Home > Articles

This chapter is from the book

This chapter is from the book

Dividing Disk Space Wisely

So, now you have a chain of devices on your machine, all properly attached, named, and ready to go. Many of these devices are likely to be hard disks, whether they are internal or external. The next step to make these disks active and accessible from the system is partitioning. Because partitioning more or less permanently divides disk space, you will need to know a little bit about the final layer between the hardware and the user—the filesystem—so that you can make wise decisions.

Virtual Devices: Partitions

Partitions are the lowest level of disk space organization over which admins have any control. As mentioned before, sectors, tracks, and cylinders all have a preset, fixed size on a given disk. Admins have no way—or real need—to alter these parameters.

The key thing about partitions is that they are independent of any operating system. Every major OS recognizes these low-level disk divisions and addresses each partition as a separate logical device. Information about partitions is kept in a partition table stored in the disk label or volume header of the physical hard disk. This is how disks maintain information about themselves and why they can be transferred from one machine to another without losing the information.

Partitions allow admins to multi-boot systems with various Operating Systems stored on the same hard disk. Only with the release of Red Hat 7.1 could you run an OS out of an existing partition.

Originally, there was a strict one-to-one mapping of partitions to filesystems.1 Partitions could be considered containers for the filesystems.

Now, you can span one filesystem over multiple partitions with logical volumes (see the later section, "Logical Volumes"). Partitions can now be thought of more as building blocks for system storage rather than simple containers.

What you still can't do is assign multiple filesystems to one partition (without redividing the space). Here, partitions are acting as boundaries; regular filesystems cannot extend past the edges of the partition, but neither can the partition be subdivided.

Because partitions are hardware-level divisions that predated filesystem quotas, they can provide low-level overflow protection. With the right kind of schema, certain partitions can fill up without affecting overall system performance. At the very least, one partition filling up will not directly affect space on another partition.

All flavors of UNIX require a minimum of two partitions: / and swap. In this sort of system, / holds the entire operating system, local software, configurations, local accounts, and logs.

Swap Space

Swap space, usually known simply as swap, allows the Operating System to access raw disk space directly without the intervention of a filesystem. Swap was designed to act as an extension of the system's main memory (RAM), and it allows the system to surmount that memory's size limitations.

The main OS mechanisms that access this space are swapping and paging. Swapping and paging are distinct functions, although the two are often confused—even by more experienced sysadmins.

A computer has one physical linear memory space, some of which is reserved for objects that must remain resident (such as the Operating System, paging tables, and some other critical data structures). Resident elements must always remain in memory so that they are quickly available for use.

Of course, many other processes and objects have no residency requirements. When the Operating System detects that a certain threshold of resource usage has been reached, it looks for ways to switch allocations to processes that need it most.

Swapping is one of the mechanisms used by the OS to manage memory allocations. When a process is swapped, it is written to the swap space, along with all its currently associated data and other state information. The process's slot in main memory is now free for use by another process.

When a process goes into a wait state for a relatively long time, it doesn't actively need CPU time, so it is swapped, along with all its concomitant state information, out of main memory and onto a disk. Conversely, if a process has been resource-starved, the process will be swapped out of disk storage and back into main memory, allowing it access to the CPU. Intensive swapping, called thrashing, indicates that the entire system is severely starved for resources—usually RAM.

Paging also makes use of the swap disk area. Unlike swapping, which stores an entire process along with all its current state information, paging stores only parts of a process's executable code and discards state information. This is a normal memory- management procedure that takes place even on systems with sufficient resources. The Operating System predetermines the size of segments that can be retrieved and kept in main memory; these segments are called pages. So, when a process is paged into memory from disk or swap, or is paged out of memory into swap space, the transfer is done in page-sized increments.

Why Page into Swap Space?

You might be wondering why we don't just set aside space for one page, or a set of pages, for a given process in main memory and then just read new pages from the filesystem into main memory as they are needed. Why put the most recently used page into swap space?

