New sentence, new line. By Robert Elz with minimal fixes.

This commit is contained in:
wiz 2002-10-01 13:40:23 +00:00
parent 604e45f4cd
commit 2fb4b1db52
39 changed files with 995 additions and 773 deletions

View File

@ -1,4 +1,4 @@
.\" $NetBSD: atactl.8,v 1.12 2002/08/06 00:44:36 wiz Exp $ .\" $NetBSD: atactl.8,v 1.13 2002/10/01 13:40:23 wiz Exp $
.\" .\"
.\" Copyright (c) 1998 The NetBSD Foundation, Inc. .\" Copyright (c) 1998 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -51,13 +51,12 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm .Nm
allows a user or system administrator to issue commands to and otherwise allows a user or system administrator to issue commands to and otherwise
control devices which reside on standard IDE and ATA controllers. It is control devices which reside on standard IDE and ATA controllers.
used by specifying It is used by specifying a device to manipulate,
a device to manipulate, the command to perform, and any arguments the command to perform, and any arguments the command may require.
the command may require.
.Sh DEVICE COMMANDS .Sh DEVICE COMMANDS
The following commands may be used on IDE and ATA devices. Note The following commands may be used on IDE and ATA devices.
that not all devices support all commands. Note that not all devices support all commands.
.Pp .Pp
.Cm identify .Cm identify
.Pp .Pp
@ -66,38 +65,41 @@ revision strings, and the device's capabilities.
.Pp .Pp
.Cm idle .Cm idle
.Pp .Pp
Place the specified device into Idle mode. This mode may consume less Place the specified device into Idle mode.
power than Active mode. This mode may consume less power than Active mode.
.Pp .Pp
.Cm standby .Cm standby
.Pp .Pp
Place the specified device into Standby mode. This mode will consume Place the specified device into Standby mode.
less power than Idle mode. This mode will consume less power than Idle mode.
.Pp .Pp
.Cm sleep .Cm sleep
.Pp .Pp
Place the specified device into Sleep mode. This mode will consume Place the specified device into Sleep mode.
less power than Standby mode, but requires a device reset to resume This mode will consume less power than Standby mode,
operation. Typically the but requires a device reset to resume operation.
Typically the
.Xr wd 4 .Xr wd 4
driver performs this reset automatically, but this should still be driver performs this reset automatically,
used with caution. but this should still be used with caution.
.Pp .Pp
.Cm setidle .Cm setidle
.Ar idle-timer .Ar idle-timer
.Pp .Pp
Places the specified device into Idle mode, and sets the Idle timer Places the specified device into Idle mode,
to and sets the Idle timer to
.Ar idle-timer .Ar idle-timer
seconds. A value of 0 will disable the Idle timer. seconds.
A value of 0 will disable the Idle timer.
.Pp .Pp
.Cm setstandby .Cm setstandby
.Ar standby-timer .Ar standby-timer
.Pp .Pp
Places the specified device into Standby mode, and sets the Standby timer Places the specified device into Standby mode,
to and sets the Standby timer to
.Ar standby-timer .Ar standby-timer
seconds. A value of 0 will disable the Standby timer. seconds.
A value of 0 will disable the Standby timer.
.Pp .Pp
.Cm checkpower .Cm checkpower
.Pp .Pp
@ -107,22 +109,24 @@ management mode.
.Cm smart .Cm smart
.Ar [enable | disable | status] .Ar [enable | disable | status]
.Pp .Pp
Controls SMART feature set of the specified device. SMART stands for Controls SMART feature set of the specified device.
Self-Monitoring, Analysis, and Reporting Technology. It provides an SMART stands for Self-Monitoring, Analysis, and Reporting Technology.
early warning system by comparing subtle operation characteristics to It provides an early warning system by comparing subtle operation
those determined in vendor testing to precede device failures. characteristics to those determined in vendor testing
to precede device failures.
.Pp .Pp
.Ar enable .Ar enable
.Pp .Pp
Enables access to SMART capabilities within the device. Prior to being Enables access to SMART capabilities within the device.
enabled, a SMART capable device neither monitors nor saves SMART Prior to being enabled, a SMART capable device neither
attribute values. The state of SMART, either enabled or disabled, will monitors nor saves SMART attribute values.
The state of SMART, either enabled or disabled, will
be preserved by the device across power cycles. be preserved by the device across power cycles.
.Pp .Pp
.Ar disable .Ar disable
.Pp .Pp
Disables access to SMART capabilities within the device. Attribute values Disables access to SMART capabilities within the device.
will be saved, and will no longer be monitored. Attribute values will be saved, and will no longer be monitored.
.Pp .Pp
.Ar status .Ar status
.Pp .Pp
@ -130,29 +134,32 @@ Reports whether SMART is supported by the device, and whether SMART is
enabled on the device (can only be determined on ATA6 or better devices). enabled on the device (can only be determined on ATA6 or better devices).
If SMART is enabled, then a table of attribute information is printed. If SMART is enabled, then a table of attribute information is printed.
Attributes are the specific performance or calibration parameters that Attributes are the specific performance or calibration parameters that
are used in analyzing the status of the device. The specific set of are used in analyzing the status of the device.
attributes being used and the identity of these attributes is vendor The specific set of attributes being used and the identity of
specific and proprietary. these attributes is vendor specific and proprietary.
.Pp .Pp
Attribute values are used to represent the relative reliability of Attribute values are used to represent the relative reliability of
individual performance or calibration parameters. The valid range of individual performance or calibration parameters.
attribute values is from 1 to 253 decimal. Lower values indicate that the The valid range of attribute values is from 1 to 253 decimal.
analysis algorithms being used by the device are predicting a higher Lower values indicate that the analysis algorithms being used by the device
probability of a degrading or faulty condition. are predicting a higher probability of a degrading or faulty condition.
.Pp .Pp
Each attribute value has a corresponding threshold limit which is used for Each attribute value has a corresponding threshold limit which is used for
direct comparison to the attribute value to indicate the existence of a direct comparison to the attribute value to indicate the existence of a
degrading or faulty condition. The numerical value of the attribute degrading or faulty condition.
thresholds are determined by the device manufacturer through design and The numerical value of the attribute thresholds are determined by the
reliability testing and analysis. Each attribute threshold represents the device manufacturer through design and reliability testing and analysis.
lowest limit to which its corresponding attribute value can equal while Each attribute threshold represents the lowest limit to which its
still retaining a positive reliability status. corresponding attribute value can equal while still retaining a
positive reliability status.
.Pp .Pp
If the crit field is "yes" then negative reliability of this attribute If the crit field is "yes" then negative reliability of this attribute
predicts imminent data loss. Otherwise it merely indicates that the predicts imminent data loss.
intended design life period of usage or age has been exceeded. Otherwise it merely indicates that the intended design life period
of usage or age has been exceeded.
The collect field indicates whether this attribute is updated while the The collect field indicates whether this attribute is updated while the
device is online. The reliability field indicates whether the attribute device is online.
The reliability field indicates whether the attribute
value is within the acceptable threshold. value is within the acceptable threshold.
.Sh SEE ALSO .Sh SEE ALSO
.Xr ioctl 2 , .Xr ioctl 2 ,
@ -165,7 +172,8 @@ command first appeared in
.Sh AUTHORS .Sh AUTHORS
The The
.Nm .Nm
command was written by Ken Hornstein. It was based heavily on the command was written by Ken Hornstein.
It was based heavily on the
.Xr scsictl 8 .Xr scsictl 8
command written by Jason R. Thorpe. command written by Jason R. Thorpe.
.Sh BUGS .Sh BUGS

View File

@ -1,4 +1,4 @@
.\" $NetBSD: bim.8,v 1.7 2001/04/21 14:44:13 wiz Exp $ .\" $NetBSD: bim.8,v 1.8 2002/10/01 13:40:25 wiz Exp $
.\" .\"
.\" Copyright 1997 Piermont Information Systems Inc. .\" Copyright 1997 Piermont Information Systems Inc.
.\" All rights reserved. .\" All rights reserved.
@ -45,55 +45,60 @@ bim
.Op Fl c Ar command .Op Fl c Ar command
.Op Ar device .Op Ar device
.Sh DESCRIPTION .Sh DESCRIPTION
The pc532 has available an autoboot ROM monitor. This ROM monitor understands The pc532 has available an autoboot ROM monitor.
the This ROM monitor understands the
.Bx .Bx
disklabel and expects a boot image directory following the disklabel and expects a boot image directory following the disklabel.
disklabel. Also, it expects an image partition for the storage of bootable Also, it expects an image partition for the storage of bootable images.
images. The image directory and the image partition is managed by The image directory and the image partition is managed by
.Nm "" . .Nm "" .
The The
.Ar device .Ar device
is the raw disk partition that includes the disklabel. The default is the raw disk partition that includes the disklabel.
value of The default value of
.Ar device .Ar device
is is
.Pa /dev/rsd0c . .Pa /dev/rsd0c .
.Nm .Nm
directly accesses both the disklabel and the image partition directly directly accesses both the disklabel and the image partition directly
from the raw disk device. It does not open the device corresponding from the raw disk device.
to the boot partition. It does not open the device corresponding to the boot partition.
.Pp .Pp
The The
.Fl y .Fl y
argument assumes a yes response to any questions argument assumes a yes response to any questions
.Nm .Nm
would normally ask the user. It is mainly useful for would normally ask the user.
scripting. It is mainly useful for scripting.
.Pp .Pp
The The
.Cm -c command .Cm -c command
argument allows argument allows
.Nm .Nm
to execute commands given via the command line. This allows to execute commands given via the command line.
This allows
.Nm .Nm
to be used from scripts. The to be used from scripts.
The
.Cm -c command .Cm -c command
argument may be repeated up to 20 times. The commands argument may be repeated up to 20 times.
will be executed in the order given. The commands will be executed in the order given.
.Sh DISK INITIALIZATION .Sh DISK INITIALIZATION
.Nm .Nm
is typically used as part of the initial setup on a disk. is typically used as part of the initial setup on a disk.
The disk must be partitioned by using The disk must be partitioned by using
.Xr disklabel 8 , .Xr disklabel 8 ,
making sure there is a boot boot partition. This boot making sure there is a boot boot partition.
partition is often just after the disklabel. It must not include This boot partition is often just after the disklabel.
the disklabel. If It must not include the disklabel.
If
.Nm .Nm
does not detect a boot image directory, it asks if the user wants does not detect a boot image directory,
one created. From there, the operation of it asks if the user wants one created.
From there, the operation of
.Nm .Nm
is completely command driven. The command interpreter is is completely command driven.
The command interpreter is
.Sh COMMANDS .Sh COMMANDS
.Nm .Nm
supports the following commands. supports the following commands.
@ -132,7 +137,8 @@ For the details on these commands, ask for help from
.Xr disklabel 8 .Xr disklabel 8
.Sh AUTHORS .Sh AUTHORS
Bruce Culbertson wrote the basic command interpreter for the pc532 Bruce Culbertson wrote the basic command interpreter for the pc532
ROM monitor. Philip A. Nelson took the command interpreter, modified ROM monitor.
Philip A. Nelson took the command interpreter, modified
it to be a more generic command interpreter and added the it to be a more generic command interpreter and added the
.Nm .Nm
specific code. specific code.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: brconfig.8,v 1.3 2001/11/16 11:26:53 wiz Exp $ .\" $NetBSD: brconfig.8,v 1.4 2002/10/01 13:40:26 wiz Exp $
.\" .\"
.\" Copyright 2001 Wasabi Systems, Inc. .\" Copyright 2001 Wasabi Systems, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -52,15 +52,16 @@
The The
.Nm .Nm
utility is used to configure network bridge parameters and retrieve utility is used to configure network bridge parameters and retrieve
network bridge parameters and status from the kernel. The bridging network bridge parameters and status from the kernel.
function is implemented by the The bridging function is implemented by the
.Xr bridge 4 .Xr bridge 4
driver. driver.
.Pp .Pp
A network bridge creates a logical link between two or more A network bridge creates a logical link between two or more
IEEE 802 networks that use the same (or IEEE 802 networks that use the same (or
.Dq similar enough ) .Dq similar enough )
framing format. For example, it is possible to bridge Ethernet framing format.
For example, it is possible to bridge Ethernet
and 802.11 networks together, but it is not possible to bridge and 802.11 networks together, but it is not possible to bridge
Ethernet and Token Ring together. Ethernet and Token Ring together.
.Pp .Pp
@ -68,19 +69,21 @@ Bridge interfaces are created using the
.Xr ifconfig 8 .Xr ifconfig 8
command's command's
.Dq create .Dq create
sub-command. All other bridge configuration is performed using sub-command.
All other bridge configuration is performed using
.Nm "" . .Nm "" .
.Pp .Pp
The options are as follows: The options are as follows:
.Bl -tag -width indent .Bl -tag -width indent
.It Fl a .It Fl a
Display the status of all bridge devices present on the system. This Display the status of all bridge devices present on the system.
flag is mutually exclusive with all other sub-commands. This flag is mutually exclusive with all other sub-commands.
.El .El
.Pp .Pp
All other operations require that a bridge be specified. If a All other operations require that a bridge be specified.
bridge is specified with no sub-commands, the status of that bridge If a bridge is specified with no sub-commands,
is displayed. The following sub-commands are available: the status of that bridge is displayed.
The following sub-commands are available:
.Pp .Pp
.Bl -tag -width indent .Bl -tag -width indent
.It Cm up .It Cm up
@ -90,12 +93,14 @@ Stop forwarding packets on the bridge.
.It Cm add Ar interface .It Cm add Ar interface
Add the interface named by Add the interface named by
.Ar interface .Ar interface
as a member of the bridge. The interface is put into promiscuous mode as a member of the bridge.
The interface is put into promiscuous mode
so that it can receive every packet sent on the network. so that it can receive every packet sent on the network.
.It Cm delete Ar interface .It Cm delete Ar interface
Remove the interface named by Remove the interface named by
.Ar interface .Ar interface
from the bridge. Promiscuous mode is disabled on the interface when from the bridge.
Promiscuous mode is disabled on the interface when
it is removed from the bridge. it is removed from the bridge.
.It Cm maxaddr Ar size .It Cm maxaddr Ar size
Set the size of the bridge address cache to Set the size of the bridge address cache to
@ -104,10 +109,11 @@ The default is 100 entries.
.It Cm timeout Ar seconds .It Cm timeout Ar seconds
Set the timeout of address cache entries to Set the timeout of address cache entries to
.Ar seconds .Ar seconds
seconds. If seconds.
If
.Ar seconds .Ar seconds
is zero, then address cache entries will not be expired. The is zero, then address cache entries will not be expired.
default is 240 seconds. The default is 240 seconds.
.It Cm deladdr Ar address .It Cm deladdr Ar address
Delete Delete
.Ar address .Ar address
@ -119,16 +125,19 @@ Delete all addresses, including static addresses, from the address cache.
.It Cm discover Ar interface .It Cm discover Ar interface
Mark an interface as a Mark an interface as a
.Dq discovering .Dq discovering
interface. When the bridge has no interface.
address cache entry (either dynamic or static) for the destination address When the bridge has no address cache entry
of a packet, the bridge will forward the packet to all member interfaces (either dynamic or static)
marked as for the destination address of a packet,
the bridge will forward the packet to all
member interfaces marked as
.Dq discovering . .Dq discovering .
This is the default for all interfaces added to a bridge. This is the default for all interfaces added to a bridge.
.It Cm -discover Ar interface .It Cm -discover Ar interface
Clear the Clear the
.Dq discovering .Dq discovering
attribute on a member interface. For packets without the attribute on a member interface.
For packets without the
.Dq discovering .Dq discovering
attribute, the only packets forwarded on the interface are broadcast attribute, the only packets forwarded on the interface are broadcast
or multicast packets and packets for which the destination address or multicast packets and packets for which the destination address
@ -136,10 +145,11 @@ is known to be on the interface's segment.
.It Cm learn Ar interface .It Cm learn Ar interface
Mark an interface as a Mark an interface as a
.Dq learning .Dq learning
interface. When a packet arrives on such an interface, the source interface.
When a packet arrives on such an interface, the source
address of the packet is entered into the address cache as being a address of the packet is entered into the address cache as being a
destination address on the interface's segment. This is the default destination address on the interface's segment.
for all interfaces added to a bridge. This is the default for all interfaces added to a bridge.
.It Cm -learn Ar interface .It Cm -learn Ar interface
Clear the Clear the
.Dq learning .Dq learning
@ -156,26 +166,30 @@ Disable Spanning Tree protocol on
.Ar interface . .Ar interface .
This is the default for all interfaces added to a bridge. This is the default for all interfaces added to a bridge.
.It Cm maxage Ar seconds .It Cm maxage Ar seconds
Set the time that a Spanning Tree protocol configuration is valid. The Set the time that a Spanning Tree protocol configuration is valid.
default is 20 seconds. The mininum is 1 second and the maximum is 255 The default is 20 seconds.
seconds. The mininum is 1 second and the maximum is 255 seconds.
.It Cm fwddelay Ar seconds .It Cm fwddelay Ar seconds
Set the time that must pass before an interface begins forwarding Set the time that must pass before an interface begins forwarding
packets when Spanning Tree is enabled. The default is 15 seconds. The packets when Spanning Tree is enabled.
mininum is 1 second and the maximum is 255 seconds. The default is 15 seconds.
The mininum is 1 second and the maximum is 255 seconds.
.It Cm hellotime Ar seconds .It Cm hellotime Ar seconds
Set the time between broadcasting of Spanning Tree protocol Set the time between broadcasting of Spanning Tree protocol
configuration messages. The default is 2 seconds. The minimum is 1 configuration messages.
second and the maximum is 255 seconds. The default is 2 seconds.
The minimum is 1 second and the maximum is 255 seconds.
.It Cm priority Ar value .It Cm priority Ar value
Set the bridge priority for Spanning Tree. The default is 32768. Set the bridge priority for Spanning Tree.
The default is 32768.
The minimum is 0 and the maximum is 65536. The minimum is 0 and the maximum is 65536.
.It Cm ifpriority Ar interface Ar value .It Cm ifpriority Ar interface Ar value
Set the Spanning Tree priority of Set the Spanning Tree priority of
.Ar interface .Ar interface
to to
.Ar value . .Ar value .
The default is 128. The minimum is 0 and the maximum is 255. The default is 128.
The minimum is 0 and the maximum is 255.
.El .El
.Sh EXAMPLES .Sh EXAMPLES
The following then placed in the file The following then placed in the file
@ -186,8 +200,8 @@ to be created, and will add the interfaces
.Sq ray0 .Sq ray0
and and
.Sq fxp0 .Sq fxp0
to the bridge, and then enable packet forwarding. Such a to the bridge, and then enable packet forwarding.
configuration could be used to implement a simple Such a configuration could be used to implement a simple
802.11-to-Ethernet bridge (assuming the 802.11 interface is 802.11-to-Ethernet bridge (assuming the 802.11 interface is
in ad-hoc mode). in ad-hoc mode).
.Bd -literal -offset indent .Bd -literal -offset indent
@ -195,8 +209,8 @@ create
!brconfig $int add ray0 add fxp0 up !brconfig $int add ray0 add fxp0 up
.Ed .Ed
.Pp .Pp
Consider a system with two 4-port Ethernet boards. The following Consider a system with two 4-port Ethernet boards.
placed in the file The following placed in the file
.Pa /etc/ifconfig.bridge0 .Pa /etc/ifconfig.bridge0
will cause a bridge consisting of all 8 ports with Spanning Tree will cause a bridge consisting of all 8 ports with Spanning Tree
enabled to be created: enabled to be created:

