Remove whitespace at EOL.
This commit is contained in:
parent
0d7bb1fec6
commit
a145482cf6
@ -193,7 +193,7 @@ is only supported by few media changers. If it is not supported by a
|
||||
device, using this command will usually result in a "Invalid Field in
|
||||
CDB" error message on the console.
|
||||
.Pp
|
||||
If the
|
||||
If the
|
||||
.Fl c
|
||||
flag is specified, the volume tag of the specified element is
|
||||
cleared. If the
|
||||
|
@ -113,42 +113,42 @@ one or more of the following values:
|
||||
.Pp
|
||||
.Bl -tag -width 6n -compact -offset indent
|
||||
.It Li 4000
|
||||
(the set-user-ID-on-execution bit) Executable files with this bit set
|
||||
(the set-user-ID-on-execution bit) Executable files with this bit set
|
||||
will run with effective uid set to the uid of the file owner.
|
||||
Directories with the set-user-id bit set will force all files and
|
||||
sub-directories created in them to be owned by the directory owner
|
||||
and not by the uid of the creating process, if the underlying file
|
||||
system supports this feature: see
|
||||
Directories with the set-user-id bit set will force all files and
|
||||
sub-directories created in them to be owned by the directory owner
|
||||
and not by the uid of the creating process, if the underlying file
|
||||
system supports this feature: see
|
||||
.Xr chmod 2
|
||||
and the
|
||||
and the
|
||||
.Ar suiddir
|
||||
option to
|
||||
.Xr mount 8 .
|
||||
.It Li 2000
|
||||
(the set-group-ID-on-execution bit) Executable files with this bit set
|
||||
will run with effective gid set to the gid of the file owner.
|
||||
(the set-group-ID-on-execution bit) Executable files with this bit set
|
||||
will run with effective gid set to the gid of the file owner.
|
||||
.It Li 1000
|
||||
(the sticky bit)
|
||||
(the sticky bit)
|
||||
When set on a directory, unprivileged users can delete and rename
|
||||
only those files in the directory that are owned by them, regardless of
|
||||
only those files in the directory that are owned by them, regardless of
|
||||
the permissions on the directory. Under
|
||||
.Fx ,
|
||||
the sticky bit is
|
||||
ignored for executable files and may only be set for directories (see
|
||||
the sticky bit is
|
||||
ignored for executable files and may only be set for directories (see
|
||||
.Xr sticky 8 ) .
|
||||
.It Li 0400
|
||||
Allow read by owner.
|
||||
.It Li 0200
|
||||
Allow write by owner.
|
||||
.It Li 0100
|
||||
For files, allow execution by owner. For directories, allow the owner to
|
||||
For files, allow execution by owner. For directories, allow the owner to
|
||||
search in the directory.
|
||||
.It Li 0040
|
||||
Allow read by group members.
|
||||
.It Li 0020
|
||||
Allow write by group members.
|
||||
.It Li 0010
|
||||
For files, allow execution by group members. For directories, allow
|
||||
For files, allow execution by group members. For directories, allow
|
||||
group members to search in the directory.
|
||||
.It Li 0004
|
||||
Allow read by others.
|
||||
@ -159,9 +159,9 @@ For files, allow execution by others. For directories allow others to
|
||||
search in the directory.
|
||||
.El
|
||||
.Pp
|
||||
For example, the absolute mode that permits read, write and execute by
|
||||
the owner, read and execute by group members, read and execute by
|
||||
others, and no set-uid or set-gid behaviour is 755
|
||||
For example, the absolute mode that permits read, write and execute by
|
||||
the owner, read and execute by group members, read and execute by
|
||||
others, and no set-uid or set-gid behaviour is 755
|
||||
(400+200+100+040+010+004+001).
|
||||
.Pp
|
||||
The symbolic mode is described by the following grammar:
|
||||
|
18
bin/cp/cp.1
18
bin/cp/cp.1
@ -128,7 +128,7 @@ Cause
|
||||
to write a prompt to the standard error output before copying a file
|
||||
that would overwrite an existing file.
|
||||
If the response from the standard input begins with the character
|
||||
.Sq Li y
|
||||
.Sq Li y
|
||||
or
|
||||
.Sq Li Y ,
|
||||
the file copy is attempted.
|
||||
@ -168,12 +168,12 @@ ID are unchanged unless the
|
||||
.Fl p
|
||||
option was specified.
|
||||
.Pp
|
||||
In the second synopsis form,
|
||||
.Ar target_directory
|
||||
In the second synopsis form,
|
||||
.Ar target_directory
|
||||
must exist unless there is only one named
|
||||
.Ar source_file
|
||||
which is a directory and the
|
||||
.Fl R
|
||||
which is a directory and the
|
||||
.Fl R
|
||||
flag is specified.
|
||||
.Pp
|
||||
If the destination file does not exist, the mode of the source file is
|
||||
@ -192,12 +192,12 @@ conditions must be fulfilled or both bits are removed.
|
||||
.Pp
|
||||
Appropriate permissions are required for file creation or overwriting.
|
||||
.Pp
|
||||
Symbolic links are always followed unless the
|
||||
.Fl R
|
||||
Symbolic links are always followed unless the
|
||||
.Fl R
|
||||
flag is set, in which case symbolic links are not followed, by default.
|
||||
The
|
||||
.Fl H
|
||||
or
|
||||
or
|
||||
.Fl L
|
||||
flags (in conjunction with the
|
||||
.Fl R
|
||||
@ -232,7 +232,7 @@ option is non-standard and its use in scripts is not recommended.
|
||||
.Sh SEE ALSO
|
||||
.Xr mv 1 ,
|
||||
.Xr rcp 1 ,
|
||||
.Xr umask 2 ,
|
||||
.Xr umask 2 ,
|
||||
.Xr fts 3 ,
|
||||
.Xr symlink 7
|
||||
.Sh STANDARDS
|
||||
|
@ -119,7 +119,7 @@ for it in the glossary.
|
||||
Acknowledgements
|
||||
.PP
|
||||
Numerous people have provided good input about previous versions
|
||||
of
|
||||
of
|
||||
.I csh
|
||||
and aided in its debugging and in the debugging of its documentation.
|
||||
I would especially like to thank Michael Ubell
|
||||
@ -209,7 +209,7 @@ is to be read ``control-\fIx\fR'' and represents the striking of the \fIx\fR
|
||||
key while the control key is held down.)
|
||||
The mail program
|
||||
then echoed the characters `EOT' and transmitted our message.
|
||||
The characters `% ' were printed before and after the mail command
|
||||
The characters `% ' were printed before and after the mail command
|
||||
by the shell to indicate that input was needed.
|
||||
.PP
|
||||
After typing the `% ' prompt the shell was reading command input from
|
||||
@ -292,7 +292,7 @@ rather than having a large number of hard to remember options.
|
||||
.NH 2
|
||||
Output to files
|
||||
.PP
|
||||
Commands that normally read input or write output on the terminal
|
||||
Commands that normally read input or write output on the terminal
|
||||
can also be executed with this input and/or output done to
|
||||
a file.
|
||||
.PP
|
||||
@ -679,7 +679,7 @@ beginning are treated specially.
|
||||
Neither `*' or `?' or the `[' `]' mechanism will match it.
|
||||
This prevents accidental matching of the filenames `.' and `..'
|
||||
in the working directory which have special meaning to the system,
|
||||
as well as other files such as
|
||||
as well as other files such as
|
||||
.I \&.cshrc
|
||||
which are not normally
|
||||
visible.
|
||||
@ -732,7 +732,7 @@ as it is used less frequently.
|
||||
Quotation
|
||||
.PP
|
||||
We have already seen a number of metacharacters used by the shell.
|
||||
These metacharacters pose a problem in that we cannot use them directly
|
||||
These metacharacters pose a problem in that we cannot use them directly
|
||||
as parts of words.
|
||||
Thus the command
|
||||
.DS
|
||||
@ -742,7 +742,7 @@ will not echo the character `*'.
|
||||
It will either echo an sorted list of filenames in the
|
||||
current
|
||||
.I "working directory,"
|
||||
or print the message `No match' if there are
|
||||
or print the message `No match' if there are
|
||||
no files in the working directory.
|
||||
.PP
|
||||
The recommended mechanism for placing characters which are neither numbers,
|
||||
@ -826,7 +826,7 @@ The shell also terminates when it gets an end-of-file printing `logout';
|
||||
\s-2UNIX\s0 then logs you off the system.
|
||||
Since this means that typing too many ^D's can accidentally log us off,
|
||||
the shell has a mechanism for preventing this.
|
||||
This
|
||||
This
|
||||
.I ignoreeof
|
||||
option will be discussed in section 2.2.
|
||||
.PP
|
||||
|
@ -49,7 +49,7 @@ We will later see what kinds of commands are usefully placed there.
|
||||
For now we need not have this file and the shell does not complain about
|
||||
its absence.
|
||||
.PP
|
||||
A
|
||||
A
|
||||
.I "login shell" ,
|
||||
executed after you login to the system,
|
||||
will, after it reads commands from
|
||||
@ -131,7 +131,7 @@ processing my
|
||||
.I \&.login
|
||||
file and begin reading commands from the terminal, prompting for each with
|
||||
`% '.
|
||||
When I log off (by giving the
|
||||
When I log off (by giving the
|
||||
.I logout
|
||||
command) the shell
|
||||
will print `logout' and execute commands from the file `.logout'
|
||||
@ -328,11 +328,11 @@ main()
|
||||
printf("hello);
|
||||
}
|
||||
% cc !$
|
||||
cc bug.c
|
||||
cc bug.c
|
||||
"bug.c", line 4: newline in string or char constant
|
||||
"bug.c", line 5: syntax error
|
||||
% ed !$
|
||||
ed bug.c
|
||||
ed bug.c
|
||||
29
|
||||
4s/);/"&/p
|
||||
printf("hello");
|
||||
@ -340,10 +340,10 @@ w
|
||||
30
|
||||
q
|
||||
% !c
|
||||
cc bug.c
|
||||
cc bug.c
|
||||
% a.out
|
||||
hello% !e
|
||||
ed bug.c
|
||||
ed bug.c
|
||||
30
|
||||
4s/lo/lo\e\en/p
|
||||
printf("hello\en");
|
||||
@ -356,7 +356,7 @@ cc bug.c \-o bug
|
||||
a.out: 2784+364+1028 = 4176b = 0x1050b
|
||||
bug: 2784+364+1028 = 4176b = 0x1050b
|
||||
% ls \-l !*
|
||||
ls \-l a.out bug
|
||||
ls \-l a.out bug
|
||||
\(mirwxr\(mixr\(mix 1 bill 3932 Dec 19 09:41 a.out
|
||||
\(mirwxr\(mixr\(mix 1 bill 3932 Dec 19 09:42 bug
|
||||
% bug
|
||||
@ -364,14 +364,14 @@ hello
|
||||
% num bug.c | spp
|
||||
spp: Command not found.
|
||||
% ^spp^ssp
|
||||
num bug.c | ssp
|
||||
num bug.c | ssp
|
||||
1 main()
|
||||
3 {
|
||||
4 printf("hello\en");
|
||||
5 }
|
||||
% !! | lpr
|
||||
num bug.c | ssp | lpr
|
||||
%
|
||||
%
|
||||
.DE
|
||||
.KE
|
||||
In this example we have a very simple C program which has a bug (or two)
|
||||
@ -645,7 +645,7 @@ EOT
|
||||
.DE
|
||||
If the job did not terminate normally the `Done' message might say
|
||||
something else like `Killed'.
|
||||
If you want the
|
||||
If you want the
|
||||
terminations of background jobs to be reported at the time they occur
|
||||
(possibly interrupting the output of other foreground jobs), you can set
|
||||
the
|
||||
@ -770,7 +770,7 @@ job \- identified by a `\-' in the output of
|
||||
.I jobs.
|
||||
When the current job terminates, the previous job becomes the current job.
|
||||
When given, the argument is either `%\-' (indicating
|
||||
the previous job); `%#', where # is the job number;
|
||||
the previous job); `%#', where # is the job number;
|
||||
`%pref' where pref is some unique prefix of the command name
|
||||
and arguments of one of the jobs; or `%?' followed by some string found
|
||||
in only one of the jobs.
|
||||
@ -859,7 +859,7 @@ text editor might take a long time.
|
||||
Stopped
|
||||
% bg
|
||||
[1] ed bigfile &
|
||||
%
|
||||
%
|
||||
. . . some foreground commands
|
||||
.ta 1.75i
|
||||
[1] Stopped (tty input) ed bigfile
|
||||
@ -868,7 +868,7 @@ ed bigfile
|
||||
w
|
||||
120000
|
||||
q
|
||||
%
|
||||
%
|
||||
.so tabs
|
||||
.DE
|
||||
So after the `s' command was issued, the `ed' job was stopped with ^Z
|
||||
|
@ -311,7 +311,7 @@ of the shell and some of its control structure follows:
|
||||
# already in ~/backup
|
||||
#
|
||||
set noglob
|
||||
foreach i ($argv)
|
||||
foreach i ($argv)
|
||||
|
||||
if ($i !~ *.c) continue # not a .c file so do nothing
|
||||
|
||||
@ -339,7 +339,7 @@ for each of the values given between `(' and `)' with the named
|
||||
variable, in this case `i' set to successive values in the list.
|
||||
Within this loop we may use the command
|
||||
.I break
|
||||
to stop executing the loop
|
||||
to stop executing the loop
|
||||
and
|
||||
.I continue
|
||||
to prematurely terminate one iteration
|
||||
|
@ -139,7 +139,7 @@ Set the system's value for minutes west of
|
||||
.Tn GMT .
|
||||
.Ar minutes_west
|
||||
specifies the number of minutes returned in
|
||||
.Fa tz_minuteswest
|
||||
.Fa tz_minuteswest
|
||||
by future calls to
|
||||
.Xr gettimeofday 2 .
|
||||
.It Fl u
|
||||
@ -150,7 +150,7 @@ Display or set the date in
|
||||
Adjust (i.e., take the current date and display the result of the
|
||||
adjustment; not actually set the date) the second, minute, hour, month
|
||||
day, week day, month or year according to
|
||||
.Ar val .
|
||||
.Ar val .
|
||||
If
|
||||
.Ar val
|
||||
is preceded with a plus or minus sign,
|
||||
@ -225,7 +225,7 @@ An operand with a leading plus
|
||||
sign signals a user-defined format string
|
||||
which specifies the format in which to display the date and time.
|
||||
The format string may contain any of the conversion specifications
|
||||
described in the
|
||||
described in the
|
||||
.Xr strftime 3
|
||||
manual page, as well as any arbitrary text.
|
||||
A newline
|
||||
|
@ -58,7 +58,7 @@ convenience.
|
||||
.Xr getdomainname 3
|
||||
.Sh HISTORY
|
||||
The
|
||||
.Nm
|
||||
.Nm
|
||||
command appeared in
|
||||
.Fx
|
||||
1.1, based on a similar command in
|
||||
|
14
bin/ed/ed.1
14
bin/ed/ed.1
@ -223,7 +223,7 @@ The next line.
