mirror of
https://git.FreeBSD.org/src.git
synced 2024-10-18 02:19:39 +00:00
Mechanically kill hard sentence breaks.
This commit is contained in:
parent
2ac2784f0c
commit
07bfccd71e
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=131500
@ -163,7 +163,7 @@ conditions is satisfied:
|
||||
No routing table entry exists for the destination network
|
||||
or host, and the metric indicates the destination is
|
||||
.Dq reachable
|
||||
(i.e. the hop count is not infinite).
|
||||
(i.e., the hop count is not infinite).
|
||||
.It
|
||||
The source host of the packet is the same as the router in the
|
||||
existing routing table entry.
|
||||
|
@ -73,7 +73,8 @@ Display the connect times in 24 hour chunks.
|
||||
.It Fl p
|
||||
Print individual users' totals.
|
||||
.It Fl t Ar tty
|
||||
Only do accounting logins on certain ttys. The
|
||||
Only do accounting logins on certain ttys.
|
||||
The
|
||||
.Ar tty
|
||||
specification can start with '!' to indicate not this
|
||||
.Ar tty
|
||||
@ -105,7 +106,8 @@ by
|
||||
which rename and rotate the
|
||||
.Pa wtmp
|
||||
files, keeping a week's worth of data on
|
||||
hand. No login or connect time accounting is performed if
|
||||
hand.
|
||||
No login or connect time accounting is performed if
|
||||
.Pa /var/log/wtmp
|
||||
does not exist.
|
||||
.Pp
|
||||
|
@ -47,7 +47,8 @@ If multiple display options are given, the values are displayed one
|
||||
per line in the order given here.
|
||||
.Bl -tag -width indent
|
||||
.It Fl a
|
||||
Display the current AC-line status as an integer value. The values
|
||||
Display the current AC-line status as an integer value.
|
||||
The values
|
||||
0 and 1 correspond to the
|
||||
.Dq off-line
|
||||
state or
|
||||
@ -89,28 +90,35 @@ See
|
||||
.Xr apm 4
|
||||
for details.
|
||||
.It Fl l
|
||||
Display the remaining battery percentage. If your laptop does not
|
||||
Display the remaining battery percentage.
|
||||
If your laptop does not
|
||||
support this function, 255 is displayed.
|
||||
.It Fl r Ar delta
|
||||
Enable the resume wakeup timer, if the laptop supports it. This
|
||||
Enable the resume wakeup timer, if the laptop supports it.
|
||||
This
|
||||
doesn't actually suspend the laptop, but if the laptop is suspended,
|
||||
and it supports resume from suspend, then it will be resumed after
|
||||
.Ar delta
|
||||
seconds (from when you run this command, not from when you suspend).
|
||||
.It Fl s
|
||||
Display the status of the APM support as an integer value. The values
|
||||
Display the status of the APM support as an integer value.
|
||||
The values
|
||||
0 and 1 correspond to the
|
||||
.Dq disabled
|
||||
state or
|
||||
.Dq enabled
|
||||
state respectively.
|
||||
.It Fl t
|
||||
Display the estimated remaining battery lifetime in seconds. If
|
||||
Display the estimated remaining battery lifetime in seconds.
|
||||
If
|
||||
it is unknown, -1 is displayed.
|
||||
.It Fl Z
|
||||
Transition the system into standby mode. This mode uses less power than
|
||||
full power mode, but more than suspend mode. Some laptops support
|
||||
resuming from this state on timer or Ring Indicator events. The
|
||||
Transition the system into standby mode.
|
||||
This mode uses less power than
|
||||
full power mode, but more than suspend mode.
|
||||
Some laptops support
|
||||
resuming from this state on timer or Ring Indicator events.
|
||||
The
|
||||
output of
|
||||
.Nm
|
||||
tells what your laptop claims to support.
|
||||
@ -127,7 +135,8 @@ On such systems,
|
||||
displays them as unknown.
|
||||
.Pp
|
||||
Some APM implementations cannot handle events such as pushing the
|
||||
power button or closing the cover. On such implementations, the system
|
||||
power button or closing the cover.
|
||||
On such implementations, the system
|
||||
.Ar must
|
||||
be suspended
|
||||
.Ar only
|
||||
|
@ -47,10 +47,12 @@ utility
|
||||
monitors the occurrence of the specified Advanced Power Management
|
||||
.Pq Tn APM
|
||||
events and, if one of the events occurs, it executes the sequence of
|
||||
commands corresponding to the event. Only the events specified in the
|
||||
commands corresponding to the event.
|
||||
Only the events specified in the
|
||||
configuration file are notified to
|
||||
.Nm ;
|
||||
all other events are ignored. For each event posted by the APM BIOS,
|
||||
all other events are ignored.
|
||||
For each event posted by the APM BIOS,
|
||||
.Nm
|
||||
invokes the sequence of commands specified in the configuration file.
|
||||
When
|
||||
@ -66,7 +68,8 @@ The
|
||||
utility recognizes the following runtime options:
|
||||
.Bl -tag -width -f_file
|
||||
.It Fl d
|
||||
Starts in debug mode. This causes
|
||||
Starts in debug mode.
|
||||
This causes
|
||||
.Nm
|
||||
to execute in the foreground instead of in daemon mode.
|
||||
.It Fl f Ar file
|
||||
@ -114,7 +117,8 @@ When
|
||||
.Nm
|
||||
receives an APM event, it forks a child process to execute the
|
||||
commands specified in the configuration file and then continues
|
||||
listening for more events. The child process executes the commands
|
||||
listening for more events.
|
||||
The child process executes the commands
|
||||
specified, one at a time and in the order that they are listed.
|
||||
.Pp
|
||||
While
|
||||
@ -135,7 +139,8 @@ This can be used to kill or reconfigure
|
||||
.Sh CONFIGURATION FILE
|
||||
The structure of the
|
||||
.Nm
|
||||
configuration file is quite simple. For example:
|
||||
configuration file is quite simple.
|
||||
For example:
|
||||
.Pp
|
||||
.Bd -literal
|
||||
apm_event SUSPENDREQ {
|
||||
@ -167,7 +172,8 @@ each events.
|
||||
APM events
|
||||
.Bd -ragged -offset indent
|
||||
If you wish to execute the same commands for different events, the
|
||||
event names should be delimited by a comma. The following are
|
||||
event names should be delimited by a comma.
|
||||
The following are
|
||||
valid event names:
|
||||
.Bl -item
|
||||
.It
|
||||
@ -241,7 +247,8 @@ The following built-in functions are currently supported:
|
||||
.It
|
||||
- reject:
|
||||
.Bd -ragged -offset indent
|
||||
Reject last request posted by APM BIOS. This can be used to reject
|
||||
Reject last request posted by APM BIOS.
|
||||
This can be used to reject
|
||||
a SUSPEND request when the LCD is closed and put the system in a
|
||||
STANDBY state instead.
|
||||
.Ed
|
||||
|
@ -98,7 +98,7 @@ In the past,
|
||||
ARP was used to negotiate the use of a trailer encapsulation.
|
||||
This is no longer supported.
|
||||
.Pp
|
||||
ARP watches passively for hosts impersonating the local host (i.e. a host
|
||||
ARP watches passively for hosts impersonating the local host (i.e., a host
|
||||
which responds to an ARP mapping request for the local host's address).
|
||||
.Pp
|
||||
Proxy ARP is a feature whereby the local host will respond to requests
|
||||
|
@ -161,7 +161,8 @@ Cause the file
|
||||
.Ar filename
|
||||
to be read and multiple entries to be set in the
|
||||
.Tn ARP
|
||||
tables. Entries
|
||||
tables.
|
||||
Entries
|
||||
in the file should be of the form
|
||||
.Pp
|
||||
.Bd -ragged -offset indent -compact
|
||||
|
@ -192,7 +192,7 @@ Some statements contain blocks, delimited by braces
|
||||
and
|
||||
.Dq Li } ) .
|
||||
Configuration statement keywords are not case-sensitive,
|
||||
but some parameters (e.g. interface names) are.
|
||||
but some parameters (e.g.\& interface names) are.
|
||||
Configuration statements can span multiple lines.
|
||||
.Ss Comments
|
||||
Three types of comments are allowed:
|
||||
@ -332,7 +332,7 @@ statement must always be specified.
|
||||
The
|
||||
.Ic familyID
|
||||
statement specifies an identifier for a family
|
||||
of parallel SCSP sessions running between a group of hosts (i.e. a
|
||||
of parallel SCSP sessions running between a group of hosts (i.e., a
|
||||
set of SCSP sessions with different protocol IDs but the same set
|
||||
of servers).
|
||||
The
|
||||
|
@ -53,7 +53,8 @@ consists of the
|
||||
and
|
||||
.Sq HDD boot menu .
|
||||
The IPL occupies sector 0 of a disk and is followed by the partition
|
||||
table. The IPL loads the HDD boot menu that starts from 0x400.
|
||||
table.
|
||||
The IPL loads the HDD boot menu that starts from 0x400.
|
||||
.Pp
|
||||
The
|
||||
.Nm
|
||||
@ -67,12 +68,15 @@ than that in the format command.
|
||||
The options are:
|
||||
.Bl -tag -width indent
|
||||
.It Fl B
|
||||
Install the IPL and HDD boot menu. This option causes the IPL and HDD
|
||||
Install the IPL and HDD boot menu.
|
||||
This option causes the IPL and HDD
|
||||
boot menu code to be replaced.
|
||||
.It Fl i Ar boot0
|
||||
Specify which IPL image to use. The default is /boot/boot0.
|
||||
Specify which IPL image to use.
|
||||
The default is /boot/boot0.
|
||||
.It Fl m Ar boot0.5
|
||||
Specify which HDD boot menu image to use. The default is
|
||||
Specify which HDD boot menu image to use.
|
||||
The default is
|
||||
/boot/boot0.5.
|
||||
.It Fl f Ar boot0.bak
|
||||
Specify that a backup copy of the preexisting IPL should be written to
|
||||
@ -86,7 +90,8 @@ This file is created if it does not exist, and truncated if it does.
|
||||
.It Fl v Ar version
|
||||
Specify the version number.
|
||||
.It Fl s Ar secsize
|
||||
Specify the sector size. The default sector size is 512
|
||||
Specify the sector size.
|
||||
The default sector size is 512
|
||||
(bytes/sector).
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
|
@ -72,7 +72,8 @@ or
|
||||
.It Fl l Ar file
|
||||
Specify the BTX loader to be bound with the client.
|
||||
.It Fl o Ar filename
|
||||
Name the output file. The default is
|
||||
Name the output file.
|
||||
The default is
|
||||
.Dq a.out .
|
||||
.It Fl P Ar page
|
||||
Specify the first page of the client's segment to be marked
|
||||
|
@ -48,10 +48,12 @@ formats are supported.
|
||||
.Pp
|
||||
The
|
||||
.Ar file
|
||||
operands may refer to regular files or to directories. Regular files
|
||||
operands may refer to regular files or to directories.
|
||||
Regular files
|
||||
named "md5", or which have an ".md5" or an ".inf" extension, are
|
||||
assumed to be of the implied type, otherwise format is determined from
|
||||
content. If a directory is specified, it is searched for
|
||||
content.
|
||||
If a directory is specified, it is searched for
|
||||
appropriately-named files only.
|
||||
.Pp
|
||||
Options are as follows:
|
||||
|
@ -57,7 +57,8 @@ The
|
||||
.Nm
|
||||
utility
|
||||
then wakes up every minute, examining all stored crontabs, checking each
|
||||
command to see if it should be run in the current minute. When executing
|
||||
command to see if it should be run in the current minute.
|
||||
When executing
|
||||
commands, any output is mailed to the owner of the crontab (or to the user
|
||||
named in the
|
||||
.Ev MAILTO
|
||||
@ -71,9 +72,11 @@ the modification time on
|
||||
has changed, and if it has,
|
||||
.Nm
|
||||
will then examine the modification time on all crontabs and reload those
|
||||
which have changed. Thus
|
||||
which have changed.
|
||||
Thus
|
||||
.Nm
|
||||
need not be restarted whenever a crontab file is modified. Note that the
|
||||
need not be restarted whenever a crontab file is modified.
|
||||
Note that the
|
||||
.Xr crontab 1
|
||||
command updates the modification time of the spool directory whenever it
|
||||
changes a crontab.
|
||||
|
@ -30,19 +30,23 @@ file contains instructions to the
|
||||
.Xr cron 8
|
||||
daemon of the general form: ``run this command at this time on this date''.
|
||||
Each user has their own crontab, and commands in any given crontab will be
|
||||
executed as the user who owns the crontab. Uucp and News will usually have
|
||||
executed as the user who owns the crontab.
|
||||
Uucp and News will usually have
|
||||
their own crontabs, eliminating the need for explicitly running
|
||||
.Xr su 1
|
||||
as part of a cron command.
|
||||
.Pp
|
||||
Blank lines and leading spaces and tabs are ignored. Lines whose first
|
||||
Blank lines and leading spaces and tabs are ignored.
|
||||
Lines whose first
|
||||
non-space character is a pound-sign (#) are comments, and are ignored.
|
||||
Note that comments are not allowed on the same line as cron commands, since
|
||||
they will be taken to be part of the command. Similarly, comments are not
|
||||
they will be taken to be part of the command.
|
||||
Similarly, comments are not
|
||||
allowed on the same line as environment variable settings.
|
||||
.Pp
|
||||
An active line in a crontab will be either an environment setting or a cron
|
||||
command. An environment setting is of the form,
|
||||
command.
|
||||
An environment setting is of the form,
|
||||
.Bd -literal
|
||||
name = value
|
||||
.Ed
|
||||
@ -102,7 +106,8 @@ and
|
||||
will look at
|
||||
.Ev MAILTO
|
||||
if it has any reason to send mail as a result of running
|
||||
commands in ``this'' crontab. If
|
||||
commands in ``this'' crontab.
|
||||
If
|
||||
.Ev MAILTO
|
||||
is defined (and non-empty), mail is
|
||||
sent to the user so named.
|
||||
@ -112,7 +117,9 @@ by seperating recipient users with a comma.
|
||||
If
|
||||
.Ev MAILTO
|
||||
is defined but empty (MAILTO=""), no
|
||||
mail will be sent. Otherwise mail is sent to the owner of the crontab. This
|
||||
mail will be sent.
|
||||
Otherwise mail is sent to the owner of the crontab.
|
||||
This
|
||||
option is useful if you decide on
|
||||
.Pa /bin/mail
|
||||
instead of
|
||||
@ -124,11 +131,13 @@ doesn't do aliasing, and UUCP
|
||||
usually doesn't read its mail.
|
||||
.Pp
|
||||
The format of a cron command is very much the V7 standard, with a number of
|
||||
upward-compatible extensions. Each line has five time and date fields,
|
||||
upward-compatible extensions.
|
||||
Each line has five time and date fields,
|
||||
followed by a user name
|
||||
(with optional ``:<group>'' and ``/<login-class>'' suffixes)
|
||||
if this is the system crontab file,
|
||||
followed by a command. Commands are executed by
|
||||
followed by a command.
|
||||
Commands are executed by
|
||||
.Xr cron 8
|
||||
when the minute, hour, and month of year fields match the current time,
|
||||
.Em and
|
||||
@ -149,25 +158,35 @@ day of week 0-7 (0 or 7 is Sun, or use names)
|
||||
.Pp
|
||||
A field may be an asterisk (*), which always stands for ``first\-last''.
|
||||
.Pp
|
||||
Ranges of numbers are allowed. Ranges are two numbers separated
|
||||
with a hyphen. The specified range is inclusive. For example,
|
||||
Ranges of numbers are allowed.
|
||||
Ranges are two numbers separated
|
||||
with a hyphen.
|
||||
The specified range is inclusive.
|
||||
For example,
|
||||
8-11 for an ``hours'' entry specifies execution at hours 8, 9, 10
|
||||
and 11.
|
||||
.Pp
|
||||
Lists are allowed. A list is a set of numbers (or ranges)
|
||||
separated by commas. Examples: ``1,2,5,9'', ``0-4,8-12''.
|
||||
Lists are allowed.
|
||||
A list is a set of numbers (or ranges)
|
||||
separated by commas.
|
||||
Examples: ``1,2,5,9'', ``0-4,8-12''.
|
||||
.Pp
|
||||
Step values can be used in conjunction with ranges. Following
|
||||
Step values can be used in conjunction with ranges.
|
||||
Following
|
||||
a range with ``/<number>'' specifies skips of the number's value
|
||||
through the range. For example, ``0-23/2'' can be used in the hours
|
||||
through the range.
|
||||
For example, ``0-23/2'' can be used in the hours
|
||||
field to specify command execution every other hour (the alternative
|
||||
in the V7 standard is ``0,2,4,6,8,10,12,14,16,18,20,22''). Steps are
|
||||
in the V7 standard is ``0,2,4,6,8,10,12,14,16,18,20,22'').
|
||||
Steps are
|
||||
also permitted after an asterisk, so if you want to say ``every two
|
||||
hours'', just use ``*/2''.
|
||||
.Pp
|
||||
Names can also be used for the ``month'' and ``day of week''
|
||||
fields. Use the first three letters of the particular
|
||||
day or month (case doesn't matter). Ranges or
|
||||
fields.
|
||||
Use the first three letters of the particular
|
||||
day or month (case doesn't matter).
|
||||
Ranges or
|
||||
lists of names are not allowed.
|
||||
.Pp
|
||||
The ``sixth'' field (the rest of the line) specifies the command to be
|
||||
@ -185,10 +204,12 @@ after the first % will be sent to the command as standard
|
||||
input.
|
||||
.Pp
|
||||
Note: The day of a command's execution can be specified by two
|
||||
fields \(em day of month, and day of week. If both fields are
|
||||
fields \(em day of month, and day of week.
|
||||
If both fields are
|
||||
restricted (ie, aren't *), the command will be run when
|
||||
.Em either
|
||||
field matches the current time. For example,
|
||||
field matches the current time.
|
||||
For example,
|
||||
``30 4 1,15 * 5''
|
||||
would cause a command to be run at 4:30 am on the 1st and 15th of each
|
||||
month, plus every Friday.
|
||||
@ -234,7 +255,8 @@ and
|
||||
.Tn ATT
|
||||
seem to disagree about this.
|
||||
.Pp
|
||||
Lists and ranges are allowed to co-exist in the same field. "1-3,7-9" would
|
||||
Lists and ranges are allowed to co-exist in the same field.
|
||||
"1-3,7-9" would
|
||||
be rejected by
|
||||
.Tn ATT
|
||||
or
|
||||
@ -245,7 +267,8 @@ Ranges can include "steps", so "1-9/2" is the same as "1,3,5,7,9".
|
||||
.Pp
|
||||
Names of months or days of the week can be specified by name.
|
||||
.Pp
|
||||
Environment variables can be set in the crontab. In
|
||||
Environment variables can be set in the crontab.
|
||||
In
|
||||
.Bx
|
||||
or
|
||||
.Tn ATT ,
|
||||
@ -269,11 +292,13 @@ are extensions.
|
||||
.Sh BUGS
|
||||
If you're in one of the 70-odd countries that observe Daylight
|
||||
Savings Time, jobs scheduled during the rollback or advance will be
|
||||
affected. In general, it's not a good idea to schedule jobs during
|
||||
affected.
|
||||
In general, it's not a good idea to schedule jobs during
|
||||
this period.
|
||||
.Pp
|
||||
For US timezones (except parts of IN, AZ, and HI) the time shift occurs at
|
||||
2AM local time. For others, the output of the
|
||||
2AM local time.
|
||||
For others, the output of the
|
||||
.Xr zdump 8
|
||||
program's verbose
|
||||
.Fl ( v )
|
||||
|
@ -46,14 +46,16 @@ Some symbols may be left visible via the
|
||||
.Fl k Ar keep-symbol
|
||||
and
|
||||
.Fl f Ar keep-list-file
|
||||
options. The
|
||||
options.
|
||||
The
|
||||
.Ar keep-list-file
|
||||
must contain a list of symbols to keep visible, one symbol per line.
|
||||
The names given by
|
||||
.Ar keep-symbol
|
||||
or in
|
||||
.Ar keep-list-file
|
||||
should be C names. For example,
|
||||
should be C names.
|
||||
For example,
|
||||
to keep the C function
|
||||
.Dq foo
|
||||
visible, the option
|
||||
@ -70,12 +72,14 @@ multiple component programs.
|
||||
.Xr crunchgen 1 ,
|
||||
.Xr ld 1
|
||||
.Sh AUTHORS
|
||||
.An -nosplit
|
||||
The
|
||||
.Nm crunch
|
||||
utility was written by
|
||||
.An James da Silva Aq jds@cs.umd.edu .
|
||||
.Pp
|
||||
Copyright (c) 1994 University of Maryland. All Rights Reserved.
|
||||
Copyright (c) 1994 University of Maryland.
|
||||
All Rights Reserved.
|
||||
.Pp
|
||||
.An Chris Demetriou Aq cgd@netbsd.org
|
||||
reorganized
|
||||
@ -83,4 +87,6 @@ reorganized
|
||||
so that it supported multiple object formats, and added
|
||||
ELF object support and ECOFF object recognition.
|
||||
.Pp
|
||||
Copyright (c) 1997 Christopher G. Demetriou. All Rights Reserved.
|
||||
Copyright (c) 1997
|
||||
.An Christopher G. Demetriou .
|
||||
All Rights Reserved.
|
||||
|
@ -42,21 +42,27 @@ The
|
||||
utility is now meant to be the definitive way to make and apply a delta between
|
||||
two versions of a directory tree.
|
||||
.Pp
|
||||
There are two parts to this, making the delta and applying it. These are two
|
||||
There are two parts to this, making the delta and applying it.
|
||||
These are two
|
||||
entirely different things.
|
||||
.Ss Usage
|
||||
To apply a CTM delta, you pass it to the
|
||||
.Nm
|
||||
command. You can pass a CTM delta on stdin, or you can give the
|
||||
filename as an argument. If you do the latter, you make life a lot
|
||||
command.
|
||||
You can pass a CTM delta on stdin, or you can give the
|
||||
filename as an argument.
|
||||
If you do the latter, you make life a lot
|
||||
easier for your self, since the program can accept gzip'ed files and
|
||||
since it will not have to make a temporary copy of your file. You can
|
||||
since it will not have to make a temporary copy of your file.
|
||||
You can
|
||||
specify multiple deltas at one time, they will be processed one at a
|
||||
time. Deltas that are already applied will be ignored.
|
||||
time.
|
||||
Deltas that are already applied will be ignored.
|
||||
.Pp
|
||||
The
|
||||
.Nm
|
||||
command runs in a number of passes. It will process the entire
|
||||
command runs in a number of passes.
|
||||
It will process the entire
|
||||
input file in each pass, before commencing with the next pass.
|
||||
.Pp
|
||||
Before working on a file
|
||||
@ -68,13 +74,16 @@ If this file exists,
|
||||
.Nm
|
||||
works on it instead.
|
||||
.Pp
|
||||
Pass 1 will verify that the input file is OK. The syntax, the data
|
||||
and the global MD5 checksum will be checked. If any of these fail,
|
||||
Pass 1 will verify that the input file is OK.
|
||||
The syntax, the data
|
||||
and the global MD5 checksum will be checked.
|
||||
If any of these fail,
|
||||
.Nm
|
||||
will simply reject the input file.
|
||||
.Pp
|
||||
Pass 2 will validate that the directory tree is in the state expected by
|
||||
the CTM delta. This is done by looking for files and directories which
|
||||
the CTM delta.
|
||||
This is done by looking for files and directories which
|
||||
should/should not exist and by checking the MD5 checksums of files.
|
||||
.Pp
|
||||
If a
|
||||
@ -86,7 +95,8 @@ option, all files that would be modified by this
|
||||
invocation are backed up
|
||||
to this file using the archiver command specified by the
|
||||
.Fl t
|
||||
option. The default archiver command is
|
||||
option.
|
||||
The default archiver command is
|
||||
.Nm "tar -rf %s -T -" .
|
||||
.Pp
|
||||
Pass 3 will actually apply the delta.
|
||||
@ -103,7 +113,8 @@ The
|
||||
.Fl e
|
||||
and
|
||||
.Fl x
|
||||
options are applied in order of appearance on the command line. The last
|
||||
options are applied in order of appearance on the command line.
|
||||
The last
|
||||
filter that matched a given file name determines whether the file would be
|
||||
operated on or left alone by
|
||||
.Nm .
|
||||
@ -111,7 +122,8 @@ operated on or left alone by
|
||||
The
|
||||
.Nm
|
||||
utility
|
||||
will extract the file hierarchy below its working directory. Absolute
|
||||
will extract the file hierarchy below its working directory.
|
||||
Absolute
|
||||
filenames or filenames containing references through
|
||||
.Sq Pa .\&
|
||||
and
|
||||
@ -137,10 +149,13 @@ Check it out, don't do anything.
|
||||
.It Fl e Ar regular_expression
|
||||
Match each name in the CTM file against
|
||||
.Ar regular_expression ,
|
||||
and if it matches process the file, otherwise leave it alone. There may be
|
||||
any number of these options. Use of this option disables the
|
||||
and if it matches process the file, otherwise leave it alone.
|
||||
There may be
|
||||
any number of these options.
|
||||
Use of this option disables the
|
||||
.Pa .ctm_status
|
||||
sequence number checks. For example, the expression
|
||||
sequence number checks.
|
||||
For example, the expression
|
||||
.Ic ^usr.sbin/ctm
|
||||
for example, will select the
|
||||
.Pa usr.sbin/ctm
|
||||
@ -153,16 +168,19 @@ option.
|
||||
Force.
|
||||
.It Fl k
|
||||
Keep files and directories and don't remove them even if the CTM file
|
||||
specifies they are to be removed. If the
|
||||
specifies they are to be removed.
|
||||
If the
|
||||
.Fl B
|
||||
option is specified, these files and directories will not be backed up.
|
||||
.It Fl l
|
||||
List files that would be modified by this invocation of CTM and the
|
||||
actions that would be performed on them. Use of the
|
||||
actions that would be performed on them.
|
||||
Use of the
|
||||
.Fl l
|
||||
option disables the
|
||||
.Pa .ctm_status
|
||||
checks and integrity checks on the source tree being operated on. The
|
||||
checks and integrity checks on the source tree being operated on.
|
||||
The
|
||||
.Fl l
|
||||
option can be combined with the
|
||||
.Fl e
|
||||
@ -179,7 +197,8 @@ instead of the default archiver
|
||||
.Nm tar .
|
||||
This option takes effect only if a backup file had been specified using the
|
||||
.Fl B
|
||||
option. A %s in the tar command will be replaced by the name of the backup
|
||||
option.
|
||||
A %s in the tar command will be replaced by the name of the backup
|
||||
file.
|
||||
.It Fl T Ar tmpdir
|
||||
Put temporary files under
|
||||
@ -196,8 +215,10 @@ is the level of verbosity.
|
||||
.It Fl x Ar regular_expression
|
||||
Match each name in the CTM file against
|
||||
.Ar regular_expression
|
||||
and if it matches, leave the file alone. There may be any number of these
|
||||
options. Use of this option disables the
|
||||
and if it matches, leave the file alone.
|
||||
There may be any number of these
|
||||
options.
|
||||
Use of this option disables the
|
||||
.Pa .ctm_status
|
||||
sequence number checks.
|
||||
.Pp
|
||||
@ -247,7 +268,8 @@ The same effect may be achieved with the
|
||||
flag.
|
||||
.Sh FILES
|
||||
.Pa .ctm_status
|
||||
contains the sequence number of the last CTM delta applied. Changing
|
||||
contains the sequence number of the last CTM delta applied.
|
||||
Changing
|
||||
or removing this file will greatly confuse
|
||||
.Nm .
|
||||
.Pp
|
||||
@ -256,7 +278,8 @@ Using the
|
||||
and
|
||||
.Fl x
|
||||
options can update a partial subset of the source tree and causes sources
|
||||
to be in an inconsistent state. It is assumed that you know what you are
|
||||
to be in an inconsistent state.
|
||||
It is assumed that you know what you are
|
||||
doing when you use these options.
|
||||
.Sh EXAMPLES
|
||||
.Bd -literal
|
||||
@ -270,7 +293,8 @@ cd ~/lib-srcs
|
||||
/usr/sbin/ctm -e '^lib' ~ctm/src-cur*
|
||||
.Ed
|
||||
.Sh DIAGNOSTICS
|
||||
Numerous messages, hopefully self-explanatory. The
|
||||
Numerous messages, hopefully self-explanatory.
|
||||
The
|
||||
.Dq noise level
|
||||
can be adjusted with the
|
||||
.Fl q ,
|
||||
|
@ -23,7 +23,8 @@ The
|
||||
.Nm
|
||||
transfers data in a specific file format, called a CTM delta.
|
||||
.Pp
|
||||
CTM deltas consist of control lines and data chunks. Each control
|
||||
CTM deltas consist of control lines and data chunks.
|
||||
Each control
|
||||
line starts with the letters
|
||||
.Dq CTM ,
|
||||
followed by a CTM statement and control data, and ends with a '\en'
|
||||
@ -38,7 +39,8 @@ newline is not part of the chunk and isn't included in the count.