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ccdconfig.8,v 1.20 2002/06/11 13:33:48 grant Exp $ .\" $NetBSD: ccdconfig.8,v 1.21 2002/10/01 13:40:26 wiz Exp $
.\" .\"
.\" Copyright (c) 1996, 1997 The NetBSD Foundation, Inc. .\" Copyright (c) 1996, 1997 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -72,13 +72,15 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm .Nm
is used to dynamically configure and unconfigure concatenated disk is used to dynamically configure and unconfigure concatenated disk
devices, or ccds. For more information about the ccd, see devices, or ccds.
For more information about the ccd, see
.Xr ccd 4 . .Xr ccd 4 .
.Pp .Pp
The options are as follows: The options are as follows:
.Bl -tag -width indent .Bl -tag -width indent
.It Fl c .It Fl c
Configure a ccd. This is the default behavior of Configure a ccd.
This is the default behavior of
.Nm "" . .Nm "" .
.It Fl C .It Fl C
Configure all ccd devices listed in the ccd configuration file. Configure all ccd devices listed in the ccd configuration file.
@ -88,9 +90,10 @@ When configuring or unconfiguring all devices, read the file
instead of the default instead of the default
.Pa /etc/ccd.conf . .Pa /etc/ccd.conf .
.It Fl g .It Fl g
Dump the current ccd configuration in a format suitable for use as the Dump the current ccd configuration in a format suitable
ccd configuration file. If no arguments are specified, every configured for use as the ccd configuration file.
ccd is dumped. Otherwise, the configuration of each listed ccd is dumped. If no arguments are specified, every configured ccd is dumped.
Otherwise, the configuration of each listed ccd is dumped.
.It Fl M Ar core .It Fl M Ar core
Extract values associated with the name list from Extract values associated with the name list from
.Pa core .Pa core
@ -112,10 +115,10 @@ to be verbose.
.El .El
.Pp .Pp
A ccd is described on the command line and in the ccd configuration A ccd is described on the command line and in the ccd configuration
file by the name of the ccd, the interleave factor, the ccd configuration file by the name of the ccd, the interleave factor,
flags, and a list of one or more devices. The flags may be represented the ccd configuration flags, and a list of one or more devices.
as a decimal number, a hexadecimal number, a comma-separated list The flags may be represented as a decimal number, a hexadecimal number,
of strings, or the word a comma-separated list of strings, or the word
.Dq none . .Dq none .
The flags are as follows: The flags are as follows:
.Bd -unfilled -offset indent .Bd -unfilled -offset indent

View File

@ -1,4 +1,4 @@
.\" $NetBSD: chkconfig.8,v 1.4 2001/11/16 11:26:54 wiz Exp $ .\" $NetBSD: chkconfig.8,v 1.5 2002/10/01 13:40:27 wiz Exp $
.\" .\"
.\" Copyright (c) 2001 Zembu Labs, Inc. .\" Copyright (c) 2001 Zembu Labs, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -99,12 +99,14 @@ keyword
.Dq chkconfig .Dq chkconfig
present in the present in the
.Xr rc.d 8 .Xr rc.d 8
script for that service. If a service's script does not contain script for that service.
If a service's script does not contain
this keyword, it may still be managed by this keyword, it may still be managed by
.Nm .Nm
using the using the
.Fl f .Fl f
flag. When this flag is used, flag.
When this flag is used,
.Nm .Nm
will automatically add the will automatically add the
.Dq chkconfig .Dq chkconfig

View File

@ -1,4 +1,4 @@
.\" $NetBSD: dkctl.8,v 1.3 2002/07/01 18:49:57 yamt Exp $ .\" $NetBSD: dkctl.8,v 1.4 2002/10/01 13:40:29 wiz Exp $
.\" .\"
.\" Copyright 2002 Wasabi Systems, Inc. .\" Copyright 2002 Wasabi Systems, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -50,7 +50,8 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm .Nm
allows a user or system administrator to manipulate and configure disks allows a user or system administrator to manipulate and configure disks
in various ways. It is used by specifying a disk to manipulate, the command in various ways.
It is used by specifying a disk to manipulate, the command
to perform, and any arguments the command may require. to perform, and any arguments the command may require.
.Sh COMMANDS .Sh COMMANDS
The following commands are supported: The following commands are supported:
@ -63,8 +64,8 @@ Get and display the cache enables for the specified device.
.Ar none | r | w | rw .Ar none | r | w | rw
.Op Ar save .Op Ar save
.Pp .Pp
Set the cache enables for the specified device. The enables are Set the cache enables for the specified device.
as follows: The enables are as follows:
.Bl -tag -width indent .Bl -tag -width indent
.It none .It none
Disable all caches on the disk. Disable all caches on the disk.
@ -83,7 +84,8 @@ enables in the disk's non-volatile parameter storage.
.Op Ar force .Op Ar force
.Pp .Pp
Causes the cache on the disk to be synchronized, flushing all dirty Causes the cache on the disk to be synchronized, flushing all dirty
write cache blocks to the media. If write cache blocks to the media.
If
.Ar force .Ar force
is specified, the cache synchronization command will be issued even is specified, the cache synchronization command will be issued even
if the kernel does not believe that there are any dirty cache blocks if the kernel does not believe that there are any dirty cache blocks

View File

@ -1,4 +1,4 @@
.\" $NetBSD: dump.8,v 1.47 2002/02/26 02:00:16 wiz Exp $ .\" $NetBSD: dump.8,v 1.48 2002/10/01 13:40:27 wiz Exp $
.\" .\"
.\" Copyright (c) 1980, 1991, 1993 .\" Copyright (c) 1980, 1991, 1993
.\" Regents of the University of California. .\" Regents of the University of California.
@ -98,14 +98,12 @@ A dump that is larger than the output medium is broken into
multiple volumes. multiple volumes.
On most media the size is determined by writing until an On most media the size is determined by writing until an
end-of-media indication is returned. end-of-media indication is returned.
This can be enforced This can be enforced by using the
by using the
.Fl a .Fl a
option. option.
.Pp .Pp
On media that cannot reliably return an end-of-media indication On media that cannot reliably return an end-of-media indication
(such as some cartridge tape drives) (such as some cartridge tape drives) each volume is of a fixed size;
each volume is of a fixed size;
the actual size is determined by the tape size and density and/or the actual size is determined by the tape size and density and/or
block count options below. block count options below.
By default, the same output file name is used for each volume By default, the same output file name is used for each volume
@ -135,15 +133,12 @@ The following options are supported by
.Bl -tag -width Ds .Bl -tag -width Ds
.It Fl 0\-9 .It Fl 0\-9
Dump levels. Dump levels.
A level 0, full backup, A level 0, full backup, guarantees the entire file system is copied
guarantees the entire file system is copied
(but see also the (but see also the
.Fl h .Fl h
option below). option below).
A level number above 0, A level number above 0, incremental backup,
incremental backup, tells dump to copy all files new or modified since the
tells dump to
copy all files new or modified since the
last dump of a lower level. last dump of a lower level.
The default level is 9. The default level is 9.
.It Fl a .It Fl a
@ -178,14 +173,12 @@ is a file system image.
Write the backup to Write the backup to
.Ar file ; .Ar file ;
.Ar file .Ar file
may be a special device file may be a special device file like
like
.Pa /dev/rst0 .Pa /dev/rst0
(a tape drive), (a tape drive),
.Pa /dev/rsd1c .Pa /dev/rsd1c
(a disk drive), (a disk drive),
an ordinary file, an ordinary file, or
or
.Ql Fl .Ql Fl
(the standard output). (the standard output).
Multiple file names may be given as a single argument separated by commas. Multiple file names may be given as a single argument separated by commas.
@ -222,15 +215,17 @@ so that incremental backups omit such files
but full backups retain them. but full backups retain them.
.It Fl k Ar read blocksize .It Fl k Ar read blocksize
The size in kilobyte of the read buffers, rounded up to a multiple of the The size in kilobyte of the read buffers, rounded up to a multiple of the
file system block size. Default is 32k. file system block size.
Default is 32k.
.It Fl l Ar timeout .It Fl l Ar timeout
If a tape change is required, eject the tape and wait for the drive to If a tape change is required, eject the tape and wait for the drive to
be ready again. This is to be used with tape changers which automatically load be ready again.
the next tape when the tape is ejected. If after the timeout (in seconds) the This is to be used with tape changers which automatically load
drive is not ready the next tape when the tape is ejected.
If after the timeout (in seconds) the drive is not ready
.Nm .Nm
falls back to the default behavior, and prompts the operator for the next falls back to the default behavior,
tape. and prompts the operator for the next tape.
.It Fl L Ar label .It Fl L Ar label
The user-supplied text string The user-supplied text string
.Ar label .Ar label
@ -239,9 +234,8 @@ is placed into the dump header, where tools like
and and
.Xr file 1 .Xr file 1
can access it. can access it.
Note that this label is limited Note that this label is limited to be at most LBLSIZE
to be at most LBLSIZE (currently 16) characters, which must include (currently 16) characters, which must include the terminating
the terminating
.Ql \e0 . .Ql \e0 .
.It Fl n .It Fl n
Whenever Whenever
@ -255,9 +249,11 @@ by means similar to a
Use that many buffers for read cache operations. Use that many buffers for read cache operations.
A value of zero disables the read cache altogether, higher values A value of zero disables the read cache altogether, higher values
improve read performance by reading larger data blocks from the improve read performance by reading larger data blocks from the
disk and maintaining them in an LRU cache. See the disk and maintaining them in an LRU cache.
See the
.Fl k .Fl k
option for the size of the buffers. Maximum is 512, the size of the cache is option for the size of the buffers.
Maximum is 512, the size of the cache is
limited to 15% of the avail RAM by default. limited to 15% of the avail RAM by default.
.It Fl s Ar feet .It Fl s Ar feet
Attempt to calculate the amount of tape needed Attempt to calculate the amount of tape needed
@ -273,8 +269,9 @@ required, and exit without actually performing the dump.
.It Fl t .It Fl t
All informational log messages printed by All informational log messages printed by
.Nm .Nm
will have the time prepended to them. Also, the completion time will have the time prepended to them.
interval estimations will have the estimated time at which the dump Also, the completion time interval estimations
will have the estimated time at which the dump
will complete printed at the end of the line. will complete printed at the end of the line.
.It Fl T Ar date .It Fl T Ar date
Use the specified date as the starting time for the dump Use the specified date as the starting time for the dump
@ -343,7 +340,8 @@ flag
.Pq Dv UF_NODUMP , .Pq Dv UF_NODUMP ,
files with the files with the
.Qq nodump .Qq nodump
flag will not be backed up. If a directory has the flag will not be backed up.
If a directory has the
.Qq nodump .Qq nodump
flag, this directory and any file or directory under it will not be backed up. flag, this directory and any file or directory under it will not be backed up.
.Pp .Pp
@ -480,7 +478,8 @@ limit is exceeded then
.Qo .Qo
ERROR: TIMEFORMAT too long, reverting to default ERROR: TIMEFORMAT too long, reverting to default
.Qc .Qc
will be printed and the time format will revert to the default one. If will be printed and the time format will revert to the default one.
If
.Ev TIMEFORMAT .Ev TIMEFORMAT
is not set then the format string defaults to is not set then the format string defaults to
.Qo .Qo
@ -490,7 +489,8 @@ is not set then the format string defaults to
.Sh FILES .Sh FILES
.Bl -tag -width /etc/dumpdates -compact .Bl -tag -width /etc/dumpdates -compact
.It Pa /dev/nrst0 .It Pa /dev/nrst0
default tape unit to use. Taken from default tape unit to use.
Taken from
.Dv _PATH_DEFTAPE .Dv _PATH_DEFTAPE
in in
.Pa /usr/include/paths.h . .Pa /usr/include/paths.h .