|
||||
This is equivalent to
|
||||
.Em +1
|
||||
and may be repeated with cumulative effect.
|
||||
.It +n
|
||||
.It +n
|
||||
The
|
||||
.Em n Ns th
|
||||
next line, where
|
||||
@ -525,7 +525,7 @@ and
|
||||
.Em V .
|
||||
A newline alone in
|
||||
.Ar command-list
|
||||
is equivalent to a
|
||||
is equivalent to a
|
||||
.Em p
|
||||
command.
|
||||
.It (1,$)G/re/
|
||||
@ -534,7 +534,7 @@ Interactively edit the addressed lines matching a regular expression
|
||||
For each matching line,
|
||||
the line is printed,
|
||||
the current address is set,
|
||||
and the user is prompted to enter a
|
||||
and the user is prompted to enter a
|
||||
.Ar command-list .
|
||||
At the end of the
|
||||
.Em G
|
||||
@ -576,11 +576,11 @@ deleted or otherwise modified.
|
||||
.It (.,.)l
|
||||
Print the addressed lines unambiguously.
|
||||
If a single line fills for than one screen (as might be the case
|
||||
when viewing a binary file, for instance), a `--More--'
|
||||
prompt is printed on the last line.
|
||||
when viewing a binary file, for instance), a `--More--'
|
||||
prompt is printed on the last line.
|
||||
.Nm Ed
|
||||
waits until the RETURN key is pressed
|
||||
before displaying the next screen.
|
||||
before displaying the next screen.
|
||||
The current address is set to the last line
|
||||
printed.
|
||||
.It (.,.)m(.)
|
||||
@ -870,7 +870,7 @@ printed with the
|
||||
.Em h
|
||||
(help) command.
|
||||
.Pp
|
||||
Since the
|
||||
Since the
|
||||
.Em g
|
||||
(global) command masks any errors from failed searches and substitutions,
|
||||
it can be used to perform conditional operations in scripts; e.g.,
|
||||
|
@ -42,7 +42,7 @@
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Nm
|
||||
utility evaluates
|
||||
utility evaluates
|
||||
.Ar expression
|
||||
and writes the result on standard output.
|
||||
.Pp
|
||||
@ -55,8 +55,8 @@ Operators are listed below in order of increasing precedence.
|
||||
Operators with equal precedence are grouped within { } symbols.
|
||||
.Bl -tag -width indent
|
||||
.It Ar expr1 Li | Ar expr2
|
||||
Return the evaluation of
|
||||
.Ar expr1
|
||||
Return the evaluation of
|
||||
.Ar expr1
|
||||
if it is neither an empty string nor zero;
|
||||
otherwise, returns the evaluation of
|
||||
.Ar expr2 .
|
||||
@ -66,7 +66,7 @@ Return the evaluation of
|
||||
if neither expression evaluates to an empty string or zero;
|
||||
otherwise, returns zero.
|
||||
.It Ar expr1 Li "{=, >, >=, <, <=, !=}" Ar expr2
|
||||
Return the results of integer comparison if both arguments are integers;
|
||||
Return the results of integer comparison if both arguments are integers;
|
||||
otherwise, returns the results of string comparison using the locale-specific
|
||||
collation sequence.
|
||||
The result of each comparison is 1 if the specified relation is true,
|
||||
@ -76,23 +76,23 @@ Return the results of addition or subtraction of integer-valued arguments.
|
||||
.It Ar expr1 Li "{*, /, %}" Ar expr2
|
||||
Return the results of multiplication, integer division, or remainder of integer-valued arguments.
|
||||
.It Ar expr1 Li : Ar expr2
|
||||
The
|
||||
The
|
||||
.Dq \&:
|
||||
operator matches
|
||||
.Ar expr1
|
||||
against
|
||||
operator matches
|
||||
.Ar expr1
|
||||
against
|
||||
.Ar expr2 ,
|
||||
which must be a regular expression. The regular expression is anchored
|
||||
to the beginning of the string with an implicit
|
||||
to the beginning of the string with an implicit
|
||||
.Dq ^ .
|
||||
.Pp
|
||||
If the match succeeds and the pattern contains at least one regular
|
||||
expression subexpression
|
||||
.Dq "\e(...\e)" ,
|
||||
the string corresponding to
|
||||
expression subexpression
|
||||
.Dq "\e(...\e)" ,
|
||||
the string corresponding to
|
||||
.Dq "\e1"
|
||||
is returned;
|
||||
otherwise the matching operator returns the number of characters matched.
|
||||
otherwise the matching operator returns the number of characters matched.
|
||||
If the match fails and the pattern contains a regular expression subexpression
|
||||
the null string is returned;
|
||||
otherwise 0.
|
||||
@ -101,7 +101,7 @@ otherwise 0.
|
||||
Parentheses are used for grouping in the usual manner.
|
||||
.Sh EXAMPLES
|
||||
.Bl -enum
|
||||
.It
|
||||
.It
|
||||
The following example adds one to the variable a.
|
||||
.Dl a=`expr $a + 1`
|
||||
.It
|
||||
|
@ -62,7 +62,7 @@ Trim off any domain information from the printed
|
||||
name.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr gethostname 3 ,
|
||||
.Xr gethostname 3 ,
|
||||
.Xr rc.conf 5
|
||||
.Sh HISTORY
|
||||
The
|
||||
|
@ -92,7 +92,7 @@ Cause
|
||||
.Nm
|
||||
to write a prompt to standard error if the target file exists.
|
||||
If the response from the standard input begins with the character
|
||||
.Sq Li y
|
||||
.Sq Li y
|
||||
or
|
||||
.Sq Li Y ,
|
||||
then unlink the target file so that the link may occur.
|
||||
@ -177,7 +177,7 @@ operation using the two passed arguments.
|
||||
.Xr symlink 2 ,
|
||||
.Xr symlink 7
|
||||
.Sh COMPATIBILITY
|
||||
The
|
||||
The
|
||||
.Fl h ,
|
||||
.Fl i ,
|
||||
.Fl n
|
||||
|
@ -149,7 +149,7 @@ name arguments, to commands which are not traversing a file tree.
|
||||
.Pp
|
||||
Except as noted below, commands follow symbolic links named as command
|
||||
line arguments.
|
||||
For example, if there were a symbolic link
|
||||
For example, if there were a symbolic link
|
||||
.Dq Li slink
|
||||
which pointed to a file named
|
||||
.Dq Li afile ,
|
||||
@ -230,7 +230,7 @@ command is also an exception to this rule.
|
||||
The
|
||||
.Xr file 1
|
||||
command does not follow symbolic links named as argument by default.
|
||||
The
|
||||
The
|
||||
.Xr file 1
|
||||
command does follow symbolic links named as argument if
|
||||
.Fl L
|
||||
@ -303,7 +303,7 @@ walk (where symbolic links referencing directories are followed).
|
||||
As consistently as possible, you can make commands doing a file tree
|
||||
walk follow any symbolic links named on the command line, regardless
|
||||
of the type of file they reference, by specifying the
|
||||
.Fl H
|
||||
.Fl H
|
||||
(for
|
||||
.Dq half\-logical )
|
||||
flag.
|
||||
|
@ -126,7 +126,7 @@ Display whiteouts when scanning directories.
|
||||
Include directory entries whose names begin with a
|
||||
dot (.).
|
||||
.It Fl b
|
||||
As
|
||||
As
|
||||
.Fl B ,
|
||||
but use C escape codes whenever possible.
|
||||
.It Fl c
|
||||
@ -137,7 +137,7 @@ Directories are listed as plain files (not searched recursively).
|
||||
Output is not sorted.
|
||||
.It Fl g
|
||||
This option is deprecated and is only available for compatibility
|
||||
with
|
||||
with
|
||||
.Bx 4.3 ;
|
||||
it was used to display the group name in the long
|
||||
.Pq Fl l
|
||||
@ -145,7 +145,7 @@ format output.
|
||||
.It Fl i
|
||||
For each file, print the file's file serial number (inode number).
|
||||
.It Fl k
|
||||
If the
|
||||
If the
|
||||
.Fl s
|
||||
option is specified, print the file size allocation in kilobytes,
|
||||
not blocks. This option overrides the environment variable BLOCKSIZE.
|
||||
|
@ -88,7 +88,7 @@ Cause
|
||||
to write a prompt to standard error before moving a file that would
|
||||
overwrite an existing file.
|
||||
If the response from the standard input begins with the character
|
||||
.Sq Li y
|
||||
.Sq Li y
|
||||
or
|
||||
.Sq Li Y ,
|
||||
the move is attempted.
|
||||
|
@ -182,7 +182,7 @@
|
||||
.Nm Pax
|
||||
will read, write, and list the members of an archive file,
|
||||
and will copy directory hierarchies.
|
||||
.Nm Pax
|
||||
.Nm Pax
|
||||
operation is independent of the specific archive format,
|
||||
and supports a wide variety of different archive formats.
|
||||
A list of supported archive formats can be found under the description of the
|
||||
@ -216,7 +216,7 @@ and is written using single line buffering.
|
||||
.Nm Pax
|
||||
extracts the members of the archive file read from the
|
||||
.Dv standard input ,
|
||||
with pathnames matching the specified
|
||||
with pathnames matching the specified
|
||||
.Ar patterns .
|
||||
The archive format and blocking is automatically determined on input.
|
||||
When an extracted file is a directory, the entire file hierarchy
|
||||
@ -229,16 +229,16 @@ option.
|
||||
.It Fl w
|
||||
.Em Write .
|
||||
.Nm Pax
|
||||
writes an archive containing the
|
||||
writes an archive containing the
|
||||
.Ar file
|
||||
operands to
|
||||
.Dv standard output
|
||||
using the specified archive format.
|
||||
When no
|
||||
When no
|
||||
.Ar file
|
||||
operands are specified, a list of files to copy with one per line is read from
|
||||
operands are specified, a list of files to copy with one per line is read from
|
||||
.Dv standard input .
|
||||
When a
|
||||
When a
|
||||
.Ar file
|
||||
operand is also a directory, the entire file hierarchy rooted
|
||||
at that directory will be included.
|
||||
@ -249,7 +249,7 @@ copies the
|
||||
.Ar file
|
||||
operands to the destination
|
||||
.Ar directory .
|
||||
When no
|
||||
When no
|
||||
.Ar file
|
||||
operands are specified, a list of files to copy with one per line is read from
|
||||
the
|
||||
@ -306,10 +306,10 @@ operand is used to select one or more pathnames of archive members.
|
||||
Archive members are selected using the pattern matching notation described
|
||||
by
|
||||
.Xr fnmatch 3 .
|
||||
When the
|
||||
When the
|
||||
.Ar pattern
|
||||
operand is not supplied, all members of the archive will be selected.
|
||||
When a
|
||||
When a
|
||||
.Ar pattern
|
||||
matches a directory, the entire file hierarchy rooted at that directory will
|
||||
be selected.
|
||||
@ -347,11 +347,11 @@ If any intermediate directories are needed in order to extract an archive
|
||||
member, these directories will be created as if
|
||||
.Xr mkdir 2
|
||||
was called with the bitwise inclusive
|
||||
.Dv OR
|
||||
.Dv OR
|
||||
of
|
||||
.Dv S_IRWXU , S_IRWXG ,
|
||||
and
|
||||
.Dv S_IRWXO
|
||||
.Dv S_IRWXO
|
||||
as the mode argument.
|
||||
When the selected archive format supports the specification of linked
|
||||
files and these files cannot be linked while the archive is being extracted,
|
||||
@ -378,7 +378,7 @@ If an archive format is not specified with a
|
||||
.Fl x
|
||||
option, the format currently being used in the archive will be selected.
|
||||
Any attempt to append to an archive in a format different from the
|
||||
format already used in the archive will cause
|
||||
format already used in the archive will cause
|
||||
.Nm
|
||||
to exit immediately
|
||||
with a non-zero exit status.
|
||||
@ -419,7 +419,7 @@ can be separated by
|
||||
to indicate a product.
|
||||
A specific archive device may impose additional restrictions on the size
|
||||
of blocking it will support.
|
||||
When blocking is not specified, the default
|
||||
When blocking is not specified, the default
|
||||
.Ar blocksize
|
||||
is dependent on the specific archive format being used (see the
|
||||
.Fl x
|
||||
@ -473,7 +473,7 @@ If this line consists of a single period, the
|
||||
file or archive member is processed with no modification to its name.
|
||||
Otherwise, its name is replaced with the contents of the line.
|
||||
.Nm Pax
|
||||
will immediately exit with a non-zero exit status if
|
||||
will immediately exit with a non-zero exit status if
|
||||
.Dv <EOF>
|
||||
is encountered when reading a response or if
|
||||
.Pa /dev/tty
|
||||
@ -498,7 +498,7 @@ No more than one archive member is matched for each
|
||||
.Ar pattern .
|
||||
When members of type directory are matched, the file hierarchy rooted at that
|
||||
directory is also matched (unless
|
||||
.Fl d
|
||||
.Fl d
|
||||
is also specified).
|
||||
.It Fl o Ar options
|
||||
Information to modify the algorithm for extracting or writing archive files
|
||||
@ -520,7 +520,7 @@ and
|
||||
.Cm p .
|
||||
Multiple characteristics can be concatenated within the same string
|
||||
and multiple
|
||||
.Fl p
|
||||
.Fl p
|
||||
options can be specified.
|
||||
The meaning of the specification characters are as follows:
|
||||
.Bl -tag -width 2n
|
||||
@ -535,10 +535,10 @@ This is intended to be used by
|
||||
.Em root ,
|
||||
someone with all the appropriate privileges, in order to preserve all
|
||||
aspects of the files as they are recorded in the archive.
|
||||
The
|
||||
The
|
||||
.Cm e
|
||||
flag is the sum of the
|
||||
.Cm o
|
||||
.Cm o
|
||||
and
|
||||
.Cm p
|
||||
flags.
|
||||
@ -551,7 +551,7 @@ Preserve the user ID and group ID.
|
||||
.Sq Preserve
|
||||
the file mode bits.
|
||||
This intended to be used by a
|
||||
.Em user
|
||||
.Em user
|
||||
with regular privileges who wants to preserve all aspects of the file other
|
||||
than the ownership.
|
||||
The file times are preserved by default, but two other flags are offered to
|
||||
@ -565,7 +565,7 @@ extracted file, subject to the permissions of the invoking
|
||||
process.
|
||||
Otherwise the attribute of the extracted file is determined as
|
||||
part of the normal file creation action.