|
||||
The CTM statements are as follows.
|
||||
.Bl -tag -width indent
|
||||
.It _BEGIN Ar version name number timestamp prefix
|
||||
This is the overall begin of a CTM delta file. The
|
||||
This is the overall begin of a CTM delta file.
|
||||
The
|
||||
.Ar version
|
||||
field must match the program version
|
||||
(currently 2.0).
|
||||
|
@ -49,7 +49,8 @@ The
|
||||
.Nm ctm_smail
|
||||
utility is given a compressed
|
||||
.Xr ctm
|
||||
delta, and a mailing list to send it to. It splits the delta into manageable
|
||||
delta, and a mailing list to send it to.
|
||||
It splits the delta into manageable
|
||||
pieces, encodes them as mail messages and sends them to the mailing list
|
||||
(optionally queued to spread the mail load).
|
||||
Each recipient uses
|
||||
@ -59,7 +60,8 @@ optionally call
|
||||
.Xr ctm
|
||||
to apply it to the source tree.
|
||||
At the moment,
|
||||
several source trees are distributed, and by several sites. These include
|
||||
several source trees are distributed, and by several sites.
|
||||
These include
|
||||
the
|
||||
.Fx Ns -current
|
||||
source and CVS trees, distributed by
|
||||
@ -77,16 +79,22 @@ are time stamped and written to the file
|
||||
.It Fl m Ar maxmsgsize
|
||||
Limit the maximum size mail message that
|
||||
.Nm ctm_smail
|
||||
is allowed to send. It is approximate since mail headers and other niceties
|
||||
are not counted in this limit. If not specified, it will default to 64000
|
||||
is allowed to send.
|
||||
It is approximate since mail headers and other niceties
|
||||
are not counted in this limit.
|
||||
If not specified, it will default to 64000
|
||||
bytes, leaving room for 1535 bytes of headers before the rumoured 64k mail
|
||||
limit.
|
||||
.It Fl c Ar maxctmsize
|
||||
Limit the maximum size delta that will be sent. Deltas bigger that this
|
||||
Limit the maximum size delta that will be sent.
|
||||
Deltas bigger that this
|
||||
limit will cause an apology mail message to be sent to the mailing list.
|
||||
This is to prevent massive changes overwhelming users' mail boxes. Note that
|
||||
this is the size before encoding. Encoding causes a 4/3 size increase before
|
||||
mail headers are added. If not specified, there is no limit.
|
||||
This is to prevent massive changes overwhelming users' mail boxes.
|
||||
Note that
|
||||
this is the size before encoding.
|
||||
Encoding causes a 4/3 size increase before
|
||||
mail headers are added.
|
||||
If not specified, there is no limit.
|
||||
.It Fl q Ar queue-dir
|
||||
Instead of mailing the delta pieces now, store them in the given directory
|
||||
to be mailed later using
|
||||
@ -115,7 +123,8 @@ are time stamped and written to the file
|
||||
.It Fl n Ar numchunks
|
||||
Limit the number of mail messages that
|
||||
.Nm ctm_dequeue
|
||||
will send per run. By default,
|
||||
will send per run.
|
||||
By default,
|
||||
.Nm ctm_dequeue
|
||||
will send one mail message per run.
|
||||
.El
|
||||
@ -125,7 +134,8 @@ is the directory containing the mail messages stored by
|
||||
.Nm ctm_smail .
|
||||
Up to
|
||||
.Ar numchunks
|
||||
mail messages will be sent in each run. The recipient mailing list is already
|
||||
mail messages will be sent in each run.
|
||||
The recipient mailing list is already
|
||||
encoded in the queued files.
|
||||
.Pp
|
||||
It is safe to run
|
||||
@ -135,7 +145,8 @@ while
|
||||
is adding entries to the queue, or even to run
|
||||
.Nm ctm_smail
|
||||
multiple times concurrently, but a separate queue directory should be used
|
||||
for each tree being distributed. This is because entries are served in
|
||||
for each tree being distributed.
|
||||
This is because entries are served in
|
||||
alphabetical order, and one tree will be unfairly serviced before any others,
|
||||
based on the delta names, not delta creation times.
|
||||
.Pp
|
||||
@ -149,8 +160,10 @@ error diagnostics and informational messages (other than command line errors)
|
||||
are time stamped and written to the file
|
||||
.Em log .
|
||||
.It Fl p Ar piecedir
|
||||
Collect pieces of deltas in this directory. Each piece corresponds to a
|
||||
single mail message. Pieces are removed when complete deltas are built.
|
||||
Collect pieces of deltas in this directory.
|
||||
Each piece corresponds to a
|
||||
single mail message.
|
||||
Pieces are removed when complete deltas are built.
|
||||
If this flag is not given, no input files will be read, but completed
|
||||
deltas may still be applied with
|
||||
.Xr ctm
|
||||
@ -158,11 +171,14 @@ if the
|
||||
.Fl b
|
||||
flag is given.
|
||||
.It Fl d Ar deltadir
|
||||
Collect completed deltas in this directory. Deltas are built from one or
|
||||
Collect completed deltas in this directory.
|
||||
Deltas are built from one or
|
||||
more pieces when all pieces are present.
|
||||
.It Fl b Ar basedir
|
||||
Apply any completed deltas to this source tree. If this flag is not given,
|
||||
deltas will be stored, but not applied. The user may then apply the deltas
|
||||
Apply any completed deltas to this source tree.
|
||||
If this flag is not given,
|
||||
deltas will be stored, but not applied.
|
||||
The user may then apply the deltas
|
||||
manually, or by using
|
||||
.Nm ctm_rmail
|
||||
without the
|
||||
@ -217,7 +233,8 @@ Pass the
|
||||
flag to the
|
||||
.Xr ctm
|
||||
command when applying the complete deltas, causing a more informative
|
||||
output. All
|
||||
output.
|
||||
All
|
||||
.Xr ctm
|
||||
output appears in the
|
||||
.Nm ctm_rmail
|
||||
@ -226,7 +243,8 @@ log file.
|
||||
.Pp
|
||||
The file arguments (or
|
||||
.Em stdin ,
|
||||
if there are none) are scanned for delta pieces. Multiple delta pieces
|
||||
if there are none) are scanned for delta pieces.
|
||||
Multiple delta pieces
|
||||
can be read from a single file, so an entire maildrop can be scanned
|
||||
and processed with a single command.
|
||||
.Pp
|
||||
@ -235,7 +253,8 @@ It is safe to invoke
|
||||
multiple times concurrently (with different input files),
|
||||
as might happen when
|
||||
.Xr sendmail
|
||||
is delivering mail asynchronously. This is because locking is used to
|
||||
is delivering mail asynchronously.
|
||||
This is because locking is used to
|
||||
keep things orderly.
|
||||
.Sh FILE FORMAT
|
||||
Following are the important parts of an actual (very small) delta piece:
|
||||
@ -255,7 +274,8 @@ CTM_MAIL END 61065
|
||||
The subject of the message always begins with
|
||||
.Dq ctm-mail
|
||||
followed by the name of the delta, which piece this is, and how many total
|
||||
pieces there are. The data are bracketed by
|
||||
pieces there are.
|
||||
The data are bracketed by
|
||||
.Dq CTM_MAIL BEGIN
|
||||
and
|
||||
.Dq CTM_MAIL END
|
||||
@ -429,7 +449,8 @@ The
|
||||
.Nm ctm_rmail
|
||||
utility is expected to be called from a mail transfer program, and thus signals
|
||||
failure only when the input mail message should be bounced (preferably into
|
||||
your regular maildrop, not back to the sender). In short, failure to
|
||||
your regular maildrop, not back to the sender).
|
||||
In short, failure to
|
||||
apply a completed delta with
|
||||
.Xr ctm
|
||||
is not considered an error important enough to bounce the mail, and
|
||||
@ -471,14 +492,17 @@ will report:
|
||||
ctm_rmail: message contains no delta
|
||||
.Ed
|
||||
.Pp
|
||||
and return an exit status of 1. You can use this to redirect wayward messages
|
||||
and return an exit status of 1.
|
||||
You can use this to redirect wayward messages
|
||||
back into your real mailbox if your mail filter goes wonky.
|
||||
.Pp
|
||||
These messages go to
|
||||
.Em stderr
|
||||
or to the log file. Messages from
|
||||
or to the log file.
|
||||
Messages from
|
||||
.Xr ctm 1
|
||||
turn up here too. Error messages should be self explanatory.
|
||||
turn up here too.
|
||||
Error messages should be self explanatory.
|
||||
.Sh SEE ALSO
|
||||
.Xr ctm 1 ,
|
||||
.Xr ctm 5
|
||||
|
@ -126,10 +126,11 @@ specified for each user specified.
|
||||
This is the normal mechanism used to
|
||||
initialize quotas for groups of users.
|
||||
If the user given to assign quotas to is a numerical uid
|
||||
range (e.g. 1000-2000), then
|
||||
range (e.g.\& 1000-2000), then
|
||||
.Nm
|
||||
will duplicate the quotas of the prototypical user
|
||||
for each uid in the range specified. This allows
|
||||
for each uid in the range specified.
|
||||
This allows
|
||||
for easy setup of default quotas for a group of users.
|
||||
The uids in question do not have to be currently assigned in
|
||||
.Pa /etc/passwd .
|
||||
|
@ -229,7 +229,7 @@ The sector interleave to be applied when formatting.
|
||||
0 means no
|
||||
interleave, 1 means 1:1 etc.
|
||||
.It Ar offs2
|
||||
The offset of the sector numbers on side 2 (i.e. head number 1).
|
||||
The offset of the sector numbers on side 2 (i.e., head number 1).
|
||||
Normally, sector numbering on both sides starts with 1.
|
||||
.It Ar flags
|
||||
A list from one of the following flag values:
|
||||
@ -243,7 +243,7 @@ Use FM (single-density) encoding.
|
||||
Use 2 steps per each cylinder (for accessing 40-cylinder media in
|
||||
80-cylinder drives).
|
||||
.It Cm -2step
|
||||
Do not use 2 steps per cylinder, i.e. access each physical cylinder
|
||||
Do not use 2 steps per cylinder, i.e., access each physical cylinder
|
||||
of the drive.
|
||||
.It Cm +perpend
|
||||
Use perpendicular recording (for 2.88 MB media, currently not
|
||||
|
@ -45,7 +45,8 @@
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Nm
|
||||
utility reads floppy disks. Effective read blocking based on the track
|
||||
utility reads floppy disks.
|
||||
Effective read blocking based on the track
|
||||
size is performed, and floppy-specific error recovery of otherwise
|
||||
bad blocks can be enabled.
|
||||
.Pp
|
||||
@ -53,7 +54,8 @@ The
|
||||
.Nm
|
||||
utility
|
||||
will always read an entire floppy medium, and write its contents to
|
||||
the respective output file. Unlike other tools like
|
||||
the respective output file.
|
||||
Unlike other tools like
|
||||
.Xr dd 1 ,
|
||||
.Nm
|
||||
automatically uses a read block size that is more efficient than
|
||||
@ -70,18 +72,22 @@ The
|
||||
utility accepts the following options:
|
||||
.Bl -tag -width indent
|
||||
.It Fl q
|
||||
Turn on quiet mode. By default, the medium parameters of the device
|
||||
Turn on quiet mode.
|
||||
By default, the medium parameters of the device
|
||||
are being written to standard error output, progress will be indicated
|
||||
by the approximate number of kilobytes read so far, and errors will be
|
||||
printed out in detail, including the information about the location of
|
||||
recovered data in the output. In quiet mode, none of these messages
|
||||
recovered data in the output.
|
||||
In quiet mode, none of these messages
|
||||
will be generated.
|
||||
.It Fl r
|
||||
Enable error recovery. By default,
|
||||
Enable error recovery.
|
||||
By default,
|
||||
.Nm
|
||||
stops after the first unrecovered read error, much like
|
||||
.Xr dd 1
|
||||
does. In recovery mode, however, one of two recovery actions will be
|
||||
does.
|
||||
In recovery mode, however, one of two recovery actions will be
|
||||
taken:
|
||||
.Bl -bullet
|
||||
.It
|
||||
@ -109,7 +115,8 @@ The parameter
|
||||
must be a valid floppy disk device.
|
||||
.It Fl f Ar fillbyte
|
||||
Value of the fill byte used for dummy blocks in the output file in
|
||||
recovery mode. Defaults to
|
||||
recovery mode.
|
||||
Defaults to
|
||||
.Ql 0xf0 .
|
||||
(Mnemonic:
|
||||
.Dq foo . )
|
||||
@ -174,13 +181,16 @@ and
|
||||
as well as the location of the error (physical cylinder, head, and sector
|
||||
number, plus the
|
||||
.Dq sector shift value ,
|
||||
respectively). See the manual for the NE765 or compatible for details
|
||||
respectively).
|
||||
See the manual for the NE765 or compatible for details
|
||||
about the status register contents.
|
||||
.Pp
|
||||
The FDC's status is then examined to determine whether the error is
|
||||
deemed to be recoverable. If error recovery was requested, the
|
||||
deemed to be recoverable.
|
||||
If error recovery was requested, the
|
||||
location of the bad block in the output file is indicated by its
|
||||
(hexadecimal) bounds. Also, a summary line indicating the total number
|
||||
(hexadecimal) bounds.
|
||||
Also, a summary line indicating the total number
|
||||
of transfer errors will be printed before exiting.
|
||||
.Sh SEE ALSO
|
||||
.Xr dd 1 ,
|
||||
@ -206,7 +216,8 @@ Program and man page by
|
||||
Concurrent traffic on the second floppy drive located at the same FDC
|
||||
will make error recovery attempts pointless, since the FDC status
|
||||
obtained after a read error occurred cannot be guaranteed to actually
|
||||
belong to the erroneous transfer. Thus using option
|
||||
belong to the erroneous transfer.
|
||||
Thus using option
|
||||
.Fl r
|
||||
is only reliable if
|
||||
.Ar device
|
||||
|
@ -58,9 +58,11 @@ Don't ask for presence of a floppy disk in the drive.
|
||||
This non-interactive flag
|
||||
is useful for shell scripts.
|
||||
.It Fl f Ar inputfile
|
||||
Input file to read. If none is given, stdin is assumed.
|
||||
Input file to read.
|
||||
If none is given, stdin is assumed.
|
||||
.It Fl d Ar device
|
||||
The name of the floppy device to write to. Default is
|
||||
The name of the floppy device to write to.
|
||||
Default is
|
||||
.Pa /dev/fd0 .
|
||||
.El
|
||||
.Pp
|
||||
|
@ -48,7 +48,8 @@ It reads audio G.711 A-Law coded data from stdin and outputs the detected
|
||||
numbers values as ASCII characters to stdout.
|
||||
.Pp
|
||||
The detector is implemented as 8 narrow band-pass filters realized with
|
||||
an integer double-cross recursive algorithm. Various ad-hoc methods are
|
||||
an integer double-cross recursive algorithm.
|
||||
Various ad-hoc methods are
|
||||
employed to provide hysteresis and anti-bounce for the detected signals.
|
||||
.Sh EXAMPLES
|
||||
The command:
|
||||
|
@ -46,7 +46,8 @@ The
|
||||
.Nm
|
||||
utility
|
||||
is part of the isdn4bsd package and is used to convert between the A-Law and
|
||||
u-law formats as specified in ITU G.711. It is based on a freely available
|
||||
u-law formats as specified in ITU G.711.
|
||||
It is based on a freely available
|
||||
and freely usable reference implementation done by Sun Microsystems, Inc.
|
||||
.Pp
|
||||
The following options are available:
|
||||
@ -66,7 +67,7 @@ doing the actual conversion.
|
||||
.Sh STANDARDS
|
||||
A-Law and u-Law conversions are specified in ITU Recommendation G.711.
|
||||
.Pp
|
||||
The reference implementation done by Sun Microsystems, Inc. is available
|
||||
The reference implementation done by Sun Microsystems, Inc.\& is available
|
||||
from http://www.itu.int/itudoc/itu-t/rec/g/g700-799/refimpl.txt
|
||||
.Sh EXAMPLES
|
||||
The command:
|
||||
@ -89,4 +90,4 @@ The
|
||||
utility and this manpage were written by
|
||||
.An Hellmuth Michaelis Aq hm@kts.org
|
||||
based on the G.711 conversion reference code written by Sun Microsystems,
|
||||
Inc. and code contributed to isdn4bsd by Stefan Bethke.
|
||||
Inc.\& and code contributed to isdn4bsd by Stefan Bethke.
|
||||
|
@ -64,7 +64,8 @@ is the time the connection was established in the format
|
||||
.Dl Day.Month.Year Hour:Minutes:seconds
|
||||
.Pp
|
||||
.Em UNTIL
|
||||
is the time the connection was closed. The format is the same as
|
||||
is the time the connection was closed.
|
||||
The format is the same as
|
||||
described for
|
||||
.Em FROM
|
||||
above.
|
||||
|
@ -38,7 +38,8 @@
|
||||
The file
|
||||
.Pa isdnd.rates
|
||||
contains descriptions how long charging units last at a given time of day,
|
||||
day of week and the distance to the destination. If this file is available,
|
||||
day of week and the distance to the destination.
|
||||
If this file is available,
|
||||
this information may be used by the
|
||||
.Xr isdnd 8
|
||||
ISDN connection management daemon to calculate the short hold time for a
|
||||
@ -69,9 +70,12 @@ start_hour.start_minutes-end_hour.end_minutes:charge_unit_length
|
||||
.Ed
|
||||
.Pp
|
||||
Start_hour and start_minutes define the begin of a time section and end_hour
|
||||
and end_minutes define the end. Charge_unit_length define the length of a
|
||||
charging unit in the previously defined time section. No spaces or tabs are
|
||||
allowed inside this field. The hour and minutes specifications MUST have
|
||||
and end_minutes define the end.
|
||||
Charge_unit_length define the length of a
|
||||
charging unit in the previously defined time section.
|
||||
No spaces or tabs are
|
||||
allowed inside this field.
|
||||
The hour and minutes specifications MUST have
|
||||
exactly 2 digits, in case just one digit is needed, a leading 0 must be used.
|
||||
.Pp
|
||||
For example,
|
||||
|
@ -457,7 +457,7 @@ which is prepended to the string specified as a parameter to this keyword.
|
||||
The programs specified by connect and disconnect will get the following
|
||||
command line arguments: -d (device) -f (flag) [ -a (addr) ] where
|
||||
.Em device
|
||||
is the name of device, e.g. "isp0",
|
||||
is the name of device, e.g.\& "isp0",
|
||||
.Em flag
|
||||
will be "up" if connection just got up, or "down" if interface changed to down
|
||||
state and
|
||||
|
@ -71,7 +71,8 @@ Set debugging mask for the selected layer(s) to display errors only.
|
||||
.It Fl g
|
||||
Get the debugging mask for the selected layer(s).
|
||||
.It Fl l
|
||||
Specify the layer for which a command applies. Default is all layers.
|
||||
Specify the layer for which a command applies.
|
||||
Default is all layers.
|
||||
.It Fl m
|
||||
Set debugging mask for the selected layer(s) to display all possible
|
||||
debugging messages (maximum output).
|
||||
@ -81,7 +82,8 @@ Display the Q.921 (D-channel layer 2) frame receive/transmit statistics.
|
||||
Set debugging mask for the selected layer(s) to the compiled in default
|
||||
(reset).
|
||||
.It Fl s
|
||||
Set debugging mask for the selected layer(s) to value. Value can be
|
||||
Set debugging mask for the selected layer(s) to value.
|
||||
Value can be
|
||||
specified in any number base supported by
|
||||
.Xr sscanf 3 .
|
||||
.It Fl u
|
||||
|
@ -74,9 +74,11 @@ Run
|
||||
in analyzer mode by using two passive cards and a custom cable which can
|
||||
be build as described in the file
|
||||
.Em cable.txt
|
||||
in the isdn4bsd source distribution. One card acts as a receiver for the
|
||||
in the isdn4bsd source distribution.
|
||||
One card acts as a receiver for the
|
||||
transmitting direction on the S0 bus while the other card acts as a receiver
|
||||
for the receiving direction on the S0 bus. Complete traffic monitoring is
|
||||
for the receiving direction on the S0 bus.
|
||||
Complete traffic monitoring is
|
||||
possible using this setup.
|
||||
.It Fl b
|
||||
switch B channel tracing on (default off).
|
||||
@ -126,7 +128,8 @@ When the USR1 signal is sent to a
|
||||
process, the currently used logfiles are reopened, so that logfile
|
||||
rotation becomes possible.
|
||||
.Pp
|
||||
The decode output should be obvious. It is very handy to have the following
|
||||
The decode output should be obvious.
|
||||
It is very handy to have the following
|
||||
standard texts available when tracing ISDN protocols:
|
||||
.Pp
|
||||
.Bl -tag -width Ds -compact -offset indent
|
||||
|
@ -53,17 +53,20 @@ devices supported by the isdn4bsd package.
|
||||
The options are as follows:
|
||||
.Bl -tag -width Ds
|
||||
.It Fl c
|
||||
Switch to (curses-) fullscreen mode of operation. In this mode,
|
||||
Switch to (curses-) fullscreen mode of operation.
|
||||
In this mode,
|
||||
.Nm
|
||||
behaves nearly exactly as
|
||||
.Xr isdnd 8
|
||||
in fullscreen mode. In fullscreen mode, entering the control character
|
||||
in fullscreen mode.
|
||||
In fullscreen mode, entering the control character
|
||||
.Em Control-L
|
||||
causes the display to be refreshed and entering
|
||||
.Em Carriage-Return
|
||||
or
|
||||
.Em Enter
|
||||
will pop-up a command window. Because
|
||||
will pop-up a command window.
|
||||
Because
|
||||
.Nm
|
||||
will not listen to messages while the command window is active,
|
||||
this command window will disappear automatically after 5 seconds without
|
||||
@ -73,7 +76,8 @@ While the command window is active,
|
||||
.Em Tab
|
||||
or
|
||||
.Em Space
|
||||
advances to the next menu item. To execute a command, press
|
||||
advances to the next menu item.
|
||||
To execute a command, press
|
||||
.Em Return
|
||||
or
|
||||
.Em Enter
|
||||
|
@ -51,11 +51,14 @@ The following options are supported:
|
||||
.It Fl a
|
||||
Use
|
||||
.Ar aliasfile
|
||||
as the pathname for an aliasfile containing aliases for phone numbers. The
|
||||
as the pathname for an aliasfile containing aliases for phone numbers.
|
||||
The
|
||||
default path is
|
||||
.Em /etc/isdn/isdntel.alias .
|
||||
The format of an alias entry is the number string followed by one or more
|
||||
spaces or tabs. The rest of the line is taken as the alias string. Comments
|
||||
spaces or tabs.
|
||||
The rest of the line is taken as the alias string.
|
||||
Comments
|
||||
are introduced by a leading blank, tab or "#" character.
|
||||
.It Fl d
|
||||
Use
|
||||
@ -72,9 +75,11 @@ The format of a voice message filename is:
|
||||
Use
|
||||
.Ar playcommand
|
||||
as the command string to execute for playing a voice message to some audio
|
||||
output facility. The characters
|
||||
output facility.
|
||||
The characters
|
||||
.Em %s
|
||||
are replaced by the currently selected filename. The default string is
|
||||
are replaced by the currently selected filename.
|
||||
The default string is
|
||||
.Dq Li cat %s \&| alaw2ulaw >/dev/audio .
|
||||
.It Fl t
|
||||
The value for
|
||||
@ -83,7 +88,8 @@ specifies the time in seconds the program rereads the spool directory
|
||||
when there is no keyboard activity.
|
||||
.El
|
||||
.Pp
|
||||
The screen output should be obvious. If in doubt, consult the source.
|
||||
The screen output should be obvious.
|
||||
If in doubt, consult the source.
|
||||
.Sh SEE ALSO
|
||||
.Xr i4btel 4 ,
|
||||
.Xr isdnd.rc 5 ,
|
||||
|
@ -56,7 +56,8 @@ Clear the telephone input queue.
|
||||
.It Fl g
|
||||
Get the sound format currently in use.
|
||||
.It Fl u
|
||||
Set the /dev/i4btel unit number. The default value is zero to access
|
||||
Set the /dev/i4btel unit number.
|
||||
The default value is zero to access
|
||||
device /dev/i4btel0.
|
||||
.It Fl A
|
||||
Do A-law (ISDN line) -> u-law (userland) conversion.
|
||||
|
@ -94,7 +94,8 @@ installed is connected to an S0 bus and that one of the valid MSN's (MSN = Multi
|
||||
The
|
||||
.Xr isdnd 8
|
||||
.Em must
|
||||
not currently running on that machine! Executing:
|
||||
not currently running on that machine!
|
||||
Executing:
|
||||
.Bd -literal -offset indent
|
||||
isdntest -i 42 -o 42
|
||||
.Ed
|
||||
|
@ -89,9 +89,11 @@ Run
|
||||
in analyzer mode by using two passive cards and a custom cable which can
|
||||
be build as described in the file
|
||||
.Em cable.txt
|
||||
in the isdn4bsd source distribution. One card acts as a receiver for the
|
||||
in the isdn4bsd source distribution.
|
||||
One card acts as a receiver for the
|
||||
transmitting direction on the S0 bus while the other card acts as a receiver
|
||||
for the receiving direction on the S0 bus. Complete traffic monitoring is
|
||||
for the receiving direction on the S0 bus.
|
||||
Complete traffic monitoring is
|
||||
possible using this setup.
|
||||
.It Fl b
|
||||
switch B channel tracing on (default off).
|
||||
@ -110,7 +112,8 @@ print layer 1 (I.430) INFO signals to monitor layer 1 activity (default off).
|
||||
switch displaying of Layer 2 (Q.921) frames off (default on).
|
||||
.It Fl n
|
||||
This option takes a numeric argument specifying the minimum
|
||||
frame size in octets a frame must have to be displayed. (default 0)
|
||||
frame size in octets a frame must have to be displayed.
|
||||
(default 0)
|
||||
.It Fl o
|
||||
switch off writing trace output to a file (default on).
|
||||
.It Fl p
|
||||
@ -133,7 +136,8 @@ Write undecoded binary trace data to a file for later or remote
|
||||
analyzing (default off).
|
||||
.It Fl F
|
||||
This option can only be used when option -P (playback from binary data file)
|
||||
is used. The -F option causes playback not to stop at end of file but rather
|
||||
is used.
|
||||
The -F option causes playback not to stop at end of file but rather
|
||||
to wait for additional data to be available from the input file.
|
||||
.Pp
|
||||
This option is useful when trace data is accumulated in binary format (to
|
||||
@ -156,7 +160,8 @@ When the USR1 signal is sent to a
|
||||
process, the currently used logfiles are reopened, so that logfile
|
||||
rotation becomes possible.
|
||||
.Pp
|
||||
The trace output should be obvious. It is very handy to have the following
|
||||
The trace output should be obvious.
|
||||
It is very handy to have the following
|
||||
standard texts available when tracing ISDN protocols:
|
||||
.Pp
|
||||
.Bl -tag -width Ds -compact -offset indent
|
||||
@ -167,7 +172,8 @@ ISDN D-channel layer 2 protocol description.
|
||||
.It Ar Q.931
|
||||
ISDN D-channel layer 3 protocol description.
|
||||
.It Ar 1TR6
|
||||
German-specific ISDN layer 3 protocol description. (NOTICE: decoding
|
||||
German-specific ISDN layer 3 protocol description.
|
||||
(NOTICE: decoding
|
||||
of the 1TR6 protocol is included but not supported since i dont have
|
||||
any longer access to a 1TR6 based ISDN installation.)
|
||||
.El
|
||||
@ -176,7 +182,7 @@ The
|
||||
.Nm
|
||||
utility
|
||||
automatically detects the layer 3 protocol being used by looking at the
|
||||
Protocol Discriminator (see: Q.931/1993 pp. 53).
|
||||
Protocol Discriminator (see: Q.931/1993 pp.\& 53).
|
||||
.Sh FILES
|
||||
.Bl -tag -width daddeldi -compact
|
||||
.It Pa /dev/i4btrc<n>
|
||||
|
@ -41,7 +41,7 @@ driver provides D-channel layer 1 supports as specified in ITU Recommendation
|
||||
I.430 and layer 1 support for the B-channel.
|
||||
.Pp
|
||||
The driver supports passive PCI ISDN cards based on the combination of
|
||||
the Siemens/Infineon ISAC chip and the Tiger Jet Network Inc. Tiger 300/320
|
||||
the Siemens/Infineon ISAC chip and the Tiger Jet Network Inc.\& Tiger 300/320
|
||||
chip.
|
||||
.Pp
|
||||
Currently supported cards are the Traverse Technologies NETjet-S PCI ISDN
|
||||
|
@ -60,7 +60,8 @@ utility should be run at boot time by
|
||||
(see
|
||||
.Xr rc 8 ) .
|
||||
It then listens for connections on certain
|
||||
internet sockets. When a connection is found on one
|
||||
internet sockets.