View File

@ -1,4 +1,4 @@
.\" $NetBSD: dump_lfs.8,v 1.6 2002/01/21 18:15:08 wiz Exp $ .\" $NetBSD: dump_lfs.8,v 1.7 2002/10/01 13:40:28 wiz Exp $
.\" .\"
.\" Copyright (c) 1980, 1991, 1993 .\" Copyright (c) 1980, 1991, 1993
.\" Regents of the University of California. .\" Regents of the University of California.
@ -173,7 +173,8 @@ so that incremental backups omit such files
but full backups retain them. but full backups retain them.
.It Fl k Ar read blocksize .It Fl k Ar read blocksize
The size in kilobyte of the read buffers, rounded up to a multiple of the The size in kilobyte of the read buffers, rounded up to a multiple of the
filesystem block size. Default is 32k. filesystem block size.
Default is 32k.
.It Fl L Ar label .It Fl L Ar label
The user-supplied text string The user-supplied text string
.Ar label .Ar label
@ -198,9 +199,11 @@ by means similar to a
Use that many buffers for read cache operations. Use that many buffers for read cache operations.
A value of zero disables the read cache altogether, higher values A value of zero disables the read cache altogether, higher values
improve read performance by reading larger data blocks from the improve read performance by reading larger data blocks from the
disk and maintaining them in an LRU cache. See the disk and maintaining them in an LRU cache.
See the
.Fl k .Fl k
option for the size of the buffers. Maximum is 512, the size of the cache is option for the size of the buffers.
Maximum is 512, the size of the cache is
limited to 15% of the avail RAM by default. limited to 15% of the avail RAM by default.
.It Fl s Ar feet .It Fl s Ar feet
Attempt to calculate the amount of tape needed Attempt to calculate the amount of tape needed
@ -280,7 +283,8 @@ flag
.Pq Dv UF_NODUMP , .Pq Dv UF_NODUMP ,
files with the files with the
.Qq nodump .Qq nodump
flag will not be backed up. If a directory has the flag will not be backed up.
If a directory has the
.Qq nodump .Qq nodump
flag, this directory and any file or directory under it will not be backed up. flag, this directory and any file or directory under it will not be backed up.
.Pp .Pp
@ -409,7 +413,8 @@ on the remote machine.
.Sh FILES .Sh FILES
.Bl -tag -width /etc/dumpdates -compact .Bl -tag -width /etc/dumpdates -compact
.It Pa /dev/nrst0 .It Pa /dev/nrst0
default tape unit to use. Taken from default tape unit to use.
Taken from
.Dv _PATH_DEFTAPE .Dv _PATH_DEFTAPE
in in
.Pa /usr/include/paths.h . .Pa /usr/include/paths.h .

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fdisk.8,v 1.30 2002/03/26 23:56:05 christos Exp $ .\" $NetBSD: fdisk.8,v 1.31 2002/10/01 13:40:29 wiz Exp $
.\" .\"
.Dd December 19, 2000 .Dd December 19, 2000
.Dt FDISK 8 .Dt FDISK 8
@ -86,7 +86,8 @@ The various fields in each partition are:
is used to label the partition. is used to label the partition.
.Nx .Nx
reserves the magic number 169 decimal (A9 in hex). reserves the magic number 169 decimal (A9 in hex).
The number 0 is used to mark a partition as unused. See the The number 0 is used to mark a partition as unused.
See the
.Fl l .Fl l
flag. flag.
.It Xo .It Xo

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fsck.8,v 1.26 2001/12/20 20:10:36 soren Exp $ .\" $NetBSD: fsck.8,v 1.27 2002/10/01 13:40:30 wiz Exp $
.\" .\"
.\" Copyright (c) 1996 Christos Zoulas. All rights reserved. .\" Copyright (c) 1996 Christos Zoulas. All rights reserved.
.\" .\"
@ -72,15 +72,17 @@ to be the partition designator.
The options are as follows: The options are as follows:
.Bl -tag -width indent .Bl -tag -width indent
.It Fl d .It Fl d
Debugging mode. Just print the commands without executing them. Debugging mode.
Just print the commands without executing them.
.It Fl f .It Fl f
Force checking of file systems, even when they are marked clean (for file Force checking of file systems, even when they are marked clean (for file
systems that support this), or when they are mounted read-write. systems that support this), or when they are mounted read-write.
.It Fl l Ar maxparallel .It Fl l Ar maxparallel
Limit the number of parallel checks to the number specified in Limit the number of parallel checks to the number specified in
the following argument. By default, the limit is the number of the following argument.
disks, running one process per disk. If a smaller limit is giv- By default, the limit is the number of disks, running one process per disk.
en, the disks are checked round-robin, one file system at a time. If a smaller limit is given, the disks are checked round-robin,
one file system at a time.
.It Fl n .It Fl n
Causes Causes
.Nm .Nm
@ -102,8 +104,8 @@ intervention is required.
.It Fl t Ar fstype .It Fl t Ar fstype
Invoke Invoke
.Nm .Nm
only for the comma separated list of file system types. If the only for the comma separated list of file system types.
list starts with If the list starts with
.Dq no .Dq no
then invoke then invoke
.Nm .Nm

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fsck_ext2fs.8,v 1.9 2002/02/07 03:15:07 ross Exp $ .\" $NetBSD: fsck_ext2fs.8,v 1.10 2002/10/01 13:40:30 wiz Exp $
.\" .\"
.\" Copyright (c) 1997 Manuel Bouyer. .\" Copyright (c) 1997 Manuel Bouyer.
.\" Copyright (c) 1980, 1989, 1991, 1993 .\" Copyright (c) 1980, 1989, 1991, 1993
@ -54,7 +54,8 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm .Nm
performs interactive filesystem consistency checks and repair for each of performs interactive filesystem consistency checks and repair for each of
the filesystems specified on the command line. It is normally invoked from the filesystems specified on the command line.
It is normally invoked from
.Xr fsck 8 . .Xr fsck 8 .
.Pp .Pp
The kernel takes care that only a restricted class of innocuous filesystem The kernel takes care that only a restricted class of innocuous filesystem
@ -83,7 +84,8 @@ option) will correct; if it encounters other inconsistencies, it exits
with an abnormal return status. with an abnormal return status.
For each corrected inconsistency one or more lines will be printed For each corrected inconsistency one or more lines will be printed
identifying the filesystem on which the correction will take place, identifying the filesystem on which the correction will take place,
and the nature of the correction. After successfully correcting a filesystem, and the nature of the correction.
After successfully correcting a filesystem,
.Nm .Nm
will print the number of files on that filesystem will print the number of files on that filesystem
and the number of used and free blocks. and the number of used and free blocks.
@ -123,17 +125,18 @@ The following flags are interpreted by
.Bl -tag -width indent .Bl -tag -width indent
.It Fl b .It Fl b
Use the block specified immediately after the flag as Use the block specified immediately after the flag as
the super block for the filesystem. Block 8193 is usually the super block for the filesystem.
an alternate super block. Block 8193 is usually an alternate super block.
.It Fl d .It Fl d
Print debugging output. Print debugging output.
.It Fl f .It Fl f
Force checking of file systems. Normally, if a file system is cleanly Force checking of file systems.
unmounted, the kernel will set a Normally, if a file system is cleanly unmounted, the kernel will set a
.Dq clean flag .Dq clean flag
in the file system superblock, and in the file system superblock, and
.Nm .Nm
will not check the file system. This option forces will not check the file system.
This option forces
.Nm .Nm
to check the file system, regardless of the state of the clean flag. to check the file system, regardless of the state of the clean flag.
.It Fl m .It Fl m

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fsck_ffs.8,v 1.30 2002/09/28 20:11:06 dbj Exp $ .\" $NetBSD: fsck_ffs.8,v 1.31 2002/10/01 13:40:31 wiz Exp $
.\" .\"
.\" Copyright (c) 1980, 1989, 1991, 1993 .\" Copyright (c) 1980, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -56,7 +56,8 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm .Nm
performs interactive file system consistency checks and repair for each of performs interactive file system consistency checks and repair for each of
the file systems specified on the command line. It is normally invoked from the file systems specified on the command line.
It is normally invoked from
.Xr fsck 8 . .Xr fsck 8 .
.Pp .Pp
The kernel takes care that only a restricted class of innocuous file system The kernel takes care that only a restricted class of innocuous file system
@ -85,8 +86,8 @@ option) will correct; if it encounters other inconsistencies, it exits
with an abnormal return status. with an abnormal return status.
For each corrected inconsistency one or more lines will be printed For each corrected inconsistency one or more lines will be printed
identifying the file system on which the correction will take place, identifying the file system on which the correction will take place,
and the nature of the correction. After successfully correcting a file and the nature of the correction.
system, After successfully correcting a file system,
.Nm .Nm
will print the number of files on that file system, will print the number of files on that file system,
the number of used and free blocks, the number of used and free blocks,
@ -151,7 +152,8 @@ Interpret the filesystem as an Apple UFS filesystem, even if
there is no Apple UFS volume label present. there is no Apple UFS volume label present.
.It Fl B .It Fl B
Convert the file system metadata to the specified byte order if needed. Convert the file system metadata to the specified byte order if needed.
Valid byte order are `be' and `le'. If Valid byte order are `be' and `le'.
If
.Nm "" .Nm ""
is interrupted while swapping the metadata byte order, the file system cannot is interrupted while swapping the metadata byte order, the file system cannot
be recovered. be recovered.
@ -160,8 +162,8 @@ will print a message in interactive mode if the file system is not in host
byte order. byte order.
.It Fl b .It Fl b
Use the block specified immediately after the flag as Use the block specified immediately after the flag as
the super block for the file system. Block 32 is usually the super block for the file system.
an alternative super block. Block 32 is usually an alternative super block.
.It Fl c .It Fl c
Convert the file system to the specified level. Convert the file system to the specified level.
Note that the level of a file system can only be raised. Note that the level of a file system can only be raised.
@ -206,12 +208,13 @@ will be accessed
.Sq as-is , .Sq as-is ,
and no attempts will be made to read a disklabel. and no attempts will be made to read a disklabel.
.It Fl f .It Fl f
Force checking of file systems. Normally, if a file system is cleanly Force checking of file systems.
unmounted, the kernel will set a Normally, if a file system is cleanly unmounted, the kernel will set a
.Dq clean flag .Dq clean flag
in the file system superblock, and in the file system superblock, and
.Nm .Nm
will not check the file system. This option forces will not check the file system.
This option forces
.Nm .Nm
to check the file system, regardless of the state of the clean flag. to check the file system, regardless of the state of the clean flag.
.It Fl m .It Fl m

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fsck_lfs.8,v 1.9 2002/02/08 01:30:43 ross Exp $ .\" $NetBSD: fsck_lfs.8,v 1.10 2002/10/01 13:40:31 wiz Exp $
.\" .\"
.\" Copyright (c) 1980, 1989, 1991, 1993 .\" Copyright (c) 1980, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -53,7 +53,8 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm .Nm
performs interactive filesystem consistency checks and repair for each of performs interactive filesystem consistency checks and repair for each of
the filesystems specified on the command line. It is normally invoked from the filesystems specified on the command line.
It is normally invoked from
.Xr fsck 8 . .Xr fsck 8 .
.Pp .Pp
The design of LFS takes care that no filesystem inconsistencies can The design of LFS takes care that no filesystem inconsistencies can
@ -63,7 +64,8 @@ will report and optionally correct any such inconsistencies.
.Pp .Pp
For each corrected inconsistency one or more lines will be printed For each corrected inconsistency one or more lines will be printed
identifying the filesystem on which the correction will take place, identifying the filesystem on which the correction will take place,
and the nature of the correction. After successfully correcting a filesystem, and the nature of the correction.
After successfully correcting a filesystem,
.Nm .Nm
will print the number of files on that filesystem, will print the number of files on that filesystem,
the number of used and free blocks, the number of used and free blocks,
@ -130,7 +132,8 @@ except for
which is assumed to be affirmative; which is assumed to be affirmative;
do not open the filesystem for writing. do not open the filesystem for writing.
.It Fl p .It Fl p
Specify ``preen'' mode. Currently, in this mode Specify ``preen'' mode.
Currently, in this mode
.Nm .Nm
simply checks validity of the newer checkpoint. simply checks validity of the newer checkpoint.
.It Fl y .It Fl y

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fsck_msdos.8,v 1.12 2001/11/16 11:36:33 wiz Exp $ .\" $NetBSD: fsck_msdos.8,v 1.13 2002/10/01 13:40:32 wiz Exp $
.\" .\"
.\" Copyright (C) 1995 Wolfgang Solfrank .\" Copyright (C) 1995 Wolfgang Solfrank
.\" Copyright (c) 1995 Martin Husemann .\" Copyright (c) 1995 Martin Husemann
@ -65,8 +65,8 @@ run from
during automatic reboot, when a FAT filesystem is detected. during automatic reboot, when a FAT filesystem is detected.
When preening file systems, When preening file systems,
.Nm .Nm
will fix common inconsistencies non-interactively. If will fix common inconsistencies non-interactively.
more serious problems are found, If more serious problems are found,
.Nm .Nm
does not try to fix them, indicates that it was not does not try to fix them, indicates that it was not
successful, and exits. successful, and exits.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fsdb.8,v 1.13 2002/02/08 01:30:43 ross Exp $ .\" $NetBSD: fsdb.8,v 1.14 2002/10/01 13:40:33 wiz Exp $
.\" .\"
.\" Copyright (c) 1996 The NetBSD Foundation, Inc. .\" Copyright (c) 1996 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -50,13 +50,13 @@
opens opens
.Ar fsname .Ar fsname
(usually a raw disk partition) and runs a command loop (usually a raw disk partition) and runs a command loop
allowing manipulation of the file system's inode data. You are prompted allowing manipulation of the file system's inode data.
to enter a command with You are prompted to enter a command with
.Dq "fsdb (inum X)\*[Gt]" .Dq "fsdb (inum X)\*[Gt]"
where where
.Va X .Va X
is the currently selected i-number. The initial selected inode is the is the currently selected i-number.
root of the filesystem (i-number 2). The initial selected inode is the root of the filesystem (i-number 2).
The command processor uses the The command processor uses the
.Xr editline 3 .Xr editline 3
library, so you can use command line editing to reduce typing if desired. library, so you can use command line editing to reduce typing if desired.
@ -102,9 +102,9 @@ Find
in the current directory and make its inode the current inode. in the current directory and make its inode the current inode.
.Ar Name .Ar Name
may be a multi-component name or may begin with slash to indicate that may be a multi-component name or may begin with slash to indicate that
the root inode should be used to start the lookup. If some component the root inode should be used to start the lookup.
along the pathname is not found, the last valid directory encountered is If some component along the pathname is not found,
left as the active inode. the last valid directory encountered is left as the active inode.
.br .br
This command is valid only if the starting inode is a directory. This command is valid only if the starting inode is a directory.
.Pp .Pp
@ -123,8 +123,8 @@ Set the active inode's link count to
.Ar number . .Ar number .
.Pp .Pp
.It Cm ls .It Cm ls
List the current inode's directory entries. This command is valid only List the current inode's directory entries.
if the current inode is a directory. This command is valid only if the current inode is a directory.
.Pp .Pp
.It Cm blks .It Cm blks
List the current inode's blocks numbers. List the current inode's blocks numbers.
@ -133,16 +133,16 @@ List the current inode's blocks numbers.
.It Cm del Ar name .It Cm del Ar name
Remove the entry Remove the entry
.Ar name .Ar name
from the current directory inode. This command is valid only from the current directory inode.
if the current inode is a directory. This command is valid only if the current inode is a directory.
.Pp .Pp
.It Cm ln Ar ino Ar name .It Cm ln Ar ino Ar name
Create a link to inode Create a link to inode
.Ar ino .Ar ino
under the name under the name
.Ar name .Ar name
in the current directory inode. This command is valid only in the current directory inode.
if the current inode is a directory. This command is valid only if the current inode is a directory.
.Pp .Pp
.It Cm chinum Ar dirslot Ar inum .It Cm chinum Ar dirslot Ar inum
Change the i-number in directory entry Change the i-number in directory entry
@ -155,8 +155,9 @@ Change the name in directory entry
.Ar dirslot .Ar dirslot
to to
.Ar name . .Ar name .
This command cannot expand a directory entry. You can only rename an This command cannot expand a directory entry.
entry if the name will fit into the existing directory slot. You can only rename an entry if the name will fit into
the existing directory slot.
.Pp .Pp
.It Cm chtype Ar type .It Cm chtype Ar type
Change the type of the current inode to Change the type of the current inode to
@ -203,7 +204,8 @@ should be in the format
.Em YYYYMMDDHHMMSS[.nsec] .Em YYYYMMDDHHMMSS[.nsec]
where where
.Em nsec .Em nsec
is an optional nanosecond specification. If no nanoseconds are specified, the is an optional nanosecond specification.
If no nanoseconds are specified, the
.Va mtimensec , .Va mtimensec ,
.Va ctimensec , .Va ctimensec ,
or or
@ -222,7 +224,8 @@ Exit the program.
.Nm .Nm
uses the source code for uses the source code for
.Xr fsck 8 .Xr fsck 8
to implement most of the file system manipulation code. The remainder of to implement most of the file system manipulation code.
The remainder of
.Nm .Nm
first appeared in first appeared in
.Nx 1.1 . .Nx 1.1 .

