unstick r65103

Revision 65103

Date:
1993/12/11 23:43:24
Author:
mckusick
Revision Log:
copyediting for Usenix manuals

Files:

Legend:

 
Added
 
Removed
 
Modified
  • libexec/bugfiler/bugfiler.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)bugfiler.8 8.1 (Berkeley) 06/04/93
    6 .\" @(#)bugfiler.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt BUGFILER 8
     
    175 175 is the date as reported by the system
    176 176 clock, using
    177 177 .Xr ctime 3 .
    178 .Li The Subject:
    178 The
    179 .Li Subject:
    179 180 and
    180 181 .Li Index:
    181 182 lines are
    182 The
    183 .Dq Subject:
    184 and
    185 .Dq Index:
    186 lines are
    187 183 copies of the
    188 184 .Dq Subject:
    189 185 and
  • libexec/lfs_cleanerd/lfs_cleanerd.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.roff%
    5 5 .\"
    6 .\" @(#)lfs_cleanerd.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)lfs_cleanerd.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd ""
    9 9 .Dt LFS_CLEANERD 8
     
    19 19 The
    20 20 .Nm lfs_cleanerd
    21 21 command starts a daemon process which garbage-collects
    22 the log-structed file system residing at the point named by
    22 the log-structured file system residing at the point named by
    23 23 .Ar node
    24 24 in the global file system namespace.
    25 25 This command is normally executed by
  • libexec/mail.local/mail.local.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.roff%
    5 5 .\"
    6 .\" @(#)mail.local.8 8.1 (Berkeley) 06/04/93
    6 .\" @(#)mail.local.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt MAIL.LOCAL 8
     
    18 18 .Sh DESCRIPTION
    19 19 .Nm Mail.local
    20 20 reads the standard input up to an end-of-file and appends it to each
    21 .Ar user 's
    21 .Ar user's
    22 22 .Pa mail
    23 23 file.
    24 24 The
  • libexec/makekey/makekey.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)makekey.8 8.1 (Berkeley) 06/04/93
    6 .\" @(#)makekey.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt MAKEKEY 8
     
    15 15 .Nm makekey
    16 16 .Sh DESCRIPTION
    17 17 .Nm Makekey
    18 encypts a key and salt which it reads from the standard input
    18 encrypts a key and salt which it reads from the standard input
    19 19 and writes the result to the standard output.
    20 20 The key is expected to be
    21 21 ten bytes; the salt is expected to be two bytes.
  • libexec/rbootd/rbootd.8

     
    11 11 .\"
    12 12 .\" %sccs.include.redist.roff%
    13 13 .\"
    14 .\" @(#)rbootd.8 8.1 (Berkeley) 06/04/93
    14 .\" @(#)rbootd.8 8.2 (Berkeley) 12/11/93
    15 15 .\"
    16 16 .\" Utah $Hdr: rbootd.man 3.1 92/07/06$
    17 17 .\" Author: Jeff Forys, University of Utah CSS
     
    68 68 machine.
    69 69 A line must start with a machine's Ethernet address followed by an optional
    70 70 list of boot file names.
    71 An ethernet address is specified in hexadecimal with each of its six octets
    71 An Ethernet address is specified in hexadecimal with each of its six octets
    72 72 separated by a colon.
    73 73 The boot file names come from the boot file directory.
    74 74 The ethernet address and boot file(s) must be separated by white-space
  • libexec/rexecd/rexecd.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)rexecd.8 8.1 (Berkeley) 06/04/93
    6 .\" @(#)rexecd.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt REXECD 8
     
    90 90 .It Sy Login incorrect.
    91 91 No password file entry for the user name existed.
    92 92 .It Sy Password incorrect.
    93 The wrong was password supplied.
    93 The wrong password was supplied.
    94 94 .It Sy \&No remote directory.
    95 95 The
    96 96 .Xr chdir
  • libexec/talkd/talkd.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)talkd.8 8.1 (Berkeley) 06/04/93
    6 .\" @(#)talkd.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt TALKD 8
     