|
||||
When a connection is found on one
|
||||
of its sockets, it decides what service the socket
|
||||
corresponds to, and invokes a program to service the request.
|
||||
The server program is invoked with the service socket
|
||||
@ -69,7 +70,8 @@ After the program is
|
||||
finished,
|
||||
.Nm
|
||||
continues to listen on the socket (except in some cases which
|
||||
will be described below). Essentially,
|
||||
will be described below).
|
||||
Essentially,
|
||||
.Nm
|
||||
allows running one daemon to invoke several others,
|
||||
reducing load on the system.
|
||||
@ -152,10 +154,13 @@ file which, by default, is
|
||||
.Pa /etc/inetd.conf .
|
||||
There must be an entry for each field of the configuration
|
||||
file, with entries for each field separated by a tab or
|
||||
a space. Comments are denoted by a
|
||||
a space.
|
||||
Comments are denoted by a
|
||||
.Dq #
|
||||
at the beginning
|
||||
of a line. There must be an entry for each field. The
|
||||
of a line.
|
||||
There must be an entry for each field.
|
||||
The
|
||||
fields of the configuration file are as follows:
|
||||
.Pp
|
||||
.Bd -unfilled -offset indent -compact
|
||||
@ -409,13 +414,15 @@ In addition, you can specify the maximum number of simultaneous
|
||||
invocations of each service from a single IP address by appending a
|
||||
.Dq /
|
||||
followed by the number to the maximum number of outstanding child
|
||||
processes. Once the maximum is reached, further connections from this
|
||||
processes.
|
||||
Once the maximum is reached, further connections from this
|
||||
IP address will be dropped.
|
||||
.Pp
|
||||
The
|
||||
.Em user
|
||||
entry should contain the user name of the user as whom the server
|
||||
should run. This allows for servers to be given less permission
|
||||
should run.
|
||||
This allows for servers to be given less permission
|
||||
than root.
|
||||
Optional
|
||||
.Em group
|
||||
@ -437,7 +444,8 @@ The
|
||||
entry should contain the pathname of the program which is to be
|
||||
executed by
|
||||
.Nm
|
||||
when a request is found on its socket. If
|
||||
when a request is found on its socket.
|
||||
If
|
||||
.Nm
|
||||
provides this service internally, this entry should
|
||||
be
|
||||
@ -447,7 +455,8 @@ The
|
||||
.Em server program arguments
|
||||
should be just as arguments
|
||||
normally are, starting with argv[0], which is the name of
|
||||
the program. If the service is provided internally, the
|
||||
the program.
|
||||
If the service is provided internally, the
|
||||
.Em service-name
|
||||
of the service (and any arguments to it) or the word
|
||||
.Dq internal
|
||||
@ -544,7 +553,8 @@ The
|
||||
utility also provides several other
|
||||
.Dq trivial
|
||||
services internally by use of
|
||||
routines within itself. These services are
|
||||
routines within itself.
|
||||
These services are
|
||||
.Dq echo ,
|
||||
.Dq discard ,
|
||||
.Dq chargen
|
||||
@ -553,7 +563,8 @@ routines within itself. These services are
|
||||
(human readable time), and
|
||||
.Dq time
|
||||
(machine readable time, in the form of the number of seconds since
|
||||
midnight, January 1, 1900). All of these services are available in
|
||||
midnight, January 1, 1900).
|
||||
All of these services are available in
|
||||
both TCP and UDP versions; the UDP versions will refuse service if the
|
||||
request specifies a reply port corresponding to any internal service.
|
||||
(This is done as a defense against looping attacks; the remote IP address
|
||||
@ -659,12 +670,16 @@ services.
|
||||
.Ss TCPMUX
|
||||
.Tn RFC 1078
|
||||
describes the TCPMUX protocol:
|
||||
``A TCP client connects to a foreign host on TCP port 1. It sends the
|
||||
service name followed by a carriage-return line-feed <CRLF>. The
|
||||
service name is never case sensitive. The server replies with a
|
||||
``A TCP client connects to a foreign host on TCP port 1.
|
||||
It sends the
|
||||
service name followed by a carriage-return line-feed <CRLF>.
|
||||
The
|
||||
service name is never case sensitive.
|
||||
The server replies with a
|
||||
single character indicating positive (+) or negative (\-)
|
||||
acknowledgment, immediately followed by an optional message of
|
||||
explanation, terminated with a <CRLF>. If the reply was positive,
|
||||
explanation, terminated with a <CRLF>.
|
||||
If the reply was positive,
|
||||
the selected protocol begins; otherwise the connection is closed.''
|
||||
The program is passed the TCP connection as file descriptors 0 and 1.
|
||||
.Pp
|
||||
|
@ -423,9 +423,11 @@ is set, the source IP addresses are enforced to comply
|
||||
with the IP address bound to the jail, regardless of whether or not
|
||||
the
|
||||
.Dv IP_HDRINCL
|
||||
flag has been set on the socket. Since raw sockets can be used to configure
|
||||
flag has been set on the socket.
|
||||
Since raw sockets can be used to configure
|
||||
and interact with various network subsystems, extra caution should be used
|
||||
where privileged access to jails is given out to untrusted parties. As such,
|
||||
where privileged access to jails is given out to untrusted parties.
|
||||
As such,
|
||||
by default this option is disabled.
|
||||
.It Va security.jail.getfsstatroot_only
|
||||
This MIB entry determines whether or not processes within a jail are able
|
||||
|
@ -64,7 +64,7 @@ which sets sound parameters back to normal values,
|
||||
.Cm off
|
||||
which disables the bell entirely, or
|
||||
.Cm visual
|
||||
which sets the bell to visual mode, i.e. flashes the screen instead.
|
||||
which sets the bell to visual mode, i.e., flashes the screen instead.
|
||||
If
|
||||
.Ar belltype
|
||||
is preceded by the word
|
||||
|
@ -40,7 +40,8 @@
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Nm
|
||||
utility compresses a kernel or some other bootable binary. Operation
|
||||
utility compresses a kernel or some other bootable binary.
|
||||
Operation
|
||||
is in two phases as follows:
|
||||
.Bl -enum
|
||||
.It
|
||||
@ -49,7 +50,8 @@ the
|
||||
.Sq text
|
||||
and
|
||||
.Sq data
|
||||
segments. This image is compressed using
|
||||
segments.
|
||||
This image is compressed using
|
||||
.Xr gzip 1
|
||||
and output as data in relocatable object format.
|
||||
.It
|
||||
|
@ -45,14 +45,16 @@ The
|
||||
.Nm
|
||||
utility will list the last login session of each specified
|
||||
.Ar user ,
|
||||
or for all users by default. Each line of output contains
|
||||
or for all users by default.
|
||||
Each line of output contains
|
||||
the user name, the tty from which the session was conducted, any
|
||||
hostname, and the start time for the session.
|
||||
.Pp
|
||||
If more than one
|
||||
.Ar user
|
||||
is given, the session information for each user is printed in
|
||||
the order given on the command line. Otherwise, information
|
||||
the order given on the command line.
|
||||
Otherwise, information
|
||||
for all users is printed, sorted by uid.
|
||||
.Pp
|
||||
The
|
||||
|
@ -64,7 +64,8 @@ capability).
|
||||
The
|
||||
.Nm
|
||||
utility exits with a status equal to the number of errors encountered before
|
||||
processing stopped. (In some cases, processing can stop before the
|
||||
processing stopped.
|
||||
(In some cases, processing can stop before the
|
||||
entire file is scanned.)
|
||||
.Pp
|
||||
If the
|
||||
@ -89,8 +90,10 @@ The
|
||||
utility was written by
|
||||
.An Garrett A. Wollman Aq wollman@lcs.mit.edu .
|
||||
.Sh BUGS
|
||||
Not enough sanity-checking is done. At a minimum, the ownership and
|
||||
mode of the spool directories should also be checked. Other
|
||||
Not enough sanity-checking is done.
|
||||
At a minimum, the ownership and
|
||||
mode of the spool directories should also be checked.
|
||||
Other
|
||||
parameters whose value could cause
|
||||
.Xr lpd 8
|
||||
to fail should be diagnosed.
|
||||
|
@ -51,7 +51,8 @@ The
|
||||
.Nm
|
||||
utility is a front-end to the print spooler as required by the
|
||||
.St -p1003.2
|
||||
specification. It effectively invokes
|
||||
specification.
|
||||
It effectively invokes
|
||||
.Xr lpr 1
|
||||
with the proper set of arguments.
|
||||
.Pp
|
||||
@ -63,7 +64,8 @@ The following options are available:
|
||||
Make the
|
||||
.Nm
|
||||
command exit only after further access to any of the input files is no
|
||||
longer required. The application can then safely delete or modify the
|
||||
longer required.
|
||||
The application can then safely delete or modify the
|
||||
files without affecting the output operation.
|
||||
.It Fl d Ar dest
|
||||
Specify a particular printer.
|
||||
@ -112,6 +114,7 @@ command has been written by
|
||||
.Sh BUGS
|
||||
The
|
||||
.St -p1003.2
|
||||
specification does not provide any means to print non-text files. It
|
||||
specification does not provide any means to print non-text files.
|
||||
It
|
||||
rather requires the files to be printed to be text files limited to
|
||||
reasonable line lengths and printable characters.
|
||||
|
@ -49,7 +49,8 @@ utility
|
||||
is the line printer daemon (spool area handler) and is normally invoked
|
||||
at boot time from the
|
||||
.Xr rc 8
|
||||
file. It makes a single pass through the
|
||||
file.
|
||||
It makes a single pass through the
|
||||
.Xr printcap 5
|
||||
file to find out about the existing printers and
|
||||
prints any files left after a crash.
|
||||
@ -59,7 +60,8 @@ and
|
||||
.Xr accept 2
|
||||
to receive requests to print files in the queue,
|
||||
transfer files to the spooling area, display the queue,
|
||||
or remove jobs from the queue. In each case, it forks a child to handle
|
||||
or remove jobs from the queue.
|
||||
In each case, it forks a child to handle
|
||||
the request so the parent can continue to listen for more requests.
|
||||
.Pp
|
||||
Available options:
|
||||
@ -169,33 +171,41 @@ for files beginning with
|
||||
Lines in each
|
||||
.Em cf
|
||||
file specify files to be printed or non-printing actions to be
|
||||
performed. Each such line begins with a key character
|
||||
performed.
|
||||
Each such line begins with a key character
|
||||
to specify what to do with the remainder of the line.
|
||||
.Bl -tag -width Ds
|
||||
.It J
|
||||
Job Name. String to be used for the job name on the burst page.
|
||||
Job Name.
|
||||
String to be used for the job name on the burst page.
|
||||
.It C
|
||||
Classification. String to be used for the classification line
|
||||
Classification.
|
||||
String to be used for the classification line
|
||||
on the burst page.
|
||||
.It L
|
||||
Literal. The line contains identification info from
|
||||
Literal.
|
||||
The line contains identification info from
|
||||
the password file and causes the banner page to be printed.
|
||||
.It T
|
||||
Title. String to be used as the title for
|
||||
Title.
|
||||
String to be used as the title for
|
||||
.Xr pr 1 .
|
||||
.It H
|
||||
Host Name. Name of the machine where
|
||||
Host Name.
|
||||
Name of the machine where
|
||||
.Xr lpr 1
|
||||
was invoked.
|
||||
.It P
|
||||
Person. Login name of the person who invoked
|
||||
Person.
|
||||
Login name of the person who invoked
|
||||
.Xr lpr 1 .
|
||||
This is used to verify ownership by
|
||||
.Xr lprm 1 .
|
||||
.It M
|
||||
Send mail to the specified user when the current print job completes.
|
||||
.It f
|
||||
Formatted File. Name of a file to print which is already formatted.
|
||||
Formatted File.
|
||||
Name of a file to print which is already formatted.
|
||||
.It l
|
||||
Like ``f'' but passes control characters and does not make page breaks.
|
||||
.It p
|
||||
@ -203,19 +213,23 @@ Name of a file to print using
|
||||
.Xr pr 1
|
||||
as a filter.
|
||||
.It t
|
||||
Troff File. The file contains
|
||||
Troff File.
|
||||
The file contains
|
||||
.Xr troff 1
|
||||
output (cat phototypesetter commands).
|
||||
.It n
|
||||
Ditroff File. The file contains device independent troff
|
||||
Ditroff File.
|
||||
The file contains device independent troff
|
||||
output.
|
||||
.It r
|
||||
DVI File. The file contains
|
||||
DVI File.
|
||||
The file contains
|
||||
.Tn Tex l
|
||||
output
|
||||
DVI format from Stanford.
|
||||
.It g
|
||||
Graph File. The file contains data produced by
|
||||
Graph File.
|
||||
The file contains data produced by
|
||||
.Xr plot 3 .
|
||||
.It c
|
||||
Cifplot File.
|
||||
@ -227,29 +241,37 @@ The file contains a raster image.
|
||||
The file contains text data with
|
||||
FORTRAN carriage control characters.
|
||||
.It \&1
|
||||
Troff Font R. Name of the font file to use instead of the default.
|
||||
Troff Font R.
|
||||
Name of the font file to use instead of the default.
|
||||
.It \&2
|
||||
Troff Font I. Name of the font file to use instead of the default.
|
||||
Troff Font I.
|
||||
Name of the font file to use instead of the default.
|
||||
.It \&3
|
||||
Troff Font B. Name of the font file to use instead of the default.
|
||||
Troff Font B.
|
||||
Name of the font file to use instead of the default.
|
||||
.It \&4
|
||||
Troff Font S. Name of the font file to use instead of the default.
|
||||
Troff Font S.
|
||||
Name of the font file to use instead of the default.
|
||||
.It W
|
||||
Width.
|
||||
Changes the page width (in characters) used by
|
||||
.Xr pr 1
|
||||
and the text filters.
|
||||
.It I
|
||||
Indent. The number of characters to indent the output by (in ASCII).
|
||||
Indent.
|
||||
The number of characters to indent the output by (in ASCII).
|
||||
.It U
|
||||
Unlink. Name of file to remove upon completion of printing.
|
||||
Unlink.
|
||||
Name of file to remove upon completion of printing.
|
||||
.It N
|
||||
File name. The name of the file which is being printed, or a blank
|
||||
File name.
|
||||
The name of the file which is being printed, or a blank
|
||||
for the standard input (when
|
||||
.Xr lpr 1
|
||||
is invoked in a pipeline).
|
||||
.It Z
|
||||
Locale. String to be used as the locale for
|
||||
Locale.
|
||||
String to be used as the locale for
|
||||
.Xr pr 1 .
|
||||
.El
|
||||
.Pp
|
||||
@ -269,14 +291,16 @@ The
|
||||
utility uses
|
||||
.Xr flock 2
|
||||
to provide exclusive access to the lock file and to prevent multiple
|
||||
daemons from becoming active simultaneously. If the daemon should be killed
|
||||
daemons from becoming active simultaneously.
|
||||
If the daemon should be killed
|
||||
or die unexpectedly, the lock file need not be removed.
|
||||
The lock file is kept in a readable
|
||||
.Tn ASCII
|
||||
form
|
||||
and contains two lines.
|
||||
The first is the process id of the daemon and the second is the control
|
||||
file name of the current job being printed. The second line is updated to
|
||||
file name of the current job being printed.
|
||||
The second line is updated to
|
||||
reflect the current status of
|
||||
.Nm
|
||||
for the programs
|
||||
|
@ -65,7 +65,8 @@ Specify a particular printer, otherwise the default
|
||||
line printer is used (or the value of the
|
||||
.Ev PRINTER
|
||||
variable in the
|
||||
environment). All other arguments supplied are interpreted as user
|
||||
environment).
|
||||
All other arguments supplied are interpreted as user
|
||||
names or job numbers to filter out only those jobs of interest.
|
||||
.It Fl l
|
||||
Information about each of the files comprising the job entry
|
||||
@ -76,7 +77,7 @@ Report on the local queues for all printers,
|
||||
rather than just the specified printer.
|
||||
.El
|
||||
.Pp
|
||||
For each job submitted (i.e. invocation of
|
||||
For each job submitted (i.e., invocation of
|
||||
.Xr lpr 1 )
|
||||
.Nm
|
||||
reports the user's name, current rank in the queue, the
|
||||
@ -97,7 +98,7 @@ is indicated as ``(standard input)''.
|
||||
.Pp
|
||||
If
|
||||
.Nm
|
||||
warns that there is no daemon present (i.e. due to some malfunction),
|
||||
warns that there is no daemon present (i.e., due to some malfunction),
|
||||
the
|
||||
.Xr lpc 8
|
||||
command can be used to restart the printer daemon.
|
||||
@ -136,5 +137,7 @@ may report unreliably.
|
||||
Output formatting is sensitive to the line length of the terminal;
|
||||
this can results in widely spaced columns.
|
||||
.Sh DIAGNOSTICS
|
||||
Unable to open various files. The lock file being malformed. Garbage
|
||||
Unable to open various files.
|
||||
The lock file being malformed.
|
||||
Garbage
|
||||
files when there is no daemon active, but files in the spooling directory.
|
||||
|
@ -57,7 +57,8 @@
|
||||
The
|
||||
.Nm
|
||||
utility uses a spooling daemon to print the named files when facilities
|
||||
become available. If no names appear, the standard input is assumed.
|
||||
become available.
|
||||
If no names appear, the standard input is assumed.
|
||||
.Pp
|
||||
The following single letter options are used to notify the line printer
|
||||
spooler that the files are not standard text files.
|
||||
@ -118,7 +119,8 @@ These options apply to the handling of
|
||||
the print job:
|
||||
.Bl -tag -width indent
|
||||
.It Fl P
|
||||
Force output to a specific printer. Normally,
|
||||
Force output to a specific printer.
|
||||
Normally,
|
||||
the default printer is used (site dependent), or the value of the
|
||||
environment variable
|
||||
.Ev PRINTER
|
||||
@ -133,13 +135,15 @@ printing (with the
|
||||
.Fl s
|
||||
option).
|
||||
.It Fl s
|
||||
Use symbolic links. Usually files are copied to the spool directory.
|
||||
Use symbolic links.
|
||||
Usually files are copied to the spool directory.
|
||||
The
|
||||
.Fl s
|
||||
option will use
|
||||
.Xr symlink 2
|
||||
to link data files rather than trying to copy them so large files can be
|
||||
printed. This means the files should
|
||||
printed.
|
||||
This means the files should
|
||||
not be modified or removed until they have been printed.
|
||||
.El
|
||||
.Pp
|
||||
@ -148,12 +152,13 @@ The remaining options apply to copies, the page display, and headers:
|
||||
.It Fl \&# Ns Ar num
|
||||
The quantity
|
||||
.Ar num
|
||||
is the number of copies desired of each file named. For example,
|
||||
is the number of copies desired of each file named.
|
||||
For example,
|
||||
.Bd -literal -offset indent
|
||||
lpr \-#3 foo.c bar.c more.c
|
||||
.Ed
|
||||
would result in 3 copies of the file foo.c, followed by 3 copies
|
||||
of the file bar.c, etc. On the other hand,
|
||||
of the file bar.c, etc.\& On the other hand,
|
||||
.Bd -literal -offset indent
|
||||
cat foo.c bar.c more.c \&| lpr \-#3
|
||||
.Ed
|
||||
@ -177,7 +182,8 @@ file referencing
|
||||
the font pathname.
|
||||
.It Fl C Ar class
|
||||
Job classification
|
||||
to use on the burst page. For example,
|
||||
to use on the burst page.
|
||||
For example,
|
||||
.Bd -literal -offset indent
|
||||
lpr \-C EECS foo.c
|
||||
.Ed
|
||||
|
@ -47,11 +47,14 @@ function
|
||||
is a simplified version of the
|
||||
.Xr termcap 5
|
||||
data base
|
||||
used to describe line printers. The spooling system accesses the
|
||||
used to describe line printers.
|
||||
The spooling system accesses the
|
||||
.Nm
|
||||
file every time it is used, allowing dynamic
|
||||
addition and deletion of printers. Each entry in the data base
|
||||
is used to describe one printer. This data base may not be
|
||||
addition and deletion of printers.
|
||||
Each entry in the data base
|
||||
is used to describe one printer.
|
||||
This data base may not be
|
||||
substituted for, as is possible for
|
||||
.Xr termcap 5 ,
|
||||
because it may allow accounting to be bypassed.
|
||||
@ -60,7 +63,8 @@ The default printer is normally
|
||||
.Em lp ,
|
||||
though the environment variable
|
||||
.Ev PRINTER
|
||||
may be used to override this. Each spooling utility supports an option,
|
||||
may be used to override this.
|
||||
Each spooling utility supports an option,
|
||||
.Fl P Ar printer ,
|
||||
to allow explicit naming of a destination printer.
|
||||
.Pp
|
||||
@ -309,9 +313,12 @@ or
|
||||
.Cm of .
|
||||
If both are specified,
|
||||
.Cm of
|
||||
is ignored. Both filters behave the same except that they are passed
|
||||
different arguments as above. Specifically, the output filter is
|
||||
terminated and restarted for each file transmitted. This is necessary
|
||||
is ignored.
|
||||
Both filters behave the same except that they are passed
|
||||
different arguments as above.
|
||||
Specifically, the output filter is
|
||||
terminated and restarted for each file transmitted.
|
||||
This is necessary
|
||||
in order to pass the resulting size to the remote
|
||||
.Xr lpd 8 .
|
||||
.Pp
|
||||
@ -362,13 +369,16 @@ on the given
|
||||
.Sh TRANSFER STATISTICS
|
||||
When a print job is transfered to a remote machine (which might be
|
||||
another unix box, or may be a network printer), it may be useful
|
||||
to keep statistics on each transfer. The
|
||||
to keep statistics on each transfer.
|
||||
The
|
||||
.Cm sr
|
||||
and
|
||||
.Cm ss
|
||||
options indicate filenames that lpd should use to store such
|
||||
statistics. A statistics line is written for each datafile of a
|
||||
job as the file is successfully transferred. The format of the
|
||||
statistics.
|
||||
A statistics line is written for each datafile of a
|
||||
job as the file is successfully transferred.
|
||||
The format of the
|
||||
line is the same for both the sending and receiving side of a
|
||||
transfer.
|
||||
.Pp
|
||||
@ -381,7 +391,8 @@ print job as it arrived on the server.
|
||||
Statistics on datafiles being sent might be used as a minimal
|
||||
accounting record, when you want to know who sent which jobs to a
|
||||
remote printer, when they were sent, and how large (in bytes) the
|
||||
files were. This will not give include any idea of how many pages
|
||||
files were.
|
||||
This will not give include any idea of how many pages
|
||||
were printed, because there is no standard way to get that information
|
||||
back from a remote (network) printer in this case.
|
||||
.Sh LOGGING
|
||||
|
@ -68,13 +68,15 @@ If a single
|
||||
is given,
|
||||
.Nm
|
||||
will remove all jobs which a user
|
||||
owns. If the super-user employs this flag, the spool queue will
|
||||
owns.
|
||||
If the super-user employs this flag, the spool queue will
|
||||
be emptied entirely.
|
||||
.It Ar user
|
||||
Cause
|
||||
.Nm
|
||||
to attempt to remove any jobs queued belonging to that user
|
||||
(or users). This form of invoking
|
||||
(or users).
|
||||
This form of invoking
|
||||
.Nm
|
||||
is useful only to the super-user.
|
||||
.It Ar job\ \&#
|
||||
@ -106,7 +108,8 @@ there are no jobs in the queue which match the request list.
|
||||
The
|
||||
.Nm
|
||||
utility will kill off an active daemon, if necessary, before removing
|
||||
any spooling files. If a daemon is killed, a new one is
|
||||
any spooling files.
|
||||
If a daemon is killed, a new one is
|
||||
automatically restarted upon completion of file removals.
|
||||
.Sh ENVIRONMENT
|
||||
If the following environment variable exists, it is utilized by
|
||||
|
@ -67,7 +67,8 @@ is used.
|
||||
Cause the output to be sorted by cost; usually the
|
||||
output is sorted alphabetically by name.
|
||||
.It Fl m
|
||||
Cause the host name to be ignored in the accounting file. This
|
||||
Cause the host name to be ignored in the accounting file.
|
||||
This
|
||||
allows for a user on multiple machines to have all of his printing
|
||||
charges grouped together.
|
||||
.It Fl p Ns Ar price
|
||||
|
@ -45,7 +45,7 @@ Turn on polled mode.
|
||||
.It Fl e
|
||||
Turn on extended mode.
|
||||
.It Fl s
|
||||
Turn on standard mode, i.e. turn off extended mode.
|
||||
Turn on standard mode, i.e., turn off extended mode.
|
||||
.It Fl d Ar device
|
||||
Set the mode of the printer device specified by
|
||||
.Ar device .
|
||||
|
@ -154,7 +154,7 @@ utility first appeared in
|
||||
and then
|
||||
.Fx 4.0 .
|
||||
.Sh AUTHORS
|
||||
Perry E. Metzger <perry@piermont.com>
|
||||
.An Perry E. Metzger Aq perry@piermont.com
|
||||
.Sh BUGS
|
||||
The entire reason this program exists is a crock.
|
||||
Instead, a command
|
||||
|
@ -100,7 +100,8 @@ it is not recommended.
|
||||
The
|
||||
.Nm
|
||||
utility checks your umask and issues a warning for anything
|
||||
other than 022. While it is not mandatory to grant
|
||||
other than 022.
|
||||
While it is not mandatory to grant
|
||||
world read permissions for most configuration files, you
|
||||
may run into problems without them.
|
||||
If you choose a
|
||||
@ -294,7 +295,9 @@ comparison, use:
|
||||
.Pp
|
||||
The
|
||||
.Nm
|
||||
utility will . (source) these files if they exist.
|
||||
utility will
|
||||
.Ic .\&
|
||||
(source) these files if they exist.
|
||||
Command line options
|
||||
will override rc file options.
|
||||
.Pa $HOME/.mergemasterrc
|
||||
@ -387,7 +390,8 @@ The
|
||||
utility was first publicly available on one of my
|
||||
web pages in a much simpler form under the name
|
||||
.Pa comproot
|
||||
on 13 March 1998. The idea for creating the
|
||||
on 13 March 1998.
|
||||
The idea for creating the
|
||||
temporary root environment comes from Nik Clayton's
|
||||
make world tutorial which is referenced above.
|
||||
.Sh AUTHORS
|
||||
|
@ -68,7 +68,8 @@ The
|
||||
.Nm
|
||||
utility is used to set and display soundcard mixer device levels.
|
||||
It may
|
||||
also be used to start and stop recording from the soundcard. The list
|
||||
also be used to start and stop recording from the soundcard.
|
||||
The list
|
||||
of mixer devices that may be modified are:
|
||||
.Pp
|
||||
.Bd -ragged -offset indent
|
||||
@ -93,11 +94,13 @@ To modify the mixer value
|
||||
.Ar dev ,
|
||||
the optional left and right channel settings of
|
||||
.Ar lvol Ns Op : Ns Ar rvol
|
||||
may be specified. The
|
||||
may be specified.
|
||||
The
|
||||
.Ar lvol
|
||||
and
|
||||
.Ar rvol
|
||||
arguments may be from 0 - 100. Omitting
|
||||
arguments may be from 0 - 100.
|
||||
Omitting
|
||||
.Ar dev
|
||||
and including only the channel settings will change the main volume level.
|
||||
.Pp
|
||||
@ -134,7 +137,8 @@ sets the recording device to
|
||||
.Ar rdev
|
||||
.El
|
||||
.Pp
|
||||
The above commands work on an internal mask. After all the options
|
||||
The above commands work on an internal mask.
|
||||
After all the options
|
||||
have been parsed, it will set then read the mask from the sound card.
|
||||
This will let you see EXACTLY what the soundcard is using for the
|
||||
recording device(s).
|
||||
|
@ -91,7 +91,7 @@ This command returns
|
||||
2 if one or more are offline.
|
||||
.It rescan
|
||||
Rescan one or more controllers for non-attached system drives
|
||||
(eg. drives that have been
|
||||
(e.g.\& drives that have been
|
||||
detached or created subsequent to driver initialisation).
|
||||
If the
|
||||
.Fl a
|
||||
@ -105,7 +105,7 @@ If the
|
||||
flag is supplied, detach all system drives from the nominated controller.
|
||||
.It check
|
||||
Initiate a consistency check and repair pass on a redundant system drive
|
||||
(eg. RAID1 or RAID5).
|
||||
(e.g.\& RAID1 or RAID5).
|
||||
The controller will scan the system drive and repair any inconsistencies.
|
||||
This command returns immediately;
|
||||
use the
|
||||
|
@ -121,7 +121,8 @@ The configuration file contains a list of rules.
|
||||
Each rule takes one line and consists of two or more
|
||||
whitespace separated fields.
|
||||
A hash (``#'') character causes the remainder of a line to
|
||||
be ignored. Blank lines are ignored.
|
||||
be ignored.
|
||||
Blank lines are ignored.
|
||||
.Pp
|
||||
The first field is a pathname prefix to match
|
||||
against the requested pathname.
|
||||
|
@ -171,7 +171,8 @@ Enable debugging messages.
