New sentence, new line. From Robert Elz.

This commit is contained in:
wiz 2002-10-01 16:48:34 +00:00
parent 5dd315acee
commit b214676aec
29 changed files with 274 additions and 202 deletions

View File

@ -1,4 +1,4 @@
.\" $NetBSD: alarm.3,v 1.18 2002/02/07 07:00:10 ross Exp $
.\" $NetBSD: alarm.3,v 1.19 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1980, 1991, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
@ -67,7 +67,8 @@ will supersede the prior call.
The request
.Fn alarm "0"
voids the current
alarm and the signal SIGALRM will not be delivered. The maximum number of
alarm and the signal SIGALRM will not be delivered.
The maximum number of
.Ar seconds
allowed
is 2147483647.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: directory.3,v 1.17 2002/08/10 09:13:47 wiz Exp $
.\" $NetBSD: directory.3,v 1.18 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -75,7 +75,8 @@ with it
and
returns a pointer to be used to identify the
.Em directory stream
in subsequent operations. The pointer
in subsequent operations.
The pointer
.Dv NULL
is returned if
.Fa filename
@ -86,7 +87,8 @@ enough memory to hold the whole thing.
The
.Fn readdir
function
returns a pointer to the next directory entry. It returns
returns a pointer to the next directory entry.
It returns
.Dv NULL
upon reaching the end of the directory or detecting an invalid
.Fn seekdir
@ -109,7 +111,8 @@ The new position reverts to the one associated with the
.Em directory stream
when the
.Fn telldir
operation was performed. Values returned by
operation was performed.
Values returned by
.Fn telldir
are good only for the lifetime of the
.Dv DIR

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fmtcheck.3,v 1.2 2002/02/07 07:00:11 ross Exp $
.\" $NetBSD: fmtcheck.3,v 1.3 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 2000 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -63,7 +63,8 @@ is a valid format string.
The
.Xr printf 3
family of functions can not verify the types of arguments that they are
passed at run-time. In some cases, like
passed at run-time.
In some cases, like
.Xr catgets 3 ,
it is useful or necessary to use a user-supplied format string with no
guarantee that the format string matches the specified parameters.
@ -78,13 +79,15 @@ printf(fmtcheck(user_format, standard_format), arg1, arg2);
In the check, field widths, fillers, precisions, etc. are ignored (unless
the field width or precision is an asterisk
.Ql *
instead of a digit string). Also, any text other than the format specifiers
is completely ignored.
instead of a digit string).
Also, any text other than the format specifiers is completely ignored.
.Pp
Note that the formats may be quite different as long as they accept the
same parameters. For example, ".Dq %p %o %30s %#llx %-10.*e %n" is
same parameters.
For example, ".Dq %p %o %30s %#llx %-10.*e %n" is
compatible with "This number %lu %d%% and string %s has %qd numbers
and %.*g floats (%n)." However, "%o" is not equivalent to "%lx" because
and %.*g floats (%n)."
However, "%o" is not equivalent to "%lx" because
the first requires an integer and the second requires a long.
.Sh RETURN VALUES
If

