your host, and possibly your network.
User program
This is a program like elm, pine, mail, or something more sophisticated like a WWW browser. This
program will simply pass off all e-mail transactions to the local mailhost , either by calling sendmail
or delivering it over TCP.
sendmail does two jobs. It looks after delivering and receiving mail.
If sendmail needs to deliver mail off your site it will look up in the DNS to determine the actual host
that will receive mail for the destination.
If it is acting as a delivery agent sendmail will take the message from the local queue and deliver it
across the Internet to another sendmail on the receivers computer.
411
Chapter 17. Electronic Mail
POP Servers
This program gets the mail from your mailbox and gives it to your browser. If you want to run a POP
server on your computer, you will need to do 2 things.
1. Get pop software from the Ports collection (../ports/mail.html) that can be found in /usr/ports or
packages collection. This handbook section has a complete reference on the Ports system.
2. Modify /etc/inetd.conf to load the POP server.
The pop program will have instructions with it. Read them.
Configuration
Basic
As your FreeBSD system comes out of the box[TM], you should be able to send E-mail to external
hosts as long as you have /etc/resolv.conf setup or are running a name server. If you want to have
mail for your host delivered to your specific host,there are two methods:
Run a name server (man -k named) and have your own domain smallminingco.com
Get mail delivered to the current DNS name for your host. Ie: dorm6.ahouse.school.edu
No matter what option you choose, to have mail delivered directly to your host, you must be a full
Internet host. You must have a permanent IP address. IE: NO dynamic PPP. If you are behind a firewall,
the firewall must be passing on smtp traffic to you. From /etc/services:
412
Chapter 17. Electronic Mail
If you want to receive mail at your host itself, you must make sure that the DNS MX entry points to your
host address, or there is no MX entry for your DNS name.
Try this:
# hostname
newbsdbox.FreeBSD.org
# host newbsdbox.FreeBSD.org
newbsdbox.FreeBSD.org has address 204.216.27.xx
If that is all that comes out for your machine, mail directory to <[email protected]>
will work no problems.
If instead, you have this:
# host newbsdbox.FreeBSD.org
newbsdbox.FreeBSD.org has address 204.216.27.xx
newbsdbox.FreeBSD.org mail is handled (pri=10) by freefall.FreeBSD.org
All mail sent to your host directly will end up on freefall, under the same username.
This information is setup in your domain name server. This should be the same host that is listed as your
primary nameserver in /etc/resolv.conf
The DNS record that carries mail routing information is the Mail eXchange entry. If no MX entry exists,
mail will be delivered directly to the host by way of the Address record.
The MX entry for freefall.FreeBSD.org at one time.
freefall MX 30 mail.crl.net
freefall MX 40 agora.rdrop.com
freefall HINFO Pentium FreeBSD
freefall MX 10 freefall.FreeBSD.org
freefall MX 20 who.cdrom.com
freefall A 204.216.27.xx
freefall CNAME www.FreeBSD.org
freefall has many MX entries. The lowest MX number gets the mail in the end. The others will queue
mail temporarily, if freefall is busy or down.
Alternate MX sites should have separate connections to the Internet, to be most useful. An Internet
Provider or other friendly site can provide this service.
dig, nslookup, and host are your friends.
413
Chapter 17. Electronic Mail
You cannot do this yourself unless you are running a DNS server. If you do not want to run a DNS
server, get somebody else like your Internet Provider to do it.
This will redirect mail for the workstation to the Mail eXchange host. It does not matter what machine
the A record points to, the mail will be sent to the MX host.
This feature is used to implement Virtual E-Mail Hosting.
Example
I have a customer with domain foo.bar and I want all mail for foo.bar to be sent to my machine
smtp.smalliap.com. You must make an entry in your DNS server like:
The A record is not needed if you only want E-Mail for the domain. IE: Dont expect ping foo.bar to
work unless an Address record for foo.bar exists as well.
On the mailhost that actually accepts mail for final delivery to a mailbox, sendmail must be told what
hosts it will be accepting mail for.
Add pc24.smallminingco.com to /etc/sendmail.cw (if you are using
FEATURE(use_cw_file)), or add a Cw myhost.smalliap.com line to /etc/sendmail.cf
If you plan on doing anything serious with sendmail you should install the sendmail source. The
source has plenty of documentation with it. You will find information on getting sendmail source from
the UUCP information.
414
Chapter 17. Electronic Mail
Setting up UUCP.
Stolen from the FAQ.
The sendmail configuration that ships with FreeBSD is suited for sites that connect directly to the
Internet. Sites that wish to exchange their mail via UUCP must install another sendmail configuration
file.
Tweaking /etc/sendmail.cf manually is considered something for purists. Sendmail version 8 comes
with a new approach of generating config files via some m4 preprocessing, where the actual hand-crafted
configuration is on a higher abstraction level. You should use the configuration files under
/usr/src/usr.sbin/sendmail/cf.
If you did not install your system with full sources, the sendmail config stuff has been broken out into a
separate source distribution tarball just for you. Assuming you have your CD-ROM mounted, do:
# cd /usr/src
# tar -xvzf /cdrom/dists/src/ssmailcf.aa
Do not panic, this is only a few hundred kilobytes in size. The file README in the cf directory can serve
as a basic introduction to m4 configuration.
For UUCP delivery, you are best advised to use the mailertable feature. This constitutes a database that
sendmail can use to base its routing decision upon.
First, you have to create your .mc file. The directory /usr/src/usr.sbin/sendmail/cf/cf is the
home of these files. Look around, there are already a few examples. Assuming you have named your file
foo.mc, all you need to do in order to convert it into a valid sendmail.cf is:
# cd /usr/src/usr.sbin/sendmail/cf/cf
# make foo.cf
# cp foo.cf /etc/sendmail.cf
Otherwise:
# cp /usr/obj/pwd/foo.cf /etc/sendmail.cf
include(../m4/cf.m4)
VERSIONID(Your version number)
OSTYPE(bsd4.4)
FEATURE(nodns)
415
Chapter 17. Electronic Mail
FEATURE(nocanonify)
FEATURE(mailertable)
define(UUCP_RELAY, your.uucp.relay)
define(UUCP_MAX_SIZE, 200000)
MAILER(local)
MAILER(smtp)
MAILER(uucp)
Cw your.alias.host.name
Cw youruucpnodename.UUCP
The nodns and nocanonify features will prevent any usage of the DNS during mail delivery. The
UUCP_RELAY clause is needed for bizarre reasons, do not ask. Simply put an Internet hostname there that
is able to handle .UUCP pseudo-domain addresses; most likely, you will enter the mail relay of your ISP
there.
Once you have this, you need this file called /etc/mailertable. A typical example of this gender
again:
#
# makemap hash /etc/mailertable.db < /etc/mailertable
#
horus.interface-business.de uucp-dom:horus
.interface-business.de uucp-dom:if-bus
interface-business.de uucp-dom:if-bus
.heep.sax.de smtp8:%1 horus.UUCP
uucp-dom:horus if-bus.UUCP
uucp-dom:if-bus . uucp-dom:sax
As you can see, this is part of a real-life file. The first three lines handle special cases where
domain-addressed mail should not be sent out to the default route, but instead to some UUCP neighbor in
order to shortcut the delivery path. The next line handles mail to the local Ethernet domain that can be
delivered using SMTP. Finally, the UUCP neighbors are mentioned in the .UUCP pseudo-domain
notation, to allow for a uucp-neighbor!recipient override of the default rules. The last line is
always a single dot, matching everything else, with UUCP delivery to a UUCP neighbor that serves as
your universal mail gateway to the world. All of the node names behind the uucp-dom: keyword must
be valid UUCP neighbors, as you can verify using the command uuname.
As a reminder that this file needs to be converted into a DBM database file before being usable, the
command line to accomplish this is best placed as a comment at the top of the mailertable. You
always have to execute this command each time you change your mailertable.
416
Chapter 17. Electronic Mail
Final hint: if you are uncertain whether some particular mail routing would work, remember the -bt
option to sendmail. It starts sendmail in address test mode; simply enter 0, followed by the address
you wish to test for the mail routing. The last line tells you the used internal mail agent, the destination
host this agent will be called with, and the (possibly translated) address. Leave this mode by typing
Control-D.
% sendmail -bt
ADDRESS TEST MODE (ruleset 3 NOT automatically invoked)
Enter <ruleset> <address>
> 0 [email protected]
rewrite: ruleset 0 input: foo @ interface-business . de
...
rewrite: ruleset 0 returns: $# uucp-dom $@ if-bus $: foo < @ interface-
business . de
FAQ
Migration from FAQ.
domain foo.bar.edu
417
Chapter 17. Electronic Mail
into your /etc/resolv.conf. However, make sure that the search order does not go beyond the
boundary between local and public administration, as RFC 1535 calls it.
bigco.com. MX 10 bigco.com.
MX 20 smalliap.com.
Only one host should be specified as the final recipient ( add Cw bigco.com in /etc/sendmail.cf on
bigco.com).
When the senders sendmail is trying to deliver the mail it will try to connect to you over the modem
link. It will most likely time out because you are not online. sendmail will automatically deliver it to
418
Chapter 17. Electronic Mail
the secondary MX site, ie your Internet provider. The secondary MX site will try every
(sendmail_flags = "-bd -q15m" in /etc/rc.conf ) 15 minutes to connect to your host to deliver
the mail to the primary MX site.
You might want to use something like this as a login script.
#!/bin/sh
# Put me in /usr/local/bin/pppbigco
( sleep 60 ; /usr/sbin/sendmail -q ) &
/usr/sbin/ppp -direct pppbigco
If you are going to create a separate login script for a user you could use sendmail -qRbigco.com
instead in the script above. This will force all mail in your queue for bigco.com to be processed
immediately.
A further refinement of the situation is as follows.
Message stolen from the freebsd-isp mailing list.
That way a remote site will deliver straight to you, without trying
the customer connection. You then send to your customer. Only works for
"hosts", so you need to get your customer to name their mail machine
"customer.com" as well as "hostname.customer.com" in the DNS. Just put
an A record in the DNS for "customer.com".
419
IV. Advanced topics
420
Chapter 18. The Cutting Edge:
FreeBSD-current and FreeBSD-stable
FreeBSD is under constant development between releases. For people who want to be on the cutting
edge, there are several easy mechanisms for keeping your system in sync with the latest developments.
Be warned: the cutting edge is not for everyone! This chapter will help you decide if you want to track
the development system, or stick with one of the released versions.
What is FreeBSD-current?
FreeBSD-current is, quite literally, nothing more than a daily snapshot of the working sources for
FreeBSD. These include work in progress, experimental changes and transitional mechanisms that may
or may not be present in the next official release of the software. While many of us compile almost daily
from FreeBSD-current sources, there are periods of time when the sources are literally un-compilable.
These problems are generally resolved as expeditiously as possible, but whether or not FreeBSD-current
sources bring disaster or greatly desired functionality can literally be a matter of which part of any given
24 hour period you grabbed them in!
1. Members of the FreeBSD group who are actively working on some part of the source tree and for
whom keeping current is an absolute requirement.
2. Members of the FreeBSD group who are active testers, willing to spend time working through
problems in order to ensure that FreeBSD-current remains as sane as possible. These are also people
who wish to make topical suggestions on changes and the general direction of FreeBSD.
3. Peripheral members of the FreeBSD (or some other) group who merely wish to keep an eye on
things and use the current sources for reference purposes (e.g. for reading, not running). These
people also make the occasional comment or contribute code.
421
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
1. A fast-track to getting pre-release bits because you heard there is some cool new feature in there and
you want to be the first on your block to have it.
2. A quick way of getting bug fixes.
3. In any way officially supported by us. We do our best to help people genuinely in one of the 3
legitimate FreeBSD-current categories, but we simply do not have the time to provide tech support
for it. This is not because we are mean and nasty people who do not like helping people out (we
would not even be doing FreeBSD if we were), it is literally because we cannot answer 400 messages
a day and actually work on FreeBSD! I am sure that, if given the choice between having us answer
lots of questions or continuing to improve FreeBSD, most of you would vote for us improving it.
Using FreeBSD-current
2. Grab the sources from ftp.FreeBSD.org. You can do this in three ways:
a. Use the CTM facility. Unless you have a good TCP/IP connection at a flat rate, this is the way
to do it.
b. Use the cvsup program with this supfile (ftp://ftp.FreeBSD.org/pub/FreeBSD/FreeBSD-
current/src/share/examples/cvsup/standard-supfile). This is the second most recommended
method, since it allows you to grab the entire collection once and then only what has changed
422
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
from then on. Many people run cvsup from cron and keep their sources up-to-date
automatically. For a fairly easy interface to this, simply type:
# pkg_add -f \
ftp://ftp.FreeBSD.org/pub/FreeBSD/development/CVSup/cvsupit.tgz
c. Use ftp. The source tree for FreeBSD-current is always exported on:
ftp://ftp.FreeBSD.org/pub/FreeBSD/FreeBSD-current. We also use wu-ftpd which allows
compressed/tard grabbing of whole trees. e.g. you see:
usr.bin/lex
and it will get the whole directory for you as a compressed tar file.
3. Essentially, if you need rapid on-demand access to the source and communications bandwidth is not
a consideration, use cvsup or ftp. Otherwise, use CTM.
If you are grabbing the sources to run, and not just look at, then grab all of current, not just selected
portions. The reason for this is that various parts of the source depend on updates elsewhere, and
trying to compile just a subset is almost guaranteed to get you into trouble.
Before compiling current, read the Makefile in /usr/src carefully. You should at least run a make
world the first time through as part of the upgrading process. Reading the FreeBSD-current mailing
list <[email protected]> will keep you up-to-date on other bootstrapping
procedures that sometimes become necessary as we move towards the next release.
4. Be active! If you are running FreeBSD-current, we want to know what you have to say about it,
especially if you have suggestions for enhancements or bug fixes. Suggestions with accompanying
code are received most enthusiastically!
What is FreeBSD-stable?
FreeBSD-stable is our development branch for a more low-key and conservative set of changes intended
423
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
for our next mainstream release. Changes of an experimental or untested nature do not go into this
branch (see FreeBSD-current).
Warning: The stable tree endeavors, above all, to be fully compilable and stable at all times, but we
do occasionally make mistakes (these are still active sources with quickly-transmitted updates, after
all). We also do our best to thoroughly test fixes in current before bringing them into stable, but
sometimes our tests fail to catch every case. If something breaks for you in stable, please let us
know immediately! (see next section).
Using FreeBSD-stable
1. Join the FreeBSD-stable mailing list <[email protected]>. This will keep you
informed of build-dependencies that may appear in stable or any other issues requiring special
attention. Developers will also make announcements in this mailing list when they are
contemplating some controversial fix or update, giving the users a chance to respond if they have
any issues to raise concerning the proposed change.
The <cvs-all> mailing list will allow you to see the commit log entry for each change as it is
made along with any pertinent information on possible side-effects.
To join these lists, send mail to <[email protected]> and specify:
subscribe freebsd-stable
subscribe cvs-all
in the body of your message. Optionally, you can also say help and Majordomo will send you full
help on how to subscribe and unsubscribe to the various other mailing lists we support.
2. If you are installing a new system and want it to be as stable as possible, you can simply grab the
latest dated branch snapshot from ftp://releng3.FreeBSD.org/pub/FreeBSD/ and install it like any
other release.
424
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
If you are already running a previous release of 2.2 and wish to upgrade via sources then you can
easily do so from ftp.FreeBSD.org. This can be done in one of three ways:
a. Use the CTM facility. Unless you have a good TCP/IP connection at a flat rate, this is the way
to do it.
b. Use the cvsup program with this supfile (ftp://ftp.FreeBSD.org/pub/FreeBSD/FreeBSD-
current/src/share/examples/cvsup/stable-supfile). This is the second most recommended
method, since it allows you to grab the entire collection once and then only what has changed
from then on. Many people run cvsup from cron to keep their sources up-to-date automatically.
For a fairly easy interface to this, simply type;
# pkg_add -f \
ftp://ftp.FreeBSD.org/pub/FreeBSD/development/CVSup/cvsupit.tgz
c. Use ftp. The source tree for FreeBSD-stable is always exported on:
ftp://ftp.FreeBSD.org/pub/FreeBSD/FreeBSD-stable
We also use wu-ftpd which allows compressed/tard grabbing of whole trees. e.g. you see:
usr.bin/lex
and it will get the whole directory for you as a compressed tar file.
3. Essentially, if you need rapid on-demand access to the source and communications bandwidth is not
a consideration, use cvsup or ftp. Otherwise, use CTM.
4. Before compiling stable, read the Makefile in /usr/src carefully. You should at least run a make
world the first time through as part of the upgrading process. Reading the FreeBSD-stable mailing
list <[email protected]> will keep you up-to-date on other bootstrapping
procedures that sometimes become necessary as we move towards the next release.
425
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
Anonymous CVS and CVSup use the pull model of updating sources. In the case of CVSup the user
(or a cron script) invokes the cvsup program, and it interacts with a cvsupd server somewhere to bring
your files up to date. The updates you receive are up-to-the-minute and you get them when, and only
when, you want them. You can easily restrict your updates to the specific files or directories that are of
interest to you. Updates are generated on the fly by the server, according to what you have and what you
want to have. Anonymous CVS is quite a bit more simplistic than CVSup in that its just an extension to
CVS which allows it to pull changes directly from a remote CVS repository. CVSup can do this far
more efficiently, but Anonymous CVS is easier to use.
CTM, on the other hand, does not interactively compare the sources you have with those on the master
archive or otherwise pull them across.. Instead, a script which identifies changes in files since its
previous run is executed several times a day on the master CTM machine, any detected changes being
compressed, stamped with a sequence-number and encoded for transmission over email (in printable
ASCII only). Once received, these CTM deltas can then be handed to the ctm.rmail(1) utility which
will automatically decode, verify and apply the changes to the users copy of the sources. This process is
far more efficient than CVSup, and places less strain on our server resources since it is a push rather than
a pull model.
There are other trade-offs, of course. If you inadvertently wipe out portions of your archive, CVSup will
detect and rebuild the damaged portions for you. CTM wont do this, and if you wipe some portion of
your source tree out (and dont have it backed up) then you will have to start from scratch (from the most
recent CVS base delta) and rebuild it all with CTM or, with anoncvs, simply delete the bad bits and
resync.
For more information on Anonymous CVS, CTM, and CVSup, please see one of the following sections:
Anonymous CVS
Contributed by Jordan K. Hubbard <[email protected] >
Introduction
Anonymous CVS (or, as it is otherwise known, anoncvs) is a feature provided by the CVS utilities
bundled with FreeBSD for synchronizing with a remote CVS repository. Among other things, it allows
users of FreeBSD to perform, with no special privileges, read-only CVS operations against one of the
FreeBSD projects official anoncvs servers. To use it, one simply sets the CVSROOT environment
variable to point at the appropriate anoncvs server and then uses the cvs(1) command to access it like any
local repository.
While it can also be said that the CVSup and anoncvs services both perform essentially the same
function, there are various trade-offs which can influence the users choice of synchronization methods.
In a nutshell, CVSup is much more efficient in its usage of network resources and is by far the most
426
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
technically sophisticated of the two, but at a price. To use CVSup, a special client must first be installed
and configured before any bits can be grabbed, and then only in the fairly large chunks which CVSup
calls collections.
Anoncvs, by contrast, can be used to examine anything from an individual file to a specific program (like
ls or grep) by referencing the CVS module name. Of course, anoncvs is also only good for read-only
operations on the CVS repository, so if its your intention to support local development in one repository
shared with the FreeBSD project bits then CVSup is really your only option.
USA: [email protected]:/cvs
Since CVS allows one to check out virtually any version of the FreeBSD sources that ever existed (or,
in some cases, will exist :), you need to be familiar with the revision (-r) flag to cvs(1) and what some of
the permissible values for it in the FreeBSD Project repository are.
There are two kinds of tags, revision tags and branch tags. A revision tag refers to a specific revision. Its
meaning stays the same from day to day. A branch tag, on the other hand, refers to the latest revision on
a given line of development, at any given time. Because a branch tag does not refer to a specific revision,
it may mean something different tomorrow than it means today.
