delete doubled words, e.g.: "the the" -> "the"
This commit is contained in:
parent
e5ff1bbc6e
commit
000fb64288
@ -30,7 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)csh.1 8.1 (Berkeley) 6/8/93
|
||||
.\" $Id$
|
||||
.\" $Id: csh.1,v 1.2 1994/09/24 02:54:23 davidg Exp $
|
||||
.\"
|
||||
.EH 'USD:4-%''An Introduction to the C shell'
|
||||
.OH 'An Introduction to the C shell''USD:4-%'
|
||||
@ -617,7 +617,7 @@ order than we listed them above.
|
||||
The
|
||||
.I echo
|
||||
command receives four words as arguments, even though we only typed
|
||||
one word as as argument directly.
|
||||
one word as an argument directly.
|
||||
The four words were generated by
|
||||
.I "filename expansion"
|
||||
of the one input word.
|
||||
|
@ -30,7 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)csh.2 8.1 (Berkeley) 6/8/93
|
||||
.\" $Id$
|
||||
.\" $Id: csh.2,v 1.2 1994/09/24 02:54:24 davidg Exp $
|
||||
.\"
|
||||
.nr H1 1
|
||||
.NH
|
||||
@ -1300,7 +1300,7 @@ One useful feature which is discussed later is the
|
||||
built-in command which can be used to run the same command
|
||||
sequence with a number of different arguments.
|
||||
.PP
|
||||
If you intend to use \s-2UNIX\s0 a lot you you should look through
|
||||
If you intend to use \s-2UNIX\s0 a lot you should look through
|
||||
the rest of this document and the csh manual pages (section1) to become familiar
|
||||
with the other facilities which are available to you.
|
||||
.bp
|
||||
|
@ -1,4 +1,4 @@
|
||||
.\" $Id: ed.1,v 1.6 1994/09/24 02:55:24 davidg Exp $
|
||||
.\" $Id: ed.1,v 1.7 1996/08/29 18:05:50 wosch Exp $
|
||||
.TH ED 1 "21 May 1993"
|
||||
.SH NAME
|
||||
.\" ed, red \- text editor
|
||||
@ -167,7 +167,7 @@ and is legal wherever it makes sense.
|
||||
|
||||
An address range is two addresses separated either by a comma or
|
||||
semi-colon. The value of the first address in a range cannot exceed the
|
||||
value of the the second. If only one address is given in a range, then
|
||||
value of the second. If only one address is given in a range, then
|
||||
the second address is set to the given address. If an
|
||||
.IR n- tuple
|
||||
of addresses is given where
|
||||
|
@ -1,3 +1,5 @@
|
||||
.\" $Id$
|
||||
.\"
|
||||
.de Id
|
||||
.ds Rv \\$3
|
||||
.ds Dt \\$4
|
||||
@ -1274,7 +1276,7 @@ Each
|
||||
file is searched for the revision or tag.
|
||||
.TP 1i
|
||||
\fB\ \ \ \ \ \ \-t\fP \fItag\fP
|
||||
Show records since tag \fItag\fP was last added to the the history file.
|
||||
Show records since tag \fItag\fP was last added to the history file.
|
||||
This differs from the \fB-r\fP flag above in that it reads
|
||||
only the history file, not the
|
||||
.SM RCS
|
||||
|
@ -17,6 +17,8 @@
|
||||
.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
|
||||
.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH PCAP 3 "18 July 1996"
|
||||
.SH NAME
|
||||
pcap \- Packet Capture library
|
||||
@ -152,7 +154,7 @@ If there is an error,
|
||||
.B NULL
|
||||
is returned and
|
||||
.I errbuf
|
||||
is filled in with with an appropriate error message.
|
||||
is filled in with an appropriate error message.
|
||||
.PP
|
||||
.B pcap_lookupnet()
|
||||
is used to determine the network number and mask
|
||||
@ -167,7 +169,7 @@ are
|
||||
pointers.
|
||||
A return of -1 indicates an error in which case
|
||||
.I errbuf
|
||||
is filled in with with an appropriate error message.
|
||||
is filled in with an appropriate error message.