    17 17 .Nm Talkd
    18 18 is the server that notifies a user that someone else wants to
    19 19 initiate a conversation.
    20 It acts a repository of invitations, responding to requests
    20 It acts as a repository of invitations, responding to requests
    21 21 by clients wishing to rendezvous to hold a conversation.
    22 22 In normal operation, a client, the caller,
    23 23 initiates a rendezvous by sending a
  • local/kerberosIV/make_keypair/make_keypair.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)make_keypair.8 8.1 (Berkeley) 06/09/93
    6 .\" @(#)make_keypair.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt MAKE_KEYPAIR 8
     
    24 24 keys for
    25 25 each
    26 26 .Ar hostname .
    27 The keys are used by priviledged programs such as
    27 The keys are used by privileged programs such as
    28 28 .Xr register 1
    29 29 to make remote updates to the Kerberos database without
    30 30 having to have first acquired a Kerberos ticket granting ticket
     
    34 34 are placed (by hand) in the filesystems of the
    35 35 kerberos server in
    36 36 .Pa /etc/kerberosIV/register_keys ,
    37 and in the root directory on the clients.
    37 and in the root directory of the clients.
    38 38 For example, the file
    39 39 .Pa /.update.key128.32.130.3
    40 40 would
    41 contain a copy of the key on the client with
    41 contain a copy of the key of the client with
    42 42 IP address 128.32.130.3.
    43 43 These keys provide a shared secret which may be used to establish
    44 44 a secure channel between the client hosts and the Kerberos server.
  • local/kerberosIV/registerd/registerd.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)registerd.8 8.1 (Berkeley) 06/09/93
    6 .\" @(#)registerd.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt REGISTERD 8
     
    14 14 .Sh SYNOPSIS
    15 15 .Nm registerd
    16 16 .Sh DESCRIPTION
    17 (filler for now)
    17 Act as a registration agent for a Kerberos domain.
    18 18 .Sh FILES
    19 19 .Bl -tag -width /etc/kerberosIV/register_keys -compact
    20 20 .It Pa /.update.keyxx.xx.xx.xx
  • sbin/fsck/fsck.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.roff%
    5 5 .\"
    6 .\" @(#)fsck.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)fsck.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt FSCK 8
     
    18 18 .Nm fsck
    19 19 .Op Fl b Ar block#
    20 20 .Op Fl c Ar level
    21 .Op Fl l Ar maxparallel
    21 22 .Op Fl y
    22 23 .Op Fl n
    23 24 .Op Fl m Ar mode
  • sbin/fsdb/fsdb.8

     
    6 6 .\"
    7 7 .\" %sccs.include.redist.man%
    8 8 .\"
    9 .\" @(#)fsdb.8 8.1 (Berkeley) 06/05/93
    9 .\" @(#)fsdb.8 8.2 (Berkeley) 12/11/93
    10 10 .\"
    11 11 .TH FSDB 8 ""
    12 12 .UC 7
     
    910 910 1c92434.
    911 911 .SH SEE ALSO
    912 912 fsck(8), dir(4), fs(5).
    913 .SH BUGS
    914 .PP
    915 Extreme caution is advised in
    916 determining the availability
    917 of
    918 .IR fsdb
    919 on the system.
    920 Suggested permissions are 600 and
    921 owned by bin.
  • sbin/ifconfig/ifconfig.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)ifconfig.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)ifconfig.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt IFCONFIG 8
     
    149 149 less favorable; metrics are counted as addition hops
    150 150 to the destination network or host.
    151 151 .It Cm netmask Ar mask
    152 (Inet and Iso)
    152 (Inet and ISO)
    153 153 Specify how much of the address to reserve for subdividing
    154 154 networks into sub-networks.
    155 155 The mask includes the network part of the local address
     
    177 177 (Network Entity Title).
    178 178 The default value is 1, which is conformant to US
    179 179 .Tn GOSIP .
    180 When an iso address is set in an ifconfig command,
    180 When an ISO address is set in an ifconfig command,
    181 181 it is really the
    182 182 .Tn NSAP
    183 183 which is being specified.
     
