New policy: New sentences start on a new line.

Patches by Robert Elz <kre at munnari oz au>, with minimal changes by me.
This commit is contained in:
wiz 2002-09-25 15:18:36 +00:00
parent 9e31b44846
commit 14dfaa4b03
23 changed files with 737 additions and 548 deletions

View File

@ -1,4 +1,4 @@
.\" $NetBSD: cat.1,v 1.27 2002/07/03 01:27:23 enami Exp $
.\" $NetBSD: cat.1,v 1.28 2002/09/25 15:18:36 wiz Exp $
.\"
.\" Copyright (c) 1989, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -85,7 +85,8 @@ This lock is set using
.Xr fcntl 2
with the
.Dv F_SETLKW
command. If the output file is already locked,
command.
If the output file is already locked,
.Nm
will block until the lock is acquired.
.It Fl n

View File

@ -1,4 +1,4 @@
.\" $NetBSD: chio.1,v 1.13 2002/02/08 01:21:55 ross Exp $
.\" $NetBSD: chio.1,v 1.14 2002/09/25 15:18:37 wiz Exp $
.\"
.\" Copyright (c) 1996, 1998, 1999 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -79,11 +79,13 @@ There are four element types:
.Pa portal
(import/export), and
.Pa drive
(data transfer). In this command description, the shorthand
(data transfer).
In this command description, the shorthand
.Ic ET
will be used to represent an element type, and
.Ic EU
will be used to represent an element unit. For example, to represent
will be used to represent an element unit.
For example, to represent
the first robotic arm in the changer, the ET would be
.Dq picker
and the EU would be
@ -109,7 +111,8 @@ is specified, the media unit will be inverted before insertion.
.Op Ar inv1
.Op Ar inv2
.Pp
Performs a media unit exchange operation. The media unit in
Performs a media unit exchange operation.
The media unit in
.Pa \*[Lt]src ET/EU\*[Gt]
is moved to
.Pa \*[Lt]dst1 ET/EU\*[Gt]
@ -173,7 +176,8 @@ Configure the changer to use picker
.Oo Ar \*[Lt]type\*[Gt] Oo unit Oo count Oc Oc Oc
.Op Ar voltags
.Pp
Report the status of all elements in the changer. If
Report the status of all elements in the changer.
If
.Pa \*[Lt]type\*[Gt]
is specified, report the status of all elements of type
.Pa \*[Lt]type\*[Gt] .
@ -217,8 +221,9 @@ operation on the changer.
.Ar \*[Lt]slot\*[Gt]
.Pp
This command is provided for controlling CD-ROM changer mechanisms which
cannot use the standard changer control interface. ATAPI CD-ROM changers
fall into this category. There are 3 sub-commands:
cannot use the standard changer control interface.
ATAPI CD-ROM changers fall into this category.
There are 3 sub-commands:
.Bl -tag -width indent
.It Nm load
Loads the media from the specified slot into the CD-ROM drive.
@ -252,6 +257,7 @@ Returns status of all elements in the second changer.
The
.Nm
program and SCSI changer driver were originally written by Jason R. Thorpe
for And Communications, http://www.and.com/. Additional development was
for And Communications, http://www.and.com/.
Additional development was
done by Jason R. Thorpe for the Numerical Aerospace Simulation Facility,
NASA Ames Research Center.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: csh.1,v 1.34 2002/02/08 01:21:56 ross Exp $
.\" $NetBSD: csh.1,v 1.35 2002/09/25 15:18:37 wiz Exp $
.\"
.\" Copyright (c) 1980, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -56,7 +56,8 @@ job control facilities (see
interactive file name
and user name completion (see
.Sx File Name Completion ) ,
and a C-like syntax. It is used both as an interactive
and a C-like syntax.
It is used both as an interactive
login shell and a shell script command processor.
.Ss Argument list processing
If the first argument (argument 0) to the shell is
@ -100,7 +101,8 @@ is the only flag specified).
.It Fl m
Read
.Pa \&.cshrc
even if not owned by the user. This flag is normally given only by
even if not owned by the user.
This flag is normally given only by
.Xr su 1 .
.It Fl n
Commands are parsed, but not executed.
@ -199,7 +201,8 @@ following exceptions.
The characters
`\*[Am]' `\&|' `;' `\*[Lt]' `\*[Gt]' `(' `)'
form separate words.
If doubled in `\*[Am]\*[Am]', `\&|\&|', `\*[Lt]\*[Lt]' or `\*[Gt]\*[Gt]' these pairs form single words.
If doubled in `\*[Am]\*[Am]',
`\&|\&|', `\*[Lt]\*[Lt]' or `\*[Gt]\*[Gt]' these pairs form single words.
These parser metacharacters may be made part of other words, or prevented their
special meaning, by preceding them with `\e'.
A newline preceded by a `\e' is equivalent to a blank.
@ -231,20 +234,22 @@ waiting for it to terminate by following it with an `\*[Am]'.
.Pp
Any of the above may be placed in `(' `)' to form a simple command (that
may be a component of a pipeline, etc.).
It is also possible to separate pipelines with `\&|\&|' or `\*[Am]\*[Am]' showing,
as in the C language,
It is also possible to separate pipelines with `\&|\&|'
or `\*[Am]\*[Am]' showing, as in the C language,
that the second is to be executed only if the first fails or succeeds
respectively. (See
.Em Expressions . )
respectively.
(See
.Sx Expressions . )
.Ss Jobs
The shell associates a
.Ar job
with each pipeline. It keeps
with each pipeline.
It keeps
a table of current jobs, printed by the
.Ar jobs
command, and assigns them small integer numbers. When
a job is started asynchronously with `\*[Am]', the shell prints a line that looks
like:
command, and assigns them small integer numbers.
When a job is started asynchronously with `\*[Am]',
the shell prints a line that looks like:
.Bd -filled -offset indent
.Op 1
1234
@ -257,8 +262,8 @@ If you are running a job and wish to do something else you may hit the key
.Ic ^Z
(control-Z) which sends a STOP signal to the current job.
The shell will then normally show that the job has been `Stopped',
and print another prompt. You can then manipulate the state of this job,
putting it in the
and print another prompt.
You can then manipulate the state of this job, putting it in the
.Em background
with the
.Ar bg
@ -272,7 +277,8 @@ A
.Ic ^Z
takes effect immediately and
is like an interrupt in that pending output and unread input are discarded
when it is typed. There is another special key
when it is typed.
There is another special key
.Ic ^Y
that does not generate a STOP signal until a program attempts to
.Xr read 2
@ -281,15 +287,17 @@ This request can usefully be typed ahead when you have prepared some commands
for a job that you wish to stop after it has read them.
.Pp
A job being run in the background will stop if it tries to read
from the terminal. Background jobs are normally allowed to produce output,
from the terminal.
Background jobs are normally allowed to produce output,
but this can be disabled by giving the command ``stty tostop''.
If you set this
tty option, then background jobs will stop when they try to produce
output like they do when they try to read input.
.Pp
There are several ways to refer to jobs in the shell. The character
`%' introduces a job name. If you wish to refer to job number 1, you can
name it as `%1'. Just naming a job brings it to the foreground; thus
There are several ways to refer to jobs in the shell.
The character `%' introduces a job name.
If you wish to refer to job number 1, you can name it as `%1'.
Just naming a job brings it to the foreground; thus
`%1' is a synonym for `fg %1', bringing job number 1 back into the foreground.
Similarly saying `%1 \*[Am]' resumes job number 1 in the background.
Jobs can also be named by prefixes of the string typed in to start them,
@ -297,16 +305,18 @@ if these prefixes are unambiguous, thus `%ex' would normally restart
a suspended
.Xr ex 1
job, if there were only one suspended job whose name began with
the string `ex'. It is also possible to say `%?string'
the string `ex'.
It is also possible to say `%?string'
which specifies a job whose text contains
.Ar string ,
if there is only one such job.
.Pp
The shell maintains a notion of the current and previous jobs.
In output about jobs, the current job is marked with a `+'
and the previous job with a `\-'. The abbreviation `%+' refers
to the current job and `%\-' refers to the previous job. For close
analogy with the syntax of the
and the previous job with a `\-'.
The abbreviation `%+' refers
to the current job and `%\-' refers to the previous job.
For close analogy with the syntax of the
.Ar history
mechanism (described below),
`%%' is also a synonym for the current job.
@ -315,19 +325,22 @@ The job control mechanism requires that the
.Xr stty 1
option
.Ic new
be set. It is an artifact from a
be set.
It is an artifact from a
.Em new
implementation
of the
tty driver that allows generation of interrupt characters from
the keyboard to tell jobs to stop. See
the keyboard to tell jobs to stop.
See
.Xr stty 1
for details on setting options in the new tty driver.
.Ss Status reporting
This shell learns immediately whenever a process changes state.
It normally informs you whenever a job becomes blocked so that
no further progress is possible, but only just before it prints
a prompt. This is done so that it does not otherwise disturb your work.
a prompt.
This is done so that it does not otherwise disturb your work.
If, however, you set the shell variable
.Ar notify ,
the shell will notify you immediately of changes of status in background
@ -335,15 +348,18 @@ jobs.
There is also a shell command
.Ar notify
that marks a single process so that its status changes will be immediately
reported. By default
reported.
By default
.Ar notify
marks the current process;
simply say `notify' after starting a background job to mark it.
.Pp
When you try to leave the shell while jobs are stopped, you will
be warned that `You have stopped jobs.' You may use the
be warned that `You have stopped jobs.'
You may use the
.Ar jobs
command to see what they are. If you do this or immediately try to
command to see what they are.
If you do this or immediately try to
exit again, the shell will not warn you a second time, and the suspended
jobs will be terminated.
.Ss File Name Completion
@ -391,7 +407,8 @@ incomplete, since there are two file names matching the prefix ``D''.
If a partial file name is followed by the end-of-file character
(usually control-D), then, instead of completing the name,
.Nm
will list all file names matching the prefix. For example,
will list all file names matching the prefix.
For example,
the input
.Pp
.Dl % vi D\*[Lt]control-D\*[Gt]
@ -404,8 +421,8 @@ while the input line remains unchanged.
.Pp
The same system of escape and end-of-file can also be used to
expand partial user names, if the word to be completed
(or listed) begins with the character ``~''. For example,
typing
(or listed) begins with the character ``~''.
For example, typing
.Pp
.Dl cd ~ro\*[Lt]escape\*[Gt]
.Pp
@ -418,11 +435,13 @@ can be inhibited by setting the variable
.Ar nobeep .
.Pp
Normally, all files in the particular directory are candidates
for name completion. Files with certain suffixes can be excluded
for name completion.
Files with certain suffixes can be excluded
from consideration by setting the variable
.Ar fignore
to the
list of suffixes to be ignored. Thus, if
list of suffixes to be ignored.
Thus, if
.Ar fignore
is set by
the command
@ -439,9 +458,11 @@ would result in the completion to
.Pp
ignoring the files "xmpl.o" and "xmpl.out".
However, if the only completion possible requires not ignoring these
suffixes, then they are not ignored. In addition,
suffixes, then they are not ignored.
In addition,
.Ar fignore
does not affect the listing of file names by control-D. All files
does not affect the listing of file names by control-D.
All files
are listed regardless of their suffixes.
.Ss Substitutions
We now describe the various transformations the shell performs on the
@ -497,8 +518,7 @@ as in `!d' for event 12 or `!wri' for event 9, or by a string contained in
a word in the command as in `!?mic?' also referring to event 9.