|
||||
.PP
|
||||
.B pcap_dispatch()
|
||||
is used to collect and process packets.
|
||||
|
@ -5,6 +5,7 @@
|
||||
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
|
||||
'\"
|
||||
'\" SCCS: @(#) FindExec.3 1.3 96/03/25 20:03:17
|
||||
'\" $Id$
|
||||
'\"
|
||||
.so man.macros
|
||||
.TH Tcl_FindExecutable 3 7.5 Tcl "Tcl Library Procedures"
|
||||
@ -30,7 +31,7 @@ This procedure computes the full path name of the executable file
|
||||
from which the application was invoked and saves it for Tcl's
|
||||
internal use.
|
||||
The executable's path name is needed for several purposes in
|
||||
Tcl. For example, is is needed on some platforms in the
|
||||
Tcl. For example, it is needed on some platforms in the
|
||||
implementation of the \fBload\fR command.
|
||||
It is also returned by the \fBinfo nameofexecutable\fR command.
|
||||
.PP
|
||||
|
@ -6,6 +6,7 @@
|
||||
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
|
||||
'\"
|
||||
'\" SCCS: @(#) break.n 1.6 96/03/25 20:10:27
|
||||
'\" $Id$
|
||||
'\"
|
||||
.so man.macros
|
||||
.TH break n "" Tcl "Tcl Built-In Commands"
|
||||
@ -24,7 +25,7 @@ such as \fBfor\fR or \fBforeach\fR or \fBwhile\fR.
|
||||
It returns a TCL_BREAK code, which causes a break exception
|
||||
to occur.
|
||||
The exception causes the current script to be aborted
|
||||
out to the the innermost containing loop command, which then
|
||||
out to the innermost containing loop command, which then
|
||||
aborts its execution and returns normally.
|
||||
Break exceptions are also handled in a few other situations, such
|
||||
as the \fBcatch\fR command, Tk event bindings, and the outermost
|
||||
|
@ -6,6 +6,7 @@
|
||||
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
|
||||
'\"
|
||||
'\" SCCS: @(#) continue.n 1.6 96/03/25 20:12:09
|
||||
'\" $Id$
|
||||
'\"
|
||||
.so man.macros
|
||||
.TH continue n "" Tcl "Tcl Built-In Commands"
|
||||
@ -24,7 +25,7 @@ such as \fBfor\fR or \fBforeach\fR or \fBwhile\fR.
|
||||
It returns a TCL_CONTINUE code, which causes a continue exception
|
||||
to occur.
|
||||
The exception causes the current script to be aborted
|
||||
out to the the innermost containing loop command, which then
|
||||
out to the innermost containing loop command, which then
|
||||
continues with the next iteration of the loop.
|
||||
Catch exceptions are also handled in a few other situations, such
|
||||
as the \fBcatch\fR command and the outermost scripts of procedure
|
||||
|
@ -6,6 +6,7 @@
|
||||
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
|
||||
'\"
|
||||
'\" SCCS: @(#) expr.n 1.17 96/03/14 10:54:40
|
||||
'\" $Id$
|
||||
'\"
|
||||
.so man.macros
|
||||
.TH expr n 7.4 Tcl "Tcl Built-In Commands"
|
||||
@ -259,7 +260,7 @@ example,
|
||||
\fBexpr 20.0/5.0\fR
|
||||
.CE
|
||||
returns ``4.0'', not ``4''. The global variable \fBtcl_precision\fR
|
||||
determines the the number of significant digits that are retained
|
||||
determines the number of significant digits that are retained
|
||||
when floating values are converted to strings (except that trailing
|
||||
zeroes are omitted). If \fBtcl_precision\fR
|
||||
is unset then 6 digits of precision are used.
|
||||
|
@ -6,6 +6,7 @@
|
||||
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
|
||||
'\"
|
||||
'\" SCCS: @(#) unknown.n 1.7 96/03/25 20:26:05
|
||||
'\" $Id$
|
||||
'\"
|
||||
.so man.macros
|
||||
.TH unknown n "" Tcl "Tcl Built-In Commands"
|
||||
@ -52,7 +53,7 @@ If so, it invokes the Tcl \fBexec\fR command
|
||||
with \fIcmd\fR and all the \fIargs\fR as arguments.