|
||||
Do not become a daemon and instead run as a foreground process.
|
||||
Useful for testing and debugging.
|
||||
.It Fl i Ar info
|
||||
Print specified information and quit. Available pieces of
|
||||
Print specified information and quit.
|
||||
Available pieces of
|
||||
information are:
|
||||
.Pp
|
||||
.Bl -tag -compact -width modelxxx
|
||||
@ -193,11 +194,13 @@ if the driver supports the
|
||||
.Ar sysmouse
|
||||
data format standard.
|
||||
.It Ar model
|
||||
Mouse model. The
|
||||
Mouse model.
|
||||
The
|
||||
.Nm
|
||||
utility may not always be able to identify the model.
|
||||
.It Ar all
|
||||
All of the above items. Print port, interface, type and model in this order
|
||||
All of the above items.
|
||||
Print port, interface, type and model in this order
|
||||
in one line.
|
||||
.El
|
||||
.Pp
|
||||
@ -259,7 +262,8 @@ always choose
|
||||
.Ar auto
|
||||
or
|
||||
.Ar ps/2 ,
|
||||
regardless of the brand and model of the mouse. Likewise, if your
|
||||
regardless of the brand and model of the mouse.
|
||||
Likewise, if your
|
||||
mouse is attached to the bus mouse port, choose
|
||||
.Ar auto
|
||||
or
|
||||
@ -276,26 +280,32 @@ listed below.
|
||||
For the serial mouse:
|
||||
.Bl -tag -compact -width mousesystemsxxx
|
||||
.It Ar microsoft
|
||||
Microsoft serial mouse protocol. Most 2-button serial mice use this protocol.
|
||||
Microsoft serial mouse protocol.
|
||||
Most 2-button serial mice use this protocol.
|
||||
.It Ar intellimouse
|
||||
Microsoft IntelliMouse protocol. Genius NetMouse,
|
||||
Microsoft IntelliMouse protocol.
|
||||
Genius NetMouse,
|
||||
.Tn ASCII
|
||||
Mie Mouse,
|
||||
Logitech MouseMan+ and FirstMouse+ use this protocol too.
|
||||
Other mice with a roller/wheel may be compatible with this protocol.
|
||||
.It Ar mousesystems
|
||||
MouseSystems 5-byte protocol. 3-button mice may use this protocol.
|
||||
MouseSystems 5-byte protocol.
|
||||
3-button mice may use this protocol.
|
||||
.It Ar mmseries
|
||||
MM Series mouse protocol.
|
||||
.It Ar logitech
|
||||
Logitech mouse protocol. Note that this is for old Logitech models.
|
||||
Logitech mouse protocol.
|
||||
Note that this is for old Logitech models.
|
||||
.Ar mouseman
|
||||
or
|
||||
.Ar intellimouse
|
||||
should be specified for newer models.
|
||||
.It Ar mouseman
|
||||
Logitech MouseMan and TrackMan protocol. Some 3-button mice may be compatible
|
||||
with this protocol. Note that MouseMan+ and FirstMouse+ use
|
||||
Logitech MouseMan and TrackMan protocol.
|
||||
Some 3-button mice may be compatible
|
||||
with this protocol.
|
||||
Note that MouseMan+ and FirstMouse+ use
|
||||
.Ar intellimouse
|
||||
protocol rather than this one.
|
||||
.It Ar glidepoint
|
||||
@ -406,7 +416,8 @@ The bus and InPort mice have either a D-Sub male 9-pin connector
|
||||
or a round DIN 9-pin connector.
|
||||
The PS/2 mouse is equipped with a small, round DIN 6-pin connector.
|
||||
Some mice come with adapters with which the connector can
|
||||
be converted to another. If you are to use such an adapter,
|
||||
be converted to another.
|
||||
If you are to use such an adapter,
|
||||
remember the connector at the very end of the mouse/adapter pair is
|
||||
what matters.
|
||||
The USB mouse has a flat rectangular connector.
|
||||
@ -418,7 +429,8 @@ the bus and InPort mice always use
|
||||
and the PS/2 mouse is always at
|
||||
.Pa /dev/psm0 .
|
||||
There may be more than one serial port to which the serial
|
||||
mouse can be attached. Many people often assign the first, built-in
|
||||
mouse can be attached.
|
||||
Many people often assign the first, built-in
|
||||
serial port
|
||||
.Pa /dev/cuaa0
|
||||
to the mouse.
|
||||
@ -440,7 +452,8 @@ Run the
|
||||
.Nm
|
||||
utility with the
|
||||
.Fl i
|
||||
option and see what it says. If the command can identify
|
||||
option and see what it says.
|
||||
If the command can identify
|
||||
the protocol type, no further investigation is necessary on your part.
|
||||
You may start the daemon without explicitly specifying a protocol type
|
||||
(see
|
||||
|
@ -42,9 +42,11 @@ routers that do not support IP multicasting,
|
||||
includes support for
|
||||
"tunnels", which are virtual point-to-point links between pairs of
|
||||
multicast routers
|
||||
located anywhere in an internet. IP multicast packets are encapsulated for
|
||||
located anywhere in an internet.
|
||||
IP multicast packets are encapsulated for
|
||||
transmission through tunnels, so that they look like normal unicast datagrams
|
||||
to intervening routers and subnets. The encapsulation
|
||||
to intervening routers and subnets.
|
||||
The encapsulation
|
||||
is added on entry to a tunnel, and stripped off
|
||||
on exit from a tunnel.
|
||||
The packets are encapsulated using the IP-in-IP protocol
|
||||
@ -59,7 +61,8 @@ The tunnelling mechanism allows
|
||||
.Nm
|
||||
to establish a virtual internet, for
|
||||
the purpose of multicasting only, which is independent of the physical
|
||||
internet, and which may span multiple Autonomous Systems. This capability
|
||||
internet, and which may span multiple Autonomous Systems.
|
||||
This capability
|
||||
is intended for experimental support of internet multicasting only, pending
|
||||
widespread support for multicast routing by the regular (unicast) routers.
|
||||
The
|
||||
@ -90,12 +93,14 @@ If no
|
||||
.Fl d
|
||||
option is given, or if the debug level is specified as 0,
|
||||
.Nm
|
||||
detaches from the invoking terminal. Otherwise, it remains attached to the
|
||||
detaches from the invoking terminal.
|
||||
Otherwise, it remains attached to the
|
||||
invoking terminal and responsive to signals from that terminal.
|
||||
Regardless of the debug level,
|
||||
.Nm
|
||||
always writes warning and error messages to the system
|
||||
log daemon. The
|
||||
log daemon.
|
||||
The
|
||||
.Fl debug-level
|
||||
argument is a comma-separated list of any of the following:
|
||||
.Bl -tag -width indent
|
||||
@ -106,7 +111,8 @@ Display more information about prunes sent or received.
|
||||
.It "routing"
|
||||
Display more information about routing update packets sent or received.
|
||||
.It "route_detail"
|
||||
Display routing updates in excruciating detail. This is generally way too
|
||||
Display routing updates in excruciating detail.
|
||||
This is generally way too
|
||||
much information.
|
||||
.It "neighbors"
|
||||
Display information about neighbor discovery.
|
||||
@ -141,7 +147,8 @@ The
|
||||
utility automatically configures itself to forward on all multicast-capable
|
||||
interfaces, i.e., interfaces that have the IFF_MULTICAST flag set (excluding
|
||||
the loopback "interface"), and it finds other DVMRP routers directly reachable
|
||||
via those interfaces. To override the default configuration, or to add
|
||||
via those interfaces.
|
||||
To override the default configuration, or to add
|
||||
tunnel links to other multicast routers,
|
||||
configuration commands may be placed in
|
||||
.Pa /etc/mrouted.conf
|
||||
@ -157,26 +164,35 @@ overall operation or set defaults.
|
||||
.Bl -tag -width indent
|
||||
.It cache_lifetime Ar secs
|
||||
Specifies, in seconds, the lifetime of a multicast forwarding cache
|
||||
entry in the kernel. Multicast forwarding cache entries in the kernel
|
||||
entry in the kernel.
|
||||
Multicast forwarding cache entries in the kernel
|
||||
are checked every
|
||||
.Ar secs
|
||||
seconds, and are refreshed if the source is still
|
||||
active or deleted if not. Care should be taken when setting this value,
|
||||
active or deleted if not.
|
||||
Care should be taken when setting this value,
|
||||
as a low value can keep the kernel cache small at the cost of "thrashing"
|
||||
the cache for periodic senders, but high values can cause the kernel
|
||||
cache to grow unacceptably large. The default is 300 seconds (5 minutes).
|
||||
cache to grow unacceptably large.
|
||||
The default is 300 seconds (5 minutes).
|
||||
.It prune_lifetime Ar secs
|
||||
Specifies, in seconds, the average lifetime of prunes that are sent towards
|
||||
parents. The actual lifetimes will be randomized in the range
|
||||
[.5\fIsecs\fP,1.5\fIsecs\fP]. The default is 7200 (2 hours). Smaller values
|
||||
parents.
|
||||
The actual lifetimes will be randomized in the range
|
||||
[.5\fIsecs\fP,1.5\fIsecs\fP].
|
||||
The default is 7200 (2 hours).
|
||||
Smaller values
|
||||
cause less state to be kept both at this router and the parent, at the
|
||||
cost of more frequent broadcasts. However, some routers (e.g.\&
|
||||
cost of more frequent broadcasts.
|
||||
However, some routers (e.g.\&
|
||||
.Nm
|
||||
<3.3
|
||||
and all currently known versions of cisco's IOS) do not use the
|
||||
DVMRP generation ID to determine that a neighbor has rebooted. Prunes
|
||||
DVMRP generation ID to determine that a neighbor has rebooted.
|
||||
Prunes
|
||||
sent towards these neighbors should be kept short, in order to shorten
|
||||
the time to recover from a reboot. For use in this situation, the
|
||||
the time to recover from a reboot.
|
||||
For use in this situation, the
|
||||
prune_lifetime keyword may be specified on an interface as described
|
||||
below.
|
||||
.It noflood
|
||||
@ -187,9 +203,11 @@ uses a DVMRP optimization to prevent having to keep individual routing tables
|
||||
for each neighbor; part of this optimization is that
|
||||
.Nm
|
||||
assumes that it is the forwarder for each of its attached subnets on
|
||||
startup. This can cause duplicates for a short period (approximately
|
||||
startup.
|
||||
This can cause duplicates for a short period (approximately
|
||||
one full route report interval), since both the router that just
|
||||
started up and the proper forwarder will be forwarding traffic. This
|
||||
started up and the proper forwarder will be forwarding traffic.
|
||||
This
|
||||
behavior can be turned off with the noflood keyword;
|
||||
.Nm
|
||||
will not assume that it is the forwarder on startup.
|
||||
@ -198,7 +216,8 @@ last approximately one full route report interval.
|
||||
The noflood keyword can also be specified on individual interfaces.
|
||||
.It rexmit_prunes Ar [on|off]
|
||||
Default is to retransmit prunes on all point-to-point interfaces
|
||||
(including tunnels) but no multi-access interfaces. This option
|
||||
(including tunnels) but no multi-access interfaces.
|
||||
This option
|
||||
may be used to make the default on (or off) for all interfaces.
|
||||
The rexmit_prunes keyword can also be specified on individual interfaces.
|
||||
.It name Ar "boundary-name scoped-addr/mask-len"
|
||||
@ -215,26 +234,30 @@ be empty, describes options that apply to physical interfaces.
|
||||
.Bl -tag -width indent
|
||||
.It phyint Ar "local-addr|ifname"
|
||||
The phyint command does nothing by itself; it is simply a place holder
|
||||
which interface-specific commands may follow. An interface address or
|
||||
which interface-specific commands may follow.
|
||||
An interface address or
|
||||
name may be specified.
|
||||
.It disable
|
||||
Disables multicast forwarding on this interface. By default,
|
||||
Disables multicast forwarding on this interface.
|
||||
By default,
|
||||
.Nm
|
||||
discovers all locally attached multicast capable interfaces and forwards
|
||||
on all of them.
|
||||
.It netmask Ar netmask
|
||||
If the kernel's netmask does not accurately reflect
|
||||
the subnet (e.g. you're using proxy-ARP in lieu of IP subnetting), use the
|
||||
the subnet (e.g.\& you're using proxy-ARP in lieu of IP subnetting), use the
|
||||
netmask command to describe the real netmask.
|
||||
.It altnet Ar network/mask-len
|
||||
If a phyint is attached to multiple IP subnets, describe each additional subnet
|
||||
with the altnet keyword. This command may be specified multiple times
|
||||
with the altnet keyword.
|
||||
This command may be specified multiple times
|
||||
to describe multiple subnets.
|
||||
.It igmpv1
|
||||
If there are any IGMPv1 routers on the phyint, use the \fBigmpv1\fP
|
||||
keyword to force
|
||||
.Nm
|
||||
into IGMPv1 mode. All routers on the phyint
|
||||
into IGMPv1 mode.
|
||||
All routers on the phyint
|
||||
must use the same version of IGMP.
|
||||
.It force_leaf
|
||||
Force
|
||||
@ -268,11 +291,13 @@ A tunnel must be configured on both routers before it can be used.
|
||||
Be careful that the unicast route to the remote address goes out the
|
||||
interface specified by the
|
||||
.Ar "local-addr|ifname"
|
||||
argument. Some UNIX
|
||||
argument.
|
||||
Some UNIX
|
||||
kernels rewrite the source address of
|
||||
.Nm Ns 's
|
||||
packets on their way out to contain the address of the transmission
|
||||
interface. This is best assured via a static host route.
|
||||
interface.
|
||||
This is best assured via a static host route.
|
||||
.El
|
||||
.Pp
|
||||
The common vif commands described below
|
||||
@ -281,19 +306,25 @@ may all be used on tunnels or phyints.
|
||||
.It metric Ar m
|
||||
The metric is the "cost" associated with receiving a datagram on the given
|
||||
interface or tunnel; it may be used to influence the choice of routes.
|
||||
The metric defaults to 1. Metrics should be kept as small as possible,
|
||||
The metric defaults to 1.
|
||||
Metrics should be kept as small as possible,
|
||||
because DVMRP cannot route along paths with a sum of metrics greater
|
||||
than 31.
|
||||
.It advert_metric Ar m
|
||||
The advert_metric is the "cost" associated with sending a datagram
|
||||
on the given interface or tunnel; it may be used to influence the choice
|
||||
of routes. The advert_metric defaults to 0. Note that the effective
|
||||
of routes.
|
||||
The advert_metric defaults to 0.
|
||||
Note that the effective
|
||||
metric of a link is one end's metric plus the other end's advert_metric.
|
||||
.It threshold Ar t
|
||||
The threshold is the minimum IP time-to-live required for a multicast datagram
|
||||
to be forwarded to the given interface or tunnel. It is used to control the
|
||||
scope of multicast datagrams. (The TTL of forwarded packets is only compared
|
||||
to the threshold, it is not decremented by the threshold. Every multicast
|
||||
to be forwarded to the given interface or tunnel.
|
||||
It is used to control the
|
||||
scope of multicast datagrams.
|
||||
(The TTL of forwarded packets is only compared
|
||||
to the threshold, it is not decremented by the threshold.
|
||||
Every multicast
|
||||
router decrements the TTL by exactly 1.) The default threshold is 1.
|
||||
.Pp
|
||||
In general, all multicast routers
|
||||
@ -302,21 +333,26 @@ use the same metric and threshold for that subnet or tunnel.
|
||||
.It rate_limit Ar r
|
||||
The rate_limit option allows the network administrator to specify a
|
||||
certain bandwidth in Kbits/second which would be allocated to multicast
|
||||
traffic. It defaults 0 (unlimited).
|
||||
traffic.
|
||||
It defaults 0 (unlimited).
|
||||
.It boundary Ar "boundary-name|scoped-addr/mask-len"
|
||||
The boundary option allows an interface
|
||||
to be configured as an administrative boundary for the specified
|
||||
scoped address.
|
||||
Packets belonging to this address will not
|
||||
be forwarded on a scoped interface. The boundary option accepts either
|
||||
a name or a boundary spec. This command may be specified several times
|
||||
be forwarded on a scoped interface.
|
||||
The boundary option accepts either
|
||||
a name or a boundary spec.
|
||||
This command may be specified several times
|
||||
on an interface in order to describe multiple boundaries.
|
||||
.It passive
|
||||
No packets will be sent on this link or tunnel until we hear from the other
|
||||
end. This is useful for the "server" end of a tunnel that goes over
|
||||
end.
|
||||
This is useful for the "server" end of a tunnel that goes over
|
||||
a dial-on-demand link; configure the "server" end as passive and
|
||||
it will not send its periodic probes until it hears one from the other
|
||||
side, so will not keep the link up. If this option is specified on both
|
||||
side, so will not keep the link up.
|
||||
If this option is specified on both
|
||||
ends of a tunnel, the tunnel will never come up.
|
||||
.It noflood
|
||||
As described above, but only applicable to this interface/tunnel.
|
||||
@ -331,18 +367,21 @@ multi-access links.
|
||||
By default,
|
||||
.Nm
|
||||
refuses to peer with DVMRP neighbors that
|
||||
do not claim to support pruning. This option allows such peerings
|
||||
do not claim to support pruning.
|
||||
This option allows such peerings
|
||||
on this interface.
|
||||
.It notransit
|
||||
A specialized case of route filtering; no route learned from an interface
|
||||
marked "notransit" will be advertised on another interface marked
|
||||
"notransit". Marking only a single interface "notransit" has no meaning.
|
||||
"notransit".
|
||||
Marking only a single interface "notransit" has no meaning.
|
||||
.It accept|deny Ar "(route/mask-len [exact])+" Op bidir
|
||||
The
|
||||
.Li accept
|
||||
and
|
||||
.Li deny
|
||||
commands allow rudimentary route filtering. The
|
||||
commands allow rudimentary route filtering.
|
||||
The
|
||||
.Li accept
|
||||
command causes
|
||||
.Nm
|
||||
@ -361,14 +400,17 @@ The list of routes follows the
|
||||
.Li accept
|
||||
or
|
||||
.Li deny
|
||||
keyword. If the keyword
|
||||
keyword.
|
||||
If the keyword
|
||||
.Ar exact
|
||||
follows a route, then only that route is matched; otherwise, that route
|
||||
and any more specific route is matched. For example,
|
||||
and any more specific route is matched.
|
||||
For example,
|
||||
.Li deny 0/0
|
||||
denys all routes, while
|
||||
.Li deny 0/0 exact
|
||||
denys only the default route. The default route may also be specified
|
||||
denys only the default route.
|
||||
The default route may also be specified
|
||||
with the
|
||||
.Li default
|
||||
keyword.
|
||||
@ -376,13 +418,15 @@ keyword.
|
||||
The
|
||||
.Ar bidir
|
||||
keyword enables bidirectional route filtering; the filter will be applied
|
||||
to routes on both output and input. Without the
|
||||
to routes on both output and input.
|
||||
Without the
|
||||
.Ar bidir
|
||||
keyword,
|
||||
.Li accept
|
||||
and
|
||||
.Li deny
|
||||
filters are only applied on input. Poison reverse routes are never
|
||||
filters are only applied on input.
|
||||
Poison reverse routes are never
|
||||
filtered out.
|
||||
.El
|
||||
.Pp
|
||||
@ -390,11 +434,12 @@ The
|
||||
.Nm
|
||||
utility will not initiate execution if it has fewer than two enabled vifs,
|
||||
where a vif (virtual interface) is either a physical multicast-capable
|
||||
interface or a tunnel. It will log a warning if all of its vifs are
|
||||
interface or a tunnel.
|
||||
It will log a warning if all of its vifs are
|
||||
tunnels; such an
|
||||
.Nm
|
||||
configuration would be better replaced by more
|
||||
direct tunnels (i.e. eliminate the middle man).
|
||||
direct tunnels (i.e., eliminate the middle man).
|
||||
.Sh "EXAMPLE CONFIGURATION"
|
||||
This is an example configuration for a mythical multicast router at a big
|
||||
school.
|
||||
@ -503,8 +548,11 @@ Multicast Routing Table (1136 entries)
|
||||
.Ed
|
||||
.Pp
|
||||
In this example, there are four vifs connecting to two subnets and two
|
||||
tunnels. The vif 3 tunnel is not in use (no peer address). The vif 0 and
|
||||
vif 1 subnets have some groups present; tunnels never have any groups. This
|
||||
tunnels.
|
||||
The vif 3 tunnel is not in use (no peer address).
|
||||
The vif 0 and
|
||||
vif 1 subnets have some groups present; tunnels never have any groups.
|
||||
This
|
||||
instance of
|
||||
.Nm
|
||||
is the one responsible for sending periodic group
|
||||
@ -512,14 +560,16 @@ membership queries on the vif 0 and vif 1 subnets, as indicated by the
|
||||
"querier" flags.
|
||||
The list of boundaries indicate the scoped addresses on that
|
||||
interface.
|
||||
A count of the no. of incoming and outgoing packets is also
|
||||
A count of the no.
|
||||
of incoming and outgoing packets is also
|
||||
shown at each interface.
|
||||
.Pp
|
||||
Associated with each subnet from which a multicast datagram can originate
|
||||
is the address of the previous hop router (unless the subnet is directly-
|
||||
connected), the metric of the path back to the origin, the amount of time
|
||||
since we last received an update for this subnet, the incoming vif for
|
||||
multicasts from that origin, and a list of outgoing vifs. "*" means that
|
||||
multicasts from that origin, and a list of outgoing vifs.
|
||||
"*" means that
|
||||
the outgoing vif is connected to a leaf of the broadcast tree rooted at the
|
||||
origin, and a multicast datagram from that origin will be forwarded on that
|
||||
outgoing vif only if there are members of the destination group on that leaf.
|
||||
@ -551,17 +601,21 @@ Each entry is characterized by the origin subnet number and mask and the
|
||||
destination multicast group.
|
||||
.Pp
|
||||
The 'CTmr' field indicates the lifetime
|
||||
of the entry. The entry is deleted from the cache table
|
||||
of the entry.
|
||||
The entry is deleted from the cache table
|
||||
(or refreshed, if traffic is flowing)
|
||||
when the timer decrements to zero. The 'Age' field is the time since
|
||||
this cache entry was originally created. Since cache entries get refreshed
|
||||
when the timer decrements to zero.
|
||||
The 'Age' field is the time since
|
||||
this cache entry was originally created.
|
||||
Since cache entries get refreshed
|
||||
if traffic is flowing, routing entries can grow very old.
|
||||
.Pp
|
||||
The 'Ptmr' field is simply a dash if no prune was sent upstream, or the
|
||||
amount of time until the upstream prune will time out.
|
||||
.Pp
|
||||
The 'Ivif' field indicates the
|
||||
incoming vif for multicast packets from that origin. Each router also
|
||||
incoming vif for multicast packets from that origin.
|
||||
Each router also
|
||||
maintains a record of the number of prunes received from neighboring
|
||||
routers for a particular source and group.
|
||||
If there are no members of
|
||||
@ -578,11 +632,12 @@ that interface.
|
||||
An unlisted interface is a leaf subnet with no
|
||||
members of the particular group on that subnet.
|
||||
A "b" on an interface
|
||||
indicates that it is a boundary interface, i.e. traffic will not be
|
||||
indicates that it is a boundary interface, i.e., traffic will not be
|
||||
forwarded on the scoped address on that interface.
|
||||
.Pp
|
||||
An additional line with a ">" as the first character is printed for
|
||||
each source on the subnet. Note that there can be many sources in
|
||||
each source on the subnet.
|
||||
Note that there can be many sources in
|
||||
one subnet.
|
||||
An additional line with a "<" as the first character is printed
|
||||
describing any prunes received from downstream dependent neighbors
|
||||
@ -600,7 +655,8 @@ for this subnet and group.
|
||||
.Xr mtrace 8
|
||||
.Pp
|
||||
DVMRP is described, along with other multicast routing algorithms, in the
|
||||
paper "Multicast Routing in Internetworks and Extended LANs" by S. Deering,
|
||||
paper "Multicast Routing in Internetworks and Extended LANs" by
|
||||
.An S. Deering ,
|
||||
in the Proceedings of the ACM SIGCOMM '88 Conference.
|
||||
.Sh AUTHORS
|
||||
.An Steve Deering ,
|
||||
|
@ -67,7 +67,8 @@ can be difficult.
|
||||
The
|
||||
.Nm
|
||||
utility utilizes a tracing feature implemented in multicast routers that is
|
||||
accessed via an extension to the IGMP protocol. A trace query is
|
||||
accessed via an extension to the IGMP protocol.
|
||||
A trace query is
|
||||
passed hop-by-hop along the reverse path from the
|
||||
.Ar receiver
|
||||
to the
|
||||
@ -77,15 +78,18 @@ along the path, and then the response is returned to the requestor.
|
||||
.Pp
|
||||
The only required parameter is the
|
||||
.Ar source
|
||||
host name or address. The default
|
||||
host name or address.
|
||||
The default
|
||||
.Ar receiver
|
||||
is the host running mtrace, and the default
|
||||
.Ar group
|
||||
is 0.0.0.0, which is sufficient if packet loss
|
||||
statistics for a particular multicast group are not needed. These two
|
||||
statistics for a particular multicast group are not needed.
|
||||
These two
|
||||
optional parameters may be specified to test the path to some other
|
||||
receiver in a particular group, subject to some constraints as
|
||||
detailed below. The two parameters can be distinguished because the
|
||||
detailed below.
|
||||
The two parameters can be distinguished because the
|
||||
.Ar receiver
|
||||
is a unicast address and the
|
||||
.Ar group
|
||||
@ -97,7 +101,8 @@ flag is specified, the source address defaults to the host running
|
||||
and the receiver defaults to the router being addressed with
|
||||
the
|
||||
.Fl g
|
||||
flag. In this case, there are no required parameters.
|
||||
flag.
|
||||
In this case, there are no required parameters.
|
||||
.Pp
|
||||
NOTE: For Solaris 2.4/2.5, if the multicast interface is not the default
|
||||
interface, the
|
||||
@ -127,7 +132,8 @@ unicast packet and
|
||||
.Nm mrouted
|
||||
has no route for the
|
||||
.Ar source
|
||||
address. Therefore, do not use the
|
||||
address.
|
||||
Therefore, do not use the
|
||||
.Fl g
|
||||
option unless the target
|
||||
.Nm mrouted
|
||||
@ -170,11 +176,13 @@ multicast traceroutes with IP options, so it may be necessary to use the
|
||||
flag if the last-hop router is a Cisco.
|
||||
.It Fl p
|
||||
Listen passively for multicast responses from traces initiated by
|
||||
others. This works best when run on a multicast router.
|
||||
others.
|
||||
This works best when run on a multicast router.
|
||||
.It Fl P
|
||||
Loop indefinitely collecting the path every 10 seconds (see
|
||||
.Fl S Ar stat_int )
|
||||
and printing it when it changes. Do not print any statistics.
|
||||
and printing it when it changes.
|
||||
Do not print any statistics.
|
||||
.It Fl r Ar host
|
||||
Send the trace response to
|
||||
.Ar host
|
||||
@ -193,7 +201,8 @@ seconds (default 10 seconds).
|
||||
Set the
|
||||
.Ar ttl
|
||||
(time-to-live, or number of hops) for multicast trace queries and
|
||||
responses. The default is 127, except for local queries to the "all
|
||||
responses.
|
||||
The default is 127, except for local queries to the "all
|
||||
routers" multicast group which use ttl 1.
|
||||
.It Fl T
|
||||
"Tunnel statistics" mode; show loss rates for overall traffic.
|
||||
@ -228,7 +237,8 @@ to the
|
||||
A trace query packet is sent to the last
|
||||
hop multicast router (the leaf router for the desired
|
||||
.Ar receiver
|
||||
address). The last hop router builds a trace response packet, fills in
|
||||
address).
|
||||
The last hop router builds a trace response packet, fills in
|
||||
a report for its hop, and forwards the trace packet using unicast to
|
||||
the router it believes is the previous hop for packets originating
|
||||
from the specified
|
||||
@ -241,9 +251,11 @@ the trace query.
|
||||
.Pp
|
||||
If some multicast router along the path does not implement the
|
||||
multicast traceroute feature or if there is some outage, then no
|
||||
response will be returned. To solve this problem, the trace query
|
||||
response will be returned.
|
||||
To solve this problem, the trace query
|
||||
includes a maximum hop count field to limit the number of hops traced
|
||||
before the response is returned. That allows a partial path to be
|
||||
before the response is returned.
|
||||
That allows a partial path to be
|
||||
traced.
|
||||
.Pp
|
||||
The reports inserted by each router contain not only the address of
|
||||
@ -264,12 +276,15 @@ to the
|
||||
.Ar receiver .
|
||||
If the receiver is on the local subnet (as determined using the subnet
|
||||
mask), then the default method is to multicast the trace query to
|
||||
all-routers.mcast.net (224.0.0.2) with a ttl of 1. Otherwise, the
|
||||
all-routers.mcast.net (224.0.0.2) with a ttl of 1.