The answer is fairly simple: Navigating the filesystem to reach the executable being paged is an "expensive" operation. It takes far fewer resources to go into raw swap space and retrieve a recently used page than to go to disk space formatted with filesystem structures.

Because swap space is finite, most systems cull pages with what is known as the Least Recently Used (LRU) algorithm: The longer a page has not been requested, the more likely it is to be pushed out of swap storage.

In short, paging is a way to make more memory available to processes than physically exists on the system. Without paging, all parts of a program that might require real memory would have to be accommodated at process initiation. Programs would need to be very tiny (hard to do with complex programs) or would have to run sequentially (inefficient for all concerned).

NOTE

Note that if you work in both the UNIX and MS worlds, Microsoft also refers to paging as swapping. Much confusion ensues.

Aside from process manipulation, swap space is also used to boot into miniroot and to hold memory images if the system crashes.2 Because a memory image is literally a dump of the main memory contents, you will need at least as much swap space as RAM (plus a small margin) if you want to be able to examine the file later. In fact, there should be more swap space than RAM. The rule of thumb for sizing swap will be discussed later.

NOTE

Examining a crash dump also requires sufficient space in a filesystem (remember that swap is not formatted) to store the dump image. You should plan for this when sizing filesystems during installation—see the "Partitioning" section in this chapter.

So, Can You Get by Without Swap Space?

In theory, yes, you can. That being said, realize that you might have difficulty with common functions later—booting into miniroot, saving crash images, and so on.

Also bear in mind that if you don't set aside swap space, your system will not be capable of paging processes properly and won't swap them at all. You will need to have a large amount of RAM available to keep even quasi-dormant processes resident.

In addition, some varieties of UNIX are particularly dependant on swap space. Solaris, for example, uses swap space for its /tmp directory by default.

Referring to Partitions—Device Files

One of the two great truisms of system administration is that everything that exists in UNIX is a file.3 This means that a UNIX system "sees" its hardware devices as files. The advantage of this management method is that it allows the Operating System to treat physical disk access like flat4 file I/O.

At the most fundamental level, files are nothing more than strings of ones and zeros. So, file I/O is simply moving bits in and out of specific file locations. It doesn't matter to UNIX whether the file goes on to pass the bits to a disk, into memory, or off to Never Never Land; the kernel just shifts bits in and out of the file handle.

Device files are the lowest-level construct that allows the OS to interact with physical devices. Device files are required to create filesystems (see the later section "Local Filesystem Creation").

Devices can be divided into two categories: raw/character devices and block devices.

Raw/character device files are so named because no buffering is done between whatever function is generating (or retrieving) the bytes and the device that is storing them. These device files are most often used for bytewise copy procedures (like those done with dd). Most tape devices have only raw device files.

Conversely, block device files are buffered, meaning that data is transferred in chunks rather than 1 byte at a time. This tends to be a more efficient way to transfer data for most applications.

Note that, under Solaris, hard disks have both a character device file and a block device file. Each is needed at different times. Most daily disk operations will go through the block device, but filesystem creation is done via the raw/character device name.

Remember that one function of partitions is to make a disk accessible to the system as one or more devices. As you might have guessed, the naming schemes outlined in Chapter 2, "Managing Disk Hardware," identify the literal, on-disk partition and device names, not the system path to their interface files.

All standard UNIX device files were originally tidily kept in /dev. Some Red Hat implementations still maintain this system.

Under Solaris and some newer implementations of Red Hat, the contents of /dev tend to be a combination of device files and symbolic links to actual device files stored in different directories. In this sort of system, /dev acts as a sort of organizational redirector. Under Red Hat, look for a directory called /devfs; under Solaris, look for a directory called /devices.

The directories and device files in /dev vary immensely, even between versions of the same Operating System. Table 3.1 shows some of the most common and useful denizens of /dev. Although many items are in slightly different locations or have slightly different names, overall, both Operating Systems have a lot in common. We encourage you to use Table 3.1 as a starting point for your own explorations of your local system's device files.