|
||||
If \fIcmd\fR can't be auto-executed, \fBunknown\fR checks to
|
||||
see if the command was invoked at top-level and outside of any
|
||||
script. If so, then \fBunknown\fR takes takes two additional steps.
|
||||
script. If so, then \fBunknown\fR takes two additional steps.
|
||||
First, it sees if \fIcmd\fR has one of the following three forms:
|
||||
\fB!!\fR, \fB!\fIevent\fR, or \fB^\fIold\fB^\fInew\fR?\fB^\fR?.
|
||||
If so, then \fBunknown\fR carries out history substitution
|
||||
|
@ -1,3 +1,5 @@
|
||||
.\" $Id$
|
||||
.\"
|
||||
.de sh
|
||||
.br
|
||||
.ne 5
|
||||
@ -1164,7 +1166,7 @@ and
|
||||
a player may posses, based upon
|
||||
.B level.
|
||||
.I Quicksilver
|
||||
is always limited to to a maximum of 99.
|
||||
is always limited to a maximum of 99.
|
||||
.PP
|
||||
.I Books
|
||||
bought at a
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)sail.6 8.2 (Berkeley) 12/30/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH SAIL 6 "December 30, 1993"
|
||||
.UC 4
|
||||
@ -254,7 +255,7 @@ any fleet were its "Ships of the Line", or "Line of Battle Ships". They
|
||||
were so named because these ships fought together in great lines. They were
|
||||
close enough for mutual support, yet every ship could fire both its broadsides.
|
||||
We get the modern words "ocean liner," or "liner," and "battleship" from
|
||||
"ship of the line." The most common size was the the 74 gun two decked
|
||||
"ship of the line." The most common size was the 74 gun two decked
|
||||
ship of the line. The two gun decks usually mounted 18 and 24 pounder guns.
|
||||
.PP
|
||||
The pride of the fleet were the first rates. These were huge three decked
|
||||
|
@ -25,6 +25,7 @@
|
||||
.\" Western Washington University
|
||||
.\" Bellingham, WA 98226-9062
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH bc 1 .\" "Command Manual" v1.02 "Feb 3, 1992"
|
||||
.SH NAME
|
||||
@ -310,7 +311,7 @@ precision, some numbers may not be printable on a single output line.
|
||||
These long numbers will be split across lines using the "\e" as the
|
||||
last character on a line. The maximum number of characters printed
|
||||
per line is 70. Due to the interactive nature of \fBbc\fR printing
|
||||
a number cause the side effect of assigning the printed value the the
|
||||
a number cause the side effect of assigning the printed value the
|
||||
special variable \fBlast\fR. This allows the user to recover the
|
||||
last value printed without having to retype the expression that
|
||||
printed the number. Assigning to \fBlast\fR is legal and will
|
||||
@ -327,7 +328,7 @@ The print statement (an extension) provides another method of output.
|
||||
The "list" is a list of strings and expressions separated by commas.
|
||||
Each string or expression is printed in the order of the list. No
|
||||
terminating newline is printed. Expressions are evaluated and their
|
||||
value is printed and assigned the the variable \fBlast\fR. Strings
|
||||
value is printed and assigned the variable \fBlast\fR. Strings
|
||||
in the print statement are printed to the output and may contain
|
||||
special characters. Special characters start with the backslash
|
||||
character (\e). The special characters recognized by \fBbc\fR are
|
||||
|
@ -1,7 +1,13 @@
|
||||
.rn '' }`
|
||||
''' $RCSfile: perl.1,v $$Revision: 1.1.1.1 $$Date: 1994/09/10 06:27:36 $
|
||||
''' $RCSfile: perl.1,v $$Revision: 1.2 $$Date: 1994/10/27 23:16:52 $
|
||||
'''
|
||||
''' $Log: perl.1,v $
|
||||
''' Revision 1.2 1994/10/27 23:16:52 wollman
|
||||
''' Convince Perl to that is is part of the system, as /usr/bin/perl (binary)
|
||||
''' and /usr/share/perl (library). The latter was chosen as analogous to other
|
||||
''' directories already present in /usr/share, like /usr/share/groff_font and
|
||||
''' (particularly) /usr/share/mk.
