mirror of
https://github.com/freebsd/freebsd-src
synced 2024-10-04 15:40:44 +00:00
Fix a bunch of spelling errors in a bunch of man pages.
This commit is contained in:
parent
e407db3cbc
commit
4a8d02835c
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=13744
|
@ -30,7 +30,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" From: @(#)sysctl.8 8.1 (Berkeley) 6/6/93
|
||||
.\" $Id: sysctl.8,v 1.6 1995/02/20 19:42:42 guido Exp $
|
||||
.\" $Id: sysctl.8,v 1.7 1995/12/21 12:39:24 phk Exp $
|
||||
.\"
|
||||
.Dd September 23, 1994
|
||||
.Dt SYSCTL 8
|
||||
|
@ -113,7 +113,7 @@ purpose programs such as
|
|||
and
|
||||
.Nm netstat .
|
||||
.Pp
|
||||
The string and integer information is summaried below.
|
||||
The string and integer information is summarized below.
|
||||
For a detailed description of these variable see
|
||||
.Xr sysctl 3 .
|
||||
.Pp
|
||||
|
@ -235,7 +235,7 @@ definitions for fourth level UDP identifiers
|
|||
.Sh BUGS
|
||||
.Nm sysctl
|
||||
presently exploits an undocumented interface to the kernel
|
||||
sysctl facility to traverse the sysctl tree and to retrive format
|
||||
sysctl facility to traverse the sysctl tree and to retrieve format
|
||||
and name information.
|
||||
This correct interface is being thought about for the time being.
|
||||
.Sh HISTORY
|
||||
|
|
|
@ -53,7 +53,7 @@
|
|||
.Li /* round to minus infinity */
|
||||
.br
|
||||
.Ft FP_RP,
|
||||
.Li /* round to plus inifinity */
|
||||
.Li /* round to plus infinity */
|
||||
.br
|
||||
.Ft FP_RZ,
|
||||
.Li /* truncate */
|
||||
|
|
|
@ -139,14 +139,14 @@ Sets the buffer length for reads on
|
|||
files. The buffer must be set before the file is attached to an interface
|
||||
with
|
||||
.Dv BIOCSETIF .
|
||||
If the requested buffer size cannot be accomodated, the closest
|
||||
If the requested buffer size cannot be accommodated, the closest
|
||||
allowable size will be set and returned in the argument.
|
||||
A read call will result in
|
||||
.Er EIO
|
||||
if it is passed a buffer that is not this size.
|
||||
.It Dv BIOCGDLT
|
||||
.Pq Li u_int
|
||||
Returns the type of the data link layer underyling the attached interface.
|
||||
Returns the type of the data link layer underlying the attached interface.
|
||||
.Er EINVAL
|
||||
is returned if no interface has been specified.
|
||||
The device types, prefixed with
|
||||
|
@ -249,7 +249,7 @@ See section
|
|||
for an explanation of the filter language.
|
||||
.It Dv BIOCVERSION
|
||||
.Pq Li "struct bpf_version"
|
||||
Returns the major and minor version numbers of the filter languange currently
|
||||
Returns the major and minor version numbers of the filter language currently
|
||||
recognized by the kernel. Before installing a filter, applications must check
|
||||
that the current version is compatible with the running kernel. Version
|
||||
numbers are compatible if the major numbers match and the application minor
|
||||
|
@ -367,15 +367,15 @@ struct bpf_insn {
|
|||
|
||||
The
|
||||
.Li k
|
||||
field is used in differnet ways by different insutructions,
|
||||
field is used in different ways by different instructions,
|
||||
and the
|
||||
.Li jt
|
||||
and
|
||||
.Li jf
|
||||
fields are used as offsets
|
||||
by the branch intructions.
|
||||
by the branch instructions.
|
||||
The opcodes are encoded in a semi-hierarchical fashion.
|
||||
There are eight classes of intructions:
|
||||
There are eight classes of instructions:
|
||||
.Dv BPF_LD ,
|
||||
.Dv BPF_LDX ,
|
||||
.Dv BPF_ST ,
|
||||
|
@ -460,7 +460,7 @@ A <- M[k]
|
|||
|
||||
.It Dv BPF_LDX
|
||||
These instructions load a value into the index register. Note that
|
||||
the addressing modes are more retricted than those of the accumulator loads,
|
||||
the addressing modes are more restrictive than those of the accumulator loads,
|
||||
but they include
|
||||
.Dv BPF_MSH ,
|
||||
a hack for efficiently loading the IP header length.
|
||||
|
@ -597,7 +597,7 @@ accept k bytes
|
|||
.It Dv BPF_MISC
|
||||
The miscellaneous category was created for anything that doesn't
|
||||
fit into the above classes, and for any new instructions that might need to
|
||||
be added. Currently, these are the register transfer intructions
|
||||
be added. Currently, these are the register transfer instructions
|
||||
that copy the index register to the accumulator or vice versa.
|
||||
|
||||
.Bl -tag -width "BPF_MISC+BPF_TAX" -compact
|
||||
|
|
|
@ -16,7 +16,7 @@ driver provides support for a
|
|||
(Compact Disc-Read Only Memory) drive.
|
||||
In an attempt to look like a regular disk, the
|
||||
.Nm
|
||||
driver synthesises a partition table, with one partition covering the entire
|
||||
driver synthesizes a partition table, with one partition covering the entire
|
||||
.Tn CD-ROM .
|
||||
It is possible to modify this partition table using
|
||||
.Xr disklabel 8 ,
|
||||
|
@ -123,7 +123,7 @@ struct ioc_capability {
|
|||
#define CDSETMUTE 0x00001000
|
||||
/* Output can be muted */
|
||||
#define CDSETPATCH 0x00008000
|
||||
/* Direct routing countrol allowed */
|
||||
/* Direct routing control allowed */
|
||||
|
||||
u_long special_function;
|
||||
#define CDDOEJECT 0x00000001
|
||||
|
@ -325,7 +325,7 @@ In addition the general
|
|||
.Xr scsi 4
|
||||
ioctls may be used with the
|
||||
.Nm
|
||||
driver, if used against the `whole disk' partiton (i.e.
|
||||
driver, if used against the `whole disk' partition (i.e.
|
||||
.Pa /dev/rcd0c ) .
|
||||
.Sh NOTES
|
||||
When a
|
||||
|
|
|
@ -15,7 +15,7 @@ driver provides support for a
|
|||
juke box. It allows many slots of media to be multiplexed between a number
|
||||
of drives.
|
||||
.Pp
|
||||
A scsi adapter must also be separatly configured into the system
|
||||
A scsi adapter must also be separately configured into the system
|
||||
before a scsi changer can be configured.
|
||||
.Pp
|
||||
As the scsi adapter is probed during boot, the
|
||||
|
|
|
@ -56,7 +56,7 @@ devices on the
|
|||
.Tn SCSI
|
||||
bus to particular units of the
|
||||
.Nm
|
||||
decice; refer to
|
||||
device; refer to
|
||||
.Xr scsi 4
|
||||
for details on kernel configuration.
|
||||
.Sh PARTITIONING
|
||||
|
@ -111,11 +111,11 @@ disks as well as to other disks. They are defined in the header file
|
|||
Usually used to set up a bad-block mapping system on the disk.
|
||||
.Tn SCSI
|
||||
drive incorporate their own bad-block mapping so this command is not
|
||||
implimented.
|
||||
implemented.
|
||||
.It Dv DIOCGDINFO
|
||||
Read, from the kernel, the in-core copy of the disklabel for the
|
||||
drive. This may be a ficticious disklabel if the drive has never
|
||||
been initialised, in which case it will contain information read
|
||||
drive. This may be a fictitious disklabel if the drive has never
|
||||
been initialized, in which case it will contain information read
|
||||
from the
|
||||
.Tn SCSI
|
||||
inquiry commands.
|
||||
|
|
|
@ -69,7 +69,7 @@ Options in the kernel configuration file:
|
|||
.Sh DESCRIPTION
|
||||
Ipfirewall (later ipfw) is a system facility,which allows filtering
|
||||
of incoming and/or forwarding packets on the protocol+source/destination
|
||||
adress/ports base.
|
||||
address/ports base.
|
||||
Ipaccounting (later ipacct) is a system facility,which allows counting
|
||||
of incoming,outgoing and forwarding traffic by packet/byte count.
|
||||
|
||||
|
@ -90,9 +90,9 @@ searching chain for matching entry the first matching is the best match,
|
|||
[ or at least one of them :^) ].
|
||||
That means:
|
||||
* First in chain entries with specific protocol and small ranges
|
||||
of src/dst adresses and ports.
|
||||
* Later go entries with wider ranges of ports and adresses.
|
||||
* Later entries matching every port for some adress range.
|
||||
of src/dst addresses and ports.
|
||||
* Later go entries with wider ranges of ports and addresses.
|
||||
* Later entries matching every port for some address range.
|
||||
* Later universal entries matching any protocol.
|
||||
|
||||
While deleting entry , every entry which equal to that passed to
|
||||
|
@ -102,14 +102,14 @@ Flush removes all entries.
|
|||
Every entry have several fields,by which packets matched:
|
||||
struct ip_fw *next - next entry in chain.(Set internally)
|
||||
|
||||
struct in_addr src - source adress to be matched.
|
||||
struct in_addr src_mask - source adress mask.
|
||||
To match whole networks/subnets or adress groups
|
||||
struct in_addr src - source address to be matched.
|
||||
struct in_addr src_mask - source address mask.
|
||||
To match whole networks/subnets or address groups
|
||||
mask bits should be zeroed here and also
|
||||
in src_mask field. Valuable bits should be set
|
||||
in src_mask field.
|
||||
struct in_addr dst - destination adress to be matched.
|
||||
struct in_addr dst_mask - destination adress mask.
|
||||
struct in_addr dst - destination address to be matched.
|
||||
struct in_addr dst_mask - destination address mask.
|
||||
|
||||
u_short flags - flags field.See exact description of flags meaning
|
||||
in description later.
|
||||
|
@ -139,9 +139,9 @@ b) If entry protocol set to TCP/UDP/ICMP and packet protocol
|
|||
different - no match,if packet protocol and entry protocol
|
||||
same - continue.
|
||||
|
||||
c) If source addres pattern does not equal to packets sources adress
|
||||
c) If source address pattern does not equal to packets sources address
|
||||
masked with src_mask , or destination pattern not equal to packets
|
||||
destination adress masked with dst_mask - no match.
|
||||
destination address masked with dst_mask - no match.
|
||||
If they does and protocol set to ALL/ICMP - got match.
|
||||
If they does and protocol set to TCP/UDP - continue.
|
||||
|
||||
|
@ -152,7 +152,7 @@ In ipfw packet matched consequently against every chain entry.