Table 3.1 Items of Interest under /dev

Red Hat

Solaris

Description

No analogous directory; devices exist in the top level of /dev. Device names begin with "cu."

/dev/cua

Directory for serial line devices

No analogous directory; devices exist in the top level of /dev. Device names begin with "sd" or "hd" for SCSI and IDE disks, respectively; SCSI CD- ROMs begin with "scd."

/dev/dsk

Directory for block devices (for disk drives, CD-ROMs, and so on)

No analogous directory; devices exist in the top level of /dev. Device names begin with "fd."

/dev/fd

Directory for floppy disk devices

/dev/inet

No analogous directory in /dev.

Directory for network devices (Ethernet ports and so on)

/dev/input

No analogous directory in /dev.

Directory for mouse, keyboard, and other input devices

/dev/kmem

/dev/kmem

Kernel virtual memory device

/dev/log

/dev/log

Socket to system log

/dev/mem

/dev/mem

Physical memory device

/dev/null

/dev/null

Null device

/dev/pts

/dev/pts

Pseudoterminals

/dev/random

No analogous device, by default.

Random-number generator

/dev/rd

No analogous directory in /dev.

Directory for RAID devices

/dev/raw

/dev/rdsk

Directory for raw/ character devices (for disk drives, tapes, and so on)

No analogous directory; devices exist in the top level of /dev. Device names begin with "st" or "ht" for SCSI and IDE tapes, respectively.

/dev/rmt

Directory for removable media— tapes

No analogous device in /dev.

/dev/swap

Swap space device

No analogous directory; devices exist in the top level of /dev. Device names begin with "tty."

/dev/tty

Directory for line terminals

/dev/usb

-No analogous directory in /dev.

Directory for USB devices

/dev/zero

/dev/zero

Null byte source


Lest you think we're done with partitions, remember that we still need to discuss sizing and actual creation mechanisms. But before we do that, we need to consider the next layer up and what goes into it.

Logical Constructs: Filesystems

As mentioned before, you can't use your system's attached disk space (except for swap) until the space is divided and filesystems5 are created. But before you go carving up your disks, you should know what components you are arranging space for.

Note that we are not going into the kind of depth that an OS developer or low-level coder might need. This section is designed to give admins the foundational understanding they need to initially get their systems up and reliably running.

Definitions

A filesystem is a logical construct that provides a framework for storing and retrieving information from a random-access storage device.6 In the UNIX world, all information is considered to be a file,7 so essentially everything enduring on the system is processed, stored, and retrieved through a filesystem.

The OS is directly responsible for maintaining filesystems because they are complex, logical overlays and not simple, low-level space divisions. This also means that filesystems can be far more flexible and broad with regard to the kind of information that they manage internally. Filesystems store quite a bit of meta-information (literally, information about information) about not only their own constructs, but also the files they manage.

UNIX filesystems are generally hierarchical—that is, they consist of multiple directories organized in an inverted tree structure. Inverted tree diagrams, are depicted with the core node—or root—at the top. In Figure 3.1, directories are referred to as "nodes." Nodes that can contain leaf nodes or other child nodes are referred to as "child nodes"; nodes that contain no further subnodes are referred to as "leaf nodes."

Figure 3.1 Simple hierarchical inverted tree diagram.

Every directory contains a reference to itself (".") and to its parent (".."). Even the initial node—or root of the directory structure—has the parent reference; in this special case, the parent reference simply points to itself. In Figure 3.2, you can find a node's parent by going up to the previous tier.

Pathnames specifying the location of a file from the root directory down are called "absolute pathnames." Pathnames that begin with "../", "./", or anything other than "/" are called relative pathnames because they are specified relative to the current directory.

What Lives Where in UNIX Filesystems

Warning: Generalizations Ahead!

In this section, we will be discussing the standard location of various files, logs, binaries, and all those other things that make UNIX what it is. Please be aware that we will be presenting generalizations and broad concepts applicable to both Red Hat and Solaris.