|
||||
'''
|
||||
.\" Revision 1.1.1.1 1994/09/10 06:27:36 gclarkii
|
||||
.\" Initial import of Perl 4.046 bmaked
|
||||
.\"
|
||||
@ -505,7 +511,7 @@ If a directory name is specified, Perl will switch to that directory
|
||||
before running the script.
|
||||
The
|
||||
.B \-x
|
||||
switch only controls the the disposal of leading garbage.
|
||||
switch only controls the disposal of leading garbage.
|
||||
The script must be terminated with _\|_END_\|_ if there is trailing garbage
|
||||
to be ignored (the script can process any or all of the trailing garbage
|
||||
via the DATA filehandle if desired).
|
||||
|
@ -1,3 +1,5 @@
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH info 1 "7th December 1990"
|
||||
.SH NAME
|
||||
info \- GNU's hypertext system
|
||||
@ -148,7 +150,7 @@ Pick a menu item specified by name. Picking a menu item causes another
|
||||
node to be selected. You do not need to type a complete nodename; if
|
||||
you type a few letters and then a space or tab
|
||||
.B info
|
||||
will will try to fill in the rest of the nodename. If you ask for further
|
||||
will try to fill in the rest of the nodename. If you ask for further
|
||||
completion without typing any more characters you'll be given a list
|
||||
of possibilities; you can also get the list with
|
||||
.B ?.
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)mpool.3 8.1 (Berkeley) 6/4/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH MPOOL 3 "June 4, 1993"
|
||||
.UC 7
|
||||
@ -115,7 +116,7 @@ If the
|
||||
.I pgout
|
||||
function is specified, it is called each time a buffer is written into the
|
||||
backing file.
|
||||
Both functions are are called with the
|
||||
Both functions are called with the
|
||||
.I pgcookie
|
||||
pointer, the page number and a pointer to the page to being read or written.
|
||||
.PP
|
||||
|
@ -23,7 +23,7 @@
|
||||
.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ftok.3,v 1.3 1996/02/12 07:06:23 mpp Exp $
|
||||
.\" $Id: ftok.3,v 1.4 1996/06/03 10:40:39 joerg Exp $
|
||||
.Dd June 24, 1994
|
||||
.Os
|
||||
.Dt ftok 3
|
||||
@ -82,4 +82,4 @@ specified
|
||||
.Fa path
|
||||
in combination with the lower 8 bits of the given
|
||||
.Fa id .
|
||||
Thus is is quite possible for the routine to return duplicate keys.
|
||||
Thus it is quite possible for the routine to return duplicate keys.
|
||||
|
@ -34,6 +34,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)memcmp.3 8.1 (Berkeley) 6/4/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd June 4, 1993
|
||||
.Dt MEMCMP 3
|
||||
@ -60,7 +61,7 @@ bytes long.
|
||||
The
|
||||
.Fn memcmp
|
||||
function
|
||||
returns zero if the the two strings are identical,
|
||||
returns zero if the two strings are identical,
|
||||
otherwise returns the difference between the first two differing bytes
|
||||
(treated as unsigned char values, so that
|
||||
.Sq Li \e200
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)madvise.2 8.1 (Berkeley) 6/9/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd Jul 19, 1996
|
||||
.Dt MADVISE 2
|
||||
@ -81,7 +82,7 @@ of pages in the specified range. Additionally future references to
|
||||
this address range will incur a page fault.
|
||||
.sp
|
||||
MADV_FREE gives the VM system the freedom to free pages,
|
||||
and and tells the system that information in the specified page range
|
||||
and tells the system that information in the specified page range
|
||||
is no longer important. This is an efficient way of allowing malloc(3) to
|
||||
free pages anywhere in the address space, while keeping the address space
|
||||
valid. The next time that the page is referenced, the page might be demand
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)mkdir.2 8.2 (Berkeley) 12/11/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd December 11, 1993
|
||||
.Dt MKDIR 2
|
||||
@ -46,7 +47,7 @@ The directory
|
||||
.Fa path
|
||||
is created with the access permissions specified by
|
||||
.Fa mode
|
||||
and restricted by the the
|
||||
and restricted by the
|
||||
.Xr umask 2
|
||||
of the calling process.