|
|||
Search continues untill first matching entry found.If IP_FW_F_ACCEPT
|
||||
flag set - packet accepted.If it is not set - packet denied.
|
||||
If no matching entry found , all unmatched packets ever accepted or
|
||||
denied depending on global polici value. It can be set with
|
||||
denied depending on global policy value. It can be set with
|
||||
IP_FW_POLICY raw socket option. Deny value is 0, other values
|
||||
(default 1) is accept.
|
||||
|
||||
|
@ -175,7 +175,7 @@ entries rised.p_cnt rises by 1 and b_cnt by ip_len value of ip packet.
|
|||
Thus all traffic size counted including IP headers.
|
||||
|
||||
If IP_FW_F_BIDIR flag is set in accounting entry,packets counted are
|
||||
those which match entry in standart way along with packets which match
|
||||
those which match entry in standard way along with packets which match
|
||||
entry while their source and destination addr/port pairs swapped.
|
||||
|
||||
Zero option allows all accounting to be cleared.
|
||||
|
@ -198,9 +198,9 @@ been tracked,some less important ones expected.
|
|||
This man page is mostly out of date and should be rewritten.
|
||||
|
||||
.Sh HISTORY
|
||||
Ipfw facility has been intitially written as package to BSDI
|
||||
Ipfw facility has been initially written as package to BSDI
|
||||
by Daniel Boulet <danny@BouletFermat.ab.ca>.
|
||||
It has been havily modified and ported to FreeBSD 2.0
|
||||
It has been heavily modified and ported to FreeBSD 2.0
|
||||
by Ugen J.S.Antsilevich <ugen@NetVision.net.il>
|
||||
Ipacct facility written for FreeBSD 2.0
|
||||
by Ugen J.S.Antsilevich <ugen@NetVision.net.il>
|
||||
|
|
|
@ -144,7 +144,7 @@ length structures, we have separated the selector lengths
|
|||
from the data themselves.
|
||||
The network address and various selectors are stored contiguously,
|
||||
with the network address first, then the transport selector, and so
|
||||
on. Thus, if you had a nework address of less then 20 bytes,
|
||||
on. Thus, if you had a network address of less then 20 bytes,
|
||||
the transport selector would encroach on space normally reserved
|
||||
for the network address.
|
||||
.Pp
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: lkm.4,v 1.3 1995/04/05 01:06:00 jkh Exp $
|
||||
.\" $Id: lkm.4,v 1.4 1996/01/17 21:07:38 wollman Exp $
|
||||
.\"
|
||||
.Dd January 17, 1996
|
||||
.Dt LKM 4
|
||||
|
@ -38,7 +38,7 @@ This ability also helps software developers to develop
|
|||
new parts of the kernel without constantly rebooting to
|
||||
test their changes.
|
||||
.Pp
|
||||
Various types of modules can be loaded into the sytem.
|
||||
Various types of modules can be loaded into the system.
|
||||
There are several defined module types, listed below, which can
|
||||
be added to the system in a predefined way. In addition, there
|
||||
is a generic type, for which the module itself handles loading and
|
||||
|
|
|
@ -40,7 +40,7 @@ adapter driver
|
|||
.Xr ahc 4 ) .
|
||||
A
|
||||
.Tn SCSI
|
||||
adapter must also be separatly configured into the system
|
||||
adapter must also be separately configured into the system
|
||||
before a
|
||||
.Tn SCSI
|
||||
tape can be configured.
|
||||
|
@ -196,10 +196,10 @@ When reading a variable record/block from the tape, the head is
|
|||
logically considered to be immediately after the last item read,
|
||||
and before the next item after that. If the next item is a file mark,
|
||||
but it was never read, then the next
|
||||
process to read will immediately hit the file mark and receive an end-of-file nification.
|
||||
process to read will immediately hit the file mark and receive an end-of-file notification.
|
||||
.It Fixed block-size
|
||||
Data written by the user is passed to the tape as a succession of
|
||||
fixed size blocks. It may be contiguouse in memory, but it is
|
||||
fixed size blocks. It may be contiguous in memory, but it is
|
||||
considered to be a series of independent blocks. One may never write
|
||||
an amount of data that is not an exact multiple of the blocksize. One
|
||||
may read and write the same data as a different set of records, In
|
||||
|
@ -224,23 +224,23 @@ understand why) that certain types of tape do not actually write two
|
|||
file marks to tape, but when read, report a `phantom' file mark when the
|
||||
last file is read. These devices include the QIC family of devices.
|
||||
(It might be that this set of devices is the same set as that of fixed
|
||||
block devices. This has not been detirmined yet, and they are treated
|
||||
block devices. This has not been determined yet, and they are treated
|
||||
as separate behaviors by the driver at this time.)
|
||||
.Sh KERNEL CONFIGURATION
|
||||
Because different tape drives behave differently, there is a mechanism
|
||||
within the source to
|
||||
.Nm
|
||||
to quickly and conveniently recognise and deal
|
||||
to quickly and conveniently recognize and deal
|
||||
with brands and models of drive that have special requirements.
|
||||
.Pp
|
||||
There is a table (called the
|
||||
.Dq Em Rogues Gallery )
|
||||
in which the indentification
|
||||
in which the identification
|
||||
strings of known errant drives can be stored. Alongside each is
|
||||
a set of flags that allows the setting of densities and blocksizes for each
|
||||
of the four modes, along with a set of `QUIRK' flags that can be
|
||||
used to enable or disable sections of code within the driver if a particular
|
||||
drive is recognised.
|
||||
drive is recognized.
|
||||
.Sh IOCTLS
|
||||
The following
|
||||
.Xr ioctl 2
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
The
|
||||
.Em scsi
|
||||
system provides a uniform and modular system for the implementation
|
||||
of drivers to control various scsi devices, and to utilise different
|
||||
of drivers to control various scsi devices, and to utilize different
|
||||
scsi host adapters through host adapter drivers. When the system probes the
|
||||
.Em SCSI
|
||||
busses, it attaches any devices it finds to the appropriate
|
||||
|
@ -53,9 +53,9 @@ a config line similar to
|
|||
.Em "controller scbus0 at ahc0"
|
||||
which assigns scsi bus 0 to the first unit using the ahc driver.
|
||||
For controllers supporting more than one bus,
|
||||
the particualar bus can be specified as in
|
||||
the particular bus can be specified as in
|
||||
.Em "controller scbus3 at ahc1 bus 1"
|
||||
which assigns scbus 1 to the second bus probled on the ahc1 device.
|
||||
which assigns scbus 1 to the second bus probed on the ahc1 device.
|
||||
.Pp
|
||||
When you have a mixture of wired down and counted devices then the
|
||||
counting begins with the first non-wired down unit for a particular
|
||||
|
@ -97,7 +97,7 @@ be related to the device on which the ioctl was performed.
|
|||
.It Dv SCIOCIDENTIFY
|
||||
Ask the driver what it's bus, target and lun are.
|
||||
.It Dv SCIOCDECONFIG
|
||||
Ask the device to dissappear. This may not happen if the device is in use.
|
||||
Ask the device to disappear. This may not happen if the device is in use.
|
||||
.El
|
||||
.Sh NOTES
|
||||
the generic scsi part of the system is still being mapped out.
|
||||
|
@ -119,7 +119,7 @@ many can transfer larger amounts.
|
|||
Some adapters support
|
||||
.Em Target mode
|
||||
in which the system is capable of operating as a device, responding to
|
||||
operations initioated by another system. Target mode will be supported for
|
||||
operations initiated by another system. Target mode will be supported for
|
||||
some adapters, but is not yet complete for this version of the scsi system.
|
||||
.Sh FILES
|
||||
see other scsi device entries.
|
||||
|
|
|
@ -56,7 +56,7 @@ devices on the
|
|||
.Tn SCSI
|
||||
bus to particular units of the
|
||||
.Nm
|
||||
decice; refer to
|
||||
device; refer to
|
||||
.Xr scsi 4
|
||||
for details on kernel configuration.
|
||||
.Sh PARTITIONING
|
||||
|
@ -111,11 +111,11 @@ disks as well as to other disks. They are defined in the header file
|
|||
Usually used to set up a bad-block mapping system on the disk.
|
||||
.Tn SCSI
|
||||
drive incorporate their own bad-block mapping so this command is not
|
||||
implimented.
|
||||
implemented.
|
||||
.It Dv DIOCGDINFO
|
||||
Read, from the kernel, the in-core copy of the disklabel for the
|
||||
drive. This may be a ficticious disklabel if the drive has never
|
||||
been initialised, in which case it will contain information read
|
||||
drive. This may be a fictitious disklabel if the drive has never
|
||||
been initialized, in which case it will contain information read
|
||||
from the
|
||||
.Tn SCSI
|
||||
inquiry commands.
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
.\"
|
||||
.\" $Id: snp.4,v 1.5 1995/02/27 19:45:57 ugen Exp $
|
||||
.\" $Id: snp.4,v 1.6 1995/02/28 00:24:47 pst Exp $
|
||||
.\" $Source: /home/ncvs/src/share/man/man4/snp.4,v $
|
||||
.\"
|
||||
.Dd February 24, 1995
|
||||
|
@ -41,13 +41,13 @@ in a read buffer.
|
|||
Special values defined are:
|
||||
.Bl -tag -width SNP_TTYCLOSE
|
||||
.It Dv SNP_OFLOW
|
||||
device overflow occured, device detatched.
|
||||
device overflow occured, device detached.
|
||||
.It Dv SNP_TTYCLOSE
|
||||
tty not attached.
|
||||
.It Dv SNP_DETACH
|
||||
.Nm snp
|
||||
device has been detatched by user or tty device has been closed
|
||||
and detatched.
|
||||
device has been detached by user or tty device has been closed
|
||||
and detached.
|
||||
.Sh SEE ALSO
|
||||
.Xr watch 8 ,
|
||||
.Xr pty 4 ,
|
||||
|
|
|
@ -40,7 +40,7 @@ adapter driver
|
|||
.Xr ahc 4 ) .
|
||||
A
|
||||
.Tn SCSI
|
||||
adapter must also be separatly configured into the system
|
||||
adapter must also be separately configured into the system
|
||||
before a
|
||||
.Tn SCSI
|
||||
tape can be configured.
|
||||
|
@ -196,10 +196,10 @@ When reading a variable record/block from the tape, the head is
|
|||
logically considered to be immediately after the last item read,
|
||||
and before the next item after that. If the next item is a file mark,
|
||||
but it was never read, then the next
|
||||
process to read will immediately hit the file mark and receive an end-of-file nification.
|
||||
process to read will immediately hit the file mark and receive an end-of-file notification.
