Summary: Q on partitions

From: Karl Devitt <kdevitt_at_iel.ie>
Date: Thu Jul 12 2001 - 11:37:46 EDT
This is a multi-part message in MIME format.

------=_NextPart_000_06BE_01C10AF0.FAE25410
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

According to Jill Ridsdale:
The way itwas explained to me is that s2 contains an overall map of the =
disk
layout - partition sizes boundaries etc - the whole thing, whereas each
slice is only interested in that one partition

Florian Schlaich .....
There's nothing special with slice 2 except that it is good practice to =
have
a slice ready for some disk debugging tools to access data on the whole
disk.
This is the reason why SUN recommends it.
But if you need an eighth slice (e.g. for disksuite) you are free to use =
it
If you use it as an argument to newfs, the whole area coverd by this =
slice
is formatted with the fs - that means normally the whole disk, =
destroying
any other usable slice on it.

My understanding of this would be that if slice 2 was used as an eight =
slice then disk debugging would be impossible, or almost anyway. The =
intended use I guess was that slice 2 is refered to as the backup =
partition, starting cylinder 0 and ending at the last cylinder, this =
alone means it represents the whole disk - so debugging the disk by the =
OS can use slice 2 in order to accomplish this. I would also guess that =
nothing special happens when a disk is formated using the format =
utility.
In my instance where I want to have a partition that encompases the =
whole disk, I can use slice 2 to access it, or as convention would =
suggest create another partition, say slice 0 which also starts at the =
beginning and finishes at the end of the disk. However, as the intended =
use was to access the whole disk, slice 2 would seem to be the logical =
and simplist solution, in any case a dedicated slice is no longer of =
use, slice 0 and 2 would be the same so why bother with slice 0.

Karl.
  ----- Original Message -----=20
  From: Karl Devitt=20
  To: sunmanagers=20
  Sent: Thursday, July 12, 2001 3:38 PM
  Subject: update: Q on partitions


  Leave it alone seems to be the concensus and use another slice to =
access the whole disk, eg c0t5d0s0.


  My only question on this is, what should i do about rebuilding a disk =
that was hacked by a previous IT guy. In one instance the backup =
partition was completely gone. I re-partitioned, setting slice 2 as =
backup and labeled the disk. then newfs'ed my new slices, s0,s1.... not =
s2. So far it seems to be working. I didnt do a format though prior to =
re-partitioning.

  Actually got one more question. if slice 0 uses the same cylinders, is =
a newfs on c0t5d0s2 the same as c0t5d0s0, or is that a no-no. In this =
instance I had a previous work colleague tell me that I should access =
the entire disk using s2, so I newfs'ed s2.

  Karl.

    ----- Original Message -----=20
    From: Karl Devitt=20
    To: sunmanagers=20
    Sent: Thursday, July 12, 2001 3:08 PM
    Subject: Q on partitions


    Hi,

    Maybe someone can clarify this for me.

    A disk used as a single partition, ie a 9Gb disk set up as a 9Gb =
partition. Partition table has slice 2 as the backup slice. But do you =
access the whole disk by using slice 2, eg /dev/dsk/c0t5d0s2 or should =
another slice to modified to start at the beginning of the disk and end =
at the end of it, eg slice 0, and access it as /dev/dsk/c0t5d0s0 leaving =
c0t5d0s2 alone.

    also does anythings special happen to slice2 (backup) using a =
format, or is it just that the label is set up with slice 2 as the =
backup slice?

    Thanks,

    Karl.


    Karl Devitt
    UNIX System Administrator
    IT Department

    Interactive Enterprise Ltd.
    3098 Lake Drive, Citywest Business Campus,
    Dublin 24, Ireland.
    Tel: +353-1-4660600
    Fax: +353-1-4660284
    http://www.interactive-enterprise.com


    =
*************************************************************************=
**
    This email and any files transmitted with it are confidential and=20
    intended solely for the use of the individual or entity to whom they =

    are addressed. If you have received this email in error please =
notify=20
    the system manager (postmaster@iel.ie).

    Any opinions expressed within the message are those of the sender, =
and are
    not necessarily reflective of the prevailing company policies.

    Copyright in this E-Mail remains with the sender.
    =
*************************************************************************=
**

    =
*************************************************************************=
**
    This email and any files transmitted with it are confidential and=20
    intended solely for the use of the individual or entity to whom they =

    are addressed. If you have received this email in error please =
notify=20
    the system manager (postmaster@iel.ie).

    Any opinions expressed within the message are those of the sender, =
and are
    not necessarily reflective of the prevailing company policies.

    Copyright in this E-Mail remains with the sender.
    =
*************************************************************************=
**


  =
*************************************************************************=
**
  This email and any files transmitted with it are confidential and=20
  intended solely for the use of the individual or entity to whom they=20
  are addressed. If you have received this email in error please notify=20
  the system manager (postmaster@iel.ie).