Here are the branch tags that users might be interested in:
HEAD
Symbolic name for the main line, or FreeBSD-current. Also the default when no revision is
specified.
RELENG_3
The line of development for FreeBSD-3.x, also known as FreeBSD-stable. Not valid for the ports
collection.
RELENG_2_2
The line of development for FreeBSD-2.2.x, also known as 2.2-stable. This branch is mostly
obsolete. Not valid for the ports collection.
427
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
RELENG_2_1_0
The line of development for FreeBSD-2.1.x - this branch is largely obsolete. Not valid for the ports
collection.
Here are the revision tags that users might be interested in:
RELENG_3_2_0_RELEASE
FreeBSD-3.2. Not valid for the ports collection.
RELENG_3_1_0_RELEASE
FreeBSD-3.1. Not valid for the ports collection.
RELENG_3_0_0_RELEASE
FreeBSD-3.0. Not valid for the ports collection.
RELENG_2_2_8_RELEASE
FreeBSD-2.2.8. Not valid for the ports collection.
RELENG_2_2_7_RELEASE
FreeBSD-2.2.7. Not valid for the ports collection.
RELENG_2_2_6_RELEASE
FreeBSD-2.2.6. Not valid for the ports collection.
RELENG_2_2_5_RELEASE
FreeBSD-2.2.5. Not valid for the ports collection.
RELENG_2_2_2_RELEASE
FreeBSD-2.2.2. Not valid for the ports collection.
RELENG_2_2_1_RELEASE
FreeBSD-2.2.1. Not valid for the ports collection.
428
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
RELENG_2_2_0_RELEASE
FreeBSD-2.2.0. Not valid for the ports collection.
RELENG_2_1_7_RELEASE
FreeBSD-2.1.7. Not valid for the ports collection.
RELENG_2_1_6_1_RELEASE
FreeBSD-2.1.6.1. Not valid for the ports collection.
RELENG_2_1_6_RELEASE
FreeBSD-2.1.6. Not valid for the ports collection.
RELENG_2_1_5_RELEASE
FreeBSD-2.1.5. Not valid for the ports collection.
RELENG_2_1_0_RELEASE
FreeBSD-2.1.0. Not valid for the ports collection.
When you specify a branch tag, you normally receive the latest versions of the files on that line of
development. If you wish to receive some past version, you can do so by specifying a date with the -D
date flag. See the cvs(1) man page for more details.
Examples
While it really is recommended that you read the manual page for cvs(1) thoroughly before doing
anything, here are some quick examples which essentially show how to use Anonymous CVS:
Example 18-1. Checking out something from -current (ls(1)) and deleting it again:
Example 18-2. Checking out the version of ls(1) in the 2.2-stable branch:
429
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
% cvs release -d ls
Example 18-4. Finding out what other module names can be used:
Other Resources
The following additional resources may be helpful in learning CVS:
CTM
Contributed by Poul-Henning Kamp <[email protected] >. Updated 19-October-1997.
CTM is a method for keeping a remote directory tree in sync with a central one. It has been developed
for usage with FreeBSDs source trees, though other people may find it useful for other purposes as time
goes by. Little, if any, documentation currently exists at this time on the process of creating deltas, so
talk to Poul-Henning Kamp <[email protected]> for more information should you wish to use CTM
for other things.
430
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
connectivity, or simply wish to have the changes automatically sent to you, CTM was made for you. You
will need to obtain up to three deltas per day for the most active branches. However, you should consider
having them sent by automatic email. The sizes of the updates are always kept as small as possible. This
is typically less than 5K, with an occasional (one in ten) being 10-50K and every now and then a biggie
of 100K+ or more coming around.
You will also need to make yourself aware of the various caveats related to working directly from the
development sources rather than a pre-packaged release. This is particularly true if you choose the
current sources. It is recommended that you read Staying current with FreeBSD.
If you are running a pre-2.0 version of FreeBSD, you can fetch the current CTM sources directly from:
ftp://ftp.FreeBSD.org/pub/FreeBSD/FreeBSD-current/src/usr.sbin/ctm
The deltas you feed CTM can be had two ways, FTP or e-mail. If you have general FTP access to the
Internet then the following FTP sites support access to CTM:
ftp://ftp.FreeBSD.org/pub/FreeBSD/CTM
or see section mirrors.
FTP the relevant directory and fetch the README file, starting from there.
If you may wish to get your deltas via email:
Send email to <[email protected]> to subscribe to one of the CTM distribution lists.
ctm-cvs-cur supports the entire cvs tree. ctm-src-cur supports the head of the development branch.
ctm-src-2_2 supports the 2.2 release branch, etc. (If you do not know how to subscribe yourself using
majordomo, send a message first containing the word help it will send you back usage instructions.)
When you begin receiving your CTM updates in the mail, you may use the ctm_rmail program to
unpack and apply them. You can actually use the ctm_rmail program directly from a entry in
/etc/aliases if you want to have the process run in a fully automated fashion. Check the ctm_rmail
man page for more details.
Note: No matter what method you use to get the CTM deltas, you should subscribe to the
<[email protected]> mailing list. In the future, this will be the only place where
announcements concerning the operations of the CTM system will be posted. Send an email to
<[email protected]> with a single line of subscribe ctm-announce to get added to the list.
431
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
# cd /where/ever/you/want/the/stuff
# ctm -v -v /where/you/store/your/deltas/src-xxx.*
CTM understands deltas which have been put through gzip, so you do not need to gunzip them first,
this saves disk space.
Unless it feels very secure about the entire process, CTM will not touch your tree. To verify a delta you
can also use the -c flag and CTM will not actually touch your tree; it will merely verify the integrity of
the delta and see if it would apply cleanly to your current tree.
There are other options to CTM as well, see the manual pages or look in the sources for more
information.
I would also be very happy if somebody could help with the user interface portions, as I have realized
that I cannot make up my mind on what options should do what, how and when...
Thats really all there is to it. Every time you get a new delta, just run it through CTM to keep your
sources up to date.
432
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
Do not remove the deltas if they are hard to download again. You just might want to keep them around in
case something bad happens. Even if you only have floppy disks, consider using fdwrite to make a
copy.
This behaviour gives us a simple way to maintain local changes: simply copy the files you plan to
modify to the corresponding file names with a .ctm suffix. Then you can freely hack the code, while
CTM keeps the .ctm file up-to-date.
433
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
# cd /where/ever/you/want/to/extract/it/
# ctm -e ^lib/libc/Makefile ~ctm/src-xxx.*
For every file specified in a CTM delta, the -e and -x options are applied in the order given on the
command line. The file is processed by CTM only if it is marked as eligible after all the -e and -x
options are applied to it.
Use some kind of authentication into the CTM system, so as to allow detection of spoofed CTM
updates.
Clean up the options to CTM, they became confusing and counter intuitive.
The bad news is that I am very busy, so any help in doing this will be most welcome. And do not forget
to tell me what you want also...
Miscellaneous stuff
All the DES infected (e.g. export controlled) source is not included. You will get the international
version only. If sufficient interest appears, we will set up a sec-cur sequence too. There is a sequence
of deltas for the ports collection too, but interest has not been all that high yet. Tell me if you want an
email list for that too and we will consider setting it up.
Thanks!
Stephen McKay
wrote ctm_[rs]mail, much appreciated.
434
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
CVSup
Contributed by John Polstra <[email protected] >.
Introduction
CVSup is a software package for distributing and updating source trees from a master CVS repository on
a remote server host. The FreeBSD sources are maintained in a CVS repository on a central development
machine in California. With CVSup, FreeBSD users can easily keep their own source trees up to date.
CVSup uses the so-called pull model of updating. Under the pull model, each client asks the server for
updates, if and when they are wanted. The server waits passively for update requests from its clients.
Thus all updates are instigated by the client. The server never sends unsolicited updates. Users must
either run the CVSup client manually to get an update, or they must set up a cron job to run it
automatically on a regular basis.
The term CVSup, capitalized just so, refers to the entire software package. Its main components are the
client cvsup which runs on each users machine, and the server cvsupd which runs at each of the
FreeBSD mirror sites.
As you read the FreeBSD documentation and mailing lists, you may see references to sup. Sup was the
predecessor of CVSup, and it served a similar purpose. CVSup is in used in much the same way as sup
and, in fact, uses configuration files which are backward-compatible with sups. Sup is no longer used in
the FreeBSD project, because CVSup is both faster and more flexible.
Installation
The easiest way to install CVSup if you are running FreeBSD 2.2 or later is to use either the port
(ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/ports-current/net/cvsup.tar) from the FreeBSD ports
collection or the corresponding binary package
(ftp://ftp.FreeBSD.org/pub/FreeBSD/packages-current/net/cvsup-16.0.tgz), depending on whether you
prefer to roll your own or not.
435
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
If you are running FreeBSD-2.1.6 or 2.1.7, you unfortunately cannot use the binary package versions due
to the fact that they require a version of the C library that does not yet exist in FreeBSD-2.1.{6,7}. You
can easily use the port (ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/ports-current/net/cvsup.tar), however,
just as with FreeBSD 2.2. Simply unpack the tar file, cd to the cvsup subdirectory and type make
install.
CVSup Configuration
CVSups operation is controlled by a configuration file called the supfile. Beginning with
FreeBSD-2.2, there are some sample supfiles in the directory /usr/share/examples/cvsup
(file:/usr/share/examples/cvsup). These examples are also available from
436
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
437
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
USA or Canada. Then we can get the cryptography code with one additional collection, cvs-crypto.
As a first step toward constructing our supfile, we simply list these collections, one per line:
src-all
cvs-crypto
Warning: Be very careful to specify any tag= fields correctly. Some tags are valid only for certain
collections of files. If you specify an incorrect or misspelled tag, CVSup will delete files which you
probably do not want deleted. In particular, use only tag=. for the ports-* collections.
The tag= field names a symbolic tag in the repository. There are two kinds of tags, revision tags and
branch tags. A revision tag refers to a specific revision. Its meaning stays the same from day to day. A
branch tag, on the other hand, refers to the latest revision on a given line of development, at any given
time. Because a branch tag does not refer to a specific revision, it may mean something different
tomorrow than it means today.
Here are the branch tags that users might be interested in:
tag=.
The main line of development, also known as FreeBSD-current.
Note: The . is not punctuation; it is the name of the tag. Valid for all collections.
RELENG_3
The line of development for FreeBSD-3.x, also known as FreeBSD-stable. Not valid for the ports
collection.
RELENG_2_2
The line of development for FreeBSD-2.2.x, also known as 2.2-stable. Not valid for the ports
collection.
438
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
tag=RELENG_2_1_0
The line of development for FreeBSD-2.1.x - this branch is largely obsolete. Not valid for the
ports-* collections.
Here are the revision tags that users might be interested in:
tag=RELENG_3_2_0_RELEASE
FreeBSD-3.2. Not valid for the ports-* collections.
tag=RELENG_3_1_0_RELEASE
FreeBSD-3.1. Not valid for the ports-* collections.
tag=RELENG_3_0_0_RELEASE
FreeBSD-3.0. Not valid for the ports-* collections.
tag=RELENG_2_2_8_RELEASE
FreeBSD-2.2.8. Not valid for the ports-* collections.
tag=RELENG_2_2_7_RELEASE
FreeBSD-2.2.7. Not valid for the ports-* collections.
tag=RELENG_2_2_6_RELEASE
FreeBSD-2.2.6. Not valid for the ports-* collections.
tag=RELENG_2_2_5_RELEASE
FreeBSD-2.2.5. Not valid for the ports-* collections.
tag=RELENG_2_2_2_RELEASE
FreeBSD-2.2.2. Not valid for the ports-* collections.
tag=RELENG_2_2_1_RELEASE
FreeBSD-2.2.1. Not valid for the ports-* collections.
439
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
tag=RELENG_2_2_0_RELEASE
FreeBSD-2.2.0. Not valid for the ports-* collections.
tag=RELENG_2_1_7_RELEASE
FreeBSD-2.1.7. Not valid for the ports-* collections.
tag=RELENG_2_1_6_1_RELEASE
FreeBSD-2.1.6.1. Not valid for the ports-* collections.
tag=RELENG_2_1_6_RELEASE
FreeBSD-2.1.6. Not valid for the ports-* collections.
tag=RELENG_2_1_5_RELEASE
FreeBSD-2.1.5. Not valid for the ports-* collections.
tag=RELENG_2_1_0_RELEASE
FreeBSD-2.1.0. Not valid for the ports-* collections.
Warning: Be very careful to type the tag name exactly as shown. CVSup cannot distinguish
between valid and invalid tags. If you misspell the tag, CVSup will behave as though you had
specified a valid tag which happens to refer to no files at all. It will delete your existing sources in
that case.
When you specify a branch tag, you normally receive the latest versions of the files on that line of
development. If you wish to receive some past version, you can do so by specifying a date with the
date= value field. The cvsup(1) manual page explains how to do that.
For our example, we wish to receive FreeBSD-current. We add this line at the beginning of our
supfile:
*default tag=.
There is an important special case that comes into play if you specify neither a tag= field nor a date=
field. In that case, you receive the actual RCS files directly from the servers CVS repository, rather
than receiving a particular version. Developers generally prefer this mode of operation. By
maintaining a copy of the repository itself on their systems, they gain the ability to browse the revision
histories and examine past versions of files. This gain is achieved at a large cost in terms of disk space,
however.
440
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
This setting is used by default if it is not specified in the supfile, so we actually do not need the
above line.
If your base directory does not already exist, now would be a good time to create it. The cvsup client
will refuse to run if the base directory does not exist.
release=cvs indicates that the server should get its information out of the main FreeBSD CVS
repository. This is virtually always the case, but there are other possibilities which are beyond the
scope of this discussion.
delete gives CVSup permission to delete files. You should always specify this, so that CVSup can
keep your source tree fully up to date. CVSup is careful to delete only those files for which it is
responsible. Any extra files you happen to have will be left strictly alone.
use-rel-suffix is ... arcane. If you really want to know about it, see the cvsup(1) manual page.
Otherwise, just specify it and do not worry about it.
441
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
compress enables the use of gzip-style compression on the communication channel. If your network
link is T1 speed or faster, you probably should not use compression. Otherwise, it helps substantially.
src-all
cvs-crypto
Running CVSup
You are now ready to try an update. The command line for doing this is quite simple:
# cvsup supfile
where supfile is of course the name of the supfile you have just created. Assuming you are running
under X11, cvsup will display a GUI window with some buttons to do the usual things. Press the go
button, and watch it run.
Since you are updating your actual /usr/src tree in this example, you will need to run the program as
root so that cvsup has the permissions it needs to update your files. Having just created your
configuration file, and having never used this program before, that might understandably make you
nervous. There is an easy way to do a trial run without touching your precious files. Just create an empty
directory somewhere convenient, and name it as an extra argument on the command line:
# mkdir /var/tmp/dest
# cvsup supfile /var/tmp/dest
The directory you specify will be used as the destination directory for all file updates. CVSup will
examine your usual files in /usr/src, but it will not modify or delete any of them. Any file updates will
instead land in /var/tmp/dest/usr/src. CVSup will also leave its base directory status files
untouched when run this way. The new versions of those files will be written into the specified directory.
As long as you have read access to /usr/src, you do not even need to be root to perform this kind of
trial run.
If you are not running X11 or if you just do not like GUIs, you should add a couple of options to the
command line when you run cvsup:
442
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
# cvsup -g -L 2 supfile
The -g tells cvsup not to use its GUI. This is automatic if you are not running X11, but otherwise you
have to specify it.
The -L 2 tells cvsup to print out the details of all the file updates it is doing. There are three levels of
verbosity, from -L 0 to -L 2. The default is 0, which means total silence except for error messages.
There are plenty of other options available. For a brief list of them, type cvsup -H. For more detailed
descriptions, see the manual page.
Once you are satisfied with the way updates are working, you can arrange for regular runs of cvsup using
cron(8). Obviously, you should not let cvsup use its GUI when running it from cron.
cvs-all release=cvs
The main FreeBSD CVS repository, excluding the export-restricted cryptography code.
distrib release=cvs
doc-all release=cvs
ports-all release=cvs
ports-archivers release=cvs
Archiving tools.
443
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
ports-astro release=cvs
Astronomical ports.
ports-audio release=cvs
Sound support.
ports-base release=cvs
Miscellaneous files at the top of /usr/ports.
ports-benchmarks release=cvs
Benchmarks.
ports-biology release=cvs
Biology.
ports-cad release=cvs
Computer aided design tools.
ports-chinese release=cvs
Chinese language support.
ports-comms release=cvs
Communication software.
ports-converters release=cvs
character code converters.
ports-databases release=cvs
Databases.
ports-deskutils release=cvs
Things that used to be on the desktop before computers were invented.
444
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
ports-devel release=cvs
Development utilities.
ports-editors release=cvs
Editors.
ports-emulators release=cvs
Emulators for other operating systems.
ports-ftp release=cvs
ports-games release=cvs
Games.
ports-german release=cvs
German language support.
ports-graphics release=cvs
Graphics utilities.
ports-japanese release=cvs
Japanese language support.
ports-korean release=cvs
Korean language support.
ports-lang release=cvs
Programming languages.
ports-mail release=cvs
Mail software.
445
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
ports-math release=cvs
Numerical computation software.
ports-mbone release=cvs
MBone applications.
ports-misc release=cvs
Miscellaneous utilities.
ports-net release=cvs
Networking software.
ports-news release=cvs
ports-palm release=cvs
Software support for 3Com Palm(tm) series.
ports-plan9 release=cvs
Various programs from Plan9.
ports-print release=cvs
Printing software.
ports-russian release=cvs
Russian language support.
ports-security release=cvs
Security utilities.
ports-shells release=cvs
446
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
ports-sysutils release=cvs
System utilities.
ports-textproc release=cvs
ports-vietnamese release=cvs
Vietnamese language support.
ports-www release=cvs
ports-x11 release=cvs
ports-x11-clocks release=cvs
X11 clocks.
ports-x11-fm release=cvs
X11 file managers.
ports-x11-fonts release=cvs
X11 fonts and font utilities.
ports-x11-toolkits release=cvs
X11 toolkits.
ports-x11-wm
src-all release=cvs
447
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
src-base release=cvs
Miscellaneous files at the top of /usr/src.
src-bin release=cvs
src-contrib release=cvs
Utilities and libraries from outside the FreeBSD project, used relatively unmodified
(/usr/src/contrib).
src-etc release=cvs
src-games release=cvs
Games (/usr/src/games).
src-gnu release=cvs
src-include release=cvs
src-kerberosIV release=cvs
src-lib release=cvs
Libraries (/usr/src/lib).
src-libexec release=cvs
src-release release=cvs
448
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
src-sbin release=cvs
System utilities for single-user mode (/usr/src/sbin).
src-share release=cvs
src-sys release=cvs
The kernel (/usr/src/sys).
src-tools release=cvs
src-usrbin release=cvs
src-usrsbin release=cvs
System utilities (/usr/src/usr.sbin).
www release=cvs
cvs-crypto release=cvs
src-crypto release=cvs
Export-restricted utilities and libraries from outside the FreeBSD project, used relatively
unmodified (/usr/src/crypto).
src-eBones release=cvs
src-secure release=cvs
DES (/usr/src/secure).
449
Chapter 18. The Cutting Edge: FreeBSD-current and FreeBSD-stable
distrib release=self
The CVSup servers own configuration files. Used by CVSup mirror sites.
gnats release=current
mail-archive release=current
FreeBSD mailing list archive.
www release=current
The installed World Wide Web data. Used by WWW mirror sites.
Currently, the best source of information on how to do that is a tutorial available from
http://www.nothing-going-on.demon.co.uk/FreeBSD/make-world/make-world.html.
A successor to this tutorial will be integrated into the handbook.
450
Chapter 19. Contributing to FreeBSD
Contributed by Jordan K. Hubbard <[email protected] >.
So you want to contribute something to FreeBSD? That is great! We can always use the help, and
FreeBSD is one of those systems that relies on the contributions of its user base in order to survive. Your
contributions are not only appreciated, they are vital to FreeBSDs continued growth!