These forms, without further change, simply reintroduce the words
of the specified events, each separated by a single blank.
As a special case, `!!' refers to the previous command; thus `!!'
alone is a
As a special case, `!!' refers to the previous command; thus `!!' alone is a
.Ar redo .
.Pp
To select words from an event we can follow the event specification by
@ -565,7 +585,8 @@ Repeat the previous substitution.
Apply the change once on each word, prefixing the above, e.g., `g\*[Am]'.
.It a
Apply the change as many times as possible on a single word, prefixing
the above. It can be used together with `g' to apply a substitution
the above.
It can be used together with `g' to apply a substitution
globally.
.It p
Print the new command line but do not execute it.
@ -576,8 +597,8 @@ Like q, but break into words at blanks, tabs and newlines.
.El
.Pp
Unless preceded by a `g' the change is applied only to the first
modifiable word. With substitutions, it is an error for no word to be
applicable.
modifiable word.
With substitutions, it is an error for no word to be applicable.
.Pp
The left hand side of substitutions are not regular expressions in the sense
of the editors, but instead strings.
@ -612,8 +633,8 @@ from the command matching `?foo?'.
.Pp
A special abbreviation of a history reference occurs when the first
non-blank character of an input line is a `\*(ua'.
This is equivalent to `!:s\*(ua' providing a convenient shorthand for substitutions
on the text of the previous line.
This is equivalent to `!:s\*(ua' providing a convenient
shorthand for substitutions on the text of the previous line.
Thus `\*(ualb\*(ualib' fixes the spelling of
`lib'
in the previous command.
@ -740,7 +761,8 @@ Braces insulate
.Ar name
from following characters that would otherwise be part of it.
Shell variables have names consisting of up to 20 letters and digits
starting with a letter. The underscore character is considered a letter.
starting with a letter.
The underscore character is considered a letter.
If
.Ar name
is not a shell variable, but is set in the environment, then
@ -944,7 +966,8 @@ Note that the default standard input for a command run detached is
modified to be the empty file
.Pa /dev/null ;
instead the standard input
remains as the original standard input of the shell. If this is a terminal
remains as the original standard input of the shell.
If this is a terminal
and if the process attempts to read from the terminal, then the process
will block and the user will be notified (see
.Sx Jobs
@ -973,7 +996,8 @@ The following operators are available:
.Ed
.Pp
Here the precedence increases to the right,
`==' `!=' `=~' and `!~', `\*[Le]' `\*[Ge]' `\*[Lt]' and `\*[Gt]', `\*[Lt]\*[Lt]' and `\*[Gt]\*[Gt]', `+' and `\-',
`==' `!=' `=~' and `!~', `\*[Le]' `\*[Ge]' `\*[Lt]'
and `\*[Gt]', `\*[Lt]\*[Lt]' and `\*[Gt]\*[Gt]', `+' and `\-',
`*' `/' and `%' being, in groups, at the same level.
The `==' `!=' `=~' and `!~' operators compare their arguments as strings;
all others operate on numbers.
@ -981,8 +1005,8 @@ The operators `=~' and `!~' are like `!=' and `==' except that the right
hand side is a
.Ar pattern
(containing, e.g., `*'s, `?'s and instances of `[...]')
against which the left hand operand is matched. This reduces the
need for use of the
against which the left hand operand is matched.
This reduces the need for use of the
.Ar switch
statement in shell scripts when all that is really needed is pattern matching.
.Pp
@ -992,7 +1016,8 @@ The result of all expressions are strings,
which represent decimal numbers.
It is important to note that no two components of an expression can appear
in the same word; except when adjacent to components of expressions that
are syntactically significant to the parser (`\*[Am]' `\&|' `\*[Lt]' `\*[Gt]' `(' `)'),
are syntactically significant to the parser
(`\*[Am]' `\&|' `\*[Lt]' `\*[Gt]' `(' `)'),
they should be surrounded by spaces.
.Pp
Also available in expressions as primitive operands are command executions
@ -1078,7 +1103,8 @@ or
Shows the amount of dynamic memory acquired, broken down into used and
free memory.
With an argument shows the number of free and used blocks in each size
category. The categories start at size 8 and double at each step.
category.
The categories start at size 8 and double at each step.
This command's output may vary across system types, since
systems other than the VAX may use a different memory allocator.
.Pp
@ -1173,7 +1199,8 @@ The arguments are read as input to the shell and the resulting
command(s) executed in the context of the current shell.
This is usually used to execute commands
generated as the result of command or variable substitution, since
parsing occurs before these substitutions. See
parsing occurs before these substitutions.
See
.Xr tset 1
for an example of using
.Ic eval .
@ -1375,8 +1402,9 @@ all limitations are given.
If the
.Fl h
flag is given, the hard limits are used instead of the current
limits. The hard limits impose a ceiling on the values of
the current limits. Only the super-user may raise the hard limits,
limits.
The hard limits impose a ceiling on the values of the current limits.
Only the super-user may raise the hard limits,
but a user may lower or raise the current limits within the legal range.
.Pp
Resources controllable currently include
@ -1398,7 +1426,8 @@ size of the automatically-extended stack region), and
The
.Ar maximum-use
may be given as a (floating point or integer)
number followed by a scale factor. For all limits other than
number followed by a scale factor.
For all limits other than
.Ar cputime
the default scale is `k' or `kilobytes' (1024 bytes);
a scale factor of `m' or `megabytes' may also be used.
@ -1470,7 +1499,8 @@ All processes detached with `\*[Am]' are effectively
.It Ic notify % Ns Ar job ...
Causes the shell to notify the user asynchronously when the status of the
current or specified jobs change; normally notification is presented
before a prompt. This is automatic if the shell variable
before a prompt.
This is automatic if the shell variable
.Ic notify
is set.
.Pp
@ -1527,17 +1557,19 @@ With a numeric argument,
rotates the
.Ar n Ns \'th
argument of the directory
stack around to be the top element and changes to it. The members
stack around to be the top element and changes to it.
The members
of the directory stack are numbered from the top starting at 0.
.Pp
.It Ic rehash
Causes the internal hash table of the contents of the directories in
the
.Ic path
variable to be recomputed. This is needed if new commands are added
to directories in the
variable to be recomputed.
This is needed if new commands are added to directories in the
.Ic path
while you are logged in. This should only be necessary if you add
while you are logged in.
This should only be necessary if you add
commands to one of your own directories, or if a systems programmer
changes the contents of a system directory.
.Pp
@ -1600,7 +1632,8 @@ The last form sets the value of environment variable
.Ar name
to be
.Ar value ,
a single string. The second form sets
a single string.
The second form sets
.Ar name
to an empty string.
The most commonly used environment variables
@ -1694,13 +1727,16 @@ If arguments are given
the specified simple command is timed and a time summary
as described under the
.Ic time
variable is printed. If necessary, an extra shell is created to print the time
variable is printed.
If necessary, an extra shell is created to print the time
statistic when the command completes.
.Pp
.It Ic umask
.It Ic umask Ar value
The file creation mask is displayed (first form) or set to the specified
value (second form). The mask is given in octal. Common values for
value (second form).
The mask is given in octal.
Common values for
the mask are 002 giving all access to the group and read and execute
access to others or 022 giving all access except write access for
users in the group or others.
@ -1725,9 +1761,11 @@ If no
.Ar resource
is specified, then all
.Ar resource
limitations are removed. If
limitations are removed.
If
.Fl h
is given, the corresponding hard limits are removed. Only the
is given, the corresponding hard limits are removed.
Only the
super-user may do this.
.Pp
.It Ic unset Ar pattern
@ -1739,7 +1777,8 @@ It is not an error for nothing to be
.Pp
.It Ic unsetenv Ar pattern
Removes all variables whose name match the specified pattern from the
environment. See also the
environment.
See also the
.Ic setenv
command above and
.Xr printenv 1 .
@ -1882,7 +1921,8 @@ since these substitutions are then done selectively.
Enable file name completion.
.It Ic histchars
Can be given a string value to change the characters used in history
substitution. The first character of its value is used as the
substitution.
The first character of its value is used as the
history substitution character, replacing the default character `!'.
The second character of its value replaces the character `^' in
quick substitutions.
@ -1965,7 +2005,8 @@ variable after reading
.Ar \&.cshrc ,
and each time the
.Ar path
variable is reset. If new commands are added to these directories
variable is reset.
If new commands are added to these directories
while the shell is active, it may be necessary to do a
.Ic rehash
or the commands may not be found.
@ -2003,10 +2044,10 @@ Builtin commands that fail return exit status `1',
all other builtin commands set status to `0'.
.It Ic time
Controls automatic timing of commands.
This setting allows two parameters. The first specifies the CPU time
threshold at which reporting should be done for a process, and the optional
second specifies the output format. The following format strings are
available:
This setting allows two parameters.
The first specifies the CPU time threshold at which reporting should be done
for a process, and the optional second specifies the output format.
The following format strings are available:
.Pp
.Bl -tag -width Ds -compact -offset indent
.It Li \&%c
@ -2189,8 +2230,7 @@ substitutions on a single line to 20.
.Nm
appeared in
.Bx 3 .
It
was a first implementation of a command language interpreter
It was a first implementation of a command language interpreter
incorporating a history mechanism (see
.Sx History Substitutions ) ,
job control facilities (see
@ -2217,16 +2257,17 @@ as the job may have changed directories internally.
.Pp
Shell builtin functions are not stoppable/restartable.
Command sequences of the form `a ; b ; c' are also not handled gracefully
when stopping is attempted. If you suspend `b', the shell will
immediately execute `c'. This is especially noticeable if this
expansion results from an
when stopping is attempted.
If you suspend `b', the shell will immediately execute `c'.
This is especially noticeable if this expansion results from an
.Ar alias .
It suffices to place the sequence of commands in ()'s to force it to
a subshell, i.e., `( a ; b ; c )'.
.Pp
Control over tty output after processes are started is primitive;
perhaps this will inspire someone to work on a good virtual
terminal interface. In a virtual terminal interface much more
terminal interface.
In a virtual terminal interface much more
interesting things could be done with output control.
.Pp
Alias substitution is most often used to clumsily simulate shell procedures;
@ -2236,7 +2277,8 @@ Commands within loops, prompted for by `?', are not placed on the
.Ic history
list.
Control structure should be parsed instead of being recognized as built-in
commands. This would allow control commands to be placed anywhere,
commands.
This would allow control commands to be placed anywhere,
to be combined with `\&|', and to be used with `\*[Am]' and `;' metasyntax.
.Pp
It should be possible to use the `:' modifiers on the output of command