  Any opinions expressed within the message are those of the sender, and =
are
  not necessarily reflective of the prevailing company policies.

  Copyright in this E-Mail remains with the sender.
  =
*************************************************************************=
**

  =
*************************************************************************=
**
  This email and any files transmitted with it are confidential and=20
  intended solely for the use of the individual or entity to whom they=20
  are addressed. If you have received this email in error please notify=20
  the system manager (postmaster@iel.ie).

  Any opinions expressed within the message are those of the sender, and =
are
  not necessarily reflective of the prevailing company policies.

  Copyright in this E-Mail remains with the sender.
  =
*************************************************************************=
**



***************************************************************************
This email and any files transmitted with it are confidential and 
intended solely for the use of the individual or entity to whom they 
are addressed. If you have received this email in error please notify 
the system manager (postmaster@iel.ie).

Any opinions expressed within the message are those of the sender, and are
not necessarily reflective of the prevailing company policies.

Copyright in this E-Mail remains with the sender.
***************************************************************************

------=_NextPart_000_06BE_01C10AF0.FAE25410
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" =
http-equiv=3DContent-Type>
<META content=3D"MSHTML 5.00.3103.1000" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>According to Jill =
Ridsdale:</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>The way itwas explained to me is that =
s2 contains=20
an overall map of the disk<BR>layout - partition sizes boundaries etc - =
the=20
whole thing, whereas each<BR>slice is only interested in that one=20
partition</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Florian Schlaich .....</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>There's nothing special with slice 2 =
except that it=20
is good practice to have<BR>a slice ready for some disk debugging tools =
to=20
access data on the whole<BR>disk.<BR>This is the reason why SUN =
recommends=20
it.<BR>But if you need an eighth slice (e.g. for disksuite) you are free =
to use=20
it</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>If you use it as an argument to newfs, =
the whole=20
area coverd by this slice<BR>is formatted with the fs - that means =
normally the=20
whole disk, destroying<BR>any other usable slice on it.<BR></FONT></DIV>
<DIV><FONT face=3DArial size=3D2>My understanding of this would be that =
if slice 2=20
was used as an eight slice then disk debugging would be impossible, or =
almost=20
anyway. The intended use I guess was that slice 2 is refered to as the =
backup=20
partition, starting cylinder 0 and ending at the last cylinder, this =
alone means=20
it represents the whole disk - so debugging the disk by the OS can use =
slice 2=20
in order to accomplish this. I would also guess that nothing special =
happens=20
when a disk is formated using the format utility.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>In my instance where I want to have a =
partition=20
that encompases the whole disk, I can use slice 2 to access it, or as =
convention=20
would suggest create another partition, say slice 0 which also starts at =
the=20
beginning and finishes at the end of the disk. However, as the intended =
use was=20
to access the whole disk, slice 2 would seem to be the logical and =
simplist=20
solution, in any case a dedicated slice is no longer of use, slice 0 and =
2 would=20
be the same so why bother with slice 0.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Karl.</FONT></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: =
0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: =
black"><B>From:</B>=20
  <A href=3D"mailto:kdevitt@iel.ie" title=3Dkdevitt@iel.ie>Karl =
Devitt</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A=20
  href=3D"mailto:sunmanagers@sunmanagers.org"=20
  title=3Dsunmanagers@sunmanagers.org>sunmanagers</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 12, 2001 =
3:38=20
  PM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> update: Q on =
partitions</DIV>
  <DIV><BR></DIV>
  <DIV><FONT face=3DArial size=3D2>Leave it alone seems to be the =
concensus and use=20
  another slice to access the whole disk, eg c0t5d0s0.</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT face=3DArial size=3D2>My only question on this is, what =
should i do=20
  about rebuilding a disk that was hacked by a previous IT guy. In one =
instance=20
  the backup partition was completely gone. I re-partitioned, setting =
slice 2 as=20
  backup and labeled the disk. then newfs'ed my new slices, s0,s1.... =
not s2. So=20
  far it seems to be working. I didnt do a format though prior to=20
  re-partitioning.</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT face=3DArial size=3D2>Actually got one more question. if =
slice 0 uses=20
  the same cylinders, is a newfs on c0t5d0s2 the same as c0t5d0s0, or is =
that a=20
  no-no. In this instance I had a previous work colleague tell me that I =
should=20
  access the entire disk using s2, so I newfs'ed s2.</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT face=3DArial size=3D2>Karl.</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; =
MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