    187 187 specified in the
    188 188 .Tn ISO NSAP
    189 189 to be assigned to the interface.
    190 There is some evidence that a number different 1 may be useful
    190 There is some evidence that a number different from 1 may be useful
    191 191 for
    192 192 .Tn AFI
    193 193 37 type addresses.
  • sbin/mknod/mknod.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)mknod.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)mknod.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt MKNOD 8
     
    43 43 the type is
    44 44 .Cm b .
    45 45 All other devices are character type devices, such as terminal
    46 and psuedo devices, and are type
    46 and pseudo devices, and are type
    47 47 .Cm c .
    48 48 .It Ar major
    49 49 The major device number is an integer number which tells the kernel
  • sbin/mount_lfs/mount_lfs.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.roff%
    5 5 .\"
    6 .\" @(#)mount_lfs.8 8.1 (Berkeley) 06/08/93
    6 .\" @(#)mount_lfs.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd ""
    9 9 .Dt MOUNT_LFS 8
     
    20 20 .Sh DESCRIPTION
    21 21 The
    22 22 .Nm mount_lfs
    23 command attaches the log-structed file system
    23 command attaches the log-structured file system
    24 24 residing on the device named by
    25 25 .Ar device
    26 26 to the global file system namespace.
     
    56 56 of a difference in normal operation.
    57 57 .Sh HISTORY
    58 58 The
    59 .Nm sysconf
    59 .Nm mount_lfs
    60 60 function first appeared in 4.4BSD.
  • sbin/mount_null/mount_null.8

     
    8 8 .\"
    9 9 .\" %sccs.include.redist.roff%
    10 10 .\"
    11 .\" @(#)mount_null.8 8.1 (Berkeley) 06/09/93
    11 .\" @(#)mount_null.8 8.2 (Berkeley) 12/11/93
    12 12 .\"
    13 13 .\"
    14 14 .Dd
     
    74 74 The bypass routine accepts arbitrary vnode operations for
    75 75 handling by the lower layer. It begins by examing vnode
    76 76 operation arguments and replacing any null-nodes by their
    77 lower-layer equivlants. It then invokes the operation
    77 lower-layer equivalants. It then invokes the operation
    78 78 on the lower layer. Finally, it replaces the null-nodes
    79 in the arguments and, if a vnode is return by the operation,
    79 in the arguments and, if a vnode is returned by the operation,
    80 80 stacks a null-node on top of the returned vnode.
    81 81 .Pp
    82 82 Although bypass handles most operations,
     
    156 156 .Pp
    157 157 The first approach is to call the aliasing layer's bypass routine.
    158 158 This method is most suitable when you wish to invoke the operation
    159 currently being hanldled on the lower layer. It has the advantage
    159 currently being handled on the lower layer. It has the advantage
    160 160 the the bypass routine already must do argument mapping.
    161 161 An example of this is
    162 162 .Em null_getattrs
  • sbin/newfs/newfs.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)newfs.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)newfs.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt NEWFS 8
     
    68 68 Causes the file system parameters to be printed out
    69 69 without really creating the file system.
    70 70 .It Fl O
    71 Creates an 4.3BSD format filesystem.
    71 Creates a 4.3BSD format filesystem.
    72 72 This options is primarily used to build root filesystems
    73 73 that can be understood by older boot ROMs.
    74 74 .It Fl b Ar block-size
     
    87 87 allocating blocks, or to try to minimize the space fragmentation on the disk.
    88 88 If the value of minfree (see above) is less than 10%,
    89 89 the default is to optimize for space;
    90 if the value of minfree greater than or equal to 10%,
    90 if the value of minfree is greater than or equal to 10%,
    91 91 the default is to optimize for time.
    92 92 See
    93 93 .Xr tunefs 8
     
    138 138 Note that changing any of these values from their
    139 139 defaults will make it impossible for
    140 140 .Xr fsck
    141 to find the alternate superblocks if the standard super block is lost.
    141 to find the alternate superblocks if the standard superblock is lost.
    142 142 .It Fl r Ar revolutions/minute
    143 143 The speed of the disk in revolutions per minute.
    144 144 .It Fl S Ar sector-size
  • sbin/nfsd/nfsd.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.roff%
    5 5 .\"
    6 .\" @(#)nfsd.8 8.1 (Berkeley) 06/09/93
    6 .\" @(#)nfsd.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt NFSD 8
     