|
||||
If neither the
|
||||
If neither the
|
||||
.Cm e
|
||||
nor the
|
||||
.Cm o
|
||||
@ -573,7 +573,7 @@ specification character is specified, or the user ID and group ID are not
|
||||
preserved for any reason,
|
||||
.Nm
|
||||
will not set the
|
||||
.Dv S_ISUID
|
||||
.Dv S_ISUID
|
||||
.Em ( setuid )
|
||||
and
|
||||
.Dv S_ISGID
|
||||
@ -671,7 +671,7 @@ the output has the format:
|
||||
.Dl <ls -l listing> == <link name>
|
||||
For pathnames representing a symbolic link, the output has the format:
|
||||
.Dl <ls -l listing> => <link name>
|
||||
Where <ls -l listing> is the output format specified by the
|
||||
Where <ls -l listing> is the output format specified by the
|
||||
.Xr ls 1
|
||||
utility when used with the
|
||||
.Fl l
|
||||
@ -783,7 +783,7 @@ to indicate a product.
|
||||
.Em Warning :
|
||||
Only use this option when writing an archive to a device which supports
|
||||
an end of file read condition based on last (or largest) write offset
|
||||
(such as a regular file or a tape drive).
|
||||
(such as a regular file or a tape drive).
|
||||
The use of this option with a floppy or hard disk is not recommended.
|
||||
.It Fl D
|
||||
This option is the same as the
|
||||
@ -814,7 +814,7 @@ of
|
||||
will cause
|
||||
.Nm
|
||||
to attempt to recover from read errors forever.
|
||||
The default
|
||||
The default
|
||||
.Ar limit
|
||||
is a small positive number of retries.
|
||||
.Pp
|
||||
@ -832,7 +832,7 @@ name, or when starting with a
|
||||
a numeric gid.
|
||||
A '\\' can be used to escape the
|
||||
.Cm # .
|
||||
Multiple
|
||||
Multiple
|
||||
.Fl G
|
||||
options may be supplied and checking stops with the first match.
|
||||
.It Fl H
|
||||
@ -845,12 +845,12 @@ Do not follow symbolic links, perform a physical file system traversal.
|
||||
This is the default mode.
|
||||
.It Fl T Ar [from_date][,to_date][/[c][m]]
|
||||
Allow files to be selected based on a file modification or inode change
|
||||
time falling within a specified time range of
|
||||
time falling within a specified time range of
|
||||
.Ar from_date
|
||||
to
|
||||
.Ar to_date
|
||||
(the dates are inclusive).
|
||||
If only a
|
||||
If only a
|
||||
.Ar from_date
|
||||
is supplied, all files with a modification or inode change time
|
||||
equal to or younger are selected.
|
||||
@ -858,7 +858,7 @@ If only a
|
||||
.Ar to_date
|
||||
is supplied, all files with a modification or inode change time
|
||||
equal to or older will be selected.
|
||||
When the
|
||||
When the
|
||||
.Ar from_date
|
||||
is equal to the
|
||||
.Ar to_date ,
|
||||
@ -867,7 +867,7 @@ time will be selected.
|
||||
.Pp
|
||||
When
|
||||
.Nm
|
||||
is in the
|
||||
is in the
|
||||
.Em write
|
||||
or
|
||||
.Em copy
|
||||
@ -884,7 +884,7 @@ The
|
||||
.Ar c
|
||||
specifies the comparison of inode change time (the time when the file
|
||||
inode was last changed; e.g. a change of owner, group, mode, etc).
|
||||
When
|
||||
When
|
||||
.Ar c
|
||||
and
|
||||
.Ar m
|
||||
@ -925,14 +925,14 @@ The minute field
|
||||
is required, while the other fields are optional and must be added in the
|
||||
following order:
|
||||
.Dl Cm hh , dd , mm , yy .
|
||||
The
|
||||
The
|
||||
.Cm ss
|
||||
field may be added independently of the other fields.
|
||||
Time ranges are relative to the current time, so
|
||||
.Dl Fl T Ar 1234/cm
|
||||
would select all files with a modification or inode change time
|
||||
of 12:34 PM today or later.
|
||||
Multiple
|
||||
Multiple
|
||||
.Fl T
|
||||
time range can be supplied and checking stops with the first match.
|
||||
.It Fl U Ar user
|
||||
@ -943,14 +943,14 @@ name, or when starting with a
|
||||
a numeric uid.
|
||||
A '\\' can be used to escape the
|
||||
.Cm # .
|
||||
Multiple
|
||||
Multiple
|
||||
.Fl U
|
||||
options may be supplied and checking stops with the first match.
|
||||
.It Fl X
|
||||
When traversing the file hierarchy specified by a pathname,
|
||||
do not descend into directories that have a different device ID.
|
||||
See the
|
||||
.Li st_dev
|
||||
.Li st_dev
|
||||
field as described in
|
||||
.Xr stat 2
|
||||
for more information about device ID's.
|
||||
@ -1005,7 +1005,7 @@ Then the
|
||||
and
|
||||
.Fl Z
|
||||
options will be applied based on the final pathname.
|
||||
Finally the
|
||||
Finally the
|
||||
.Fl v
|
||||
option will write the names resulting from these modifications.
|
||||
.Pp
|
||||
@ -1021,13 +1021,13 @@ based only on the user specified pathnames as modified by the
|
||||
.Fl D ,
|
||||
.Fl G ,
|
||||
.Fl T ,
|
||||
and
|
||||
and
|
||||
.Fl U
|
||||
options (the
|
||||
.Fl D
|
||||
option only applies during a copy operation).
|
||||
Then any
|
||||
.Fl s
|
||||
.Fl s
|
||||
and
|
||||
.Fl i
|
||||
options will modify in that order, the names of these selected files.
|
||||
@ -1072,7 +1072,7 @@ directory hierarchy to
|
||||
.Pp
|
||||
The command:
|
||||
.Dl pax -r -s ',^//*usr//*,,' -f a.pax
|
||||
reads the archive
|
||||
reads the archive
|
||||
.Pa a.pax ,
|
||||
with all files rooted in ``/usr'' into the archive extracted relative to the
|
||||
current directory.
|
||||
@ -1148,7 +1148,7 @@ will exit with one of the following values:
|
||||
.Bl -tag -width 2n
|
||||
.It 0
|
||||
All files were processed successfully.
|
||||
.It 1
|
||||
.It 1
|
||||
An error occurred.
|
||||
.El
|
||||
.Pp
|
||||
|
10
bin/rm/rm.1
10
bin/rm/rm.1
@ -69,7 +69,7 @@ the exit status to reflect an error.
|
||||
The
|
||||
.Fl f
|
||||
option overrides any previous
|
||||
.Fl i
|
||||
.Fl i
|
||||
options.
|
||||
.It Fl i
|
||||
Request confirmation before attempting to remove each file, regardless of
|
||||
@ -78,7 +78,7 @@ terminal.
|
||||
The
|
||||
.Fl i
|
||||
option overrides any previous
|
||||
.Fl f
|
||||
.Fl f
|
||||
options.
|
||||
.It Fl P
|
||||
Overwrite regular files before deleting them.
|
||||
@ -86,14 +86,14 @@ Files are overwritten three times, first with the byte pattern 0xff,
|
||||
then 0x00, and then 0xff again, before they are deleted.
|
||||
.It Fl R
|
||||
Attempt to remove the file hierarchy rooted in each file argument.
|
||||
The
|
||||
The
|
||||
.Fl R
|
||||
option implies the
|
||||
.Fl d
|
||||
option.
|
||||
If the
|
||||
.Fl i
|
||||
option is specified, the user is prompted for confirmation before
|
||||
option is specified, the user is prompted for confirmation before
|
||||
each directory's contents are processed (as well as before the attempt
|
||||
is made to remove the directory).
|
||||
If the user does not respond affirmatively, the file hierarchy rooted in
|
||||
@ -179,7 +179,7 @@ utility differs from historical implementations in that the
|
||||
.Fl f
|
||||
option only masks attempts to remove non-existent files instead of
|
||||
masking a large variety of errors.
|
||||
The
|
||||
The
|
||||
.Fl v
|
||||
option is non-standard and its use in scripts is not recommended.
|
||||
.Pp
|
||||
|
@ -45,7 +45,7 @@
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl n | Fl e
|
||||
.Ar args...
|
||||
.Ar args...
|
||||
.Sh DESCRIPTION
|
||||
.Nm
|
||||
prints its arguments on the standard output, separated by spaces.
|
||||
|
@ -113,7 +113,7 @@ is a named pipe
|
||||
.Po Tn FIFO Pc .
|
||||
.It Fl r Ar file
|
||||
True if
|
||||
.Ar file
|
||||
.Ar file
|
||||
exists and is readable.
|
||||
.It Fl s Ar file
|
||||
True if
|
||||
@ -154,7 +154,7 @@ True if the length of
|
||||
.Ar string
|
||||
is zero.
|
||||
.It Fl L Ar file
|
||||
True if
|
||||
True if
|
||||
.Ar file
|
||||
exists and is a symbolic link.
|
||||
.It Fl O Ar file
|
||||
@ -219,7 +219,7 @@ True if
|
||||
.Ar \&s\&1
|
||||
is not the null
|
||||
string.
|
||||
.It Ar \&n\&1 Fl \&eq Ar \&n\&2
|
||||
.It Ar \&n\&1 Fl \&eq Ar \&n\&2
|
||||
True if the integers
|
||||
.Ar \&n\&1
|
||||
and
|
||||
@ -287,11 +287,11 @@ operator has higher precedence than the
|
||||
.Fl o
|
||||
operator.
|
||||
.Sh GRAMMAR AMBIGUITY
|
||||
The
|
||||
The
|
||||
.Nm
|
||||
grammar is inherently ambiguous. In order to assure a degree of consistency,
|
||||
the cases described in the
|
||||
.St -p1003.2 ,
|
||||
the cases described in the
|
||||
.St -p1003.2 ,
|
||||
section D11.2/4.62.4, standard
|
||||
are evaluated consistently according to the rules specified in the
|
||||
standards document. All other cases are subject to the ambiguity in the
|
||||
|
@ -44,7 +44,7 @@
|
||||
.in +\\n(I\\n(IRu
|
||||
.ti -\\n(I\\n(IRu
|
||||
..
|
||||
.\" Copyright (c) 1986 Ed James. All rights reserved.
|
||||
.\" Copyright (c) 1986 Ed James. All rights reserved.
|
||||
.\"
|
||||
.TH ATC 6 "May 31, 1993"
|
||||
.UC
|
||||
@ -85,14 +85,14 @@ Same as
|
||||
.B \-s.
|
||||
.TP
|
||||
.B \-p
|
||||
Print the path to the special directory where
|
||||
Print the path to the special directory where
|
||||
.I atc
|
||||
expects to find its private files. This is used during the
|
||||
installation of the program.
|
||||
.TP
|
||||
.B "\-g game"
|
||||
Play the named game. If the game listed is not one of the
|
||||
ones printed from the
|
||||
ones printed from the
|
||||
.B \-l
|
||||
option, the default game is played.
|
||||
.TP
|
||||
@ -104,37 +104,37 @@ Same as
|
||||
Set the random seed. The purpose of this flag is questionable.
|
||||
.SH GOALS
|
||||
.LP
|
||||
Your goal in
|
||||
Your goal in
|
||||
.I atc
|
||||
is to keep the game going as long as possible.
|
||||
is to keep the game going as long as possible.
|
||||
There is no winning state, except to beat the times of other players.
|
||||
You will need to: launch planes at airports (by instructing them to
|
||||
increase their altitude); land planes at airports (by instructing them to
|
||||
go to altitude zero when exactly over the airport); and maneuver planes
|
||||
out of exit points.
|
||||
out of exit points.
|
||||
.LP
|
||||
Several things will cause the end of the game.
|
||||
Each plane has a destination (see information area), and
|
||||
Each plane has a destination (see information area), and
|
||||
sending a plane to the wrong destination is an error.
|
||||
Planes can run out of fuel, or can collide. Collision is defined as
|
||||
adjacency in any of the three dimensions. A plane leaving the arena
|
||||
in any other way than through its destination exit is an error as well.
|
||||
.LP
|
||||
Scores are sorted in order of the number of planes safe. The other
|
||||
statistics are provided merely for fun. There is no penalty for
|
||||
statistics are provided merely for fun. There is no penalty for
|
||||
taking longer than another player (except in the case of ties).
|
||||
.LP
|
||||
Suspending a game is not permitted. If you get a talk message, tough.
|
||||
When was the last time an Air Traffic Controller got called away to
|
||||
the phone?
|
||||
the phone?
|
||||
.SH "THE DISPLAY"
|
||||
.LP
|
||||
Depending on the terminal you run
|
||||
Depending on the terminal you run
|
||||
.I atc
|
||||
on, the screen will be divided into 4 areas.
|
||||
on, the screen will be divided into 4 areas.
|
||||
It should be stressed that the terminal driver portion of the
|
||||
game was designed to be reconfigurable, so the display format can vary
|
||||
depending the version you are playing. The descriptions here are based
|
||||
depending the version you are playing. The descriptions here are based
|
||||
on the ASCII version
|
||||
of the game. The game rules and input format, however,
|
||||
should remain consistent.
|
||||
@ -144,7 +144,7 @@ Control-L redraws the screen, should it become muddled.
|
||||
The first screen area is the radar display, showing the relative locations
|
||||
of the planes, airports, standard entry/exit points, radar
|
||||
beacons, and "lines" which simply serve to aid you in guiding
|
||||
the planes.
|
||||
the planes.
|
||||
.IP
|
||||
Planes are shown as a single letter with an altitude. If
|
||||
the numerical altitude is a single digit, then it represents
|
||||
@ -154,7 +154,7 @@ planes and the jets. On ASCII terminals, prop planes are
|
||||
represented by a upper case letter, jets by a lower case letter.
|
||||
.IP
|
||||
Airports are shown as a number and some indication of the direction
|
||||
planes must be going to land at the airport.
|
||||
planes must be going to land at the airport.
|
||||
On ASCII terminals, this is one of '^', '>', '<', and 'v', to indicate
|
||||
north (0 degrees), east (90), west (270) and south (180), respectively.
|
||||
The planes will also
|
||||
@ -164,9 +164,9 @@ Beacons are represented as circles or asterisks and a number.
|
||||
Their purpose is to offer a place of easy reference to the plane pilots.
|
||||
See 'the delay command' under the input section of this manual.
|
||||
.IP
|
||||
Entry/exit points are displayed as numbers along the border of the
|
||||
Entry/exit points are displayed as numbers along the border of the
|
||||
radar screen. Planes will enter the arena from these points without
|
||||
warning. These points have a direction associated with them, and
|
||||
warning. These points have a direction associated with them, and
|
||||
planes will always enter the arena from this direction. On the
|
||||
ASCII version of
|
||||
.I atc,
|
||||
@ -174,7 +174,7 @@ this direction is not displayed. It will become apparent
|
||||
what this direction is as the game progresses.
|
||||
.IP
|
||||
Incoming planes will always enter at the same altitude: 7000 feet.
|
||||
For a plane to successfully depart through an entry/exit point,
|
||||
For a plane to successfully depart through an entry/exit point,
|
||||
it must be flying at 9000 feet.