|
||||
.It Fixed block-size
|
||||
Data written by the user is passed to the tape as a succession of
|
||||
fixed size blocks. It may be contiguouse in memory, but it is
|
||||
fixed size blocks. It may be contiguous in memory, but it is
|
||||
considered to be a series of independent blocks. One may never write
|
||||
an amount of data that is not an exact multiple of the blocksize. One
|
||||
may read and write the same data as a different set of records, In
|
||||
|
@ -224,23 +224,23 @@ understand why) that certain types of tape do not actually write two
|
|||
file marks to tape, but when read, report a `phantom' file mark when the
|
||||
last file is read. These devices include the QIC family of devices.
|
||||
(It might be that this set of devices is the same set as that of fixed
|
||||
block devices. This has not been detirmined yet, and they are treated
|
||||
block devices. This has not been determined yet, and they are treated
|
||||
as separate behaviors by the driver at this time.)
|
||||
.Sh KERNEL CONFIGURATION
|
||||
Because different tape drives behave differently, there is a mechanism
|
||||
within the source to
|
||||
.Nm
|
||||
to quickly and conveniently recognise and deal
|
||||
to quickly and conveniently recognize and deal
|
||||
with brands and models of drive that have special requirements.
|
||||
.Pp
|
||||
There is a table (called the
|
||||
.Dq Em Rogues Gallery )
|
||||
in which the indentification
|
||||
in which the identification
|
||||
strings of known errant drives can be stored. Alongside each is
|
||||
a set of flags that allows the setting of densities and blocksizes for each
|
||||
of the four modes, along with a set of `QUIRK' flags that can be
|
||||
used to enable or disable sections of code within the driver if a particular
|
||||
drive is recognised.
|
||||
drive is recognized.
|
||||
.Sh IOCTLS
|
||||
The following
|
||||
.Xr ioctl 2
|
||||
|
|
|
@ -14,7 +14,7 @@ process to address arbitrary locations on the scsi bus. Minor
|
|||
numbers are mapped 1:1 to bus:target:lun. The lowest three bits being LUN
|
||||
and the next three bits being TARGET. Remaining bits are the bus number.
|
||||
.Pp
|
||||
A scsi adapter must also be separatly configured into the system
|
||||
A scsi adapter must also be separately configured into the system
|
||||
before this driver makes sense.
|
||||
.Pp
|
||||
.Sh THE SU DEVICE IS NOT COMPLETED YET
|
||||
|
@ -41,7 +41,7 @@ su{x}-{y}-{z} is the su device for the device at bus x, target y, lun z
|
|||
.Sh DIAGNOSTICS
|
||||
All
|
||||
.Xr scsi 4
|
||||
debug ioclts work on
|
||||
debug ioctls work on
|
||||
.Nm
|
||||
devices.
|
||||
.Sh SEE ALSO
|
||||
|
|
|
@ -359,7 +359,7 @@ Clear To Send.
|
|||
.It TIOCM_CAR
|
||||
Carrier Detect.
|
||||
.It TIOCM_CD
|
||||
Carier Detect (synonym).
|
||||
Carrier Detect (synonym).
|
||||
.It TIOCM_RNG
|
||||
Ring Indication.
|
||||
.It TIOCM_RI
|
||||
|
|
|
@ -52,7 +52,7 @@ uk{x} is the 'xth'unknown device found.
|
|||
.Sh DIAGNOSTICS
|
||||
All
|
||||
.Xr scsi 4
|
||||
debug ioclts work on
|
||||
debug ioctls work on
|
||||
.Nm
|
||||
devices.
|
||||
.Sh SEE ALSO
|
||||
|
|
|
@ -32,7 +32,7 @@
|
|||
.\" USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
|
||||
.\" DAMAGE.
|
||||
.\"
|
||||
.\" $Id: worm.4,v 1.1 1996/01/27 17:00:24 j Exp $
|
||||
.\" $Id: worm.4,v 1.2 1996/01/27 17:55:54 joerg Exp $
|
||||
.\"
|
||||
.Dd January 27, 1996
|
||||
.Dt WORM 4
|
||||
|
@ -81,7 +81,7 @@ will be replaced by a loadable module scenario in the future.
|
|||
.Pp
|
||||
Due to the requirement of adjusting several parameters before actually
|
||||
being able to write some data to the CD-R, and due to the tight timing
|
||||
requirements when writing data, the driver distinguishs two different
|
||||
requirements when writing data, the driver distinguishes two different
|
||||
operation modes. When opening a file descriptor for a device belonging
|
||||
to the
|
||||
.Nm
|
||||
|
|
|
@ -26,7 +26,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" from: @(#)yp.8 1.0 (deraadt) 4/26/93
|
||||
.\" $Id: yp.4,v 1.3 1995/03/23 06:05:04 jkh Exp $
|
||||
.\" $Id: yp.4,v 1.4 1995/09/02 04:20:01 wpaul Exp $
|
||||
.\"
|
||||
.Dd April 5, 1993
|
||||
.Dt YP 4
|
||||
|
@ -110,7 +110,7 @@ into
|
|||
.Nm .dir
|
||||
and
|
||||
.Nm .pag
|
||||
files which the ndbm code uses to hold seperate parts of the hash
|
||||
files which the ndbm code uses to hold separate parts of the hash
|
||||
database. The Berkeley DB hash method instead uses a single file for
|
||||
both pieces of information. This means that while you may have
|
||||
.Pa passwd.byname.dir
|
||||
|
@ -162,7 +162,7 @@ on, the client system will direct all of its NIS requests to that server.
|
|||
.Xr Ypbind 8
|
||||
will occasionally ``ping'' the server to make sure it's still up
|
||||
and running. If it fails to receive a reply to one of its pings
|
||||
withing a reasonable amount of time,
|
||||
within a reasonable amount of time,
|
||||
.Xr ypbind 8
|
||||
will mark the domain as unbound and begin broadcasting again in the
|
||||
hopes of locating another server.
|
||||
|
@ -202,7 +202,7 @@ key/data pair immediately following it (yp_first() and yp_next()
|
|||
can be used to do a sequential search of an NIS map)
|
||||
.It
|
||||
.Nm yp_all()
|
||||
-- retreive the entire contents of a map
|
||||
-- retrieve the entire contents of a map
|
||||
.El
|
||||
.Pp
|
||||
There are a few other requests which
|
||||
|
@ -245,7 +245,7 @@ networks by:
|
|||
.Bl -bullet -offset indent
|
||||
.It
|
||||
Providing backup services in the event that the NIS master crashes
|
||||
or becomes unreachanble
|
||||
or becomes unreachable
|
||||
.It
|
||||
Spreading the client load out over several machines instead of
|
||||
causing the master to become overloaded
|
||||
|
@ -269,9 +269,9 @@ other NIS implementations) when used exclusively with FreeBSD client
|
|||
systems. The FreeBSD password database system (which is derived directly
|
||||
form 4.4BSD) includes support for
|
||||
.Nm shadow passwords .
|
||||
The standard password database does not contain users' encrpyted
|
||||
The standard password database does not contain users' encrypted
|
||||
passwords: these are instead stored (along with other information)
|
||||
is a seperate database which is accesible only by the super-user.
|
||||
is a separate database which is accessible only by the super-user.
|
||||
If the encrypted password database were made available as an NIS
|
||||
map, this security feature would be totally disabled, since any user
|
||||
is allowed to retrieve NIS data.
|
||||
|
@ -370,7 +370,7 @@ upon bootup.
|
|||
The
|
||||
.Nm YP
|
||||
subsystem was written from the ground up by Theo de Raadt
|
||||
to be compatible to Sun's implimentation. Bug fixes, improvements
|
||||
to be compatible to Sun's implementation. Bug fixes, improvements
|
||||
and NIS server support were later added by Bill Paul. The server-side
|
||||
code was originally written by Peter Eriksson and Tobias Reber and
|
||||
is subject to the GNU Public License. No Sun code was
|
||||
|
|
|
@ -33,7 +33,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" @(#)a.out.5 8.1 (Berkeley) 6/5/93
|
||||
.\" $Id$
|
||||
.\" $Id: a.out.5,v 1.2 1994/12/23 22:41:45 nate Exp $
|
||||
.\"
|
||||
.Dd June 5, 1993
|
||||
.Dt A.OUT 5
|
||||
|
@ -126,7 +126,7 @@ flag and is preserved by
|
|||
if necessary.
|
||||
.El
|
||||
.Pp
|
||||
If both EX_DYNAMIC and EX_PIC are set, the object file is a position indendent
|
||||
If both EX_DYNAMIC and EX_PIC are set, the object file is a position independent
|
||||
executable image (eg. a shared library), which is to be loaded into the
|
||||
process address space by the run-time link editor.
|
||||
.Pp
|
||||
|
|
|
@ -51,7 +51,7 @@ entry.
|
|||
It consists of records (directory entries) each of which contains
|
||||
information about a file and a pointer to the file itself.
|
||||
Directory entries may contain other directories
|
||||
as well as plain files; such nested directories are refered to as
|
||||
as well as plain files; such nested directories are referred to as
|
||||
subdirectories.
|
||||
A hierarchy of directories and files is formed in this manner
|
||||
and is called a file system (or referred to as a file system tree).