View File

@ -1,4 +1,4 @@
.\" $NetBSD: date.1,v 1.30 2002/02/08 01:21:56 ross Exp $
.\" $NetBSD: date.1,v 1.31 2002/09/25 15:18:38 wiz Exp $
.\"
.\" Copyright (c) 1980, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -98,8 +98,8 @@ The format string may contain any of the conversion specifications described
in the
.Xr strftime 3
manual page, as well as any arbitrary text.
A \*[Lt]newline\*[Gt] character is always output after the characters specified by
the format string.
A \*[Lt]newline\*[Gt] character is always output after the characters
specified by the format string.
The format string for the default display is:
.Bd -literal -offset indent
%a %b %e %H:%M:%S %Z %Y
@ -113,7 +113,8 @@ The canonical representation for setting the date and time is:
.It Ar cc
The first two digits of the year (the century).
.It Ar yy
The second two digits of the year. If
The second two digits of the year.
If
.Ar yy
is specified, but
.Ar cc
@ -121,7 +122,8 @@ is not, a value for
.Ar yy
between 69 and 99 results in a
.Ar cc
value of 19. Otherwise, a
value of 19.
Otherwise, a
.Ar cc
value of 20 is used.
.It Ar mm

View File

@ -1,4 +1,4 @@
.\" $NetBSD: df.1,v 1.25 2002/02/08 01:21:56 ross Exp $
.\" $NetBSD: df.1,v 1.26 2002/09/25 15:18:38 wiz Exp $
.\"
.\" Copyright (c) 1989, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -71,7 +71,8 @@ on the filesystem is less than
The following options are available:
.Bl -tag -width Ds
.It Fl a
Show all filesystems. By default only filesystems mounted with the
Show all filesystems.
By default only filesystems mounted with the
.Dv MNT_IGNORE
flag clear are shown.
.It Fl i
@ -84,7 +85,8 @@ option causes the numbers to be reported in kilobyte (1024 bytes) counts.
.It Fl l
Display statistics only about mounted file systems with the
.Dv MNT_LOCAL
flag set. If a non-local file system is given as an argument, a
flag set.
If a non-local file system is given as an argument, a
warning is issued and no information is given on that file system.
.It Fl m
The
@ -136,7 +138,8 @@ The list of filesystem types can be prefixed with
.Dq no
to specify the filesystem types for which action should
.Em not
be taken. If a file system is given on the command line that is not of
be taken.
If a file system is given on the command line that is not of
the specified type, a warning is issued and no information is given on
that file system.
.El