|
||||
.Pp
|
||||
|
@ -1,4 +1,6 @@
|
||||
.\" @(#)xdr.3n 2.2 88/08/03 4.0 RPCSRC; from 1.16 88/03/14 SMI
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH XDR 3 "16 February 1988"
|
||||
.SH NAME
|
||||
xdr \- library routines for external data representation
|
||||
@ -753,7 +755,7 @@ parameter
|
||||
.I arrp
|
||||
is the address of the pointer to the array, while
|
||||
.I size
|
||||
is is the element count of the array. The parameter
|
||||
is the element count of the array. The parameter
|
||||
.I elsize
|
||||
is the
|
||||
.I sizeof
|
||||
|
@ -23,7 +23,7 @@
|
||||
.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ftok.3,v 1.3 1996/02/12 07:06:23 mpp Exp $
|
||||
.\" $Id: ftok.3,v 1.4 1996/06/03 10:40:39 joerg Exp $
|
||||
.Dd June 24, 1994
|
||||
.Os
|
||||
.Dt ftok 3
|
||||
@ -82,4 +82,4 @@ specified
|
||||
.Fa path
|
||||
in combination with the lower 8 bits of the given
|
||||
.Fa id .
|
||||
Thus is is quite possible for the routine to return duplicate keys.
|
||||
Thus it is quite possible for the routine to return duplicate keys.
|
||||
|
@ -22,6 +22,7 @@
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd June 17, 1996
|
||||
.Dt ftpio 3
|
||||
@ -90,7 +91,7 @@ subsequent FTP operations. On failure, NULL is returned and
|
||||
will return the error code returned by the foreign server.
|
||||
.Pp
|
||||
.Fn ftpChdir
|
||||
attempts to issue a server CD command to the the directory named in
|
||||
attempts to issue a server CD command to the directory named in
|
||||
.Fa dir.
|
||||
On success, zero is returned. On failure, the error code from the server.
|
||||
.Pp
|
||||
|
@ -1,3 +1,5 @@
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH curs_addch 3 ""
|
||||
.SH NAME
|
||||
\fBaddch\fR, \fBwaddch\fR, \fBmvaddch\fR, \fBmvwaddch\fR,
|
||||
@ -52,7 +54,7 @@ these routines instead of their equivalents.
|
||||
The following variables may be used to add line drawing characters to the
|
||||
screen with routines of the \fBaddch\fR family. The default character listed
|
||||
below is used if the \fBacsc\fR capability doesn't define a terminal-specific
|
||||
replacement for it. The names are taken from the the VT100 nomenclature.
|
||||
replacement for it. The names are taken from the VT100 nomenclature.
|
||||
|
||||
.TS
|
||||
l l l
|
||||
|
@ -1,3 +1,5 @@
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH curs_insstr 3 ""
|
||||
.SH NAME
|
||||
\fBinsstr\fR, \fBinsnstr\fR, \fBwinsstr\fR, \fBwinsnstr\fR,
|
||||
@ -38,7 +40,7 @@ to be at every eighth column. If a character in \fIstr\fR is another
|
||||
control character, it is drawn in the \fB^\fR\fIX\fR notation.
|
||||
Calling \fBwinch\fR after adding a control character (and moving to
|
||||
it, if necessary) does not return the control character, but instead
|
||||
returns a character in the the ^-representation of the control character.
|
||||
returns a character in the ^-representation of the control character.
|
||||
.SH RETURN VALUE
|
||||
All routines return the integer \fBERR\fR upon failure and an integer value
|
||||
other than \fBERR\fR upon successful completion.
|
||||
|
@ -30,7 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)telnetd.8 8.3 (Berkeley) 3/1/94
|
||||
.\" $Id$
|
||||
.\" $Id: telnetd.8,v 1.3 1996/09/22 21:55:44 wosch Exp $
|
||||
.\"
|
||||
.Dd March 1, 1994
|
||||
.Dt TELNETD 8
|
||||
@ -224,7 +224,7 @@ will operate in character at a time mode.