|
||||
It is not necessary for the planes to be flying in any particular
|
||||
direction when they leave the arena (yet).
|
||||
@ -183,12 +183,12 @@ direction when they leave the arena (yet).
|
||||
The second area of the display is the information area, which lists
|
||||
the time (number of updates since start), and the number of planes you
|
||||
have directed safely out of the arena.
|
||||
Below this is a list of planes currently in the air, followed by a
|
||||
Below this is a list of planes currently in the air, followed by a
|
||||
blank line, and then a list of planes on the ground (at airports).
|
||||
Each line lists the plane name and its current altitude,
|
||||
Each line lists the plane name and its current altitude,
|
||||
an optional asterisk indicating low fuel, the plane's destination,
|
||||
and the plane's current command. Changing altitude is not considered
|
||||
to be a command and is therefore not displayed. The following are
|
||||
to be a command and is therefore not displayed. The following are
|
||||
some possible information lines:
|
||||
.IP
|
||||
B4*A0: Circle @ b1
|
||||
@ -200,11 +200,11 @@ feet. It is low on fuel (note the '*'). It's destination is
|
||||
Airport #0.
|
||||
The next command it expects
|
||||
to do is circle when it reaches Beacon #1.
|
||||
The second example shows a jet named 'g' at 7000 feet, destined for
|
||||
The second example shows a jet named 'g' at 7000 feet, destined for
|
||||
Exit #4. It is just now executing a turn to 225 degrees (South-West).
|
||||
.SS "INPUT AREA"
|
||||
.IP
|
||||
The third area of the display is the input area. It is here that
|
||||
The third area of the display is the input area. It is here that
|
||||
your input is reflected. See the INPUT heading of this manual
|
||||
for more details.
|
||||
.SS "AUTHOR AREA"
|
||||
@ -215,7 +215,7 @@ This area is used simply to give credit where credit is due. :-)
|
||||
A command completion interface is built into
|
||||
the game. At any time, typing '?' will list possible input characters.
|
||||
Typing a backspace (your erase character) backs up, erasing the last part
|
||||
of the command. When a command is complete, a return enters it, and
|
||||
of the command. When a command is complete, a return enters it, and
|
||||
any semantic checking is done at that time. If no errors are detected,
|
||||
the command is sent to the appropriate plane. If an error is discovered
|
||||
during the check, the offending statement will be underscored and a
|
||||
@ -223,25 +223,25 @@ during the check, the offending statement will be underscored and a
|
||||
.LP
|
||||
The command syntax is broken into two parts:
|
||||
.I "Immediate Only"
|
||||
and
|
||||
and
|
||||
.I Delayable
|
||||
commands.
|
||||
.I "Immediate Only"
|
||||
commands happen on the next
|
||||
update.
|
||||
update.
|
||||
.I Delayable
|
||||
commands also happen on the next update unless they
|
||||
are followed by an optional predicate called the
|
||||
.I Delay
|
||||
are followed by an optional predicate called the
|
||||
.I Delay
|
||||
command.
|
||||
.LP
|
||||
In the following tables, the syntax
|
||||
In the following tables, the syntax
|
||||
.B [0\-9]
|
||||
means any single digit, and
|
||||
means any single digit, and
|
||||
.B <dir>
|
||||
refers to the keys around the 's' key, namely ``wedcxzaq''.
|
||||
In absolute references, 'q' refers to North-West or 315 degrees, and 'w'
|
||||
refers to North, or 0 degrees.
|
||||
refers to North, or 0 degrees.
|
||||
In relative references, 'q' refers to -45 degrees or 45 degrees left, and 'w'
|
||||
refers to 0 degrees, or no change in direction.
|
||||
.LP
|
||||
@ -290,7 +290,7 @@ line of dashes if there is no command.
|
||||
.RE
|
||||
.B "\- u Unmark:"
|
||||
.RS
|
||||
Same as ignore, but if a delayed command is processed,
|
||||
Same as ignore, but if a delayed command is processed,
|
||||
the plane will become marked. This is useful if you want
|
||||
to forget about a plane during part, but not all, of its
|
||||
journey.
|
||||
@ -383,11 +383,11 @@ The airport number.
|
||||
.RE
|
||||
.SS THE DELAY COMMAND
|
||||
.LP
|
||||
The
|
||||
The
|
||||
.B Delay
|
||||
(a/@)
|
||||
command may be appended to any
|
||||
.B Delayable
|
||||
command may be appended to any
|
||||
.B Delayable
|
||||
command. It allows the controller to instruct a plane to do an action
|
||||
when the plane reaches a particular beacon (or other objects in future
|
||||
versions).
|
||||
@ -412,10 +412,10 @@ The beacon number.
|
||||
.RE
|
||||
.SS "MARKING, UNMARKING AND IGNORING"
|
||||
.LP
|
||||
Planes are
|
||||
Planes are
|
||||
.B marked
|
||||
when they enter the arena. This means they are displayed in highlighted
|
||||
mode on the radar display. A plane may also be either
|
||||
mode on the radar display. A plane may also be either
|
||||
.B unmarked
|
||||
or
|
||||
.B ignored.
|
||||
@ -425,18 +425,18 @@ plane is drawn in unhighlighted mode, and a line of dashes is displayed in
|
||||
the command field of the information area. The plane will remain this
|
||||
way until a mark command has been issued. Any other command will be issued,
|
||||
but the command line will return to a line of dashes when the command
|
||||
is completed.
|
||||
is completed.
|
||||
.LP
|
||||
An
|
||||
.B ignored
|
||||
plane is treated the same as an unmarked plane, except that it will
|
||||
automatically switch to
|
||||
automatically switch to
|
||||
.B marked
|
||||
status when a delayed command has been processed. This is useful if
|
||||
you want to forget about a plane for a while, but its flight path has
|
||||
not yet been completely set.
|
||||
.LP
|
||||
As with all of the commands, marking, unmarking and ignoring will take effect
|
||||
As with all of the commands, marking, unmarking and ignoring will take effect
|
||||
at the beginning of the next update. Do not be surprised if the plane does
|
||||
not immediately switch to unhighlighted mode.
|
||||
.SS EXAMPLES
|
||||
@ -473,7 +473,7 @@ Planes flying at an altitude of 0 crash if they are not over an airport.
|
||||
Planes waiting at airports can only be told to take off (climb in altitude).
|
||||
.SH "NEW GAMES"
|
||||
.LP
|
||||
The
|
||||
The
|
||||
.B Game_List
|
||||
file lists the currently available play fields. New field description
|
||||
file names must be placed in this file to be 'playable'. If a player
|
||||
@ -485,7 +485,7 @@ must be set. These variables are set with the syntax:
|
||||
.IP
|
||||
variable = number;
|
||||
.LP
|
||||
Variable may be one of:
|
||||
Variable may be one of:
|
||||
.B update,
|
||||
indicating the number of seconds between forced updates;
|
||||
.B newplane,
|
||||
@ -509,7 +509,7 @@ line: [ (x1 y1) (x2 y2) ] ... ;
|
||||
.LP
|
||||
For beacons, a simple x, y coordinate pair is used (enclosed in parenthesis).
|
||||
Airports and exits require a third value, a direction, which is one
|
||||
of
|
||||
of
|
||||
.B wedcxzaq.
|
||||
For airports, this is the direction that planes must be going to take
|
||||
off and land, and for exits, this is the direction that planes will going
|
||||
@ -518,7 +518,7 @@ when they
|
||||
the arena. This may not seem intuitive, but as there is no restriction on
|
||||
direction of exit, this is appropriate.
|
||||
Lines are slightly different, since they need two coordinate pairs to
|
||||
specify the line endpoints. These endpoints must be enclosed in
|
||||
specify the line endpoints. These endpoints must be enclosed in
|
||||
square brackets.
|
||||
.LP
|
||||
All statements are semi-colon (;) terminated. Multiple item statements
|
||||
@ -528,8 +528,8 @@ and terminate with a newline.
|
||||
The coordinates are between zero and width-1 and height-1
|
||||
inclusive. All of the exit coordinates must lie on the borders, and
|
||||
all of the beacons and airports must lie inside of the borders.
|
||||
Line endpoints may be anywhere within the field, so long as
|
||||
the lines are horizontal, vertical or
|
||||
Line endpoints may be anywhere within the field, so long as
|
||||
the lines are horizontal, vertical or
|
||||
.B "exactly diagonal."
|
||||
.SS "FIELD FILE EXAMPLE"
|
||||
.RS
|
||||
@ -564,7 +564,7 @@ line: [ ( 1 1 ) ( 6 6 ) ]
|
||||
.RE
|
||||
.SH FILES
|
||||
.LP
|
||||
Files are kept in a special directory. See the OPTIONS for a way to
|
||||
Files are kept in a special directory. See the OPTIONS for a way to
|
||||
print this path out.
|
||||
.TP \w'/usr/share/games/atc/Game_List\ \ \ 'u
|
||||
/var/games/atc_score
|
||||
@ -583,7 +583,7 @@ of a game written for some unknown PC many years ago, maybe.
|
||||
The screen sometimes refreshes after you have quit.
|
||||
.LP
|
||||
Yet Another Curses Bug was discovered during the development of this game.
|
||||
If your curses library clrtobot.o is version 5.1 or earlier,
|
||||
If your curses library clrtobot.o is version 5.1 or earlier,
|
||||
you will have erase problems with the backspace operator in the input
|
||||
window.
|
||||
|
||||
|
@ -61,7 +61,7 @@ heavens...
|
||||
One to bring good luck and simple feats of wonder,
|
||||
Two to wash the lands and churn the waves asunder,
|
||||
Three to rule the world and purge the skies with thunder.
|
||||
|
||||
|
||||
.fi
|
||||
.PP
|
||||
In those times great wizards were known and their powers were beyond
|
||||
@ -90,7 +90,7 @@ fleet of battlestars was reduced to a single ship.
|
||||
throw <object> <direction>
|
||||
|
||||
! <shell esc>
|
||||
|
||||
|
||||
.fi
|
||||
.SH "IMPLIED OBJECTS"
|
||||
.nf
|
||||
@ -117,7 +117,7 @@ fleet of battlestars was reduced to a single ship.
|
||||
>-: get
|
||||
knife:
|
||||
Taken.
|
||||
|
||||
|
||||
.fi
|
||||
.PP
|
||||
Notice that the "shadow" of the next word stays around if you
|
||||
@ -144,7 +144,7 @@ always printed in R, L, A, & B relative directions.
|
||||
I wrote Battlestar in 1979 in order to experiment with the niceties of
|
||||
the C Language.
|
||||
Most interesting things that happen in the game are hardwired into the
|
||||
code, so don't
|
||||
code, so don't
|
||||
send me any hate mail about it! Instead, enjoy art for art's sake!
|
||||
.SH AUTHOR
|
||||
David Riggle
|
||||
|
@ -45,7 +45,7 @@ If you have never played solitaire before, it is recommended
|
||||
that you consult a solitaire instruction book. In
|
||||
Canfield, tableau cards may be built on each other downward
|
||||
in alternate colors. An entire pile must be moved as a unit
|
||||
in building. Top cards of the piles are available
|
||||
in building. Top cards of the piles are available
|
||||
to be played on foundations, but never into empty spaces.
|
||||
.PP
|
||||
Spaces must be filled from the stock. The top card of
|
||||
@ -64,8 +64,8 @@ available.
|
||||
The command 'c' causes
|
||||
.I canfield
|
||||
to maintain card counting statistics
|
||||
on the bottom of the screen.
|
||||
When properly used this can greatly increase one's chances of
|
||||
on the bottom of the screen.
|
||||
When properly used this can greatly increase one's chances of
|
||||
winning.
|
||||
.PP
|
||||
The rules for betting are somewhat less strict than
|
||||
@ -114,5 +114,5 @@ It is impossible to cheat.
|
||||
.SH AUTHORS
|
||||
Originally written: Steve Levine
|
||||
.br
|
||||
Further random hacking by: Steve Feldman, Kirk McKusick,
|
||||
Further random hacking by: Steve Feldman, Kirk McKusick,
|
||||
Mikey Olson, and Eric Allman.
|
||||
|
@ -84,7 +84,7 @@ utility prints primes in ascending order, one per line, starting at or above
|
||||
and continuing until, but not including
|
||||
.B stop.
|
||||
The
|
||||
.B start
|
||||
.B start
|
||||
value must be at least 0 and not greater than
|
||||
.B stop.\&
|
||||
The
|
||||
@ -114,7 +114,7 @@ The input line must not be longer than 255 characters.
|
||||
.B \-h
|
||||
Print the results in hexadecimal rather than decimal.
|
||||
.SH DIAGNOSTICS
|
||||
Out of range or invalid input results in `ouch' being
|
||||
Out of range or invalid input results in `ouch' being
|
||||
written to standard error.
|
||||
.SH BUGS
|
||||
.I Factor
|
||||
|
@ -154,7 +154,7 @@ fortune 90% funny 10% not-funny
|
||||
.Pp
|
||||
will pick out 90% of its fortunes from
|
||||
.Em funny
|
||||
(the
|
||||
(the
|
||||
.Dq 10% not-funny
|
||||
is unnecessary, since 10% is all that's left).
|
||||
The
|
||||
@ -174,7 +174,7 @@ fortune 50% funny 50% not-funny
|
||||
.It Pa /usr/games/fortune
|
||||
.Pp
|
||||
.It Pa /usr/share/games/fortune/*
|
||||
the fortunes databases (those files ending
|
||||
the fortunes databases (those files ending
|
||||
.Dq -o
|
||||
contain the
|
||||
.Bf -symbolic
|
||||
|
@ -1,7 +1,7 @@
|
||||
.\" Copyright (c) 1989, 1991, 1993
|
||||
.\" The Regents of the University of California. All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\"
|
||||
.\" This code is derived from software contributed to Berkeley by
|
||||
.\" Ken Arnold.
|
||||
.\"
|
||||
|
@ -98,7 +98,7 @@ Not all prosigns have corresponding characters. Use
|
||||
for
|
||||
.Em AS ,
|
||||
.Ql @
|
||||
for
|
||||
for
|
||||
.Em SK ,
|
||||
.Ql *
|
||||
for
|
||||
|
@ -31,7 +31,7 @@ They are:
|
||||
.PP
|
||||
.TP .5i
|
||||
.B \-s
|
||||
Invokes
|
||||
Invokes
|
||||
.I phantasia
|
||||
without header information.
|
||||
.TP .5i
|
||||
@ -745,7 +745,7 @@ but bigger.
|
||||
.TP 1.5i
|
||||
.B Type six
|
||||
.I priest
|
||||
\- rests to maximum; adds
|
||||
\- rests to maximum; adds
|
||||
.B mana, brains;
|
||||
and halves
|
||||
.B sin.
|
||||
@ -815,7 +815,7 @@ with a
|
||||
and gives bearer first hit on all monsters.