View File

@ -1,4 +1,4 @@
.\" $NetBSD: domainname.1,v 1.12 2001/02/27 17:48:19 mason Exp $
.\" $NetBSD: domainname.1,v 1.13 2002/09/25 15:18:38 wiz Exp $
.\"
.\" Copyright (c) 1983, 1988, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -46,9 +46,9 @@
.Nm
prints the
.Tn YP
domain name of the current host. The super-user can
set the domain name by supplying an argument; this is usually done in the
network initialization script
domain name of the current host.
The super-user can set the domain name by supplying an argument;
this is usually done in the network initialization script
.Pa /etc/rc.d/network ,
normally run at boot
time.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ed.1,v 1.21 2002/02/08 01:21:57 ross Exp $
.\" $NetBSD: ed.1,v 1.22 2002/09/25 15:18:39 wiz Exp $
.\"
.TH ED 1 "21 May 1993"
.SH NAME
@ -61,16 +61,14 @@ When an input command, such as
.I `c'
(change), is given,
.B ed
enters input mode. This is the primary means
of adding text to a file.
enters input mode.
This is the primary means of adding text to a file.
In this mode, no commands are available;
instead, the standard input is written
directly to the editor buffer. Lines consist of text up to and
including a
instead, the standard input is written directly to the editor buffer.
Lines consist of text up to and including a
.IR newline
character.
Input mode is terminated by
entering a single period (\fI.\fR) on a line.
Input mode is terminated by entering a single period (\fI.\fR) on a line.
All
.B ed
@ -81,7 +79,8 @@ command deletes lines; the
.I `m'
command moves lines, and so on.
It is possible to modify only a portion of a line by means of replacement,
as in the example above. However even here, the
as in the example above.
However even here, the
.I `s'
command is applied to whole lines at a time.
@ -96,13 +95,15 @@ commands have the structure:
.RE
.sp
The address(es) indicate the line or range of lines to be affected by the
command. If fewer addresses are given than the command accepts, then
command.
If fewer addresses are given than the command accepts, then
default addresses are supplied.
.SS OPTIONS
.TP 8
-s
Suppresses diagnostics. This should be used if
Suppresses diagnostics.
This should be used if
.BR ed 's
standard input is from a script.
@ -115,7 +116,8 @@ command).
.TP 8
.RI \-p \ string
Specifies a command prompt. This may be toggled on and off with the
Specifies a command prompt.
This may be toggled on and off with the
.I `P'
command.
@ -126,10 +128,12 @@ regular expressions that are normally used.
.TP 8
.I file
Specifies the name of a file to read. If
Specifies the name of a file to read.
If
.I file
is prefixed with a
bang (!), then it is interpreted as a shell command. In this case,
bang (!), then it is interpreted as a shell command.
In this case,
what is read is
the standard output of
.I file
@ -149,13 +153,12 @@ maintains a
which is
typically supplied to commands as the default address when none is specified.
When a file is first read, the current address is set to the last line
of the file. In general, the current address is set to the last line
affected by a command.
of the file.
In general, the current address is set to the last line affected by a command.
A line address is
constructed from one of the bases in the list below, optionally followed
by a numeric offset. The offset may include any combination
of digits, operators (i.e.,
A line address is constructed from one of the bases in the list below,
optionally followed by a numeric offset.
The offset may include any combination of digits, operators (i.e.,
.IR + ,
.I -
and
@ -172,9 +175,12 @@ This means "before the first line,"
and is legal wherever it makes sense.
An address range is two addresses separated either by a comma or
semi-colon. The value of the first address in a range cannot exceed the
value of the second. If only one address is given in a range, then
the second address is set to the given address. If an
semi-colon.
The value of the first address in a range cannot exceed the
value of the second.
If only one address is given in a range, then
the second address is set to the given address.
If an
.IR n- tuple
of addresses is given where
.I n \*[Gt] 2,
@ -184,9 +190,9 @@ the
If only one address is expected, then the last address is used.
Each address in a comma-delimited range is interpreted relative to the
current address. In a semi-colon-delimited range, the first address is
used to set the current address, and the second address is interpreted
relative to the first.
current address.
In a semi-colon-delimited range, the first address is used to set the
current address, and the second address is interpreted relative to the first.
The following address symbols are recognized.
@ -247,15 +253,15 @@ is interpreted as
.TP 8
, \fRor\fB %
The first through last lines in the buffer. This is equivalent to
the address range
The first through last lines in the buffer.
This is equivalent to the address range
.I 1,$.
.TP 8
;
The
current through last lines in the buffer. This is equivalent to
the address range
current through last lines in the buffer.
This is equivalent to the address range
.I .,$.
.TP 8
@ -303,8 +309,8 @@ used by the
command for selecting old text to be replaced with new.
In addition to a specifying string literals, regular expressions can
represent
classes of strings. Strings thus represented are said to be matched
represent classes of strings.
Strings thus represented are said to be matched
by the corresponding regular expression.
If it is possible for a regular expression
to match several strings in a line, then the left-most longest match is
@ -323,8 +329,7 @@ matches itself.
\fR\e\fIc\fR
Any backslash-escaped character
.IR c ,
except for `{', '}', `(', `)', `\*[Lt]' and `\*[Gt]',
matches itself.
except for `{', '}', `(', `)', `\*[Lt]' and `\*[Gt]', matches itself.
.TP 8
\fR.\fR
@ -350,8 +355,7 @@ to specify sets of characters:
.PD 0
\ \ [:blank:]\ \ [:graph:]\ \ [:punct:]\ \ [:xdigit:]
.sp
If `-' appears as the first or last
character of
If `-' appears as the first or last character of
.IR char-class ,
then it matches itself.
All other characters in
@ -382,8 +386,7 @@ for an explanation of these constructs.
Matches any single character, other than newline, not in
.IR char-class .
.IR char-class
is defined
as above.
is defined as above.
.TP 8
^
@ -421,15 +424,15 @@ is a number in the range [1,9], expands to the text matched by the
subexpression.
For example, the regular expression `\e(.*\e)\e1' matches any string
consisting of identical adjacent substrings.
Subexpressions are ordered relative to
their left delimiter.
Subexpressions are ordered relative to their left delimiter.
.TP 8
*
Matches the single character regular expression or subexpression
immediately preceding it zero or more times. If '*' is the first
character of a regular expression or subexpression, then it matches
itself. The `*' operator sometimes yields unexpected results.
immediately preceding it zero or more times.
If '*' is the first
character of a regular expression or subexpression, then it matches itself.
The `*' operator sometimes yields unexpected results.
For example, the regular expression `b*' matches the beginning of
the string `abbb' (as opposed to the substring `bbb'), since a null match
is the only left-most match.
@ -462,8 +465,7 @@ All
.B ed
commands are single characters, though some require additonal parameters.
If a command's parameters extend over several lines, then
each line except for the last
must be terminated with a backslash (\\).
each line except for the last must be terminated with a backslash (\\).
In general, at most one command is allowed per line.
However, most commands accept a print suffix, which is any of
@ -480,7 +482,8 @@ An interrupt (typically ^C) has the effect of aborting the current command
and returning the editor to command mode.
.B ed
recognizes the following commands. The commands are shown together with
recognizes the following commands.
The commands are shown together with
the default address or address range supplied if none is
specified (in parenthesis).
@ -492,7 +495,8 @@ The current address is set to last line entered.
.TP 8
(.,.)c
Changes lines in the buffer. The addressed lines are deleted
Changes lines in the buffer.
The addressed lines are deleted
from the buffer, and text is appended in their place.
Text is entered in input mode.
The current address is set to last line entered.
@ -501,7 +505,8 @@ The current address is set to last line entered.
(.,.)d
Deletes the addressed lines from the buffer.
If there is a line after the deleted range, then the current address is set
to this line. Otherwise the current address is set to the line