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fmtmsg.3,v 1.3 2002/02/07 07:00:11 ross Exp $
.\" $NetBSD: fmtmsg.3,v 1.4 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1999 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -69,11 +69,13 @@ The
argument consists of a major classification and several sub-classifications.
It has no effect on the content of the message displayed.
With the exception of the display sub-classification, only a single identifier
may be specified for each (sub-)classification. The following classifications
may be specified for each (sub-)classification.
The following classifications
are available:
.Bl -tag -width MessageXSourceXSub-classificationsXX
.It Major Classifications
The source of the condition. Available identifiers are:
The source of the condition.
Available identifiers are:
.Dv MM_HARD
(hardware),
.Dv MM_SOFT
@ -81,7 +83,8 @@ The source of the condition. Available identifiers are:
.Dv MM_FIRM
(firmware).
.It Message Source Sub-classifications
The type of software detecting the condition. Available identifiers are:
The type of software detecting the condition.
Available identifiers are:
.Dv MM_APPL
(application),
.Dv MM_UTIL
@ -112,9 +115,9 @@ must be specified.
.Ss label
The
.Fa label
argument identifies the source of the message. It consists of two fields
separated by a colon (:). The first field is up to 10 characters, the second
is up to 14 characters.
argument identifies the source of the message.
It consists of two fields separated by a colon (:).
The first field is up to 10 characters, the second is up to 14 characters.
.Pp
If no
.Fa label
@ -143,7 +146,8 @@ level is to be supplied,
.Dv MM_NOSEV
must be specified.
.Ss text
The description of the condition the software encountered. The character
The description of the condition the software encountered.
The character
string is not limited to a specific size.
.Pp
If no
@ -179,8 +183,8 @@ standard error stream (but not on the system console!) may be taken by
setting the
.Ev MSGVERB
environment variable, which selects the subset of message components
to be printed. It consists of a colon-separated list of the optional
keywords
to be printed.
It consists of a colon-separated list of the optional keywords
.Fa label ,
.Fa severity ,
.Fa text ,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: fpgetmask.3,v 1.5 2002/03/05 15:10:16 wiz Exp $
.\" $NetBSD: fpgetmask.3,v 1.6 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1999 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -102,8 +102,8 @@ function will cause future operations to use the specified dynamic mode.
.It Em Note :
On some architectures, instructions can optionally specify static
rounding modes and exception enables that will supersede the specified
dynamic mode. On other architectures, these features may not be fully
supported.
dynamic mode.
On other architectures, these features may not be fully supported.
.El
.Pp
The

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ftok.3,v 1.8 2002/02/07 07:00:12 ross Exp $
.\" $NetBSD: ftok.3,v 1.9 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1994 SigmaSoft, Th. Lockert <tholo@sigmasoft.com>
.\" All rights reserved.
@ -54,8 +54,8 @@ of an existing file and a user-selectable
The specified
.Fa path
must specify an existing file that is accessible to the calling process
or the call will fail. Also, note that links to files will return the
same key, given the same
or the call will fail.
Also, note that links to files will return the same key, given the same
.Fa id .
.Pp
Only the 8 least significant bits of

View File

@ -1,4 +1,4 @@
.\" $NetBSD: getdiskbyname.3,v 1.8 2002/02/07 07:00:12 ross Exp $
.\" $NetBSD: getdiskbyname.3,v 1.9 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -58,8 +58,8 @@ takes a disk name (e.g.
.Ql rm03 )
and returns a prototype disk label
describing its geometry information and the standard
disk partition tables. All information is obtained from
the
disk partition tables.
All information is obtained from the
.Xr disktab 5
file.
.Pp
@ -105,4 +105,5 @@ function appeared in
The
.Fn getdiskbyname
function leaves its results in an internal static object and returns a
pointer to that object. Subsequent calls will modify the same object.
pointer to that object.
Subsequent calls will modify the same object.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: getdomainname.3,v 1.11 2002/02/07 07:00:12 ross Exp $
.\" $NetBSD: getdomainname.3,v 1.12 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -57,7 +57,8 @@ The parameter
.Fa namelen
specifies the size of the
.Fa name
array. The returned name is null-terminated unless insufficient
array.
The returned name is null-terminated unless insufficient
space is provided.
.Pp
.Fn setdomainname
@ -68,8 +69,8 @@ which has length
This call is restricted to the super-user and
is normally used only when the system is bootstrapped.
.Sh RETURN VALUES
If the call succeeds a value of 0 is returned. If the call
fails, a value of -1 is returned and an error code is
If the call succeeds a value of 0 is returned.
If the call fails, a value of -1 is returned and an error code is
placed in the global location
.Va errno .
.Sh ERRORS