|
||||
.br
|
||||
.I quicksilver
|
||||
\- adds to
|
||||
\- adds to
|
||||
.B quickness.
|
||||
.TP 1.5i
|
||||
.B Type ten
|
||||
@ -928,7 +928,7 @@ reaches
|
||||
are converted to
|
||||
.I gold.
|
||||
.PP
|
||||
Once a player is king, he/she may do certain things while in
|
||||
Once a player is king, he/she may do certain things while in
|
||||
the Lord's Chamber (0,0). These are exercised with the
|
||||
.B decree
|
||||
('0') option.
|
||||
@ -980,7 +980,7 @@ The king collects the accrued taxes with this option.
|
||||
.PP
|
||||
The
|
||||
.B king
|
||||
may also
|
||||
may also
|
||||
.B teleport
|
||||
anywhere for free by using the origin as a starting place.
|
||||
.sh "Council of the Wise, Valar"
|
||||
@ -1044,7 +1044,7 @@ who uses them.
|
||||
are essentially immortal, but are actually given five lives.
|
||||
If these are used up, the player is left to die, and becomes an
|
||||
.B ex-valar.
|
||||
A
|
||||
A
|
||||
.B valar
|
||||
cannot
|
||||
.I move, teleport,
|
||||
@ -1174,7 +1174,7 @@ is always limited to a maximum of 99.
|
||||
.I Books
|
||||
bought at a
|
||||
.B trading post
|
||||
increase
|
||||
increase
|
||||
.B brains,
|
||||
based upon the number bought.
|
||||
It is unwise, however to buy more than 1/10 of one's
|
||||
|
@ -37,7 +37,7 @@ to generate
|
||||
.It Fl V
|
||||
The
|
||||
.Fl V
|
||||
option is for
|
||||
option is for
|
||||
.Nm
|
||||
usage.
|
||||
.It Fl i Ar string
|
||||
|
@ -42,5 +42,5 @@ pom \- display the phase of the moon
|
||||
The
|
||||
.I pom
|
||||
utility displays the current phase of the moon.
|
||||
Useful for selecting software completion target dates and predicting
|
||||
Useful for selecting software completion target dates and predicting
|
||||
managerial behavior.
|
||||
|
@ -63,7 +63,7 @@ players or the computer. They may re-enact one of the many
|
||||
historical sea battles recorded in the game, or they can choose
|
||||
a fictional battle.
|
||||
.PP
|
||||
As a sea captain in the
|
||||
As a sea captain in the
|
||||
.I Sail
|
||||
Navy, the player has complete control over the workings of his ship.
|
||||
He must order every maneuver, change the set of his sails, and judge the
|
||||
@ -100,7 +100,7 @@ must calculate moves for each ship it controls, the
|
||||
more ships the computer is playing, the slower the game will appear.
|
||||
.PP
|
||||
If a player joins a game in progress, he will synchronize
|
||||
with the other players (a rather slow process for everyone), and
|
||||
with the other players (a rather slow process for everyone), and
|
||||
then he may play along with the rest.
|
||||
.PP
|
||||
To implement a multi-user game in Version 7 UNIX, which was the operating
|
||||
@ -113,7 +113,7 @@ shared file. For example,
|
||||
.I Sail
|
||||
uses a temporary file named /tmp/#sailsink.21 for scenario 21, and
|
||||
corresponding file names for the other scenarios. To provide exclusive
|
||||
access to the temporary file,
|
||||
access to the temporary file,
|
||||
.I Sail
|
||||
uses a technique stolen from an old game called "pubcaves" by Jeff Cohen.
|
||||
Processes do a busy wait in the loop
|
||||
@ -125,7 +125,7 @@ Processes do a busy wait in the loop
|
||||
.br
|
||||
.sp
|
||||
until they are able to create a link to a file named "/tmp/#saillock.??".
|
||||
The "??" correspond to the scenario number of the game. Since UNIX
|
||||
The "??" correspond to the scenario number of the game. Since UNIX
|
||||
guarantees that a link will point to only one file, the process that succeeds
|
||||
in linking will have exclusive access to the temporary file.
|
||||
.PP
|
||||
@ -147,10 +147,10 @@ The most noticeable effect this communication has on the game is the
|
||||
delay in moving. Suppose a player types a move for his ship and hits
|
||||
return. What happens then? The player process saves up messages to
|
||||
be written to the temporary file in a buffer. Every 7 seconds or so, the
|
||||
player process gets exclusive access to the temporary file and writes
|
||||
player process gets exclusive access to the temporary file and writes
|
||||
out its buffer to the file. The driver, running asynchronously, must
|
||||
read in the movement command, process it, and write out the results. This
|
||||
takes two exclusive accesses to the temporary file. Finally, when the player
|
||||
takes two exclusive accesses to the temporary file. Finally, when the player
|
||||
process gets around to doing another 7 second update, the results of the
|
||||
move are displayed on the screen. Hence, every movement requires four
|
||||
exclusive accesses to the temporary file (anywhere from 7 to 21 seconds
|
||||
@ -167,7 +167,7 @@ sail around quite quickly.
|
||||
If the player types several movement commands between two 7 second updates,
|
||||
only the last movement command typed will be seen by the driver. Movement
|
||||
commands within the same update "overwrite" each other, in a sense.
|
||||
.SH THE HISTORY OF SAIL
|
||||
.SH THE HISTORY OF SAIL
|
||||
I wrote the first version of
|
||||
.I Sail
|
||||
on a PDP 11/70 in the fall of 1980. Needless to say, the code was horrendous,
|
||||
@ -177,7 +177,7 @@ tremendous rewrite from the top down, I got the first working version up by
|
||||
1981. There were several annoying bugs concerning firing broadsides and
|
||||
finding angles.
|
||||
.I Sail
|
||||
uses no floating point, by the way, so the direction routines are rather
|
||||
uses no floating point, by the way, so the direction routines are rather
|
||||
tricky.
|
||||
Ed Wang rewrote my angle() routine in 1981 to be more correct (although
|
||||
it still doesn't work perfectly), and he added code to let a player select
|
||||
@ -207,7 +207,7 @@ result was very much cleaner and (?) faster. He added window movement
|
||||
commands and find ship commands.
|
||||
.SH HISTORICAL INFO
|
||||
Old Square Riggers were very maneuverable ships capable of intricate
|
||||
sailing. Their only disadvantage was an inability to sail very
|
||||
sailing. Their only disadvantage was an inability to sail very
|
||||
close to the wind. The design of a wooden ship allowed only for the
|
||||
guns to bear to the left and right sides. A few guns of small
|
||||
aspect (usually 6 or 9 pounders) could point forward, but their
|
||||
@ -278,7 +278,7 @@ or boat actions. They could hit hard and get away fast.
|
||||
Lastly, there were the corvettes, sloops, and brigs. These were smaller
|
||||
ships mounting typically fewer than 20 guns. A corvette was only slightly
|
||||
smaller than a frigate, so one might have up to 30 guns. Sloops were used
|
||||
for carrying dispatches or passengers. Brigs were something you built for
|
||||
for carrying dispatches or passengers. Brigs were something you built for
|
||||
land-locked lakes.
|
||||
.SH SAIL PARTICULARS
|
||||
Ships in
|
||||
@ -288,7 +288,7 @@ the ship, and the other represents the stern. Ships have nationalities
|
||||
and numbers. The first ship of a nationality is number 0, the second
|
||||
number 1, etc. Therefore, the first British ship in a game would be
|
||||
printed as "b0". The second Brit would be "b1", and the fifth Don
|
||||
would be "s4".
|
||||
would be "s4".
|
||||
.PP
|
||||
Ships can set normal sails, called Battle Sails, or bend on extra canvas
|
||||
called Full Sails. A ship under full sail is a beautiful sight indeed,
|
||||
@ -322,7 +322,7 @@ be it 0,1,2,3,4, or 5. E.g., the "b0" captured by an American becomes the
|
||||
The ultimate example is, of course, an exploding Brit captured by an
|
||||
American: "#&".
|
||||
.SH MOVEMENT
|
||||
Movement is the most confusing part of
|
||||
Movement is the most confusing part of
|
||||
.I Sail
|
||||
to many. Ships can head in 8 directions:
|
||||
.nf
|
||||
@ -339,15 +339,15 @@ at all for two turns, it will begin to drift. If a ship has begun to
|
||||
drift, then it must move forward before it turns, if it plans to do
|
||||
more than make a right or left turn, which is always possible.
|
||||
.PP
|
||||
Movement commands to
|
||||
Movement commands to
|
||||
.I Sail
|
||||
are a string of forward moves and turns. An example is "l3". It will
|
||||
turn a ship left and then move it ahead 3 spaces. In the drawing above,
|
||||
the "b0" made 7 successive left turns. When
|
||||
the "b0" made 7 successive left turns. When
|
||||
.I Sail
|
||||
prompts you for a move, it prints three characters of import. E.g.,
|
||||
prompts you for a move, it prints three characters of import. E.g.,
|
||||
.nf
|
||||
move (7, 4):
|
||||
move (7, 4):
|
||||
.fi
|
||||
The first number is the maximum number of moves you can make,
|
||||
including turns. The second number is the maximum number of turns
|
||||
@ -383,7 +383,7 @@ if you turn closer to the wind, you most likely won't be able to sail the
|
||||
full allowance printed in the "move" prompt.
|
||||
.PP
|
||||
Old sailing captains had to keep an eye constantly on the wind. Captains
|
||||
in
|
||||
in
|
||||
.I Sail
|
||||
are no different. A ship's ability to move depends on its attitude to the
|
||||
wind. The best angle possible is to have the wind off your quarter, that is,
|
||||
@ -397,7 +397,7 @@ sail speeds are given first, and full sail speeds are given in parenthesis.
|
||||
-^-3(6)
|
||||
/|\\
|
||||
| 4(7)
|
||||
3(6)
|
||||
3(6)
|
||||
|
||||
.fi
|
||||
Pretend the bow of your ship (the "^") is pointing upward and the wind is
|
||||
@ -436,7 +436,7 @@ The number of fouls and grapples you have are displayed on the upper
|
||||
right of the screen.
|
||||
.SH BOARDING
|
||||
Boarding was a very costly venture in terms of human life. Boarding parties
|
||||
may be formed in
|
||||
may be formed in
|
||||
.I Sail
|
||||
to either board an enemy ship or to defend your own ship against attack.
|
||||
Men organized as Defensive Boarding Parties fight twice as hard to save
|
||||
@ -447,10 +447,10 @@ number of men sent.
|
||||
.SH CREW QUALITY
|
||||
The British seaman was world renowned for his sailing abilities. American
|
||||
sailors, however, were actually the best seamen in the world. Because the
|
||||
American Navy offered twice the wages of the Royal Navy, British seamen
|
||||
American Navy offered twice the wages of the Royal Navy, British seamen
|
||||
who liked the sea defected to America by the thousands.
|
||||
.PP
|
||||
In
|
||||
In
|
||||
.I Sail,
|
||||
crew quality is quantized into 5 energy levels. "Elite" crews can outshoot
|
||||
and outfight all other sailors. "Crack" crews are next. "Mundane" crews
|
||||
@ -483,10 +483,10 @@ ship:
|
||||
.nf
|
||||
|
||||
Load D! R!
|
||||
Hull 9
|
||||
Hull 9
|
||||
Crew 4 4 2
|
||||
Guns 4 4
|
||||
Carr 2 2
|
||||
Guns 4 4
|
||||
Carr 2 2
|
||||
Rigg 5 5 5 5
|
||||
|
||||
.fi
|
||||
@ -508,14 +508,14 @@ mere opportunity to fire them does not guarantee any hits. Many factors
|
||||
influence the destructive force of a broadside. First of all, and the chief
|
||||
factor, is distance. It is harder to hit a ship at range ten than it is
|
||||
to hit one sloshing alongside. Next is raking. Raking fire, as
|
||||
mentioned before,
|
||||
mentioned before,
|
||||
can sometimes dismast a ship at range ten. Next, crew size and quality affects
|
||||
the damage done by a broadside. The number of guns firing also bears on the
|
||||
point,
|
||||
so to speak. Lastly, weather affects the accuracy of a broadside. If the
|
||||
seas are high (5 or 6), then the lower gunports of ships of the line can't
|
||||
even be opened to run out the guns. This gives frigates and other flush
|
||||
decked vessels an advantage in a storm. The scenario
|
||||
decked vessels an advantage in a storm. The scenario
|
||||
.I Pellew vs. The Droits de L'Homme
|
||||
takes advantage of this peculiar circumstance.
|
||||
.SH REPAIRS
|
||||
@ -523,7 +523,7 @@ Repairs may be made to your Hull, Guns, and Rigging at the slow rate of
|
||||
two points per three turns. The message "Repairs Completed" will be
|
||||
printed if no more repairs can be made.
|
||||
.SH PECULIARITIES OF COMPUTER SHIPS
|
||||
Computer ships in
|
||||
Computer ships in
|
||||
.I Sail
|
||||
follow all the rules above with a few exceptions. Computer ships never
|
||||
repair damage. If they did, the players could never beat them. They
|
||||
@ -536,7 +536,7 @@ A.I. distance function and a depth first search to find the maximum "score."
|
||||
It seems to work fairly well, although I'll be the first to admit it isn't
|
||||
perfect.
|
||||
.SH HOW TO PLAY
|
||||
Commands are given to
|
||||
Commands are given to
|
||||
.I Sail
|
||||
by typing a single character. You will then be prompted for further
|
||||
input. A brief summary of the commands follows.
|
||||
@ -547,7 +547,7 @@ input. A brief summary of the commands follows.
|
||||
'f' Fire broadsides if they bear
|
||||
'l' Reload
|
||||
'L' Unload broadsides (to change ammo)
|
||||
'm' Move
|
||||
'm' Move
|
||||
'i' Print the closest ship
|
||||
'I' Print all ships
|
||||
'F' Find a particular ship or ships (e.g. "a?" for all Americans)
|
||||
@ -572,7 +572,7 @@ input. A brief summary of the commands follows.
|
||||
.fi
|
||||
.br
|
||||
.SH SCENARIOS
|
||||
Here is a summary of the scenarios in
|
||||
Here is a summary of the scenarios in
|
||||
.I Sail:
|
||||
|
||||
.br
|
||||
@ -868,7 +868,7 @@ has been a group effort.
|
||||
.SH AUTHOR
|
||||
Dave Riggle
|
||||
.SH CO-AUTHOR
|
||||
Ed Wang
|
||||
Ed Wang
|
||||
.SH REFITTING
|
||||
Craig Leres
|
||||
.SH CONSULTANTS
|
||||
|
@ -45,7 +45,7 @@ wump [-h] [-a arrows] [-b bats] [-p pits] [-r rooms] [-t tunnels]
|
||||
.ft R
|
||||
.SH DESCRIPTION
|
||||
The game
|
||||
.I wump
|
||||
.I wump
|
||||
is based on a fantasy game first presented in the pages of
|
||||
.I "People's Computer Company"
|
||||
in 1973.