|
||||
Otherwise, the
|
||||
trace query is multicast to the
|
||||
.Ar group
|
||||
address since the last hop router will be a member of that group if
|
||||
the receiver is. Therefore it is necessary to specify a group that
|
||||
the intended receiver has joined. This multicast is sent with a
|
||||
the receiver is.
|
||||
Therefore it is necessary to specify a group that
|
||||
the intended receiver has joined.
|
||||
This multicast is sent with a
|
||||
default ttl of 127, which may not be sufficient for all cases (changed
|
||||
with the
|
||||
.Fl t
|
||||
@ -277,7 +292,8 @@ option).
|
||||
If the last hop router is known, it may also be addressed directly
|
||||
using the
|
||||
.Fl g
|
||||
option). Alternatively, if it is desired to trace a group that the
|
||||
option).
|
||||
Alternatively, if it is desired to trace a group that the
|
||||
receiver has not joined, but it is known that the last-hop router is a
|
||||
member of another group, the
|
||||
.Fl g
|
||||
@ -295,21 +311,26 @@ By default,
|
||||
first attempts to trace the full reverse path, unless the number of
|
||||
hops to trace is explicitly set with the
|
||||
.Fl m
|
||||
option. If there is no response within a 3 second timeout interval
|
||||
option.
|
||||
If there is no response within a 3 second timeout interval
|
||||
(changed with the
|
||||
.Fl w
|
||||
option), a "*" is printed and the probing switches to hop-by-hop mode.
|
||||
Trace queries are issued starting with a maximum hop count of one and
|
||||
increasing by one until the full path is traced or no response is
|
||||
received. At each hop, multiple probes are sent (default is three,
|
||||
received.
|
||||
At each hop, multiple probes are sent (default is three,
|
||||
changed with
|
||||
.Fl q
|
||||
option). The first half of the attempts (default is two) are made with
|
||||
option).
|
||||
The first half of the attempts (default is two) are made with
|
||||
the reply address set to standard multicast address, mtrace.mcast.net
|
||||
(224.0.1.32) with the ttl set to 32 more than what's needed to pass the
|
||||
thresholds seen so far along the path to the receiver. For each
|
||||
thresholds seen so far along the path to the receiver.
|
||||
For each
|
||||
additional attempt, the ttl is increased by another 32 each time up to
|
||||
a maximum of 192. Since the desired router may not be able to send a
|
||||
a maximum of 192.
|
||||
Since the desired router may not be able to send a
|
||||
multicast reply, the remainder of the attempts request that the
|
||||
response be sent via unicast to the host running
|
||||
.Nm .
|
||||
@ -324,8 +345,10 @@ instead with the
|
||||
option, or if you specify
|
||||
.Fl UM ,
|
||||
.Nm
|
||||
will first attempt using unicast and then multicast. For each attempt,
|
||||
if no response is received within the timeout, a "*" is printed. After
|
||||
will first attempt using unicast and then multicast.
|
||||
For each attempt,
|
||||
if no response is received within the timeout, a "*" is printed.
|
||||
After
|
||||
the specified number of attempts have failed,
|
||||
.Nm
|
||||
will try to query the next hop router with a DVMRP_ASK_NEIGHBORS2
|
||||
@ -342,7 +365,8 @@ forwarding the request on.
|
||||
.Sh EXAMPLES
|
||||
The output of
|
||||
.Nm
|
||||
is in two sections. The first section is a short listing of the hops
|
||||
is in two sections.
|
||||
The first section is a short listing of the hops
|
||||
in the order they are queried, that is, in the reverse of the order
|
||||
from the
|
||||
.Ar source
|
||||
@ -353,11 +377,13 @@ negatively to indicate that this is the reverse path); the multicast
|
||||
routing protocol (DVMRP, MOSPF, PIM, etc.); the threshold required to
|
||||
forward data (to the previous hop in the listing as indicated by the
|
||||
up-arrow character); and the cumulative delay for the query to reach
|
||||
that hop (valid only if the clocks are synchronized). This first
|
||||
that hop (valid only if the clocks are synchronized).
|
||||
This first
|
||||
section ends with a line showing the round-trip time which measures
|
||||
the interval from when the query is issued until the response is
|
||||
received, both derived from the local system clock, and the total
|
||||
ttl required for a packet to travel along this path. A sample use and
|
||||
ttl required for a packet to travel along this path.
|
||||
A sample use and
|
||||
output might be:
|
||||
.Pp
|
||||
.Bd -literal
|
||||
@ -377,7 +403,8 @@ Round trip time 124 ms; total ttl of 6 required.
|
||||
If a hop reports that it is using the default route to forward packets,
|
||||
the word
|
||||
.Em [default]
|
||||
is printed after that hop. If the
|
||||
is printed after that hop.
|
||||
If the
|
||||
.Fl v
|
||||
flag is supplied, the route being used to forward packets is printed
|
||||
in the form
|
||||
@ -385,7 +412,8 @@ in the form
|
||||
.Pp
|
||||
The second section provides a pictorial view of the path in the
|
||||
forward direction with data flow indicated by arrows pointing downward
|
||||
and the query path indicated by arrows pointing upward. For each hop,
|
||||
and the query path indicated by arrows pointing upward.
|
||||
For each hop,
|
||||
both the entry and exit addresses of the router are shown if
|
||||
different, along with the initial ttl required on the packet in order
|
||||
to be forwarded at this hop and the propagation delay across the hop
|
||||
@ -395,11 +423,14 @@ The first column contains the average packet rate for all traffic at
|
||||
each hop.
|
||||
The remaining columns are the
|
||||
number of packets lost, the number of packets sent, the percentage
|
||||
lost, and the average packet rate at each hop. These statistics are
|
||||
lost, and the average packet rate at each hop.
|
||||
These statistics are
|
||||
calculated from differences between traces and from hop to hop as
|
||||
explained above. The first group shows the statistics for all traffic
|
||||
explained above.
|
||||
The first group shows the statistics for all traffic
|
||||
flowing out the interface at one hop and in the interface at the next
|
||||
hop. The second group shows the statistics only for traffic forwarded
|
||||
hop.
|
||||
The second group shows the statistics only for traffic forwarded
|
||||
from the specified
|
||||
.Ar source
|
||||
to the specified
|
||||
@ -407,20 +438,26 @@ to the specified
|
||||
The first group of statistics may be expanded to include loss rates
|
||||
using the
|
||||
.Fl T
|
||||
option. However, these numbers can be extremely misleading and require
|
||||
option.
|
||||
However, these numbers can be extremely misleading and require
|
||||
detailed knowledge of the routers involved to be interpreted properly.
|
||||
.Pp
|
||||
These statistics are shown on one or two lines for each hop. Without
|
||||
These statistics are shown on one or two lines for each hop.
|
||||
Without
|
||||
any options, this second section of the output is printed only once,
|
||||
approximately 10 seconds after the initial trace. One line is shown
|
||||
for each hop showing the statistics over that 10-second period. If
|
||||
approximately 10 seconds after the initial trace.
|
||||
One line is shown
|
||||
for each hop showing the statistics over that 10-second period.
|
||||
If
|
||||
the
|
||||
.Fl l
|
||||
option is given, the second section is repeated every 10 seconds and
|
||||
two lines are shown for each hop. The first line shows the statistics
|
||||
two lines are shown for each hop.
|
||||
The first line shows the statistics
|
||||
for the last 10 seconds, and the second line shows the cumulative
|
||||
statistics over the period since the initial trace, which is 101
|
||||
seconds in the example below. The second section of the output is
|
||||
seconds in the example below.
|
||||
The second section of the output is
|
||||
omitted if the
|
||||
.Fl s
|
||||
option is set or if no multicast group is specified.
|
||||
@ -458,39 +495,47 @@ Waiting to accumulate statistics... Results after 101 seconds:
|
||||
.Pp
|
||||
Because the packet counts may be changing as the trace query is
|
||||
propagating, there may be small errors (off by 1 or 2) in these
|
||||
statistics. However, those errors should not accumulate, so the
|
||||
statistics.
|
||||
However, those errors should not accumulate, so the
|
||||
cumulative statistics line should increase in accuracy as a new trace
|
||||
is run every 10 seconds. There are two sources of larger errors, both
|
||||
is run every 10 seconds.
|
||||
There are two sources of larger errors, both
|
||||
of which show up as negative losses:
|
||||
.Pp
|
||||
If the input to a node is from a multi-access network with more than
|
||||
one other node attached, then the input count will be (close to) the
|
||||
sum of the output counts from all the attached nodes, but the output
|
||||
count from the previous hop on the traced path will be only part of
|
||||
that. Hence the output count minus the input count will be negative.
|
||||
that.
|
||||
Hence the output count minus the input count will be negative.
|
||||
.Pp
|
||||
In release 3.3 of the DVMRP multicast forwarding software for SunOS
|
||||
and other systems, a multicast packet generated on a router will be
|
||||
counted as having come in an interface even though it did not. This
|
||||
counted as having come in an interface even though it did not.
|
||||
This
|
||||
creates the negative loss that can be seen in the example above.
|
||||
.Pp
|
||||
Note that these negative losses may mask positive losses.
|
||||
.Pp
|
||||
In the example, there is also one negative hop time. This simply
|
||||
In the example, there is also one negative hop time.
|
||||
This simply
|
||||
indicates a lack of synchronization between the system clocks across
|
||||
that hop. This example also illustrates how the percentage loss is
|
||||
that hop.
|
||||
This example also illustrates how the percentage loss is
|
||||
shown as two dashes when the number of packets sent is less than 10
|
||||
because the percentage would not be statistically valid.
|
||||
.Pp
|
||||
A second example shows a trace to a receiver that is not local; the
|
||||
query is sent to the last-hop router with the
|
||||
.Fl g
|
||||
option. In this example, the trace of the full reverse path resulted
|
||||
option.
|
||||
In this example, the trace of the full reverse path resulted
|
||||
in no response because there was a node running an old version of
|
||||
.Nm mrouted
|
||||
that did not implement the multicast traceroute function, so
|
||||
.Nm
|
||||
switched to hop-by-hop mode. The
|
||||
switched to hop-by-hop mode.
|
||||
The
|
||||
.Dq Output pruned
|
||||
error code
|
||||
indicates that traffic for group 224.2.143.24 would not be forwarded.
|
||||
|
@ -15,7 +15,8 @@ The
|
||||
.Nm
|
||||
utility
|
||||
is a small program for testing the multicast membership socket operations
|
||||
and ioctls. It accepts the following commands, interactively:
|
||||
and ioctls.
|
||||
It accepts the following commands, interactively:
|
||||
.Bl -tag -width "a ifname e.e.e.e.e.e" -compact -offset indent
|
||||
.It Ic j Ar g.g.g.g Ar i.i.i.i
|
||||
Join the IP group address
|
||||
|
@ -77,7 +77,8 @@ The options are as follows:
|
||||
Follow all symbolic links in the file hierarchy.
|
||||
.It Fl P
|
||||
Don't follow symbolic links in the file hierarchy, instead consider
|
||||
the symbolic link itself in any comparisons. This is the default.
|
||||
the symbolic link itself in any comparisons.
|
||||
This is the default.
|
||||
.It Fl U
|
||||
Modify the owner, group, permissions, and modification time of existing
|
||||
files to match the specification and create any missing directories or
|
||||
@ -101,13 +102,15 @@ This does not affect either the /set statements or the comment before each
|
||||
directory.
|
||||
It does however affect the comment before the close of each directory.
|
||||
.It Fl n
|
||||
Do not emit pathname comments when creating a specification. Normally
|
||||
Do not emit pathname comments when creating a specification.
|
||||
Normally
|
||||
a comment is emitted before each directory and before the close of that
|
||||
directory when using the
|
||||
.Fl c
|
||||
option.
|
||||
.It Fl q
|
||||
Quiet mode. Do not complain when a
|
||||
Quiet mode.
|
||||
Do not complain when a
|
||||
.Dq missing
|
||||
directory cannot be created because it already exists.
|
||||
This occurs when the directory is a symbolic link.
|
||||
@ -164,13 +167,14 @@ If the pattern contains a
|
||||
.Ql \&/
|
||||
character, it will be matched against entire pathnames (relative to
|
||||
the starting directory); otherwise,
|
||||
it will be matched against basenames only. No comments are allowed in
|
||||
it will be matched against basenames only.
|
||||
No comments are allowed in
|
||||
the
|
||||
.Ar exclude-list
|
||||
file.
|
||||
.El
|
||||
.Pp
|
||||
Specifications are mostly composed of ``keywords'', i.e. strings
|
||||
Specifications are mostly composed of ``keywords'', i.e., strings
|
||||
that specify values relating to files.
|
||||
No keywords have default values, and if a keyword has no value set, no
|
||||
checks based on it are performed.
|
||||
@ -183,9 +187,11 @@ the
|
||||
.Xr cksum 1
|
||||
utility.
|
||||
.It Cm flags
|
||||
The file flags as a symbolic name. See
|
||||
The file flags as a symbolic name.
|
||||
See
|
||||
.Xr chflags 1
|
||||
for information on these names. If no flags are to be set the string
|
||||
for information on these names.
|
||||
If no flags are to be set the string
|
||||
.Dq none
|
||||
may be used to override the current default.
|
||||
.It Cm ignore
|
||||
|
@ -35,7 +35,8 @@ The
|
||||
.Nm
|
||||
utility should be scheduled to run periodically by
|
||||
.Xr cron 8 .
|
||||
When it is executed it archives log files if necessary. If a log file
|
||||
When it is executed it archives log files if necessary.
|
||||
If a log file
|
||||
is determined to require archiving,
|
||||
.Nm
|
||||
rearranges the files so that
|
||||
@ -47,7 +48,8 @@ the last period's logs in it,
|
||||
.Dq Va logfile Ns Li \&.1
|
||||
has the next to last
|
||||
period's logs in it, and so on, up to a user-specified number of
|
||||
archived logs. Optionally the archived logs can be compressed to save
|
||||
archived logs.
|
||||
Optionally the archived logs can be compressed to save
|
||||
space.
|
||||
.Pp
|
||||
A log can be archived for three reasons:
|
||||
@ -100,7 +102,8 @@ is run.
|
||||
.It Fl v
|
||||
Place
|
||||
.Nm
|
||||
in verbose mode. In this mode it will print out each log and its
|
||||
in verbose mode.
|
||||
In this mode it will print out each log and its
|
||||
reasons for either trimming that log or skipping it.
|
||||
.It Fl n
|
||||
Cause
|
||||
@ -110,7 +113,8 @@ were not specified.
|
||||
.It Fl r
|
||||
Remove the restriction that
|
||||
.Nm
|
||||
must be running as root. Of course,
|
||||
must be running as root.
|
||||
Of course,
|
||||
.Nm
|
||||
will not be able to send a HUP signal to
|
||||
.Xr syslogd 8
|
||||
@ -144,7 +148,8 @@ will only apply to those specific log files.
|
||||
.It Fl F
|
||||
Force
|
||||
.Nm
|
||||
to trim the logs, even if the trim conditions have not been met. This
|
||||
to trim the logs, even if the trim conditions have not been met.
|
||||
This
|
||||
option is useful for diagnosing system problems by providing you with
|
||||
fresh logs that contain only the problems.
|
||||
.It Fl R Ar tagname
|
||||
@ -216,7 +221,8 @@ distinguish the group name.
|
||||
Beginning with
|
||||
.Fx 3.3 ,
|
||||
this has been changed to a colon (``:'') character so that user and group
|
||||
names may contain the dot character. The dot (``.'') character is still
|
||||
names may contain the dot character.
|
||||
The dot (``.'') character is still
|
||||
accepted for backwards compatibility.
|
||||
.Sh "SEE ALSO"
|
||||
.Xr bzip 1 ,
|
||||
|
@ -90,9 +90,11 @@ options may be specified.
|
||||
Specifies that nfsd should bind to the wildcard IP address.
|
||||
This is the default if no
|
||||
.Fl h
|
||||
options are given. It may also be specified in addition to any
|
||||
options are given.
|
||||
It may also be specified in addition to any
|
||||
.Fl h
|
||||
options given. Note that NFS/UDP does not operate properly when
|
||||
options given.
|
||||
Note that NFS/UDP does not operate properly when
|
||||
bound to the wildcard IP address whether you use -a or do not use -h.
|
||||
.It Fl t
|
||||
Serve
|
||||
@ -145,8 +147,10 @@ If
|
||||
is to be run on a host with multiple interfaces or interface aliases, use
|
||||
of the
|
||||
.Fl h
|
||||
option is recommended. If you do not use the option NFS may not respond to
|
||||
UDP packets from the same IP address they were sent to. Use of this option
|
||||
option is recommended.
|
||||
If you do not use the option NFS may not respond to
|
||||
UDP packets from the same IP address they were sent to.
|
||||
Use of this option
|
||||
is also recommended when securing NFS exports on a firewalling machine such
|
||||
that the NFS sockets can only be accessed by the inside interface.
|
||||
The
|
||||
|
@ -133,7 +133,7 @@ commands, their usage and aliases, and a brief description.
|
||||
.Sh HISTORY
|
||||
The
|
||||
.Nm netgraph
|
||||
system was designed and first implemented at Whistle Communications, Inc. in
|
||||
system was designed and first implemented at Whistle Communications, Inc.\& in
|
||||
a version of
|
||||
.Fx 2.2
|
||||
customized for the Whistle InterJet.
|
||||
|
@ -1292,13 +1292,13 @@ If this
|
||||
flag is specified neither queries nor time server polls will be
|
||||
responded to.
|
||||
.It Cm noquery
|
||||
Ignore all NTP mode 6 and 7 packets (i.e. information queries
|
||||
Ignore all NTP mode 6 and 7 packets (i.e., information queries
|
||||
and configuration requests) from the source.
|
||||
Time service is not
|
||||
affected.
|
||||
.It Cm nomodify
|
||||
Ignore all NTP mode 6 and 7 packets which attempt to modify the
|
||||
state of the server (i.e. run time reconfiguration).
|
||||
state of the server (i.e., run time reconfiguration).
|
||||
Queries which
|
||||
return information are permitted.
|
||||
.It Cm notrap
|
||||
|
@ -40,7 +40,8 @@ this is why it is not always zero for
|
||||
.Dq localhost ) ,
|
||||
the host
|
||||
synchronization distance,
|
||||
and (only for stratum-1 servers) the reference clock ID. All times
|
||||
and (only for stratum-1 servers) the reference clock ID.
|
||||
All times
|
||||
are given in seconds.
|
||||
Note that the stratum is the server hop count to the primary source,
|
||||
while the synchronization distance is the estimated error
|
||||
@ -53,7 +54,8 @@ The following options are available:
|
||||
Turn on some debugging output.
|
||||
.It Fl n
|
||||
Turn off the printing of host names; instead, host IP addresses
|
||||
are given. This may be necessary if a nameserver is down.
|
||||
are given.
|
||||
This may be necessary if a nameserver is down.
|
||||
.It Fl r Ar retries
|
||||
Set the number of retransmission attempts for each host; the default is 5.
|
||||
.It Fl t Ar timeout
|
||||
|
@ -60,7 +60,7 @@ Only print properties of the given name.
|
||||
.It Fl R
|
||||
Print properties in
|
||||
.Dq raw
|
||||
format, i.e. omit all headings and indentation and just write the
|
||||
format, i.e., omit all headings and indentation and just write the
|
||||
property values unaltered to the standard output.
|
||||
This is intended to be used with the
|
||||
.Fl P
|
||||
|
@ -42,7 +42,8 @@
|
||||
The
|
||||
.Nm
|
||||
utility controls PC-CARD slots and configures and displays information
|
||||
about PCMCIA cards. It understands the following subcommands:
|
||||
about PCMCIA cards.
|
||||
It understands the following subcommands:
|
||||
.Pp
|
||||
.Bl -tag -width dumpcisfile -compact
|
||||
.It Ic beep
|
||||
|
@ -116,7 +116,8 @@ If a decimal number has
|
||||
.Em k
|
||||
or
|
||||
.Em K
|
||||
appended to it, the value is multiplied by 1024. Names may be
|
||||
appended to it, the value is multiplied by 1024.
|
||||
Names may be
|
||||
quoted using double quotes if spaces are required.
|
||||
A hash character comments out the rest of the line.
|
||||
.Ss "Resource pool"
|
||||
@ -184,7 +185,7 @@ An optional set of flags may
|
||||
be assigned.
|
||||
In
|
||||
.Ar index ,
|
||||
specify either
|
||||
specify either
|
||||
.Dq auto
|
||||
or
|
||||
.Dq default
|
||||
@ -252,11 +253,11 @@ matches
|
||||
.Dq Functional ID: Serial port/modem
|
||||
and
|
||||
.Em fixed_disk
|
||||
matches
|
||||
matches
|
||||
.Dq Fixed disk card .
|
||||
The syntax is the same as for
|
||||
.Em "card identifiers"
|
||||
but uses
|
||||
but uses
|
||||
.Dq generic
|
||||
instead of
|
||||
.Dq card
|
||||
|
@ -141,7 +141,8 @@ Delays running as a daemon until after the cards have been probed and attached.
|
||||
.It Fl I
|
||||
Don't get a list of free IRQs from kernel.
|
||||
.It Fl i Ar IRQ
|
||||
Configures an available IRQ. It overrides the "irq" line in
|
||||
Configures an available IRQ.
|
||||
It overrides the "irq" line in
|
||||
.Pa /etc/defaults/pccard.conf
|
||||
and
|
||||
.Pa /etc/pccard.conf .
|
||||
|
@ -72,13 +72,14 @@ To be used in conjunction with the
|
||||
option.
|
||||
.It Fl p
|
||||
Uses 'pure' output when listing - the Escape character is displayed in either
|
||||
octal or hexadecimal and not as 'ESC'. To be used in conjunction with the
|
||||
octal or hexadecimal and not as 'ESC'.
|
||||
To be used in conjunction with the
|
||||
.Fl l
|
||||
option.
|
||||
.It Fl r Ar rate
|
||||
Specifies the character repetition rate.
|
||||
Valid argument values are 0...31
|
||||
corresponding to rates of 30 characters/second ... 2 characters/second.
|
||||
corresponding to rates of 30 characters/second ...\& 2 characters/second.
|
||||
.It Fl R
|
||||
Reset the Keyboard.
|
||||
.It Fl s
|
||||
|
@ -79,7 +79,7 @@ returned could be MDA, HGC, CGA, EGA, VGA or UNKNOWN.
|
||||
Specify the screen number the current (displayed) screen should be switched
|
||||
to.
|
||||
.It Fl d
|
||||
Specify the device filename (i.e. /dev/ttyv2) further operations specified on
|
||||
Specify the device filename (i.e., /dev/ttyv2) further operations specified on
|
||||
the command line should be applied to.
|
||||
.It Fl f
|
||||
Some programs which silently assume 24 lines when they run on a VT220 show
|
||||
@ -116,7 +116,8 @@ escape sequences for handling the labels are available to the user.
|
||||
.It Fl s
|
||||
Specify the number of character lines on the screen.
|
||||
Possible parameters are
|
||||
25, 28, 35, 40, 43 or 50. To use all this screen sizes, the fonts required
|
||||
25, 28, 35, 40, 43 or 50.
|
||||
To use all this screen sizes, the fonts required
|
||||
for proper operation of a desired size have to be downloaded to the EGA/VGA
|
||||
font ram.
|
||||
This option is available only for EGA and VGA boards.
|
||||
|
@ -59,11 +59,14 @@
|
||||
The
|
||||
.Nm
|
||||
command is used to create packages that will subsequently be fed to
|
||||
one of the package extraction/info utilities. The input description
|
||||
one of the package extraction/info utilities.
|
||||
The input description
|
||||
and command line arguments for the creation of a package are not
|
||||
really meant to be human-generated, though it is easy enough to
|
||||
do so. It is more expected that you will use a front-end tool for
|
||||
the job rather than muddling through it yourself. Nonetheless, a short
|
||||
do so.
|
||||
It is more expected that you will use a front-end tool for
|
||||
the job rather than muddling through it yourself.
|
||||
Nonetheless, a short
|
||||
description of the input syntax is included in this document.
|
||||
.Sh OPTIONS
|
||||
The following command line options are supported:
|
||||
@ -89,7 +92,8 @@ from file
|
||||
.Ar desc
|
||||
or, if preceded by
|
||||
.Cm - ,
|
||||
the argument itself. This string should also
|
||||
the argument itself.
|
||||
This string should also
|
||||
give some idea of which version of the product (if any) the package
|
||||
represents.
|
||||
.It Fl d Xo
|
||||
@ -105,7 +109,8 @@ Assume a default answer of `Yes' for any questions asked.
|
||||
.It Fl N
|
||||
Assume a default answer of `No' for any questions asked.
|
||||
.It Fl O
|
||||
Go into a `packing list Only' mode. This is a custom hack for the
|
||||
Go into a `packing list Only' mode.
|
||||
This is a custom hack for the
|
||||
.Fx
|
||||
.Em "Ports Collection"
|
||||
and is used to do `fake pkg_add' operations when a port is installed.
|
||||
@ -119,8 +124,10 @@ are dumped, rather than the links themselves.
|
||||
.It Fl i Ar iscript
|
||||
Set
|
||||
.Ar iscript
|
||||
to be the pre-install procedure for the package. This can be any executable
|
||||
program (or shell script). It will be invoked automatically when the
|
||||
to be the pre-install procedure for the package.
|
||||
This can be any executable
|
||||
program (or shell script).
|
||||
It will be invoked automatically when the
|
||||
package is later installed.
|
||||
It will be passed the package's name as the
|
||||
first argument.
|
||||
@ -138,8 +145,10 @@ respectively, after the package's name.
|
||||
.It Fl I Ar piscript
|
||||
Set
|
||||
.Ar piscript
|
||||
to be the post-install procedure for the package. This can be any
|
||||
executable program (or shell script). It will be invoked automatically
|
||||
to be the post-install procedure for the package.
|
||||
This can be any
|
||||
executable program (or shell script).
|
||||
It will be invoked automatically
|
||||
when the package is later installed.
|
||||
It will be passed the package's name as
|
||||
the first argument.
|
||||
@ -181,8 +190,10 @@ the package.
|
||||
.It Fl k Ar dscript
|
||||
Set
|
||||
.Ar dscript
|
||||
to be the de-install procedure for the package. This can be any executable
|
||||
program (or shell script). It will be invoked automatically when the
|
||||
to be the de-install procedure for the package.
|
||||
This can be any executable
|
||||
program (or shell script).
|
||||
It will be invoked automatically when the
|
||||
package is later (if ever) de-installed.
|
||||
It will be passed the package's
|
||||
name as the first argument.
|
||||
@ -200,8 +211,10 @@ respectively, along with the package's name.
|
||||
.It Fl K Ar pdscript
|
||||
Set
|
||||
.Ar pdscript
|
||||
to be the post-deinstall procedure for the package. This can be any
|
||||
executable program (or shell script). It will be invoked automatically when
|
||||
to be the post-deinstall procedure for the package.
|
||||
This can be any
|
||||
executable program (or shell script).
|
||||
It will be invoked automatically when
|
||||
the package is later de-installed.
|
||||
It will be passed the package's name as
|
||||
the first argument.
|
||||
@ -210,8 +223,10 @@ Set
|
||||
.Ar rscript
|
||||
to be the
|
||||
.Dq requirements
|
||||
procedure for the package. This can be any
|
||||
executable program (or shell script). It will be invoked automatically
|
||||
procedure for the package.
|
||||
This can be any
|
||||
executable program (or shell script).
|
||||
It will be invoked automatically
|
||||
at installation/deinstallation time to determine whether or not
|
||||
installation/deinstallation should proceed.
|
||||
To differentiate between installation and deinstallation, the keywords
|
||||
@ -239,7 +254,8 @@ By default, this is the string
|
||||
but it may be necessary to override it in the situation where
|
||||
space in your
|
||||
.Pa /tmp
|
||||
directory is limited. Be sure to leave some number of `X' characters
|
||||
directory is limited.
|
||||
Be sure to leave some number of `X' characters
|
||||
for
|
||||
.Xr mktemp 3
|
||||
to fill in with a unique ID.
|
||||
@ -250,7 +266,8 @@ as a
|
||||
.Fl exclude-from
|
||||
argument to
|
||||
.Cm tar
|
||||
when creating final package. See
|
||||
when creating final package.
|
||||
See
|
||||
.Cm tar
|
||||
man page (or run
|
||||
.Cm tar
|
||||
@ -259,7 +276,8 @@ with
|
||||
flag) for further information on using this flag.
|
||||
.It Fl D Ar displayfile
|
||||
Display the file (by concatenating it to stdout)
|
||||
after installing the package. Useful for things like
|
||||
after installing the package.
|
||||
Useful for things like
|
||||
legal notices on almost-free software, etc.
|
||||
.It Fl m Ar mtreefile
|
||||
Run
|
||||
@ -325,12 +343,15 @@ format (see
|
||||
.Fl f )
|
||||
is fairly simple, being
|
||||
nothing more than a single column of filenames to include in the
|
||||
package. However, since absolute pathnames are generally a bad idea
|
||||
package.