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: ethers.5,v 1.1 1995/04/12 22:16:08 wpaul Exp $
|
||||
.\"
|
||||
.Dd April 12, 1995
|
||||
.Dt ETHERS 5
|
||||
|
@ -73,10 +73,10 @@ file.
|
|||
.Pp
|
||||
The
|
||||
.Fn ether_line
|
||||
function in the standarc C library can be used to break individual
|
||||
function in the standard C library can be used to break individual
|
||||
lines in the
|
||||
.Pa /etc/ethers
|
||||
database into their individial components: a binary ethernet address
|
||||
database into their individual components: a binary Ethernet address
|
||||
stored as an
|
||||
.Pa ether_addr
|
||||
structure, and a hostname stored as a character string.
|
||||
|
|
|
@ -26,7 +26,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: link.5,v 1.2 1995/04/16 12:35:13 ats Exp $
|
||||
.\" $Id: link.5,v 1.3 1996/01/20 07:29:06 mpp Exp $
|
||||
.\"
|
||||
.Dd October 23, 1993
|
||||
.Dt LINK 5
|
||||
|
@ -52,7 +52,7 @@ to other objects that are required to complete the link-editing process and
|
|||
indirection tables to facilitate
|
||||
.Em Position Independent Code
|
||||
(PIC for short) to improve sharing of code pages among different processes.
|
||||
The collection of data structures described here will be refered to as the
|
||||
The collection of data structures described here will be referred to as the
|
||||
.Em Run-time Relocation Section (RRS)
|
||||
and is embedded in the standard text and data segments of the dynamically
|
||||
linked program or shared object image as the existing
|
||||
|
@ -67,7 +67,7 @@ can be built by
|
|||
The compiler also includes size information of any initialized data items
|
||||
through the .size assembler directive. PIC code differs from conventional code
|
||||
in that it accesses data variables through an indirection table, the
|
||||
Global Offset Table, by convention accessable by the reserved name
|
||||
Global Offset Table, by convention accessible by the reserved name
|
||||
.Em _GLOBAL_OFFSET_TABLE_.
|
||||
The exact mechanism used for this is machine dependent, usually a machine
|
||||
register is reserved for the purpose. The rational behind this construct
|
||||
|
@ -166,7 +166,7 @@ The start of a (linked) list of shared object descriptors needed by
|
|||
.Em this
|
||||
object.
|
||||
.It Fa sdt_filler1
|
||||
Depricated (used by SunOS to specify library search rules).
|
||||
Deprecated (used by SunOS to specify library search rules).
|
||||
.It Fa sdt_got
|
||||
The location of the Global Offset Table within this image.
|
||||
.It Fa sdt_plt
|
||||
|
@ -203,7 +203,7 @@ The size of the Procedure Linkage Table.
|
|||
.Pp
|
||||
A
|
||||
.Fa sod
|
||||
structure descibes a shared object that is needed
|
||||
structure describes a shared object that is needed
|
||||
to complete the link edit process of the object containing it.
|
||||
A list of such objects
|
||||
.Po
|
||||
|
|
|
@ -204,16 +204,16 @@ file):
|
|||
|
||||
.Ed
|
||||
Specific usernames are listed explicitly while netgroups are signfied
|
||||
by a preceeding `@'. In the above example, users in the ``staff'' and
|
||||
by a preceding `@'. In the above example, users in the ``staff'' and
|
||||
``permitted-users'' netgroups will have their password information
|
||||
read from NIS and used unaltered. In other worrds, they will be allowed
|
||||
read from NIS and used unaltered. In other words, they will be allowed
|
||||
normal access to the machine. Users ``ken'' and ``dennis,'' who have
|
||||
beed named explicitly rather than through a netgroup, will also have
|
||||
been named explicitly rather than through a netgroup, will also have
|
||||
their password data read from NIS, _except_ that user ``ken'' will
|
||||
have his shell remapped to
|
||||
.Pa /bin/csh .
|
||||
This means that value for his shell specified in the NIS password map
|
||||
will be overriden by the value specified in the special NIS entry in
|
||||
will be overridden by the value specified in the special NIS entry in
|
||||
the local
|
||||
.Pa master.passwd
|
||||
file. User ``ken'' may have been assigned the csh shell because his
|
||||
|
@ -235,7 +235,7 @@ who might otherwise be granted access because he happens to be a
|
|||
member of an authorized netgroup. For example, if ``mitnick'' is
|
||||
a member of the ``permitted-users'' netgroup and must, for whatever
|
||||
the reason, be permitted to remain in that netgroup (possibly to
|
||||
retain access to other machines within the domain), the admistrator
|
||||
retain access to other machines within the domain), the administrator
|
||||
can still deny him access to a particular system with a minus entry.
|
||||
Also, it is sometimes easier to explicitly list those users who aren't
|
||||
allowed access rather than generate a possibly complicated list of
|
||||
|
@ -275,8 +275,8 @@ any of the other entries.
|
|||
.Pa /usr/local/bin/go_away
|
||||
can be a short shell script or program
|
||||
that prints a message telling the user that he is not allowed access
|
||||
to the system. This technique is sometimes userful when it is
|
||||
desireable to have the system be able to recognize all users in a
|
||||
to the system. This technique is sometimes useful when it is
|
||||
desirable to have the system be able to recognize all users in a
|
||||
particular NIS domain without necessarily granting them login access.
|
||||
.Pp
|
||||
The primary use of this
|
||||
|
@ -306,7 +306,7 @@ into the NIS passwd maps totally defeats the security of FreeBSD's
|
|||
password shadowing system.
|
||||
.Pp
|
||||
FreeBSD provides a few special features to help get around this
|
||||
problem. It is possible to implement password shawdowing between
|
||||
problem. It is possible to implement password shadowing between
|
||||
FreeBSD NIS clients and FreeBSD NIS servers. The
|
||||
.Xr getpwent 3
|
||||
routines will search for a
|
||||
|
@ -357,7 +357,7 @@ entry:
|
|||
This entry will cause all users in the `foo-users' netgroup to
|
||||
have
|
||||
.Pa all
|
||||
of their password information overriden, including UIDs,
|
||||
of their password information overridden, including UIDs,
|
||||
GIDs and passwords. The result is that all `foo-users' will be
|
||||
locked out of the system, since their passwords will be remapped
|
||||
to invalid values.
|
||||
|
@ -368,7 +368,7 @@ using an NIS wildcard entry that looks like this:
|
|||
+:*:0:0:::
|
||||
|
||||
.Ed
|
||||
This often leads to new FreeBSD admins choosing NIS entries for their
|
||||
This often leads to new FreeBSD administrators choosing NIS entries for their
|
||||
.Pa master.passwd
|
||||
files that look like this:
|
||||
.Bd -literal -offset indent
|
||||
|
@ -457,7 +457,7 @@ the password space.
|
|||
.Pp
|
||||
In %99 of all FreeBSD configurations, NIS client behavior will be
|
||||
indistinguishable from that of SunOS or other similar systems. Even
|
||||
so, users should be aware of these architctural differences.
|
||||
so, users should be aware of these architectural differences.
|
||||
.Pp
|
||||
.Ss Using groups instead of netgroups for NIS overrides
|
||||
FreeBSD offers the capability to do override matching based on
|
||||
|
@ -545,7 +545,7 @@ Unless you're using FreeBSD's
|
|||
.Xr ypserv 8 ,
|
||||
which supports the use of
|
||||
.Pa master.passwd
|
||||
stype maps,
|
||||
type maps,
|
||||
the YP/NIS password database will be in old-style (Sixth Edition) format,
|
||||
which means that site-wide values for user login class, password
|
||||
expiration date, and other fields present in the current format
|
||||
|
|
|
@ -72,7 +72,7 @@ Access to the NIS
|
|||
map can be enabled by adding a single ``+'' on a line by itself
|
||||
in the
|
||||
.Pa /etc/services
|
||||
file. This causes the contenits of the NIS services map to be inserted
|
||||
file. This causes the contents of the NIS services map to be inserted
|
||||
at the location where the ``+'' appears.
|
||||
.Sh FILES
|
||||
.Bl -tag -width /etc/services -compact
|
||||
|
|
|
@ -4,11 +4,11 @@
|
|||
.Os FreeBSD 1.2
|
||||
.Sh NAME
|
||||
.Nm skey.access
|
||||
.Nd List of S/Key obligated host adresses
|
||||
.Nd List of S/Key obligated host addresses
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Nm skey.access
|
||||
file contains a number of lines specifying host IP adresses
|
||||
file contains a number of lines specifying host IP addresses
|
||||
for which the use of S/Key passwords is obligated.
|
||||
.Pp
|
||||
The first word of each line says if UNIX passwords are
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: sysconfig.5,v 1.1 1995/12/19 13:35:31 jkh Exp $
|
||||
.\"
|
||||
.Dd December 18, 1995
|
||||
.Dt SYSCONFIG 5
|
||||
|
@ -174,7 +174,7 @@ where more precise time synchronization is required.
|
|||
with or
|
||||
.Ar NO
|
||||
if you do not wish to initialize the time with ntpdate. This command is
|
||||
intended to syncronize the system clock only \fBonce\fR from some standard
|
||||
intended to synchronize the system clock only \fBonce\fR from some standard
|
||||
server. An option to set this up initially (from a list of known servers)
|
||||
is also provided by the \fB/stand/sysinstall\fR program when the system
|
||||
is first installed.
|
||||
|
|
|
@ -1431,7 +1431,7 @@ The usual font for emphasis is italic.
|
|||
.\" We are certain the reason most people desire a Harvard MBA
|
||||
.\" so they can become to be successful philanthropists. Only
|
||||
.\" mathematicians and physicists go to graduate school strictly
|
||||
.\" to acquire infinite wealthy and fame. Its that inifinity
|
||||
.\" to acquire infinite wealthy and fame. Its that infinity
|
||||
.\" word that does it to them. Ruins them.
|
||||
.\" .Ef
|
||||
.Pp
|
||||
|
|
|
@ -26,7 +26,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" from: @(#)yp.8 1.0 (deraadt) 4/26/93
|
||||
.\" $Id: yp.4,v 1.3 1995/03/23 06:05:04 jkh Exp $
|
||||
.\" $Id: yp.4,v 1.4 1995/09/02 04:20:01 wpaul Exp $
|
||||
.\"
|
||||
.Dd April 5, 1993
|
||||
.Dt YP 4
|
||||
|
@ -110,7 +110,7 @@ into
|
|||
.Nm .dir
|
||||
and
|
||||
.Nm .pag
|
||||
files which the ndbm code uses to hold seperate parts of the hash
|
||||
files which the ndbm code uses to hold separate parts of the hash
|
||||
database. The Berkeley DB hash method instead uses a single file for
|
||||
both pieces of information. This means that while you may have
|
||||
.Pa passwd.byname.dir
|
||||
|
@ -162,7 +162,7 @@ on, the client system will direct all of its NIS requests to that server.
|
|||
.Xr Ypbind 8
|
||||
will occasionally ``ping'' the server to make sure it's still up
|
||||
and running. If it fails to receive a reply to one of its pings
|
||||
withing a reasonable amount of time,
|
||||
within a reasonable amount of time,
|
||||
.Xr ypbind 8
|
||||
will mark the domain as unbound and begin broadcasting again in the
|
||||
hopes of locating another server.
|
||||
|
@ -202,7 +202,7 @@ key/data pair immediately following it (yp_first() and yp_next()
|
|||
can be used to do a sequential search of an NIS map)
|
||||
.It
|
||||
.Nm yp_all()
|
||||
-- retreive the entire contents of a map
|
||||
-- retrieve the entire contents of a map
|
||||
.El
|
||||
.Pp
|
||||
There are a few other requests which
|
||||
|
@ -245,7 +245,7 @@ networks by:
|
|||
.Bl -bullet -offset indent
|
||||
.It
|
||||
Providing backup services in the event that the NIS master crashes
|
||||
or becomes unreachanble
|
||||
or becomes unreachable
|
||||
.It
|
||||
Spreading the client load out over several machines instead of
|
||||
causing the master to become overloaded
|
||||
|
@ -269,9 +269,9 @@ other NIS implementations) when used exclusively with FreeBSD client
|
|||
systems. The FreeBSD password database system (which is derived directly
|
||||
form 4.4BSD) includes support for
|
||||
.Nm shadow passwords .