|
||||
|
@ -72,7 +72,7 @@ The
|
||||
.Fn gethostid
|
||||
and
|
||||
.Fn sethostid
|
||||
syscalls appeared in
|
||||
syscalls appeared in
|
||||
.Bx 4.2
|
||||
and were dropped in
|
||||
.Bx 4.4 .
|
||||
|
@ -76,7 +76,7 @@ The
|
||||
.Fn setruid
|
||||
and
|
||||
.Fn setrgid
|
||||
syscalls appeared in
|
||||
syscalls appeared in
|
||||
.Bx 4.2
|
||||
and were dropped in
|
||||
.Bx 4.4 .
|
||||
|
@ -49,7 +49,7 @@
|
||||
.Xr sigsuspend 2 .
|
||||
.Pp
|
||||
.Fn Sigpause
|
||||
assigns
|
||||
assigns
|
||||
.Fa sigmask
|
||||
to the set of masked signals
|
||||
and then waits for a signal to arrive;
|
||||
|
@ -58,7 +58,7 @@ This interface is made obsolete by:
|
||||
.Fn Sigsetmask
|
||||
sets the current signal mask to the specified
|
||||
.Fa mask .
|
||||
Signals are blocked from delivery if the corresponding bit in
|
||||
Signals are blocked from delivery if the corresponding bit in
|
||||
.Fa mask
|
||||
is a 1.
|
||||
.Fn Sigblock
|
||||
|
@ -58,10 +58,10 @@ This interface is made obsolete by sigaction(2).
|
||||
.Pp
|
||||
The system defines a set of signals that may be delivered to a process.
|
||||
Signal delivery resembles the occurrence of a hardware interrupt:
|
||||
the signal is blocked from further occurrence, the current process
|
||||
the signal is blocked from further occurrence, the current process
|
||||
context is saved, and a new one is built. A process may specify a
|
||||
.Em handler
|
||||
to which a signal is delivered, or specify that a signal is to be
|
||||
to which a signal is delivered, or specify that a signal is to be
|
||||
.Em blocked
|
||||
or
|
||||
.Em ignored .
|
||||
@ -78,7 +78,7 @@ Signal routines execute with the signal that caused their
|
||||
invocation
|
||||
.Em blocked ,
|
||||
but other signals may yet occur.
|
||||
A global
|
||||
A global
|
||||
.Em "signal mask"
|
||||
defines the set of signals currently blocked from delivery
|
||||
to a process. The signal mask for a process is initialized
|
||||
@ -95,7 +95,7 @@ signals pending for the process. If the signal is not currently
|
||||
.Em blocked
|
||||
by the process then it is delivered to the process. When a signal
|
||||
is delivered, the current state of the process is saved,
|
||||
a new signal mask is calculated (as described below),
|
||||
a new signal mask is calculated (as described below),
|
||||
and the signal handler is invoked. The call to the handler
|
||||
is arranged so that if the signal handling routine returns
|
||||
normally the process will resume execution in the context
|
||||
@ -111,7 +111,7 @@ or
|
||||
.Xr sigsetmask 2
|
||||
call is made).
|
||||
This mask is formed by taking the current signal mask,
|
||||
adding the signal to be delivered, and
|
||||
adding the signal to be delivered, and
|
||||
.Em or Ns 'ing
|
||||
in the signal mask associated with the handler to be invoked.
|
||||
.Pp
|
||||
@ -129,7 +129,7 @@ the system will deliver the signal to the process on a
|
||||
.Em "signal stack" ,
|
||||
specified with
|
||||
.Xr sigaltstack 2 .
|
||||
If
|
||||
If
|
||||
.Fa ovec
|
||||
is non-zero, the previous handling information for the signal
|
||||
is returned to the user.
|
||||
@ -241,7 +241,7 @@ Ignored signals remain ignored;
|
||||
the signal mask remains the same;
|
||||
signals that interrupt system calls continue to do so.
|
||||
.Sh NOTES
|
||||
The mask specified in
|
||||
The mask specified in
|
||||
.Fa vec
|
||||
is not allowed to block
|
||||
.Dv SIGKILL
|
||||
@ -267,7 +267,7 @@ of the following occurs:
|
||||
.It Bq Er EFAULT
|
||||
Either
|
||||
.Fa vec
|
||||
or
|
||||
or
|
||||
.Fa ovec
|
||||
points to memory that is not a valid part of the process
|
||||
address space.
|
||||
@ -309,7 +309,7 @@ struct sigcontext *scp;
|
||||
Here
|
||||
.Fa sig
|
||||
is the signal number, into which the hardware faults and traps are
|
||||
mapped as defined below.
|
||||
mapped as defined below.
|
||||
.Fa Code
|
||||
is a parameter that is either a constant
|
||||
as given below or, for compatibility mode faults, the code provided by
|
||||
|
@ -145,7 +145,7 @@ The search path is the path specified in the environment by
|
||||
.Dq Ev PATH
|
||||
variable.
|
||||
If this variable isn't specified,
|
||||
the default path is set according to the
|
||||
the default path is set according to the
|
||||
.Dv _PATH_DEFPATH
|
||||
definition in
|
||||
.Aq paths.h ,
|
||||
|
@ -1,7 +1,7 @@
|
||||
.\"
|
||||
.\" Copyright (c) 2001 Christopher G. Demetriou
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
@ -17,7 +17,7 @@
|
||||
.\" information about NetBSD.
|
||||
.\" 4. The name of the author may not be used to endorse or promote products
|
||||
.\" derived from this software without specific prior written permission.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
||||
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
||||
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
||||
|
@ -386,7 +386,7 @@ was set or
|
||||
returned non-zero.
|
||||
.It Dv GLOB_LIMIT
|
||||
The flag
|
||||
.Dv GLOB_MAXPATH
|
||||
.Dv GLOB_MAXPATH
|
||||
was provided, and the specified limit passed to
|
||||
.Fn glob
|
||||
in
|
||||
|
@ -1,6 +1,6 @@
|
||||
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
@ -12,7 +12,7 @@
|
||||
.\" notice(s), this list of conditions and the following disclaimer in
|
||||
.\" the documentation and/or other materials provided with the
|
||||
.\" distribution.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
|
||||
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
@ -24,7 +24,7 @@
|
||||
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.Dd February 15, 2000
|
||||
.Dt SEM_DESTROY 3
|
||||
|
@ -1,6 +1,6 @@
|
||||
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
@ -12,7 +12,7 @@
|
||||
.\" notice(s), this list of conditions and the following disclaimer in
|
||||
.\" the documentation and/or other materials provided with the
|
||||
.\" distribution.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
|
||||
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
@ -24,7 +24,7 @@
|
||||
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.Dd February 15, 2000
|
||||
.Dt SEM_GETVALUE 3
|
||||
|
@ -1,6 +1,6 @@
|
||||
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
@ -12,7 +12,7 @@
|
||||
.\" notice(s), this list of conditions and the following disclaimer in
|
||||
.\" the documentation and/or other materials provided with the
|
||||
.\" distribution.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
|
||||
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
@ -24,7 +24,7 @@
|
||||
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.Dd February 15, 2000
|
||||
.Dt SEM_INIT 3
|
||||
|
@ -1,6 +1,6 @@
|
||||
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
@ -12,7 +12,7 @@
|
||||
.\" notice(s), this list of conditions and the following disclaimer in
|
||||
.\" the documentation and/or other materials provided with the
|
||||
.\" distribution.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
|
||||
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
@ -24,14 +24,14 @@
|
||||
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.Dd February 15, 2000
|
||||
.Dt SEM_OPEN 3
|
||||
.Os
|
||||
.Sh NAME
|
||||
.Nm sem_open ,
|
||||
.Nm sem_close ,
|
||||
.Nm sem_open ,
|
||||
.Nm sem_close ,
|
||||
.Nm sem_unlink
|
||||
.Nd named semaphore operations
|
||||
.Sh LIBRARY
|
||||
|
@ -1,6 +1,6 @@
|
||||
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
@ -12,7 +12,7 @@
|
||||
.\" notice(s), this list of conditions and the following disclaimer in
|
||||
.\" the documentation and/or other materials provided with the
|
||||
.\" distribution.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
|
||||
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
@ -24,7 +24,7 @@
|
||||
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.Dd February 15, 2000
|
||||
.Dt SEM_POST 3
|
||||
|
@ -1,6 +1,6 @@
|
||||
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
@ -12,7 +12,7 @@
|
||||
.\" notice(s), this list of conditions and the following disclaimer in
|
||||
.\" the documentation and/or other materials provided with the
|
||||
.\" distribution.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
|
||||
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
@ -24,13 +24,13 @@
|
||||
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.Dd February 15, 2000
|
||||
.Dt SEM_WAIT 3
|
||||
.Os
|
||||
.Sh NAME
|
||||
.Nm sem_wait ,
|
||||
.Nm sem_wait ,
|
||||
.Nm sem_trywait
|
||||
.Nd decrement (lock) a semaphore
|
||||
.Sh LIBRARY
|
||||
|
@ -101,7 +101,7 @@ source code by
|
||||
.Sh BUGS
|
||||
Never pass a string with user-supplied data as a format without using
|
||||
.Ql %s .
|
||||
An attacker can put format specifiers in the string to mangle your stack,
|
||||
An attacker can put format specifiers in the string to mangle your stack,
|
||||
leading to a possible security hole.
|
||||
This holds true even if the string was built using a function like
|
||||
.Fn snprintf ,
|
||||
|
@ -283,7 +283,7 @@ functions appeared in
|
||||
.Sh BUGS
|
||||
Never pass a string with user-supplied data as a format without using
|
||||
.Ql %s .
|
||||
An attacker can put format specifiers in the string to mangle your stack,
|
||||
An attacker can put format specifiers in the string to mangle your stack,
|
||||
leading to a possible security hole.
|
||||
This holds true even if the string was built using a function like
|
||||
.Fn snprintf ,
|
||||
|
@ -72,7 +72,7 @@ to resume the collection of histogram ticks and call counts use
|
||||
.Fn moncontrol 1 .
|
||||
This feature allows the cost of particular operations to be measured.
|
||||
Note that an output file will be produced on program exit
|
||||
regardless of the state of
|
||||
regardless of the state of
|
||||
.Fn moncontrol .
|
||||
.Pp
|
||||
Programs that are not loaded with
|
||||
@ -88,7 +88,7 @@ the lowest address sampled is that of
|
||||
.Fa lowpc
|
||||
and the highest is just below
|
||||
.Fa highpc .
|
||||
Only functions in that range that have been compiled with the
|
||||
Only functions in that range that have been compiled with the
|
||||
.Fl pg
|
||||
option to
|
||||
.Xr cc 1
|
||||
|
@ -50,8 +50,8 @@ and the number of contiguous entries will be returned in
|
||||
.Pp
|
||||
.Fn i386_set_ioperm
|
||||
will set access to a range of I/O ports described by the
|
||||
.Fa start
|
||||
and
|
||||
.Fa start
|
||||
and
|
||||
.Fa length
|
||||
arguments to the state specified by the
|
||||
.Fa enable
|
||||
@ -73,7 +73,7 @@ and
|
||||
will fail if:
|
||||
.Bl -tag -width Er
|
||||
.It Bq Er EINVAL
|
||||
An invalid range was specified by the
|
||||
An invalid range was specified by the
|
||||
.Fa start
|
||||
or
|
||||
.Fa length
|
||||
|
@ -58,7 +58,7 @@ LDT.
|
||||
Both routines accept a starting selector number
|
||||
.Fa start_sel
|
||||
, an array of memory that
|
||||
will contain the descriptors to be set or returned
|
||||
will contain the descriptors to be set or returned
|
||||
.Fa descs
|
||||
, and the number of entries to set or return
|
||||
.Fa num_sels .
|
||||
|
@ -55,9 +55,9 @@ parameters. The
|
||||
argument specifies which watch register is used, 0, 1, 2, 3, or -1. If
|
||||
.Fa watchnum
|
||||
is -1, a free watch register is found and used. If there are no free
|
||||
watch registers, an error code of -1 is returned.
|
||||
watch registers, an error code of -1 is returned.
|
||||
.Fa Watchaddr
|
||||
specifies the watch address,
|
||||
specifies the watch address,
|
||||
.Fa size
|
||||
specifies the size in bytes of the area to be watched (1, 2, or 4 bytes),
|
||||
and
|
||||
|
@ -72,7 +72,7 @@ it will be dispatched by the vm86 interrupt table.
|
||||
.\" .It Dv VM86_INTCALL
|
||||
.El
|
||||
.Pp
|
||||
vm86 mode is entered by calling
|
||||
vm86 mode is entered by calling
|
||||
.Xr sigreturn 2
|
||||
with the correct machine context for vm86, and with the
|
||||
.Em PSL_VM
|
||||
|
@ -42,18 +42,18 @@
|
||||
.Nm euc
|
||||
.Nd EUC encoding of runes
|
||||
.Sh SYNOPSIS
|
||||
.Nm ENCODING
|
||||
.Nm ENCODING
|
||||
.Qq EUC
|
||||
.Pp
|
||||
.Nm VARIABLE
|
||||
.Ar len1
|
||||
.Ar mask1
|
||||
.Ar len2
|
||||
.Ar mask2
|
||||
.Ar len3
|
||||
.Ar mask3
|
||||
.Ar len4
|
||||
.Ar mask4
|
||||
.Ar len1
|
||||
.Ar mask1
|
||||
.Ar len2
|
||||
.Ar mask2
|
||||
.Ar len3
|
||||
.Ar mask3
|
||||
.Ar len4
|
||||
.Ar mask4
|
||||
.Ar mask
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
@ -85,7 +85,7 @@ A multibyte character in the fourth codeset consists of
|
||||
.Ar len4
|
||||
bytes starting with the byte 0x8f.
|
||||
.Pp
|
||||
The
|
||||
The
|
||||
.Ev rune_t
|
||||
encoding of
|
||||
.Nm EUC
|
||||
|
@ -42,18 +42,18 @@
|
||||
.Nm euc
|
||||
.Nd EUC encoding of runes
|
||||
.Sh SYNOPSIS
|
||||
.Nm ENCODING
|
||||
.Nm ENCODING
|
||||
.Qq EUC
|
||||
.Pp
|
||||
.Nm VARIABLE
|
||||
.Ar len1
|
||||
.Ar mask1
|
||||
.Ar len2
|
||||
.Ar mask2
|
||||
.Ar len3
|
||||
.Ar mask3
|
||||
.Ar len4
|
||||
.Ar mask4
|
||||
.Ar len1
|
||||
.Ar mask1
|
||||
.Ar len2
|
||||
.Ar mask2
|
||||
.Ar len3
|
||||
.Ar mask3
|
||||
.Ar len4
|
||||
.Ar mask4
|
||||
.Ar mask
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
@ -85,7 +85,7 @@ A multibyte character in the fourth codeset consists of
|
||||
.Ar len4
|
||||
bytes starting with the byte 0x8f.