|
||||
However, since absolute pathnames are generally a bad idea
|
||||
for a package that could be installed potentially anywhere, there is
|
||||
another method of specifying where things are supposed to go
|
||||
and, optionally, what ownership and mode information they should be
|
||||
installed with. This is done by embedding specialized command sequences
|
||||
in the packing list. Briefly described, these sequences are:
|
||||
installed with.
|
||||
This is done by embedding specialized command sequences
|
||||
in the packing list.
|
||||
Briefly described, these sequences are:
|
||||
.Bl -tag -width indent -compact
|
||||
.It Cm @cwd Ar directory
|
||||
Set the internal directory pointer to point to
|
||||
@ -348,10 +369,12 @@ for package creation but not extraction.
|
||||
.It Cm @exec Ar command
|
||||
Execute
|
||||
.Ar command
|
||||
as part of the unpacking process. If
|
||||
as part of the unpacking process.
|
||||
If
|
||||
.Ar command
|
||||
contains any of the following sequences somewhere in it, they will
|
||||
be expanded inline. For the following examples, assume that
|
||||
be expanded inline.
|
||||
For the following examples, assume that
|
||||
.Cm @cwd
|
||||
is set to
|
||||
.Pa /usr/local
|
||||
@ -371,7 +394,8 @@ Expand to the
|
||||
.Dq basename
|
||||
of the fully qualified filename, that
|
||||
is the current directory prefix, plus the last filespec, minus
|
||||
the trailing filename. In the example case, that would be
|
||||
the trailing filename.
|
||||
In the example case, that would be
|
||||
.Pa /usr/local/bin .
|
||||
.It Cm "%f"
|
||||
Expand to the
|
||||
@ -385,17 +409,20 @@ being in the example case,
|
||||
.It Cm @unexec Ar command
|
||||
Execute
|
||||
.Ar command
|
||||
as part of the deinstallation process. Expansion of special
|
||||
as part of the deinstallation process.
|
||||
Expansion of special
|
||||
.Cm %
|
||||
sequences is the same as for
|
||||
.Cm @exec .
|
||||
This command is not executed during the package add, as
|
||||
.Cm @exec
|
||||
is, but rather when the package is deleted. This is useful
|
||||
is, but rather when the package is deleted.
|
||||
This is useful
|
||||
for deleting links and other ancillary files that were created
|
||||
as a result of adding the package, but not directly known to
|
||||
the package's table of contents (and hence not automatically
|
||||
removable). The advantage of using
|
||||
removable).
|
||||
The advantage of using
|
||||
.Cm @unexec
|
||||
over a deinstallation script is that you can use the
|
||||
.Dq special sequence expansion
|
||||
@ -408,7 +435,8 @@ Set default permission for all subsequently extracted files to
|
||||
Format is the same as that used by the
|
||||
.Cm chmod
|
||||
command (well, considering that it's later handed off to it, that's
|
||||
no surprise). Use without an arg to set back to default (extraction)
|
||||
no surprise).
|
||||
Use without an arg to set back to default (extraction)
|
||||
permissions.
|
||||
.It Cm @option Ar option
|
||||
Set internal package options, the only two currently supported ones
|
||||
@ -433,7 +461,8 @@ Set default group ownership for all subsequently extracted files to
|
||||
Use without an arg to set back to default (extraction)
|
||||
group ownership.
|
||||
.It Cm @comment Ar string
|
||||
Imbed a comment in the packing list. Useful in
|
||||
Imbed a comment in the packing list.
|
||||
Useful in
|
||||
trying to document some particularly hairy sequence that
|
||||
may trip someone up later.
|
||||
.It Cm @ignore
|
||||
@ -442,27 +471,34 @@ copy it anywhere), as it's used for some special purpose.
|
||||
.It Cm @ignore_inst
|
||||
Similar to
|
||||
.Cm @ignore ,
|
||||
but the ignoring of the next file is delayed one evaluation cycle. This
|
||||
but the ignoring of the next file is delayed one evaluation cycle.
|
||||
This
|
||||
makes it possible to use this directive in the
|
||||
.Ar packinglist
|
||||
file, so you can pack a
|
||||
specialized datafile in with a distribution for your install script (or
|
||||
something) yet have the installer ignore it.
|
||||
.It Cm @name Ar name
|
||||
Set the name of the package. This is mandatory and is usually
|
||||
put at the top. This name is potentially different from the name of
|
||||
Set the name of the package.
|
||||
This is mandatory and is usually
|
||||
put at the top.
|
||||
This name is potentially different from the name of
|
||||
the file it came in, and is used when keeping track of the package
|
||||
for later deinstallation. Note that
|
||||
for later deinstallation.
|
||||
Note that
|
||||
.Nm
|
||||
will derive this field from the package name and add it automatically
|
||||
if none is given.
|
||||
.It Cm @dirrm Ar name
|
||||
Declare directory
|
||||
.Pa name
|
||||
to be deleted at deinstall time. By default, directories created by a
|
||||
to be deleted at deinstall time.
|
||||
By default, directories created by a
|
||||
package installation are not deleted when the package is deinstalled;
|
||||
this provides an explicit directory cleanup method. This directive
|
||||
should appear at the end of the package list. If more than one
|
||||
this provides an explicit directory cleanup method.
|
||||
This directive
|
||||
should appear at the end of the package list.
|
||||
If more than one
|
||||
.Cm @dirrm
|
||||
directives are used, the directories are removed in the order specified.
|
||||
The
|
||||
@ -475,7 +511,8 @@ as an
|
||||
.Xr mtree 8
|
||||
input file to be used at install time (see
|
||||
.Fl m
|
||||
above). Only the first
|
||||
above).
|
||||
Only the first
|
||||
.Cm @mtree
|
||||
directive is honored.
|
||||
.It Cm @display Ar name
|
||||
@ -487,12 +524,14 @@ above).
|
||||
.It Cm @pkgdep Ar pkgname
|
||||
Declare a dependency on the
|
||||
.Ar pkgname
|
||||
package. The
|
||||
package.
|
||||
The
|
||||
.Ar pkgname
|
||||
package must be installed before this package may be
|
||||
installed, and this package must be deinstalled before the
|
||||
.Ar pkgname
|
||||
package is deinstalled. Multiple
|
||||
package is deinstalled.
|
||||
Multiple
|
||||
.Cm @pkgdep
|
||||
directives may be used if the package depends on multiple other packages.
|
||||
.It Cm @conflicts Ar pkgcflname
|
||||
@ -555,7 +594,8 @@ command first appeared in
|
||||
Hard links between files in a distribution must be bracketed by
|
||||
.Cm @cwd
|
||||
directives in order to be preserved as hard links when the package is
|
||||
extracted. They additionally must not end up being split between
|
||||
extracted.
|
||||
They additionally must not end up being split between
|
||||
.Cm tar
|
||||
invocations due to exec argument-space limitations (this depends on the
|
||||
value returned by
|
||||
|
@ -49,7 +49,8 @@ or other subtle
|
||||
attacks from miscreants who create dangerous package files.
|
||||
.Pp
|
||||
You are advised to verify the competence and identity of those who
|
||||
provide installable package files. For extra protection, examine all
|
||||
provide installable package files.
|
||||
For extra protection, examine all
|
||||
the package control files in the package record directory
|
||||
.Pa ( /var/db/pkg/<pkg-name>/ ) .
|
||||
Pay particular attention to any +INSTALL, +POST-INSTALL, +DEINSTALL,
|
||||
@ -88,15 +89,18 @@ would be taken if it were.
|
||||
Set
|
||||
.Ar prefix
|
||||
as the directory in which to delete files from any installed packages
|
||||
which do not explicitly set theirs. For most packages, the prefix will
|
||||
which do not explicitly set theirs.
|
||||
For most packages, the prefix will
|
||||
be set automatically to the installed location by
|
||||
.Xr pkg_add 1 .
|
||||
.It Fl d
|
||||
Remove empty directories created by file cleanup. By default, only
|
||||
Remove empty directories created by file cleanup.
|
||||
By default, only
|
||||
files/directories explicitly listed in a package's contents (either as
|
||||
normal files/directories or with the
|
||||
.Cm @dirrm
|
||||
directive) will be removed at deinstallation time. This option tells
|
||||
directive) will be removed at deinstallation time.
|
||||
This option tells
|
||||
.Nm
|
||||
to also remove any directories that were emptied as a result of removing
|
||||
the package.
|
||||
@ -114,7 +118,8 @@ automatically expands shell glob patterns in the
|
||||
Treat the
|
||||
.Ar pkg-name
|
||||
as a regular expression and delete all packages whose names match
|
||||
that regular expression. Multiple regular expressions could be
|
||||
that regular expression.
|
||||
Multiple regular expressions could be
|
||||
provided, in that case
|
||||
.Nm
|
||||
deletes all packages that match at least one
|
||||
@ -126,14 +131,16 @@ but treats the
|
||||
.Ar pkg-name
|
||||
as an extended regular expression.
|
||||
.It Fl r
|
||||
Recursive removal. In addition to specified packages, delete all
|
||||
Recursive removal.
|
||||
In addition to specified packages, delete all
|
||||
packages that depend on those packages as well.
|
||||
.El
|
||||
.Sh TECHNICAL DETAILS
|
||||
The
|
||||
.Nm
|
||||
utility
|
||||
does pretty much what it says. It examines installed package records in
|
||||
does pretty much what it says.
|
||||
It examines installed package records in
|
||||
.Pa /var/db/pkg/<pkg-name> ,
|
||||
deletes the package contents, and finally removes the package records.
|
||||
If the environment variable
|
||||
@ -164,7 +171,8 @@ then this is executed first as
|
||||
is the name of the package in question and
|
||||
.Ar DEINSTALL
|
||||
is a keyword denoting that this is a deinstallation)
|
||||
to see whether or not deinstallation should continue. A non-zero exit
|
||||
to see whether or not deinstallation should continue.
|
||||
A non-zero exit
|
||||
status means no, unless the
|
||||
.Fl f
|
||||
option is specified.
|
||||
@ -205,7 +213,8 @@ If a
|
||||
.Cm post-deinstall
|
||||
script exists for the package, it is executed
|
||||
.Cm after
|
||||
all files are removed. It is this script's responsibility to clean up any
|
||||
all files are removed.
|
||||
It is this script's responsibility to clean up any
|
||||
additional messy details around the package's installation, and leave the
|
||||
system (hopefully) in the same state that it was prior to the installation
|
||||
of the package.
|
||||
@ -250,7 +259,8 @@ All scripts are called with the environment variable
|
||||
.Ev PKG_PREFIX
|
||||
set to the installation prefix (see the
|
||||
.Fl p
|
||||
option above). This allows a package author to write a script
|
||||
option above).
|
||||
This allows a package author to write a script
|
||||
that reliably performs some action on the directory where the package
|
||||
is installed, even if the user might have changed it by specifying the
|
||||
.Fl p
|
||||
|
@ -51,14 +51,16 @@ command.
|
||||
The following command line options are supported:
|
||||
.Bl -tag -width indent
|
||||
.It Ar pkg-name ...
|
||||
The named packages are described. A package name may either be the name of
|
||||
The named packages are described.
|
||||
A package name may either be the name of
|
||||
an installed package, the pathname to a package distribution file or a
|
||||
URL to an FTP available package.
|
||||
Package version numbers can also be matched in a relational manner using the
|
||||
.Pa \*[Ge], \*[Le], \*[Gt]
|
||||
and
|
||||
.Pa \*[Lt]
|
||||
operators. For example,
|
||||
operators.
|
||||
For example,
|
||||
.Pa pkg_info 'portupgrade\*[Ge]20030723'
|
||||
will match versions 20030723 and later of the
|
||||
.Pa portupgrade
|
||||
@ -97,7 +99,8 @@ Show files that don't match the recorded checksum.
|
||||
.It Fl i
|
||||
Show the install script (if any) for each package.
|
||||
.It Fl I
|
||||
Show an index line for each package. This option takes
|
||||
Show an index line for each package.
|
||||
This option takes
|
||||
precedence over all other package formatting options.
|
||||
.It Fl j
|
||||
Show the requirements script (if any) for each package.
|
||||
@ -110,7 +113,8 @@ Show the list of installed packages which require each package.
|
||||
.It Fl m
|
||||
Show the mtree file (if any) for each package.
|
||||
.It Fl L
|
||||
Show the files within each package. This is different from just
|
||||
Show the files within each package.
|
||||
This is different from just
|
||||
viewing the packing list, since full pathnames for everything
|
||||
are generated.
|
||||
.It Fl s
|
||||
@ -118,7 +122,8 @@ Show the total size occupied by files installed within each package.
|
||||
.It Fl o
|
||||
Show the
|
||||
.Dq origin
|
||||
path recorded on package generation. This path
|
||||
path recorded on package generation.
|
||||
This path
|
||||
intended to give an idea as to where the underlying port, from which
|
||||
package was generated, is located in the
|
||||
.Fx
|
||||
@ -133,7 +138,8 @@ automatically expands shell glob patterns in the
|
||||
.It Fl W
|
||||
For the specified
|
||||
.Ar filename
|
||||
argument show which package it belongs to. If the file is not in the
|
||||
argument show which package it belongs to.
|
||||
If the file is not in the
|
||||
current directory, and does not have an absolute path, then the
|
||||
.Ev PATH
|
||||
is searched using
|
||||
@ -146,7 +152,8 @@ argument list all packages having this origin.
|
||||
Treat the
|
||||
.Ar pkg-name
|
||||
as a regular expression and display information only for packages
|
||||
whose names match that regular expression. Multiple regular
|
||||
whose names match that regular expression.
|
||||
Multiple regular
|
||||
expressions could be provided, in that case
|
||||
.Nm
|
||||
displays information about all packages that match at least one
|
||||
@ -160,11 +167,13 @@ as an extended regular expression.
|
||||
.It Fl e Ar pkg-name
|
||||
If the package identified by
|
||||
.Ar pkg-name
|
||||
is currently installed, return 0, otherwise return 1. This option
|
||||
is currently installed, return 0, otherwise return 1.
|
||||
This option
|
||||
allows you to easily test for the presence of another (perhaps
|
||||
prerequisite) package from a script.
|
||||
.It Fl E
|
||||
Show only matching package names. This option takes
|
||||
Show only matching package names.
|
||||
This option takes
|
||||
precedence over all other package formatting options.
|
||||
If any packages match, return 0, otherwise return 1.
|
||||
.It Fl l Ar str
|
||||
@ -175,7 +184,8 @@ shown with
|
||||
This is primarily of use to front-end programs who want to request a
|
||||
lot of different information fields at once for a package, but don't
|
||||
necessary want the output intermingled in such a way that they can't
|
||||
organize it. This lets you add a special token to the start of
|
||||
organize it.
|
||||
This lets you add a special token to the start of
|
||||
each field.
|
||||
.It Fl t Ar template
|
||||
Use
|
||||
@ -189,7 +199,8 @@ By default, this is the string
|
||||
but it may be necessary to override it in the situation where
|
||||
space in your
|
||||
.Pa /tmp
|
||||
directory is limited. Be sure to leave some number of `X' characters
|
||||
directory is limited.
|
||||
Be sure to leave some number of `X' characters
|
||||
for
|
||||
.Xr mktemp 3
|
||||
to fill in with a unique ID.
|
||||
@ -224,7 +235,8 @@ Points to the directory where
|
||||
creates its temporary files.
|
||||
If this variable is not set,
|
||||
.Ev TMPDIR
|
||||
is used. If both are unset, the builtin defaults are used.
|
||||
is used.
|
||||
If both are unset, the builtin defaults are used.
|
||||
.It Ev PKG_DBDIR
|
||||
Specifies an alternative location for the installed package database.
|
||||
.El
|
||||
|
@ -103,7 +103,8 @@ For
|
||||
the signing key or verification certificate may be
|
||||
specified with the
|
||||
.Fl k
|
||||
option. If not specified, packages are signed or verified with the
|
||||
option.
|
||||
If not specified, packages are signed or verified with the
|
||||
default keys and certificates documented below.
|
||||
.Pp
|
||||
If
|
||||
|
@ -53,7 +53,8 @@ installed using the
|
||||
command.
|
||||
.Pp
|
||||
Each package's version number is checked against one of two sources to
|
||||
see if that package may require updating. If the package contains
|
||||
see if that package may require updating.
|
||||
If the package contains
|
||||
information about its origin in the
|
||||
.Fx
|
||||
ports tree, and a version number can be determined from the port's
|
||||
@ -155,7 +156,7 @@ The output consists of one of the single characters
|
||||
This flag is mostly useful for scripts or for testing.
|
||||
.It Fl T
|
||||
Test whether
|
||||
.Ar pkgname
|
||||
.Ar pkgname
|
||||
is matched by
|
||||
.Ar pattern
|
||||
and set the exit code accordingly.
|
||||
@ -164,16 +165,21 @@ can also be used in `filter mode':
|
||||
When one of the arguments is `-', standard input is used, and lines
|
||||
with matching package names/patterns are echoed to standard output.
|
||||
.It Fl v
|
||||
Enable verbose output. Verbose output includes some English-text
|
||||
Enable verbose output.
|
||||
Verbose output includes some English-text
|
||||
interpretations of the version number comparisons, as well as the
|
||||
version numbers compared for each package. Non-verbose output is
|
||||
version numbers compared for each package.
|
||||
Non-verbose output is
|
||||
probably easier for programs or scripts to parse.
|
||||
.It Ar index
|
||||
Specify the index to be used as a basis of comparison. This index can
|
||||
be specified as a filename (in the local file system) or a URL. Any
|
||||
Specify the index to be used as a basis of comparison.
|
||||
This index can
|
||||
be specified as a filename (in the local file system) or a URL.
|
||||
Any
|
||||
URL understandable by
|
||||
.Xr fetch 1
|
||||
can be used here. If no
|
||||
can be used here.
|
||||
If no
|
||||
.Ar index
|
||||
file is specified on the command line,
|
||||
.Pa /usr/ports/INDEX-5
|
||||
|
@ -259,7 +259,7 @@ will force it to exit.
|
||||
can use either the standard LCP callback protocol or the Microsoft
|
||||
CallBack Control Protocol (ftp://ftp.microsoft.com/developr/rfc/cbcp.txt).
|
||||
.It Supports NAT or packet aliasing.
|
||||
Packet aliasing (a.k.a. IP masquerading) allows computers on a
|
||||
Packet aliasing (a.k.a.\& IP masquerading) allows computers on a
|
||||
private, unregistered network to access the Internet.
|
||||
The
|
||||
.Em PPP
|
||||
@ -1624,7 +1624,7 @@ in your profile).
|
||||
.Sh NETWORK ADDRESS TRANSLATION (PACKET ALIASING)
|
||||
The
|
||||
.Fl nat
|
||||
command line option enables network address translation (a.k.a. packet
|
||||
command line option enables network address translation (a.k.a.\& packet
|
||||
aliasing).
|
||||
This allows the
|
||||
.Nm
|
||||
@ -3473,9 +3473,11 @@ If no arguments are given, firewall punching is disabled.
|
||||
.It nat skinny_port Op Ar port
|
||||
This command tells
|
||||
.Nm
|
||||
which TCP port is used by the Skinny Station protocol. Skinny is used by
|
||||
which TCP port is used by the Skinny Station protocol.
|
||||
Skinny is used by
|
||||
Cisco IP phones to communicate with Cisco Call Managers to setup voice
|
||||
over IP calls. The typical port used by Skinny is 2000.
|
||||
over IP calls.
|
||||
The typical port used by Skinny is 2000.
|
||||
.Pp
|
||||
If no argument is given, skinny aliasing is disabled.
|
||||
.It nat same_ports yes|no
|
||||
@ -5369,7 +5371,8 @@ keywords.
|
||||
.Pp
|
||||
.It RAD_FRAMED_IPV6_PREFIX
|
||||
If this attribute is supplied, the value is substituted for IPV6PREFIX
|
||||
in a command. You may pass it to such as DHCPv6 for delegating an
|
||||
in a command.
|
||||
You may pass it to such as DHCPv6 for delegating an
|
||||
IPv6 prefix to a peer.
|
||||
.It RAD_FRAMED_IPV6_ROUTE
|
||||
The received string is expected to be in the format
|
||||
@ -5410,7 +5413,8 @@ would result in a default route to
|
||||
.Dv HISADDR6 .
|
||||
.Pp
|
||||
All RADIUS IPv6 routes are applied after any sticky routes are
|
||||
applied, making RADIUS IPv6 routes override configured routes. This
|
||||
applied, making RADIUS IPv6 routes override configured routes.
|
||||
This
|
||||
also applies for RADIUS IPv6 routes that don't {include} the
|
||||
.Dv MYADDR6
|
||||
or
|
||||
@ -5459,14 +5463,16 @@ encryption.
|
||||
If this
|
||||
.Dv RAD_VENDOR_MICROSOFT
|
||||
vendor specific attribute is supplied, it's value is used as the master
|
||||
key for decryption of incoming data. When clients are authenticated using
|
||||
key for decryption of incoming data.
|
||||
When clients are authenticated using
|
||||
MSCHAPv2, the RADIUS server MUST provide this attribute if inbound MPPE is
|
||||
to function.
|
||||
.It RAD_MICROSOFT_MS_MPPE_SEND_KEY
|
||||
If this
|
||||
.Dv RAD_VENDOR_MICROSOFT
|
||||
vendor specific attribute is supplied, it's value is used as the master
|
||||
key for encryption of outgoing data. When clients are authenticated using
|
||||
key for encryption of outgoing data.
|
||||
When clients are authenticated using
|
||||
MSCHAPv2, the RADIUS server MUST provide this attribute if outbound MPPE is
|
||||
to function.
|
||||
.El
|
||||
@ -5758,7 +5764,7 @@ Word replacement is done in the same way as for the
|
||||
.Dq !bg
|
||||
command as described above.
|
||||
.Pp
|
||||
Use of the ! character
|
||||
Use of the !\& character
|
||||
requires a following space as with any of the other commands.
|
||||
You should note that this command is executed in the foreground;
|
||||
.Nm
|
||||
|
@ -21,24 +21,29 @@
|
||||
.Sh DESCRIPTION
|
||||
This utility provides command line control of the
|
||||
.Xr ppp 8
|
||||
daemon. Its primary use is to facilitate simple scripts that
|
||||
daemon.
|
||||
Its primary use is to facilitate simple scripts that
|
||||
control a running daemon.
|
||||
.Pp
|
||||
The
|
||||
.Nm
|
||||
utility is passed at least one argument, specifying the socket on which
|
||||
.Nm ppp
|
||||
is listening. Refer to the
|
||||
is listening.
|
||||
Refer to the
|
||||
.Sq set server
|
||||
command of
|
||||
.Nm ppp
|
||||
for details. If the socket contains a leading '/', it
|
||||
for details.
|
||||
If the socket contains a leading '/', it
|
||||
is taken as an
|
||||
.Dv AF_LOCAL
|
||||
socket. If it contains a colon, it is treated as a
|
||||
socket.
|
||||
If it contains a colon, it is treated as a
|
||||
.Ar host : Ns Ar port
|
||||
pair, otherwise it is treated as a TCP port specification on the
|
||||
local machine (127.0.0.1). Both the
|
||||
local machine (127.0.0.1).
|
||||
Both the
|
||||
.Ar host
|
||||
and
|
||||
.Ar port
|
||||
@ -50,7 +55,8 @@ All remaining arguments are concatenated to form the
|
||||
.Ar command Ns (s)
|
||||
that will be sent to the
|
||||
.Nm ppp
|
||||
daemon. If any semi-colon characters are found, they are treated as
|
||||
daemon.
|
||||
If any semi-colon characters are found, they are treated as
|
||||
.Ar command
|
||||
delimiters, allowing more than one
|
||||
.Ar command
|
||||
@ -73,7 +79,8 @@ When reading commands, the
|
||||
.Xr editline 3
|
||||
library is used, allowing command-line editing (with
|
||||
.Xr editrc 5
|
||||
defining editing behaviour). The history size
|
||||
defining editing behaviour).
|
||||
The history size
|
||||
defaults to
|
||||
.Em 20 lines .
|
||||
.Pp
|
||||
@ -82,19 +89,23 @@ The following command line options are available:
|
||||
.It Fl v
|
||||
Display all data sent to and received from the
|
||||
.Nm ppp
|
||||
daemon. Normally,
|
||||
daemon.
|
||||
Normally,
|
||||
.Nm
|
||||
displays only non-prompt lines received. This option is ignored in
|
||||
displays only non-prompt lines received.
|
||||
This option is ignored in
|
||||
interactive mode.
|
||||
.It Fl t Ar n
|
||||
Use a timeout of
|
||||
.Ar n
|
||||
instead of the default 2 seconds when connecting. This may be required
|
||||
instead of the default 2 seconds when connecting.
|
||||
This may be required
|
||||
if you wish to control a daemon over a slow (or even a dialup) link.
|
||||
.It Fl p Ar passwd
|
||||
Specify the password required by the
|
||||
.Nm ppp
|
||||
daemon. If this switch is not used,
|
||||
daemon.
|
||||
If this switch is not used,
|
||||
.Nm
|
||||
will prompt for a password once it has successfully connected to
|
||||
.Nm ppp .
|
||||
@ -108,7 +119,8 @@ mode,
|
||||
.Nm
|
||||
can be used to automate many frequent tasks (you can actually control
|
||||
.Nm ppp
|
||||
in any mode except interactive mode). Use of the
|
||||
in any mode except interactive mode).
|
||||
Use of the
|
||||
.Fl p
|
||||
option is discouraged (even in scripts that aren't readable by others)
|
||||
as a
|
||||
@ -133,7 +145,8 @@ Refer to the
|
||||
.Xr ppp 8
|
||||
man page for further details.
|
||||
.Pp
|
||||
You can now create some easy-access scripts. To connect to the internet:
|
||||
You can now create some easy-access scripts.
|
||||
To connect to the internet:
|
||||
.Bd -literal -offset indent
|
||||
#! /bin/sh
|
||||
test $# -eq 0 && time=300 || time=$1
|
||||
@ -165,10 +178,12 @@ exec pppctl /var/run/internet "$@"
|
||||
.Pp
|
||||
You could also use
|
||||
.Nm
|
||||
to control when dial-on-demand works. Suppose you want
|
||||
to control when dial-on-demand works.
|
||||
Suppose you want
|
||||
.Nm ppp
|
||||
to run all the time, but you want to prevent dial-out between 8pm and 8am
|
||||
each day. However, any connections active at 8pm should continue to remain
|
||||
each day.
|
||||
However, any connections active at 8pm should continue to remain
|
||||
active until they are closed or naturally time out.
|
||||
.Pp
|
||||
A
|
||||
@ -190,10 +205,14 @@ The following environment variables are understood by
|
||||
when in interactive mode:
|
||||
.Bl -tag -width XXXXXXXXXX
|
||||
.It Dv EL_SIZE
|
||||
The number of history lines. The default is 20.
|
||||
The number of history lines.
|
||||
The default is 20.
|
||||
.It Dv EL_EDITOR
|
||||
The edit mode. Only values of "emacs" and "vi" are accepted. Other values
|
||||
are silently ignored. This environment variable will override the
|
||||
The edit mode.
|
||||
Only values of "emacs" and "vi" are accepted.
|
||||
Other values
|
||||
are silently ignored.
|
||||
This environment variable will override the
|
||||
.Ar bind -v
|
||||
and
|
||||
.Ar bind -e
|
||||
|
@ -122,8 +122,10 @@ The file offset (see
|
||||
.It Fl s
|
||||
Print information about swap space usage on all the
|
||||
swap areas compiled into the kernel.
|
||||
The first column is the device name of the partition. The next column is
|
||||
the total space available in the partition. The
|
||||
The first column is the device name of the partition.
|
||||
The next column is
|
||||
the total space available in the partition.
|
||||
The
|
||||
.Ar Used
|
||||
column indicates the total blocks used so far; the
|
||||
.Ar Available
|
||||
|
@ -814,7 +814,8 @@ The
|
||||
and
|
||||
.Ar unlock
|
||||
commands take a user name or uid of the account to lock or unlock,
|
||||
respectively. The
|
||||
respectively.
|
||||
The
|
||||
.Fl V ,
|
||||
.Fl C ,
|
||||
and
|
||||
|
@ -74,8 +74,10 @@ change, add, or remove any files.
|
||||
.It Fl N
|
||||
Tell
|
||||
.Nm
|
||||
to exit with an error if it cannot obtain a lock on the file. By default,
|
||||
we block waiting for a lock on the source file. The lock is held through
|
||||
to exit with an error if it cannot obtain a lock on the file.
|
||||
By default,
|
||||
we block waiting for a lock on the source file.
|
||||
The lock is held through
|
||||
the rebuilding of the database.
|
||||
.It Fl p
|
||||
Create a Version 7 style password file and install it into
|
||||
@ -84,17 +86,20 @@ Create a Version 7 style password file and install it into
|
||||
Store databases into specified destination directory instead of
|
||||
.Pa /etc .
|
||||
.It Fl u Ar username
|
||||
Only update the record for the specified user. Utilities that
|
||||
Only update the record for the specified user.