Contrary to what some people might also have you believe, you do not need to be a hot-shot programmer
or a close personal friend of the FreeBSD core team in order to have your contributions accepted. The
FreeBSD Projects development is done by a large and growing number of international contributors
whose ages and areas of technical expertise vary greatly, and there is always more work to be done than
there are people available to do it.
Since the FreeBSD project is responsible for an entire operating system environment (and its installation)
rather than just a kernel or a few scattered utilities, our TODO list also spans a very wide range of tasks,
from documentation, beta testing and presentation to highly specialized types of kernel development. No
matter what your skill level, there is almost certainly something you can do to help the project!
Commercial entities engaged in FreeBSD-related enterprises are also encouraged to contact us. Need a
special extension to make your product work? You will find us receptive to your requests, given that they
are not too outlandish. Working on a value-added product? Please let us know! We may be able to work
cooperatively on some aspect of it. The free software world is challenging a lot of existing assumptions
about how software is developed, sold, and maintained throughout its life cycle, and we urge you to at
least give it a second look.
What Is Needed
The following list of tasks and sub-projects represents something of an amalgam of the various core team
TODO lists and user requests we have collected over the last couple of months. Where possible, tasks
have been ranked by degree of urgency. If you are interested in working on one of the tasks you see here,
send mail to the coordinator listed by clicking on their names. If no coordinator has been appointed,
maybe you would like to volunteer?
451
Chapter 19. Contributing to FreeBSD
1. 3-stage boot issues. Overall coordination: FreeBSD technical discussions mailing list
<[email protected]>
Do WinNT compatible drive tagging so that the 3rd stage can provide an accurate mapping of
BIOS geometries for disks.
3. Implement Int13 vm86 disk driver. Coordinator: FreeBSD technical discussions mailing list
<[email protected]>
4. New bus architecture. Coordinator: New Bus Architecture mailing list
<[email protected]>
Build something like Tripwire(TM) into the kernel, with a remote and local part. There are a
number of cryptographic issues to getting this right; contact the coordinator for details.
Coordinator: Eivind Eklund <[email protected]>
Make the entire kernel use suser() instead of comparing to 0. It is presently using about half of
each. Coordinator: Eivind Eklund <[email protected]>
452
Chapter 19. Contributing to FreeBSD
Split securelevels into different parts, to allow an administrator to throw away those privileges he
can throw away. Setting the overall securelevel needs to have the same effect as now, obviously.
Coordinator: Eivind Eklund <[email protected]>
Make it possible to upload a list of allowed program to BPF, and then block BPF from
accepting other programs. This would allow BPF to be used e.g. for DHCP, without allowing an
attacker to start snooping the local network.
Update the security checker script. We should at least grab all the checks from the other BSD
derivatives, and add checks that a system with securelevel increased also have reasonable flags on
the relevant parts. Coordinator: Eivind Eklund <[email protected]>
Add authorization infrastructure to the kernel, to allow different authorization policies. Part of this
could be done by modifying suser(). Coordinator: Eivind Eklund <[email protected]>
Add code to the NFS layer so that you cannot chdir("..") out of an NFS partition. E.g., /usr
is a UFS partition with /usr/src NFS exported. Now it is possible to use the NFS filehandle for
/usr/src to get access to /usr.
Write a configuration manager (in the 3rd stage boot?) that probes your hardware in a sane
manner, keeps only the KLDs required for your hardware, etc.
Documentation!
Reliable operation of the pcic driver (needs testing).
Recognizer and handler for sio.c (mostly done).
Recognizer and handler for ed.c (mostly done).
Recognizer and handler for ep.c (mostly done).
User-mode recognizer and handler (partially done).
453
Chapter 19. Contributing to FreeBSD
1. NetWare Server (protected mode ODI driver) loader and subservices to allow the use of ODI card
drivers supplied with network cards. The same thing for NDIS drivers and NetWare SCSI drivers.
2. An "upgrade system" option that works on Linux boxes instead of just previous rev FreeBSD boxes.
3. Symmetric Multiprocessing with kernel preemption (requires kernel preemption).
4. A concerted effort at support for portable computers. This is somewhat handled by changing
PCMCIA bridging rules and power management event handling. But there are things like detecting
internal vs. external display and picking a different screen resolution based on that fact, not spinning
down the disk if the machine is in dock, and allowing dock-based cards to disappear without
affecting the machines ability to boot (same issue for PCMCIA).
Smaller tasks
Most of the tasks listed in the previous sections require either a considerable investment of time or an
in-depth knowledge of the FreeBSD kernel (or both). However, there are also many useful tasks which
are suitable for "weekend hackers", or people without programming skills.
1. If you run FreeBSD-current and have a good Internet connection, there is a machine
current.FreeBSD.org which builds a full release once a day every now and again, try and
install the latest release from it and report any failures in the process.
2. Read the freebsd-bugs mailing list. There might be a problem you can comment constructively on or
with patches you can test. Or you could even try to fix one of the problems yourself.
3. Read through the FAQ and Handbook periodically. If anything is badly explained, out of date or
even just completely wrong, let us know. Even better, send us a fix (SGML is not difficult to learn,
454
Chapter 19. Contributing to FreeBSD
455
Chapter 19. Contributing to FreeBSD
How to Contribute
Contributions to the system generally fall into one or more of the following 6 categories:
456
Chapter 19. Contributing to FreeBSD
for the convenience of developers working actively on the system. See Staying current with FreeBSD for
more information about getting and using FreeBSD-current.
Working from older sources unfortunately means that your changes may sometimes be too obsolete or
too divergent for easy re-integration into FreeBSD. Chances of this can be minimized somewhat by
subscribing to the FreeBSD announcements mailing list <[email protected]> and the
FreeBSD-current mailing list <[email protected]> lists, where discussions on the
current state of the system take place.
Assuming that you can manage to secure fairly up-to-date sources to base your changes on, the next step
is to produce a set of diffs to send to the FreeBSD maintainers. This is done with the diff(1) command,
with the context diff form being preferred. For example:
or
would generate such a set of context diffs for the given source file or directory hierarchy. See the man
page for diff(1) for more details.
Once you have a set of diffs (which you may test with the patch(1) command), you should submit them
for inclusion with FreeBSD. Use the send-pr(1) program as described in Bug Reports and General
Commentary. Do not just send the diffs to the FreeBSD technical discussions mailing list
<[email protected]> or they will get lost! We greatly appreciate your submission (this
is a volunteer project!); because we are busy, we may not be able to address it immediately, but it will
remain in the pr database until we do.
If you feel it appropriate (e.g. you have added, deleted, or renamed files), bundle your changes into a tar
file and run the uuencode(1) program on it. Shar archives are also welcome.
If your change is of a potentially sensitive nature, e.g. you are unsure of copyright issues governing its
further distribution or you are simply not ready to release it without a tighter review first, then you should
send it to FreeBSD core team <[email protected]> directly rather than submitting it with
send-pr(1). The core mailing list reaches a much smaller group of people who do much of the day-to-day
work on FreeBSD. Note that this group is also very busy and so you should only send mail to them where
it is truly necessary.
Please refer to man 9 intro and man 9 style for some information on coding style. We would
appreciate it if you were at least aware of this information before submitting code.
457
Chapter 19. Contributing to FreeBSD
1. The BSD copyright. This copyright is most preferred due to its no strings attached nature and
general attractiveness to commercial enterprises. Far from discouraging such commercial use, the
FreeBSD Project actively encourages such participation by commercial interests who might
eventually be inclined to invest something of their own into FreeBSD.
2. The GNU Public License, or GPL. This license is not quite as popular with us due to the amount
of extra effort demanded of anyone using the code for commercial purposes, but given the sheer
quantity of GPLd code we currently require (compiler, assembler, text formatter, etc) it would be
silly to refuse additional contributions under this license. Code under the GPL also goes into a
different part of the tree, that being /sys/gnu or /usr/src/gnu, and is therefore easily
identifiable to anyone for whom the GPL presents a problem.
Contributions coming under any other type of copyright must be carefully reviewed before their
inclusion into FreeBSD will be considered. Contributions for which particularly restrictive commercial
copyrights apply are generally rejected, though the authors are always encouraged to make such changes
available through their own channels.
To place a BSD-style copyright on your work, include the following text at the very beginning of every
source code file you wish to protect, replacing the text between the %% with the appropriate information.
458
Chapter 19. Contributing to FreeBSD
$Id$
Donating funds
While the FreeBSD Project is not a 501(c)(3) (charitable) corporation and hence cannot offer special tax
incentives for any donations made, any such donations will be gratefully accepted on behalf of the
project by FreeBSD, Inc.
FreeBSD, Inc. was founded in early 1995 by Jordan K. Hubbard <[email protected]> and David
Greenman <[email protected]> with the goal of furthering the aims of the FreeBSD Project and giving
it a minimal corporate presence. Any and all funds donated (as well as any profits that may eventually be
realized by FreeBSD, Inc.) will be used exclusively to further the projects goals.
Please make any checks payable to FreeBSD, Inc., sent in care of the following address:
FreeBSD, Inc.
c/o Jordan Hubbard
4041 Pike Lane, Suite F
Concord
CA, 94520
(currently using the Walnut Creek CDROM address until a PO box can be opened)
Wire transfers may also be sent directly to:
459
Chapter 19. Contributing to FreeBSD
Bank Of America
Concord Main Office
P.O. Box 37176
San Francisco
CA, 94137-5176
Routing #: 121-000-358
Account #: 01411-07441 (FreeBSD, Inc.)
Donating hardware
Donations of hardware in any of the 3 following categories are also gladly accepted by the FreeBSD
Project:
General purpose hardware such as disk drives, memory or complete systems should be sent to the
FreeBSD, Inc. address listed in the donating funds section.
Hardware for which ongoing compliance testing is desired. We are currently trying to put together a
testing lab of all components that FreeBSD supports so that proper regression testing can be done with
each new release. We are still lacking many important pieces (network cards, motherboards, etc) and if
you would like to make such a donation, please contact David Greenman <[email protected]> for
information on which items are still required.
Hardware currently unsupported by FreeBSD for which you would like to see such support added.
Please contact the FreeBSD core team <[email protected]> before sending such items
as we will need to find a developer willing to take on the task before we can accept delivery of new
hardware.
460
Chapter 19. Contributing to FreeBSD
Donors Gallery
The FreeBSD Project is indebted to the following donors and would like to publically thank them here!
Direct funding:
The following individuals and businesses have generously contributed direct funding to the project:
461
Chapter 19. Contributing to FreeBSD
Laser5 (http://www.cdrom.co.jp/) of Japan (a portion of the profits from sales of their various
FreeBSD CD-ROMs.
Fuki Shuppan Publishing Co. (http://www.mmjp.or.jp/fuki/) donated a portion of their profits from
Hajimete no FreeBSD (FreeBSD, Getting started) to the FreeBSD and XFree86 projects.
ASCII Corp. (http://www.ascii.co.jp/) donated a portion of their profits from several
FreeBSD-related books to the FreeBSD project.
Yokogawa Electric Corp (http://www.yokogawa.co.jp/) has generously donated significant funding
to the FreeBSD project.
BuffNET (http://www.buffnet.net/)
Pacific Solutions (http://www.pacificsolutions.com/)
Siemens AG (http://www.siemens.de/) via Andre Albsmeier
(mailto:[email protected])
Chris Silva (mailto:[email protected])
Hardware contributors:
The following individuals and businesses have generously contributed hardware for testing and device
driver development/support:
Walnut Creek CDROM for providing the Pentium P5-90 and 486/DX2-66 EISA/VL systems that
are being used for our development work, to say nothing of the network access and other donations
of hardware resources.
TRW Financial Systems, Inc. provided 130 PCs, three 68 GB fileservers, twelve Ethernets, two
routers and an ATM switch for debugging the diskless code.
Dermot McDonnell donated the Toshiba XM3401B CDROM drive currently used in freefall.
Chuck Robey <[email protected]> contributed his floppy tape streamer for experimental
work.
Larry Altneu <[email protected]>, and Wilko Bulte <[email protected]>, provided Wangtek
and Archive QIC-02 tape drives in order to improve the wt driver.
Ernst Winter <[email protected]> contributed a 2.88 MB floppy drive to the project. This
will hopefully increase the pressure for rewriting the floppy disk driver. ;-)
Tekram Technologies (http://www.tekram.com) sent one each of their DC-390, DC-390U and
DC-390F FAST and ULTRA SCSI host adapter cards for regression testing of the NCR and AMD
drivers with their cards. They are also to be applauded for making driver sources for free operating
systems available from their FTP server ftp://ftp.tekram.com/scsi/FreeBSD.
462
Chapter 19. Contributing to FreeBSD
<Larry M. Augustin> contributed not only a Symbios Sym8751S SCSI card, but also a set of
data books, including one about the forthcoming Sym53c895 chip with Ultra-2 and LVD support,
and the latest programming manual with information on how to safely use the advanced features of
the latest Symbios SCSI chips. Thanks a lot!
Christoph Kukulies <[email protected]> donated an FX120 12 speed Mitsumi CDROM drive
for IDE CDROM driver development.
Special contributors:
Walnut Creek CDROM (http://www.cdrom.com) has donated almost more than we can say (see the
history document for more details). In particular, we would like to thank them for the original
hardware used for freefall.FreeBSD.org, our primary development machine, and for
thud.FreeBSD.org, a testing and build box. We are also indebted to them for funding various
contributors over the years and providing us with unrestricted use of their T1 connection to the
Internet.
The interface business GmbH, Dresden (http://www.interface-business.de) has been patiently
supporting Jrg Wunsch <[email protected]> who has often preferred FreeBSD work over
paywork, and used to fall back to their (quite expensive) EUnet Internet connection whenever his
private connection became too slow or flakey to work with it...
Berkeley Software Design, Inc. (http://www.bsdi.com) has contributed their DOS emulator code to
the remaining BSD world, which is used in the doscmd command.
463
Chapter 19. Contributing to FreeBSD
464
Chapter 19. Contributing to FreeBSD
465
Chapter 19. Contributing to FreeBSD
466
Chapter 19. Contributing to FreeBSD
467
Chapter 19. Contributing to FreeBSD
468
Chapter 19. Contributing to FreeBSD
469
Chapter 19. Contributing to FreeBSD
470
Chapter 19. Contributing to FreeBSD
471
Chapter 19. Contributing to FreeBSD
472
Chapter 19. Contributing to FreeBSD
473
Chapter 19. Contributing to FreeBSD
474
Chapter 19. Contributing to FreeBSD
475
Chapter 19. Contributing to FreeBSD
476
Chapter 19. Contributing to FreeBSD
477
Chapter 19. Contributing to FreeBSD
478
Chapter 19. Contributing to FreeBSD
479
Chapter 19. Contributing to FreeBSD
480
Chapter 19. Contributing to FreeBSD
481
Chapter 19. Contributing to FreeBSD
482
Chapter 19. Contributing to FreeBSD
483
Chapter 19. Contributing to FreeBSD
484
Chapter 19. Contributing to FreeBSD
485
Chapter 19. Contributing to FreeBSD
486
Chapter 19. Contributing to FreeBSD
487
Chapter 19. Contributing to FreeBSD
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
488
Chapter 19. Contributing to FreeBSD
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected] [email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
No Name <[email protected]>
Nobuhiro Yasutomi <[email protected]>
Nobuyuki Koganemaru <[email protected]>
Norio Suzuki <[email protected]>
Noritaka Ishizumi <[email protected]>
Noriyuki Soda <[email protected]>
Oh Junseon <[email protected]>
489
Chapter 19. Contributing to FreeBSD
490
Chapter 19. Contributing to FreeBSD
491
Chapter 19. Contributing to FreeBSD
492
Chapter 19. Contributing to FreeBSD
493
Chapter 19. Contributing to FreeBSD
494
Chapter 19. Contributing to FreeBSD
495
Chapter 19. Contributing to FreeBSD
496
Chapter 19. Contributing to FreeBSD
497
Chapter 19. Contributing to FreeBSD
498
Chapter 19. Contributing to FreeBSD
499
Chapter 19. Contributing to FreeBSD
Yarema <[email protected]>
Yaroslav Terletsky <[email protected]>
Yasuhito FUTATSUKI <[email protected]>
Yasuhiro Fukama <[email protected]>
Yen-Shuo Su <[email protected]>
Ying-Chieh Liao <[email protected]>
Yixin Jin <[email protected]>
Yoshiaki Uchikawa <[email protected]>
Yoshihiko OHTA <[email protected]>
Yoshihisa NAKAGAWA <[email protected]>
Yoshikazu Goto <[email protected]>
Yoshimasa Ohnishi <[email protected]>
Yoshishige Arai <[email protected]>
Yuichi MATSUTAKA <[email protected]>
Yujiro MIYATA <[email protected]>
Yukihiro Nakai <[email protected]>
Yusuke Nawano <[email protected]>
Yuu Yashiki <[email protected]>
Yuval Yarom <[email protected]>
Yves Fonk <[email protected]>
Yves Fonk <[email protected]>
Zach Heilig <[email protected]>
Zahemszhky Gabor <[email protected]>
Zhong Ming-Xun <[email protected]>
arci <[email protected]>
der Mouse <[email protected]>
frf <[email protected]>
Ege Rekk <[email protected]>
500
Chapter 19. Contributing to FreeBSD
501
Chapter 19. Contributing to FreeBSD
502
Chapter 19. Contributing to FreeBSD
503
Chapter 19. Contributing to FreeBSD
504
Chapter 20. Source Tree Guidelines and
Policies
Contributed by Poul-Henning Kamp <[email protected] >.
This chapter documents various guidelines and policies in force for the FreeBSD source tree.
MAINTAINER on Makefiles
June 1996.
If a particular portion of the FreeBSD distribution is being maintained by a person or group of persons,
they can communicate this fact to the world by adding a
MAINTAINER= email-addresses
Contributed Software
Contributed by Poul-Henning Kamp <[email protected] > and David OBrien
<[email protected] >.
June 1996.
Some parts of the FreeBSD distribution consist of software that is actively being maintained outside the
FreeBSD project. For historical reasons, we call this contributed software. Some examples are perl, gcc
505
Chapter 20. Source Tree Guidelines and Policies
and patch.
Over the last couple of years, various methods have been used in dealing with this type of software and
all have some number of advantages and drawbacks. No clear winner has emerged.
Since this is the case, after some debate one of these methods has been selected as the official method
and will be required for future imports of software of this kind. Furthermore, it is strongly suggested that
existing contributed software converge on this model over time, as it has significant advantages over the
old method, including the ability to easily obtain diffs relative to the official versions of the source by
everyone (even without cvs access). This will make it significantly easier to return changes to the
primary developers of the contributed software.
Ultimately, however, it comes down to the people actually doing the work. If using this model is
particularly unsuited to the package being dealt with, exceptions to these rules may be granted only with
the approval of the core team and with the general consensus of the other developers. The ability to
maintain the package in the future will be a key issue in the decisions.
Note: Because of some unfortunate design limitations with the RCS file format and CVSs use of
vendor branches, minor, trivial and/or cosmetic changes are strongly discouraged on files that are
still tracking the vendor branch. Spelling fixes are explicitly included here under the cosmetic
category and are to be avoided for files with revision 1.1.x.x. The repository bloat impact from a
single character change can be rather dramatic.
The Tcl embedded programming language will be used as example of how this model works:
src/contrib/tcl contains the source as distributed by the maintainers of this package. Parts that are
entirely not applicable for FreeBSD can be removed. In the case of Tcl, the mac, win and compat
subdirectories were eliminated before the import
src/lib/libtcl contains only a "bmake style" Makefile that uses the standard bsd.lib.mk
makefile rules to produce the library and install the documentation.
src/usr.bin/tclsh contains only a bmake style Makefile which will produce and install the tclsh
program and its associated man-pages using the standard bsd.prog.mk rules.
src/tools/tools/tcl_bmake contains a couple of shell-scripts that can be of help when the tcl
software needs updating. These are not part of the built or installed software.
The important thing here is that the src/contrib/tcl directory is created according to the rules: It is
supposed to contain the sources as distributed (on a proper CVS vendor-branch and without RCS
keyword expansion) with as few FreeBSD-specific changes as possible. The easy-import tool on
freefall will assist in doing the import, but if there are any doubts on how to go about it, it is imperative
that you ask first and not blunder ahead and hope it works out. CVS is not forgiving of import
accidents and a fair amount of effort is required to back out major mistakes.