View File

@ -1,4 +1,4 @@
.\" $NetBSD: init.8,v 1.24 2001/11/16 11:37:04 wiz Exp $ .\" $NetBSD: init.8,v 1.25 2002/10/01 13:40:34 wiz Exp $
.\" .\"
.\" Copyright (c) 1980, 1991, 1993 .\" Copyright (c) 1980, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -61,7 +61,8 @@ may be passed
.Fl s .Fl s
from the boot program to prevent the system from going multi-user and from the boot program to prevent the system from going multi-user and
to instead execute a single user shell without starting the normal to instead execute a single user shell without starting the normal
daemons. The system is then quiescent for maintenance work and may daemons.
The system is then quiescent for maintenance work and may
later be made to go to state 2 (multi-user) by exiting the single-user later be made to go to state 2 (multi-user) by exiting the single-user
shell (with ^D). shell (with ^D).
.It .It

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ldconfig.8,v 1.13 2001/11/16 11:37:40 wiz Exp $ .\" $NetBSD: ldconfig.8,v 1.14 2002/10/01 13:40:34 wiz Exp $
.\" .\"
.\" Copyright (c) 1998 The NetBSD Foundation, Inc. .\" Copyright (c) 1998 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -73,8 +73,8 @@ directory search operations
would have to perform to load required shared libraries. would have to perform to load required shared libraries.
.Pp .Pp
The shared libraries so found will be automatically available for loading The shared libraries so found will be automatically available for loading
if needed by the program being prepared for execution. This obviates the need if needed by the program being prepared for execution.
for storing search paths within the executable. This obviates the need for storing search paths within the executable.
.Pp .Pp
The The
.Ev LD_LIBRARY_PATH .Ev LD_LIBRARY_PATH
@ -86,8 +86,8 @@ is a
.Sq \&: .Sq \&:
separated list of directory paths that are searched by separated list of directory paths that are searched by
.Nm ld.so .Nm ld.so
when it needs to load a shared library. It can be viewed as the run-time when it needs to load a shared library.
equivalent of the It can be viewed as the run-time equivalent of the
.Fl L .Fl L
switch of switch of
.Nm ld . .Nm ld .
@ -104,11 +104,13 @@ Do not scan directories listed in
for shared libraries. for shared libraries.
.It Fl m .It Fl m
Merge the result of the scan of the directories given as arguments into Merge the result of the scan of the directories given as arguments into
the existing hints file. The default action is to build the hints file afresh. the existing hints file.
The default action is to build the hints file afresh.
.It Fl r .It Fl r
Lists the current contents of Lists the current contents of
.Pa ld.so.hints .Pa ld.so.hints
on the standard output. The hints file will not be modified. on the standard output.
The hints file will not be modified.
.It Fl s .It Fl s
Do not scan the built-in system directory Do not scan the built-in system directory
.Pq Pa /usr/lib , .Pq Pa /usr/lib ,
@ -118,7 +120,8 @@ for shared libraries.
.It Fl S .It Fl S
Do not scan the built-in system directory Do not scan the built-in system directory
.Pq Pa /usr/lib , .Pq Pa /usr/lib ,
for shared libraries. (Directories listed in for shared libraries.
(Directories listed in
.Pa /etc/ld.so.conf .Pa /etc/ld.so.conf
are still scanned.) are still scanned.)
.It Fl v .It Fl v
@ -142,18 +145,22 @@ in
Special care must be taken when loading shared libraries into the address Special care must be taken when loading shared libraries into the address
space of space of
.Em set-user-ID .Em set-user-ID
programs. Whenever such a program is run, programs.
Whenever such a program is run,
.Nm ld.so .Nm ld.so
will only load shared libraries from the will only load shared libraries from the
.Pa ld.so.hints .Pa ld.so.hints
file. In particular, the file.
In particular, the
.Ev LD_LIBRARY_PATH .Ev LD_LIBRARY_PATH
and and
.Ev LD_PRELOAD .Ev LD_PRELOAD
is not used to search for libraries. Thus, the role of ldconfig is dual. In is not used to search for libraries.
addition to building a set of hints for quick lookup, it also serves to Thus, the role of ldconfig is dual.
In addition to building a set of hints for quick lookup, it also serves to
specify the trusted collection of directories from which shared objects can specify the trusted collection of directories from which shared objects can
be safely loaded. It is presumed that the set of directories specified to be safely loaded.
It is presumed that the set of directories specified to
.Nm .Nm
is under control of the system's administrator. is under control of the system's administrator.
.Nm ld.so .Nm ld.so

View File

@ -1,4 +1,4 @@
.\" $NetBSD: lmcctl.8,v 1.8 2001/11/16 11:38:15 wiz Exp $ .\" $NetBSD: lmcctl.8,v 1.9 2002/10/01 13:40:35 wiz Exp $
.\" .\"
.\" Copyright (c) 1997-1999 LAN Media Corporation (LMC) .\" Copyright (c) 1997-1999 LAN Media Corporation (LMC)
.\" All rights reserved. www.lanmedia.com .\" All rights reserved. www.lanmedia.com
@ -47,9 +47,10 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm "" .Nm ""
is the user-land control program for the Lan Media SSI, is the user-land control program for the Lan Media SSI,
HSSI, and DS3 network interfaces. The SSI is the LMC1000, and runs at HSSI, and DS3 network interfaces.
various speeds up to 10Mbps. The DS3 is the LMC5245 and runs at a speed of The SSI is the LMC1000, and runs at various speeds up to 10Mbps.
45Mbps. The HSSI is the LMC5200, and has no internal clock generator. The DS3 is the LMC5245 and runs at a speed of 45Mbps.
The HSSI is the LMC5200, and has no internal clock generator.
.Nm "" .Nm ""
is used to configure various media and protocol options dealing with HDLC is used to configure various media and protocol options dealing with HDLC
serial links and hardware configurations. serial links and hardware configurations.
@ -76,8 +77,9 @@ Set the interface to use external clocking.
This is the default. This is the default.
.It Fl C .It Fl C
(SSI, HSSI) (SSI, HSSI)
Set the interface to use internal clocking. On the SSI card this uses the Set the interface to use internal clocking.
internal baud rate generator. On the HSSI card it uses the PCI bus clock. On the SSI card this uses the internal baud rate generator.
On the HSSI card it uses the PCI bus clock.
.It Fl e .It Fl e
Select 16-bit CRC. Select 16-bit CRC.
This is the default. This is the default.
@ -97,9 +99,10 @@ This is the default.
Enable the DS3 scrambler function. Enable the DS3 scrambler function.
.It Fl o .It Fl o
(DS3) (DS3)
Program the card for cable lengths of less than 100 feet. In this mode, Program the card for cable lengths of less than 100 feet.
the card uses lower power to transmit data for short cable runs, which might In this mode, the card uses lower power to transmit data
otherwise overdrive a receiver. This is the default, and will work in most for short cable runs, which might otherwise overdrive a receiver.
This is the default, and will work in most
situations even with runs more than 100 feet. situations even with runs more than 100 feet.
.It Fl O .It Fl O
(DS3) (DS3)

View File

@ -1,4 +1,4 @@
.\" $NetBSD: modload.8,v 1.19 2002/09/13 15:32:21 gehenna Exp $ .\" $NetBSD: modload.8,v 1.20 2002/10/01 13:40:35 wiz Exp $
.\" .\"
.\" Copyright (c) 1993 Christopher G. Demetriou .\" Copyright (c) 1993 Christopher G. Demetriou
.\" All rights reserved. .\" All rights reserved.
@ -57,7 +57,8 @@ The options to
are as follows: are as follows:
.Bl -tag -width indent .Bl -tag -width indent
.It Fl d .It Fl d
Debug. Used to debug Debug.
Used to debug
.Nm .Nm
itself. itself.
.It Fl n .It Fl n
@ -68,7 +69,8 @@ Print comments about the loading process.
.It Fl s .It Fl s
Load the symbol table. Load the symbol table.
.It Fl S .It Fl S
Do not remove the temporary object file. By default, the Do not remove the temporary object file.
By default, the
.Xr ld 1 .Xr ld 1
output is removed after being loaded into the kernel. output is removed after being loaded into the kernel.
.It Fl A Ar kernel .It Fl A Ar kernel
@ -83,21 +85,20 @@ This is passed by
to to
.Xr ld 1 .Xr ld 1
when the module is linked. when the module is linked.
The default module entry point name is `xxxinit'. If `xxxinit' cannot be The default module entry point name is `xxxinit'.
found, an attempt to use `\*[Lt]module_name\*[Gt]_lkmentry' will be made, where If `xxxinit' cannot be found, an attempt to
use `\*[Lt]module_name\*[Gt]_lkmentry' will be made, where
\*[Lt]module_name\*[Gt] is the filename being loaded without the `.o'. \*[Lt]module_name\*[Gt] is the filename being loaded without the `.o'.
.It Fl p Ar postinstall .It Fl p Ar postinstall
Specify the name of a shell script or program that will Specify the name of a shell script or program that will
be executed if the module is successfully loaded. It be executed if the module is successfully loaded.
is always passed the module id (in decimal) and module It is always passed the module id (in decimal) and module
type (in hexadecimal) as the first two arguments. type (in hexadecimal) as the first two arguments.
For loadable drivers, the third argument is the character major device number For loadable drivers, the third argument is the character major device number
and the fourth argument is the block major device number. and the fourth argument is the block major device number.
For a loadable system call, the third argument is the system For a loadable system call, the third argument is the system call number.
call number.
.It Fl o Ar output_file .It Fl o Ar output_file
Specify the name of the output file that is produced by Specify the name of the output file that is produced by the linker.
the linker.
.El .El
.Sh FILES .Sh FILES
.Bl -tag -width /usr/include/sys/lkm.h -compact .Bl -tag -width /usr/include/sys/lkm.h -compact

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount.8,v 1.35 2002/09/21 18:43:32 christos Exp $ .\" $NetBSD: mount.8,v 1.36 2002/10/01 13:40:36 wiz Exp $
.\" .\"
.\" Copyright (c) 1980, 1989, 1991, 1993 .\" Copyright (c) 1980, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -64,7 +64,8 @@ or
.Ar node .Ar node
are not provided, the appropriate information is taken from the are not provided, the appropriate information is taken from the
.Xr fstab 5 .Xr fstab 5
file. The provided argument is looked up first in the file.
The provided argument is looked up first in the
.Dq fs_file , .Dq fs_file ,
then in the then in the
.Dq fs_spec .Dq fs_spec
@ -82,7 +83,8 @@ point
.Ar node .Ar node
and has access to the and has access to the
.Ar special .Ar special
device (at least read permissions). In addition, the device (at least read permissions).
In addition, the
.Em vfs.generic.usermount .Em vfs.generic.usermount
.Xr sysctl 3 .Xr sysctl 3
must be set to 1 to permit file system mounting by ordinary users. must be set to 1 to permit file system mounting by ordinary users.
@ -170,8 +172,9 @@ Do not interpret character or block special devices on the file system.
This option is useful for a server that has file systems containing This option is useful for a server that has file systems containing
special devices for architectures other than its own. special devices for architectures other than its own.
.It Cm nodevmtime .It Cm nodevmtime
Do not update modification times on device special files. This option Do not update modification times on device special files.
is useful on laptops or other systems that perform power management. This option is useful on laptops
or other systems that perform power management.
.It Cm nocoredump .It Cm nocoredump
Do not allow programs to create crash dumps (core files) on the file system. Do not allow programs to create crash dumps (core files) on the file system.
This option can be used to help protect sensitive This option can be used to help protect sensitive
@ -192,14 +195,16 @@ The same as
.Fl r ; .Fl r ;
mount the file system read-only (even the super-user may not write it). mount the file system read-only (even the super-user may not write it).
.It Cm softdep .It Cm softdep
(FFS only) Mount the filesystem using soft-dependencies. This means that (FFS only) Mount the filesystem using soft-dependencies.
metadata will not be written immediately, but is written in an ordered fashion This means that metadata will not be written immediately,
to keep the on-disk state of the filesystem consistent. This results but is written in an ordered fashion to keep the
in significant speedups for file create/delete operations. This option on-disk state of the filesystem consistent.
will be ignored when using the This results in significant speedups for file create/delete operations.
This option will be ignored when using the
.Fl u .Fl u
flag and a filesystem is already mounted read/write. This option has gone flag and a filesystem is already mounted read/write.
through moderate to heavy testing, but should still be used with care. This option has gone through moderate to heavy testing,
but should still be used with care.
It requires the It requires the
.Dv SOFTDEP .Dv SOFTDEP
option to be enabled in the running kernel. option to be enabled in the running kernel.
@ -208,8 +213,9 @@ Recognize permission of symbolic link when reading or traversing link.
.It Cm sync .It Cm sync
All All
.Tn I/O .Tn I/O
to the file system should be done synchronously. This is not equivalent to the to the file system should be done synchronously.
normal mode in which only metadata is written synchronously. This is not equivalent to the normal mode in which only
metadata is written synchronously.
.It Cm nosync .It Cm nosync
Clear Clear
.Cm sync .Cm sync
@ -261,9 +267,8 @@ is used to indicate the file system type.
The type The type
.Ar ffs .Ar ffs
is the default. is the default.
The \fI-t\fP option can be used The \fI-t\fP option can be used to indicate that the actions
to indicate that the actions should only be taken on should only be taken on filesystems of the specified type.
filesystems of the specified type.
More than one type may be specified in a comma separated list. More than one type may be specified in a comma separated list.
The list of filesystem types can be prefixed with The list of filesystem types can be prefixed with
.Dq no .Dq no
@ -317,7 +322,8 @@ or
.Fl w .Fl w
option. option.
.It Fl v .It Fl v
Verbose mode. If this flag is specified more than once, then the Verbose mode.
If this flag is specified more than once, then the
filesystem-specific mount arguments are printed for the given mounted filesystem-specific mount arguments are printed for the given mounted
filesystem. filesystem.
.It Fl w .It Fl w