Figure 3.3 presents a high-level view of a "standard" UNIX filesystem. Remember that we are presenting only a generalization of what you are likely to find on your system.

Figure 3.2 Hierarchical inverted tree diagram with relation labels.

Figure 3.3 Hierarchical inverted tree diagram—highlights of standard UNIX filesystems.

The root filesystem (/) contains a number of interesting directories:

  • /bin—General binaries

  • /dev—Device files

  • /etc—System configuration files and bootup scripts

  • /sbin—System-related binaries

Note on Interesting Directories

The existence and contents of interesting directories depend greatly on the variant of UNIX that you are using. There are no real standards for file locations, so don't be too surprised when something turns up in an unexpected location.

For instance, to track down system-related binaries, you might need to look in /bin, /usr/bin, /sbin, /usr/sbin, and even /etc. Legacy binaries might even be found in /usr/ucb or /usr/bsd. And these are only the standard system binaries; locally built software could be almost anywhere on the system.

Also be on the lookout for symbolic links between these directories; they can be helpful if you know about them and can cause confusion if you don't.

/home can either be its own filesystem or just a subdirectory of /. On Solaris NFS servers, it will often be a subdirectory of /export. /home generally holds the local system's user home directories.

NOTE

Beware of attempting to mount a filesystem on /home in Solaris with the automounter running (shrink-wrap default). The automounter will make /home unavailable as a mount point.

/opt can either be its own filesystem or just a subdirectory of /. It is intended to hold optional system software (for instance, compilers on Solaris systems).

TIP

We recommend sizing /opt as a separate filesystem unless there will be no additional software installed on the system. Also, /usr/local is traditionally the place for additional software installed from Open Source sources. Some sysadmins create a symlink from /usr/local to /opt, to avoid managing two "optional software" filesystems. Rather than doing this and potentially conflicting with a package install, we recommend creating an /opt/local and symlinking it to /usr/local, or vice versa, and then making that one nice-sized partition for expansion.

Temporary file storage usually is located in the /tmp directory. This directory may be accessed on most systems as /tmp, /usr/tmp, and /var/tmp. Two of the three references will be actual directories, the third will be a symlink to one of the others. The variety of UNIX determines which reference is the symlink. We recommend that you reconfigure these directories so that only one is an actual directory and the other two are symlinks to it. We further recommend that the actual directory be a distinct, mounted filesystem. Note that many applications use /tmp as temporary "scratch" space. Because this means that users can inadvertently (or deliberately) write large files to /tmp, the separate mount will protect / and /usr from filling up with temporary user files.

TIP

The advice given above is a special instance of a general rule: Users should not be capable of creating or deleting files in the / and /usr filesystems.

TIP

/tmp should always have 1777 permissions, not 777 permissions. The 777 bit setting would allow any user full rights to any file in /tmp. The 1 in 1777 sets the "sticky bit," which means that a file in that directory can be modified or deleted only by its owner.

/usr is usually in its own filesystem, although it also can be a subdirectory of /. Subdirectories of interest include these:

  • bin—Binaries.

  • include—Include files for programming.

  • lib—Programming libraries.

  • local—Locally built software packages; libraries, include files, and binaries. (/usr/local is often a mount point for a separate filesystem, to prevent software installation from filling up the /usr filesystem.)

  • sbin—System binaries.

  • share—Shared information, including man pages.

/var is occasionally in its own filesystem (which we recommend), although it can also be a subdirectory of / or /usr. Subdirectories of interest include these:

  • adm—Log file storage (Solaris)

  • crash—Crash diagnostics and memory image storage

  • log—Log file storage (Red Hat and Solaris)

  • mail—Mail delivery area

  • spool—Spooling area for printing, cron, and other managed services

  • yp—NIS configuration file storage

The /boot directory generally is found only on Red Hat machines, although there is no particular reason why it can't be used with Solaris as well. This directory, located in its own, small filesystem, has two main functions: to hold the basic files needed at boot time and to allow large disks to boot properly. Due to PC BIOS limitations, only boot sectors within the first 1024 cylinders of a disk are honored. So, a small boot partition in the very first cylinders of the disk is a wise idea.