View File

@ -1,4 +1,4 @@
.\" $NetBSD: getgrent.3,v 1.16 2002/04/29 01:41:44 simonb Exp $
.\" $NetBSD: getgrent.3,v 1.17 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -88,40 +88,38 @@ search the group database for the given group name pointed to by
.Ar name
or the group id pointed to by
.Ar gid ,
respectively, returning the first one encountered. Identical group
names or group gids may result in undefined behavior.
respectively, returning the first one encountered.
Identical group names or group gids may result in undefined behavior.
.Pp
The
.Fn getgrent
function
sequentially reads the group database and is intended for programs
function sequentially reads the group database and is intended for programs
that wish to step through the complete list of groups.
.Pp
All three functions will open the group file for reading, if necessary.
.Pp
The
.Fn setgroupent
function
opens the file, or rewinds it if it is already open. If
function opens the file, or rewinds it if it is already open.
If
.Fa stayopen
is non-zero, file descriptors are left open, significantly speeding
functions subsequent calls. This functionality is unnecessary for
functions subsequent calls.
This functionality is unnecessary for
.Fn getgrent
as it doesn't close its file descriptors by default. It should also
be noted that it is dangerous for long-running programs to use this
functionality as the group file may be updated.
as it doesn't close its file descriptors by default.
It should also be noted that it is dangerous for long-running
programs to use this functionality as the group file may be updated.
.Pp
The
.Fn setgrent
function
is equivalent to
function is equivalent to
.Fn setgroupent
with an argument of zero.
.Pp
The
.Fn endgrent
function
closes any open files.
function closes any open files.
.Sh RETURN VALUES
The functions
.Fn getgrent ,
@ -185,9 +183,8 @@ The functions
and
.Fn setgrent
leave their results in an internal static object and return
a pointer to that object. Subsequent calls to
the same function
will modify the same object.
a pointer to that object.
Subsequent calls to the same function will modify the same object.
.Pp
The functions
.Fn getgrent ,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: gethostname.3,v 1.11 2002/02/07 07:00:13 ross Exp $
.\" $NetBSD: gethostname.3,v 1.12 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -57,7 +57,8 @@ The parameter
.Fa namelen
specifies the size of the
.Fa name
array. The returned name is null-terminated unless insufficient
array.
The returned name is null-terminated unless insufficient
space is provided.
.Pp
.Fn sethostname
@ -68,8 +69,8 @@ which has length
This call is restricted to the super-user and
is normally used only when the system is bootstrapped.
.Sh RETURN VALUES
If the call succeeds a value of 0 is returned. If the call
fails, a value of -1 is returned and an error code is
If the call succeeds a value of 0 is returned.
If the call fails, a value of -1 is returned and an error code is
placed in the global location
.Va errno .
.Sh ERRORS

View File

@ -1,4 +1,4 @@
.\" $NetBSD: getprogname.3,v 1.3 2002/02/07 07:00:13 ross Exp $
.\" $NetBSD: getprogname.3,v 1.4 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 2001 Christopher G. Demetriou
.\" All rights reserved.
@ -54,8 +54,8 @@ as used by various error-reporting functions.
.Fn getprogname
returns the name of the current program.
This function is typically useful when generating error messages
or other diagnostic output. If the program name has not been
set,
or other diagnostic output.
If the program name has not been set,
.Fn getprogname
will return
.Dv NULL .
@ -64,14 +64,16 @@ will return
sets the name of the current program to be the last pathname
component of the
.Fa name
argument. It should be invoked at the start of the program, using the
argument.
It should be invoked at the start of the program, using the
.Fa argv[0]
passed into the program's
.Fn main
function. A pointer into the string pointed to by the
function.
A pointer into the string pointed to by the
.Fa name
argument is kept as the program name. Therefore, the string pointed
to by
argument is kept as the program name.
Therefore, the string pointed to by
.Fa name
should not be modified during the rest of the program's operation.
.Pp
@ -80,14 +82,15 @@ A program's name can only be set once, and in
that is actually
done by program start-up code that is run before
.Fn main
is called. Therefore, in
is called.
Therefore, in
.Nx ,
calling
.Fn setprogname
from
.Fn main
has no effect. However, it does
serve to increase the portability of the program:
has no effect.
However, it does serve to increase the portability of the program:
on other operating systems,
.Fn getprogname
and