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_ados.8,v 1.14 2001/11/16 11:26:55 wiz Exp $ .\" $NetBSD: mount_ados.8,v 1.15 2002/10/01 13:40:37 wiz Exp $
.\" .\"
.\" Copyright (c) 1993, 1994 Christopher G. Demetriou .\" Copyright (c) 1993, 1994 Christopher G. Demetriou
.\" All rights reserved. .\" All rights reserved.
@ -113,7 +113,8 @@ filesystem currently supports the Amiga fast file system.
.Pp .Pp
The The
.Sq ados .Sq ados
filesystem implementation currently is read-only. The filesystem implementation currently is read-only.
The
.Nm .Nm
utility silently retries the mount read-only, as if the utility silently retries the mount read-only, as if the
.Ar ro .Ar ro

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_cd9660.8,v 1.16 2001/11/16 11:26:55 wiz Exp $ .\" $NetBSD: mount_cd9660.8,v 1.17 2002/10/01 13:40:38 wiz Exp $
.\" .\"
.\" Copyright (c) 1993, 1994 .\" Copyright (c) 1993, 1994
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -91,7 +91,8 @@ currently does not support Unicode characters present in some
Joliet filesystems. Joliet filesystems.
.It Cm nomaplcase .It Cm nomaplcase
File names on cd9660 cdrom without Rock Ridge extension present File names on cd9660 cdrom without Rock Ridge extension present
should be uppercase only. By default, cd9660 recodes file should be uppercase only.
By default, cd9660 recodes file
names read from a non-Rock Ridge disk to all lowercase characters. names read from a non-Rock Ridge disk to all lowercase characters.
.Cm nomaplcase .Cm nomaplcase
turns off this mapping. turns off this mapping.
@ -147,8 +148,8 @@ were added in
.Nx 1.5 . .Nx 1.5 .
.Sh BUGS .Sh BUGS
For some cdroms the information in the Rock Ridge extension is wrong For some cdroms the information in the Rock Ridge extension is wrong
and the cdrom needs to be mounted with "norrip". A sign that something and the cdrom needs to be mounted with "norrip".
is wrong is that the A sign that something is wrong is that the
.Xr stat 2 .Xr stat 2
system call returns system call returns
.Er EBADF .Er EBADF

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_ffs.8,v 1.9 2001/11/16 11:21:38 wiz Exp $ .\" $NetBSD: mount_ffs.8,v 1.10 2002/10/01 13:40:39 wiz Exp $
.\" .\"
.\" Copyright (c) 1980, 1989, 1991, 1993 .\" Copyright (c) 1980, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -54,9 +54,8 @@ device on to the file system tree at point
.Pp .Pp
The The
.Nm mount_ufs .Nm mount_ufs
form of the command is meant for backward form of the command is meant for backward compatibility only.
compatibility only. Fast File Systems should no longer Fast File Systems should no longer be listed as type
be listed as type
.Dq ufs .Dq ufs
in in
.Xr fstab 5 .Xr fstab 5

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_filecore.8,v 1.7 2001/11/16 11:58:28 wiz Exp $ .\" $NetBSD: mount_filecore.8,v 1.8 2002/10/01 13:40:39 wiz Exp $
.\" .\"
.\" Copyright (c) 1998 Mark Brinicombe .\" Copyright (c) 1998 Mark Brinicombe
.\" Copyright (c) 1993,1994 Christopher G. Demetriou .\" Copyright (c) 1993,1994 Christopher G. Demetriou
@ -49,9 +49,10 @@
The The
.Nx .Nx
FILECORE filesystem is a read only implementation of the filecore file system FILECORE filesystem is a read only implementation of the filecore file system
found in Acorn Computers RISC OS operating system. This operating system found in Acorn Computers RISC OS operating system.
is the ROM based operating system found on their ARM 6, ARM7 and This operating system is the ROM based operating system
StrongARM 110 based RiscPC machines that are supported by the arm32 port. found on their ARM 6, ARM7 and StrongARM 110 based RiscPC machines
that are supported by the arm32 port.
Under RISC OS, filecore will have multiple instantiations for file Under RISC OS, filecore will have multiple instantiations for file
systems on different block devices such as floppies, IDE discs, SCSI discs systems on different block devices such as floppies, IDE discs, SCSI discs
etc. and these frquently are considered to be different filesystems etc. and these frquently are considered to be different filesystems
@ -96,7 +97,8 @@ Give all files owner access.
.It Fl R .It Fl R
Give all files owner read access. Give all files owner read access.
.It Fl f .It Fl f
Append the filetype to each filename. This option currently has no effect. Append the filetype to each filename.
This option currently has no effect.
.El .El
.Sh SEE ALSO .Sh SEE ALSO
.Xr mount 2 , .Xr mount 2 ,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_msdos.8,v 1.22 2001/11/16 11:26:56 wiz Exp $ .\" $NetBSD: mount_msdos.8,v 1.23 2002/10/01 13:40:40 wiz Exp $
.\" .\"
.\" Copyright (c) 1993, 1994 Christopher G. Demetriou .\" Copyright (c) 1993, 1994 Christopher G. Demetriou
.\" All rights reserved. .\" All rights reserved.
@ -119,17 +119,21 @@ searches the root directory of the filesystem to
be mounted for any existing Win'95 long filenames. be mounted for any existing Win'95 long filenames.
If no such entries are found, If no such entries are found,
.Fl s .Fl s
is the default. Otherwise is the default.
Otherwise
.Fl l .Fl l
is assumed. is assumed.
.It Fl 9 .It Fl 9
Ignore the special Win'95 directory entries even Ignore the special Win'95 directory entries even
if deleting or renaming a file. This forces if deleting or renaming a file.
This forces
.Fl s . .Fl s .
.It Fl G .It Fl G
This option causes the filesystem to be interpreted as an Atari-Gemdos This option causes the filesystem to be interpreted as an Atari-Gemdos
filesystem. The differences to the msdos filesystem are minimal and filesystem.
limited to the boot block. This option enforces The differences to the msdos filesystem are minimal and
limited to the boot block.
This option enforces
.Fl s . .Fl s .
.El .El
.Sh SEE ALSO .Sh SEE ALSO
@ -163,6 +167,7 @@ The default handling for
and and
.Fl l .Fl l
will result in empty filesystems to be populated will result in empty filesystems to be populated
with short filenames only. To generate long filenames with short filenames only.
To generate long filenames
on empty DOS filesystems use on empty DOS filesystems use
.Fl l . .Fl l .

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_nfs.8,v 1.18 2002/05/15 01:58:16 simonb Exp $ .\" $NetBSD: mount_nfs.8,v 1.19 2002/10/01 13:40:41 wiz Exp $
.\" .\"
.\" Copyright (c) 1992, 1993, 1994, 1995 .\" Copyright (c) 1992, 1993, 1994, 1995
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -101,7 +101,8 @@ The options are:
.It Fl 2 .It Fl 2
Use the NFS Version 2 protocol. Use the NFS Version 2 protocol.
.It Fl 3 .It Fl 3
Use the NFS Version 3 protocol. The default is to try version 3 first, and Use the NFS Version 3 protocol.
The default is to try version 3 first, and
fall back to version 2 if the mount fails. fall back to version 2 if the mount fails.
.It Fl D .It Fl D
Used with NQNFS to set the Used with NQNFS to set the
@ -117,7 +118,8 @@ Values may be set in the range of 1 - 9, with 9 referring to an
This option is not generally recommended and is really an experimental This option is not generally recommended and is really an experimental
feature. feature.
.It Fl I .It Fl I
Set the readdir read size to the specified value. The value should normally Set the readdir read size to the specified value.
The value should normally
be a multiple of DIRBLKSIZ that is \*[Le] the read size for the mount. be a multiple of DIRBLKSIZ that is \*[Le] the read size for the mount.
.It Fl K .It Fl K
Pass Kerberos authenticators to the server for client-to-server Pass Kerberos authenticators to the server for client-to-server
@ -131,14 +133,16 @@ Used with NQNFS to set the lease term to the specified number of seconds.
Only use this argument for mounts with a large round trip delay. Only use this argument for mounts with a large round trip delay.
Values are normally in the 10-30 second range. Values are normally in the 10-30 second range.
.It Fl P .It Fl P
Use a reserved socket port number. This is the default, and available Use a reserved socket port number.
This is the default, and available
for backwards compatibility purposes only. for backwards compatibility purposes only.
.It Fl R .It Fl R
Set the retry count for doing the mount to the specified value. Set the retry count for doing the mount to the specified value.
.It Fl T .It Fl T
Use TCP transport instead of UDP. Use TCP transport instead of UDP.
This is recommended for servers that are not on the same physical network as This is recommended for servers that are not on the same physical network as
the client. Not all NFS servers, especially not old ones, support this. the client.
Not all NFS servers, especially not old ones, support this.
.It Fl U .It Fl U
Force the mount protocol to use UDP transport, even for TCP NFS mounts. Force the mount protocol to use UDP transport, even for TCP NFS mounts.
(Necessary for some old (Necessary for some old
@ -148,10 +152,11 @@ servers.)
Perform 32 \*[Lt]-\*[Gt] 64 bit directory cookie translation for version 3 mounts. Perform 32 \*[Lt]-\*[Gt] 64 bit directory cookie translation for version 3 mounts.
This may be need in the case of a server using the upper 32 bits of This may be need in the case of a server using the upper 32 bits of
v3 directory cookies, and when you are running emulated binaries v3 directory cookies, and when you are running emulated binaries
that access such a filesystem. Native that access such a filesystem.
Native
.Nx .Nx
binaries will never need this binaries will never need this option.
option. This option introduces some overhead. This option introduces some overhead.
.It Fl a .It Fl a
Set the read-ahead count to the specified value. Set the read-ahead count to the specified value.
This may be in the range of 0 - 4, and determines how many blocks This may be in the range of 0 - 4, and determines how many blocks
@ -174,7 +179,8 @@ For UDP mount points, do a
Although this flag increases the efficiency of UDP mounts it cannot Although this flag increases the efficiency of UDP mounts it cannot
be used for servers that do not reply to requests from the be used for servers that do not reply to requests from the
standard NFS port number 2049, or for servers with multiple network standard NFS port number 2049, or for servers with multiple network
interfaces. In these cases if the socket is connected and the server interfaces.
In these cases if the socket is connected and the server
replies from a different port number or a different network interface replies from a different port number or a different network interface
the client will get ICMP port unreachable and the mount will hang. the client will get ICMP port unreachable and the mount will hang.
.It Fl d .It Fl d
@ -199,9 +205,9 @@ be used.
This option reduces RPC traffic for cases such as This option reduces RPC traffic for cases such as
.Dq "ls -l" , .Dq "ls -l" ,
but tends to flood the attribute and name caches with prefetched entries. but tends to flood the attribute and name caches with prefetched entries.
Try this option and see whether performance improves or degrades. Probably Try this option and see whether performance improves or degrades.
most useful for client to server network interconnects with a large bandwidth Probably most useful for client to server network
times delay product. interconnects with a large bandwidth times delay product.
.It Fl m .It Fl m
Set the Kerberos realm to the string argument. Set the Kerberos realm to the string argument.
Used with the Used with the
@ -215,9 +221,9 @@ See the
.Xr mount 8 .Xr mount 8
man page for possible options and their meanings. man page for possible options and their meanings.
.It Fl p .It Fl p
Do not use a reserved port number for RPCs. This option is provided only Do not use a reserved port number for RPCs.
to be able to mimic the old default behavior of not using a reserved This option is provided only to be able to mimic the old
port, and should rarely be useful. default behavior of not using a reserved port, and should rarely be useful.
.It Fl q .It Fl q
Use the leasing extensions to the NFS Version 3 protocol Use the leasing extensions to the NFS Version 3 protocol
to maintain cache consistency. to maintain cache consistency.
@ -228,9 +234,8 @@ that was part of the first release of
.Bx 4.4 Lite . .Bx 4.4 Lite .
To interoperate with a first release To interoperate with a first release
.Bx 4.4 Lite .Bx 4.4 Lite
NFS system you will have to NFS system you will have to avoid this option until you have had
avoid this option until you have had an opportunity to upgrade the NFS code an opportunity to upgrade the NFS code to release 2 of
to release 2 of
.Bx 4.4 Lite .Bx 4.4 Lite
on all your systems. on all your systems.
.It Fl r .It Fl r
@ -267,7 +272,7 @@ tune the timeout
interval.) interval.)
.It Fl w .It Fl w
Set the write data size to the specified value. Set the write data size to the specified value.
Ditto the comments w.r.t. the Ditto the comments with respect to the
.Fl r .Fl r
option, but using the option, but using the
.Dq "fragments dropped after timeout" .Dq "fragments dropped after timeout"
@ -297,7 +302,8 @@ by using a line like:
.Dl "remotehost:/home /home nfs rw 0 0 .Dl "remotehost:/home /home nfs rw 0 0
.Sh PERFORMANCE .Sh PERFORMANCE
As can be derived from the comments accompanying the options, performance As can be derived from the comments accompanying the options, performance
tuning of NFS can be a non-trivial task. Here are some common points tuning of NFS can be a non-trivial task.
Here are some common points
to watch: to watch:
.Bl -bullet -offset indent .Bl -bullet -offset indent
.It .It
@ -306,19 +312,25 @@ Increasing the read and write size with the
and and
.Fl w .Fl w
options respectively will increase throughput if the hardware can handle options respectively will increase throughput if the hardware can handle
the larger packet sizes. The default size for version 2 is 8k when the larger packet sizes.
using UDP, 64k when using TCP. The default size for v3 is platform dependent: The default size for version 2 is 8k when
on i386, the default is 32k, for other platforms it is 8k. Values over using UDP, 64k when using TCP.
32k are only supported for TCP, where 64k is the maximum. Any value The default size for v3 is platform dependent:
on i386, the default is 32k, for other platforms it is 8k.
Values over
32k are only supported for TCP, where 64k is the maximum.
Any value
over 32k is unlikely to get you more performance, unless you have over 32k is unlikely to get you more performance, unless you have
a very fast network. a very fast network.
.It .It
If the hardware can not handle larger packet sizes, you may see low If the hardware can not handle larger packet sizes, you may see low
performance figures or even temporary hangups during NFS activity. performance figures or even temporary hangups during NFS activity.
This can especially happen with older ethernet cards. What happens This can especially happen with older ethernet cards.
What happens
is that either the buffer on the card on the client side is overflowing, is that either the buffer on the card on the client side is overflowing,
or that similar events occur on the server, leading to a lot or that similar events occur on the server, leading to a lot
of dropped packets. In this case, decreasing the read and write size, of dropped packets.
In this case, decreasing the read and write size,
using TCP, or a combination of both will usually lead to better throughput. using TCP, or a combination of both will usually lead to better throughput.
Should you need to decrease the read and write size for all your NFS mounts Should you need to decrease the read and write size for all your NFS mounts
because of a slow ethernet card, you can use because of a slow ethernet card, you can use
@ -344,11 +356,13 @@ the filesystem you requested, or is not exporting it to your host.
If you believe the remote host is indeed exporting a filesystem to you, If you believe the remote host is indeed exporting a filesystem to you,
make sure the make sure the
.Xr exports 5 .Xr exports 5
file is exporting the proper directories. A common mistake is that file is exporting the proper directories.
A common mistake is that
mountd will not export a filesystem with the mountd will not export a filesystem with the
.Fl alldirs .Fl alldirs
option, unless it option, unless it
is a mount point on the exporting host. It is not possible to remotely is a mount point on the exporting host.
It is not possible to remotely
mount a subdirectory of an exported mount, unless it is exported with the mount a subdirectory of an exported mount, unless it is exported with the
.Fl alldirs .Fl alldirs
option. option.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_ntfs.8,v 1.10 2001/11/16 11:59:47 wiz Exp $ .\" $NetBSD: mount_ntfs.8,v 1.11 2002/10/01 13:40:41 wiz Exp $
.\" .\"
.\" Copyright (c) 1993,1994 Christopher G. Demetriou .\" Copyright (c) 1993,1994 Christopher G. Demetriou
.\" Copyright (c) 1999 Semen Ustimenko .\" Copyright (c) 1999 Semen Ustimenko
@ -93,10 +93,11 @@ foo[[:ATTRTYPE]:ATTRNAME]
.Ed .Ed
.Pp .Pp
.Sq ATTRTYPE .Sq ATTRTYPE
is one of identifier listed in $AttrDef file of is one of identifier listed in $AttrDef file of volume.
volume. Default is $DATA. Default is $DATA.
.Sq ATTRNAME .Sq ATTRNAME
is an attribute name. Default is none. is an attribute name.
Default is none.
.Pp .Pp
.Sy Examples : .Sy Examples :
.Pp .Pp
@ -110,7 +111,8 @@ To read directory raw data:
# cat /mnt/foodir:\\$INDEX_ROOT:\\$I30 # cat /mnt/foodir:\\$INDEX_ROOT:\\$I30
.Ed .Ed
.Ss Limited support for writing .Ss Limited support for writing
There is limited writing ability for files. Limitations: There is limited writing ability for files.
Limitations:
.Bl -bullet -compact .Bl -bullet -compact
.It .It
file must be nonresident file must be nonresident
@ -126,9 +128,9 @@ Note that that it's not currently possible to create or remove files
on NTFS filesystem. on NTFS filesystem.
.Pp .Pp
.Sy Warning : .Sy Warning :
do not mount NTFS filesystems read-write. The write support is do not mount NTFS filesystems read-write.
not very useful and is not tested well. It's not safe to write to any file The write support is not very useful and is not tested well.
on NTFS, you might damage the filesystem. It's not safe to write to any file on NTFS, you might damage the filesystem.
Unless you want to debug NTFS filesystem code, mount the NTFS filesystem Unless you want to debug NTFS filesystem code, mount the NTFS filesystem
read-only. read-only.
.Sh SEE ALSO .Sh SEE ALSO