The /proc pseudofilesystem contains system statistics and process information. /proc is considered a pseudofilesystem because the files there are not actual files on disk. Instead, each file is an interface to data about a particular running process or other system status.

Philosophy of Division

There are a number of competing philosophies about disk space divisions—the best space allocations, how many partitions to have, and so on. Like most longstanding philosophical differences, this question has blossomed into a kind of religious war. Remember that although we are going to give background information and make suggestions, we're not taking sides or saying that we have an insight on The Best!" way of doing things.

There are good reasons for each viewpoint, and the way that you finally deal with partitions must be very situation-specific. For instance, a server might not require separate home directory space, but it might need a lot of log space instead. In such a case, it might also be important to keep the logs in a separate partition from the OS so that the admins can access the machine even when the logs are brimming.

First we'll present some points to keep in mind for any kind of install and then we'll talk about specific requirements for different classes of install (server, workstation, and so on).

General Points

The most basic requirement, no matter what class of install you are doing, is that there be a minimum of two partitions: one for / and one for swap. In this most simple of systems, / holds the entire OS, logs, user home directories, and so on.

NOTE

Note that although an earlier sidebar said you can get away without swap space, we think it's a really bad idea to do so and not worth the risks. Disk space is pretty cheap these days, and your system's stability is greatly enhanced by dedicating some swap space to it.

So, then, how much swap should you allocate? (Warning: entering religious debate zone.)

Our most basic rule of thumb is to set aside somewhere between two and two and a half times as much swap space as you have system RAM. This means that when RAM increases, swap should, too (though this is only true up to a point). Remember, though, you might have applications running that require more swap space—check your documentation.

TIP

Allocate between two and two and a half times as much swap space as you have system RAM.

Red Hat has a good discussion of swap-related issues at http://www.redhat.com/support/docs/gotchas/7.1/gotchas-71.html. As they say, "It's better to have it and not need it than to need it and not have it."

The next consideration will be the number of partitions that you want on your system. Without delving into the idea of installation classes, first consider a few points:

  • Are there any data areas that need to have guaranteed space allocations?

  • The answer to this question is always "yes." If nothing else, the / and /usr file- systems must be protected. Some utilities won't operate correctly if they can't make system log entries or write scratch files to /tmp, so it's a good idea to protect the /var and /tmp filesystems, too.

  • Should the machine continue running even if its logging area fills up?

  • If so, then /var must have its own filesystem.

  • Are there any system or data areas that will see increasing storage use?

  • Again, /var is the default location for system logs and can be expected to fill up unless logs are rotated out regularly. Other examples could include a directory to which developed software is delivered for testing on a large project.

  • Are there any system or data areas that will see frequent access?

  • /var/mail, for instance, can be a very busy directory. Directories containing important databases also might see high access rates and should be located in their own filesystems.

  • Will any directories be exported through NFS?

  • Such directories should certainly have their own filesystems. Never export more of your system than absolutely necessary.

  • Will users need especially large workspaces for large files?

  • Creating data filesystems is a good way to discourage users from cluttering their home directories too much.

Data directories for a specific project accessed only by certain users might well be grouped into a single filesystem. This means that they will also require their own partition—as we mentioned earlier, there cannot be more than one filesystem on a partition.

The related question, though, is why not just keep these data areas in their own directories rather than allocating a whole filesystem? The answer is two-fold. First, you cannot guarantee space for a data area that is not in its own partition—there are currently no mechanisms to achieve this. Second, you cannot limit space consumption by a directory within a filesystem. (For those of you thinking about filesystem quotas, remember that they can only be assigned to a user, not to a directory.)

As we pointed out earlier, partitions are an ironclad way of guaranteeing space and enforcing boundaries.