|
||||
.Pp
|
||||
The
|
||||
The
|
||||
.Ev rune_t
|
||||
encoding of
|
||||
.Nm EUC
|
||||
|
@ -51,7 +51,7 @@
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Fn isalnum
|
||||
function tests for any character for which
|
||||
function tests for any character for which
|
||||
.Xr isalpha 3
|
||||
or
|
||||
.Xr isdigit 3
|
||||
|
@ -46,7 +46,7 @@
|
||||
.Lb libc
|
||||
.Sh SYNOPSIS
|
||||
.Fd #include <ctype.h>
|
||||
.Ft int
|
||||
.Ft int
|
||||
.Fn isalpha "int c"
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
|
@ -49,7 +49,7 @@ The
|
||||
.Fn isascii
|
||||
function tests for an
|
||||
.Tn ASCII
|
||||
character, which is any character
|
||||
character, which is any character
|
||||
between 0 and octal 0177 inclusive.
|
||||
.Sh SEE ALSO
|
||||
.Xr ctype 3 ,
|
||||
|
@ -133,11 +133,11 @@ if the character does not appear in the string.
|
||||
The
|
||||
.Fn mbmb
|
||||
function
|
||||
returns a pointer to the
|
||||
returns a pointer to the
|
||||
.Fa pattern ,
|
||||
or
|
||||
.Dv NULL
|
||||
if the
|
||||
if the
|
||||
.Fa pattern
|
||||
does not appear in the string.
|
||||
.Sh "SEE ALSO
|
||||
|
@ -164,7 +164,7 @@ the result in
|
||||
.Fa mbchar .
|
||||
The object pointed to by
|
||||
.Fa mbchar
|
||||
must be large enough to accommodate the multibyte character.
|
||||
must be large enough to accommodate the multibyte character.
|
||||
.Pp
|
||||
The
|
||||
.Fn mbstowcs
|
||||
|
@ -119,7 +119,7 @@ will point to
|
||||
If there is an encoding error at the start of
|
||||
.Fa string ,
|
||||
.Dv _INVALID_RUNE
|
||||
is returned and
|
||||
is returned and
|
||||
.Fa *result
|
||||
will point to the second character of
|
||||
.Fa string .
|
||||
@ -160,7 +160,7 @@ is not
|
||||
.Fa *result
|
||||
will be set to
|
||||
.Dv NULL .
|
||||
In all cases,
|
||||
In all cases,
|
||||
.Fn sputrune
|
||||
will return the number of bytes which would be needed to store
|
||||
.Fa rune
|
||||
@ -170,7 +170,7 @@ The
|
||||
.Fn fgetrune
|
||||
function operates the same as
|
||||
.Fn sgetrune
|
||||
with the exception that it attempts to read enough bytes from
|
||||
with the exception that it attempts to read enough bytes from
|
||||
.Fa stream
|
||||
to decode a single rune. It returns either
|
||||
.Dv EOF
|
||||
@ -185,7 +185,7 @@ function pushes the multibyte encoding, as provided by
|
||||
of
|
||||
.Fa rune
|
||||
onto
|
||||
.Fa stream
|
||||
.Fa stream
|
||||
such that the next
|
||||
.Fn fgetrune
|
||||
call will return
|
||||
@ -242,7 +242,7 @@ as a multibyte string.
|
||||
.Bl -tag -width /usr/share/locale/locale/LC_CTYPE -compact
|
||||
.It Pa $PATH_LOCALE/ Ns Em locale Ns /LC_CTYPE
|
||||
.It Pa /usr/share/locale/ Ns Em locale Ns /LC_CTYPE
|
||||
binary LC_CTYPE file for the locale
|
||||
binary LC_CTYPE file for the locale
|
||||
.Em locale .
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
|
@ -286,9 +286,9 @@ or
|
||||
.Bl -tag -width /usr/share/locale/locale/category -compact
|
||||
.It Pa $PATH_LOCALE/ Ns Em locale/category
|
||||
.It Pa /usr/share/locale/ Ns Em locale/category
|
||||
locale file for the locale
|
||||
locale file for the locale
|
||||
.Em locale
|
||||
and the category
|
||||
and the category
|
||||
.Em category .
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
|
@ -51,7 +51,7 @@
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Fn toupper
|
||||
function converts a lower-case letter to the corresponding
|
||||
function converts a lower-case letter to the corresponding
|
||||
upper-case letter.
|
||||
For single C
|
||||
.Va char Ns s
|
||||
|
@ -12,7 +12,7 @@
|
||||
.\" no representations about the suitability of this software for any
|
||||
.\" purpose. It is provided "as is" without express or implied
|
||||
.\" warranty.
|
||||
.\"
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY M.I.T. ``AS IS''. M.I.T. DISCLAIMS
|
||||
.\" ALL EXPRESS OR IMPLIED WARRANTIES WITH REGARD TO THIS SOFTWARE,
|
||||
.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
@ -146,7 +146,7 @@ inet_ntoa(struct in_addr addr)
|
||||
int
|
||||
inet_aton(const char *ascii, struct in_addr *addr)
|
||||
{
|
||||
return (ascii2addr(AF_INET, ascii, addr)
|
||||
return (ascii2addr(AF_INET, ascii, addr)
|
||||
== sizeof(*addr));
|
||||
}
|
||||
.Ed
|
||||
|
@ -70,7 +70,7 @@ and
|
||||
.Sh HISTORY
|
||||
The
|
||||
.Nm byteorder
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.2 .
|
||||
.Sh BUGS
|
||||
On the
|
||||
|
@ -115,7 +115,7 @@ and
|
||||
functions map ethernet addresses to their corresponding hostnames
|
||||
as specified in the
|
||||
.Pa /etc/ethers
|
||||
database.
|
||||
database.
|
||||
.Fn ether_ntohost
|
||||
converts from ethernet address to hostname, and
|
||||
.Fn ether_hostton
|
||||
@ -132,7 +132,7 @@ structure
|
||||
and the hostname in the supplied string
|
||||
.Ar h .
|
||||
.Pp
|
||||
On success,
|
||||
On success,
|
||||
.Fn ether_ntoa
|
||||
returns a pointer to a string containing an
|
||||
.Tn ASCII
|
||||
|
@ -185,7 +185,7 @@ If the
|
||||
flag is non-zero,
|
||||
this sets the option to send all queries to the name server using
|
||||
.Tn TCP
|
||||
and to retain the connection after each call to
|
||||
and to retain the connection after each call to
|
||||
.Fn gethostbyname ,
|
||||
.Fn gethostbyname2
|
||||
or
|
||||
@ -240,7 +240,7 @@ if ((hp = gethostbyaddr((const char *)&ip,
|
||||
printf("name associated with %s is %s\en", ipstr, hp->h_name);
|
||||
.Ed
|
||||
.Sh DIAGNOSTICS
|
||||
Error return status from
|
||||
Error return status from
|
||||
.Fn gethostbyname ,
|
||||
.Fn gethostbyname2
|
||||
and
|
||||
@ -277,8 +277,8 @@ A retry at some later time may succeed.
|
||||
Some unexpected server failure was encountered.
|
||||
This is a non-recoverable error.
|
||||
.It Dv NO_DATA
|
||||
The requested name is valid but does not have an IP address;
|
||||
this is not a temporary error.
|
||||
The requested name is valid but does not have an IP address;
|
||||
this is not a temporary error.
|
||||
This means that the name is known to the name server but there is no address
|
||||
associated with this name.
|
||||
Another type of request to the name server using this domain name
|
||||
@ -335,7 +335,7 @@ closes the file.
|
||||
.Sh HISTORY
|
||||
The
|
||||
.Fn herror
|
||||
function appeared in
|
||||
function appeared in
|
||||
.Bx 4.3 .
|
||||
The
|
||||
.Fn endhostent ,
|
||||
|
@ -66,14 +66,14 @@ functions
|
||||
each return a pointer to an object with the
|
||||
following structure describing an internet network.
|
||||
This structure contains either the information obtained
|
||||
from the nameserver,
|
||||
from the nameserver,
|
||||
.Xr named 8 ,
|
||||
broken-out fields of a line in the network data base
|
||||
.Pa /etc/networks ,
|
||||
or entries supplied by the
|
||||
.Xr yp 4
|
||||
.Xr yp 4
|
||||
system. The order of the lookups is controlled by the
|
||||
`networks' entry in
|
||||
`networks' entry in
|
||||
.Xr nsswitch.conf 5 .
|
||||
.Pp
|
||||
.Bd -literal -offset indent
|
||||
@ -109,7 +109,7 @@ function
|
||||
opens and rewinds the file. If the
|
||||
.Fa stayopen
|
||||
flag is non-zero,
|
||||
the net data base will not be closed after each call to
|
||||
the net data base will not be closed after each call to
|
||||
.Fn getnetbyname
|
||||
or
|
||||
.Fn getnetbyaddr .
|
||||
@ -159,7 +159,7 @@ The
|
||||
.Fn setnetent ,
|
||||
and
|
||||
.Fn endnetent
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.2 .
|
||||
.Sh BUGS
|
||||
The data space used by
|
||||
|
@ -98,7 +98,7 @@ function
|
||||
opens and rewinds the file. If the
|
||||
.Fa stayopen
|
||||
flag is non-zero,
|
||||
the net data base will not be closed after each call to
|
||||
the net data base will not be closed after each call to
|
||||
.Fn getprotobyname
|
||||
or
|
||||
.Fn getprotobynumber .
|
||||
@ -139,7 +139,7 @@ The
|
||||
.Fn setprotoent ,
|
||||
and
|
||||
.Fn endprotoent
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.2 .
|
||||
.Sh BUGS
|
||||
These functions use a static data space;
|
||||
|
@ -47,7 +47,7 @@
|
||||
.Sh SYNOPSIS
|
||||
.Fd #include <netdb.h>
|
||||
.Ft struct servent *
|
||||
.Fn getservent
|
||||
.Fn getservent
|
||||
.Ft struct servent *
|
||||
.Fn getservbyname "const char *name" "const char *proto"
|
||||
.Ft struct servent *
|
||||
@ -102,7 +102,7 @@ function
|
||||
opens and rewinds the file. If the
|
||||
.Fa stayopen
|
||||
flag is non-zero,
|
||||
the net data base will not be closed after each call to
|
||||
the net data base will not be closed after each call to
|
||||
.Fn getservbyname
|
||||
or
|
||||
.Fn getservbyport .
|
||||
@ -126,7 +126,7 @@ or until
|
||||
.Dv EOF
|
||||
is encountered.
|
||||
If a protocol name is also supplied (non-
|
||||
.Dv NULL ) ,
|
||||
.Dv NULL ) ,
|
||||
searches must also match the protocol.
|
||||
.Sh FILES
|
||||
.Bl -tag -width /etc/services -compact
|
||||
@ -148,7 +148,7 @@ The
|
||||
.Fn setservent ,
|
||||
and
|
||||
.Fn endservent
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.2 .
|
||||
.Sh BUGS
|
||||
These functions use static data storage;
|
||||
|
@ -53,7 +53,7 @@
|
||||
.Fd #include <sys/socket.h>
|
||||
.Fd #include <netinet/in.h>
|
||||
.Fd #include <arpa/inet.h>
|
||||
.Ft int
|
||||
.Ft int
|
||||
.Fn inet_aton "const char *cp" "struct in_addr *pin"
|
||||
.Ft in_addr_t
|
||||
.Fn inet_addr "const char *cp"
|
||||
@ -65,7 +65,7 @@
|
||||
.Fn inet_ntop "int af" "const void *src" "char *dst" "size_t size"
|
||||
.Ft int
|
||||
.Fn inet_pton "int af" "const char *src" "void *dst"
|
||||
.Ft struct in_addr
|
||||
.Ft struct in_addr
|
||||
.Fn inet_makeaddr "in_addr_t net" "in_addr_t lna"
|
||||
.Ft in_addr_t
|
||||
.Fn inet_lnaof "struct in_addr in"
|
||||
@ -248,7 +248,7 @@ This is a narrower input set than that accepted by
|
||||
.Fn inet_aton .
|
||||
.Sh HISTORY
|
||||
These
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.2 .
|
||||
.Sh BUGS
|
||||
The value
|
||||
|
@ -323,7 +323,7 @@ called for a given ancillary data object,
|
||||
.Fa *tptrp
|
||||
must be set to
|
||||
.Dv NULL .
|
||||
.Pp
|
||||
.Pp
|
||||
Each time this function returns success,
|
||||
.Fa *tptrp
|
||||
points to the 8-bit
|
||||
@ -409,7 +409,7 @@ return
|
||||
.Li -1
|
||||
setting
|
||||
.Fa *tptrp
|
||||
to non
|
||||
to non
|
||||
.Dv NULL
|
||||
value.
|
||||
.\"
|
||||
|
@ -63,7 +63,7 @@ addresses and returns
|
||||
.Tn ASCII
|
||||
strings representing NSAPs (network service
|
||||
access points) in a
|
||||
notation inverse to that accepted by
|
||||
notation inverse to that accepted by
|
||||
.Fn iso_addr .
|
||||
.Pp
|
||||
Unfortunately, no universal standard exists for representing
|
||||
@ -101,7 +101,7 @@ The
|
||||
.Fn iso_addr
|
||||
and
|
||||
.Fn iso_ntoa
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.3 Reno .
|
||||
.Sh BUGS
|
||||
The returned values
|
||||
|
@ -116,7 +116,7 @@ The
|
||||
.Fn link_addr
|
||||
and
|
||||
.Fn link_ntoa
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.3 Reno .
|
||||
.Sh BUGS
|
||||
The returned values for link_ntoa
|
||||
|
@ -46,7 +46,7 @@ address conversion routines
|
||||
.Sh SYNOPSIS
|
||||
.Fd #include <sys/types.h>
|
||||
.Fd #include <netns/ns.h>
|
||||
.Ft struct ns_addr
|
||||
.Ft struct ns_addr
|
||||
.Fn ns_addr "char *cp"
|
||||
.Ft char *
|
||||
.Fn ns_ntoa "struct ns_addr ns"
|
||||
@ -70,7 +70,7 @@ notation in common use in the Xerox Development Environment:
|
||||
.Ed
|
||||
.Pp
|
||||
Trailing zero fields are suppressed, and each number is printed in hexadecimal,
|
||||
in a format suitable for input to
|
||||
in a format suitable for input to
|
||||
.Fn ns_addr .
|
||||
Any fields lacking super-decimal digits will have a
|
||||
trailing
|
||||
@ -121,7 +121,7 @@ The
|
||||
.Fn ns_addr
|
||||
and
|
||||
.Fn ns_toa
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.3 .