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_null.8,v 1.16 2002/03/30 15:28:35 groo Exp $ .\" $NetBSD: mount_null.8,v 1.17 2002/10/01 13:40:42 wiz Exp $
.\" .\"
.\" Copyright (c) 1992, 1993, 1994 .\" Copyright (c) 1992, 1993, 1994
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -107,23 +107,24 @@ New null layers are created with
.Nm .Nm
takes two arguments, the pathname takes two arguments, the pathname
of the lower vfs (target-pn) and the pathname where the null of the lower vfs (target-pn) and the pathname where the null
layer will appear in the namespace (mount-point-pn). After layer will appear in the namespace (mount-point-pn).
the null layer is put into place, the contents After the null layer is put into place, the contents
of target-pn subtree will be aliased under mount-point-pn. of target-pn subtree will be aliased under mount-point-pn.
.\" .\"
.\" .\"
.Sh OPERATION OF A NULL LAYER .Sh OPERATION OF A NULL LAYER
The null layer is the minimum file system layer, The null layer is the minimum file system layer,
simply passing all possible operations to the lower layer simply passing all possible operations to the lower layer
for processing there. The majority of its activity centers for processing there.
on the bypass routine, through which nearly all vnode operations The majority of its activity centers on the bypass routine,
pass. through which nearly all vnode operations pass.
.Pp .Pp
The bypass routine accepts arbitrary vnode operations for The bypass routine accepts arbitrary vnode operations for
handling by the lower layer. It begins by examining vnode handling by the lower layer.
operation arguments and replacing any null-nodes by their It begins by examining vnode operation arguments and replacing
lower-layer equivalents. It then invokes the operation any null-nodes by their lower-layer equivalents.
on the lower layer. Finally, it replaces the null-nodes It then invokes the operation on the lower layer.
Finally, it replaces the null-nodes
in the arguments and, if a vnode is returned by the operation, in the arguments and, if a vnode is returned by the operation,
stacks a null-node on top of the returned vnode. stacks a null-node on top of the returned vnode.
.Pp .Pp
@ -146,11 +147,13 @@ information.
.\" .\"
.Sh INSTANTIATING VNODE STACKS .Sh INSTANTIATING VNODE STACKS
Mounting associates the null layer with a lower layer, Mounting associates the null layer with a lower layer,
in effect stacking two VFSes. Vnode stacks are instead in effect stacking two VFSes.
Vnode stacks are instead
created on demand as files are accessed. created on demand as files are accessed.
.Pp .Pp
The initial mount creates a single vnode stack for the The initial mount creates a single vnode stack for the
root of the new null layer. All other vnode stacks root of the new null layer.
All other vnode stacks
are created as a result of vnode operations on are created as a result of vnode operations on
this or other null vnode stacks. this or other null vnode stacks.
.Pp .Pp
@ -169,19 +172,16 @@ will assign
the root null-node (which was created when the null layer was mounted). the root null-node (which was created when the null layer was mounted).
Now consider opening Now consider opening
.Pa sys . .Pa sys .
A vop_lookup would be A vop_lookup would be done on the root null-node.
done on the root null-node. This operation would bypass through This operation would bypass through to the lower layer
to the lower layer which would return a vnode representing which would return a vnode representing the UFS
the UFS
.Pa sys . .Pa sys .
null_bypass then builds a null-node null_bypass then builds a null-node aliasing the UFS
aliasing the UFS
.Pa sys .Pa sys
and returns this to the caller. and returns this to the caller.
Later operations on the null-node Later operations on the null-node
.Pa sys .Pa sys
will repeat this will repeat this process when constructing other vnode stacks.
process when constructing other vnode stacks.
.\" .\"
.\" .\"
.Sh CREATING OTHER FILE SYSTEM LAYERS .Sh CREATING OTHER FILE SYSTEM LAYERS
@ -197,16 +197,16 @@ null layer.
.\" .\"
.Sh INVOKING OPERATIONS ON LOWER LAYERS .Sh INVOKING OPERATIONS ON LOWER LAYERS
There are two techniques to invoke operations on a lower layer There are two techniques to invoke operations on a lower layer
when the operation cannot be completely bypassed. Each method when the operation cannot be completely bypassed.
is appropriate in different situations. In both cases, Each method is appropriate in different situations.
it is the responsibility of the aliasing layer to make In both cases, it is the responsibility of the aliasing layer to make
the operation arguments "correct" for the lower layer the operation arguments "correct" for the lower layer
by mapping any vnode arguments to the lower layer. by mapping any vnode arguments to the lower layer.
.Pp .Pp
The first approach is to call the aliasing layer's bypass routine. The first approach is to call the aliasing layer's bypass routine.
This method is most suitable when you wish to invoke the operation This method is most suitable when you wish to invoke the operation
currently being handled on the lower layer. It has the advantage currently being handled on the lower layer.
that the bypass routine already must do argument mapping. It has the advantage that the bypass routine already must do argument mapping.
An example of this is An example of this is
.Em null_getattrs .Em null_getattrs
in the null layer. in the null layer.
@ -216,8 +216,8 @@ the lower layer with the
.Em VOP_OPERATIONNAME .Em VOP_OPERATIONNAME
interface. interface.
The advantage of this method is that it is easy to invoke The advantage of this method is that it is easy to invoke
arbitrary operations on the lower layer. The disadvantage arbitrary operations on the lower layer.
is that vnode arguments must be manually mapped. The disadvantage is that vnode arguments must be manually mapped.
.\" .\"
.\" .\"
.Sh SEE ALSO .Sh SEE ALSO

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_overlay.8,v 1.5 2001/06/07 13:58:24 wiz Exp $ .\" $NetBSD: mount_overlay.8,v 1.6 2002/10/01 13:40:42 wiz Exp $
.\" .\"
.\" Copyright (c) 1992, 1993, 1994 .\" Copyright (c) 1992, 1993, 1994
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -78,7 +78,8 @@ file system can be created very easily by starting
with an overlay layer. with an overlay layer.
.Pp .Pp
The internal operation of the overlay layer is identical to that of the The internal operation of the overlay layer is identical to that of the
null layer. See its documentation for details. null layer.
See its documentation for details.
.Sh SEE ALSO .Sh SEE ALSO
.Xr mount 8 , .Xr mount 8 ,
.Xr mount_null 8 .Xr mount_null 8

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_portal.8,v 1.15 2002/02/08 01:30:44 ross Exp $ .\" $NetBSD: mount_portal.8,v 1.16 2002/10/01 13:40:43 wiz Exp $
.\" .\"
.\" Copyright (c) 1993, 1994 .\" Copyright (c) 1993, 1994
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -108,18 +108,20 @@ The
and and
.Pa wfilter .Pa wfilter
namespaces open a pipe to a process, typically a data-filter such namespaces open a pipe to a process, typically a data-filter such
as compression or decompression programs. The as compression or decompression programs.
The
.Pa rfilter .Pa rfilter
namespace opens a read-only pipe, while the namespace opens a read-only pipe, while the
.Pa wfilter .Pa wfilter
namespace opens a write-only pipe. See the EXAMPLES section namespace opens a write-only pipe.
below for more examples. See the EXAMPLES section below for more examples.
.Sh CONFIGURATION FILE .Sh CONFIGURATION FILE
The configuration file contains a list of rules. The configuration file contains a list of rules.
Each rule takes one line and consists of two or more Each rule takes one line and consists of two or more
whitespace separated fields. whitespace separated fields.
A hash (``#'') character causes the remainder of a line to A hash (``#'') character causes the remainder of a line to
be ignored. Blank lines are ignored. be ignored.
Blank lines are ignored.
.Pp .Pp
The first field is a pathname prefix to match The first field is a pathname prefix to match
against the requested pathname. against the requested pathname.
@ -133,15 +135,15 @@ and
.Pa wfilter .Pa wfilter
namespaces have additional meanings for the remaining fields. namespaces have additional meanings for the remaining fields.
The third field specifies a prefix that is to be stripped off of The third field specifies a prefix that is to be stripped off of
the passed name before passing it on to the pipe program. If the the passed name before passing it on to the pipe program.
prefix does not match, no stripping is performed. The fourth If the prefix does not match, no stripping is performed.
argument specifies the program to use for the pipe. Any The fourth argument specifies the program to use for the pipe.
remaining fields are passed to the pipe program. If the Any remaining fields are passed to the pipe program.
string If the string
.Dq Li "%s" .Dq Li "%s"
exists within these remaining fields, it will be replaced by the exists within these remaining fields, it will be replaced by the
path after stripping is performed. If there is no field after path after stripping is performed.
the program name, If there is no field after the program name,
.Dq Li "%s" .Dq Li "%s"
will be assumed, to maintain similarity with the will be assumed, to maintain similarity with the
.Pa tcp .Pa tcp
@ -154,8 +156,8 @@ namespaces.
.El .El
.Sh EXAMPLES .Sh EXAMPLES
A tutorial and several examples are provided in A tutorial and several examples are provided in
/usr/share/examples/mount_portal. The following is an example /usr/share/examples/mount_portal.
configuration file. The following is an example configuration file.
.Pp .Pp
.Bd -literal .Bd -literal
# @(#)portal.conf 5.1 (Berkeley) 7/13/92 # @(#)portal.conf 5.1 (Berkeley) 7/13/92
@ -174,16 +176,19 @@ bzcat/ rfilter bzcat/ bzcat %s
nroff/ rfilter nroff/ nroff -man %s nroff/ rfilter nroff/ nroff -man %s
.Ed .Ed
.Pp .Pp
As is true with many other filesystems, a weird sense of humor is As is true with many other filesystems,
handy. a weird sense of humor is handy.
.Pp .Pp
Notice that after the keynames, like nroff/ and bzcat/, we Notice that after the keynames, like nroff/ and bzcat/, we
typically use another slash. In reality, the typically use another slash.
In reality, the
.Nm .Nm
process changes directory to /, which makes the subsequent slash process changes directory to /, which makes the subsequent slash
unnecessary. However, the extra slash provides a visual hint unnecessary.
that we are not operating on an ordinary file. An alternative However, the extra slash provides a visual hint
would be to change the configuration file to something like: that we are not operating on an ordinary file.
An alternative would be to change the configuration
file to something like:
.Bd -literal .Bd -literal
nroff% rfilter nroff% nroff -man nroff% rfilter nroff% nroff -man
.Ed .Ed