So, as we go on to talk about install classes, consider which data and system areas might need room to expand and enforced limits to that expansion. Also consider whether there might be critical system areas that must not get crowded out (for instance, if there is no room in /tmp, users can't log into the system).

Install Classes

When considering partitioning, machines are generally classified into two types: servers and workstations.8 There are always systems that fall into the gray areas and oddities that challenge this division, but we find that this is a good starting point.

What's a Server?

When we talk about servers, we are referring to systems that offer some kind of externally accessible service. Systems that receive and deliver email, provide DNS, offer time services, host Web sites, or furnish a remote multiuser login environment are all servers.

For reasons of security and performance, we recommend that all servers be dedicated servers, where possible. This means that each server offers one and only one service. Then, for example, the system hosting your site's DNS will not have to cope with the added load and major security threat of general interactive user logins.

Servers must generally dedicate a significant amount of disk space to the service that they offer.

What's a Workstation?

Broadly speaking, anything that is not a server is a workstation (of one kind or another). The key is that workstations do not offer any external services. The only exception could be that they allow ssh-based remote logins.

In the best of all worlds, workstations are interchangeable, cookie-cutter systems. In real life, they might not be that simple to manage, but the goal is to get as close to that as possible.

Workstation disk space should generally be dedicated to the OS itself, logs, and local user-accessible space. In some cases, local space also includes local home directories.

The first piece of information that you need to judge partition sizes is the projected amount of space that various items will need. The best way to get a feel for this sort of thing is to get a relatively large disk and simply install the OS of your choice in various ways, noting the differences in size and usability.

Most sysadmins, unfortunately, are not allowed time for this sort of constructive play, so here is a reasonable working estimate:

Red Hat

Server

650Mb

Workstation

1.2Gb

Full

2.4Gb

Solaris

Server ("Entire")

2.3Gb

Workstation ("End User")

1.6–1.9Gb

Full ("Entire + OEM")

2.4Gb


By the numbers just given, you can tell a few things about Red Hat and Sun. Although their full installs are the same size, Red Hat tends to install less by default than does Sun. Also notice that a Red Hat server install is the smallest of all the types. This is because a server is presumed to be a dedicated machine that doesn't require things like X Windows in the base install. Sun's philosophy is the opposite: Servers get all the components that a workstation gets, plus more. We tend to advocate a minimalist approach: Only install what you actually need. If it's not installed, it doesn't have to be maintained and it won't hurt you.

More About Red Hat

Red Hat officially recommends that you divide up your space into three partitions: swap, /boot, and / (root).9 The official site recommends the following space division guidelines:

swap

32Mb minimum

/boot

32Mb maximum

/ Rest of the space

If you choose the defaults for a server-class install, your partition layout will look something like the following:

swap

256Mb

/boot

16Mb

/

256Mb

/var

256Mb

/usr

512+Mb

/home 512+Mb

A few cautions:

  • If your server does not serve home directories, then the space set aside for /home should probably be reapportioned elsewhere.

  • If your server's particular application generates a lot of logs or is left unattended for extended periods of time, /var should probably be larger. If you intend to keep up to n multiple crash images, /var should be at least n times the size of real memory.

  • If your server is dedicated to NFS service, /usr might need to be larger (unless the applications/files being served are located elsewhere).

  • If your server has large amounts of RAM or runs swap-intensive software, swap should be larger.

  • All "tmp"-type directories should point into /var/tmp, to avoid filling up other key partitions, or have their own partition.

Red Hat Linux 7.1 workstation-class defaults are as follows:

swap

64Mb

/boot

16Mb

/ Rest of the space

Our concerns about these defaults:

  • This is probably not enough swap space—most new machines come with more than 32Mb of RAM. Swap should be increased accordingly.

  • There is no separate partition for logs. This means that if the machine is left unattended for an extended period of time, or if the logs grow very large for some other reason, the machine might not be capable of functioning properly.