|
||||
The standard password database does not contain users' encrpyted
|
||||
The standard password database does not contain users' encrypted
|
||||
passwords: these are instead stored (along with other information)
|
||||
is a seperate database which is accesible only by the super-user.
|
||||
is a separate database which is accessible only by the super-user.
|
||||
If the encrypted password database were made available as an NIS
|
||||
map, this security feature would be totally disabled, since any user
|
||||
is allowed to retrieve NIS data.
|
||||
|
@ -370,7 +370,7 @@ upon bootup.
|
|||
The
|
||||
.Nm YP
|
||||
subsystem was written from the ground up by Theo de Raadt
|
||||
to be compatible to Sun's implimentation. Bug fixes, improvements
|
||||
to be compatible to Sun's implementation. Bug fixes, improvements
|
||||
and NIS server support were later added by Bill Paul. The server-side
|
||||
code was originally written by Peter Eriksson and Tobias Reber and
|
||||
is subject to the GNU Public License. No Sun code was
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: devfs_add_devsw.9,v 1.1 1995/12/31 00:08:17 joerg Exp $
|
||||
.\"
|
||||
.Dd December 31, 1995
|
||||
.Os FreeBSD
|
||||
|
@ -41,7 +41,7 @@
|
|||
The call that adds an entry into devfs is
|
||||
.Nm devfs_add_devsw .
|
||||
.Pp
|
||||
It's argumants are:
|
||||
It's arguments are:
|
||||
.Bl -tag -width 8X
|
||||
.It Ar path
|
||||
the path to the device within DEVFS
|
||||
|
|
|
@ -82,7 +82,7 @@ in
|
|||
#endif /* DDB */
|
||||
.Ed
|
||||
|
||||
And the name of the procedure shoule start with the prefix
|
||||
And the name of the procedure should start with the prefix
|
||||
.Li DDB_
|
||||
to clearly identify the procedure as a debugger routine.
|
||||
.El
|
||||
|
@ -95,7 +95,7 @@ the opposite.
|
|||
|
||||
There are several reasons for this policy,
|
||||
the main one is that the kernel is one monolithic name-space,
|
||||
and polution is not a good idea here either.
|
||||
and pollution is not a good idea here either.
|
||||
|
||||
For device drivers and other modules that don't add new internal interfaces
|
||||
to the kernel, the entire source should be in one file it possible.
|
||||
|
|
|
@ -84,7 +84,7 @@ that take arguments are tagged automatically.
|
|||
.It Fl f
|
||||
Places the tag descriptions in a file called
|
||||
.Ar tagsfile .
|
||||
The default behaviour is to place them in a file called
|
||||
The default behavior is to place them in a file called
|
||||
.Ar tags .
|
||||
.It Fl t
|
||||
create tags for typedefs, structs, unions, and enums.
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
.\"
|
||||
.\" nroff -man ee.1
|
||||
.\"
|
||||
.\" $Header: /users/hugh/tmp/old_ae/ee.1,v 1.16 1993/06/22 04:18:33 hugh Exp $
|
||||
.\" $Header: /home/ncvs/src/usr.bin/ee/ee.1,v 1.1.1.1 1995/08/30 07:28:06 jkh Exp $
|
||||
.\"
|
||||
.\"
|
||||
.TH ee 1 "" "" "" ""
|
||||
|
@ -143,7 +143,7 @@ menu, or via the initialization file (see below). The mappings are as follows:
|
|||
^t Move to the top of the text.
|
||||
^u Move to the bottom of the text.
|
||||
^v Move to the next page.
|
||||
^w Delete the word begining at the cursor position.
|
||||
^w Delete the word beginning at the cursor position.
|
||||
^y Prompt for the string to search for.
|
||||
^z Next word.
|
||||
^[ (ESC) Pop up menu.
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
.TH FILE 1 "Copyright but distributable"
|
||||
.\# $Id: file.1,v 1.2 1994/09/03 19:31:15 csgr Exp $
|
||||
.\# $Id: file.1,v 1.3 1996/01/23 12:40:09 mpp Exp $
|
||||
.SH NAME
|
||||
file
|
||||
\- determine file type
|
||||
|
@ -144,7 +144,7 @@ can be used to set the default magic number files.
|
|||
This program is believed to exceed the System V Interface Definition
|
||||
of FILE(CMD), as near as one can determine from the vague language
|
||||
contained therein.
|
||||
Its behaviour is mostly compatible with the System V program of the same name.
|
||||
Its behavior is mostly compatible with the System V program of the same name.
|
||||
This version knows more magic, however, so it will produce
|
||||
different (albeit more accurate) output in many cases.
|
||||
.PP
|
||||
|
@ -323,7 +323,7 @@ The list of keywords in
|
|||
probably belongs in the Magic file.
|
||||
This could be done by using some keyword like `*' for the offset value.
|
||||
.PP
|
||||
Another optimisation would be to sort
|
||||
Another optimization would be to sort
|
||||
the magic file so that we can just run down all the
|
||||
tests for the first byte, first word, first long, etc, once we
|
||||
have fetched it. Complain about conflicts in the magic file entries.
|
||||
|
|
|
@ -185,7 +185,7 @@ current remote machine working directory.
|
|||
Change the permission modes of the file
|
||||
.Ar file-name
|
||||
on the remote
|
||||
sytem to
|
||||
system to
|
||||
.Ar mode .
|
||||
.It Ic close
|
||||
Terminate the
|
||||
|
|
|
@ -86,7 +86,7 @@ Whatever
|
|||
.Xr getopt 3
|
||||
has.
|
||||
.Pp
|
||||
Arguments containing white space or imbedded shell metacharacters
|
||||
Arguments containing white space or embedded shell metacharacters
|
||||
generally will not survive intact; this looks easy to fix but isn't.
|
||||
.Pp
|
||||
The error message for an invalid option is identified as coming
|
||||
|
|
|
@ -37,12 +37,12 @@ machine to generate the first one time password. Without the \-s the
|
|||
system will assume you are direct connected over secure communications
|
||||
and prompt you for your secret password.
|
||||
The \-s option also allows one to set the seed and count for complete
|
||||
control of the parameters. You can use keyinit -s in compination with
|
||||
control of the parameters. You can use keyinit -s in combination with
|
||||
the
|
||||
.I key
|
||||
command to set the seed and count if you do not like the defaults.
|
||||
To do this run keyinit in one window and put in your count and seed
|
||||
then run key in another window to generate the correct 6 english words
|
||||
then run key in another window to generate the correct 6 English words
|
||||
for that count and seed. You can then
|
||||
"cut" and "paste" them or copy them into the keyinit window.
|
||||
.sp
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||
.\" POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: killall.1,v 1.1.1.1 1995/06/25 18:08:27 joerg Exp $
|
||||
.\"
|
||||
.Dd June 25, 1995
|
||||
.Os FreeBSD 2.2
|
||||
|
@ -99,7 +99,7 @@ The
|
|||
command will respond with a short usage message and exit with a status
|
||||
of 2 in case of a command error. A status of 1 will be returned if
|
||||
either no matching process has been found or not all processes have
|
||||
been signalled succesfully. Otherwise, a status of 0 will be
|
||||
been signalled successfully. Otherwise, a status of 0 will be
|
||||
returned.
|
||||
.Pp
|
||||
Diagnostic messages will only be printed if requested by
|
||||
|
|
|
@ -83,7 +83,7 @@ If the file
|
|||
.Pa /etc/nologin
|
||||
exists,
|
||||
.Nm login
|
||||
dislays its contents to the user and exits.
|
||||
displays its contents to the user and exits.
|
||||
This is used by
|
||||
.Xr shutdown 8
|
||||
to prevent users from logging in when the system is about to go down.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
.\" $Id: lsvfs.1,v 1.1 1994/09/22 01:25:56 wollman Exp $
|
||||
.\" $Id: lsvfs.1,v 1.2 1995/03/16 18:37:46 wollman Exp $
|
||||
.\" Garrett A. Wollman, September 1994
|
||||
.\" This file is in the public domain.
|
||||
.\"
|
||||
|
@ -50,6 +50,6 @@ is currently defined).
|
|||
.Sh HISTORY
|
||||
A
|
||||
.Nm
|
||||
comand appeared in
|
||||
command appeared in
|
||||
.Tn FreeBSD
|
||||
2.0.
|
||||
|
|
|
@ -232,7 +232,7 @@ Unexamined messages go back to the post office.
|
|||
.Fl f
|
||||
option above).
|
||||
.Pp
|
||||
.Ss Personal and systemwide distribution lists.
|
||||
.Ss Personal and system wide distribution lists.
|
||||
It is also possible to create a personal distribution lists so that,
|
||||
for instance, you can send mail to
|
||||
.Dq Li cohorts
|
||||
|
|
|
@ -128,7 +128,7 @@ appeared in
|
|||
.Sh BUGS
|
||||
.Nm mkstr
|
||||
was intended for the limited architecture of the PDP 11 family.
|
||||
Very few programs actually use it. The pascal interpreter,
|
||||
Very few programs actually use it. The Pascal interpreter,
|
||||
.Xr \&pi 1
|
||||
and the editor,
|
||||
.Xr \&ex 1
|
||||
|
|
|
@ -31,7 +31,7 @@
|
|||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: rup.1,v 1.1.1.1 1994/08/28 15:01:31 csgr Exp $
|
||||
.\" $Id: rup.1,v 1.2 1994/11/18 21:37:40 ats Exp $
|
||||
.\"
|
||||
.Dd June 7, 1993
|
||||
.Dt RUP 1
|
||||
|
@ -79,7 +79,7 @@ daemon has terminated on the remote host.
|
|||
.It rup: RPC: Port mapper failure - RPC: Timed out
|
||||
The remote host is not running the portmapper (see
|
||||
.Xr portmap 8 ),
|
||||
and cannot accomodate any RPC-based services. The host may be down.
|
||||
and cannot accommodate any RPC-based services. The host may be down.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr portmap 8 ,
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" from: @(#)rusers.1 6.7 (Berkeley) 4/23/91
|
||||
.\" $Id: rusers.1,v 1.1 1993/09/16 01:15:47 jtc Exp $
|
||||
.\" $Id: rusers.1,v 1.1.1.1 1994/08/28 15:06:02 csgr Exp $
|
||||
.\"
|
||||
.Dd April 23, 1991
|
||||
.Dt RUSERS 1
|
||||
|
@ -77,7 +77,7 @@ daemon has terminated on the remote host.
