Solved

try to mount a logical partition

Posted on 2003-11-02
1
850 Views
Last Modified: 2013-12-27
can anyone tell me what exactly to put into /dev/vfstab to mount a FAT32 partition outside the Solaris partition?
first of all I don't know how to determines those c0t0d0p?
my partition table should look like this:
Primary
1: NTFS
2: x86 boot (Solaris)
3: Solaris
4: Extended

and my extended looks like this
5: ext3  (Linux /boot)
6: ext3  (Linux / )
7: NTFS
8: FAT32
9: swap (Linux swap )

and now I want to mount the FAT32 partition which is a logical partition
with permission where all user has rwx access to it...

Thanks.
0
Comment
Question by:RedComet
1 Comment
 
LVL 2

Accepted Solution

by:
colsey79 earned 250 total points
ID: 9665440
Hi there

Normally you would mound a partition as follows:

mount -F pcfs /dev/dsk/c0t0d0p0:1 /mnt # SCSI DISK
mount -F pcfs /dev/dsk/c0d0p0:1   /mnt # ATAPI DISK

Where c0 is the controller number.
      t0 is the target (SCSI ID number) (omit for ATAPI)
      d0 is always 0 for SCSI, the drive # for ATAPI
      p0 is the partition (p0 is the entire disk, or p1 - p4)
      /mnt is the mount point
      :1 is the logical drive (c - z or 1 - 24)

Note: p0 refers to the first primary partition and p1, p2, . . . refers to the logical DOS partitions found in the extended DOS partition.

[ Disk naming explained :-) ]

To mount the partitions automatically, put something like this in /etc/vfstab:

#device           device         mount    FS    fsck  mount
#to mount         to fsck        point    type  pass  at boot
/dev/dsk/c0d0p0:1 -              /c       pcfs  -     yes       -
/dev/dsk/c0d1p0:1 -              /d       pcfs  -     yes       -

This mounts the DOS partitions (assuming it's the first partition) on /c and /d, respectively, on startup. For more info, see "man pcfs"

That should get your FAT32 partitions selected and mounted correctly.

HTH
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Oracle 12c RAC - naming conventions, standards & best practices 4 166
Generate FIPS 140-2 Public Key on Unix 5 67
Oracle Finace 3 67
check unix curl command return value 7 86
I have been running these systems for a few years now and I am just very happy with them.   I just wanted to share the manual that I have created for upgrades and other things.  Oooh yes! FreeBSD makes me happy (as a server), no maintenance and I al…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now