  • "tmp"-type directories cannot be pointed to a noncritical partition. If users or applications make heavy use of any tmp directory, it could affect system performance.

More About Solaris

Sun has a mechanism called autolayout that proposes sizes based on the amount of disk space that it detects on your system during installation.10 Our experience suggests that a 4GB disk is a "comfortable minimum" requirement for a Solaris workstation installation.

For servers, Sun recommends the following partitions:

    swap

    /

    /usr

    /opt

    /export

    /export/home

    /export/swap

Because a server should have space allocated for logging and for the installation of its services, it is our practice to specify an 18GB disk for Solaris server installations.

Sun's intention is that everything to be served out should be placed somewhere under /export. Note the absence of both a /boot and a /var partition. A few cautions:

  • If your server does not serve home directories, then the space set aside for /export/home should probably be reapportioned elsewhere.

  • If your server does not serve diskless clients, then the space set aside for /export/swap should probably be reapportioned elsewhere.

  • If your server's particular application generates a lot of logs or is left unattended for extended periods of time, /var should probably be a separate partition.

  • If your server is dedicated to NFS service, /opt might need to be larger (unless the applications/files being served are located elsewhere).

  • If your server has large amounts of RAM or runs swap-intensive software, swap should be larger.

  • All "tmp"-type directories should point into /var/tmp, to avoid filling up other key partitions, or move their own partition.

For workstations (what Sun calls "standalone" machines), the following partitions are proposed by default:

    /

    swap

    /opt

    /usr

    /home

Our concerns about these defaults:

  • There is no separate partition for logs. This means that if the machine is left unattended for an extended period of time, or if the logs grow very large for some other reason, the machine might not be capable of functioning properly.

  • "tmp"-type directories cannot be pointed to a noncritical partition. If users or applications make heavy use of any tmp directory, it could affect system performance.

  • If the workstation does not have local home directories, then the space set aside for /home should probably be reapportioned elsewhere.

  • If the workstation does not have local optional software installed, then the space set aside for /opt should probably be reapportioned elsewhere.

Red Hat's Partitionless Install

There is a different kind of install supported by Red Hat that is quite outside our model. In a sort of try-before-you-buy approach, you now can install Red Hat Linux in a partitionless mode.11

The trick to this kind of install is to piggyback Linux on an existing DOS/FAT file- system. Of course, this means that you can't boot into Linux from the local partition—you have to have a boot floppy.

See http://www.redhat.com/support/manuals/RHL-7.1-Manual/install-guide/ch-part-less.html for more information on partitionless installs.

Technical Details of Partitioning

Enough theory—it's finally time to make the partitions actually appear on the disk. As you have probably already guessed, Red Hat and Solaris use different means to achieve the same ends. Let's look at these tools.

Red Hat

At install time, you are presented with two front ends for disk partitioning: fdisk and diskdruid. The familiar trade-off exists between the two: diskdruid is more straightforward to use, while fdisk allows you finer control over all parameters.

If you want to partition a new disk added to an extant system, you will need to use a variant fdisk to do the job. Although plain old fdisk is the standard, we suggest that you use the curses-based front end called cfdisk. It comes standard on Red Hat 7.1 and is quite intuitive.

Invoking cfdisk with no arguments will bring up a listing of /dev/hda along with command options:

                       cfdisk 2.10s

                     Disk Drive: /dev/hda
                    Size: 40000000000 bytes
             Heads: 255  Sectors per Track: 63  Cylinders: 4863

   Name      Flags     Part Type  FS Type        [Label]       Size (MB)
 -------------------------------------------------------------------------------
   hda1                Primary   Linux ext2      [/boot]         32.91  
   hda2      Boot      Primary   NTFS            [^C]         26222.20
   hda3                Primary   Linux swap                    2113.90
   hda4                Primary   Linux ext2      [/]          11630.55

   [Bootable] [ Delete ] [ Help ] [Maximize] [ Print ] [ Quit ] [ Type ]
   [ Units ] [ Write ]

               Toggle bootable flag of the current partition

This works like most curses-based12 front ends; the keyboard arrow keys move you up and down along the list of devices, and the Tab key moves between the command options along the bottom. The currently selected device and command are highlighted in gray. Also notice that there is a description of the command's purpose at the very bottom of the output. Pressing the Return or Enter key will run the highlighted command and refresh the display to reflect the update.