    66 66 .Ar numprocs
    67 67 servers for
    68 68 .Tn UDP
    69 transport are started. (compatibility)
    70 If
    69 transport are started. For compatibility,
    70 if
    71 71 .Ar numprocs
    72 72 is not specified, it defaults to 4.
    73 73 .Pp
  • sbin/ping/ping.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)ping.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)ping.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt PING 8
     
    39 39 and then an arbitrary number of ``pad'' bytes used to fill out the
    40 40 packet.
    41 41 The options are as follows:
    42 Other options are:
    43 42 .Bl -tag -width Ds
    44 43 .It Fl c Ar count
    45 44 Stop after sending (and receiving)
     
    56 55 whichever is more.
    57 56 For every
    58 57 .Tn ECHO_REQUEST
    59 sent a period ``.'' is printed, while for ever
    58 sent a period ``.'' is printed, while for every
    60 59 .Tn ECHO_REPLY
    61 60 received a backspace is printed.
    62 61 This provides a rapid display of how many packets are being dropped.
  • sbin/restore/restore.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)restore.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)restore.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt RESTORE 8
     
    66 66 The
    67 67 .Cm r
    68 68 key precludes an interactive file extraction and can be
    69 detrimental to ones health if not used carefully (not to mention
    69 detrimental to one's health if not used carefully (not to mention
    70 70 the disk). An example:
    71 71 .Bd -literal -offset indent
    72 72 newfs /dev/rrp0g eagle
     
    269 269 preceded by its file type.
    270 270 .It Cm y
    271 271 .Nm Restore
    272 will not ask whether it should abort the restore if gets an error.
    272 will not ask whether it should abort the restore if it gets an error.
    273 273 It will always try to skip over the bad block(s) and continue as
    274 274 best it can.
    275 275 .El
  • sbin/route/route.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)route.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)route.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt ROUTE 8
     
    58 58 Lookup and display the route for a destination.
    59 59 .It Cm monitor
    60 60 Continuously report any changes to the routing information base,
    61 routing lookup misses, or suspected network partionings.
    61 routing lookup misses, or suspected network partitionings.
    62 62 .El
    63 63 .Pp
    64 64 The monitor command has the syntax
  • sbin/routed/routed.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)routed.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)routed.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt ROUTED 8
     
    203 203 Active gateways are treated equally to network
    204 204 interfaces. Routing information is distributed
    205 205 to the gateway and if no routing information is
    206 received for a period of the time, the associated
    206 received for a period of time, the associated
    207 207 route is deleted.
    208 208 Gateways marked
    209 209 .Em external
     
    284 284 .Tn EGP
    285 285 is required in order to provide routes for local networks to the rest
    286 286 of the Internet system.
    287 Sites needing assistance with such configurations
    288 should contact the Computer Systems Research Group at Berkeley.
    289 287 .Sh FILES
    290 288 .Bl -tag -width /etc/gateways -compact
    291 289 .It Pa /etc/gateways
  • sbin/tunefs/tunefs.8

     
    3 3 .\"
    4 4 .\" %sccs.include.redist.man%
    5 5 .\"
    6 .\" @(#)tunefs.8 8.1 (Berkeley) 06/05/93
    6 .\" @(#)tunefs.8 8.2 (Berkeley) 12/11/93
    7 7 .\"
    8 8 .Dd
    9 9 .Dt TUNEFS 8
     
    70 70 been deleted to get under the higher threshold.
    71 71 .It Fl o Ar optimize_preference
    72 72 The file system can either try to minimize the time spent
    73 allocating blocks, or it can attempt minimize the space
    73 allocating blocks, or it can attempt to minimize the space
    74 74 fragmentation on the disk.
    75 75 If the value of minfree (see above) is less than 10%,
    76 76 then the file system should optimize for space to avoid