506
Chapter 20. Source Tree Guidelines and Policies
Because of the previously mentioned design limitations with CVSs vendor branches, it is required that
official patches from the vendor be applied to the original distributed sources and the result
re-imported onto the vendor branch again. Official patches should never be patched into the FreeBSD
checked out version and "committed", as this destroys the vendor branch coherency and makes importing
future versions rather difficult as there will be conflicts.
Since many packages contain files that are meant for compatibility with other architectures and
environments that FreeBSD, it is permissible to remove parts of the distribution tree that are of no
interest to FreeBSD in order to save space. Files containing copyright notices and release-note kind of
information applicable to the remaining files shall not be removed.
If it seems easier, the bmake Makefiles can be produced from the dist tree automatically by some
utility, something which would hopefully make it even easier to upgrade to a new version. If this is done,
be sure to check in such utilities (as necessary) in the src/tools directory along with the port itself so
that it is available to future maintainers.
In the src/contrib/tcl level directory, a file called FREEBSD-upgrade should be added and it
should states things like:
For the import of GNU cpio 2.4.2, the following files were removed:
507
Chapter 20. Source Tree Guidelines and Policies
2. Remove the files listed above and any others that dont apply to
FreeBSD.
To make local changes to cpio, simply patch and commit to the main
branch (aka HEAD). Never make local changes on the GNU branch.
Encumbered files
It might occasionally be necessary to include an encumbered file in the FreeBSD source tree. For
example, if a device requires a small piece of binary code to be loaded to it before the device will
operate, and we do not have the source to that code, then the binary file is said to be encumbered. The
following policies apply to including encumbered files in the FreeBSD source tree.
1. Any file which is interpreted or executed by the system CPU(s) and not in source format is
encumbered.
2. Any file with a license more restrictive than BSD or GNU is encumbered.
3. A file which contains downloadable binary data for use by the hardware is not encumbered, unless
(1) or (2) apply to it. It must be stored in an architecture neutral ASCII format (file2c or uuencoding
is recommended).
4. Any encumbered file requires specific approval from the Core team before it is added to the CVS
repository.
508
Chapter 20. Source Tree Guidelines and Policies
9. User-land files;
a. The Core team decides if the code should be part of make world.
b. The Release Engineer decides if it goes in to the release.
Shared Libraries
Contributed by Satoshi Asami <[email protected] >, Peter Wemm <[email protected] >, and
David OBrien <[email protected] > 9 December 1996.
If you are adding shared library support to a port or other piece of software that doesnt have one, the
version numbers should follow these rules. Generally, the resulting numbers will have nothing to do with
the release version of the software.
The three principles of shared library building are:
509
Chapter 20. Source Tree Guidelines and Policies
libfoo.so.3.3.3, the linker only records 3.3 in the headers, and will link with anything starting with
libfoo.so.3.(anything >= 3).(highest available).
Note: ld.so will always use the highest minor revision. Ie: it will use libc.so.2.2 in preference to
libc.so.2.0, even if the program was initially linked with libc.so.2.0.
For non-port libraries, it is also our policy to change the shared library version number only once
between releases. When you make a change to a system library that requires the version number to be
bumped, check the Makefiles commit logs. It is the responsibility of the committer to ensure that the
first such change since the release will result in the shared library version number in the Makefile to be
updated, and any subsequent changes will not.
510
Chapter 21. Adding New Kernel Configuration
Options
Contributed by Jrg Wunsch <[email protected] >
Note: You should be familiar with the section about kernel configuration before reading here.
#ifndef THIS_OPTION
#define THIS_OPTION (some_default_value)
#endif /* THIS_OPTION */
This way, an administrator mentioning another value for the option in his config file will take the default
out of effect, and replace it with his new value. Clearly, the new value will be substituted into the source
code during the preprocessor run, so it must be a valid C expression in whatever context the default value
would have been used.
It is also possible to create value-less options that simply enable or disable a particular piece of code by
embracing it in
#ifdef THAT_OPTION
#endif
511
Chapter 21. Adding New Kernel Configuration Options
Simply mentioning THAT_OPTION in the config file (with or without any value) will then turn on the
corresponding piece of code.
People familiar with the C language will immediately recognize that everything could be counted as a
config option where there is at least a single #ifdef referencing it... However, its unlikely that many
people would put
options notyet,notdef
in their config file, and then wonder why the kernel compilation falls over. :-)
Clearly, using arbitrary names for the options makes it very hard to track their usage throughout the
kernel source tree. That is the rationale behind the new-style option scheme, where each option goes into
a separate .h file in the kernel compile directory, which is by convention named opt_foo.h. This way,
the usual Makefile dependencies could be applied, and make can determine what needs to be recompiled
once an option has been changed.
The old-style option mechanism still has one advantage for local options or maybe experimental options
that have a short anticipated lifetime: since it is easy to add a new #ifdef to the kernel source, this has
already made it a kernel config option. In this case, the administrator using such an option is responsible
himself for knowing about its implications (and maybe manually forcing the recompilation of parts of his
kernel). Once the transition of all supported options has been done, config(8) will warn whenever an
unsupported option appears in the config file, but it will nevertheless include it into the kernel Makefile.
512
Chapter 21. Adding New Kernel Configuration Options
Finally, find out which kernel files depend on the new option. Unless you have just invented your option,
and it does not exist anywhere yet,
is your friend in finding them. Go and edit all those files, and add
#include "opt_foo.h"
on top, before all the #include <xxx.h> stuff. This sequence is most important as the options could
override defaults from the regular include files, if the defaults are of the form
513
Chapter 22. Kernel Debugging
Contributed by Paul Richards <[email protected] > and Jrg Wunsch <[email protected] >
Note: In the following, the term kgdb refers to gdb run in kernel debug mode. This can be
accomplished by either starting the gdb with the option -k, or by linking and starting it under the
name kgdb. This is not being done by default, however, and the idea is basically deprecated since
the GNU folks do not like their tools to behave differently when called by another name. This feature
may well be discontinued in further releases.
When the kernel has been built make a copy of it, say kernel.debug, and then run strip -g on the
original. Install the original as normal. You may also install the unstripped kernel, but symbol table
lookup time for some programs will drastically increase, and since the whole kernel is loaded entirely at
boot time and cannot be swapped out later, several megabytes of physical memory will be wasted.
If you are testing a new kernel, for example by typing the new kernels name at the boot prompt, but need
to boot a different one in order to get your system up and running again, boot it only into single user state
using the -s flag at the boot prompt, and then perform the following steps:
# fsck -p
# mount -a -t ufs # so your file system for /var/crash is writable
# savecore -N /kernel.panicked /var/crash
# exit # ...to multi-user
514
Chapter 22. Kernel Debugging
This instructs savecore(8) to use another kernel for symbol name extraction. It would otherwise default
to the currently running kernel and most likely not do anything at all since the crash dump and the kernel
symbols differ.
Now, after a crash dump, go to /sys/compile/WHATEVER and run kgdb. From kgdb do:
symbol-file kernel.debug
exec-file /var/crash/kernel.0
core-file /var/crash/vmcore.0
and voila, you can debug the crash dump using the kernel sources just like you can for any other program.
Here is a script log of a kgdb session illustrating the procedure. Long lines have been folded to improve
readability, and the lines are numbered for reference. Despite this, it is a real-world error trace taken
during the development of the pcvt console driver.
515
Chapter 22. Kernel Debugging
516
Chapter 22. Kernel Debugging
line 6:
This is a dump taken from within DDB (see below), hence the panic comment because you said
to!, and a rather long stack trace; the initial reason for going into DDB has been a page fault trap
though.
line 20:
This is the location of function trap() in the stack trace.
line 36:
Force usage of a new stack frame; this is no longer necessary now. The stack frames are supposed to
point to the right locations now, even in case of a trap. (I do not have a new core dump handy <g>,
my kernel has not panicked for a rather long time.) From looking at the code in source line 403,
there is a high probability that either the pointer access for tp was messed up, or the array access
was out of bounds.
line 52:
The pointer looks suspicious, but happens to be a valid address.
line 56:
However, it obviously points to garbage, so we have found our error! (For those unfamiliar with that
particular piece of code: tp->t_line refers to the line discipline of the console device here, which
must be a rather small integer number.)
517
Chapter 22. Kernel Debugging
You should then be able to go about looking at the crash dump using ddds graphical interface.
makeoptions DEBUG=-
g #Build kernel with gdb(1) debug symbols
Rebuild the kernel. Due to the time stamp change on the Makefile, there will be some other object files
rebuild, for example trap.o. With a bit of luck, the added -g option will not change anything for the
generated code, so you will finally get a new kernel with similar code to the faulting one but some
debugging symbols. You should at least verify the old and new sizes with the size(1) command. If there
is a mismatch, you probably need to give up here.
Go and examine the dump as described above. The debugging symbols might be incomplete for some
places, as can be seen in the stack trace in the example above where some functions are displayed
without line numbers and argument lists. If you need more debugging symbols, remove the appropriate
object files and repeat the kgdb session until you know enough.
All this is not guaranteed to work, but it will do it fine in most cases.
518
Chapter 22. Kernel Debugging
options DDB
to your config file, and rebuild. (See Kernel Configuration for details on configuring the FreeBSD kernel.
Note: Note that if you have an older version of the boot blocks, your debugger symbols might not be
loaded at all. Update the boot blocks; the recent ones load the DDB symbols automagically.)
Once your DDB kernel is running, there are several ways to enter DDB. The first, and earliest way is to
type the boot flag -d right at the boot prompt. The kernel will start up in debug mode and enter DDB
prior to any device probing. Hence you can even debug the device probe/attach functions.
The second scenario is a hot-key on the keyboard, usually Ctrl-Alt-ESC. For syscons, this can be
remapped; some of the distributed maps do this, so watch out. There is an option available for serial
consoles that allows the use of a serial line BREAK on the console line to enter DDB (options
BREAK_TO_DEBUGGER in the kernel config file). It is not the default since there are a lot of crappy serial
adapters around that gratuitously generate a BREAK condition, for example when pulling the cable.
The third way is that any panic condition will branch to DDB if the kernel is configured to use it. For this
reason, it is not wise to configure a kernel with DDB for a machine running unattended.
The DDB commands roughly resemble some gdb commands. The first thing you probably need to do is
to set a breakpoint:
b function-name
b address
Numbers are taken hexadecimal by default, but to make them distinct from symbol names; hexadecimal
numbers starting with the letters a-f need to be preceded with 0x (this is optional for other numbers).
Simple expressions are allowed, for example: function-name + 0x103.
To continue the operation of an interrupted kernel, simply type:
trace
Note: Note that when entering DDB via a hot-key, the kernel is currently servicing an interrupt, so
the stack trace might be not of much use for you.
del
519
Chapter 22. Kernel Debugging
del address-expression
The first form will be accepted immediately after a breakpoint hit, and deletes the current breakpoint.
The second form can remove any breakpoint, but you need to specify the exact address; this can be
obtained from:
show b
This will step into functions, but you can make DDB trace them until the matching return statement is
reached by:
Note: This is different from gdbs next statement; it is like gdbs finish.
x/wx 0xf0133fe0,40
x/hd db_symtab_space
x/bc termbuf,10
x/s stringbuf
for word/halfword/byte access, and hexadecimal/decimal/character/ string display. The number after the
comma is the object count. To display the next 0x10 items, simply use:
x ,10
Similarly, use
x/ia foofunc,10
to disassemble the first 0x10 instructions of foofunc, and display them along with their offset from the
beginning of foofunc.
To modify memory, use the write command:
The command modifier (b/h/w) specifies the size of the data to be written, the first following expression
is the address to write to and the remainder is interpreted as data to write to successive memory locations.
520
Chapter 22. Kernel Debugging
show reg
p $eax
Should you need to call some kernel functions from DDB, simply say:
ps
Now you have now examined why your kernel failed, and you wish to reboot. Remember that,
depending on the severity of previous malfunctioning, not all parts of the kernel might still be working as
expected. Perform one of the following actions to shut down and reboot your system:
call diediedie()
This will cause your kernel to dump core and reboot, so you can later analyze the core on a higher level
with kgdb. This command usually must be followed by another continue statement. There is now an
alias for this: panic.
call boot(0)
Which might be a good way to cleanly shut down the running system, sync() all disks, and finally
reboot. As long as the disk and file system interfaces of the kernel are not damaged, this might be a good
way for an almost clean shutdown.
call cpu_reset()
is the final way out of disaster and almost the same as hitting the Big Red Button.
If you need a short command summary, simply type:
help
521
Chapter 22. Kernel Debugging
However, it is highly recommended to have a printed copy of the ddb(4) manual page ready for a
debugging session. Remember that it is hard to read the on-line manual while single-stepping the kernel.
% gdb -k kernel
GDB is free software and you are welcome to distribute copies of it
under certain conditions; type "show copying" to see the conditions.
There is absolutely no warranty for GDB; type "show warranty" for details.
GDB 4.16 (i386-unknown-freebsd),
Copyright 1996 Free Software Foundation, Inc...
(kgdb)
Initialize the remote debugging session (assuming the first serial port is being used) by:
Now, on the target host (the one that entered DDB right before even starting the device probe), type:
522
Chapter 22. Kernel Debugging
Every time you type gdb, the mode will be toggled between remote GDB and local DDB. In order to
force a next trap immediately, simply type s (step). Your hosting GDB will now gain control over the
target kernel:
You can use this session almost as any other GDB session, including full access to the source, running it
in gud-mode inside an Emacs window (which gives you an automatic source code display in another
Emacs window) etc.
Remote GDB can also be used to debug LKMs. First build the LKM with debugging symbols:
# cd /usr/src/lkm/linux
# make clean; make COPTS=-g
Then install this version of the module on the target machine, load it and use modstat to find out where
it was loaded:
# linux
# modstat
Type Id Off Loadaddr Size Info Rev Module Name
EXEC 0 4 f5109000 001c f510f010 1 linux_mod
Take the load address of the module and add 0x20 (probably to account for the a.out header). This is the
address that the module code was relocated to. Use the add-symbol-file command in GDB to tell the
debugger about the module:
523
Chapter 23. Linux Emulation
Contributed by Brian N. Handy <[email protected]> and Rich Murphey
<[email protected] >
options COMPAT_LINUX
If you want to run doom or other applications that need shared memory, also add the following.
options SYSVSHM
The linux system calls require 4.3BSD system call compatibility. So make sure you have the following.
options "COMPAT_43"
If you prefer to statically link the emulator in the kernel rather than use the loadable kernel module
(LKM), then add
options LINUX
524
Chapter 23. Linux Emulation
Then run config and install the new kernel as described in the kernel configuration section.
If you decide to use the LKM you must also install the loadable module. A mismatch of versions
between the kernel and loadable module can cause the kernel to crash, so the safest thing to do is to
reinstall the LKM when you install the kernel.
# cd /usr/src/lkm/linux
# make all install
Once you have installed the kernel and the LKM, you can invoke linux as root to load the LKM.
# linux
Linux emulator installed
Module loaded as ID 0
% modstat
Type Id Off Loadaddr Size Info Rev
Module Name EXEC 0 3 f0baf000 0018 f0bb4000 1 linux_emulator
You can cause the LKM to be loaded when the system boots in either of two ways. In FreeBSD
2.2.1-RELEASE and 2.1-STABLE enable it in /etc/sysconfig
linux=YES
by changing it from NO to YES. FreeBSD 2.1 RELEASE and earlier do not have such a line and on
those you will need to edit /etc/rc.local to add the following line.
linux
525
Chapter 23. Linux Emulation
% modstat
Type Id Off Loadaddr Size Info Rev Module Name
EXEC 0 4 f09e6000 001c f09ec010 1 linux_mod
However, there have been reports that this fails on some 2.2-RELEASE and later systems. If for some
reason you cannot load the linux LKM, then statically link the emulator in the kernel by adding
options LINUX
to your kernel config file. Then run config and install the new kernel as described in the kernel
configuration section.
# cd /usr/ports/emulators/linux_base
# make all install
and you should have a working linux emulator. Legend (and the mail archives :-) seems to hold that
Linux emulation works best with linux binaries linked against the ZMAGIC libraries; QMAGIC libraries
(such as those used in Slackware V2.0) may tend to give the Linuxulator heartburn. Also, expect some
programs to complain about incorrect minor versions of the system libraries. In general, however, this
does not seem to be a problem.
526
Chapter 23. Linux Emulation
and if that does not exist then it will try /lib/libc.so. Shared libraries should be installed in the
shadow tree /compat/linux/lib rather than the paths that the Linux ld.so reports.
FreeBSD-2.2-RELEASE and later works slightly differently with respect to /compat/linux: all files,
not just libraries, are searched for from the shadow root /compat/linux.
Generally, you will need to look for the shared libraries that Linux binaries depend on only the first few
times that you install a Linux program on your FreeBSD system. After a while, you will have a sufficient
set of Linux shared libraries on your system to be able to run newly imported Linux binaries without any
extra work.
% ldd linuxxdoom
libXt.so.3 (DLL Jump 3.1) => /usr/X11/lib/libXt.so.3.1.0
libX11.so.3 (DLL Jump 3.1) => /usr/X11/lib/libX11.so.3.1.0
libc.so.4 (DLL Jump 4.5pl26) => /lib/libc.so.4.6.29
You would need to get all the files from the last column, and put them under /compat/linux, with the
names in the first column as symbolic links pointing to them. This means you eventually have these files
on your FreeBSD system:
/compat/linux/usr/X11/lib/libXt.so.3.1.0
/compat/linux/usr/X11/lib/libXt.so.3 -> libXt.so.3.1.0
/compat/linux/usr/X11/lib/libX11.so.3.1.0
/compat/linux/usr/X11/lib/libX11.so.3 -> libX11.so.3.1.0
/compat/linux/lib/libc.so.4.6.29 /compat/linux/lib/libc.so.4 -
> libc.so.4.6.29
Note: Note that if you already have a Linux shared library with a matching major revision number to
the first column of the ldd output, you will not need to copy the file named in the last column to your
system, the one you already have should work. It is advisable to copy the shared library anyway if it
is a newer version, though. You can remove the old one, as long as you make the symbolic link point
to the new one. So, if you have these libraries on your system:
527
Chapter 23. Linux Emulation
/compat/linux/lib/libc.so.4.6.27
/compat/linux/lib/libc.so.4 -> libc.so.4.6.27
and you find a new binary that claims to require a later version according to the output of ldd:
If it is only one or two versions out of date in the in the trailing digit then do not worry about copying
/lib/libc.so.4.6.29 too, because the program should work fine with the slightly older version.
However, if you like you can decide to replace the libc.so anyway, and that should leave you with:
/compat/linux/lib/libc.so.4.6.29
/compat/linux/lib/libc.so.4 -> libc.so.4.6.29
Note: The symbolic link mechanism is only needed for Linux binaries. The FreeBSD runtime linker
takes care of looking for matching major revision numbers itself and you do not need to worry about
it.
/compat/linux/lib/ld.so
/compat/linux/etc/ld.so.config
If you do not have access to a Linux system, you should get the extra files you need from various ftp
sites. Information on where to look for the various files is appended below. For now, let us assume you
know where to get the files.
Retrieve the following files (all from the same ftp site to avoid any version mismatches), and install them
under /compat/linux (i.e. /foo/bar is installed as /compat/linux/foo/bar):
/sbin/ldconfig
/usr/bin/ldd
/lib/libc.so.x.y.z
/lib/ld.so
528
Chapter 23. Linux Emulation
ldconfig and ldd do not necessarily need to be under /compat/linux; you can install them
elsewhere in the system too. Just make sure they do not conflict with their FreeBSD counterparts. A
good idea would be to install them in /usr/local/bin as ldconfig-linux and ldd-linux.
Create the file /compat/linux/etc/ld.so.conf, containing the directories in which the Linux
runtime linker should look for shared libs. It is a plain text file, containing a directory name on each line.