|
||||
It will still support kludge linemode, but will only
|
||||
go into kludge linemode if the remote client requests
|
||||
it.
|
||||
(This is done by by the client sending
|
||||
(This is done by the client sending
|
||||
.Dv DONT SUPPRESS-GO-AHEAD
|
||||
and
|
||||
.Dv DONT ECHO . )
|
||||
|
@ -35,7 +35,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)mount_null.8 8.4 (Berkeley) 4/19/94
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd April 19, 1994
|
||||
.Dt MOUNT_NULL 8
|
||||
@ -195,7 +195,7 @@ by mapping an vnode arguments to the lower layer.
|
||||
The first approach is to call the aliasing layer's bypass routine.
|
||||
This method is most suitable when you wish to invoke the operation
|
||||
currently being handled on the lower layer. It has the advantage
|
||||
the the bypass routine already must do argument mapping.
|
||||
the bypass routine already must do argument mapping.
|
||||
An example of this is
|
||||
.Em null_getattrs
|
||||
in the null layer.
|
||||
|
@ -35,7 +35,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)mount_null.8 8.4 (Berkeley) 4/19/94
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd April 19, 1994
|
||||
.Dt MOUNT_NULL 8
|
||||
@ -195,7 +195,7 @@ by mapping an vnode arguments to the lower layer.
|
||||
The first approach is to call the aliasing layer's bypass routine.
|
||||
This method is most suitable when you wish to invoke the operation
|
||||
currently being handled on the lower layer. It has the advantage
|
||||
the the bypass routine already must do argument mapping.
|
||||
the bypass routine already must do argument mapping.
|
||||
An example of this is
|
||||
.Em null_getattrs
|
||||
in the null layer.
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)ping.8 8.2 (Berkeley) 12/11/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd December 11, 1993
|
||||
.Dt PING 8
|
||||
@ -326,7 +327,7 @@ The maximum IP header length is too small for options like
|
||||
.Tn RECORD_ROUTE
|
||||
to
|
||||
be completely useful.
|
||||
There's not much that that can be done about this, however.
|
||||
There's not much that can be done about this, however.
|
||||
.Pp
|
||||
Flood pinging is not recommended in general, and flood pinging the
|
||||
broadcast address should only be done under very controlled conditions.
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)cap_mkdb.1 8.1 (Berkeley) 6/6/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd "June 6, 1993"
|
||||
.Dt CAP_MKDB 1
|
||||
@ -63,7 +64,7 @@ than they can the original text file(s).
|
||||
The ``tc'' capabilities of the records are expanded before the
|
||||
record is stored into the database.
|
||||
.Pp
|
||||
The options as as follows:
|
||||
The options as follows:
|
||||
.Bl -tag -width XXXXXX -indent
|
||||
.It Fl f Ar outfile
|
||||
Specify a different database basename.
|
||||
@ -83,7 +84,7 @@ that couldn't be expanded.
|
||||
.Pp
|
||||
The second type is a key which consists of one of the names from the
|
||||
first capability of the record with a data field consisting a special
|
||||
byte followed by the the first capability of the record.
|
||||
byte followed by the first capability of the record.
|
||||
The special byte is a 2.
|
||||
.Pp
|
||||
In normal operation names are looked up in the database, resulting
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)hexdump.1 8.2 (Berkeley) 4/18/94
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd April 18, 1994
|
||||
.Dt HEXDUMP 1
|
||||
@ -213,7 +214,7 @@ described in the C standard are supported:
|
||||
.Ed
|
||||
.El
|
||||
.Pp
|
||||
Hexdump also supports the the following additional conversion strings:
|
||||
Hexdump also supports the following additional conversion strings:
|
||||
.Bl -tag -width Fl
|
||||
.It Cm \&_a Ns Op Cm dox
|
||||
Display the input offset, cumulative across input files, of the
|
||||
|
@ -27,7 +27,7 @@
|
||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ipcs.1,v 1.1 1994/09/13 16:59:28 dfr Exp $
|
||||
.\" $Id: ipcs.1,v 1.2 1994/11/19 18:19:27 nate Exp $
|
||||
.\"
|
||||
.Dd June 18, 1994
|
||||
.Dt "IPCS" 1
|
||||
@ -66,7 +66,7 @@ and shared memory segments. The
|
||||
.Dq maximum allowed size
|
||||
is the maximum number of bytes in a message on a message queue,
|
||||
the size of a shared memory segment,
|
||||
or the number number of semaphores in a set of semaphores.