|
|||
.It rusers: RPC: Port mapper failure - RPC: Timed out
|
||||
The remote host is not running the portmapper (see
|
||||
.Xr portmap 8 ),
|
||||
and cannot accomodate any RPC-based services. The host may be down.
|
||||
and cannot accommodate any RPC-based services. The host may be down.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr portmap 8 ,
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id:$
|
||||
.\" $Id: sasc.1,v 1.2 1995/09/08 18:42:44 julian Exp $
|
||||
.\"
|
||||
.TH SASC 1 "January 6, 1995" FreeBSD "FreeBSD Reference Manual"
|
||||
.SH NAME
|
||||
|
@ -47,7 +47,7 @@
|
|||
The \fBsasc\fP utility provides shell level access to the ioctl
|
||||
requests served by the handy scanner device driver asc. Please see
|
||||
asc(4) for the exact meaning of the requests. Generally they modify
|
||||
the output and behaviour of the asc scanner device. When \fBsasc\fP is
|
||||
the output and behavior of the asc scanner device. When \fBsasc\fP is
|
||||
called with no option only the current settings are reported.
|
||||
.SH OPTIONS
|
||||
.TP 3
|
||||
|
@ -55,7 +55,7 @@ called with no option only the current settings are reported.
|
|||
Set the scanner with the values of the resolution selector switch.
|
||||
.TP
|
||||
\fB-q\fP
|
||||
Operate in quiet mode, i.e. do not report any of the current setings.
|
||||
Operate in quiet mode, i.e. do not report any of the current settings.
|
||||
Normally the parameters are shown after the modifications have been
|
||||
performed.
|
||||
.TP
|
||||
|
|
|
@ -99,8 +99,8 @@ containing a particular section can change when a document
|
|||
is modified, this provides a convenient hook by which separate
|
||||
documents can provide links into another document without the
|
||||
links becoming invalid when the target document is modified.
|
||||
When creating a symbolic link, any occurence of a slash (/) in label
|
||||
is replaced with percent (%), while any occurence of a space is replaced
|
||||
When creating a symbolic link, any occurrence of a slash (/) in label
|
||||
is replaced with percent (%), while any occurrence of a space is replaced
|
||||
with an underscore (_).
|
||||
.It Fl ssi
|
||||
When used with the
|
||||
|
@ -165,7 +165,7 @@ confuse
|
|||
.Xr groff 1
|
||||
which is used to generate ASCII output.
|
||||
.Pp
|
||||
The divison of the sources file into separate HTML files is
|
||||
The division of the sources file into separate HTML files is
|
||||
currently fixed.
|
||||
.Pp
|
||||
Although legal according to the DTD, it the ascii formatting gets botched if
|
||||
|
|
|
@ -175,6 +175,6 @@ that generated the warning.
|
|||
.SH BUGS
|
||||
More warning messages could be generated.
|
||||
.I tconv
|
||||
can't translate to termcap. Binaries generated will have cancelled
|
||||
capabilities marked as cancelled, which is incompatible with
|
||||
can't translate to termcap. Binaries generated will have canceled
|
||||
capabilities marked as canceled, which is incompatible with
|
||||
System V Release 2.0 terminfo.
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" From: @(#)install.1 8.1 (Berkeley) 6/6/93
|
||||
.\" $Id$
|
||||
.\" $Id: install.1,v 1.2 1995/10/09 07:20:59 bde Exp $
|
||||
.\"
|
||||
.Dd October 9, 1995
|
||||
.Dt INSTALL 1
|
||||
|
@ -71,7 +71,7 @@ allow.
|
|||
.It Fl C .
|
||||
Copy the file, as if the
|
||||
.Fl c
|
||||
option is specifed,
|
||||
option is specified,
|
||||
except if the target file already exists and the files are the same,
|
||||
then don't change the modification time of the target
|
||||
.It Fl c
|
||||
|
@ -110,7 +110,7 @@ Specify an owner.
|
|||
Preserve the modification time.
|
||||
Copy the file, as if the
|
||||
.Fl C
|
||||
(Compare and copy) option is specifed,
|
||||
(Compare and copy) option is specified,
|
||||
except if the target file doesn't already exist or is different,
|
||||
then preserve the modification time of the file.
|
||||
.It Fl s
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
.\" must display the following acknowledgement:
|
||||
.\" This product includes software developed by Winning Strategies, Inc.
|
||||
.\" 4. The name of the author may not be used to endorse or promote products
|
||||
.\" derived from this software withough specific prior written permission
|
||||
.\" derived from this software without specific prior written permission
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
||||
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
||||
|
@ -26,7 +26,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ypcat.1,v 1.1 1994/01/11 19:01:27 nate Exp $
|
||||
.\" $Id: ypcat.1,v 1.1 1994/08/08 01:13:29 wollman Exp $
|
||||
.\"
|
||||
.Dd December 3, 1993
|
||||
.Dt YPCAT 1
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
.\" must display the following acknowledgement:
|
||||
.\" This product includes software developed by Winning Strategies, Inc.
|
||||
.\" 4. The name of the author may not be used to endorse or promote products
|
||||
.\" derived from this software withough specific prior written permission
|
||||
.\" derived from this software without specific prior written permission
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
||||
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
||||
|
@ -26,7 +26,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ypmatch.1,v 1.1 1994/01/11 19:01:30 nate Exp $
|
||||
.\" $Id: ypmatch.1,v 1.1 1994/08/08 01:13:32 wollman Exp $
|
||||
.\"
|
||||
.Dd December 3, 1993
|
||||
.Dt YPMATCH 1
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ac.8,v 1.3 1995/10/07 12:02:33 joerg Exp $
|
||||
.\" $Id: ac.8,v 1.4 1996/01/20 07:28:13 mpp Exp $
|
||||
.\"
|
||||
.Dd March 15, 1994
|
||||
.Dt AC 8
|
||||
|
@ -141,7 +141,7 @@ rotated files
|
|||
.\" of a user being logged in when the
|
||||
.\" .Pa wtmp
|
||||
.\" file was rotated, in which case a login with ut_host of ":0.0" may
|
||||
.\" appear without any preceeding console logins.
|
||||
.\" appear without any preceding console logins.
|
||||
.\" If no one is logged in on the console, the user is deemed to have
|
||||
.\" logged in on at the earliest time stamp found in
|
||||
.\" .Pa wtmp .
|
||||
|
@ -149,7 +149,7 @@ rotated files
|
|||
.\" .Pa console
|
||||
.\" allows
|
||||
.\" .Nm ac
|
||||
.\" to identify and correcty process a logout for the user. The default
|
||||
.\" to identify and correctly process a logout for the user. The default
|
||||
.\" value for
|
||||
.\" .Pa console
|
||||
.\" is usually correct at compile time.
|
||||
|
|
|
@ -28,10 +28,10 @@
|
|||
.\"
|
||||
.\" /usr/sbin/adduser - add new user(s)
|
||||
.\"
|
||||
.\" Bugs: sure (my english!)
|
||||
.\" Bugs: sure (my English!)
|
||||
.\" Email: Wolfram Schneider <wosch@cs.tu-berlin.de>
|
||||
.\"
|
||||
.\" $Id: adduser.8,v 1.5 1995/03/07 16:42:33 w Exp w $
|
||||
.\" $Id: adduser.8,v 1.7 1995/03/08 22:44:35 ache Exp $
|
||||
.\"
|
||||
|
||||
.Dd Jan, 9, 1995
|
||||
|
@ -67,9 +67,9 @@ not allowed.
|
|||
.It Sy shell
|
||||
Only valid shells from shell database or sliplogin and pppd
|
||||
.It Sy uid
|
||||
Automatic generated or your choise. Less than 32000.
|
||||
Automatically generated or your choice. Less than 32000.
|
||||
.It Sy gid/login group
|
||||
Your choise or automatic generated.
|
||||
Your choice or automatically generated.
|
||||
.It Sy password
|
||||
If not empty password is encoded with crypt.
|
||||
.El
|
||||
|
@ -80,11 +80,11 @@ with most other schemes. With each user in his/her own group the user can
|
|||
safely run with a umask of 002 and have files created in there home directory
|
||||
and not worry about others being able to read them.
|
||||
|
||||
For a shared area you create a seperate uid/gid (like cvs or ncvs on freefall),
|
||||
For a shared area you create a separate uid/gid (like cvs or ncvs on freefall),
|
||||
you place each person that should be able to access this area into that new
|
||||
group.
|
||||
|
||||
This model of uid/gid administration allows far greater flexibilty that lumping
|
||||
This model of uid/gid administration allows far greater flexibility that lumping
|
||||
users into groups and having to muck with the umask when working in a shared
|
||||
area.
|
||||
|
||||
|
@ -153,7 +153,7 @@ Do not read config file.
|
|||
Default shell for new users.
|
||||
|
||||
.It Sy -silent,-s,-quit,-q
|
||||
Few warnings, question, bugreports.
|
||||
Few warnings, question, bug reports.
|
||||
|
||||
.It Sy -uid Ar uid
|
||||
Use uid's from
|
||||
|
@ -161,7 +161,7 @@ Use uid's from
|
|||
up.
|
||||
|
||||
.It Sy -verbose,-v
|
||||
Many warning, question. Recommended for noivice users.
|
||||
Many warning, question. Recommended for novice users.
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -55,7 +55,7 @@ in minutes,
|
|||
.Nm start_s,
|
||||
in seconds and
|
||||
.Nm start_f
|
||||
(frame number) to the abolute address defined by
|
||||
(frame number) to the absolute address defined by
|
||||
.Nm end_m
|
||||
in minutes,
|
||||
.Nm end_s,
|
||||
|
|
|
@ -57,7 +57,7 @@ in minutes,
|
|||
.Nm start_s,
|
||||
in seconds and
|
||||
.Nm start_f
|
||||
(frame number) to the abolute address defined by
|
||||
(frame number) to the absolute address defined by
|
||||
.Nm end_m
|
||||
in minutes,
|
||||
.Nm end_s,
|
||||
|
|
|
@ -39,8 +39,8 @@
|
|||
.Ar device
|
||||
.Sh DESCRIPTION
|
||||
.Nm Fdcontrol
|
||||
allows the modification of the run-time behaviour of the floppy
|
||||
disk device specifed by
|
||||
allows the modification of the run-time behavior of the floppy
|
||||
disk device specified by
|
||||
.Ar device .
|
||||
.Ar Device
|
||||
should be a character device.
|
||||
|
|
|
@ -69,7 +69,7 @@ are meaningless, since they're overridden by
|
|||
The options are as follows:
|
||||
.Bl -tag -width 10n -offset indent
|
||||
.It Fl q
|
||||
supress any normal output from the command, and don't ask the
|
||||
suppress any normal output from the command, and don't ask the
|
||||
user for a confirmation whether to format the floppy disk at
|
||||
.Ar device_name .
|
||||
.It Fl f Ar capacity
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
|
||||
.\" ----------------------------------------------------------------------------
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: fdwrite.1,v 1.1.1.1 1994/09/18 07:39:19 phk Exp $
|
||||
.\"
|
||||
.\"
|
||||
.Dd September 16, 1993
|
||||
|
@ -29,7 +29,7 @@ Any floppy disk device capable of formatting can be used.
|
|||
will ask the user
|
||||
.Pq on /dev/tty
|
||||
to insert a new floppy and press return.
|
||||
The device will then be opened, and queried for it's paramters,
|
||||
The device will then be opened, and queried for it's parameters,
|
||||
then each track will be formatted, written with data from the
|
||||
.Ar inputfile ,
|
||||
read back and compared.