Assuming that you have a fresh disk, you will want to add a partition to it.

With the -l option, fdisk can also be used to report on current partition information:

[linux:6 ~]fdisk -l

Disk /dev/hda: 255 heads, 63 sectors, 4863 cylinders
Units = cylinders of 16065 * 512 bytes

  Device  Boot  Start    End  Blocks  Id System
/dev/hda1           1      4   32098+ 83 Linux
/dev/hda2  *        5   3192 25607610  7 HPFS/NTFS
/dev/hda3        3193   3449 2064352+ 82 Linux swap
/dev/hda4        3450   4863 11357955 83 Linux

Solaris

At both install-time and from within the OS, Solaris offers the format command to partition disks. When invoked, format presents you with a list of all currently accessible drives:

[sun:18: ~]format
Searching for disks...done

AVAILABLE DISK SELECTIONS:
    0. c0t0d0 <ST315320A cyl 29649 alt 2 hd 16 sec 63>
     /pci@1f,0/ide@d/dad@0,0
    1. c0t1d0 <SUN2.1G cyl 2733 alt 2 hd 19 sec 80>
     /sbus@1f,0/SUNW,fas@e,8800000/sd@1,0
    2. c1t0d0 <IBM-DNES-318350-SA30 cyl 11199 alt 2 hd 10 sec 320>
     /sbus@1f,0/QLGC,isp@0,10000/sd@0,0
    3. c1t2d0 <SEAGATE-ST118273W-6244 cyl 7499 alt 2 hd 20 sec 237>
     /sbus@1f,0/QLGC,isp@0,10000/sd@2,0
Specify disk (enter its number):

Simply type in the number of the disk that you are interested in. Let's select disk 0:

selecting c0t0d0
[disk formatted, no defect list found]
Warning: Current Disk has mounted partitions.

FORMAT MENU:
    disk      - select a disk
    type      - select (define) a disk type
    partition - select (define) a partition table
    current   - describe the current disk
    format    - format and analyze the disk
    repair    - repair a defective sector
    show      - translate a disk address
    label     - write label to the disk
    analyze   - surface analysis
    defect    - defect list management
    backup    - search for backup labels
    verify    - read and display labels
    save      - save new disk/partition definitions
    volname   - set 8-character volume name
    !<cmd>    - execute <cmd>, then return
    quit
format>

To view the current partition table on the disk, enter "verify":

format>verify
Primary label contents:

Volume name = <    >
ascii name = <ST315320A cyl 29649 alt 2 hd 16 sec 63>
pcyl       = 29651
ncyl       = 29649
acyl       =  2
nhead      =  16
nsect      =  63
Part   Tag    Flag    Cylinders      Size      Blocks
 0    root     wm   1041 - 13524    6.00GB   (12484/0/0) 12583872
 1    swap     wu       0 - 1040   512.37MB  (1041/0/0)  1049328
 2  backup     wm      0 - 29648    14.25GB  (29649/0/0) 29886192
 3    home     wm  13525 - 29646     7.75GB  (16122/0/0) 16250976
 4 unassigned  wm      0             0       (0/0/0)      0
 5 unassigned  wm      0             0       (0/0/0)      0
 6 unassigned  wm      0             0       (0/0/0)      0
 7 unassigned  wm  29647 - 29648     0.98MB  (2/0/0)     2016

format>

Slice 2, called backup, represents the entire disk. As a result, it is not ever a useable partition and should not be altered in any way.

Now we're done discussing partitions and can move into entirely logical constructs, such as filesystems.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020