|
||||
or the number of semaphores in a set of semaphores.
|
||||
.It Fl c
|
||||
Show the creator's name and group for active semaphores, message queues,
|
||||
and shared memory segments.
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)make.1 8.4 (Berkeley) 3/19/94
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd March 19, 1994
|
||||
.Dt MAKE 1
|
||||
@ -586,7 +587,7 @@ Test the value of a variable.
|
||||
.Oo \&! Oc Ns Ar target
|
||||
.Op Ar operator target ...
|
||||
.Xc
|
||||
Test the the target being built.
|
||||
Test the target being built.
|
||||
.It Xo
|
||||
.Ic .ifnmake
|
||||
.Oo \&! Oc Ar target
|
||||
|
@ -33,7 +33,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" from: @(#)quota.1 8.1 (Berkeley) 6/6/93
|
||||
.\" $Id: quota.1,v 1.4 1994/06/28 07:47:24 deraadt Exp $
|
||||
.\" $Id: quota.1,v 1.2 1996/01/05 08:37:28 graichen Exp $
|
||||
.\"
|
||||
.Dd June 6, 1993
|
||||
.Dt QUOTA 1
|
||||
@ -90,7 +90,7 @@ Only the super-user may use the
|
||||
flag and the optional
|
||||
.Ar user
|
||||
argument to view the limits of other users.
|
||||
Non-super-users can use the the
|
||||
Non-super-users can use the
|
||||
.Fl g
|
||||
flag and optional
|
||||
.Ar group
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)ranlib.1 8.1 (Berkeley) 6/6/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd June 6, 1993
|
||||
.Dt RANLIB 1
|
||||
@ -46,7 +47,7 @@
|
||||
creates a table of external references for archive libraries,
|
||||
normally used by the loader,
|
||||
.Xr ld 1 .
|
||||
This table is is named ``__.SYMDEF'' and is prepended to the archive.
|
||||
This table is named ``__.SYMDEF'' and is prepended to the archive.
|
||||
Files in the archive which are not executable and symbols which are
|
||||
uninteresting to the loader are ignored.
|
||||
.Pp
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)ranlib.1 8.1 (Berkeley) 6/6/93
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd June 6, 1993
|
||||
.Dt RANLIB 1
|
||||
@ -46,7 +47,7 @@
|
||||
creates a table of external references for archive libraries,
|
||||
normally used by the loader,
|
||||
.Xr ld 1 .
|
||||
This table is is named ``__.SYMDEF'' and is prepended to the archive.
|
||||
This table is named ``__.SYMDEF'' and is prepended to the archive.
|
||||
Files in the archive which are not executable and symbols which are
|
||||
uninteresting to the loader are ignored.
|
||||
.Pp
|
||||
|
@ -1,3 +1,4 @@
|
||||
'\" $Id$
|
||||
'\" t
|
||||
.\" Uncomment the next line to get a man page accurate for MS-DOS
|
||||
.\"nr Os 1
|
||||
@ -247,7 +248,7 @@ sequence of entries in one of the following four forms:
|
||||
.BI PUBLIC\ pubid\ sysid
|
||||
This specifies that
|
||||
.I sysid
|
||||
should be used as the system identifier if the the public
|
||||
should be used as the system identifier if the public
|
||||
identifier is
|
||||
.IR pubid .
|
||||
.I Sysid
|
||||
|
@ -1,4 +1,6 @@
|
||||
.\" @(#) mytinfo tconv.1 3.2 92/02/01 public domain, By Ross Ridge
|
||||
.\" $Id$
|
||||
.\"
|
||||
.TH TCONV 1 "92/02/01" "mytinfo"
|
||||
.SH NAME
|
||||
tconv \- convert between termcap, terminfo source and terminfo binary
|
||||
@ -87,7 +89,7 @@ are given the
|
||||
option will be assumed.