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_procfs.8,v 1.22 2002/05/31 16:48:28 atatat Exp $ .\" $NetBSD: mount_procfs.8,v 1.23 2002/10/01 13:40:44 wiz Exp $
.\" .\"
.\" Copyright (c) 1992, 1993 .\" Copyright (c) 1992, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -68,13 +68,14 @@ Options are specified with a
flag followed by a comma separated string of options. flag followed by a comma separated string of options.
See the See the
.Xr mount 8 .Xr mount 8
man page for possible generic options and their meanings. Currently, one man page for possible generic options and their meanings.
procfs-specific option is defined, the Currently, one procfs-specific option is defined, the
.Cm linux .Cm linux
option. This option enables a few extra features that are compatible option.
with the proc filesystem as implemented in Linux. This option can This option enables a few extra features that are compatible
be used if you run Linux binaries that need Linux-specific features with the proc filesystem as implemented in Linux.
in the proc filesystem (see also This option can be used if you run Linux binaries that need
Linux-specific features in the proc filesystem (see also
.Xr compat_linux 8 ) . .Xr compat_linux 8 ) .
.El .El
.Pp .Pp
@ -86,7 +87,8 @@ In addition, the special entries
.Pa curproc .Pa curproc
and and
.Pa self .Pa self
reference the current process. The reference the current process.
The
.Pa self .Pa self
symlink appears for compatibility with the Linux procfs implementation. symlink appears for compatibility with the Linux procfs implementation.
.Pp .Pp
@ -94,12 +96,11 @@ Each directory contains several files.
.Bl -tag -width status .Bl -tag -width status
.It Pa cmdline .It Pa cmdline
This file is readonly and returns null-terminated strings This file is readonly and returns null-terminated strings
corresponding to the process' command line arguments. For corresponding to the process' command line arguments.
a system or zombie process, this file contains only a string For a system or zombie process, this file contains only a string
with the name of the process. with the name of the process.
.It Pa ctl .It Pa ctl
a writeonly file which supports a variety a writeonly file which supports a variety of control operations.
of control operations.
Control commands are written as strings to the Control commands are written as strings to the
.Pa ctl .Pa ctl
file. file.
@ -138,9 +139,10 @@ or to start another copy of the process.
A map of the process' virtual memory. A map of the process' virtual memory.
.It Pa maps .It Pa maps
A map of the process' virtual memory in a form like the A map of the process' virtual memory in a form like the
proc filesystem as implemented in Linux. Note that the paths proc filesystem as implemented in Linux.
corresponding to file backed mappings will not be present unless Note that the paths corresponding to file backed mappings will
the kernel was built with the NAMECACHE_ENTER_REVERSE option. not be present unless the kernel was built with the
NAMECACHE_ENTER_REVERSE option.
.It Pa mem .It Pa mem
The complete virtual memory image of the process. The complete virtual memory image of the process.
Only those addresses which exist in the process can be accessed. Only those addresses which exist in the process can be accessed.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_umap.8,v 1.14 2001/11/16 11:21:38 wiz Exp $ .\" $NetBSD: mount_umap.8,v 1.15 2002/10/01 13:40:44 wiz Exp $
.\" .\"
.\" Copyright (c) 1992, 1993, 1994 .\" Copyright (c) 1992, 1993, 1994
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -87,9 +87,10 @@ The
.Nm .Nm
command uses a set of files provided by the user to make correspondences command uses a set of files provided by the user to make correspondences
between uids and gids in the sub-tree's original environment and between uids and gids in the sub-tree's original environment and
some other set of ids in the local environment. For instance, user some other set of ids in the local environment.
smith might have uid 1000 in the original environment, while having For instance, user smith might have uid 1000 in the original environment,
uid 2000 in the local environment. The while having uid 2000 in the local environment.
The
.Nm .Nm
command allows the subtree from smith's original environment to be command allows the subtree from smith's original environment to be
mapped in such a way that all files with owning uid 1000 look like mapped in such a way that all files with owning uid 1000 look like
@ -108,7 +109,8 @@ describe the mappings to be made between identifiers.
.Pp .Pp
The format of the user and group ID mapping files is very simple. The format of the user and group ID mapping files is very simple.
The first line of the file is the total number of mappings present The first line of the file is the total number of mappings present
in the file. The remaining lines each consist of two numbers: the in the file.
The remaining lines each consist of two numbers: the
ID in the mapped subtree and the ID in the original subtree. ID in the mapped subtree and the ID in the original subtree.
.Pp .Pp
For example, to map uid 1000 in the original subtree to uid 2000 For example, to map uid 1000 in the original subtree to uid 2000
@ -131,7 +133,8 @@ The mapfiles can be located anywhere in the file hierarchy, but they
must be owned by root, and they must be writable only by root. must be owned by root, and they must be writable only by root.
.Nm .Nm
will refuse to map the sub-tree if the ownership or permissions on will refuse to map the sub-tree if the ownership or permissions on
these files are improper. It will also report an error if the count these files are improper.
It will also report an error if the count
of mappings in the first line of the map files is not correct. of mappings in the first line of the map files is not correct.
.Sh SEE ALSO .Sh SEE ALSO
.Xr mount 8 , .Xr mount 8 ,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount_mfs.8,v 1.5 2002/08/20 16:07:45 wiz Exp $ .\" $NetBSD: mount_mfs.8,v 1.6 2002/10/01 13:40:46 wiz Exp $
.\" .\"
.\" Copyright (c) 1983, 1987, 1991, 1993, 1994 .\" Copyright (c) 1983, 1987, 1991, 1993, 1994
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -77,7 +77,8 @@ Options with numeric arguments may contain an optional (case-insensitive)
suffix: suffix:
.Bl -tag -width 3n -offset indent -compact .Bl -tag -width 3n -offset indent -compact
.It b .It b
Bytes; causes no modification. (Default) Bytes; causes no modification.
(Default)
.It k .It k
Kilo; multiply the argument by 1024 Kilo; multiply the argument by 1024
.It m .It m

View File

@ -1,4 +1,4 @@
.\" $NetBSD: newfs.8,v 1.44 2002/09/28 20:11:07 dbj Exp $ .\" $NetBSD: newfs.8,v 1.45 2002/10/01 13:40:45 wiz Exp $
.\" .\"
.\" Copyright (c) 1983, 1987, 1991, 1993, 1994 .\" Copyright (c) 1983, 1987, 1991, 1993, 1994
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -85,7 +85,8 @@ Options with numeric arguments may contain an optional (case-insensitive)
suffix: suffix:
.Bl -tag -width 3n -offset indent -compact .Bl -tag -width 3n -offset indent -compact
.It b .It b
Bytes; causes no modification. (Default) Bytes; causes no modification.
(Default)
.It k .It k
Kilo; multiply the argument by 1024 Kilo; multiply the argument by 1024
.It m .It m

View File

@ -1,4 +1,4 @@
.\" $NetBSD: newfs_lfs.8,v 1.17 2002/01/21 18:24:06 wiz Exp $ .\" $NetBSD: newfs_lfs.8,v 1.18 2002/10/01 13:40:46 wiz Exp $
.\" .\"
.\" Copyright (c) 1993 .\" Copyright (c) 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -51,7 +51,8 @@ Before running
.Nm .Nm
the disk must be labeled using the disk must be labeled using
.Xr disklabel 8 , .Xr disklabel 8 ,
the proper fstype is 4.4LFS. Reasonable values for the the proper fstype is 4.4LFS.
Reasonable values for the
.Li fsize , .Li fsize ,
.Li bsize , .Li bsize ,
and and
@ -66,56 +67,66 @@ Attempt to compute the appropriate segment size using the formula
The disk is tested for twenty seconds The disk is tested for twenty seconds
to discover its bandwidth and seek time. to discover its bandwidth and seek time.
.It Fl B Ar logical-segment-size .It Fl B Ar logical-segment-size
The logical segment size of the file system in bytes. If not specified, The logical segment size of the file system in bytes.
the segment size is computed by left-shifting the partition label's block If not specified, the segment size is computed by left-shifting
size by the amount indicated in the partition table's segshift. If the the partition label's block size by the amount indicated in the
disklabel indicates a zero block size or segment shift, a compile-time default partition table's segshift.
segment size of 1M is used. If the disklabel indicates a zero block size or segment shift,
a compile-time default segment size of 1M is used.
.It Fl b Ar block-size .It Fl b Ar block-size
The block size of the file system in bytes. If not specified, the block The block size of the file system in bytes.
size is taken from the partition label, or if the partition label If not specified, the block size is taken from the partition label,
indicates 0, a compile-time default of 8K is used. or if the partition label indicates 0,
a compile-time default of 8K is used.
.It Fl F .It Fl F
Force creation of an LFS even on a partition labeled as another type. Force creation of an LFS even on a partition labeled as another type.
.Nm .Nm
will use compile-time default values for block and fragment size, and segment will use compile-time default values for block and fragment size, and segment
shift, unless these are overridden by command-line flags. shift, unless these are overridden by command-line flags.
.It Fl f Ar fragment-size .It Fl f Ar fragment-size
The fragment size of the file system in bytes. If not specified, The fragment size of the file system in bytes.
the fragment size is taken from the partition label, or if the partition If not specified, the fragment size is taken from the partition label,
label indicates 0, a compile-time default of 1K is used. or if the partition label indicates 0,
a compile-time default of 1K is used.
.It Fl I Ar interleave .It Fl I Ar interleave
Specify the interleave between segments. The default is zero. Specify the interleave between segments.
The default is zero.
.It Fl i .It Fl i
The size of an inode block, in bytes. The default is to use the same The size of an inode block, in bytes.
size as a fragment, or in a v1 filesystem, the same size as a data block. The default is to use the same size as a fragment,
or in a v1 filesystem, the same size as a data block.
.It Fl L .It Fl L
Create a log-structured file system (LFS). This is the default, and this Create a log-structured file system (LFS).
This is the default, and this
option is provided for compatibility only. option is provided for compatibility only.
.It Fl M Ar nsegs .It Fl M Ar nsegs
Reserve this many segments for use exclusively by the cleaner, instead Reserve this many segments for use exclusively by the cleaner, instead
of letting of letting
.Nm .Nm
do the computation. Do not use this option. do the computation.
Do not use this option.
.It Fl m Ar free space \&% .It Fl m Ar free space \&%
The percentage of space reserved from normal users; the minimum The percentage of space reserved from normal users; the minimum
free space threshold. The default value used is 10%. free space threshold.
The default value used is 10%.
.It Fl N .It Fl N
Do not actually create the filesystem. Do not actually create the filesystem.
.It Fl O Ar offset .It Fl O Ar offset
Start the first segment this many sectors from the beginning of the Start the first segment this many sectors from the beginning of the
partition. The default is zero. partition.
The default is zero.
.It Fl r Ar ident .It Fl r Ar ident
For a v2 filesystem, specify the roll-forward identifier for the For a v2 filesystem, specify the roll-forward identifier for the
filesystem. This identifier, a 32-bit numeric quantity, filesystem.
This identifier, a 32-bit numeric quantity,
should be different from that of any LFS that may previously should be different from that of any LFS that may previously
have existed on the same disk. By default the have existed on the same disk.
identifier is chosen at random. By default the identifier is chosen at random.
.It Fl s Ar size .It Fl s Ar size
The size of the file system in sectors. The size of the file system in sectors.
.It Fl v Ar version .It Fl v Ar version
Make a filesystem with the specified disk layout version. Valid options Make a filesystem with the specified disk layout version.
are 1 or 2 (the default). Valid options are 1 or 2 (the default).
.El .El
.Sh SEE ALSO .Sh SEE ALSO
.Xr disktab 5 , .Xr disktab 5 ,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: newfs_msdos.8,v 1.8 2001/11/16 11:21:38 wiz Exp $ .\" $NetBSD: newfs_msdos.8,v 1.9 2002/10/01 13:40:47 wiz Exp $
.\" Copyright (c) 1998 Robert Nordier .\" Copyright (c) 1998 Robert Nordier
.\" All rights reserved. .\" All rights reserved.
.\" .\"
@ -79,42 +79,45 @@ FAT type (one of 12, 16, or 32).
.It Fl I Ar volid .It Fl I Ar volid
Volume ID. Volume ID.
.It Fl L Ar label .It Fl L Ar label
Volume label (up to 11 characters). The label should consist of Volume label (up to 11 characters).
only those characters permitted in regular DOS (8+3) filenames. The label should consist of only those characters permitted
in regular DOS (8+3) filenames.
.It Fl O Ar OEM .It Fl O Ar OEM
OEM string (up to 8 characters). The default is OEM string (up to 8 characters).
The default is
.Qq Li "BSD 4.4" . .Qq Li "BSD 4.4" .
.It Fl S Ar sector-size .It Fl S Ar sector-size
Number of bytes per sector. Acceptable values are powers of 2 Number of bytes per sector.
in the range 128 through 32768. Acceptable values are powers of 2 in the range 128 through 32768.
.It Fl a Ar FAT-size .It Fl a Ar FAT-size
Number of sectors per FAT. Number of sectors per FAT.
.It Fl b Ar block-size .It Fl b Ar block-size
File system block size (bytes per cluster). This should resolve to an File system block size (bytes per cluster).
acceptable number of sectors per cluster (see below). This should resolve to an acceptable number of sectors
per cluster (see below).
.It Fl c Ar cluster-size .It Fl c Ar cluster-size
Sectors per cluster. Acceptable values are powers of 2 in the range Sectors per cluster.
1 through 128. Acceptable values are powers of 2 in the range 1 through 128.
.It Fl e Ar dirents .It Fl e Ar dirents
Number of root directory entries (FAT12 and FAT16 only). Number of root directory entries (FAT12 and FAT16 only).
.It Fl f Ar format .It Fl f Ar format
Specify a standard (floppy disk) format. The standard formats Specify a standard (floppy disk) format.
are (capacities in kilobytes): 160, 180, 320, 360, 640, 720, 1200, The standard formats are (capacities in kilobytes):
1232, 1440, 2880. 160, 180, 320, 360, 640, 720, 1200, 1232, 1440, 2880.
.It Fl h Ar heads .It Fl h Ar heads
Number of drive heads. Number of drive heads.
.It Fl i Ar info .It Fl i Ar info
Location of the file system info sector (FAT32 only). Location of the file system info sector (FAT32 only).
A value of 0xffff signifies no info sector. A value of 0xffff signifies no info sector.
.It Fl k Ar backup .It Fl k Ar backup
Location of the backup boot sector (FAT32 only). A value Location of the backup boot sector (FAT32 only).
of 0xffff signifies no backup sector. A value of 0xffff signifies no backup sector.
.It Fl m Ar media .It Fl m Ar media
Media descriptor (acceptable range 0xf0 to 0xff). Media descriptor (acceptable range 0xf0 to 0xff).
.It Fl n Ar FATs .It Fl n Ar FATs
Number of FATs. Acceptable values are 1 to 16 inclusive. Number of FATs.
The default Acceptable values are 1 to 16 inclusive.
is 2. The default is 2.
.It Fl o Ar hidden .It Fl o Ar hidden
Number of hidden sectors. Number of hidden sectors.
.It Fl r Ar reserved .It Fl r Ar reserved
@ -127,8 +130,8 @@ Number of sectors per track.
.Sh NOTES .Sh NOTES
FAT file system parameters occupy a "Boot Sector BPB (BIOS Parameter FAT file system parameters occupy a "Boot Sector BPB (BIOS Parameter
Block)" in the first of the "reserved" sectors which precede the actual Block)" in the first of the "reserved" sectors which precede the actual
file system. For reference purposes, this structure is presented file system.
below. For reference purposes, this structure is presented below.
.Bd -literal .Bd -literal
struct bsbpb { struct bsbpb {
u_int16_t bps; /* [-S] bytes per sector */ u_int16_t bps; /* [-S] bytes per sector */