/lib and /usr/lib are standard, you could add the following:
/usr/X11/lib
/usr/local/lib
When a linux binary opens a library such as /lib/libc.so the emulator maps the name to
/compat/linux/lib/libc.so internally. All linux libraries should be installed under /compat/linux
(e.g. /compat/linux/lib/libc.so, /compat/linux/usr/X11/lib/libX11.so, etc.) in order
for the emulator to find them.
Those running FreeBSD 2.2-RELEASE should run the Linux ldconfig program.
# cd /compat/linux/lib
# /compat/linux/sbin/ldconfig
ldconfig is statically linked, so it does not need any shared libraries to run. It creates the file
/compat/linux/etc/ld.so.cache which contains the names of all the shared libraries and should
be rerun to recreate this file whenever you install additional shared libraries.
On 2.1-STABLE do not install /compat/linux/etc/ld.so.cache or run ldconfig; in
2.1-STABLE the syscalls are implemented differently and ldconfig is not needed or used.
You should now be set up for Linux binaries which only need a shared libc. You can test this by running
the Linux ldd on itself. Supposing that you have it installed as ldd-linux, it should produce something
like:
This being done, you are ready to install new Linux binaries. Whenever you install a new Linux
program, you should check if it needs shared libraries, and if so, whether you have them installed in the
/compat/linux tree. To do this, you run the Linux version ldd on the new program, and watch its
output. ldd (see also the manual page for ldd(1)) will print a list of shared libraries that the program
depends on, in the form majorname (jumpversion) => fullname.
If it prints not found instead of fullname it means that you need an extra library. The library needed
is shown in majorname and will be of the form libXXXX.so.N . You will need to find a
libXXXX.so.N.mm on a Linux ftp site, and install it on your system. The XXXX (name) and N (major
529
Chapter 23. Linux Emulation
revision number) should match; the minor number(s) mm are less important, though it is advised to take
the most recent version.
% ./my-linux-elf-binary
ELF binary type not known
Abort
To help the FreeBSD kernel distinguish between a FreeBSD ELF binary from a Linux binary, use the
brandelf(1) utility.
The GNU toolchain now places the appropriate branding information into ELF binaries automatically, so
you should be needing to do this step increasingly rarely in future.
where the order here specifies that /etc/hosts is searched first and DNS is searched second. When
/compat/linux/etc/host.conf is not installed linux applications find FreeBSDs
/etc/host.conf and complain about the incompatible FreeBSD syntax. You should remove bind if
you have not configured a name-server using the /etc/resolv.conf file.
Lastly, those who run 2.1-STABLE need to set an the RESOLV_HOST_CONF environment variable so
that applications will know how to search the host tables. If you run FreeBSD 2.2-RELEASE or later,
you can skip this. For the /bin/csh shell use:
530
Chapter 23. Linux Emulation
Note: The information below is valid as of the time this document was written, but certain details
such as names of ftp sites, directories and distribution names may have changed by the time you
read this.
Linux is distributed by several groups that make their own set of binaries that they distribute. Each
distribution has its own name, like Slackware or Yggdrasil. The distributions are available on a lot of
ftp sites. Sometimes the files are unpacked, and you can get the individual files you need, but mostly they
are stored in distribution sets, usually consisting of subdirectories with gzipped tar files in them. The
primary ftp sites for the distributions are:
1. sunsite.unc.edu:/pub/Linux/distributions
2. tsx-11.mit.edu:/pub/linux/distributions
Some European mirrors:
1. ftp.luth.se:/pub/linux/distributions
2. ftp.demon.co.uk:/pub/unix/linux
3. src.doc.ic.ac.uk:/packages/linux/distributions
For simplicity, let us concentrate on Slackware here. This distribution consists of a number of
subdirectories, containing separate packages. Normally, they are controlled by an install program, but
you can retrieve files by hand too. First of all, you will need to look in the contents subdir of the
distribution. You will find a lot of small text files here describing the contents of the separate packages.
The fastest way to look something up is to retrieve all the files in the contents subdirectory, and grep
through them for the file you need. Here is an example of a list of files that you might need, and in which
contents-file you will find it by grepping through them:
Library Package
ld.so ldso
ldconfig ldso
531
Chapter 23. Linux Emulation
ldd ldso
libc.so.4 shlibs
libX11.so.6.0 xf_lib
libXt.so.6.0 xf_lib
libX11.so.3 oldlibs
libXt.so.3 oldlibs
So, in this case, you will need the packages ldso, shlibs, xf_lib and oldlibs. In each of the contents-files
for these packages, look for a line saying PACKAGE LOCATION, it will tell you on which disk the
package is, in our case it will tell us in which subdirectory we need to look. For our example, we would
find the following locations:
Package Location
ldso diska2
shlibs diska2
oldlibs diskx6
xf_lib diskx9
The locations called diskXX refer to the slakware/XX subdirectories of the distribution, others may
be found in the contrib subdirectory. In this case, we could now retrieve the packages we need by
retrieving the following files (relative to the root of the Slackware distribution tree):
slakware/a2/ldso.tgz
slakware/a2/shlibs.tgz
slakware/x6/oldlibs.tgz
slakware/x9/xf_lib.tgz
Extract the files from these gzipped tarfiles in your /compat/linux directory (possibly omitting or
afterwards removing files you do not need), and you are done.
See also:
ftp://ftp.FreeBSD.org/pub/FreeBSD/2.0.5-RELEASE/xperimnt/linux-emu/README and
/usr/src/sys/i386/ibcs2/README.iBCS2
532
Chapter 23. Linux Emulation
# cd /usr/local
# mkdir Mathematica
# cd Mathematica
# tar -xvf /cdrom/LINUX.TAR
# cd /usr/local/Mathematica/Install
# mathinfo
LINUX: ioctl fd=5, typ=0x89(), num=0x27 not implemented
richc.isdn.bcm.tmc.edu 9845-03452-90255
So, for example, the machine ID of richc is 9845-03452-90255. You can ignore the message about
the ioctl that is not implemented. It will not prevent Mathematica from running in any way and you can
safely ignore it, though you will see the message every time you run Mathematica.
533
Chapter 23. Linux Emulation
When you register with Wolfram, either by email, phone or fax, you will give them the machine ID
and they will respond with a corresponding password consisting of groups of numbers. You need to add
them both along with the machine name and license number in your mathpass file.
You can do this by invoking:
# cd /usr/local/Mathematica/Install
# math.install
It will ask you to enter your license number and the Wolfram supplied password. If you get them mixed
up or for some reason the math.install fails, that is OK; you can simply edit the file mathpass in this
same directory to correct the info manually.
After getting past the password, math.install will ask you if you accept the install defaults provided, or if
you want to use your own. If you are like us and distrust all install programs, you probably want to
specify the actual directories. Beware. Although the math.install program asks you to specify directories,
it will not create them for you, so you should perhaps have a second window open with another shell so
that you can create them before you give them to the install program. Or, if it fails, you can create the
directories and then restart the math.install program. The directories we chose to create beforehand
and specify to math.install were:
You can also tell it to use /tmp/math.record for the system record file, where it puts logs of sessions.
After this math.install will continue on to unpacking things and placing everything where it should
go.
The Mathematica Notebook feature is included separately, as the X Front End, and you have to install it
separately. To get the X Front End stuff correctly installed, cd into the
/usr/local/Mathematica/FrontEnd directory and execute the xfe.install shell script. You will
have to tell it where to put things, but you do not have to create any directories because it will use the
same directories that had been created for math.install. When it finishes, there should be a new shell
script in /usr/local/Mathematica/bin called mathematica.
Lastly, you need to modify each of the shell scripts that Mathematica has installed. At the beginning of
every shell script in /usr/local/Mathematica/bin add the following line:
This tells Mathematica were to find its own version of the key mapping file XKeysymDB. Without this
you will get pages of error messages about missing key mappings.
534
Chapter 23. Linux Emulation
This tells Mathematica to use the linux version of host.conf. This file has a different syntax from
FreeBSDs host.conf, so you will get an error message about /etc/host.conf if you leave this out.
You might also want to modify your /etc/manpath.config file to read the new man directory, and
you may need to edit your ~/.cshrc file to add /usr/local/Mathematica/bin to your path.
That is about all it takes. With this you should be able to type mathematica and get a really slick
looking Mathematica Notebook screen up. Mathematica has included the Motif user interfaces, but it is
compiled in statically, so you do not need the Motif libraries. Good luck doing this yourself!
Bugs
The Notebook front end is known to hang sometimes when reading notebook files with an error
messages similar to:
We have not found the cause for this, but it only affects the Notebooks X Window front end, not the
mathematica engine itself. So the command line interface invoked by math is unaffected by this bug.
Acknowledgments
A well-deserved thanks should go to Sren Schmidt <[email protected]> and Peter Wemm
<[email protected]> who made linux emulation what it is today, and Michael Smith who drove
these two guys like dogs to get it to the point where it runs Linux binaries better than linux! :-)
FreeBSD has an abstraction called an execution class loader. This is a wedge into the execve(2)
system call.
535
Chapter 23. Linux Emulation
What happens is that FreeBSD has a list of loaders, instead of a single loader with a fallback to the #!
loader for running any shell interpreters or shell scripts.
Historically, the only loader on the UNIX platform examined the magic number (generally the first 4 or 8
bytes of the file) to see if it was a binary known to the system, and if so, invoked the binary loader.
If it was not the binary type for the system, the execve(2) call returned a failure, and the shell attempted
to start executing it as shell commands.
The assumption was a default of whatever the current shell is.
Later, a hack was made for sh(1) to examine the first two characters, and if they were :\n, then it
invoked the csh(1) shell instead (I believe SCO first made this hack, but am willing to be corrected).
What FreeBSD does now is go through a list of loaders, with a generic #! loader that knows about
interpreters as the characters which follow to the next whitespace next to last, followed by a fallback to
/bin/sh.
For the Linux binary emulation, FreeBSD sees the magic number as an ELF binary (it makes no
distinction between FreeBSD, Solaris, Linux, or any other OS which has an ELF image type, at this
point).
The ELF loader looks for a specialized brand, which is a comment section in the ELF image, and which
is not present on SVR4/Solaris ELF binaries.
For Linux binaries to function, they must be branded as type Linux; from brandelf(1):
When this is done, the ELF loader will see the Linux brand on the file.
When the ELF loader sees the Linux brand, the loader replaces a pointer in the proc structure. All
system calls are indexed through this pointer (in a traditional UNIX system, this would be the sysent[]
structure array, containing the system calls). In addition, the process is flagged for special handling of the
trap vector for the signal trampoline code, and sever other (minor) fixups that are handled by the Linux
kernel module.
The Linux system call vector contains, among other things, a list of sysent[] entries whose addresses
reside in the kernel module.
When a system call is called by the Linux binary, the trap code dereferences the system call function
pointer off the proc structure, and gets the Linux, not the FreeBSD, system call entry points.
In addition, the Linux emulation dynamically reroots lookups; this is, in effect, what the union option to
FS mounts ( not the unionfs!) does. First, an attempt is made to lookup the file in the
/compat/linux/original-path directory, then only if that fails, the lookup is done in the
/original-path directory. This makes sure that binaries that require other binaries can run (e.g., the
Linux toolchain can all run under emulation). It also means that the Linux binaries can load and exec
536
Chapter 23. Linux Emulation
FreeBSD binaries, if there are no corresponding Linux binaries present, and that you could place a
uname(1) command in the /compat/linux directory tree to ensure that the Linux binaries could not tell
they were not running on Linux.
In effect, there is a Linux kernel in the FreeBSD kernel; the various underlying functions that implement
all of the services provided by the kernel are identical to both the FreeBSD system call table entries, and
the Linux system call table entries: file system operations, virtual memory operations, signal delivery,
System V IPC, etc. . . The only difference is that FreeBSD binaries get the FreeBSD glue functions, and
Linux binaries get the Linux glue functions (most older OSs only had their own glue functions:
addresses of functions in a static global sysent[] structure array, instead of addresses of functions
dereferenced off a dynamically initialized pointer in the proc structure of the process making the call).
Which one is the native FreeBSD ABI? It does not matter. Basically the only difference is that
(currently; this could easily be changed in a future release, and probably will be after this) the FreeBSD
glue functions are statically linked into the kernel, and the Linux glue functions can be statically linked,
or they can be accessed via a kernel module.
Yeah, but is this really emulation? No. It is an ABI implementation, not an emulation. There is no
emulator (or simulator, to cut off the next question) involved.
So why is it called Linux emulation? To make it hard to sell FreeBSD! 8-). Really, it is because the
historical implementation was done at a time when there was really no word other than that to describe
what was going on; saying that FreeBSD ran Linux binaries was not true, if you did not compile the code
in or load a module, and there needed to be a word to describe what was being loadedhence the Linux
emulator.
537
Chapter 24. FreeBSD Internals
Loading a kernel
We presently have three basic mechanisms for loading the kernel as described below: they all pass some
information to the kernel to help the kernel decide what to do next.
Biosboot
Biosboot is our bootblocks. It consists of two files which will be installed in the first 8Kbytes of
the floppy or hard-disk slice to be booted from.
Biosboot can load a kernel from a FreeBSD filesystem.
Dosboot
Dosboot was written by DI. Christian Gusenbauer, and is unfortunately at this time one of the few
pieces of code that will not compile under FreeBSD itself because it is written for Microsoft
compilers.
Dosboot will boot the kernel from a MS-DOS file or from a FreeBSD filesystem partition on the
disk. It attempts to negotiate with the various and strange kinds of memory manglers that lurk in
high memory on MS/DOS systems and usually wins them for its case.
Netboot
Netboot will try to find a supported Ethernet card, and use BOOTP, TFTP and NFS to find a kernel
file to boot.
538
Chapter 24. FreeBSD Internals
UFS
This is the most normal type of root filesystem. It can reside on a floppy or on hard disk.
MSDOS
While this is technically possible, it is not particular useful because of the FAT filesystems inability
to deal with links, device nodes and other such UNIXisms.
MFS
This is actually a UFS filesystem which has been compiled into the kernel. That means that the
kernel does not really need any hard disks, floppies or other hardware to function.
CD9660
This is for using a CD-ROM as root filesystem.
NFS
This is for using a fileserver as root filesystem, basically making it a diskless machine.
You can substitute any program for /sbin/init, as long as you keep in mind that:
there is no stdin/out/err unless you open it yourself. If you exit, the machine panics. Signal handling is
special for pid == 1.
An example of this is the /stand/sysinstall program on the installation floppy.
539
Chapter 24. FreeBSD Internals
Interesting combinations
Boot a kernel with a MFS in it with a special /sbin/init which...
A Using DOS
Now you are running FreeBSD without repartitioning your hard disk...
B Using NFS
NFS mounts your server:~you/FreeBSD as /nfs, chroots to /nfs and executes /sbin/init
there
Now you are running FreeBSD diskless, even though you do not control the NFS server...
C Start an X-server
Now you have an X-terminal, which is better than that dingy
X-under-windows-so-slow-you-can-see-what-it-does thing that your boss insist is better than
forking out money on hardware.
D Using a tape
Takes a copy of /dev/rwd0 and writes it to a remote tape station or fileserver.
Now you finally get that backup you should have made a year ago...
540
Chapter 24. FreeBSD Internals
PC Memory Utilization
Contributed by Jrg Wunsch <[email protected] >. 16 Apr 1995.
A short description of how FreeBSD uses memory on the i386 platform
The boot sector will be loaded at 0:0x7c00, and relocates itself immediately to 0x7c0:0. (This is
nothing magic, just an adjustment for the %cs selector, done by an ljmp.)
It then loads the first 15 sectors at 0x10000 (segment BOOTSEG in the biosboot Makefile), and sets up the
stack to work below 0x1fff0. After this, it jumps to the entry of boot2 within that code. I.e., it jumps
over itself and the (dummy) partition table, and it is going to adjust the %cs selectorwe are still in
16-bit mode there.
boot2 asks for the boot file, and examines the a.out header. It masks the file entry point (usually
0xf0100000) by 0x00ffffff, and loads the file there. Hence the usual load point is 1 MB
(0x00100000). During load, the boot code toggles back and forth between real and protected mode, to
use the BIOS in real mode.
The boot code itself uses segment selectors 0x18 and 0x20 for %cs and %ds/%es in protected mode,
and 0x28 to jump back into real mode. The kernel is finally started with %cs 0x08 and %ds/%es/%ss
0x10, which refer to dummy descriptors covering the entire address space.
The kernel will be started at its load point. Since it has been linked for another (high) address, it will
have to execute PIC until the page table and page directory stuff is setup properly, at which point paging
will be enabled and the kernel will finally run at the address for which it was linked.
Contributed by David Greenman <[email protected] >. 16 Apr 1995.
The physical pages immediately following the kernel BSS contain proc0s page directory, page tables,
and upages. Some time later when the VM system is initialized, the physical memory between
0x1000-0x9ffff and the physical memory after the kernel (text+data+bss+proc0 stuff+other misc) is
made available in the form of general VM pages and added to the global free page list.
541
Chapter 24. FreeBSD Internals
The PC DMA subsystem is based on the Intel 8237 DMA controller. The 8237 contains four DMA
channels that can be programmed independently and any one of the channels may be active at any
moment. These channels are numbered 0, 1, 2 and 3. Starting with the PC/AT, IBM added a second 8237
chip, and numbered those channels 4, 5, 6 and 7.
The original DMA controller (0, 1, 2 and 3) moves one byte in each transfer. The second DMA
controller (4, 5, 6, and 7) moves 16-bits from two adjacent memory locations in each transfer, with the
first byte always coming from an even-numbered address. The two controllers are identical components
and the difference in transfer size is caused by the way the second controller is wired into the system.
The 8237 has two electrical signals for each channel, named DRQ and -DACK. There are additional
signals with the names HRQ (Hold Request), HLDA (Hold Acknowledge), -EOP (End of Process), and
the bus control signals -MEMR (Memory Read), -MEMW (Memory Write), -IOR (I/O Read), and -IOW
(I/O Write).
The 8237 DMA is known as a fly-by DMA controller. This means that the data being moved from one
location to another does not pass through the DMA chip and is not stored in the DMA chip.
Subsequently, the DMA can only transfer data between an I/O port and a memory address, but not
between two I/O ports or two memory locations.
Note: The 8237 does allow two channels to be connected together to allow memory-to-memory
DMA operations in a non-fly-by mode, but nobody in the PC industry uses this scarce resource this
way since it is faster to move data between memory locations using the CPU.
In the PC architecture, each DMA channel is normally activated only when the hardware that uses a
given DMA channel requests a transfer by asserting the DRQ line for that channel.
542
Chapter 24. FreeBSD Internals
condition (neither high or low) and then the CPU asserts the HLDA signal which tells the DMA
controller that it is now in charge of the bus.
Depending on the processor, the CPU may be able to execute a few additional instructions now that it no
longer has the bus, but the CPU will eventually have to wait when it reaches an instruction that must read
something from memory that is not in the internal processor cache or pipeline.
Now that the DMA is in charge, the DMA activates its -MEMR, -MEMW, -IOR, -IOW output signals,
and the address outputs from the DMA are set to 0x3456, which will be used to direct the byte that is
about to transferred to a specific memory location.
The DMA will then let the device that requested the DMA transfer know that the transfer is
commencing. This is done by asserting the -DACK signal, or in the case of the floppy disk controller,
-DACK2 is asserted.
The floppy disk controller is now responsible for placing the byte to be transferred on the bus Data lines.
Unless the floppy controller needs more time to get the data byte on the bus (and if the peripheral does
need more time it alerts the DMA via the READY signal), the DMA will wait one DMA clock, and then
de-assert the -MEMW and -IOR signals so that the memory will latch and store the byte that was on the
bus, and the FDC will know that the byte has been transferred.
Since the DMA cycle only transfers a single byte at a time, the FDC now drops the DRQ2 signal, so the
DMA knows that it is no longer needed. The DMA will de-assert the -DACK2 signal, so that the FDC
knows it must stop placing data on the bus.
The DMA will now check to see if any of the other DMA channels have any work to do. If none of the
channels have their DRQ lines asserted, the DMA controller has completed its work and will now
tri-state the -MEMR, -MEMW, -IOR, -IOW and address signals.
Finally, the DMA will de-assert the HRQ signal. The CPU sees this, and de-asserts the HOLDA signal.