|
||||
If the
|
||||
.B \-B
|
||||
option is used, the compiled output will be put in the the
|
||||
option is used, the compiled output will be put in the
|
||||
terminfo database, otherwise standard output is used.
|
||||
.PP
|
||||
You cannot translate from terminfo binary to terminfo binary.
|
||||
|
@ -30,6 +30,7 @@
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)telnet.1 8.5 (Berkeley) 3/1/94
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd March 1, 1994
|
||||
.Dt TELNET 1
|
||||
@ -999,7 +1000,7 @@ commands.
|
||||
The
|
||||
.Ic slc
|
||||
command (Set Local Characters) is used to set
|
||||
or change the state of the the special
|
||||
or change the state of the special
|
||||
characters when the
|
||||
.Dv TELNET LINEMODE
|
||||
option has
|
||||
|
@ -1,3 +1,5 @@
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd July 3, 1995
|
||||
.Dt CDCONTROL 1
|
||||
.Os FreeBSD
|
||||
@ -114,7 +116,7 @@ Play the left subtrack on both left and right channels.
|
||||
Play the right subtrack on both left and right channels.
|
||||
|
||||
.It Cm info
|
||||
Print the the table of contents.
|
||||
Print the table of contents.
|
||||
|
||||
.It Cm status
|
||||
Print the information about the disc:
|
||||
|
@ -27,7 +27,7 @@
|
||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: sa.8,v 1.2 1994/09/26 21:41:06 davidg Exp $
|
||||
.\" $Id: sa.8,v 1.3 1996/04/07 00:05:57 mpp Exp $
|
||||
.\"
|
||||
.Dd February 25, 1994
|
||||
.Dt SA 8
|
||||
@ -48,7 +48,7 @@ and generally maintains system
|
||||
accounting files.
|
||||
.Pp
|
||||
.Nm Sa
|
||||
is able to condense the the information in
|
||||
is able to condense the information in
|
||||
.Pa /var/account/acct
|
||||
into the summary files
|
||||
.Pa /var/account/savacct
|
||||
|
@ -1,4 +1,4 @@
|
||||
''' $Header
|
||||
''' $Id$
|
||||
'''
|
||||
.de Sh
|
||||
.br
|
||||
@ -70,7 +70,7 @@ which sets the slew rate and resolution used by the
|
||||
system call, and
|
||||
.IR dosynctodr ,
|
||||
which indicates to the kernels on some machines whether they should internally
|
||||
adjust the system clock to keep it in line with with time\-of\-day clock
|
||||
adjust the system clock to keep it in line with time\-of\-day clock
|
||||
or not.
|
||||
.PP
|
||||
By default, with no arguments,
|
||||
@ -92,7 +92,7 @@ with
|
||||
Various flags may be specified to change the variables of interest in
|
||||
the running kernel. The
|
||||
.B -a
|
||||
flag allows one to set the the variable
|
||||
flag allows one to set the variable
|
||||
.I tickadj
|
||||
to the value specified as an argument. The
|
||||
.B -A
|
||||
|
@ -29,7 +29,7 @@
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ypbind.8,v 1.3 1995/07/20 22:33:02 wpaul Exp $
|
||||
.\" $Id: ypbind.8,v 1.4 1996/02/11 22:37:51 mpp Exp $
|
||||
.\"
|
||||
.Dd April 9, 1995
|
||||
.Dt YPBIND 8
|
||||
@ -110,7 +110,7 @@ The
|
||||
flag allows the system administrator to lock ypbind to a particular
|
||||
domain and group of NIS servers. Up to ten servers can be specified.
|
||||
There must not be any spaces between the commas in the domain/server
|
||||
specification. This option is used to insure that that the system binds
|
||||
specification. This option is used to insure that the system binds
|
||||
only to one domain and only to one of the specified servers, which
|
||||
is useful for systems that are both NIS servers and NIS
|
||||
clients: it provides a way to restrict what machines the system can
|
||||
|
Loading…
x
Reference in New Issue
Block a user