|
||||
Utilities that
|
||||
operate on a single user can use this option to avoid the
|
||||
overhead of rebuilding the entire database.
|
||||
.It Fl s Ar cachesize
|
||||
Specify in megabytes the size of the memory cache used by the
|
||||
hashing library. On systems with a large user base, a small cache
|
||||
hashing library.
|
||||
On systems with a large user base, a small cache
|
||||
size can lead to prohibitively long database file rebuild times.
|
||||
As a rough guide, the memory usage of
|
||||
.Nm
|
||||
in megabytes will be a little bit more than twice the figure
|
||||
specified here. The default is 2 megabytes.
|
||||
specified here.
|
||||
The default is 2 megabytes.
|
||||
.El
|
||||
.Pp
|
||||
The two databases differ in that the secure version contains the user's
|
||||
|
@ -66,7 +66,8 @@ By default, all sizes are reported in 512-byte block counts.
|
||||
.It Fl n
|
||||
Given a list of inodes (plus some optional data on each line)
|
||||
in the standard input, for each file print out the owner (plus
|
||||
the remainder of the input line). This is traditionally used
|
||||
the remainder of the input line).
|
||||
This is traditionally used
|
||||
in the pipe:
|
||||
.Bd -literal -offset indent
|
||||
.\" ncheck filesystem | sort +0n | quot -n filesystem
|
||||
|
@ -45,7 +45,8 @@ The
|
||||
.Nm
|
||||
utility is used by the remote dump and restore programs
|
||||
in manipulating a magnetic tape drive through an interprocess
|
||||
communication connection. It is normally started up with an
|
||||
communication connection.
|
||||
It is normally started up with an
|
||||
.Xr rexec 3
|
||||
or
|
||||
.Xr rcmd 3
|
||||
@ -55,7 +56,8 @@ The
|
||||
.Nm
|
||||
utility accepts requests specific to the manipulation of
|
||||
magnetic tapes, performs the commands, then responds with
|
||||
a status indication. All responses are in
|
||||
a status indication.
|
||||
All responses are in
|
||||
.Tn ASCII
|
||||
and in
|
||||
one of two forms.
|
||||
@ -118,7 +120,8 @@ closed before a new open is performed.
|
||||
.It Xo Sy C Ar device No \en
|
||||
.Xc
|
||||
.Sm on
|
||||
Close the currently open device. The
|
||||
Close the currently open device.
|
||||
The
|
||||
.Ar device
|
||||
specified is ignored.
|
||||
.Sm off
|
||||
@ -167,7 +170,8 @@ and responds with
|
||||
.Sm on
|
||||
if the read was
|
||||
successful; otherwise an error in the
|
||||
standard format is returned. If the read
|
||||
standard format is returned.
|
||||
If the read
|
||||
was successful, the data read is then sent.
|
||||
.Sm off
|
||||
.It Xo Sy I Ar operation
|
||||
@ -187,7 +191,8 @@ and
|
||||
.Ar mt_count
|
||||
fields of the structure used in the
|
||||
.Xr ioctl 2
|
||||
call. The return value is the
|
||||
call.
|
||||
The return value is the
|
||||
.Ar count
|
||||
parameter when the operation is successful.
|
||||
.It Sy S
|
||||
@ -195,7 +200,8 @@ Return the status of the open device, as
|
||||
obtained with a
|
||||
.Dv MTIOCGET
|
||||
.Xr ioctl 2
|
||||
call. If the operation was successful,
|
||||
call.
|
||||
If the operation was successful,
|
||||
an ``ack'' is sent with the size of the
|
||||
status buffer, then the status buffer is
|
||||
sent (in binary).
|
||||
|
@ -49,13 +49,16 @@ utility
|
||||
is a daemon which co-operates with
|
||||
.Nm
|
||||
daemons on other hosts to provide
|
||||
a status monitoring service. The daemon accepts requests from
|
||||
a status monitoring service.
|
||||
The daemon accepts requests from
|
||||
programs running on the local host (typically,
|
||||
.Xr rpc.lockd 8 ,
|
||||
the NFS file locking daemon) to monitor the status of specified
|
||||
hosts. If a monitored host crashes and restarts, the remote daemon will
|
||||
hosts.
|
||||
If a monitored host crashes and restarts, the remote daemon will
|
||||
notify the local daemon, which in turn will notify the local program(s)
|
||||
which requested the monitoring service. Conversely, if this host crashes
|
||||
which requested the monitoring service.
|
||||
Conversely, if this host crashes
|
||||
and re-starts, when the
|
||||
.Nm
|
||||
re-starts, it will notify all of the hosts which were being monitored
|
||||
@ -65,8 +68,10 @@ The following option is available:
|
||||
.Bl -tag -width indent
|
||||
.It Fl d
|
||||
Cause debugging information to be written to syslog, recording
|
||||
all RPC transactions to the daemon. These messages are logged with level
|
||||
LOG_DEBUG and facility LOG_DAEMON. Error conditions are logged irrespective
|
||||
all RPC transactions to the daemon.
|
||||
These messages are logged with level
|
||||
LOG_DEBUG and facility LOG_DAEMON.
|
||||
Error conditions are logged irrespective
|
||||
of this option, using level LOG_ERR.
|
||||
.El
|
||||
.Pp
|
||||
@ -91,8 +96,9 @@ RPC protocol specification used by local applications to register monitoring req
|
||||
.Xr rpc.lockd 8
|
||||
.Sh BUGS
|
||||
There is no means for the daemon to tell when a monitored host has
|
||||
disappeared permanently (eg. catastrophic hardware failure), as opposed
|
||||
to transient failure of the host or an intermediate router. At present,
|
||||
disappeared permanently (e.g.\& catastrophic hardware failure), as opposed
|
||||
to transient failure of the host or an intermediate router.
|
||||
At present,
|
||||
it will re-try notification attempts at frequent intervals for 10 minutes,
|
||||
then hourly, and finally gives up after 24 hours.
|
||||
.Pp
|
||||
@ -102,7 +108,8 @@ This is convenient for the NFS locking protocol, but probably reduces the
|
||||
usefulness of the monitoring system for other applications.
|
||||
.Pp
|
||||
The current implementation uses more than 1Kbyte per monitored host in
|
||||
the status file (and also in VM). This may be inefficient for NFS servers
|
||||
the status file (and also in VM).
|
||||
This may be inefficient for NFS servers
|
||||
with large numbers of clients.
|
||||
.Sh STANDARDS
|
||||
The implementation is based on the specification in X/Open CAE Specification
|
||||
|
@ -125,7 +125,8 @@ The super-user can modify
|
||||
any field in any user's master.passwd entry in any domain, and can
|
||||
do so without knowing the user's existing NIS password (when the server
|
||||
receives a request from the super-user, the password authentication
|
||||
check is bypassed). Furthermore, if the server is invoked with the
|
||||
check is bypassed).
|
||||
Furthermore, if the server is invoked with the
|
||||
.Fl a
|
||||
flag, the super-user can even add new entries to the maps using
|
||||
.Xr ypchpass 1 .
|
||||
|
@ -222,12 +222,12 @@ for the assigned interface.
|
||||
If
|
||||
.Cm on
|
||||
is specified, the prefix have on-link nature
|
||||
(e.g. the prefix
|
||||
(e.g.\& the prefix
|
||||
belong to the link).
|
||||
If
|
||||
.Cm off
|
||||
is specified, the prefix have off-link nature
|
||||
(e.g. the
|
||||
(e.g.\& the
|
||||
prefix does not belong to the link).
|
||||
.It Cm raf_auto Cm on|off
|
||||
Enable or disable the autonomous address auto configuration
|
||||
|
@ -105,7 +105,8 @@ will be modified, else if
|
||||
is specified, that program is run with its arguments.
|
||||
.Pp
|
||||
.Ar Priority
|
||||
is an integer between 0 and RTP_PRIO_MAX (usually 31). 0 is the
|
||||
is an integer between 0 and RTP_PRIO_MAX (usually 31).
|
||||
0 is the
|
||||
highest priority
|
||||
.Pp
|
||||
.Ar Pid
|
||||
|
@ -255,7 +255,8 @@ and reinserted, the corresponding interface index is changed.
|
||||
However,
|
||||
.Nm
|
||||
assumes such changes will not occur, and always uses the index that
|
||||
it got at invocation. As a result,
|
||||
it got at invocation.
|
||||
As a result,
|
||||
.Nm
|
||||
may not work if you reinsert a network card.
|
||||
In such a case,
|
||||
|
@ -51,7 +51,8 @@ utility is the server which maintains the database used by the
|
||||
.Xr rwho 1
|
||||
and
|
||||
.Xr ruptime 1
|
||||
programs. Its operation is predicated on the ability to
|
||||
programs.
|
||||
Its operation is predicated on the ability to
|
||||
.Em broadcast
|
||||
or
|
||||
.Em multicast
|
||||
@ -82,7 +83,8 @@ to ignore the source port on incoming packets.
|
||||
.It Fl p
|
||||
Ignore all
|
||||
.Dv POINTOPOINT
|
||||
interfaces. This is useful if you do not wish to keep dial on demand
|
||||
interfaces.
|
||||
This is useful if you do not wish to keep dial on demand
|
||||
interfaces permanently active.
|
||||
.It Fl l
|
||||
Enable listen mode, which causes
|
||||
@ -97,7 +99,8 @@ Cause
|
||||
to use IP multicast (instead of
|
||||
broadcast) on all interfaces that have
|
||||
the IFF_MULTICAST flag set in their "ifnet" structs
|
||||
(excluding the loopback interface). The multicast
|
||||
(excluding the loopback interface).
|
||||
The multicast
|
||||
reports are sent with a time-to-live of 1, to prevent
|
||||
forwarding beyond the directly-connected subnet(s).
|
||||
.Pp
|
||||
@ -114,7 +117,8 @@ via a SINGLE interface rather
|
||||
than all interfaces.
|
||||
.Ar ttl
|
||||
must be between 0 and
|
||||
32 (or MAX_MULTICAST_SCOPE). Note that
|
||||
32 (or MAX_MULTICAST_SCOPE).
|
||||
Note that
|
||||
.Fl m Ar 1
|
||||
is different from
|
||||
.Fl m ,
|
||||
@ -128,14 +132,17 @@ is used without a
|
||||
.Ar ttl
|
||||
argument, the program accepts multicast
|
||||
.Nm
|
||||
reports from all multicast-capable interfaces. If a
|
||||
reports from all multicast-capable interfaces.
|
||||
If a
|
||||
.Ar ttl
|
||||
argument is given, it accepts multicast reports from only one interface, the
|
||||
one on which reports are sent (which may be controlled via the host's routing
|
||||
table). Regardless of the
|
||||
table).
|
||||
Regardless of the
|
||||
.Fl m
|
||||
option, the program accepts broadcast or
|
||||
unicast reports from all interfaces. Thus, this program will hear the
|
||||
unicast reports from all interfaces.
|
||||
Thus, this program will hear the
|
||||
reports of old, non-multicasting
|
||||
.Nm Ns s ,
|
||||
but, if multicasting is used,
|
||||
@ -172,16 +179,19 @@ struct whod {
|
||||
.Ed
|
||||
.Pp
|
||||
All fields are converted to network byte order prior to
|
||||
transmission. The load averages are as calculated by the
|
||||
transmission.
|
||||
The load averages are as calculated by the
|
||||
.Xr w 1
|
||||
program, and represent load averages over the 5, 10, and 15 minute
|
||||
intervals prior to a server's transmission; they are multiplied by 100
|
||||
for representation in an integer. The host name
|
||||
for representation in an integer.
|
||||
The host name
|
||||
included is that returned by the
|
||||
.Xr gethostname 3
|
||||
system call, with any trailing domain name omitted.
|
||||
The array at the end of the message contains information about
|
||||
the users logged in to the sending machine. This information
|
||||
the users logged in to the sending machine.
|
||||
This information
|
||||
includes the contents of the
|
||||
.Xr utmp 5
|
||||
entry for each non-idle terminal line and a value indicating the
|
||||
@ -193,11 +203,13 @@ server are discarded unless they originated at an
|
||||
.Nm rwho
|
||||
server's port or the
|
||||
.Fl i
|
||||
option was specified. In addition, if the host's name, as specified
|
||||
option was specified.
|
||||
In addition, if the host's name, as specified
|
||||
in the message, contains any unprintable
|
||||
.Tn ASCII
|
||||
characters, the
|
||||
message is discarded. Valid messages received by
|
||||
message is discarded.
|
||||
Valid messages received by
|
||||
.Nm
|
||||
are placed in files named
|
||||
.Pa whod.hostname
|
||||
|
@ -69,7 +69,8 @@ If file names are supplied, they are read instead of
|
||||
.Pa /var/account/acct .
|
||||
After each file is read, if the summary
|
||||
files are being updated, an updated summary will
|
||||
be saved to disk. Only one report is printed,
|
||||
be saved to disk.
|
||||
Only one report is printed,
|
||||
after the last file is processed.
|
||||
.Pp
|
||||
The labels used in the output indicate the following, except
|
||||
@ -102,7 +103,8 @@ are:
|
||||
.Bl -tag -width Ds
|
||||
.It Fl a
|
||||
List all command names, including those containing unprintable
|
||||
characters and those used only once. By default,
|
||||
characters and those used only once.
|
||||
By default,
|
||||
.Nm
|
||||
places all names containing unprintable characters and
|
||||
those used only once under the name ``***other''.
|
||||
@ -114,7 +116,8 @@ In addition to the number of calls and the user, system and real times
|
||||
for each command, print their percentage of the total over all commands.
|
||||
.It Fl d
|
||||
If printing command statistics, sort by the average number of disk
|
||||
I/O operations. If printing user statistics, print the average number of
|
||||
I/O operations.
|
||||
If printing user statistics, print the average number of
|
||||
disk I/O operations per user.
|
||||
.It Fl D
|
||||
If printing command statistics, sort and print by the total number
|
||||
@ -129,7 +132,8 @@ Do not read in the summary files.
|
||||
Instead of the total minutes per category, give seconds per call.
|
||||
.It Fl k
|
||||
If printing command statistics, sort by the cpu-time average memory
|
||||
usage. If printing user statistics, print the cpu-time average
|
||||
usage.
|
||||
If printing user statistics, print the cpu-time average
|
||||
memory usage.
|
||||
.It Fl K
|
||||
If printing command statistics, print and sort by the cpu-storage integral.
|
||||
@ -160,20 +164,25 @@ command name.
|
||||
For each command used
|
||||
.Ar cutoff
|
||||
times or fewer, print the command name and await a reply
|
||||
from the terminal. If the reply begins with ``y'', add
|
||||
the command to the category ``**junk**''. This flag is
|
||||
from the terminal.
|
||||
If the reply begins with ``y'', add
|
||||
the command to the category ``**junk**''.
|
||||
This flag is
|
||||
used to strip garbage from the report.
|
||||
.El
|
||||
.Pp
|
||||
By default, per-command statistics will be printed. The number of
|
||||
By default, per-command statistics will be printed.
|
||||
The number of
|
||||
calls, the total elapsed time in minutes, total cpu and user time
|
||||
in minutes, average number of I/O operations, and CPU-time
|
||||
averaged core usage will be printed. If the
|
||||
averaged core usage will be printed.
|
||||
If the
|
||||
.Fl m
|
||||
option is specified, per-user statistics will be printed, including
|
||||
the user name, the number of commands invoked, total cpu time used
|
||||
(in minutes), total number of I/O operations, and CPU storage integral
|
||||
for each user. If the
|
||||
for each user.
|
||||
If the
|
||||
.Fl u
|
||||
option is specified, the uid, user and system time (in seconds),
|
||||
CPU storage integral, I/O usage, and command name will be printed
|
||||
@ -183,7 +192,8 @@ If the
|
||||
.Fl u
|
||||
flag is specified, all flags other than
|
||||
.Fl q
|
||||
are ignored. If the
|
||||
are ignored.
|
||||
If the
|
||||
.Fl m
|
||||
flag is specified, only the
|
||||
.Fl b ,
|
||||
@ -221,7 +231,8 @@ The VM system does not record the CPU storage integral.
|
||||
While the behavior of the options in this version of
|
||||
.Nm
|
||||
was modeled after the original version, there are some intentional
|
||||
differences and undoubtedly some unintentional ones as well. In
|
||||
differences and undoubtedly some unintentional ones as well.
|
||||
In
|
||||
particular, the
|
||||
.Fl q
|
||||
option has been added, and the
|
||||
|
@ -72,12 +72,14 @@ of the
|
||||
library) and install distributions or packages onto new and
|
||||
existing
|
||||
.Fx
|
||||
systems. It also contains some extra intelligence
|
||||
systems.
|
||||
It also contains some extra intelligence
|
||||
for running as a replacement for
|
||||
.Xr init 8
|
||||
when it's invoked by the
|
||||
.Fx
|
||||
installation boot procedure. It
|
||||
installation boot procedure.
|
||||
It
|
||||
assumes very little in the way of additional utility support and
|
||||
performs most file system operations by calling the relevant syscalls
|
||||
(such as
|
||||
@ -101,7 +103,8 @@ eventually be replaced.
|
||||
The
|
||||
.Nm
|
||||
utility may be either driven interactively through its various internal menus
|
||||
or run in batch mode, driven by an external script. Such a script may
|
||||
or run in batch mode, driven by an external script.
|
||||
Such a script may
|
||||
be loaded and executed in one of 3 ways:
|
||||
.Bl -tag -width Ds
|
||||
.It Sy "LOAD_CONFIG_FILE"
|
||||
@ -127,8 +130,9 @@ it then will attempt to load from a DOS or UFS formatted floppy.
|
||||
Each command line argument is treated as a script directive
|
||||
when
|
||||
.Nm
|
||||
is run in multi-user mode. Execution ends either by explicit request
|
||||
(e.g. calling the
|
||||
is run in multi-user mode.
|
||||
Execution ends either by explicit request
|
||||
(e.g.\& calling the
|
||||
.Ar shutdown
|
||||
directive), upon reaching the end of the argument list or on error.
|
||||
.Pp
|
||||
@ -157,14 +161,15 @@ Where
|
||||
.Ar var=value
|
||||
is the assignment of some internal
|
||||
.Nm
|
||||
variable, e.g. "ftpPass=FuNkYChiKn", and
|
||||
variable, e.g.\& "ftpPass=FuNkYChiKn", and
|
||||
.Ar function
|
||||
is the name of an internal
|
||||
.Nm
|
||||
function, e.g. "mediaSetFTP", and
|
||||
function, e.g.\& "mediaSetFTP", and
|
||||
.Ar #comment
|
||||
is a single-line comment for documentation purposes (ignored by
|
||||
sysinstall). Each directive must be by itself on a single line,
|
||||
sysinstall).
|
||||
Each directive must be by itself on a single line,
|
||||
functions taking their arguments by examining known variable names.
|
||||
This requires that you be sure to assign the relevant variables before
|
||||
calling a function which requires them.
|
||||
@ -253,7 +258,8 @@ Invokes the disk partition (MBR) editor.
|
||||
.Sy Variables :
|
||||
.Bl -tag -width findx
|
||||
.It geometry
|
||||
The disk geometry, as a cyls/heads/sectors formatted string. Default: no
|
||||
The disk geometry, as a cyls/heads/sectors formatted string.
|
||||
Default: no
|
||||
change to geometry.
|
||||
.It partition
|
||||
Set to disk partitioning type or size, its value being
|
||||
@ -305,13 +311,15 @@ function) to be written out.
|
||||
.Sy Variables :
|
||||
None
|
||||
.It diskLabelEditor
|
||||
Invokes the disk label editor. This is a bit trickier from a script
|
||||
Invokes the disk label editor.
|
||||
This is a bit trickier from a script
|
||||
since you need to essentially label everything inside each
|
||||
.Fx
|
||||
(type 0xA5) partition created by the
|
||||
.Ar diskPartitionEditor
|
||||
function, and that requires knowing a few rules about how things are
|
||||
laid out. When creating a script to automatically allocate disk space
|
||||
laid out.
|
||||
When creating a script to automatically allocate disk space
|
||||
and partition it up, it is suggested that you first perform the
|
||||
installation interactively at least once and take careful notes as to
|
||||
what the slice names will be, then and only then hardwiring them into
|
||||
@ -327,7 +335,8 @@ for the whole
|
||||
partition
|
||||
.Ar ( da0s1
|
||||
being your DOS primary
|
||||
partition). Now let's further assume that you have 500MB in this
|
||||
partition).
|
||||
Now let's further assume that you have 500MB in this
|
||||
partition and you want to sub-partition that space into root, swap,
|
||||
var and usr file systems for
|
||||
.Fx .
|
||||
@ -350,16 +359,19 @@ the mount point, if non-zero, means to set the soft updates flag).
|
||||
One can also use the
|
||||
.Ar diskLabelEditor
|
||||
for mounting or erasing existing partitions as well as creating new
|
||||
ones. Using the previous example again, let's say that we also wanted
|
||||
ones.
|
||||
Using the previous example again, let's say that we also wanted
|
||||
to mount our DOS partition and make sure that an
|
||||
.Pa /etc/fstab
|
||||
entry is created for it in the new installation. Before calling the
|
||||
entry is created for it in the new installation.
|
||||
Before calling the
|
||||
.Ar diskLabelEditor
|
||||
function, we simply add an additional line:
|
||||
.Pp
|
||||
.Dl "da0s1=/dos_c N"
|
||||
.Pp
|
||||
before the call. This tells the label editor that you want to mount
|
||||
before the call.
|
||||
This tells the label editor that you want to mount
|
||||
the first slice on
|
||||
.Pa /dos_c
|
||||
and not to attempt to newfs it (not that
|
||||
@ -392,13 +404,14 @@ Resets all selected distributions to the empty set (no distributions selected).
|
||||
.Sy Variables :
|
||||
None
|
||||
.It distSetCustom
|
||||
Allows the selection of a custom distribution set (e.g. not just one of the
|
||||
Allows the selection of a custom distribution set (e.g.\& not just one of the
|
||||
existing "canned" sets) with no user interaction.
|
||||
.Pp
|
||||
.Sy Variables :
|
||||
.Bl -tag -width indent
|
||||
.It dists
|
||||
List of distributions to load. Possible distribution values are:
|
||||
List of distributions to load.
|
||||
Possible distribution values are:
|
||||
.Bl -tag -width indentxx
|
||||
.It Li base
|
||||
The base binary distribution.
|
||||
@ -655,10 +668,12 @@ Defaults to latest links package.
|
||||
.It browserBinary
|
||||
The name of the browser binary itself (if overriding the
|
||||
.Ar browserPackage
|
||||
variable). Defaults to links.
|
||||
variable).
|
||||
Defaults to links.
|
||||
.El
|
||||
.It installCommit
|
||||
Commit any and all pending changes to disk. This function
|
||||
Commit any and all pending changes to disk.
|
||||
This function
|
||||
is essentially shorthand for a number of more granular "commit"
|
||||
functions.
|
||||
.Pp
|
||||
@ -683,7 +698,8 @@ Start an upgrade installation.
|
||||
None
|
||||
.It installFixitHoloShell
|
||||
Start up the "emergency holographic shell" over on VTY4
|
||||
if running as init. This will also happen automatically
|
||||
if running as init.
|
||||
This will also happen automatically
|
||||
as part of the installation process unless
|
||||
.Ar noHoloShell
|
||||
is set.
|
||||
@ -741,7 +757,7 @@ Select a pre-made floppy installation set as the installation media.
|
||||
None
|
||||
.It mediaSetDOS
|
||||
Select an existing DOS primary partition as the installation media.
|
||||
The first primary partition found is used (e.g. C:).
|
||||
The first primary partition found is used (e.g.\& C:).
|
||||
.Pp
|
||||
.Sy Variables :
|
||||
None
|
||||
@ -766,7 +782,8 @@ Which host interface to use
|
||||
.Ar ( ed0
|
||||
or
|
||||
.Ar ep0 ,
|
||||
for example. Non-optional).
|
||||
for example.
|
||||
Non-optional).
|
||||
.It netInteractive
|
||||
If set, bring up the interactive network setup form even
|
||||
if all relevant configuration variables are already set (optional).
|
||||
@ -836,7 +853,8 @@ Which host interface to use
|
||||
.Ar ( ed0
|
||||
or
|
||||
.Ar ep0 ,
|
||||
for example. Non-optional).
|
||||
for example.
|
||||
Non-optional).
|
||||
.It netInteractive
|
||||
If set, bring up the interactive network setup form even
|
||||
if all relevant configuration variables are already set (optional).
|
||||
@ -887,7 +905,7 @@ that a media type be set),
|
||||
.Sy Variables :
|
||||
.Bl -tag -width indent
|
||||
.It package
|
||||
The name of the package to add, e.g. bash-1.14.7 or ncftp-2.4.2.
|
||||
The name of the package to add, e.g.\& bash-1.14.7 or ncftp-2.4.2.
|
||||
.El
|
||||
.It addGroup
|
||||
Invoke the interactive group editor.
|
||||
@ -911,7 +929,8 @@ Execute an arbitrary command with
|
||||
.Sy Variables :
|
||||
.Bl -tag -width indent
|
||||
.It command
|
||||
The name of the command to execute. When running
|
||||
The name of the command to execute.
|
||||
When running
|
||||
from a boot floppy, very minimal expectations should
|
||||
be made as to what's available until/unless a relatively
|
||||
full system installation has just been done.
|
||||
|
@ -114,7 +114,8 @@ This software was contributed to the
|
||||
.Fx
|
||||
Project by Network Associates Labs,
|
||||
the Security Research Division of Network Associates
|
||||
Inc. under DARPA/SPAWAR contract N66001-01-C-8035
|
||||
Inc.
|
||||
under DARPA/SPAWAR contract N66001-01-C-8035
|
||||
.Pq Dq CBOSS ,
|
||||
as part of the DARPA CHATS research program.
|
||||
.Sh SEE ALSO
|
||||
|
@ -59,6 +59,7 @@ This software was contributed to the
|
||||
.Fx
|
||||
Project by Network Associates Labs,
|
||||
the Security Research Division of Network Associates
|
||||
Inc. under DARPA/SPAWAR contract N66001-01-C-8035
|
||||
Inc.
|
||||
under DARPA/SPAWAR contract N66001-01-C-8035
|
||||
.Pq Dq CBOSS ,
|
||||
as part of the DARPA CHATS research program.
|
||||
|
@ -38,8 +38,10 @@ The maximum number of host adapter interrupts per second is determined by:
|
||||
.Pp
|
||||
.Ar "controller CPU clock / (8 * int_throttle)"
|
||||
.Pp
|
||||
The default value at boot time is 25000. The host adapter cpu clock is
|
||||
25MHz. This gives a maximum interrupt rate of about 125 interrupts per
|
||||
The default value at boot time is 25000.
|
||||
The host adapter cpu clock is
|
||||
25MHz.
|
||||
This gives a maximum interrupt rate of about 125 interrupts per
|
||||
second.
|
||||
.Pp
|
||||
Lowering this value will increase the rate in which the host adapter can
|
||||
@ -106,4 +108,5 @@ Specialix International do not support this device driver in any way.
|
||||
.Sh AUTHORS
|
||||
.An Peter Wemm Aq peter@FreeBSD.org
|
||||
.Sh BUGS
|
||||
Bound to be many... :-)
|
||||
Bound to be many...
|
||||
:-)
|
||||
|
@ -48,7 +48,8 @@ utility is used to turn the terminal line on standard input (or
|
||||
.Ar device )
|
||||
into a Serial Line IP
|
||||
.Pq Tn SLIP
|
||||
link to a remote host. To do this, the program
|
||||
link to a remote host.
|
||||
To do this, the program
|
||||
searches the file
|
||||
.Pa /etc/sliphome/slip.hosts
|
||||
for an entry matching
|
||||
@ -89,7 +90,8 @@ will be executed instead if it exists.
|
||||
The script is invoked with the parameters
|
||||
.Bl -tag -width slipunit
|
||||
.It Em slipunit
|
||||
The unit number of the slip interface assigned to this line. E.g.,
|
||||
The unit number of the slip interface assigned to this line.
|
||||
E.g.,
|
||||
.Sy 0
|
||||
for
|
||||
.Sy sl0 .
|
||||
@ -102,17 +104,21 @@ entry, in order starting with
|
||||
.Ar loginname .
|
||||
.El
|
||||
.Pp
|
||||
Only the super-user may attach a network interface. The interface is
|
||||
Only the super-user may attach a network interface.
|
||||
The interface is
|
||||
automatically detached when the other end hangs up or the
|
||||
.Nm
|
||||
process dies. If the kernel slip
|
||||
process dies.
|
||||
If the kernel slip
|
||||
module has been configured for it, all routes through that interface will
|
||||
also disappear at the same time. If there is other processing a site
|
||||
also disappear at the same time.
|
||||
If there is other processing a site
|
||||
would like done on hangup, the file
|
||||
.Pa /etc/sliphome/slip.logout
|
||||
or
|
||||
.Pa /etc/sliphome/slip.logout. Ns Ar loginname
|
||||
is executed if it exists. It is given the same arguments as the login script.
|
||||
is executed if it exists.