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ping.8,v 1.39 2002/04/06 15:49:30 bjh21 Exp $ .\" $NetBSD: ping.8,v 1.40 2002/10/01 13:40:48 wiz Exp $
.\" .\"
.\" Copyright (c) 1985, 1991, 1993 .\" Copyright (c) 1985, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -237,7 +237,8 @@ packets other than
that are received are listed. that are received are listed.
.It Fl w Ar maxwait .It Fl w Ar maxwait
Specifies the number of seconds to wait for a response to a packet Specifies the number of seconds to wait for a response to a packet
before transmitting the next one. The default is 10.0. before transmitting the next one.
The default is 10.0.
.El .El
.Pp .Pp
When using When using
@ -254,8 +255,8 @@ in calculating the minimum/average/maximum round-trip time numbers.
When the specified number of packets have been sent (and received) or When the specified number of packets have been sent (and received) or
if the program is terminated with a if the program is terminated with a
.Dv SIGINT , .Dv SIGINT ,
a brief summary is displayed. The summary information can be displayed a brief summary is displayed.
while The summary information can be displayed while
.Nm .Nm
is running by sending it a is running by sending it a
.Dv SIGINFO .Dv SIGINFO
@ -267,27 +268,32 @@ for more information).
.Pp .Pp
.Nm .Nm
continually sends one datagram per second, and prints one line of continually sends one datagram per second, and prints one line of
output for every ECHO_RESPONSE returned. On a trusted system with IP output for every ECHO_RESPONSE returned.
On a trusted system with IP
Security Options enabled, if the network idiom is not MONO, Security Options enabled, if the network idiom is not MONO,
.Nm .Nm
also prints a second line containing the hexadecimal representation also prints a second line containing the hexadecimal representation
of the IP security option in the ECHO_RESPONSE. If the of the IP security option in the ECHO_RESPONSE.
If the
.Fl c .Fl c
count option is given, only that number of requests is sent. No count option is given, only that number of requests is sent.
output is produced if there is no response. Round-trip times and No output is produced if there is no response.
packet loss statistics are computed. If duplicate packets are Round-trip times and packet loss statistics are computed.
received, they are not included in the packet loss calculation, If duplicate packets are received,
they are not included in the packet loss calculation,
although the round trip time of these packets is used in calculating although the round trip time of these packets is used in calculating
the minimum/average/maximum round-trip time numbers. When the the minimum/average/maximum round-trip time numbers.
specified number of packets have been sent (and received) or if When the specified number of packets have been sent (and received) or if
the program is terminated with an interrupt (SIGINT), a brief the program is terminated with an interrupt (SIGINT), a brief
summary is displayed. When not using the summary is displayed.
When not using the
.Fl f .Fl f
(flood) option, the first interrupt, usually generated by control-C or DEL, (flood) option, the first interrupt, usually generated by control-C or DEL,
causes causes
.Nm .Nm
to wait for its outstanding requests to return. It will wait no longer to wait for its outstanding requests to return.
than the longest round trip time encountered by previous, successful pings. It will wait no longer than the longest round trip time
encountered by previous, successful pings.
The second interrupt stops ping immediately. The second interrupt stops ping immediately.
.Pp .Pp
This program is intended for use in network testing, measurement and This program is intended for use in network testing, measurement and
@ -300,8 +306,7 @@ An IP header without options is 20 bytes.
An An
.Tn ICMP .Tn ICMP
.Tn ECHO_REQUEST .Tn ECHO_REQUEST
packet contains an additional 8 bytes worth packet contains an additional 8 bytes worth of
of
.Tn ICMP .Tn ICMP
header followed by an arbitrary amount of data. header followed by an arbitrary amount of data.
When a When a
@ -311,8 +316,7 @@ default is 56).
Thus the amount of data received inside of an IP packet of type Thus the amount of data received inside of an IP packet of type
.Tn ICMP .Tn ICMP
.Tn ECHO_REPLY .Tn ECHO_REPLY
will always be 8 bytes more than the requested data space will always be 8 bytes more than the requested data space (the
(the
.Tn ICMP .Tn ICMP
header). header).
.Pp .Pp
@ -320,8 +324,8 @@ If the data space is at least eight bytes large,
.Nm .Nm
uses the first eight bytes of this space to include a timestamp to compute uses the first eight bytes of this space to include a timestamp to compute
round trip times. round trip times.
If less than eight bytes of pad are specified, no round trip times are If less than eight bytes of pad are specified,
given. no round trip times are given.
.Sh DUPLICATE AND DAMAGED PACKETS .Sh DUPLICATE AND DAMAGED PACKETS
.Nm .Nm
will report duplicate and damaged packets. will report duplicate and damaged packets.
@ -462,7 +466,8 @@ The
.Nm .Nm
program has evolved differently under different operating systems, program has evolved differently under different operating systems,
and in some cases the same flag performs a different function and in some cases the same flag performs a different function
under different operating systems. The under different operating systems.
The
.Fl t .Fl t
flag conflicts with flag conflicts with
.Fx . .Fx .

View File

@ -1,4 +1,4 @@
.\" $NetBSD: pppoectl.8,v 1.14 2002/09/01 09:44:58 wiz Exp $ .\" $NetBSD: pppoectl.8,v 1.15 2002/10/01 13:40:49 wiz Exp $
.\" .\"
.\" Copyright (C) 1997 by Joerg Wunsch, Dresden .\" Copyright (C) 1997 by Joerg Wunsch, Dresden
.\" All rights reserved. .\" All rights reserved.
@ -26,7 +26,7 @@
.\" .\"
.\" From: spppcontrol.1,v 1.1.1.1 1997/10/11 11:30:30 joerg Exp .\" From: spppcontrol.1,v 1.1.1.1 1997/10/11 11:30:30 joerg Exp
.\" .\"
.\" $Id: pppoectl.8,v 1.14 2002/09/01 09:44:58 wiz Exp $ .\" $Id: pppoectl.8,v 1.15 2002/10/01 13:40:49 wiz Exp $
.\" .\"
.\" last edit-date: [Thu Aug 31 10:47:33 2000] .\" last edit-date: [Thu Aug 31 10:47:33 2000]
.\" .\"
@ -73,7 +73,8 @@ dump the current connection state information (this parameter is typically
used alone, for informational purposes, not during interface configuration). used alone, for informational purposes, not during interface configuration).
.It Fl n Ar 1 \&| 2 .It Fl n Ar 1 \&| 2
print the IP address of the primary or secondary DNS name server for this print the IP address of the primary or secondary DNS name server for this
PPP connection. This is only available if DNS query is enabled, see PPP connection.
This is only available if DNS query is enabled, see
.Ar query-dns . .Ar query-dns .
.El .El
.Pp .Pp
@ -88,7 +89,8 @@ drivers require a number of additional arguments or optional
parameters besides the settings that can be adjusted with parameters besides the settings that can be adjusted with
.Xr ifconfig 8 . .Xr ifconfig 8 .
These are things like authentication protocol parameters, but also These are things like authentication protocol parameters, but also
other tunable configuration variables. The other tunable configuration variables.
The
.Nm .Nm
utility can be used to display the current settings, or adjust these utility can be used to display the current settings, or adjust these
parameters as required. parameters as required.
@ -98,7 +100,8 @@ For whatever intent
is being called, at least the parameter is being called, at least the parameter
.Ar ifname .Ar ifname
needs to be specified, naming the interface for which the settings needs to be specified, naming the interface for which the settings
are to be performed or displayed. Use are to be performed or displayed.
Use
.Xr ifconfig 8 .Xr ifconfig 8
or or
.Xr netstat 1 .Xr netstat 1
@ -108,7 +111,8 @@ If no other parameter is given,
.Nm .Nm
will just list the current settings for will just list the current settings for
.Ar ifname .Ar ifname
and exit. The reported settings include the current PPP phase the and exit.
The reported settings include the current PPP phase the
interface is in, which can be one of the names interface is in, which can be one of the names
.Em dead , .Em dead ,
.Em establish , .Em establish ,
@ -119,7 +123,8 @@ or
If an authentication protocol is configured for the interface, the If an authentication protocol is configured for the interface, the
name of the protocol to be used, as well as the system name to be used name of the protocol to be used, as well as the system name to be used
or expected will be displayed, plus any possible options to the or expected will be displayed, plus any possible options to the
authentication protocol if applicable. Note that the authentication authentication protocol if applicable.
Note that the authentication
secrets (sometimes also called secrets (sometimes also called
.Em keys ) .Em keys )
are not being returned by the underlying system call, and are thus not are not being returned by the underlying system call, and are thus not
@ -128,12 +133,13 @@ displayed.
If any additional parameter is supplied, superuser privileges are If any additional parameter is supplied, superuser privileges are
required, and the command works in required, and the command works in
.Ql set .Ql set
mode. This is normally done quietly, unless the option mode.
This is normally done quietly, unless the option
.Fl v .Fl v
is also enabled, which will cause a final printout of the settings as is also enabled, which will cause a final printout of the settings as
described above once all other actions have been taken. Use of this described above once all other actions have been taken.
mode will be rejected if the interface is currently in any other phase Use of this mode will be rejected if the interface is currently in any
than other phase than
.Em dead . .Em dead .
Note that you can force an interface into Note that you can force an interface into
.Em dead .Em dead
@ -153,28 +159,33 @@ The protocol name can be one of
or or
.Ql none . .Ql none .
In the latter case, the use of an authentication protocol will be In the latter case, the use of an authentication protocol will be
turned off for the named interface. This has the side-effect of turned off for the named interface.
This has the side-effect of
clearing the other authentication-related parameters for this clearing the other authentication-related parameters for this
interface as well (i. e., system name and authentication secret will interface as well (i.
e., system name and authentication secret will
be forgotten). be forgotten).
.It Ar myauthproto Ns \&= Ns Em protoname .It Ar myauthproto Ns \&= Ns Em protoname
Same as above, but only for my end of the link. I. e., this is the Same as above, but only for my end of the link.
protocol when remote is authenticator, and I am the peer required to I. e., this is the protocol when remote is authenticator,
authenticate. and I am the peer required to authenticate.
.It Ar hisauthproto Ns \&= Ns Em protoname .It Ar hisauthproto Ns \&= Ns Em protoname
Same as above, but only for his end of the link. Same as above, but only for his end of the link.
.It Ar myauthname Ns \&= Ns Em name .It Ar myauthname Ns \&= Ns Em name
Set my system name for the authentication protocol. Set my system name for the authentication protocol.
.It Ar hisauthname Ns \&= Ns Em name .It Ar hisauthname Ns \&= Ns Em name
Set his system name for the authentication protocol. For CHAP, this Set his system name for the authentication protocol.
will only be used as a hint, causing a warning message if remote did For CHAP, this will only be used as a hint, causing
supply a different name. For PAP, it's the name remote must use to a warning message if remote did supply a different name.
For PAP, it's the name remote must use to
authenticate himself (in connection with his secret). authenticate himself (in connection with his secret).
.It Ar myauthsecret Ns \&= Ns Em secret .It Ar myauthsecret Ns \&= Ns Em secret
Set my secret (key, password) for use in the authentication phase. Set my secret (key, password) for use in the authentication phase.
For CHAP, this will be used to compute the response hash value, based For CHAP, this will be used to compute the response hash value, based
on remote's challenge. For PAP, it will be transmitted as plaintext on remote's challenge.
together with the system name. Don't forget to quote the secrets from For PAP, it will be transmitted as plaintext
together with the system name.
Don't forget to quote the secrets from
the shell if they contain shell metacharacters (or whitespace). the shell if they contain shell metacharacters (or whitespace).
.It Ar myauthkey Ns \&= Ns Em secret .It Ar myauthkey Ns \&= Ns Em secret
Same as above. Same as above.
@ -185,46 +196,51 @@ needs to authenticate.
Same as above. Same as above.
.It Ar callin .It Ar callin
Require remote to authenticate himself only when he's calling in, but Require remote to authenticate himself only when he's calling in, but
not when we are caller. This is required for some peers that do not not when we are caller.
This is required for some peers that do not
implement the authentication protocols symmetrically (like Ascend implement the authentication protocols symmetrically (like Ascend
routers, for example). routers, for example).
.It Ar always .It Ar always
The opposite of The opposite of
.Ar callin . .Ar callin .
Require remote to always authenticate, regardless of which side is Require remote to always authenticate, regardless of which side is
placing the call. This is the default, and will not be explicitly placing the call.
displayed in This is the default, and will not be explicitly displayed in
.Ql list .Ql list
mode. mode.
.It Ar norechallenge .It Ar norechallenge
Only meaningful with CHAP. Do not re-challenge peer once the initial Only meaningful with CHAP.
CHAP handshake was successful. Used to work around broken peer Do not re-challenge peer once the initial
implementations that can't grok being re-challenged once the CHAP handshake was successful.
connection is up. Used to work around broken peer implementations that can't grok
being re-challenged once the connection is up.
.It Ar rechallenge .It Ar rechallenge
With CHAP, send re-challenges at random intervals while the connection With CHAP, send re-challenges at random intervals while the connection
is in network phase. (The intervals are currently in the range of 300 is in network phase.
through approximately 800 seconds.) This is the default, and will not (The intervals are currently in the range of 300
be explicitly displayed in through approximately 800 seconds.)
This is the default, and will not be explicitly displayed in
.Ql list .Ql list
mode. mode.
.It Ar idle-timeout Ns \&= Ns Em idle-seconds .It Ar idle-timeout Ns \&= Ns Em idle-seconds
For services that are charged by connection time the interface can optionally For services that are charged by connection time the interface can optionally
disconnect after a configured idle time. If set to 0, this feature is disabled. disconnect after a configured idle time.
If set to 0, this feature is disabled.
Note: for ISDN devices, it is preferable to use the Note: for ISDN devices, it is preferable to use the
.Xr isdnd 8 .Xr isdnd 8
based timeout mechanism, as isdnd can predict the next charging unit for based timeout mechanism, as isdnd can predict the next charging unit for
ISDN connections and optimize the timeout with this information. ISDN connections and optimize the timeout with this information.
.It Ar lcp-timeout Ns \&= Ns Em timeout-value .It Ar lcp-timeout Ns \&= Ns Em timeout-value
Allows to change the value of the LCP timeout. The default value of the LCP Allows to change the value of the LCP timeout.
timeout is currently set to 1 second. The timeout-value must be specified in The default value of the LCP timeout is currently set to 1 second.
milliseconds. The timeout-value must be specified in milliseconds.
.It Ar max-auth-failure Ns \&= Ns Em count .It Ar max-auth-failure Ns \&= Ns Em count
Since some ISPs disable accounts after too many unsuccessful authentication Since some ISPs disable accounts after too many unsuccessful authentication
attempts, there is a maximum number of authentication failures before we will attempts, there is a maximum number of authentication failures before we will
stop retrying without manual intervention. Manual intervention is either stop retrying without manual intervention.
changing the authentication data (name, password) or setting the maximum Manual intervention is either changing the authentication data
retry count. If (name, password) or setting the maximum retry count.
If
.Em count .Em count
is set to is set to
.Em 0 .Em 0
@ -234,8 +250,9 @@ If an authentication failure has been caused by remote problems and you want
to retry connecting using unchanged local settings, this command can be used to retry connecting using unchanged local settings, this command can be used
to reset the failure count to zero. to reset the failure count to zero.
.It Ar query-dns Ns \&= Ns Em flags .It Ar query-dns Ns \&= Ns Em flags
During PPP protocol negotiation we can query the peer for addresses of two name During PPP protocol negotiation we can query the peer
servers. If for addresses of two name servers.
If
.Ar flags .Ar flags
is is
.Em 1 .Em 1
@ -243,7 +260,8 @@ only the first server address will be requested, if
.Ar flags .Ar flags
is is
.Em 2 .Em 2
the second will be requested. Setting the second will be requested.
Setting
.Ar flags .Ar flags
to to
.Em 3 .Em 3
@ -262,16 +280,18 @@ ippp0: phase=dead
lcp timeout: 3.000 s lcp timeout: 3.000 s
.Ed .Ed
.Pp .Pp
Display the settings for ippp0. The interface is currently in Display the settings for ippp0.
The interface is currently in
.Em dead .Em dead
phase, i. e. the LCP layer is down, and no traffic is possible. Both phase, i. e. the LCP layer is down, and no traffic is possible.
ends of the connection use the CHAP protocol, my end tells remote the Both ends of the connection use the CHAP protocol,
system name my end tells remote the system name
.Ql uriah , .Ql uriah ,
and remote is expected to authenticate by the name and remote is expected to authenticate by the name
.Ql ifb-gw . .Ql ifb-gw .
Once the initial CHAP handshake was successful, no further CHAP Once the initial CHAP handshake was successful, no further CHAP
challenges will be transmitted. There are supposedly some known CHAP challenges will be transmitted.
There are supposedly some known CHAP
secrets for both ends of the link which are not being shown. secrets for both ends of the link which are not being shown.
.Pp .Pp
.Bd -literal .Bd -literal
@ -303,7 +323,7 @@ pppoectl pppoe0 \\
myauthsecret=YYYYY \\ myauthsecret=YYYYY \\
hisauthproto=none hisauthproto=none
# Configure the pppoe0 interface itself. These addresses are magic, # Configure the pppoe0 interface itself. These addresses are magic,
# meaning we don't care about either address and let the remote # meaning we don't care about either address and let the remote
# ppp choose them. # ppp choose them.
ifconfig pppoe0 0.0.0.0 0.0.0.1 up ifconfig pppoe0 0.0.0.0 0.0.0.1 up

File diff suppressed because it is too large Load Diff