Now the CPU activates its -MEMR, -MEMW, -IOR, -IOW and address lines, and it resumes executing
instructions and accessing main memory and the peripherals.
For a typical floppy disk sector, the above process is repeated 512 times, once for each byte. Each time a
byte is transferred, the address register in the DMA is incremented and the counter in the DMA that
shows how many bytes are to be transferred is decremented.
When the counter reaches zero, the DMA asserts the EOP signal, which indicates that the counter has
reached zero and no more data will be transferred until the DMA controller is reprogrammed by the
CPU. This event is also called the Terminal Count (TC). There is only one EOP signal, and since only
DMA channel can be active at any instant, the DMA channel that is currently active must be the DMA
channel that just completed its task.
If a peripheral wants to generate an interrupt when the transfer of a buffer is complete, it can test for its
-DACKn signal and the EOP signal both being asserted at the same time. When that happens, it means
the DMA will not transfer any more information for that peripheral without intervention by the CPU.
The peripheral can then assert one of the interrupt signals to get the processors attention. In the PC
543
Chapter 24. FreeBSD Internals
architecture, the DMA chip itself is not capable of generating an interrupt. The peripheral and its
associated hardware is responsible for generating any interrupt that occurs. Subsequently, it is possible to
have a peripheral that uses DMA but does not use interrupts.
It is important to understand that although the CPU always releases the bus to the DMA when the DMA
makes the request, this action is invisible to both applications and the operating systems, except for slight
changes in the amount of time the processor takes to execute instructions when the DMA is active.
Subsequently, the processor must poll the peripheral, poll the registers in the DMA chip, or receive an
interrupt from the peripheral to know for certain when a DMA transfer has completed.
Note: Physical 64K boundaries should not be confused with 8086-mode 64K Segments, which
are created by mathematically adding a segment register with an offset register. Page Registers
have no address overlap and are mathematically OR-ed together.
To further complicate matters, the external DMA address latches on the PC/AT hold only eight bits, so
that gives us 8+16=24 bits, which means that the DMA can only point at memory locations between 0
and 16Meg. For newer computers that allow more than 16Meg of memory, the standard PC-compatible
DMA cannot access memory locations above 16Meg.
To get around this restriction, operating systems will reserve a RAM buffer in an area below 16Meg that
544
Chapter 24. FreeBSD Internals
also does not span a physical 64K boundary. Then the DMA will be programmed to transfer data from
the peripheral and into that buffer. Once the DMA has moved the data into this buffer, the operating
system will then copy the data from the buffer to the address where the data is really supposed to be
stored.
When writing data from an address above 16Meg to a DMA-based peripheral, the data must be first
copied from where it resides into a buffer located below 16Meg, and then the DMA can copy the data
from the buffer to the hardware. In FreeBSD, these reserved buffers are called Bounce Buffers. In the
MS-DOS world, they are sometimes called Smart Buffers.
Note: A new implementation of the 8237, called the 82374, allows 16 bits of page register to be
specified, allows access to the entire 32 bit address space, without the use of bounce buffers.
Single
A single byte (or word) is transferred. The DMA must release and re-acquire the bus for each
additional byte. This is commonly-used by devices that cannot transfer the entire block of data
immediately. The peripheral will request the DMA each time it is ready for another transfer.
The standard PC-compatible floppy disk controller (NEC 765) only has a one-byte buffer, so it uses
this mode.
Block/Demand
Once the DMA acquires the system bus, an entire block of data is transferred, up to a maximum of
64K. If the peripheral needs additional time, it can assert the READY signal to suspend the transfer
briefly. READY should not be used excessively, and for slow peripheral transfers, the Single
Transfer Mode should be used instead.
The difference between Block and Demand is that once a Block transfer is started, it runs until the
transfer count reaches zero. DRQ only needs to be asserted until -DACK is asserted. Demand Mode
will transfer one more bytes until DRQ is de-asserted, at which point the DMA suspends the
transfer and releases the bus back to the CPU. When DRQ is asserted later, the transfer resumes
where it was suspended.
Older hard disk controllers used Demand Mode until CPU speeds increased to the point that it was
more efficient to transfer the data using the CPU, particularly if the memory locations used in the
545
Chapter 24. FreeBSD Internals
Cascade
This mechanism allows a DMA channel to request the bus, but then the attached peripheral device is
responsible for placing the addressing information on the bus instead of the DMA. This is also used
to implement a technique known as Bus Mastering.
When a DMA channel in Cascade Mode receives control of the bus, the DMA does not place
addresses and I/O control signals on the bus like the DMA normally does when it is active. Instead,
the DMA only asserts the -DACK signal for the active DMA channel.
At this point it is up to the peripheral connected to that DMA channel to provide address and bus
control signals. The peripheral has complete control over the system bus, and can do reads and/or
writes to any address below 16Meg. When the peripheral is finished with the bus, it de-asserts the
DRQ line, and the DMA controller can then return control to the CPU or to some other DMA
channel.
Cascade Mode can be used to chain multiple DMA controllers together, and this is exactly what
DMA Channel 4 is used for in the PC architecture. When a peripheral requests the bus on DMA
channels 0, 1, 2 or 3, the slave DMA controller asserts HLDREQ, but this wire is actually connected
to DRQ4 on the primary DMA controller instead of to the CPU. The primary DMA controller,
thinking it has work to do on Channel 4, requests the bus from the CPU using HLDREQ signal.
Once the CPU grants the bus to the primary DMA controller, -DACK4 is asserted, and that wire is
actually connected to the HLDA signal on the slave DMA controller. The slave DMA controller
then transfers data for the DMA channel that requested it (0, 1, 2 or 3), or the slave DMA may grant
the bus to a peripheral that wants to perform its own bus-mastering, such as a SCSI controller.
Because of this wiring arrangement, only DMA channels 0, 1, 2, 3, 5, 6 and 7 are usable with
peripherals on PC/AT systems.
Note: DMA channel 0 was reserved for refresh operations in early IBM PC computers, but is
generally available for use by peripherals in modern systems.
When a peripheral is performing Bus Mastering, it is important that the peripheral transmit data to
or from memory constantly while it holds the system bus. If the peripheral cannot do this, it must
release the bus frequently so that the system can perform refresh operations on main memory.
The Dynamic RAM used in all PCs for main memory must be accessed frequently to keep the bits
stored in the components charged. Dynamic RAM essentially consists of millions of capacitors
with each one holding one bit of data. These capacitors are charged with power to represent a 1 or
drained to represent a 0. Because all capacitors leak, power must be added at regular intervals to
keep the 1 values intact. The RAM chips actually handle the task of pumping power back into all of
546
Chapter 24. FreeBSD Internals
the appropriate locations in RAM, but they must be told when to do it by the rest of the computer so
that the refresh activity wont interfere with the computer wanting to access RAM normally. If the
computer is unable to refresh memory, the contents of memory will become corrupted in just a few
milliseconds.
Since memory read and write cycles count as refresh cycles (a dynamic RAM refresh cycle is
actually an incomplete memory read cycle), as long as the peripheral controller continues reading or
writing data to sequential memory locations, that action will refresh all of memory.
Bus-mastering is found in some SCSI host interfaces and other high-performance peripheral
controllers.
Autoinitialize
This mode causes the DMA to perform Byte, Block or Demand transfers, but when the DMA
transfer counter reaches zero, the counter and address are set back to where they were when the
DMA channel was originally programmed. This means that as long as the peripheral requests
transfers, they will be granted. It is up to the CPU to move new data into the fixed buffer ahead of
where the DMA is about to transfer it when doing output operations, and read new data out of the
buffer behind where the DMA is writing when doing input operations.
This technique is frequently used on audio devices that have small or no hardware sample buffers.
There is additional CPU overhead to manage this circular buffer, but in some cases this may be
the only way to eliminate the latency that occurs when the DMA counter reaches zero and the DMA
stops transfers until it is reprogrammed.
547
Chapter 24. FreeBSD Internals
Once all the settings are ready, the DMA channel can be un-masked. That DMA channel is now
considered to be armed, and will respond when the DRQ line for that channel is asserted.
Refer to a hardware data book for precise programming details for the 8237. You will also need to refer
to the I/O port map for the PC system, which describes where the DMA and Page Register ports are
located. A complete port map table is located below.
548
Chapter 24. FreeBSD Internals
549
Chapter 24. FreeBSD Internals
550
Chapter 24. FreeBSD Internals
551
Chapter 24. FreeBSD Internals
552
Chapter 24. FreeBSD Internals
553
Chapter 24. FreeBSD Internals
554
Chapter 24. FreeBSD Internals
555
Chapter 24. FreeBSD Internals
occurs which causes the page to be reactivated. If the page does not exist in system memory at all, the
process must block while the page is brought in from disk.
FreeBSD dynamically tunes its paging queues and attempts to maintain reasonable ratios of pages in the
various queues as well as attempts to maintain a reasonable breakdown of clean vs dirty pages. The
amount of rebalancing that occurs depends on the systems memory load. This rebalancing is
implemented by the pageout daemon and involves laundering dirty pages (syncing them with their
backing store), noticing when pages are activity referenced (resetting their position in the LRU queues or
moving them between queues), migrating pages between queues when the queues are out of balance, and
so forth. FreeBSDs VM system is willing to take a reasonable number of reactivation page faults to
determine how active or how idle a page actually is. This leads to better decisions being made as to when
to launder or swap-out a page.
556
Chapter 24. FreeBSD Internals
buffers also have their own notion of being busy, which is useful to filesystem driver code which would
rather operate on filesystem buffers instead of hard VM pages.
FreeBSD reserves a limited amount of KVM to hold mappings from struct bufs, but it should be made
clear that this KVM is used solely to hold mappings and does not limit the ability to cache data. Physical
data caching is strictly a function of vm_page_ts, not filesystem buffers. However, since filesystem
buffers are used placehold I/O, they do inherently limit the amount of concurrent I/O possible. As there
are usually a few thousand filesystem buffers available, this is not usually a problem.
557
Chapter 24. FreeBSD Internals
In a large system configuration you may wish to increase maxusers. Values typically range from 10 to
128. Note that raising maxusers too high can cause the system to overflow available KVM resulting in
unpredictable operation. It is better to leave maxusers at some reasonable number and add other options,
such as NMBCLUSTERS, to increase specific resources.
If your system is going to use the network heavily, you may want to increase NMBCLUSTERS. Typical
values range from 1024 to 4096.
The NBUF parameter is also traditionally used to scale the system. This parameter determines the amount
of KVA the system can use to map filesystem buffers for I/O. Note that this parameter has nothing
whatsoever to do with the unified buffer cache! This parameter is dynamically tuned in 3.0-CURRENT
and later kernels and should generally not be adjusted manually. We recommend that you not try to
specify an NBUF parameter. Let the system pick it. Too small a value can result in extremely inefficient
filesystem operation while too large a value can starve the page queues by causing too many pages to
become wired down.
By default, FreeBSD kernels are not optimized. You can set debugging and optimization flags with the
makeoptions directive in the kernel configuration. Note that you should not use -g unless you can
accommodate the large (typically 7 MB+) kernels that result.
makeoptions DEBUG="-g"
makeoptions COPTFLAGS="-O2 -pipe"
Sysctl provides a way to tune kernel parameters at run-time. You typically do not need to mess with any
of the sysctl variables, especially the VM related ones.
Run time VM and system tuning is relatively straightforward. First, use softupdates on your UFS/FFS
filesystems whenever possible. /usr/src/contrib/sys/softupdates/README contains
instructions (and restrictions) on how to configure it up.
Second, configure sufficient swap. You should have a swap partition configured on each physical disk, up
to four, even on your work disks. You should have at least 2x the swap space as you have main
memory, and possibly even more if you do not have a lot of memory. You should also size your swap
partition based on the maximum memory configuration you ever intend to put on the machine so you do
not have to repartition your disks later on. If you want to be able to accommodate a crash dump, your
first swap partition must be at least as large as main memory and /var/crash must have sufficient free
space to hold the dump.
558
Chapter 24. FreeBSD Internals
NFS-based swap is perfectly acceptable on -4.x or later systems, but you must be aware that the NFS
server will take the brunt of the paging load.
559
V. Appendices
560
Chapter 25. Obtaining FreeBSD
CD-ROM Publishers
FreeBSD is available on CD-ROM from Walnut Creek CDROM:
FTP Sites
The official sources for FreeBSD are available via anonymous FTP from:
ftp://ftp.FreeBSD.org/pub/FreeBSD.
561
Chapter 25. Obtaining FreeBSD
Argentina
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.ar.FreeBSD.org/pub/FreeBSD
Australia
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.au.FreeBSD.org/pub/FreeBSD
ftp://ftp2.au.FreeBSD.org/pub/FreeBSD
ftp://ftp3.au.FreeBSD.org/pub/FreeBSD
ftp://ftp4.au.FreeBSD.org/pub/FreeBSD
Brazil
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.br.FreeBSD.org/pub/FreeBSD
ftp://ftp2.br.FreeBSD.org/pub/FreeBSD
ftp://ftp3.br.FreeBSD.org/pub/FreeBSD
ftp://ftp4.br.FreeBSD.org/pub/FreeBSD
ftp://ftp5.br.FreeBSD.org/pub/FreeBSD
ftp://ftp6.br.FreeBSD.org/pub/FreeBSD
ftp://ftp7.br.FreeBSD.org/pub/FreeBSD
Canada
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.ca.FreeBSD.org/pub/FreeBSD
562
Chapter 25. Obtaining FreeBSD
China
In case of problems, please contact the hostmaster <[email protected]> for this domain.
ftp://ftp.cn.FreeBSD.org/pub/FreeBSD (ftp://ftp.cn/FreeBSD.org/pub/FreeBSD)
Czech Republic
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
Denmark
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.dk.freeBSD.ORG/pub/FreeBSD
Estonia
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.ee.FreeBSD.org/pub/FreeBSD
Finland
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.fi.FreeBSD.org/pub/FreeBSD
France
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.fr.FreeBSD.org/pub/FreeBSD
563
Chapter 25. Obtaining FreeBSD
ftp://ftp2.fr.FreeBSD.org/pub/FreeBSD
ftp://ftp3.fr.FreeBSD.org/pub/FreeBSD
Germany
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.de.FreeBSD.org/pub/FreeBSD
ftp://ftp2.de.FreeBSD.org/pub/FreeBSD
ftp://ftp3.de.FreeBSD.org/pub/FreeBSD
ftp://ftp4.de.FreeBSD.org/pub/FreeBSD
ftp://ftp5.de.FreeBSD.org/pub/FreeBSD
ftp://ftp6.de.FreeBSD.org/pub/FreeBSD
ftp://ftp7.de.FreeBSD.org/pub/FreeBSD
Hong Kong
Ireland
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.ie.FreeBSD.org/pub/FreeBSD
Israel
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.il.FreeBSD.org/pub/FreeBSD
ftp://ftp2.il.FreeBSD.org/pub/FreeBSD
564
Chapter 25. Obtaining FreeBSD
Japan
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.jp.FreeBSD.org/pub/FreeBSD
ftp://ftp2.jp.FreeBSD.org/pub/FreeBSD
ftp://ftp3.jp.FreeBSD.org/pub/FreeBSD
ftp://ftp4.jp.FreeBSD.org/pub/FreeBSD
ftp://ftp5.jp.FreeBSD.org/pub/FreeBSD
ftp://ftp6.jp.FreeBSD.org/pub/FreeBSD
Korea
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.kr.FreeBSD.org/pub/FreeBSD
ftp://ftp2.kr.FreeBSD.org/pub/FreeBSD
ftp://ftp3.kr.FreeBSD.org/pub/FreeBSD
ftp://ftp4.kr.FreeBSD.org/pub/FreeBSD
ftp://ftp5.kr.FreeBSD.org/pub/FreeBSD
ftp://ftp6.kr.FreeBSD.org/pub/FreeBSD
Netherlands
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.nl.FreeBSD.org/pub/FreeBSD
New Zealand
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.nz.FreeBSD.org/pub/FreeBSD
565
Chapter 25. Obtaining FreeBSD
Poland
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.pl.FreeBSD.org/pub/FreeBSD
Portugal
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.pt.FreeBSD.org/pub/FreeBSD
ftp://ftp2.pt.FreeBSD.org/pub/FreeBSD
Russia
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.ru.FreeBSD.org/pub/FreeBSD
ftp://ftp2.ru.FreeBSD.org/pub/FreeBSD
ftp://ftp3.ru.FreeBSD.org/pub/FreeBSD
ftp://ftp4.ru.FreeBSD.org/pub/FreeBSD
Saudi Arabia
In case of problems, please contact <[email protected]>
ftp://ftp.isu.net.sa/pub/mirrors/ftp.freebsd.org (ftp://ftp.isu.net.sa/pub/mirrors/ftp.freebsd.org/)
South Africa
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.za.FreeBSD.org/pub/FreeBSD
ftp://ftp2.za.FreeBSD.org/pub/FreeBSD
ftp://ftp3.za.FreeBSD.org/pub/FreeBSD (ftp://ftp3.za.FreeBSD.org/FreeBSD)
566
Chapter 25. Obtaining FreeBSD
Slovak Republic
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.sk.FreeBSD.org/pub/FreeBSD
Slovenia
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.si.FreeBSD.org/pub/FreeBSD
Spain
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.es.FreeBSD.org/pub/FreeBSD
Sweden
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.se.FreeBSD.org/pub/FreeBSD
ftp://ftp2.se.FreeBSD.org/pub/FreeBSD
ftp://ftp3.se.FreeBSD.org/pub/FreeBSD
Taiwan
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.tw.FreeBSD.org/pub/FreeBSD
ftp://ftp2.tw.FreeBSD.org/pub/FreeBSD
ftp://ftp3.tw.FreeBSD.org/pub/FreeBSD
567
Chapter 25. Obtaining FreeBSD
Thailand
Ukraine
UK
In case of problems, please contact the hostmaster <[email protected]> for this
domain.
ftp://ftp.uk.FreeBSD.org/pub/FreeBSD
ftp://ftp2.uk.FreeBSD.org/pub/FreeBSD
ftp://ftp3.uk.FreeBSD.org/pub/FreeBSD
ftp://ftp4.uk.FreeBSD.org/pub/FreeBSD
USA
In case of problems, please contact the hostmaster <[email protected]> for this domain.
ftp://ftp.FreeBSD.org/pub/FreeBSD
ftp://ftp2.FreeBSD.org/pub/FreeBSD
ftp://ftp3.FreeBSD.org/pub/FreeBSD
ftp://ftp4.FreeBSD.org/pub/FreeBSD
ftp://ftp5.FreeBSD.org/pub/FreeBSD
ftp://ftp6.FreeBSD.org/pub/FreeBSD
The latest versions of export-restricted code for FreeBSD (2.0C or later) (eBones and secure) are being
made available at the following locations. If you are outside the U.S. or Canada, please get secure (DES)
and eBones (Kerberos) from one of the following foreign distribution sites:
568
Chapter 25. Obtaining FreeBSD
South Africa
Hostmaster <[email protected]> for this domain.
ftp://ftp.internat.FreeBSD.org/pub/FreeBSD
ftp://ftp2.internat.FreeBSD.org/pub/FreeBSD
Brazil
Hostmaster <[email protected]> for this domain.
ftp://ftp.br.FreeBSD.org/pub/FreeBSD
Finland
CTM Sites
CTM/FreeBSD is available via anonymous FTP from the following mirror sites. If you choose to obtain
CTM via anonymous FTP, please try to use a site near you.
In case of problems, please contact Poul-Henning Kamp <[email protected]>.
ftp://ftp.FreeBSD.org/pub/FreeBSD/development/CTM
Germany, Trier
ftp://ftp.uni-trier.de/pub/unix/systems/BSD/FreeBSD/CTM
569
Chapter 25. Obtaining FreeBSD
ftp://ftp.internat.FreeBSD.org/pub/FreeBSD/CTM
Taiwan/R.O.C, Chiayi
ftp://ctm.tw.FreeBSD.org/pub/FreeBSD/CTM
ftp://ctm2.tw.FreeBSD.org/pub/FreeBSD/CTM
ftp://ctm3.tw.FreeBSD.org/pub/freebsd/CTM (ftp://ctm3.tw.FreeBSD.org/pub/FreeBSD/CTM)
If you did not find a mirror near to you or the mirror is incomplete, try FTP search
(http://ftpsearch.ntnu.no/) at http://ftpsearch.ntnu.no/ftpsearch (http://ftpsearch.ntnu.no/ftpsearch/). FTP
search is a great free archie server in Trondheim, Norway.