|
||||
.Sh BUGS
|
||||
The string returned by
|
||||
|
@ -57,7 +57,7 @@
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Fn nsdispatch
|
||||
function invokes the callback functions specified in
|
||||
function invokes the callback functions specified in
|
||||
.Va dtab
|
||||
in the order given in
|
||||
.Pa /etc/nsswitch.conf
|
||||
@ -95,7 +95,7 @@ The last entry in
|
||||
should contain
|
||||
.Dv NULL
|
||||
values for
|
||||
.Va src ,
|
||||
.Va src ,
|
||||
.Va cb ,
|
||||
and
|
||||
.Va cb_data .
|
||||
@ -132,7 +132,7 @@ For each default source type, an entry with
|
||||
set to the name of the source, and
|
||||
.Va flags
|
||||
set to the relevant flags
|
||||
(usually
|
||||
(usually
|
||||
.Dv NS_SUCCESS ;
|
||||
refer to
|
||||
.Sx Callback return values
|
||||
@ -203,9 +203,9 @@ The
|
||||
routines first appeared in
|
||||
.Fx 4.1 .
|
||||
They were imported from the
|
||||
.Nx
|
||||
.Nx
|
||||
Project,
|
||||
where they appeared first in
|
||||
where they appeared first in
|
||||
.Nx 1.4 .
|
||||
.Sh AUTHORS
|
||||
Luke Mewburn
|
||||
|
@ -104,7 +104,7 @@ If the connection succeeds,
|
||||
a socket in the Internet domain of type
|
||||
.Dv SOCK_STREAM
|
||||
is returned to the caller, and given to the remote
|
||||
command as
|
||||
command as
|
||||
.Em stdin
|
||||
and
|
||||
.Em stdout .
|
||||
@ -122,10 +122,10 @@ signal numbers, to be
|
||||
forwarded to the process group of the command.
|
||||
If
|
||||
.Fa fd2p
|
||||
is 0, then the
|
||||
is 0, then the
|
||||
.Em stderr
|
||||
(unit 2 of the remote
|
||||
command) will be made the same as the
|
||||
command) will be made the same as the
|
||||
.Em stdout
|
||||
and no
|
||||
provision is made for sending arbitrary signals to the remote process,
|
||||
@ -138,7 +138,7 @@ The
|
||||
.Fn rresvport
|
||||
function is used to obtain a socket to which an address with a Privileged
|
||||
Internet port is bound.
|
||||
This socket is suitable for use by
|
||||
This socket is suitable for use by
|
||||
.Fn rcmd
|
||||
and several other functions.
|
||||
Privileged Internet ports are those in the range 0 to 1023.
|
||||
@ -284,7 +284,7 @@ is overloaded to mean ``All network ports in use.''
|
||||
.Re
|
||||
.Sh HISTORY
|
||||
Most of these
|
||||
functions appeared in
|
||||
functions appeared in
|
||||
.Bx 4.2 .
|
||||
.Fn rresvport_af
|
||||
appeared in RFC2292, and was implemented by the WIDE project
|
||||
|
@ -92,7 +92,7 @@
|
||||
.Fa "int anslen"
|
||||
.Fc
|
||||
.Ft int
|
||||
.Fn res_init
|
||||
.Fn res_init
|
||||
.Ft int
|
||||
.Fo dn_comp
|
||||
.Fa "const char *exp_dn"
|
||||
@ -418,5 +418,5 @@ see
|
||||
.Sh HISTORY
|
||||
The
|
||||
.Nm
|
||||
function appeared in
|
||||
function appeared in
|
||||
.Bx 4.3 .
|
||||
|
@ -42,7 +42,7 @@
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Fn catclose
|
||||
function closes the message catalog specified by the argument
|
||||
function closes the message catalog specified by the argument
|
||||
.Fa catd .
|
||||
.Sh RETURN VALUES
|
||||
.Rv -std catclose
|
||||
|
@ -32,7 +32,7 @@
|
||||
.Os
|
||||
.Sh NAME
|
||||
.Nm catgets
|
||||
.Nd retrieve string from message catalog
|
||||
.Nd retrieve string from message catalog
|
||||
.Sh LIBRARY
|
||||
.Lb libc
|
||||
.Sh SYNOPSIS
|
||||
@ -40,20 +40,20 @@
|
||||
.Ft char *
|
||||
.Fn catgets "nl_catd catd" "int set_id" "int msg_id" "const char *s"
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Fn catgets
|
||||
The
|
||||
.Fn catgets
|
||||
function attempts to retrieve message
|
||||
.Fa msg_id
|
||||
of set
|
||||
.Fa set_id
|
||||
from the message catalog referenced by the descriptor
|
||||
.Fa catd .
|
||||
The argument
|
||||
The argument
|
||||
.Fa s
|
||||
points to a default message which is returned if the function
|
||||
is unable to retrieve the specified message.
|
||||
.Sh RETURN VALUES
|
||||
If the specified message was retrieved successfully,
|
||||
If the specified message was retrieved successfully,
|
||||
.Fn catgets
|
||||
returns a pointer to an internal buffer containing the message string;
|
||||
otherwise it returns
|
||||
|
@ -32,7 +32,7 @@
|
||||
.Os
|
||||
.Sh NAME
|
||||
.Nm catopen
|
||||
.Nd open message catalog
|
||||
.Nd open message catalog
|
||||
.Sh LIBRARY
|
||||
.Lb libc
|
||||
.Sh SYNOPSIS
|
||||
@ -40,21 +40,21 @@
|
||||
.Ft nl_catd
|
||||
.Fn catopen "const char *name" "int oflag"
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
The
|
||||
.Fn catopen
|
||||
function opens the message catalog specified by
|
||||
.Fa name
|
||||
.Fa name
|
||||
and returns a message catalog descriptor.
|
||||
If
|
||||
.Fa name
|
||||
contains a
|
||||
.Sq /
|
||||
then
|
||||
.Sq /
|
||||
then
|
||||
.Fa name
|
||||
specifies the full pathname for the message catalog, otherwise the value
|
||||
specifies the full pathname for the message catalog, otherwise the value
|
||||
of the environment variable
|
||||
.Ev NLSPATH
|
||||
is used with
|
||||
.Ev NLSPATH
|
||||
is used with
|
||||
the following substitutions:
|
||||
.Bl -tag -width XXX
|
||||
.It \&%N
|
||||
@ -86,7 +86,7 @@ environment variable or from the
|
||||
.Dv LC_MESSAGES
|
||||
category.
|
||||
.It \&%%
|
||||
A single % character.
|
||||
A single % character.
|
||||
.El
|
||||
.Pp
|
||||
An empty string is substituted for undefined values.
|
||||
@ -124,11 +124,11 @@ until a successful call to one of the
|
||||
.Xr exec 3
|
||||
function.
|
||||
.Sh RETURN VALUES
|
||||
Upon successful completion,
|
||||
Upon successful completion,
|
||||
.Fn catopen
|
||||
returns a message catalog descriptor.
|
||||
Otherwise, (nl_catd) -1 is returned and
|
||||
.Va errno
|
||||
.Va errno
|
||||
is set to indicate the error.
|
||||
.Sh ERRORS
|
||||
.Bl -tag -width Er
|
||||
|
@ -220,7 +220,7 @@ POSIX.1e is described in IEEE POSIX.1e draft 17.
|
||||
Discussion of the draft continues on the cross-platform POSIX.1e
|
||||
implementation mailing list.
|
||||
To join this list, see the
|
||||
.Fx
|
||||
.Fx
|
||||
POSIX.1e implementation page for more information.
|
||||
.Sh HISTORY
|
||||
POSIX.1e support was introduced in
|
||||
|
@ -112,7 +112,7 @@ The file system is read-only.
|
||||
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
|
||||
of the draft continues on the cross-platform POSIX.1e implementation
|
||||
mailing list. To join this list, see the
|
||||
.Fx
|
||||
.Fx
|
||||
POSIX.1e implementation
|
||||
page for more information.
|
||||
.Sh HISTORY
|
||||
|
@ -111,12 +111,12 @@ rely on the
|
||||
library calls to manage username and uid mapping, as well as the
|
||||
.Xr getgrent 3
|
||||
library calls to manage groupname and gid mapping. These calls are not
|
||||
thread safe, and so transitively, neither are
|
||||
thread safe, and so transitively, neither are
|
||||
.Fn acl_from_text
|
||||
and
|
||||
.Fn acl_to_text .
|
||||
These functions may also interfere with stateful
|
||||
calls associated with the
|
||||
calls associated with the
|
||||
.Fn getpwent
|
||||
and
|
||||
.Fn getgrent
|
||||
|
@ -51,10 +51,10 @@ The
|
||||
and
|
||||
.Fn acl_get_fd_np
|
||||
each allow the retrieval of an ACL from a file.
|
||||
.Fn acl_get_file
|
||||
.Fn acl_get_file
|
||||
is a POSIX.1e call that allows the retrieval of a
|
||||
specified type of ACL from a file by name;
|
||||
.Fn acl_get_fd
|
||||
.Fn acl_get_fd
|
||||
is a POSIX.1e call that allows the retrieval of an ACL of type
|
||||
ACL_TYPE_ACCESS
|
||||
from a file descriptor.
|
||||
|
@ -53,13 +53,13 @@ and
|
||||
each associate an ACL with an object referred to by
|
||||
.Va fd
|
||||
or
|
||||
.Va path_p .
|
||||
.Va path_p .
|
||||
All except
|
||||
.Fn acl_set_fd_np
|
||||
are POSIX.1e calls--
|
||||
.Fn acl_set_fd
|
||||
allows only the setting of ACLs of type ACL_TYPE_ACCESS
|
||||
where as
|
||||
where as
|
||||
.Fn acl_set_fd_np
|
||||
allows the setting of ACLs of any type.
|
||||
.Sh IMPLEMENTATION NOTES
|
||||
|
@ -39,7 +39,7 @@
|
||||
.Ft char *
|
||||
.Fn acl_to_text "acl_t acl" "ssize_t *len_p"
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
The
|
||||
.Fn acl_to_text
|
||||
function translates the ACL pointed to by argument
|
||||
.Va acl
|
||||
|
@ -69,7 +69,7 @@ then one ACL_MASK entry shall also be required. The ACL
|
||||
shall contain at most on ACL_MASK entry.
|
||||
.Pp
|
||||
The qualifier field shall be unique among all entries of
|
||||
the same POSIX.1e ACL facility defined tag type. The
|
||||
the same POSIX.1e ACL facility defined tag type. The
|
||||
tag type field shall contain valid values including any
|
||||
implementation-defined values. Validation of the values
|
||||
of the qualifier field is implementation-defined.
|
||||
@ -78,7 +78,7 @@ of the qualifier field is implementation-defined.
|
||||
The POSIX.1e
|
||||
.Fn acl_valid
|
||||
function may reorder the ACL for the purposes of verification; the
|
||||
non-portable validation functions will not.
|
||||
non-portable validation functions will not.
|
||||
.Sh IMPLEMENTATION NOTES
|
||||
.Fx Ns 's
|
||||
support for POSIX.1e interfaces and features is still under
|
||||
|
@ -66,7 +66,7 @@ This function is described in
|
||||
.Xr cap_free 3 ,
|
||||
and may be used to free a capability structure.
|
||||
.It Fn cap_from_text
|
||||
This function is described in
|
||||
This function is described in
|
||||
.Xr cap_from_text 3 ,
|
||||
and may be used to convert a text-form capability to its internal
|
||||
representation.
|
||||
@ -153,7 +153,7 @@ ACLs are available, this capability overrides the ACL execute access
|
||||
restrictions when accessing an object.
|
||||
.It Dv CAP_DAC_WRITE
|
||||
This capability overrides file mode write access restrictions when access an
|
||||
object, and, if
|
||||
object, and, if
|
||||
.Xr posix1e 3
|
||||
ACLs are available, this capability also overrides the ACL write access
|
||||
restrictions when accessing an object.
|
||||
@ -229,7 +229,7 @@ capability set when invoking
|
||||
.It Dv CAP_SYS_SETFFLAG
|
||||
This capability overrides the restriction that a process cannot manipulate
|
||||
the system file flags on a file system object.
|
||||
For portability, equivilent to
|
||||
For portability, equivilent to
|
||||
.Dv CAP_LINUX_IMMUTABLE .
|
||||
.It Dv CAP_NET_BIND_SERVICE
|
||||
This capability overrides network namespace restrictions on process's
|
||||
@ -267,7 +267,7 @@ configure, or disable system process accounting.
|
||||
.It Dv CAP_SYS_ADMIN
|
||||
.It Dv CAP_SYS_BOOT
|
||||
This capability overrides the restriction that a process cannot invoke
|
||||
the
|
||||
the
|
||||
.Xr boot 2
|
||||
system call.
|
||||
.It Dv CAP_SYS_NICE
|
||||
@ -323,7 +323,7 @@ use in the short term.
|
||||
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
|
||||
of the draft continues on the cross-platform POSIX.1e implementation
|
||||
mailing list. To join this list, see the
|
||||
.Fx
|
||||
.Fx
|
||||
POSIX.1e implementation
|
||||
page for more information.
|
||||
.Sh HISTORY
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_CLEAR 3
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_DUP 3
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_FREE 3
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_GET_FLAG 3
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_GET_PROC 3
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_INIT 3
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_SET_FLAG 3
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\" TrustedBSD Project - support for POSIX.1e process capabilities
|
||||
.\"
|
||||
.Dd April 1, 2000
|
||||
.Dt CAP_SET_PROC 3
|
||||
|
@ -21,7 +21,7 @@
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
|
@ -56,7 +56,7 @@ Access Control are in the wings, and Information Flow Labels are not on
|
||||
the calendar.
|
||||
.Pp
|
||||
POSIX.1e defines both syntax and semantics for these features, but fairly
|
||||
substantial changes are required to implement these features in the
|
||||
substantial changes are required to implement these features in the
|
||||
operating system. As shipped,
|
||||
.Fx 4.0
|
||||
permits file systems to export
|
||||
|
@ -230,7 +230,7 @@ and
|
||||
stands for the
|
||||
sequence of characters of that collating element.
|
||||
The sequence is a single element of the bracket expression's list.
|
||||
A bracket expression containing a multi-character collating element
|
||||
A bracket expression containing a multi-character collating element
|
||||
can thus match more than one character,
|
||||
e.g. if the collating sequence includes a
|
||||
.Ql ch
|
||||
@ -419,7 +419,7 @@ RE or the beginning of a parenthesized subexpression
|
||||
Finally, there is one new type of atom, a
|
||||
.Em back reference :
|
||||
.Ql \e
|
||||
followed by a non-zero decimal digit
|
||||
followed by a non-zero decimal digit
|
||||
.Em d
|
||||
matches the same sequence of characters
|
||||
matched by the
|
||||
|
@ -88,7 +88,7 @@ may also fail and set
|
||||
for any of the errors specified for the calls
|
||||
.Xr bind 2 ,
|
||||
.Xr getsockopt 2 ,
|
||||
or
|
||||
or
|
||||
.Xr setsockopt 2 .
|
||||
.Sh SEE ALSO
|
||||
.Xr bind 2 ,
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user