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94
|
||||
.\" $Id: inetd.8,v 1.5 1995/10/09 23:34:07 davidg Exp $
|
||||
.\" $Id: inetd.8,v 1.6 1995/10/12 16:43:25 wollman Exp $
|
||||
.\"
|
||||
.Dd April 13, 1994
|
||||
.Dt INETD 8
|
||||
|
@ -443,7 +443,7 @@ command appeared in
|
|||
TCPMUX is based on code and documentation by Mark Lottor.
|
||||
Support for
|
||||
.Tn "ONC RPC"
|
||||
based services is modelled after that
|
||||
based services is modeled after that
|
||||
provided by
|
||||
.Tn SunOS
|
||||
4.1.
|
||||
|
|
|
@ -34,7 +34,7 @@
|
|||
.\"
|
||||
.\" E-Mail: Wolfram Schneider <wosch@cs.tu-berlin.de>
|
||||
.\"
|
||||
.\" $Id: kbdmap.1,v 1.5 1995/04/01 17:07:26 w Exp $
|
||||
.\" $Id: kbdmap.1,v 1.1 1995/04/05 08:09:22 jkh Exp $
|
||||
.\"
|
||||
|
||||
.Dd Mar 25, 1995
|
||||
|
@ -56,7 +56,7 @@
|
|||
|
||||
.Sh DESCRIPTION
|
||||
.Nm kbdmap
|
||||
allow easy setting of avaible keymaps.
|
||||
allow easy setting of available keymaps.
|
||||
.Nm vidfont
|
||||
do it for fonts.
|
||||
Both looking in a database for a description. Description is
|
||||
|
@ -85,7 +85,7 @@ Load default font from /etc/sysconfig
|
|||
.It Fl v , Fl verbose
|
||||
More warnings.
|
||||
|
||||
.Sh ENVIROMENT
|
||||
.Sh ENVIRONMENT
|
||||
.Bl -tag -width /etc/master.passwdxx -compact
|
||||
.Pa LANG
|
||||
Prefered language.
|
||||
|
@ -109,7 +109,7 @@ Describe common LANG values.
|
|||
.Sh BUGS
|
||||
.\" .Nm kbdmap/vidfont
|
||||
.\" does not know which font is in use. E.g. if the current font
|
||||
.\" is iso-8859-1 and you choise lang 'ru' (for russian)
|
||||
.\" is iso-8859-1 and you chose lang 'ru' (for Russian)
|
||||
.\" you get funny latin1 characters and not russkij shrift.
|
||||
.\"
|
||||
.Nm vidcontrol
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
.\" $Id: lsdev.8,v 1.2 1994/10/23 21:33:55 wollman Exp $
|
||||
.\" $Id: lsdev.8,v 1.3 1994/12/12 00:35:01 ats Exp $
|
||||
.\" Garrett A. Wollman, October 1994
|
||||
.\" This file is in the public domain.
|
||||
.\"
|
||||
|
@ -56,10 +56,10 @@ supported device type names
|
|||
.\" .Xr chdev 8
|
||||
.Xr sysctl 3
|
||||
.Sh BUGS
|
||||
Not all devices have the proper support implmented yet.
|
||||
Not all devices have the proper support implemented yet.
|
||||
.Sh HISTORY
|
||||
An
|
||||
.Nm
|
||||
comand appeared in
|
||||
command appeared in
|
||||
.Tn FreeBSD
|
||||
2.0.
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
.\"
|
||||
.\" (c) Wolfram Schneider, Berlin, Germany. Public domain.
|
||||
.\"
|
||||
.\" $Id: manctl.8,v 1.1 1996/01/23 20:51:29 wosch Exp $
|
||||
.\" $Id: manctl.8,v 1.1 1996/01/23 23:59:35 wosch Exp $
|
||||
|
||||
.Dd Jan 1996
|
||||
.Dt manctl 8
|
||||
|
@ -30,7 +30,7 @@ If possible, .so's are replaced with hard links.
|
|||
.It Fl help
|
||||
Print options and exit.
|
||||
.It Fl compress
|
||||
Compress uncompressed man pages (elliminating .so's)
|
||||
Compress uncompressed man pages (eliminating .so's)
|
||||
.It Fl uncompress
|
||||
Uncompress compressed man pages.
|
||||
.It Fl purge
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
|
||||
.\" $Id$
|
||||
.\" $Id: mtree.8,v 1.5 1995/02/10 03:12:30 wollman Exp $
|
||||
.\"
|
||||
.Dd February 9, 1995
|
||||
.Dt MTREE 8
|
||||
|
@ -259,7 +259,7 @@ and
|
|||
options can be used in combination to create directory hierarchies
|
||||
for distributions and other such things; the files in
|
||||
.Pa /etc/mtree
|
||||
were used to create almost all diectories in this
|
||||
were used to create almost all directories in this
|
||||
.Tn FreeBSD
|
||||
distribution.
|
||||
.Sh FILES
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ncrcontrol.8,v 1.1 1994/10/13 17:43:51 se Exp $
|
||||
.\" $Id: ncrcontrol.8,v 1.2 1994/12/02 06:19:37 nate Exp $
|
||||
.\"
|
||||
.Dd September 16, 1994
|
||||
.Dt NCRCONTROL 8
|
||||
|
@ -194,7 +194,7 @@ interval argument, it displays a running count of statistics related to
|
|||
the transfers on the selected scsi bus.
|
||||
|
||||
This display consists of the number of transfers and number of transferred
|
||||
byted for the controller and for each connected target.
|
||||
bytes for the controller and for each connected target.
|
||||
|
||||
(NOT YET COMPLETE)
|
||||
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
.TP
|
||||
.B pkg_manage
|
||||
.SH DESCRIPTION
|
||||
Pkg_manage is an interactive tool with wich you can install,
|
||||
Pkg_manage is an interactive tool with which you can install,
|
||||
delete and view packages. It is a
|
||||
front-end to the pkg_add(1), pkg_info(1) and pkg_delete(1) programs.
|
||||
|
||||
|
@ -74,7 +74,7 @@ to continue,
|
|||
.B <Cancel>
|
||||
to back out.
|
||||
Once a directory has been chosen, it will be scanned for packages files,
|
||||
tpically files ending in '.tgz'. These will be listed in
|
||||
typically files ending in '.tgz'. These will be listed in
|
||||
a listbox (the one on the left) as well as the already installed
|
||||
packages, that will be listed in a similar box (on the right side).
|
||||
Use TAB or SHIFT-TAB to move from field to field.
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
.\" manual page [] for ppp 0.94 beta2 + alpha
|
||||
.\" $Id: ppp.8,v 1.11 1995/09/24 18:15:14 nate Exp $
|
||||
.\" $Id: ppp.8,v 1.12 1995/10/08 14:57:31 amurai Exp $
|
||||
.Dd 20 September 1995
|
||||
.Os FreeBSD
|
||||
.Dt PPP 8
|
||||
|
@ -321,9 +321,9 @@ When an outgoing packet is detected,
|
|||
will perform the dialing action (chat script) and try to connect
|
||||
with the peer.
|
||||
|
||||
If the connect fails, the default behaviour is to wait 30 seconds
|
||||
If the connect fails, the default behavior is to wait 30 seconds
|
||||
and then attempt to connect when another outgoing packet is detected.
|
||||
This behaviour can be changed with
|
||||
This behavior can be changed with
|
||||
.Bd -literal -offset indent
|
||||
set redial seconds|random [dial_attempts]
|
||||
.Ed
|
||||
|
@ -702,7 +702,7 @@ will always try to consult the user's personal setup first.
|
|||
|
||||
.Bl -tag -width flag
|
||||
.It $HOME/ppp/.ppp.[conf|linkup|secret]
|
||||
User dependant configuration files.
|
||||
User dependent configuration files.
|
||||
|
||||
.It /etc/ppp/ppp.conf
|
||||
System default configuration file.
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
.\" manual page [] for ppp 0.94 beta2 + alpha
|
||||
.\" $Id: ppp.8,v 1.11 1995/09/24 18:15:14 nate Exp $
|
||||
.\" $Id: ppp.8,v 1.12 1995/10/08 14:57:31 amurai Exp $
|
||||
.Dd 20 September 1995
|
||||
.Os FreeBSD
|
||||
.Dt PPP 8
|
||||
|
@ -321,9 +321,9 @@ When an outgoing packet is detected,
|
|||
will perform the dialing action (chat script) and try to connect
|
||||
with the peer.
|
||||
|
||||
If the connect fails, the default behaviour is to wait 30 seconds
|
||||
If the connect fails, the default behavior is to wait 30 seconds
|
||||
and then attempt to connect when another outgoing packet is detected.
|
||||
This behaviour can be changed with
|
||||
This behavior can be changed with
|
||||
.Bd -literal -offset indent
|
||||
set redial seconds|random [dial_attempts]
|
||||
.Ed
|
||||
|
@ -702,7 +702,7 @@ will always try to consult the user's personal setup first.
|
|||
|
||||
.Bl -tag -width flag
|
||||
.It $HOME/ppp/.ppp.[conf|linkup|secret]
|
||||
User dependant configuration files.
|
||||
User dependent configuration files.
|
||||
|
||||
.It /etc/ppp/ppp.conf
|
||||
System default configuration file.