CVSup Sites
CVSup servers for FreeBSD are running at the following sites:
Argentina
Australia
Brazil
570
Chapter 25. Obtaining FreeBSD
Canada
China
Czech Republic
Denmark
Estonia
Finland
France
571
Chapter 25. Obtaining FreeBSD
Germany
Iceland
Japan
Korea
Netherlands
572
Chapter 25. Obtaining FreeBSD
Norway
Poland
Russia
Spain
Sweden
Slovak Republic
573
Chapter 25. Obtaining FreeBSD
South Africa
Taiwan
Ukraine
United Kingdom
USA
The export-restricted code for FreeBSD (eBones and secure) is available via CVSup at the following
international repository. Please use this site to get the export-restricted code, if you are outside the USA
or Canada.
574
Chapter 25. Obtaining FreeBSD
South Africa
The following CVSup site is especially designed for CTM users. Unlike the other CVSup mirrors, it is
kept up-to-date by CTM. That means if you CVSup cvs-all with release=cvs from this site, you
get a version of the repository (including the inevitable .ctm_status file) which is suitable for being
updated using the CTM cvs-cur deltas. This allows users who track the entire cvs-all tree to go from
CVSup to CTM without having to rebuild their repository from scratch using a fresh CTM base delta.
Note: This special feature only works for the cvs-all distribution with cvs as the release tag.
CVSupping any other distribution and/or release will get you the specified distribution, but it will not
be suitable for CTM updating.
Note: Because the current version of CTM does not preserve the timestamps of files, the
timestamps at this mirror site are not the same as those at other mirror sites. Switching between this
site and other sites is not recommended. It will work correctly, but will be somewhat inefficient.
Germany
AFS Sites
AFS servers for FreeBSD are running at the following sites;
Sweden
The path to the files are: /afs/stacken.kth.se/ftp/pub/FreeBSD
stacken.kth.se # Stacken Computer Club, KTH, Sweden
130.237.234.43 #hot.stacken.kth.se
130.237.237.230 #fishburger.stacken.kth.se
130.237.234.3 #milko.stacken.kth.se
575
Chapter 25. Obtaining FreeBSD
Maintainer <[email protected]>
576
Chapter 26. Bibliography
While the manual pages provide the definitive reference for individual pieces of the FreeBSD operating
system, they are notorious for not illustrating how to put the pieces together to make the whole operating
system run smoothly. For this, there is no substitute for a good book on UNIX system administration and
a good users manual.
577
Chapter 26. Bibliography
Users Guides
Computer Systems Research Group, UC Berkeley. 4.4BSD Users Reference Manual. OReilly &
Associates, Inc., 1994. ISBN 1-56592-075-9
Computer Systems Research Group, UC Berkeley. 4.4BSD Users Supplementary Documents.
OReilly & Associates, Inc., 1994. ISBN 1-56592-076-7
UNIX in a Nutshell. OReilly & Associates, Inc., 1990. ISBN 093717520X
Mui, Linda. What You Need To Know When You Cant Find Your UNIX System Administrator.
OReilly & Associates, Inc., 1995. ISBN 1-56592-104-6
Ohio State University (http://www-wks.acs.ohio-state.edu/) has written a UNIX Introductory Course
(http://www-wks.acs.ohio-state.edu/unix_course/unix.html) which is available online in HTML and
postscript format.
Jpman Project, Japan FreeBSD Users Group (http://www.jp.FreeBSD.org/). FreeBSD Users
Reference Manual (http://www.pc.mycom.co.jp/FreeBSD/urm.html) (Japanese translation). Mainichi
Communications Inc. (http://www.pc.mycom.co.jp/), 1998. ISBN4-8399-0088-4 P3800E.
Administrators Guides
Albitz, Paul and Liu, Cricket. DNS and BIND, 2nd Ed. OReilly & Associates, Inc., 1997. ISBN
1-56592-236-0
Computer Systems Research Group, UC Berkeley. 4.4BSD System Managers Manual. OReilly &
Associates, Inc., 1994. ISBN 1-56592-080-5
Costales, Brian, et al. Sendmail, 2nd Ed. OReilly & Associates, Inc., 1997. ISBN 1-56592-222-0
Frisch, leen. Essential System Administration, 2nd Ed. OReilly & Associates, Inc., 1995. ISBN
1-56592-127-5
Hunt, Craig. TCP/IP Network Administration. OReilly & Associates, Inc., 1992. ISBN
0-937175-82-X
Nemeth, Evi. UNIX System Administration Handbook. 2nd Ed. Prentice Hall, 1995. ISBN
0131510517
Stern, Hal Managing NFS and NIS OReilly & Associates, Inc., 1991. ISBN 0-937175-75-7
578
Chapter 26. Bibliography
Programmers Guides
Andleigh, Prabhat K. UNIX System Architecture. Prentice-Hall, Inc., 1990. ISBN 0-13-949843-5
Jolitz, William. Porting UNIX to the 386. Dr. Dobbs Journal. January 1991-July 1992.
Leffler, Samuel J., Marshall Kirk McKusick, Michael J Karels and John Quarterman The Design and
Implementation of the 4.3BSD UNIX Operating System. Reading, Mass. : Addison-Wesley, 1989.
579
Chapter 26. Bibliography
ISBN 0-201-06196-1
Leffler, Samuel J., Marshall Kirk McKusick, The Design and Implementation of the 4.3BSD UNIX
Operating System: Answer Book. Reading, Mass. : Addison-Wesley, 1991. ISBN 0-201-54629-9
McKusick, Marshall Kirk, Keith Bostic, Michael J Karels, and John Quarterman. The Design and
Implementation of the 4.4BSD Operating System. Reading, Mass. : Addison-Wesley, 1996. ISBN
0-201-54979-4
Stevens, W. Richard. TCP/IP Illustrated, Volume 1: The Protocols. Reading, Mass. : Addison-Wesley,
1996. ISBN 0-201-63346-9
Schimmel, Curt. Unix Systems for Modern Architectures. Reading, Mass. : Addison-Wesley, 1994.
ISBN 0-201-63338-8
Stevens, W. Richard. TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP and the
UNIX Domain Protocols. Reading, Mass. : Addison-Wesley, 1996. ISBN 0-201-63495-3
Vahalia, Uresh. UNIX Internals The New Frontiers. Prentice Hall, 1996. ISBN 0-13-101908-2
Wright, Gary R. and W. Richard Stevens. TCP/IP Illustrated, Volume 2: The Implementation.
Reading, Mass. : Addison-Wesley, 1995. ISBN 0-201-63354-X
Security Reference
Cheswick, William R. and Steven M. Bellovin. Firewalls and Internet Security: Repelling the Wily
Hacker. Reading, Mass. : Addison-Wesley, 1995. ISBN 0-201-63357-4
Garfinkel, Simson and Gene Spafford. Practical UNIX Security. 2nd Ed. OReilly & Associates, Inc.,
1996. ISBN 1-56592-148-8
Garfinkel, Simson. PGP Pretty Good Privacy OReilly & Associates, Inc., 1995. ISBN 1-56592-098-8
Hardware Reference
Anderson, Don and Tom Shanley. Pentium Processor System Architecture. 2nd Ed. Reading, Mass. :
Addison-Wesley, 1995. ISBN 0-201-40992-5
Ferraro, Richard F. Programmers Guide to the EGA, VGA, and Super VGA Cards. 3rd ed. Reading,
Mass. : Addison-Wesley, 1995. ISBN 0-201-62490-7
580
Chapter 26. Bibliography
Intel Corporation publishes documentation on their CPUs, chipsets and standards on their developer
web site (http://developer.intel.com/), usually as PDF files.
Shanley, Tom. 80486 System Architecture. 3rd ed. Reading, Mass. : Addison-Wesley, 1995. ISBN
0-201-40994-1
Shanley, Tom. ISA System Architecture. 3rd ed. Reading, Mass. : Addison-Wesley, 1995. ISBN
0-201-40996-8
Shanley, Tom. PCI System Architecture. 3rd ed. Reading, Mass. : Addison-Wesley, 1995. ISBN
0-201-40993-3
Van Gilluwe, Frank. The Undocumented PC. Reading, Mass: Addison-Wesley Pub. Co., 1994. ISBN
0-201-62277-7
UNIX History
Lion, John Lions Commentary on UNIX, 6th Ed. With Source Code. ITP Media Group, 1996. ISBN
1573980137
Raymond, Eric S. The New Hackers Dictionary, 3rd edition. MIT Press, 1996. ISBN 0-262-68092-0.
Also known as the Jargon File (http://www.ccil.org/jargon/jargon.html)
Salus, Peter H. A quarter century of UNIX. Addison-Wesley Publishing Company, Inc., 1994. ISBN
0-201-54777-5
Simon Garfinkel, Daniel Weise, Steven Strassmann. The UNIX-HATERS Handbook. IDG Books
Worldwide, Inc., 1994. ISBN 1-56884-203-1
Don Libes, Sandy Ressler Life with UNIX special edition. Prentice-Hall, Inc., 1989. ISBN
0-13-536657-7
The BSD family tree. 1997.
ftp://ftp.FreeBSD.org/pub/FreeBSD/FreeBSD-current/src/share/misc/bsd-family-tree or local
(file:/usr/share/misc/bsd-family-tree) on a FreeBSD-current machine.
The BSD Release Announcements collection. 1997. http://www.de.FreeBSD.org/de/ftp/releases/
Networked Computer Science Technical Reports Library. http://www.ncstrl.org/
Old BSD releases from the Computer Systems Research group (CSRG).
http://www.mckusick.com/csrg/: The 4CD set covers all BSD versions from 1BSD to 4.4BSD and
4.4BSD-Lite2 (but not 2.11BSD, unfortunately). As well, the last disk holds the final sources plus the
SCCS files.
581
Chapter 26. Bibliography
582
Chapter 27. Resources on the Internet
Contributed by Jordan K. Hubbard <[email protected] >.
The rapid pace of FreeBSD progress makes print media impractical as a means of following the latest
developments. Electronic resources are the best, if not often the only, way stay informed of the latest
advances. Since FreeBSD is a volunteer effort, the user community itself also generally serves as a
technical support department of sorts, with electronic mail and USENET news being the most effective
way of reaching that community.
The most important points of contact with the FreeBSD user community are outlined below. If you are
aware of other resources not mentioned here, please send them to the FreeBSD documentation project
mailing list <[email protected]>so that they may also be included.
Mailing lists
Though many of the FreeBSD development members read USENET, we cannot always guarantee that
we will get to your questions in a timely fashion (or at all) if you post them only to one of the
comp.unix.bsd.freebsd.* groups. By addressing your questions to the appropriate mailing list you
will reach both us and a concentrated FreeBSD audience, invariably assuring a better (or at least faster)
response.
The charters for the various lists are given at the bottom of this document. Please read the charter before
joining or sending mail to any list. Most of our list subscribers now receive many hundreds of FreeBSD
related messages every day, and by setting down charters and rules for proper use we are striving to keep
the signal-to-noise ratio of the lists high. To do less would see the mailing lists ultimately fail as an
effective communications medium for the project.
Archives are kept for all of the mailing lists and can be searched using the FreeBSD World Wide Web
server (http://www.FreeBSD.org/search.html). The keyword searchable archive offers an excellent way
of finding answers to frequently asked questions and should be consulted before posting a question.
List summary
General lists: The following are general lists which anyone is free (and encouraged) to join:
List Purpose
freebsd-advocacy FreeBSD Evangelism
freebsd-announce Important events and project milestones
583
Chapter 27. Resources on the Internet
Technical lists: The following lists are for technical discussion. You should read the charter for each list
carefully before joining or sending mail to one as there are firm guidelines for their use and content.
List Purpose
freebsd-afs Porting AFS to FreeBSD
freebsd-alpha Porting FreeBSD to the Alpha
freebsd-doc Creating FreeBSD related documents
freebsd-database Discussing database use and development under
FreeBSD
freebsd-emulation Emulation of other systems such as
Linux/DOS/Windows
freebsd-fs Filesystems
freebsd-hackers General technical discussion
freebsd-hardware General discussion of hardware for running
FreeBSD
freebsd-ipfw Technical discussion concerning the redesign of the
IP firewall code
freebsd-isdn ISDN developers
freebsd-java Java developers and people porting JDKs to
FreeBSD
freebsd-mobile Discussions about mobile computing
584
Chapter 27. Resources on the Internet
Limited lists: The following lists require approval from <[email protected]> to join, though anyone
is free to send messages to them which fall within the scope of their charters. It is also a good idea
establish a presence in the technical lists before asking to join one of these limited lists.
List Purpose
freebsd-admin Administrative issues
freebsd-arch Architecture and design discussions
freebsd-core FreeBSD core team
freebsd-hubs People running mirror sites (infrastructural support)
CVS lists: The following lists are for people interested in seeing the log messages for changes to various
areas of the source tree. They are Read-Only lists and should not have mail sent to them.
585
Chapter 27. Resources on the Internet
How to subscribe
All mailing lists live on FreeBSD.org, so to post to a given list you simply mail to
<[email protected]>. It will then be redistributed to mailing list members world-wide.
To subscribe to a list, send mail to <[email protected]> and include
in the body of your message. For example, to subscribe yourself to freebsd-announce, youd do:
% mail [email protected]
subscribe freebsd-announce
^D
If you want to subscribe yourself under a different name, or submit a subscription request for a local
mailing list (this is more efficient if you have several interested parties at one site, and highly appreciated
by us!), you would do something like:
% mail [email protected]
subscribe freebsd-announce [email protected]
^D
Finally, it is also possible to unsubscribe yourself from a list, get a list of other list members or see the
list of mailing lists again by sending other types of control messages to majordomo. For a complete list
of available commands, do this:
% mail [email protected]
help
^D
Again, we would like to request that you keep discussion in the technical mailing lists on a technical
track. If you are only interested in the high points then it is suggested that you join freebsd-announce,
which is intended only for infrequent traffic.
List charters
AllFreeBSD mailing lists have certain basic rules which must be adhered to by anyone using them.
Failure to comply with these guidelines will result in two (2) written warnings from the FreeBSD
Postmaster <[email protected]>, after which, on a third offense, the poster will removed
from all FreeBSD mailing lists and filtered from further posting to them. We regret that such rules and
measures are necessary at all, but todays Internet is a pretty harsh environment, it would seem, and
many fail to appreciate just how fragile some of its mechanisms are.
586
Chapter 27. Resources on the Internet
The topic of any posting should adhere to the basic charter of the list it is posted to, e.g. if the list is
about technical issues then your posting should contain technical discussion. Ongoing irrelevant
chatter or flaming only detracts from the value of the mailing list for everyone on it and will not be
tolerated. For free-form discussion on no particular topic, the freebsd-chat
<[email protected]> mailing list is freely available and should be used instead.
No posting should be made to more than 2 mailing lists, and only to 2 when a clear and obvious need
to post to both lists exists. For most lists, there is already a great deal of subscriber overlap and except
for the most esoteric mixes (say "-stable & -scsi"), there really is no reason to post to more than one
list at a time. If a message is sent to you in such a way that multiple mailing lists appear on the Cc line
then the cc line should also be trimmed before sending it out again. You are still responsible for your
own cross-postings, no matter who the originator might have been.
Personal attacks and profanity (in the context of an argument) are not allowed, and that includes users
and developers alike. Gross breaches of netiquette, like excerpting or reposting private mail when
permission to do so was not and would not be forthcoming, are frowned upon but not specifically
enforced. However, there are also very few cases where such content would fit within the charter of a
list and it would therefore probably rate a warning (or ban) on that basis alone.
Advertising of non-FreeBSD related products or services is strictly prohibited and will result in an
immediate ban if it is clear that the offender is advertising by spam.
Individual list charters:
FREEBSD-AFS
Andrew File System
This list is for discussion on porting and using AFS from CMU/Transarc
FREEBSD-ADMIN
Administrative issues
This list is purely for discussion of FreeBSD.org related issues and to report problems or abuse of
project resources. It is a closed list, though anyone may report a problem (with our systems!) to it.
FREEBSD-ANNOUNCE
Important events / milestones
This is the mailing list for people interested only in occasional announcements of significant
FreeBSD events. This includes announcements about snapshots and other releases. It contains
587
Chapter 27. Resources on the Internet
announcements of new FreeBSD capabilities. It may contain calls for volunteers etc. This is a low
volume, strictly moderated mailing list.
FREEBSD-ARCH
Architecture and design discussions
This is a moderated list for discussion of FreeBSD architecture. Messages will mostly be kept
technical in nature, with (rare) exceptions for other messages the moderator deems need to reach all
the subscribers of the list. Examples of suitable topics;
How to re-vamp the build system to have several customized builds running at the same time.
What needs to be fixed with VFS to make Heidemann layers work.
How do we change the device driver interface to be able to use the ame drivers cleanly on many
buses and architectures?
How do I write a network driver?
The moderator reserves the right to do minor editing (spell-checking, grammar correction,
trimming) of messages that are posted to the list. The volume of the list will be kept low, which may
involve having to delay topics until an active discussion has been resolved.
FREEBSD-BUGS
Bug reports
This is the mailing list for reporting bugs in FreeBSD Whenever possible, bugs should be submitted
using the send-pr(1) command or the WEB interface (http://www.FreeBSD.org/send-pr.html) to it.
FREEBSD-CHAT
Non technical items related to the FreeBSD community
This list contains the overflow from the other lists about non-technical, social information. It
includes discussion about whether Jordan looks like a toon ferret or not, whether or not to type in
capitals, who is drinking too much coffee, where the best beer is brewed, who is brewing beer in
their basement, and so on. Occasional announcements of important events (such as upcoming
parties, weddings, births, new jobs, etc) can be made to the technical lists, but the follow ups should
be directed to this -chat list.
FREEBSD-CORE
FreeBSD core team
588
Chapter 27. Resources on the Internet
This is an internal mailing list for use by the core members. Messages can be sent to it when a
serious FreeBSD-related matter requires arbitration or high-level scrutiny.
FREEBSD-CURRENT
Discussions about the use of FreeBSD-current
This is the mailing list for users of freebsd-current. It includes warnings about new features coming
out in -current that will affect the users, and instructions on steps that must be taken to remain
-current. Anyone running current must subscribe to this list. This is a technical mailing list for
which strictly technical content is expected.
FREEBSD-CURRENT-DIGEST
Discussions about the use of FreeBSD-current
This is the digest version of the freebsd-current mailing list. The digest consists of all messages sent
to freebsd-current bundled together and mailed out as a single message. The average digest size is
about 40kB. This list is Read-Only and should not be posted to.
FREEBSD-DOC
Documentation project
This mailing list is for the discussion of issues and projects related to the creation of documentation
for FreeBSD. The members of this mailing list are collectively referred to as The FreeBSD
Documentation Project. It is an open list; feel free to join and contribute!
FREEBSD-FS
Filesystems
Discussions concerning FreeBSD filesystems. This is a technical mailing list for which strictly
technical content is expected.
FREEBSD-IPFW
IP Firewall
This is the forum for technical discussions concerning the redesign of the IP firewall code in
FreeBSD. This is a technical mailing list for which strictly technical content is expected.
589
Chapter 27. Resources on the Internet
FREEBSD-ISDN
ISDN Communications
This is the mailing list for people discussing the development of ISDN support for FreeBSD.
FREEBSD-JAVA
Java Development
This is the mailing list for people discussing the development of significant Java applications for
FreeBSD and the porting and maintenance of JDKs.
FREEBSD-HACKERS
Technical discussions
This is a forum for technical discussions related to FreeBSD. This is the primary technical mailing
list. It is for individuals actively working on FreeBSD, to bring up problems or discuss alternative
solutions. Individuals interested in following the technical discussion are also welcome. This is a
technical mailing list for which strictly technical content is expected.