to this line.
Otherwise the current address is set to the line
before the deleted range.
.TP 8
@ -512,8 +517,7 @@ and sets the default filename.
If
.I file
is not specified, then the default filename is used.
Any lines in the buffer are deleted before
the new file is read.
Any lines in the buffer are deleted before the new file is read.
The current address is set to the last line read.
.TP 8
@ -536,8 +540,7 @@ Edits
unconditionally.
This is similar to the
.I e
command,
except that unwritten changes are discarded without warning.
command, except that unwritten changes are discarded without warning.
The current address is set to the last line read.
.TP 8
@ -554,8 +557,7 @@ Applies
.I command-list
to each of the addressed lines matching a regular expression
.IR re .
The current address is set to the
line currently matched before
The current address is set to the line currently matched before
.I command-list
is executed.
At the end of the
@ -585,8 +587,7 @@ command.
Interactively edits the addressed lines matching a regular expression
.IR re.
For each matching line,
the line is printed,
the current address is set,
the line is printed, the current address is set,
and the user is prompted to enter a
.IR command-list .
At the end of the
@ -599,7 +600,8 @@ The format of
.I command-list
is the same as that of the
.I `g'
command. A newline alone acts as a null command list.
command.
A newline alone acts as a null command list.
A single `\*[Am]' repeats the last non-null command list.
.TP 8
@ -621,8 +623,8 @@ The current address is set to the last line entered.
.TP 8
(.,.+1)j
Joins the addressed lines. The addressed lines are
deleted from the buffer and replaced by a single
Joins the addressed lines.
The addressed lines are deleted from the buffer and replaced by a single
line containing their joined text.
The current address is set to the resultant line.
@ -634,8 +636,8 @@ The line can then be addressed as
.I 'lc
(i.e., a single quote followed by
.I lc
) in subsequent commands. The mark is not cleared until the line is
deleted or otherwise modified.
) in subsequent commands.
The mark is not cleared until the line is deleted or otherwise modified.
.TP 8
(.,.)l
@ -644,30 +646,28 @@ If a single line fills for than one screen (as might be the case
when viewing a binary file, for instance), a `--More--'
prompt is printed on the last line.
.B ed
waits until the RETURN key is pressed
before displaying the next screen.
The current address is set to the last line
printed.
waits until the RETURN key is pressed before displaying the next screen.
The current address is set to the last line printed.
.TP 8
(.,.)m(.)
Moves lines in the buffer. The addressed lines are moved to after the
Moves lines in the buffer.
The addressed lines are moved to after the
right-hand destination address, which may be the address
.IR 0
(zero).
The current address is set to the
last line moved.
The current address is set to the last line moved.
.TP 8
(.,.)n
Prints the addressed lines along with
their line numbers. The current address is set to the last line
printed.
their line numbers.
The current address is set to the last line printed.
.TP 8
(.,.)p
Prints the addressed lines. The current address is set to the last line
printed.
Prints the addressed lines.
The current address is set to the last line printed.
.TP 8
P
@ -684,17 +684,18 @@ Q
Quits ed unconditionally.
This is similar to the
.I q
command,
except that unwritten changes are discarded without warning.
command, except that unwritten changes are discarded without warning.
.TP 8
.RI ($)r \ file
Reads
.I file
to after the addressed line. If
to after the addressed line.
If
.I file
is not specified, then the default
filename is used. If there was no default filename prior to the command,
filename is used.
If there was no default filename prior to the command,
then the default filename is set to
.IR file .
Otherwise, the default filename is unchanged.
@ -702,9 +703,7 @@ The current address is set to the last line read.
.TP 8
.RI ($)r \ !command
Reads
to after the addressed line
the standard output of
Reads to after the addressed line the standard output of
.IR `!command' ,
(see the
.RI ! command
@ -720,8 +719,7 @@ The current address is set to the last line read.
.HP
.RI (.,.)s /re/replacement/n
.br
Replaces text in the addressed lines
matching a regular expression
Replaces text in the addressed lines matching a regular expression
.I re
with
.IR replacement .
@ -808,8 +806,7 @@ Copies (i.e., transfers) the addressed lines to after the right-hand
destination address, which may be the address
.IR 0
(zero).
The current address is set to the last line
copied.
The current address is set to the last line copied.
.TP 8
u
@ -852,8 +849,8 @@ Any previous contents of
is lost without warning.
If there is no default filename, then the default filename is set to
.IR file,
otherwise it is unchanged. If no filename is specified, then the default
filename is used.
otherwise it is unchanged.
If no filename is specified, then the default filename is used.
The current address is unchanged.
.TP 8
@ -884,9 +881,9 @@ The current address is unchanged.
.TP 8
x
Prompts for an encryption key which is used in subsequent reads and
writes. If a newline alone is entered as the key, then encryption is
turned off. Otherwise, echoing is disabled while a key is read.
Prompts for an encryption key which is used in subsequent reads and writes.
If a newline alone is entered as the key, then encryption is turned off.
Otherwise, echoing is disabled while a key is read.
Encryption/decryption is done using the
.IR bdes (1)
algorithm.
@ -895,7 +892,8 @@ algorithm.
.RI (.+1)z n
Scrolls
.I n
lines at a time starting at addressed line. If
lines at a time starting at addressed line.
If
.I n
is not specified, then the current window size is used.
The current address is set to the last line printed.
@ -928,8 +926,7 @@ Prints the line number of the addressed line.
.TP 8
(.+1)newline
Prints the addressed line, and sets the current address to
that line.
Prints the addressed line, and sets the current address to that line.
.SH ENVIRONMENTAL VARIABLES
.TP
@ -966,13 +963,13 @@ Addison-Wesley, 1981.
processes
.I file
arguments for backslash escapes, i.e., in a filename,
any characters preceded by a backslash (\\) are
interpreted literally.
any characters preceded by a backslash (\\) are interpreted literally.
If a text (non-binary) file is not terminated by a newline character,
then
.B ed
appends one on reading/writing it. In the case of a binary file,
appends one on reading/writing it.
In the case of a binary file,
.B ed
does not append a newline on reading/writing.
@ -983,8 +980,7 @@ When an error occurs,
.B ed
prints a `?' and either returns to command mode
or exits if its input is from a script.
An explanation of the last error can be
printed with the
An explanation of the last error can be printed with the
.I `h'
(help) command.
@ -1008,7 +1004,6 @@ the command list is executed only once.
If diagnostics are not disabled, attempting to quit
.B ed
or edit another file before writing a modified buffer
results in an error.
or edit another file before writing a modified buffer results in an error.
If the command is entered a second time, it succeeds,
but any changes to the buffer are lost.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: expr.1,v 1.20 2002/02/19 21:14:45 pooka Exp $
.\" $NetBSD: expr.1,v 1.21 2002/09/25 15:18:39 wiz Exp $
.\"
.\" Written by J.T. Conklin <jtc@netbsd.org>.
.\" Public domain.
@ -55,7 +55,8 @@ operator matches
.Ar expr1
against
.Ar expr2 ,
which must be a regular expression. The regular expression is anchored
which must be a regular expression.
The regular expression is anchored
to the beginning of the string with an implicit
.Dq ^ .
.Pp
@ -142,7 +143,8 @@ by
This implementation of
.Nm
internally uses 64 bit represenation of integers and checks for
over- and underflows. It also treats / (division mark) and
over- and underflows.
It also treats / (division mark) and
option '--' correctly depending upon context.
.Pp
.Nm
@ -150,7 +152,8 @@ on other systems (including
.Nx
up to and including
.Nx 1.5 )
might be not so graceful. Arithmetic results might be arbitrarily
might be not so graceful.
Arithmetic results might be arbitrarily
limited on such systems, most commonly to 32 bit quantities.
This means such
.Nm
@ -179,7 +182,8 @@ Some
.Nm
implementations don't recognize it at all, others
might ignore it even in cases where doing so results in syntax
error. There should be same result for both following examples,
error.
There should be same result for both following examples,
but it might not always be:
.Bl -enum -compact -offset indent
.It