|
||||
It is given the same arguments as the login script.
|
||||
.Ss Format of /etc/sliphome/slip.hosts
|
||||
Comments (lines starting with a `#') and blank lines (or started
|
||||
with space) are ignored.
|
||||
@ -138,7 +144,8 @@ and
|
||||
are the IP host names or addresses of the local and remote ends of the
|
||||
slip line and
|
||||
.Em netmask
|
||||
is the appropriate IP netmask. These arguments are passed
|
||||
is the appropriate IP netmask.
|
||||
These arguments are passed
|
||||
directly to
|
||||
.Xr ifconfig 8 .
|
||||
.Em Opt-args
|
||||
@ -190,7 +197,8 @@ is to create a
|
||||
.Pa /etc/passwd
|
||||
entry for each legal, remote slip site with
|
||||
.Nm
|
||||
as the shell for that entry. E.g.,
|
||||
as the shell for that entry.
|
||||
E.g.,
|
||||
.Bd -literal
|
||||
Sfoo:ikhuy6:2010:1:slip line to foo:/tmp:/usr/sbin/sliplogin
|
||||
.Ed
|
||||
@ -219,7 +227,8 @@ Note that
|
||||
.Nm
|
||||
must be setuid to root and, while not a security hole, moral defectives
|
||||
can use it to place terminal lines in an unusable state and/or deny
|
||||
access to legitimate users of a remote slip line. To prevent this,
|
||||
access to legitimate users of a remote slip line.
|
||||
To prevent this,
|
||||
.Nm
|
||||
is installed as user
|
||||
.Em root ,
|
||||
|
@ -72,12 +72,14 @@ of the
|
||||
library) and install distributions or packages onto new and
|
||||
existing
|
||||
.Fx
|
||||
systems. It also contains some extra intelligence
|
||||
systems.
|
||||
It also contains some extra intelligence
|
||||
for running as a replacement for
|
||||
.Xr init 8
|
||||
when it's invoked by the
|
||||
.Fx
|
||||
installation boot procedure. It
|
||||
installation boot procedure.
|
||||
It
|
||||
assumes very little in the way of additional utility support and
|
||||
performs most file system operations by calling the relevant syscalls
|
||||
(such as
|
||||
@ -101,7 +103,8 @@ eventually be replaced.
|
||||
The
|
||||
.Nm
|
||||
utility may be either driven interactively through its various internal menus
|
||||
or run in batch mode, driven by an external script. Such a script may
|
||||
or run in batch mode, driven by an external script.
|
||||
Such a script may
|
||||
be loaded and executed in one of 3 ways:
|
||||
.Bl -tag -width Ds
|
||||
.It Sy "LOAD_CONFIG_FILE"
|
||||
@ -127,8 +130,9 @@ it then will attempt to load from a DOS or UFS formatted floppy.
|
||||
Each command line argument is treated as a script directive
|
||||
when
|
||||
.Nm
|
||||
is run in multi-user mode. Execution ends either by explicit request
|
||||
(e.g. calling the
|
||||
is run in multi-user mode.
|
||||
Execution ends either by explicit request
|
||||
(e.g.\& calling the
|
||||
.Ar shutdown
|
||||
directive), upon reaching the end of the argument list or on error.
|
||||
.Pp
|
||||
@ -157,14 +161,15 @@ Where
|
||||
.Ar var=value
|
||||
is the assignment of some internal
|
||||
.Nm
|
||||
variable, e.g. "ftpPass=FuNkYChiKn", and
|
||||
variable, e.g.\& "ftpPass=FuNkYChiKn", and
|
||||
.Ar function
|
||||
is the name of an internal
|
||||
.Nm
|
||||
function, e.g. "mediaSetFTP", and
|
||||
function, e.g.\& "mediaSetFTP", and
|
||||
.Ar #comment
|
||||
is a single-line comment for documentation purposes (ignored by
|
||||
sysinstall). Each directive must be by itself on a single line,
|
||||
sysinstall).
|
||||
Each directive must be by itself on a single line,
|
||||
functions taking their arguments by examining known variable names.
|
||||
This requires that you be sure to assign the relevant variables before
|
||||
calling a function which requires them.
|
||||
@ -253,7 +258,8 @@ Invokes the disk partition (MBR) editor.
|
||||
.Sy Variables :
|
||||
.Bl -tag -width findx
|
||||
.It geometry
|
||||
The disk geometry, as a cyls/heads/sectors formatted string. Default: no
|
||||
The disk geometry, as a cyls/heads/sectors formatted string.
|
||||
Default: no
|
||||
change to geometry.
|
||||
.It partition
|
||||
Set to disk partitioning type or size, its value being
|
||||
@ -305,13 +311,15 @@ function) to be written out.
|
||||
.Sy Variables :
|
||||
None
|
||||
.It diskLabelEditor
|
||||
Invokes the disk label editor. This is a bit trickier from a script
|
||||
Invokes the disk label editor.
|
||||
This is a bit trickier from a script
|
||||
since you need to essentially label everything inside each
|
||||
.Fx
|
||||
(type 0xA5) partition created by the
|
||||
.Ar diskPartitionEditor
|
||||
function, and that requires knowing a few rules about how things are
|
||||
laid out. When creating a script to automatically allocate disk space
|
||||
laid out.
|
||||
When creating a script to automatically allocate disk space
|
||||
and partition it up, it is suggested that you first perform the
|
||||
installation interactively at least once and take careful notes as to
|
||||
what the slice names will be, then and only then hardwiring them into
|
||||
@ -327,7 +335,8 @@ for the whole
|
||||
partition
|
||||
.Ar ( da0s1
|
||||
being your DOS primary
|
||||
partition). Now let's further assume that you have 500MB in this
|
||||
partition).
|
||||
Now let's further assume that you have 500MB in this
|
||||
partition and you want to sub-partition that space into root, swap,
|
||||
var and usr file systems for
|
||||
.Fx .
|
||||
@ -350,16 +359,19 @@ the mount point, if non-zero, means to set the soft updates flag).
|
||||
One can also use the
|
||||
.Ar diskLabelEditor
|
||||
for mounting or erasing existing partitions as well as creating new
|
||||
ones. Using the previous example again, let's say that we also wanted
|
||||
ones.
|
||||
Using the previous example again, let's say that we also wanted
|
||||
to mount our DOS partition and make sure that an
|
||||
.Pa /etc/fstab
|
||||
entry is created for it in the new installation. Before calling the
|
||||
entry is created for it in the new installation.
|
||||
Before calling the
|
||||
.Ar diskLabelEditor
|
||||
function, we simply add an additional line:
|
||||
.Pp
|
||||
.Dl "da0s1=/dos_c N"
|
||||
.Pp
|
||||
before the call. This tells the label editor that you want to mount
|
||||
before the call.
|
||||
This tells the label editor that you want to mount
|
||||
the first slice on
|
||||
.Pa /dos_c
|
||||
and not to attempt to newfs it (not that
|
||||
@ -392,13 +404,14 @@ Resets all selected distributions to the empty set (no distributions selected).
|
||||
.Sy Variables :
|
||||
None
|
||||
.It distSetCustom
|
||||
Allows the selection of a custom distribution set (e.g. not just one of the
|
||||
Allows the selection of a custom distribution set (e.g.\& not just one of the
|
||||
existing "canned" sets) with no user interaction.
|
||||
.Pp
|
||||
.Sy Variables :
|
||||
.Bl -tag -width indent
|
||||
.It dists
|
||||
List of distributions to load. Possible distribution values are:
|
||||
List of distributions to load.
|
||||
Possible distribution values are:
|
||||
.Bl -tag -width indentxx
|
||||
.It Li base
|
||||
The base binary distribution.
|
||||
@ -655,10 +668,12 @@ Defaults to latest links package.
|
||||
.It browserBinary
|
||||
The name of the browser binary itself (if overriding the
|
||||
.Ar browserPackage
|
||||
variable). Defaults to links.
|
||||
variable).
|
||||
Defaults to links.
|
||||
.El
|
||||
.It installCommit
|
||||
Commit any and all pending changes to disk. This function
|
||||
Commit any and all pending changes to disk.
|
||||
This function
|
||||
is essentially shorthand for a number of more granular "commit"
|
||||
functions.
|
||||
.Pp
|
||||
@ -683,7 +698,8 @@ Start an upgrade installation.
|
||||
None
|
||||
.It installFixitHoloShell
|
||||
Start up the "emergency holographic shell" over on VTY4
|
||||
if running as init. This will also happen automatically
|
||||
if running as init.
|
||||
This will also happen automatically
|
||||
as part of the installation process unless
|
||||
.Ar noHoloShell
|
||||
is set.
|
||||
@ -741,7 +757,7 @@ Select a pre-made floppy installation set as the installation media.
|
||||
None
|
||||
.It mediaSetDOS
|
||||
Select an existing DOS primary partition as the installation media.
|
||||
The first primary partition found is used (e.g. C:).
|
||||
The first primary partition found is used (e.g.\& C:).
|
||||
.Pp
|
||||
.Sy Variables :
|
||||
None
|
||||
@ -766,7 +782,8 @@ Which host interface to use
|
||||
.Ar ( ed0
|
||||
or
|
||||
.Ar ep0 ,
|
||||
for example. Non-optional).
|
||||
for example.
|
||||
Non-optional).
|
||||
.It netInteractive
|
||||
If set, bring up the interactive network setup form even
|
||||
if all relevant configuration variables are already set (optional).
|
||||
@ -836,7 +853,8 @@ Which host interface to use
|
||||
.Ar ( ed0
|
||||
or
|
||||
.Ar ep0 ,
|
||||
for example. Non-optional).
|
||||
for example.
|
||||
Non-optional).
|
||||
.It netInteractive
|
||||
If set, bring up the interactive network setup form even
|
||||
if all relevant configuration variables are already set (optional).
|
||||
@ -887,7 +905,7 @@ that a media type be set),
|
||||
.Sy Variables :
|
||||
.Bl -tag -width indent
|
||||
.It package
|
||||
The name of the package to add, e.g. bash-1.14.7 or ncftp-2.4.2.
|
||||
The name of the package to add, e.g.\& bash-1.14.7 or ncftp-2.4.2.
|
||||
.El
|
||||
.It addGroup
|
||||
Invoke the interactive group editor.
|
||||
@ -911,7 +929,8 @@ Execute an arbitrary command with
|
||||
.Sy Variables :
|
||||
.Bl -tag -width indent
|
||||
.It command
|
||||
The name of the command to execute. When running
|
||||
The name of the command to execute.
|
||||
When running
|
||||
from a boot floppy, very minimal expectations should
|
||||
be made as to what's available until/unless a relatively
|
||||
full system installation has just been done.
|
||||
|
@ -70,13 +70,13 @@ Note that if you use spaces as separators, your
|
||||
.Nm
|
||||
might be incompatible with other Unices or Unix-like systems.
|
||||
This functionality was added for ease of configuration
|
||||
(e.g. it is possible to cut-and-paste into
|
||||
(e.g.\& it is possible to cut-and-paste into
|
||||
.Nm ) ,
|
||||
and to avoid possible mistakes.
|
||||
This change however preserves
|
||||
backwards compatibility with the old style of
|
||||
.Nm
|
||||
(i.e. tab characters only).
|
||||
(i.e., tab characters only).
|
||||
.Pp
|
||||
The
|
||||
.Em selectors
|
||||
@ -352,10 +352,12 @@ Selected messages are written to all logged-in users.
|
||||
A vertical bar
|
||||
.Pq Dq \&| ,
|
||||
followed by a command to pipe the selected
|
||||
messages to. The command is passed to
|
||||
messages to.
|
||||
The command is passed to
|
||||
.Xr sh 1
|
||||
for evaluation, so usual shell metacharacters or input/output
|
||||
redirection can occur. (Note however that redirecting
|
||||
redirection can occur.
|
||||
(Note however that redirecting
|
||||
.Xr stdio 3
|
||||
buffered output from the invoked command can cause additional delays,
|
||||
or even lost output data in case a logging subprocess exited with a
|
||||
@ -368,23 +370,28 @@ redirected to
|
||||
Upon receipt of a
|
||||
.Dv SIGHUP ,
|
||||
.Xr syslogd 8
|
||||
will close the pipe to the process. If the process didn't exit
|
||||
will close the pipe to the process.
|
||||
If the process didn't exit
|
||||
voluntarily, it will be sent a
|
||||
.Dv SIGTERM
|
||||
signal after a grace period of up to 60 seconds.
|
||||
.Pp
|
||||
The command will only be started once data arrives that should be piped
|
||||
to it. If it exited later, it will be restarted as necessary. So if it
|
||||
to it.
|
||||
If it exited later, it will be restarted as necessary.
|
||||
So if it
|
||||
is desired that the subprocess should get exactly one line of input only
|
||||
(which can be very resource-consuming if there are a lot of messages
|
||||
flowing quickly), this can be achieved by exiting after just one line of
|
||||
input. If necessary, a script wrapper can be written to this effect.
|
||||
input.
|
||||
If necessary, a script wrapper can be written to this effect.
|
||||
.Pp
|
||||
Unless the command is a full pipeline, it's probably useful to
|
||||
start the command with
|
||||
.Em exec
|
||||
so that the invoking shell process does not wait for the command to
|
||||
complete. Warning: the process is started under the UID invoking
|
||||
complete.
|
||||
Warning: the process is started under the UID invoking
|
||||
.Xr syslogd 8 ,
|
||||
normally the superuser.
|
||||
.El
|
||||
@ -477,9 +484,11 @@ or higher, not at the level of
|
||||
or higher.
|
||||
.Pp
|
||||
In networked environments, note that not all operating systems
|
||||
implement the same set of facilities. The facilities
|
||||
implement the same set of facilities.
|
||||
The facilities
|
||||
authpriv, cron, ftp, and ntp that are known to this implementation
|
||||
might be absent on the target system. Even worse, DEC UNIX uses
|
||||
might be absent on the target system.
|
||||
Even worse, DEC UNIX uses
|
||||
facility number 10 (which is authpriv in this implementation) to
|
||||
log events for their AdvFS file system.
|
||||
.Sh SEE ALSO
|
||||
|
@ -77,7 +77,8 @@ Allow
|
||||
.Ar allowed_peer
|
||||
to log to this
|
||||
.Nm
|
||||
using UDP datagrams. Multiple
|
||||
using UDP datagrams.
|
||||
Multiple
|
||||
.Fl a
|
||||
options may be specified.
|
||||
.Pp
|
||||
@ -105,11 +106,13 @@ If specified,
|
||||
.Ar service
|
||||
is the name or number of an UDP service (see
|
||||
.Xr services 5 )
|
||||
the source packet must belong to. A
|
||||
the source packet must belong to.
|
||||
A
|
||||
.Ar service
|
||||
of
|
||||
.Ql \&*
|
||||
allows packets being sent from any UDP port. The default
|
||||
allows packets being sent from any UDP port.
|
||||
The default
|
||||
.Ar service
|
||||
is
|
||||
.Ql syslog .
|
||||
@ -120,7 +123,8 @@ is IPv4 address, a missing
|
||||
will be substituted by the historic class A or class B netmasks if
|
||||
.Ar ipaddr
|
||||
belongs into the address range of class A or B, respectively, or
|
||||
by 24 otherwise. If
|
||||
by 24 otherwise.
|
||||
If
|
||||
.Ar ipaddr
|
||||
is IPv6 address, a missing
|
||||
.Ar masklen
|
||||
@ -132,7 +136,8 @@ will be substituted by 128.
|
||||
.Xc
|
||||
Accept datagrams where the reverse address lookup yields
|
||||
.Ar domainname
|
||||
for the sender address. The meaning of
|
||||
for the sender address.
|
||||
The meaning of
|
||||
.Ar service
|
||||
is as explained above.
|
||||
.It Xo
|
||||
@ -165,7 +170,8 @@ If specified twice, disable this compression in all cases.
|
||||
.It Fl d
|
||||
Put
|
||||
.Nm
|
||||
into debugging mode. This is probably only of use to developers working on
|
||||
into debugging mode.
|
||||
This is probably only of use to developers working on
|
||||
.Nm .
|
||||
.It Fl f
|
||||
Specify the pathname of an alternate configuration file;
|
||||
@ -209,19 +215,24 @@ The primary use for this is to place additional log sockets in
|
||||
.Pa /var/run/log
|
||||
of various chroot filespaces.
|
||||
.It Fl s
|
||||
Operate in secure mode. Do not log messages from remote machines. If
|
||||
Operate in secure mode.
|
||||
Do not log messages from remote machines.
|
||||
If
|
||||
specified twice, no network socket will be opened at all, which also
|
||||
disables logging to remote machines.
|
||||
.It Fl u
|
||||
Unique priority logging. Only log messages at the specified priority.
|
||||
Unique priority logging.
|
||||
Only log messages at the specified priority.
|
||||
Without this option, messages at the stated priority or higher are logged.
|
||||
This option changes the default comparison from
|
||||
.Dq =>
|
||||
to
|
||||
.Dq = .
|
||||
.It Fl v
|
||||
Verbose logging. If specified once, the numeric facility and priority are
|
||||
logged with each locally-written message. If specified more than once,
|
||||
Verbose logging.
|
||||
If specified once, the numeric facility and priority are
|
||||
logged with each locally-written message.
|
||||
If specified more than once,
|
||||
the names of the facility and priority are logged with each locally-written
|
||||
message.
|
||||
.El
|
||||
@ -307,9 +318,11 @@ extensions.
|
||||
.Sh BUGS
|
||||
The ability to log messages received in UDP packets is equivalent to
|
||||
an unauthenticated remote disk-filling service, and should probably be
|
||||
disabled by default. Some sort of
|
||||
disabled by default.
|
||||
Some sort of
|
||||
.No inter- Ns Nm syslogd
|
||||
authentication mechanism ought to be worked out. To prevent the worst
|
||||
authentication mechanism ought to be worked out.
|
||||
To prevent the worst
|
||||
abuse, use of the
|
||||
.Fl a
|
||||
option is therefore highly recommended.
|
||||
@ -317,7 +330,8 @@ option is therefore highly recommended.
|
||||
The
|
||||
.Fl a
|
||||
matching algorithm doesn't pretend to be very efficient; use of numeric
|
||||
IP addresses is faster than domain name comparison. Since the allowed
|
||||
IP addresses is faster than domain name comparison.
|
||||
Since the allowed
|
||||
peer list is being walked linearly, peer groups where frequent messages
|
||||
are being anticipated from should be put early into the
|
||||
.Fl a
|
||||
|
@ -46,8 +46,10 @@ The basic operation of
|
||||
is to copy to
|
||||
.Pa stdout
|
||||
all packets from its input file(s) whose timestamps fall
|
||||
within a given range. The starting and ending times of the range
|
||||
may be specified on the command line. All ranges are inclusive.
|
||||
within a given range.
|
||||
The starting and ending times of the range
|
||||
may be specified on the command line.
|
||||
All ranges are inclusive.
|
||||
The starting time defaults
|
||||
to the time of the first packet in the first input file; we call
|
||||
this the
|
||||
@ -63,7 +65,8 @@ to
|
||||
(assuming the file does not include more than
|
||||
ten years' worth of data).
|
||||
.Pp
|
||||
There are a number of ways to specify times. The first is using
|
||||
There are a number of ways to specify times.
|
||||
The first is using
|
||||
Unix timestamps of the form
|
||||
.Em sssssssss.uuuuuu
|
||||
(this is the format specified by
|
||||
@ -73,7 +76,7 @@ flag).
|
||||
For example,
|
||||
.Em 654321098.7654
|
||||
specifies 38 seconds and 765,400 microseconds
|
||||
after 8:51PM PDT, Sept. 25, 1990.
|
||||
after 8:51PM PDT, Sept.\& 25, 1990.
|
||||
.Pp
|
||||
All examples in this manual are given
|
||||
for PDT times, but when displaying times and interpreting times symbolically
|
||||
@ -81,8 +84,10 @@ as discussed below,
|
||||
.Nm
|
||||
uses the local timezone, regardless of the timezone in which the
|
||||
.Xr tcpdump 1
|
||||
file was generated. The daylight-savings setting used is that which is
|
||||
appropriate for the local timezone at the date in question. For example,
|
||||
file was generated.
|
||||
The daylight-savings setting used is that which is
|
||||
appropriate for the local timezone at the date in question.
|
||||
For example,
|
||||
times associated with summer months will usually include daylight-savings
|
||||
effects, and those with winter months will not.
|
||||
.Pp
|
||||
@ -104,13 +109,15 @@ through 500 seconds after the
|
||||
.Em first time .
|
||||
.Pp
|
||||
Times may also be specified in terms of years (y), months (m), days (d),
|
||||
hours (h), minutes (m), seconds (s), and microseconds(u). For example,
|
||||
hours (h), minutes (m), seconds (s), and microseconds(u).
|
||||
For example,
|
||||
the Unix timestamp 654321098.7654 discussed above could also be expressed
|
||||
as
|
||||
.Em 90y9m25d20h51m38s765400u .
|
||||
.Pp
|
||||
When specifying times using this style, fields that are omitted default
|
||||
as follows. If the omitted field is a unit
|
||||
as follows.
|
||||
If the omitted field is a unit
|
||||
.Em greater
|
||||
than that of the first specified field, then its value defaults to
|
||||
the corresponding value taken from either
|
||||
@ -123,7 +130,8 @@ than that of the first specified field, then it defaults to zero.
|
||||
For example, suppose that the input file has a
|
||||
.Em first time
|
||||
of the Unix timestamp mentioned above, i.e., 38 seconds and 765,400 microseconds
|
||||
after 8:51PM PDT, Sept. 25, 1990. To specify 9:36PM PDT (exactly) on the
|
||||
after 8:51PM PDT, Sept.\& 25, 1990.
|
||||
To specify 9:36PM PDT (exactly) on the
|
||||
same date we could use
|
||||
.Em 21h36m .
|
||||
To specify a range from 9:36PM PDT through 1:54AM PDT the next day we
|
||||
@ -132,21 +140,24 @@ could use
|
||||
.Pp
|
||||
Relative times can also be specified when using the
|
||||
.Em ymdhmsu
|
||||
format. Omitted fields then default to 0 if the unit of the field is
|
||||
format.
|
||||
Omitted fields then default to 0 if the unit of the field is
|
||||
.Em greater
|
||||
than that of the first specified field, and to the corresponding value
|
||||
taken from either the
|
||||
.Em first time
|
||||
or the starting time if the omitted field's unit is
|
||||
.Em less
|
||||
than that of the first specified field. Given a
|
||||
than that of the first specified field.
|
||||
Given a
|
||||
.Em first time
|
||||
of the Unix timestamp mentioned above,
|
||||
.Em 22h +1h10m
|
||||
specifies a range from 10:00PM PDT on that date through 11:10PM PDT, and
|
||||
.Em +1h +1h10m
|
||||
specifies a range from 38.7654 seconds after 9:51PM PDT through 38.7654
|
||||
seconds after 11:01PM PDT. The first hour of the file could be extracted
|
||||
seconds after 11:01PM PDT.
|
||||
The first hour of the file could be extracted
|
||||
using
|
||||
.Em +0 +1h .
|
||||
.Pp
|
||||
@ -154,7 +165,8 @@ Note that with the
|
||||
.Em ymdhmsu
|
||||
format there is an ambiguity between using
|
||||
.Em m
|
||||
for `month' or for `minute'. The ambiguity is resolved as follows: if an
|
||||
for `month' or for `minute'.
|
||||
The ambiguity is resolved as follows: if an
|
||||
.Em m
|
||||
field is followed by a
|
||||
.Em d
|
||||
@ -166,11 +178,14 @@ If more than one input file is specified then
|
||||
first copies packets lying in the given range from the first file; it
|
||||
then increases the starting time of the range to lie just beyond the
|
||||
timestamp of the last packet in the first file, repeats the process
|
||||
with the second file, and so on. Thus files with interleaved packets
|
||||
with the second file, and so on.
|
||||
Thus files with interleaved packets
|
||||
are
|
||||
.Em not
|
||||
merged. For a given file, only packets that are newer than any in the
|
||||
preceding files will be considered. This mechanism avoids any possibility
|
||||
merged.
|
||||
For a given file, only packets that are newer than any in the
|
||||
preceding files will be considered.
|
||||
This mechanism avoids any possibility
|
||||
of a packet occurring more than once in the output.
|
||||
.Sh OPTIONS
|
||||
If any of
|
||||
@ -181,14 +196,17 @@ or
|
||||
are specified then
|
||||
.Nm
|
||||
reports the timestamps of the first and last packets in each input file
|
||||
and exits. Only one of these three options may be specified.
|
||||
and exits.
|
||||
Only one of these three options may be specified.
|
||||
.Pp
|
||||
The following options are available:
|
||||
.Bl -tag -width indent
|
||||
.It Fl d
|
||||
Dump the start and end times specified by the given range and
|
||||
exit. This option is useful for checking that the given range actually
|
||||
specifies the times you think it does. If one of
|
||||
exit.
|
||||
This option is useful for checking that the given range actually
|
||||
specifies the times you think it does.
|
||||
If one of
|
||||
.Fl R ,
|
||||
.Fl r
|
||||
or
|
||||
@ -228,7 +246,8 @@ rather than
|
||||
of Lawrence Berkeley Laboratory, University of California, Berkeley, CA.
|
||||
.Sh BUGS
|
||||
An input filename that beings with a digit or a `+' can be confused
|
||||
with a start/end time. Such filenames can be specified with a
|
||||
with a start/end time.
|
||||
Such filenames can be specified with a
|
||||
leading `./'; for example, specify the file `04Jul76.trace' as
|
||||
`./04Jul76.trace'.
|
||||
.Pp
|
||||
@ -260,7 +279,8 @@ files spanning more than one year;
|
||||
with files containing portions of packets whose original length was
|
||||
more than 65,535 bytes; nor with files containing fewer than three packets.
|
||||
Such files result in
|
||||
the error message: `couldn't find final packet in file'. These problems
|
||||
the error message: `couldn't find final packet in file'.
|
||||
These problems
|
||||
are due to the interpolation scheme used by
|
||||
.Nm
|
||||
to greatly speed up its processing when dealing with large trace files.
|
||||
|
@ -67,7 +67,8 @@ will prompt for commands from the standard input.
|
||||
If arguments are supplied,
|
||||
.Nm
|
||||
interprets the first argument as a command and the remaining
|
||||
arguments as parameters to the command. The standard input
|
||||
arguments as parameters to the command.
|
||||
The standard input
|
||||
may be redirected causing
|
||||
.Nm
|
||||
to read commands from a file.
|
||||
|
@ -38,7 +38,8 @@ The
|
||||
.Nm
|
||||
utility reads a database of timezone information and presents a menu
|
||||
allowing the user to select a specific zone without knowing the details
|
||||
of the database layout. The selected zone is installed as the system
|
||||
of the database layout.
|
||||
The selected zone is installed as the system
|
||||
default zone.
|
||||
The
|
||||
.Nm
|
||||
@ -78,7 +79,8 @@ beginning of the
|
||||
epoch (January 1, 1970,
|
||||
.Tn GMT ) .
|
||||
.It
|
||||
Each zone is named for the most populous city therein. (Where possible,
|
||||
Each zone is named for the most populous city therein.
|
||||
(Where possible,
|
||||
the database includes pre-1970 history for its city.)
|
||||
.El
|
||||
The source code to the database
|
||||
|
@ -126,7 +126,7 @@ Rule number.
|
||||
Entries with a lower rule number
|
||||
are applied first;
|
||||
placing the most frequently-matched rules at the beginning of the list
|
||||
(i.e. lower-numbered)
|
||||
(i.e., lower-numbered)
|
||||
will yield a slight performance increase.
|
||||
.It Xo
|
||||
.Cm subject
|
||||
@ -205,6 +205,6 @@ utility first appeared in
|
||||
This software was contributed to the
|
||||
.Fx
|
||||
Project by NAI Labs, the Security Research Division of Network Associates
|
||||
Inc. under DARPA/SPAWAR contract N66001-01-C-8035
|
||||
Inc.\& under DARPA/SPAWAR contract N66001-01-C-8035
|
||||
.Pq Dq CBOSS ,
|
||||
as part of the DARPA CHATS research program.
|
||||
|
@ -57,7 +57,7 @@ It does two things.
|
||||
Through opening the
|
||||
.Pa /dev/usb0 ,
|
||||
.Pa /dev/usb1 ,
|
||||
etc. devices, it enables the kernel to handle change requests from
|
||||
etc.\& devices, it enables the kernel to handle change requests from
|
||||
attached hubs.
|
||||
This functionality will be removed when the kernel has
|
||||
kernel threads.
|
||||
@ -114,7 +114,8 @@ Do not handle the event queue on /dev/usb.
|
||||
.It Fl t Ar timeout
|
||||
Set the timeout interval (in seconds) before an exploration happens
|
||||
without being triggered by a connect or disconnect.
|
||||
A timeout of 0 means that there is no timeout. The default is 30.
|
||||
A timeout of 0 means that there is no timeout.
|
||||
The default is 30.
|
||||
.It Fl v
|
||||
Be verbose.
|
||||
Repeating the flag makes
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user