FREEBSD-HACKERS-DIGEST
Technical discussions
This is the digest version of the freebsd-hackers mailing list. The digest consists of all messages
sent to freebsd-hackers bundled together and mailed out as a single message. The average digest
size is about 40kB. This list is Read-Only and should not be posted to.
FREEBSD-HARDWARE
General discussion of FreeBSD hardware
General discussion about the types of hardware that FreeBSD runs on, various problems and
suggestions concerning what to buy or avoid.
FREEBSD-INSTALL
Installation discussion
This mailing list is for discussing FreeBSD installation development for the future releases and is
closed.
590
Chapter 27. Resources on the Internet
FREEBSD-ISP
Issues for Internet Service Providers
This mailing list is for discussing topics relevant to Internet Service Providers (ISPs) using
FreeBSD. This is a technical mailing list for which strictly technical content is expected.
FREEBSD-NEWBIES
Newbies activities discussion
We cover any of the activities of newbies that are not already dealt with elsewhere, including:
independent learning and problem solving techniques, finding and using resources and asking for
help elsewhere, how to use mailing lists and which lists to use, general chat, making mistakes,
boasting, sharing ideas, stories, moral (but not technical) support, and taking an active part in the
FreeBSD community. We take our problems and support questions to freebsd-questions, and use
freebsd-newbies to meet others who are doing the same things that we do as newbies.
FREEBSD-PLATFORMS
Porting to Non-Intel platforms
Cross-platform FreeBSD issues, general discussion and proposals for non-Intel FreeBSD ports.
This is a technical mailing list for which strictly technical content is expected.
FREEBSD-POLICY
Core team policy decisions
This is a low volume, read-only mailing list for FreeBSD Core Team Policy decisions.
FREEBSD-PORTS
Discussion of ports
Discussions concerning FreeBSDs ports collection (/usr/ports), proposed ports,
modifications to ports collection infrastructure and general coordination efforts. This is a technical
mailing list for which strictly technical content is expected.
FREEBSD-QUESTIONS
User questions
This is the mailing list for questions about FreeBSD. You should not send how to questions to the
technical lists unless you consider the question to be pretty technical.
591
Chapter 27. Resources on the Internet
FREEBSD-QUESTIONS-DIGEST
User questions
This is the digest version of the freebsd-questions mailing list. The digest consists of all messages
sent to freebsd-questions bundled together and mailed out as a single message. The average digest
size is about 40kB.
FREEBSD-SCSI
SCSI subsystem
This is the mailing list for people working on the scsi subsystem for FreeBSD. This is a technical
mailing list for which strictly technical content is expected.
FREEBSD-SECURITY
Security issues
FreeBSD computer security issues (DES, Kerberos, known security holes and fixes, etc). This is a
technical mailing list for which strictly technical content is expected.
FREEBSD-SECURITY-NOTIFICATIONS
Security Notifications Notifications of FreeBSD security problems and fixes. This is not a
discussion list. The discussion list is FreeBSD-security.
FREEBSD-SMALL
This list discusses topics related to unusually small and embedded FreeBSD installations. This is a
technical mailing list for which strictly technical content is expected.
FREEBSD-STABLE
Discussions about the use of FreeBSD-stable
This is the mailing list for users of freebsd-stable. It includes warnings about new features coming
out in -stable that will affect the users, and instructions on steps that must be taken to remain -stable.
Anyone running stable should subscribe to this list. This is a technical mailing list for which
strictly technical content is expected.
FREEBSD-USER-GROUPS
User Group Coordination List
592
Chapter 27. Resources on the Internet
This is the mailing list for the coordinators from each of the local area Users Groups to discuss
matters with each other and a designated individual from the Core Team. This mail list should be
limited to meeting synopsis and coordination of projects that span User Groups. It is a closed list.
Usenet newsgroups
In addition to two FreeBSD specific newsgroups, there are many others in which FreeBSD is discussed
or are otherwise relevant to FreeBSD users. Keyword searchable archives
(http://minnie.cs.adfa.edu.au/BSD-info/bsdnews_search.html) are available for some of these
newsgroups from courtesy of Warren Toomey <[email protected]>.
comp.unix.bsd.freebsd.announce (news:comp.unix.bsd.freebsd.announce)
comp.unix.bsd.freebsd.misc (news:comp.unix.bsd.freebsd.misc)
comp.unix (news:comp.unix)
comp.unix.questions (news:comp.unix.questions)
comp.unix.admin (news:comp.unix.admin)
comp.unix.programmer (news:comp.unix.programmer)
comp.unix.shell (news:comp.unix.shell)
comp.unix.user-friendly (news:comp.unix.user-friendly)
comp.security.unix (news:comp.security.unix)
comp.sources.unix (news:comp.sources.unix)
comp.unix.advocacy (news:comp.unix.advocacy)
comp.unix.misc (news:comp.unix.misc)
comp.bugs.4bsd (news:comp.bugs.4bsd)
593
Chapter 27. Resources on the Internet
comp.bugs.4bsd.ucb-fixes (news:comp.bugs.4bsd.ucb-fixes)
comp.unix.bsd (news:comp.unix.bsd)
X Window System
comp.windows.x.i386unix (news:comp.windows.x.i386unix)
comp.windows.x (news:comp.windows.x)
comp.windows.x.apps (news:comp.windows.x.apps)
comp.windows.x.announce (news:comp.windows.x.announce)
comp.windows.x.intrinsics (news:comp.windows.x.intrinsics)
comp.windows.x.motif (news:comp.windows.x.motif)
comp.windows.x.pex (news:comp.windows.x.pex)
comp.emulators.ms-windows.wine (news:comp.emulators.ms-windows.wine)
594
Chapter 27. Resources on the Internet
http://www.ee.FreeBSD.org/ Estonia.
http://www.fi.FreeBSD.org/ Finland/1.
http://www2.fi.FreeBSD.org/ Finland/2.
http://www.fr.FreeBSD.org/ France.
http://www.de.FreeBSD.org/ Germany/1.
http://www1.de.FreeBSD.org/ Germany/2.
http://www.de.FreeBSD.org/ (http://www2.de.FreeBSD.org/) Germany/3.
http://www.hu.FreeBSD.org/ Hungary.
http://www.is.FreeBSD.org/ Iceland.
http://www.ie.FreeBSD.org/ Ireland.
http://www.jp.FreeBSD.org/www.FreeBSD.org/ Japan.
http://www.kr.FreeBSD.org/ Korea.
http://rama.asiapac.net/freebsd/ Malaysia.
http://www.nl.FreeBSD.org/ Netherlands.
http://www.no.FreeBSD.org/ Norway.
http://www.pt.FreeBSD.org/ Portugal/1.
http://www2.pt.FreeBSD.org/ Portugal/2.
http://www3.pt.FreeBSD.org/ Portugal/3.
http://www.ro.FreeBSD.org/ Romania.
http://www.ru.FreeBSD.org/ Russia/1.
http://www2.ru.FreeBSD.org/ Russia/2.
http://www3.ru.FreeBSD.org/ Russia/3.
http://www4.ru.FreeBSD.org/ Russia/4.
http://www.sk.FreeBSD.org/ Slovak Republic.
http://www.si.FreeBSD.org/ Slovenia.
http://www.es.FreeBSD.org/ Spain.
http://www.za.FreeBSD.org/ South Africa/1.
http://www2.za.FreeBSD.org/ South Africa/2.
http://www.se.FreeBSD.org/www.FreeBSD.org/ Sweden.
595
Chapter 27. Resources on the Internet
http://www.tr.FreeBSD.org/ Turkey.
http://www.ua.FreeBSD.org/ Ukraine/1.
http://www2.ua.FreeBSD.org/ Ukraine/2.
http://www.uk.FreeBSD.org/ United Kingdom.
http://freebsd.advansys.net/ USA/Indiana.
http://www6.FreeBSD.org/ USA/Oregon.
http://www2.FreeBSD.org/ USA/Texas.
Email Addresses
The following user groups provide FreeBSD related email addresses for their members. The listed
administrator reserves the right to revoke the address if it is abused in any way.
Shell Accounts
The following user groups provide shell accounts for people who are actively supporting the FreeBSD
project. The listed administrator reserves the right to cancel the account if it is abused in any way.
596
Chapter 28. FreeBSD Project Staff
The FreeBSD Project is managed and operated by the following groups of people:
597
Chapter 28. FreeBSD Project Staff
598
Chapter 28. FreeBSD Project Staff
599
Chapter 28. FreeBSD Project Staff
600
Chapter 28. FreeBSD Project Staff
601
Chapter 28. FreeBSD Project Staff
602
Chapter 28. FreeBSD Project Staff
Webmaster
Wolfram Schneider <[email protected]>
News Editor
Nate Johnson <[email protected]>
Deputy: John Cavanaugh <[email protected]>
Gallery Editor
Nate Johnson <[email protected]>
Deputy: Charles A. Wimmer <[email protected]>
Commercial Editor
Nik Clayton <[email protected]>
603
Chapter 28. FreeBSD Project Staff
Principal Architect
David Greenman <[email protected]>
Internationalization
Andrey A. Chernov <[email protected]>
Networking
Garrett Wollman <[email protected]>
Postmaster
Jonathan M. Bresler <[email protected]>
Release Coordinator
Jordan K. Hubbard <[email protected]>
604
Chapter 28. FreeBSD Project Staff
Usenet Support
Jrg Wunsch <[email protected]>
Webmaster (http://www.FreeBSD.org/internal/)
Wolfram Schneider <[email protected]>
605
Chapter 29. PGP keys
In case you need to verify a signature or send encrypted email to one of the officers or core team
members a number of keys are provided here for your convenience.
Officers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=ipyA
---END PGP PUBLIC KEY BLOCK---
606
Chapter 29. PGP keys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=7fQV
---END PGP PUBLIC KEY BLOCK---
mQCNAzPVyoQAAAEEAL7W+kipxB171Z4SVyyL9skaA7hG3eRsSOWk7lfvfUBLtPog
607
Chapter 29. PGP keys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=39SC
---END PGP PUBLIC KEY BLOCK---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Chapter 29. PGP keys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=zbCw
---END PGP PUBLIC KEY BLOCK---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Chapter 29. PGP keys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=1ahV
---END PGP PUBLIC KEY BLOCK---
mQCNAzFjX0IAAAEEAML+nm9/kDNPp43ZUZGjYkm2QLtoC1Wxr8JulZXqk7qmhYcQ
jvX+fyoriJ6/7ZlnLe2oG5j9tZOnRLPvMaz0g9CpW6Dz3nkXrNPkmOFV9B8D94Mk
610
Chapter 29. PGP keys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=C/Jw
---END PGP PUBLIC KEY BLOCK---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Chapter 29. PGP keys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=JKbP
---END PGP PUBLIC KEY BLOCK---
mQCNAy97V+MAAAEEALiNM3FCwm3qrCe81E20UOSlNclOWfZHNAyOyj1ahHeINvo1
FBF2Gd5Lbj0y8SLMno5yJ6P4F4r+x3jwHZrzAIwMs/lxDXRtB0VeVWnlj6a3Rezs
wbfaTeSVyh5JohEcKdoYiMG5wjATOwK/NAwIPthB1RzRjnEeer3HI3ZYNEOpAAUR
tCRSaWNoIE11cnBoZXkgPHJpY2hAbGFtcHJleS51dG1iLmVkdT6JAJUDBRAve15W
vccjdlg0Q6kBAZTZBACcNd/LiVnMFURPrO4pVRn1sVQeokVX7izeWQ7siE31Iy7g
Sb97WRLEYDi686osaGfsuKNA87Rm+q5F+jxeUV4w4szoqp60gGvCbD0KCB2hWraP
/2s2qdVAxhfcoTin/Qp1ZWvXxFF7imGA/IjYIfB42VkaRYu6BwLEm3YAGfGcSw==
=QoiM
---END PGP PUBLIC KEY BLOCK---
612
Chapter 29. PGP keys
mQCNAzMElMEAAAEEALizp6ZW9QifQgWoFmG3cXhzQ1+Gt+a4S1adC/TdHdBvw1M/
I6Ok7TC0dKF8blW3VRgeHo4F3XhGn+n9MqIdboh4HJC5Iiy63m98sVLJSwyGO4oM
dkEGyyCLxqP6h/DU/tzNBdqFzetGtYvU4ftt3RO0a506cr2CHcdm8Q+/vPRJAAUR
tCFKb2huIEQuIFBvbHN0cmEgPGpkcEBwb2xzdHJhLmNvbT6JAJUDBRAzBNBE9RVb
+45ULV0BAWgiA/0WWO3+c3qlptPCHJ3DFm6gG/qNKsY94agL/mHOr0fxMP5l2qKX
O6a1bWkvGoYq0EwoKGFfn0QeHiCl6jVi3CdBX+W7bObMcoi+foqZ6zluOWBC1Jdk
WQ5/DeqQGYXqbYjqO8voCScTAPge3XlMwVpMZTv24u+nYxtLkE0ZcwtY9IkAlQMF
EDMEt/DHZvEPv7z0SQEBXh8D/2egM5ckIRpGz9kcFTDClgdWWtlgwC1iI2p9gEhq
aufy+FUJlZS4GSQLWB0BlrTmDC9HuyQ+KZqKFRbVZLyzkH7WFs4zDmwQryLV5wkN
C4BRRBXZfWy8s4+zT2WQD1aPO+ZsgRauYLkJgTvXTPU2JCN62Nsd8R7bJS5tuHEm
7HGmiQCVAwUQMwSvHB9/qQgDWPy9AQFAhAQAgJ1AlbKITrEoJ0+pLIsov3eQ348m
SVHEBGIkU3Xznjr8NzT9aYtq4TIzt8jplqP3QoV1ka1yYpZf0NjvfZ+ffYp/sIaU
wPbEpgtmHnVWJAebMbNs/Ad1w8GDvxEt9IaCbMJGZnHmfnEqOBIxF7VBDPHHoJxM
V31K/PIoYsHAy5w=
=cHFa
---END PGP PUBLIC KEY BLOCK---
mQCNAzGeO84AAAEEAKKAY91Na//DXwlUusr9GVESSlVwVP6DyH1wcZXhfN1fyZHq
SwhMCEdHYoojQds+VqD1iiZQvv1RLByBgj622PDAPN4+Z49HjGs7YbZsUNuQqPPU
wRPpP6ty69x1hPKq1sQIB5MS4radpCM+4wbZbhxv7l4rP3RWUbNaYutZnzI9AAUR
tCZHdWlkbyB2YW4gUm9vaWogPGd1aWRvQGd2ci53aW4udHVlLm5sPokAlQMFEDMG
Hcgff6kIA1j8vQEBbYgD/jm9xHuUuY+iXDkOzpCXBYACYEZDV913MjtyBAmaVqYo
Rh5HFimkGXe+rCo78Aau0hc57fFMTsJqnuWEqVt3GRq28hSK1FOZ7ni9/XibHcmN
rt2yugl3hYpClijo4nrDL1NxibbamkGW/vFGcljS0jqXz6NDVbGx5Oo7HBByxByz
iQCVAwUQMhmtVjt/x7zOdmsfAQFuVQQApsVUTigT5YWjQA9Nd5Z0+a/oVtZpyw5Z
OljLJP3vqJdMa6TidhfcatjHbFTve5x1dmjFgMX/MQTd8zf/+Xccy/PX4+lnKNpP
eSf1Y4aK+E8KHmBGd6GzX6CIboyGYLS9e3kGnN06F2AQtaLyJFgQ71wRaGuyKmQG
FwTn7jiKb1aJAJUDBRAyEOLXPt3iN6QQUSEBATwQA/9jqu0Nbk154+Pn+9mJX/YT
fYR2UqK/5FKCqgL5Nt/Deg2re0zMD1f8F9Dj6vuAAxq8hnOkIHKlWolMjkRKkzJi
mSPEWl3AuHJ31k948J8it4f8kq/o44usIA2KKVMlI63Q/rmNdfWCyiYQEVGcRbTm
GTdZIHYCOgV5dOo4ebFqgYkAlQMFEDIE1nMEJn15jgpJ0QEBW6kEAKqN8XSgzTqf
CrxFXT07MlHhfdbKUTNUoboxCGCLNW05vf1A8F5fdE5i14LiwkldWIzPxWD+Sa3L
fNPCfCZTaCiyGcLyTzVfBHA18MBAOOX6JiTpdcm22jLGUWBf/aJK3yz/nfbWntd/
LRHysIdVp29lP5BF+J9/Lzbb/9LxP1taiQCVAwUQMgRXZ44CzbsJWQz9AQFf7gP/
Qa2FS5S6RYKG3rYanWADVe/ikFV2lxuM1azlWbsmljXvKVWGe6cV693nS5lGGAjx
613
Chapter 29. PGP keys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=mSvM
---END PGP PUBLIC KEY BLOCK---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Chapter 29. PGP keys
lQMFEDGxFCFKhjdh2JzjGQEB6XkD/2HOwfuFrnQUtdwFPUkgtEqNeSr64jQ3Maz8
xgEtbaw/ym1PbhbCk311UWQq4+izZE2xktHTFClJfaMnxVIfboPyuiSF99KHiWnf
/Gspet0S7m/+RXIwZi1qSqvAanxMiA7kKgFSCmchzas8TQcyyXHtn/gl9v0khJkb
/fv3R20btB5QZXRlciBXZW1tIDxwZXRlckBGcmVlQlNELm9yZz6JAJUDBRAxsRJd
SoY3Ydic4xkBAZJUA/4i/NWHz5LIH/R4IF/3V3LleFyMFr5EPFY0/4mcv2v+ju9g
brOEM/xd4LlPrx1XqPeZ74JQ6K9mHR64RhKR7ZJJ9A+12yr5dVqihe911KyLKab9
4qZUHYi36WQu2VtLGnw/t8Jg44fQSzbBF5q9iTzcfNOYhRkSD3BdDrC3llywO7Ql
UGV0ZXIgV2VtbSA8cGV0ZXJAc3Bpbm5lci5kaWFsaXguY29tPokAlQMFEDGxEi1K
hjdh2JzjGQEBdA4EAKmNFlj8RF9HQsoI3UabnvYqAWN5wCwEB4u+Zf8zq6OHic23
TzoK1SPlmSdBE1dXXQGS6aiDkLT+xOdeewNs7nfUIcH/DBjSuklAOJzKliXPQW7E
kuKNwy4eq5bl+j3HB27i+WBXhn6OaNNQY674LGaR41EGq44Wo5ATcIicig/z
=gv+h
---END PGP PUBLIC KEY BLOCK---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Chapter 29. PGP keys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=97h7
---END PGP PUBLIC KEY BLOCK---
Developers
616
Chapter 29. PGP keys
Key finger-
print = CA 16 91 D9 75 33 F1 07 1B F0 B4 9F 3E 95 B6 09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=3V1R
---END PGP PUBLIC KEY BLOCK---
617
Chapter 29. PGP keys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Chapter 29. PGP keys
O20MMK44j4I5V6rEyUDBDrmX49J56OFkfwa0IEJyaWFuIFNvbWVycyA8YnJpYW5A
RnJlZUJTRC5vcmc+iQCVAwUQNxS1Y51nQQAMbhIVAQHPBQP+IMUlE4DtEvSZFtG4
YK9usfHSkStIafh/F/JzSsqdceLZgwcuifbemw79Rhvqhp0Cyp7kuI2kHO3a19kZ
3ZXlDl3VDg41SV/Z5LzNw9vaZKuF/vtGaktOjac5E5aznWGIA5czwsRgydEOcd8O
VPMUMrdNWRI6XROtnbZaRSwmD8aJAJUDBRA3FKWuDu2852ZqdCEBAWVJA/4x3Mje
QKV+KQoO6mOyoIcD4GK1DjWDvNHGujJbFGBmARjr/PCm2cq42cPzBxnfRhCfyEvN
aesNB0NjLjRU/m7ziyVn92flAzHqqmU36aEdqooXUY2T3vOYzo+bM7VtInarG1iU
qw1G19GgXUwUkPvy9+dNIM/aYoI/e0Iv3P9uug==
=R3k0
---END PGP PUBLIC KEY BLOCK---
619