View File

@ -1,4 +1,4 @@
.\" $NetBSD: hostname.1,v 1.15 2001/02/27 17:47:22 mason Exp $
.\" $NetBSD: hostname.1,v 1.16 2002/09/25 15:18:39 wiz Exp $
.\"
.\" Copyright (c) 1983, 1988, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -45,9 +45,9 @@
.Op Ar name-of-host
.Sh DESCRIPTION
.Nm
prints the name of the current host. The super-user can
set the host name by supplying an argument; this is usually done in the
network initialization script
prints the name of the current host.
The super-user can set the host name by supplying an argument; this is
usually done in the network initialization script
.Pa /etc/rc.d/network ,
normally run at boot
time.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ln.1,v 1.15 2000/10/14 18:31:57 bjh21 Exp $
.\" $NetBSD: ln.1,v 1.16 2002/09/25 15:18:39 wiz Exp $
.\"
.\" Copyright (c) 1980, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -75,7 +75,8 @@ If the
.Ar target_file
or
.Ar target_dir
is a symbolic link, do not follow it. This is most useful with the
is a symbolic link, do not follow it.
This is most useful with the
.Fl f
option, to replace a symlink which may point to a directory.
.It Fl n
@ -99,7 +100,8 @@ the file.
Hard links may not normally refer to directories and may not span file systems.
.Pp
A symbolic link contains the name of the file to
which it is linked. The referenced file is used when an
which it is linked.
The referenced file is used when an
.Xr open 2
operation is performed on the link.
A

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ls.1,v 1.34 2002/06/24 20:14:35 kleink Exp $
.\" $NetBSD: ls.1,v 1.35 2002/09/25 15:18:40 wiz Exp $
.\"
.\" Copyright (c) 1980, 1990, 1991, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
@ -122,7 +122,9 @@ Modifies the
.Fl s
option, causing the sizes to be reported in kilobytes.
.It Fl l
(The lowercase letter ``ell.'') List in long format. (See below.)
(The lowercase letter ``ell.'')
List in long format.
(See below.)
If the output is to a terminal, a total sum for all the file
sizes is output on a line before the long listing.
.It Fl m
@ -169,10 +171,9 @@ or printing
.It Fl x
Multi-column output sorted across the page rather than down the page.
.It Fl \&1
(The numeric digit ``one.'') Force output to be
one entry per line.
This is the default when
output is not to a terminal.
(The numeric digit ``one.'')
Force output to be one entry per line.
This is the default when output is not to a terminal.
.El
.Pp
The
@ -319,7 +320,8 @@ The file is executable or the directory is
searchable.
.It Sy \-
The file is neither readable, writable, executable,
nor set-user-ID nor set-group-ID mode, nor sticky. (See below.)
nor set-user-ID nor set-group-ID mode, nor sticky.
(See below.)
.El
.Pp
These next two apply only to the third character in the last group
@ -329,7 +331,8 @@ These next two apply only to the third character in the last group
The sticky bit is set
(mode
.Li 1000 ) ,
but not execute or search permission. (See
but not execute or search permission.
(See
.Xr chmod 1
or
.Xr sticky 8 . )

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mkdir.1,v 1.14 2002/02/08 01:21:58 ross Exp $
.\" $NetBSD: mkdir.1,v 1.15 2002/09/25 15:18:40 wiz Exp $
.\"
.\" Copyright (c) 1989, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -77,8 +77,8 @@ operand must already exist.
Intermediate directories are created with permission bits of
.Li rwxrwxrwx (\&0777)
as modified by the current umask, plus write and search
permission for the owner. Do not consider it an error if the
argument directory already exists.
permission for the owner.
Do not consider it an error if the argument directory already exists.
.El
.Pp
The user must have write permission in the parent directory.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mt.1,v 1.29 2002/08/13 13:22:35 wiz Exp $
.\" $NetBSD: mt.1,v 1.30 2002/09/25 15:18:41 wiz Exp $
.\"
.\" Copyright (c) 1981, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -85,8 +85,8 @@ need be specified.
.It Cm asf
Move forward
.Ar count
files from the beginning of the tape. This is accomplished by a rewind
followed by fsf
files from the beginning of the tape.
This is accomplished by a rewind followed by fsf
.Ar count .
.It Cm eof , weof
Write
@ -142,7 +142,8 @@ Set the tape density code to
.Ar count
as specified in the
.Tn SCSI-3
specification. See the
specification.
See the
.Sx DENSITY CODES
section for a list of codes for commonly used media types.
.It Cm rdspos
@ -178,8 +179,8 @@ returns a 0 exit status when the operation(s) were successful,
1 if the command was unrecognized, and 2 if an operation failed.
.Sh DENSITY CODES
The SCSI-3 specification defines a number of density codes for
various tape media, some of which are listed here. Note that
many tape drive vendors also define model-specific codes.
various tape media, some of which are listed here.
Note that many tape drive vendors also define model-specific codes.
.Pp
.Bl -column "Code" "Format" -compact
.It Em "Code Format"