    <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
    <DIV=20
    style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: =
black"><B>From:</B>=20
    <A href=3D"mailto:kdevitt@iel.ie" title=3Dkdevitt@iel.ie>Karl =
Devitt</A> </DIV>
    <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A=20
    href=3D"mailto:sunmanagers@sunmanagers.org"=20
    title=3Dsunmanagers@sunmanagers.org>sunmanagers</A> </DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 12, 2001 =
3:08=20
    PM</DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Q on =
partitions</DIV>
    <DIV><BR></DIV>
    <DIV><FONT face=3DArial size=3D2>Hi,</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>Maybe someone can clarify this for=20
    me.</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>A disk used as a single partition, =
ie a 9Gb=20
    disk set up as a 9Gb partition. Partition table has slice 2 as the =
backup=20
    slice. But do you access the whole disk by using slice 2, eg=20
    /dev/dsk/c0t5d0s2 or should another slice to modified to start at =
the=20
    beginning of the disk and end at the end of it, eg slice 0, and =
access it as=20
    /dev/dsk/c0t5d0s0 leaving c0t5d0s2 alone.</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>also does anythings special happen =
to slice2=20
    (backup) using a format, or is it just that the label is set up with =
slice 2=20
    as the backup slice?</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>Thanks,</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>Karl.</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>Karl Devitt<BR>UNIX System =
Administrator<BR>IT=20
    Department</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>Interactive Enterprise Ltd.<BR>3098 =
Lake Drive,=20
    Citywest Business Campus,<BR>Dublin 24, Ireland.<BR>Tel:=20
    +353-1-4660600<BR>Fax: +353-1-4660284<BR><A=20
    =
href=3D"http://www.interactive-enterprise.com">http://www.interactive-ent=
erprise.com</A><BR></FONT></DIV><BR>*************************************=
**************************************<BR>This=20
    email and any files transmitted with it are confidential and =
<BR>intended=20
    solely for the use of the individual or entity to whom they <BR>are=20
    addressed. If you have received this email in error please notify =
<BR>the=20
    system manager (postmaster@iel.ie).<BR><BR>Any opinions expressed =
within the=20
    message are those of the sender, and are<BR>not necessarily =
reflective of=20
    the prevailing company policies.<BR><BR>Copyright in this E-Mail =
remains=20
    with the=20
    =
sender.<BR>**************************************************************=
*************<BR><BR>****************************************************=
***********************<BR>This=20
    email and any files transmitted with it are confidential and =
<BR>intended=20
    solely for the use of the individual or entity to whom they <BR>are=20
    addressed. If you have received this email in error please notify =
<BR>the=20
    system manager (postmaster@iel.ie).<BR><BR>Any opinions expressed =
within the=20
    message are those of the sender, and are<BR>not necessarily =
reflective of=20
    the prevailing company policies.<BR><BR>Copyright in this E-Mail =
remains=20
    with the=20
    =
sender.<BR>**************************************************************=
*************<BR></BLOCKQUOTE><BR>***************************************=
************************************<BR>This=20
  email and any files transmitted with it are confidential and =
<BR>intended=20
  solely for the use of the individual or entity to whom they <BR>are =
addressed.=20
  If you have received this email in error please notify <BR>the system =
manager=20
  (postmaster@iel.ie).<BR><BR>Any opinions expressed within the message =
are=20
  those of the sender, and are<BR>not necessarily reflective of the =
prevailing=20
  company policies.<BR><BR>Copyright in this E-Mail remains with the=20
  =
sender.<BR>**************************************************************=
*************<BR><BR>****************************************************=
***********************<BR>This=20
  email and any files transmitted with it are confidential and =
<BR>intended=20
  solely for the use of the individual or entity to whom they <BR>are =
addressed.=20
  If you have received this email in error please notify <BR>the system =
manager=20
  (postmaster@iel.ie).<BR><BR>Any opinions expressed within the message =
are=20
  those of the sender, and are<BR>not necessarily reflective of the =
prevailing=20
  company policies.<BR><BR>Copyright in this E-Mail remains with the=20
  =
sender.<BR>**************************************************************=
*************<BR></BLOCKQUOTE>
<BR>
***************************************************************************<BR>
This email and any files transmitted with it are confidential and <BR>
intended solely for the use of the individual or entity to whom they <BR>
are addressed. If you have received this email in error please notify <BR>
the system manager (postmaster@iel.ie).<BR>
<BR>
Any opinions expressed within the message are those of the sender, and are<BR>
not necessarily reflective of the prevailing company policies.<BR>
<BR>
Copyright in this E-Mail remains with the sender.<BR>
***************************************************************************<BR>
</BODY></HTML>

------=_NextPart_000_06BE_01C10AF0.FAE25410--
Received on Thu Jul 12 16:37:46 2001

This archive was generated by hypermail 2.1.8 : Wed Mar 23 2016 - 16:24:59 EDT