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: quot.8,v 1.1.1.2 1995/11/03 15:06:02 peter Exp $
|
||||
.\" $Id: quot.8,v 1.2 1995/11/03 15:21:02 peter Exp $
|
||||
.\"
|
||||
.Dd February 8, 1994
|
||||
.Dt QUOT 8
|
||||
|
@ -55,7 +55,7 @@ blocks in files with this or lower size.
|
|||
For each user, display count of files and space occupied.
|
||||
.It Fl h
|
||||
Estimate the number of blocks in each file based on its size.
|
||||
Despite that this doesn't give the correct resuls (it doesn't
|
||||
Despite that this doesn't give the correct results (it doesn't
|
||||
account for the holes in files), this option isn't any faster
|
||||
and thus is discouraged.
|
||||
.It Fl k
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
.\" @(#) $Header: /a/ncvs/src/usr.sbin/rarpd/rarpd.8,v 1.1.1.1 1995/03/02 06:41:40 wpaul Exp $ (LBL)
|
||||
.\" @(#) $Header: /home/ncvs/src/usr.sbin/rarpd/rarpd.8,v 1.2 1995/03/05 22:04:05 wpaul Exp $ (LBL)
|
||||
.\"
|
||||
.\" Copyright (c) 1988-1990 The Regents of the University of California.
|
||||
.\" All rights reserved.
|
||||
|
@ -46,7 +46,7 @@ must be present in both the
|
|||
and
|
||||
.I hosts(5)
|
||||
databases.
|
||||
If a host does not exist in both databses, the translation cannot
|
||||
If a host does not exist in both databases, the translation cannot
|
||||
proceed and a reply will not be sent.
|
||||
|
||||
Additionally, a request is honored only if the server
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: rtprio.1,v 1.1 1994/09/01 12:05:13 davidg Exp $
|
||||
.\" $Id: rtprio.1,v 1.3 1994/10/02 04:48:19 davidg Exp $
|
||||
.\"
|
||||
.Dd July 23, 1994
|
||||
.Dt RTPRIO 1
|
||||
|
@ -188,7 +188,7 @@ the process may be stopped for pagein. (See mprotect(2), madvise(2)).
|
|||
Under
|
||||
FreeBSD
|
||||
system calls are currently never preempted, therefore non-realtime
|
||||
processes can starve realtime procesess, or idletime processes can
|
||||
processes can starve realtime processes, or idletime processes can
|
||||
starve normal priority processes.
|
||||
|
||||
Others ...
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
.\" $Id$
|
||||
.\" $Id: sicontrol.8,v 1.2 1995/09/26 18:18:49 peter Exp $
|
||||
.\" The following requests are required for all man pages.
|
||||
.Dd September 26,1995
|
||||
.Dt SICONTROL 8
|
||||
|
@ -47,7 +47,7 @@ The default value of 4 at boot time allows an interrupt rate of
|
|||
approximately 25.
|
||||
.Pp
|
||||
Lowering this value will increase the rate in which the host adapter can
|
||||
interrupt the operating system to empty the receviver fifos.
|
||||
interrupt the operating system to empty the receiver fifos.
|
||||
.\"
|
||||
.It Cm nport
|
||||
Returns the number of ports under the control of the device driver.
|
||||
|
|
|
@ -175,7 +175,7 @@ for two interfaces with same number.
|
|||
By default sliplogin dynamically assigns the unit number.
|
||||
.El
|
||||
.Pp
|
||||
If latter two parameters are ommitted, they will not affect the
|
||||
If latter two parameters are omitted, they will not affect the
|
||||
corresponding SLIP configuration.
|
||||
If any of first two parameters is equal to zero, it will not affect
|
||||
the corresponding SLIP configuration.
|
||||
|
|
|
@ -60,7 +60,7 @@ is specified, the default is 5 seconds.
|
|||
Verbose display of extra fields of information.
|
||||
.TP
|
||||
\-r
|
||||
Display all values in rate per second that ammount per interval.
|
||||
Display all values in rate per second that amount per interval.
|
||||
.TP
|
||||
unit
|
||||
is a single digit specifying the slip interface. The default unit is
|
||||
|
@ -111,7 +111,7 @@ search
|
|||
searches for connection state
|
||||
.TP
|
||||
miss
|
||||
times we could not find a connectoin state
|
||||
times we could not find a connection state
|
||||
.TP
|
||||
coll
|
||||
collisions with end of clists.
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" From: @(#)sysctl.8 8.1 (Berkeley) 6/6/93
|
||||
.\" $Id: sysctl.8,v 1.6 1995/02/20 19:42:42 guido Exp $
|
||||
.\" $Id: sysctl.8,v 1.7 1995/12/21 12:39:24 phk Exp $
|
||||
.\"
|
||||
.Dd September 23, 1994
|
||||
.Dt SYSCTL 8
|
||||
|
@ -113,7 +113,7 @@ purpose programs such as
|
|||
and
|
||||
.Nm netstat .
|
||||
.Pp
|
||||
The string and integer information is summaried below.
|
||||
The string and integer information is summarized below.
|
||||
For a detailed description of these variable see
|
||||
.Xr sysctl 3 .
|
||||
.Pp
|
||||
|
@ -235,7 +235,7 @@ definitions for fourth level UDP identifiers
|
|||
.Sh BUGS
|
||||
.Nm sysctl
|
||||
presently exploits an undocumented interface to the kernel
|
||||
sysctl facility to traverse the sysctl tree and to retrive format
|
||||
sysctl facility to traverse the sysctl tree and to retrieve format
|
||||
and name information.
|
||||
This correct interface is being thought about for the time being.
|
||||
.Sh HISTORY
|
||||
|
|
|
@ -65,7 +65,7 @@ Set border color to
|
|||
(only supported on VGA hardware):
|
||||
.TP
|
||||
.BI "\-c\ " normal | blink | destructive
|
||||
Change the cursor apperance. The cursor is either an inverting block
|
||||
Change the cursor appearance. The cursor is either an inverting block
|
||||
(normal) that eventually can "blink". Or it can be like the old hardware cursor
|
||||
(destructive). The latter is actually a simulation.
|
||||
.TP
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
.Sh NAME
|
||||
.Nm watch
|
||||
.Nd snoop on another tty line
|
||||
.Sh SYNOPSYS
|
||||
.Sh SYNOPSIS
|
||||
.Nm watch
|
||||
.Op Fl ciotW
|
||||
.Ar tty
|
||||
|
@ -37,7 +37,7 @@ If output is redirected to a file, interactive mode can still be requested
|
|||
by specifying this option.
|
||||
.It Fl o
|
||||
Reconnect on overflow.
|
||||
The behaviour of
|
||||
The behavior of
|
||||
.Nm watch
|
||||
if the observed tty overflows is similar to the behavior if the observed tty
|
||||
is closed.
|
||||
|
|
|
@ -29,7 +29,7 @@
|
|||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: yppush.8,v 1.2 1996/01/12 06:21:52 wpaul Exp wpaul $
|
||||
.\" $Id: yppush.8,v 1.1.1.1 1996/01/12 07:03:33 wpaul Exp $
|
||||
.\"
|
||||
.Dd February 5, 1995
|
||||
.Dt YPPUSH 8
|
||||
|
@ -164,9 +164,9 @@ a particular NIS domain.
|
|||
.Xr ypxfr 8 ,
|
||||
.Xr yp 8
|
||||
.Sh BUGS
|
||||
The mechanism for transfering NIS maps in NIS v1 is different
|
||||
The mechanism for transferring NIS maps in NIS v1 is different
|
||||
that that in NIS version 2. This version of
|
||||
.Nm yppush
|
||||
has support for transfering maps to NIS v2 systems only.
|
||||
has support for transferring maps to NIS v2 systems only.
|
||||
.Sh AUTHOR
|
||||
Bill Paul <wpaul@ctr.columbia.edu>
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id: ypserv.8,v 1.4 1995/12/10 04:46:38 wpaul Exp $
|
||||
.\" $Id: ypserv.8,v 1.1.1.1 1995/12/16 20:54:17 wpaul Exp $
|
||||
.\"
|
||||
.Dd February 4, 1995
|
||||
.Dt YPSERV 8
|
||||
|
@ -68,7 +68,7 @@ using the
|
|||
command. The clients must also run
|
||||
.Xr ypbind 8
|
||||
in order to attach to a particular server, since it is possible to
|
||||
have serveral servers within a single NIS domain.
|
||||
have several servers within a single NIS domain.
|
||||
.Pp
|
||||
The databases distributed by
|
||||
.Nm ypserv
|
||||
|
@ -114,7 +114,7 @@ To make up for this, the FreeBSD version of
|
|||
handles the
|
||||
.Pa master.passwd.byname
|
||||
and
|
||||
.Pa master.basswd.byuid
|
||||
.Pa master.passwd.byuid
|
||||
maps in a special way. When the server receives a request to access
|
||||
either of these two maps, it will check the TCP port from which the
|
||||
request originated and return an error if the port number is greater
|
||||
|
@ -125,7 +125,7 @@ Any requests made by non-privileged users are therefore rejected.
|
|||
.Pp
|
||||
Furthermore, the
|
||||
.Xr getpwent 3
|
||||
routines in FreeBSD's standard C libarary will only attempt to retrieve
|
||||
routines in FreeBSD's standard C library will only attempt to retrieve
|
||||
data from the
|
||||
.Pa master.passwd.byname
|
||||
and
|
||||
|
@ -167,7 +167,7 @@ This will cause the standard
|
|||
and
|
||||
.Pa passwd.byuid
|
||||
maps to be generated with valid encrypted password fields, which is
|
||||
neccesary in order for non-FreeBSD clients to perform user
|
||||
necessary in order for non-FreeBSD clients to perform user
|
||||
authentication through NIS.
|
||||
.El
|
||||
.Pp
|
||||
|
@ -187,7 +187,7 @@ you can easily recompile
|
|||
with them, thereby enabling its 'securenets' features: you can
|
||||
configure
|
||||
.Nm ypserv
|
||||
to only handle resquests from machines listed
|
||||
to only handle requests from machines listed
|
||||
in the
|
||||
.Pa tcpwrapper
|
||||
configuration files, which would help limit vulnerability to the
|
||||
|
@ -236,7 +236,7 @@ will construct a fake database record and return it to the client,
|
|||
thereby making it seem as though the client's yp_match request
|
||||
succeeded.
|
||||
.Pp
|
||||
This feature is provided for compatiblity with SunOS 4.1.x,
|
||||
This feature is provided for compatibility with SunOS 4.1.x,
|
||||
which has brain-damaged resolver functions in its standard C
|
||||
library that depend on NIS for hostname and address resolution.
|
||||
FreeBSD's resolver can be configured to do DNS
|
||||
|
@ -250,7 +250,7 @@ using the
|
|||
.Xr syslog 3
|
||||
facility. In debug mode, the server does not background
|
||||
itself and prints extra status messages to stderr for each
|
||||
request that it revceives. Also, while running in debug mode,
|
||||
request that it receives. Also, while running in debug mode,
|
||||
.Nm ypserv
|
||||
will not spawn any additional subprocesses as it normally does
|
||||
when handling yp_all requests or doing DNS lookups. (These actions
|
||||
|
|
Loading…
Reference in a new issue