View File

@ -1,4 +1,4 @@
.\" $NetBSD: pax.1,v 1.33 2002/04/21 00:10:09 wiz Exp $
.\" $NetBSD: pax.1,v 1.34 2002/09/25 15:18:41 wiz Exp $
.\"
.\" Copyright (c) 1992 Keith Muller.
.\" Copyright (c) 1992, 1993
@ -506,7 +506,8 @@ cannot be opened for reading and writing.
.It Fl k
Do not overwrite existing files.
.It Fl l
Link files. (The letter ell).
Link files.
(The letter ell).
In the
.Em copy
mode
@ -653,7 +654,8 @@ The optional trailing
.Cm g
continues to apply the substitution expression to the pathname substring
which starts with the first character following the end of the last successful
substitution. The first unsuccessful substitution stops the operation of the
substitution.
The first unsuccessful substitution stops the operation of the
.Cm g
option.
The optional trailing
@ -941,9 +943,11 @@ and
.Xr getgrnam 3
(and related) library calls.
.It Fl O
Force the archive to be one volume. If a volume ends prematurely,
Force the archive to be one volume.
If a volume ends prematurely,
.Nm
will not prompt for a new volume. This option can be useful for
will not prompt for a new volume.
This option can be useful for
automated tasks where error recovery cannot be performed by a human.
.It Fl P
Do not follow symbolic links, perform a physical file system traversal.
@ -1179,8 +1183,8 @@ directory hierarchy to
preserving permissions and access times.
.Pp
When running as root, one may also wish to preserve file
ownership when copying directory trees. This can
be done with the following commands:
ownership when copying directory trees.
This can be done with the following commands:
.Dl cd olddir
.Dl pax -rw -pe .\ .../newdir
which will copy the contents of

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ps.1,v 1.54 2002/06/19 08:11:56 jdolecek Exp $
.\" $NetBSD: ps.1,v 1.55 2002/09/25 15:18:41 wiz Exp $
.\"
.\" Copyright (c) 1980, 1990, 1991, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
@ -103,7 +103,8 @@ Change the way the cpu percentage is calculated by using a ``raw''
cpu calculation that ignores ``resident'' time (this normally has
no effect).
.It Fl e
Display the environment as well. The environment for other
Display the environment as well.
The environment for other
users' processes can only be displayed by the super-user.
.It Fl h
Repeat the information header as often as necessary to guarantee one
@ -161,7 +162,8 @@ Display information about processes attached to the device associated
with the standard input.
.It Fl t
Display information about processes attached to the specified terminal
device. Use an question mark (``?'') for processes not attached to a
device.
Use an question mark (``?'') for processes not attached to a
terminal device and a minus sign (``-'') for processes that have
been revoked from their terminal device.
.It Fl U
@ -360,9 +362,10 @@ to exit is listed as ``\*[Lt]exiting\*[Gt]''.
.Pp
.Nm
will try to locate the processes' argument vector from the user
area in order to print the command name and arguments. This method
is not reliable because a process is allowed to destroy this
information. The ucomm (accounting) keyword will always contain
area in order to print the command name and arguments.
This method is not reliable because a process is allowed to destroy this
information.
The ucomm (accounting) keyword will always contain
the real command name as contained in the process structure's p_comm field.
.Pp
If the command vector cannot be located (usually because it has not

View File

@ -1,4 +1,4 @@
.\" $NetBSD: pwd.1,v 1.19 2002/02/08 01:21:58 ross Exp $
.\" $NetBSD: pwd.1,v 1.20 2002/09/25 15:18:41 wiz Exp $
.\"
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -59,7 +59,8 @@ by the shell in the evironment variable
if possible.
.It Fl P
Print the physical path to the current working directory, with symbolic
links in the path resolved. This is the default.
links in the path resolved.
This is the default.
.El
.Sh EXIT STATUS
The

View File

@ -1,4 +1,4 @@
.\" $NetBSD: rcmd.1,v 1.12 2002/03/05 15:09:26 wiz Exp $
.\" $NetBSD: rcmd.1,v 1.13 2002/09/25 15:18:42 wiz Exp $
.\"
.\" Copyright (c) 1997 Matthew R. Green.
.\" Copyright (c) 1983, 1990 The Regents of the University of California.
@ -99,8 +99,8 @@ as in
.It Fl u
The
.Fl u
option allows the local username to be specified. Only the superuser
is allowed to use this option.
option allows the local username to be specified.
Only the superuser is allowed to use this option.
.It Fl n
The
.Fl n
@ -186,5 +186,6 @@ The stop signal,
.Dv SIGSTOP ,
will stop the local
.Nm
process only. This is arguably wrong, but currently hard to fix for reasons
process only.
This is arguably wrong, but currently hard to fix for reasons
too complicated to explain here.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: rcp.1,v 1.12 2001/12/20 20:03:29 wiz Exp $
.\" $NetBSD: rcp.1,v 1.13 2002/09/25 15:18:42 wiz Exp $
.\"
.\" Copyright (c) 1983, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -51,7 +51,8 @@
.Ar directory
.Sh DESCRIPTION
.Nm
copies files between machines. Each
copies files between machines.
Each
.Ar file
or
.Ar directory

File diff suppressed because it is too large Load Diff

View File

@ -1,4 +1,4 @@
.\" $NetBSD: sleep.1,v 1.15 2002/02/08 01:22:00 ross Exp $
.\" $NetBSD: sleep.1,v 1.16 2002/09/25 15:18:43 wiz Exp $
.\"
.\" Copyright (c) 1990, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
@ -58,10 +58,9 @@ below).
Note: The
.Nx
.Nm
command will accept and honor a non-integer number of specified
seconds. This is a non-portable extension, and its use will nearly
guarantee that a shell script will not execute properly on another
system.
command will accept and honor a non-integer number of specified seconds.
This is a non-portable extension, and its use will nearly guarantee that
a shell script will not execute properly on another system.
.Sh EXIT STATUS
The
.Nm
@ -82,7 +81,8 @@ number seconds later:
.Dl (sleep 1800; sh command_file \*[Gt]\*[Am] errors)\*[Am]
.Pp
This incantation would wait a half hour before
running the script command_file. (See the
running the script command_file.
(See the
.Xr at 1
utility.)
.Pp

View File

@ -1,4 +1,4 @@
.\" $NetBSD: stty.1,v 1.24 2002/02/08 01:22:01 ross Exp $
.\" $NetBSD: stty.1,v 1.25 2002/09/25 15:18:43 wiz Exp $
.\"
.\" Copyright (c) 1990, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
@ -74,8 +74,8 @@ in the traditional
.It Fl f
Open and use the terminal named by
.Ar file
rather than using standard input. The file is opened
using the
rather than using standard input.
The file is opened using the
.Dv O_NONBLOCK
flag of
.Fn open ,
@ -94,7 +94,8 @@ The following arguments are available to set the terminal
characteristics:
.Ss Control Modes
Control mode flags affect hardware characteristics associated with the
terminal. This corresponds to the c_cflag in the termios structure.
terminal.
This corresponds to the c_cflag in the termios structure.
.Bl -tag -width Fl
.It Cm parenb Pq Fl parenb
Enable (disable) parity generation
@ -216,11 +217,13 @@ to restart output.
.It Cm imaxbel Pq Fl imaxbel
The system imposes a limit of
.Dv MAX_INPUT
(currently 255) characters in the input queue. If
(currently 255) characters in the input queue.
If
.Cm imaxbel
is set and the input queue limit has been reached,
subsequent input causes the system to send an ASCII BEL
character to the output queue (the terminal beeps at you). Otherwise,
character to the output queue (the terminal beeps at you).
Otherwise,
if
.Cm imaxbel
is unset and the input queue is full, the next input character causes
@ -321,19 +324,21 @@ is disabled.
.It Cm echoctl Pq Fl echoctl
If
.Cm echoctl
is set, echo control characters as ^X. Otherwise control characters
echo as themselves.
is set, echo control characters as ^X.
Otherwise control characters echo as themselves.
.It Cm echoprt Pq Fl echoprt
For printing terminals. If set, echo erased characters backwards within ``\\''
and ``/''. Otherwise, disable this feature.
For printing terminals.
If set, echo erased characters backwards within ``\\''
and ``/''.
Otherwise, disable this feature.
.It Cm noflsh Pq Fl noflsh
Disable (enable) flush after
.Dv INTR , QUIT , SUSP .
.It Cm tostop Pq Fl tostop
Send (do not send)
.Dv SIGTTOU
for background output. This causes background jobs to stop if they attempt
terminal output.
for background output.
This causes background jobs to stop if they attempt terminal output.
.It Cm altwerase Pq Fl altwerase
Use (do not use) an alternative word erase algorithm when processing
.Dv WERASE
@ -346,9 +351,9 @@ erased with simply an
.Dv ERASE
character.)
.It Cm mdmbuf Pq Fl mdmbuf
If set, flow control output based on condition of Carrier Detect. Otherwise
writes return an error if Carrier Detect is low (and Carrier is not being
ignored with the
If set, flow control output based on condition of Carrier Detect.
Otherwise writes return an error if Carrier Detect is low (and Carrier
is not being ignored with the
.Dv CLOCAL
flag.)
.It Cm flusho Pq Fl flusho
@ -411,14 +416,12 @@ Non-Canonical mode input processing
.Ss Combination Modes
.Bl -tag -width Fl
.It Ar saved settings
Set the current terminal
characteristics to the saved settings
Set the current terminal characteristics to the saved settings
produced by the
.Fl g
option.
.It Cm evenp No or Cm parity
Enable parenb and cs7; disable
parodd.
Enable parenb and cs7; disable parodd.
.It Cm oddp
Enable parenb, cs7, and parodd.
.It Fl parity , evenp , oddp
@ -432,8 +435,7 @@ Reset
.Dv ERASE
and
.Dv KILL
characters
back to system defaults.
characters back to system defaults.
.It Cm sane
Resets all modes to reasonable values for interactive terminal use.
.It Cm tty
@ -445,7 +447,8 @@ Set (disable) all modes suitable for a CRT display device.
Enable (disable) the system generated status line associated with
processing a
.Dv STATUS
character (usually set to ^T). The status line consists of the
character (usually set to ^T).
The status line consists of the
system load average, the current command name, its process ID, the
event the process is waiting on (or the status of the process), the user
and system times, percent cpu, and current memory usage.
@ -477,9 +480,10 @@ performed by either the terminal hardware or by the remote side connected
to a pty.
.It Cm raw Pq Fl raw
If set, change the modes of the terminal so that no input or output processing
is performed. If unset, change the modes of the terminal to some reasonable
state that performs input and output processing. Note that since the
terminal driver no longer has a single
is performed.
If unset, change the modes of the terminal to some reasonable
state that performs input and output processing.
Note that since the terminal driver no longer has a single
.Dv RAW
bit, it is not possible to intuit what flags were set prior to setting
.Cm raw .
@ -595,7 +599,8 @@ The
.Nm
utility is expected to be
.St -p1003.2
compatible. The flags
compatible.
The flags
.Fl e
and
.Fl f

View File

@ -1,4 +1,4 @@
.\" $NetBSD: systrace.1,v 1.12 2002/08/28 03:52:46 itojun Exp $
.\" $NetBSD: systrace.1,v 1.13 2002/09/25 15:18:43 wiz Exp $
.\" $OpenBSD: systrace.1,v 1.27 2002/08/05 23:27:53 provos Exp $
.\"
.\" Copyright 2002 Niels Provos <provos@citi.umich.edu>
@ -49,15 +49,18 @@
The
.Nm
utility monitors and controls an application's access to the system by
enforcing access policies for system calls. The
enforcing access policies for system calls.
The
.Nm
utility might be used to trace an untrusted application's access to
the system. Alternatively, it might be used to protect the system
the system.
Alternatively, it might be used to protect the system
from software bugs (such as buffer overflows) by constraining a
daemon's access to the system.
.Pp
The access policy can be generated interactively or obtained from a
policy file. Operations not covered by the policy raise an alarm and
policy file.
Operations not covered by the policy raise an alarm and
allow an user to refine the currently configured policy.
.Pp
The options are as follows:
@ -71,10 +74,10 @@ Automatically generate a policy that allows every operation the
application executes.
The created policy functions as a base that can be refined.
.It Fl u
Do not perform aliasing on system call names. Aliasing is enabled
by default to group similar system calls into a single compound
name. For example, system calls that read from the file system
like
Do not perform aliasing on system call names.
Aliasing is enabled by default to group similar system calls into a
single compound name.
For example, system calls that read from the file system like
.Fn lstat
and
.Fn access
@ -130,7 +133,8 @@ is used to return an
.Xr errno 2
value to the system call when using a
.Va deny
action. The values
action.
The values
.Do
inherit
.Dc

View File

@ -1,4 +1,4 @@
.\" $NetBSD: test.1,v 1.17 2002/02/08 01:22:01 ross Exp $
.\" $NetBSD: test.1,v 1.18 2002/09/25 15:18:44 wiz Exp $
.\"
.\" Copyright (c) 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -154,7 +154,8 @@ True if
.Ar file
exists and is a symbolic link.
This operator is retained for compatibility with previous versions of
this program. Do not rely on its existence; use
this program.
Do not rely on its existence; use
.Fl h
instead.
.It Fl O Ar file
@ -284,13 +285,13 @@ operator.
.Sh GRAMMAR AMBIGUITY
The
.Nm test
grammar is inherently ambiguous. In order to assure a degree of consistency,
the cases described in
grammar is inherently ambiguous.
In order to assure a degree of consistency, the cases described in
.St -p1003.2
section 4.62.4,
are evaluated consistently according to the rules specified in the
standards document. All other cases are subject to the ambiguity in the
command semantics.
standards document.
All other cases are subject to the ambiguity in the command semantics.
.Sh EXIT STATUS
The
.Nm test