View File

@ -1,4 +1,4 @@
.\" $NetBSD: getpwent.3,v 1.20 2002/04/29 01:41:44 simonb Exp $
.\" $NetBSD: getpwent.3,v 1.21 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1988, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -200,9 +200,8 @@ The functions
and
.Fn getpwuid ,
leave their results in an internal static object and return
a pointer to that object. Subsequent calls to
any of these functions
will modify the same object.
a pointer to that object.
Subsequent calls to any of these functions will modify the same object.
.Pp
The functions
.Fn getpwent ,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: getttyent.3,v 1.12 2002/02/07 07:00:13 ross Exp $
.\" $NetBSD: getttyent.3,v 1.13 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -126,9 +126,9 @@ Any trailing comment field, with any leading hash marks (``#'') or
whitespace removed.
.It Fa ty_class
A key indexing into a termcap-style database (/etc/ttyclasses)
of attributes for this class of tty. No attributes are currently
defined or used, so there are currently no functions to retrieve
them.
of attributes for this class of tty.
No attributes are currently defined or used,
so there are currently no functions to retrieve them.
.El
.Pp
If any of the fields pointing to character strings are unspecified,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: getusershell.3,v 1.7 2001/09/16 02:30:24 wiz Exp $
.\" $NetBSD: getusershell.3,v 1.8 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1985, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -95,6 +95,7 @@ function appeared in
The
.Fn getusershell
function leaves its result in an internal static object and returns
a pointer to that object. Subsequent calls to
a pointer to that object.
Subsequent calls to
.Fn getusershell
will modify the same object.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: glob.3,v 1.23 2002/02/07 09:24:04 ross Exp $
.\" $NetBSD: glob.3,v 1.24 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1989, 1991, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
@ -405,7 +405,8 @@ patterns were matched.
.Pp
The historical
.Dv GLOB_ABEND
return constant is no longer supported. Portable applications should use the
return constant is no longer supported.
Portable applications should use the
.Dv GLOB_ABORTED
constant instead.
.Pp

View File

@ -1,4 +1,4 @@
.\" $NetBSD: humanize_number.3,v 1.2 2002/09/26 15:07:59 wiz Exp $
.\" $NetBSD: humanize_number.3,v 1.3 2002/10/01 16:48:34 wiz Exp $
.\"
.\" Copyright (c) 1999, 2002 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -88,7 +88,8 @@ in order to ensure a useful result is generated into
.Fa buffer .
To use a specific prefix, specify this as
.Fa scale
(Multiplier = 1024 ^ scale). This can not be combined with any of the
(Multiplier = 1024 ^ scale).
This can not be combined with any of the
.Fa scale
flags below.
.Pp
@ -123,7 +124,8 @@ with 1000 instead of 1024.
.Fn humanize_number
returns the number of characters stored in
.Fa buffer
(excluding the terminating NUL) upon success, or \-1 upon failure. If
(excluding the terminating NUL) upon success, or \-1 upon failure.
If
.Dv HN_GETSCALE
is specified, the prefix index number will be returned instead.
.Sh SEE ALSO

View File

@ -1,4 +1,4 @@
.\" $NetBSD: lockf.3,v 1.6 2002/02/07 07:00:15 ross Exp $
.\" $NetBSD: lockf.3,v 1.7 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1997 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -96,10 +96,12 @@ detects if a lock by another process is present on the specified section.
The
.Fa size
argument is the number of contiguous bytes to be locked or
unlocked. The section to be locked or unlocked starts at the current
unlocked.
The section to be locked or unlocked starts at the current
offset in the file and extends forward for a positive size or backward
for a negative size (the preceding bytes up to but not including the
current offset). However, it is not permitted to lock a section that
current offset).
However, it is not permitted to lock a section that
starts or extends before the beginning of the file.
If
.Fa size
@ -112,9 +114,11 @@ The sections locked with
or
.Dv F_TLOCK
may, in whole or in part, contain or be contained by a previously
locked section for the same process. When this occurs, or if adjacent
locked section for the same process.
When this occurs, or if adjacent
locked sections would occur, the sections are combined into a single
locked section. If the request would cause the number of locks to
locked section.
If the request would cause the number of locks to
exceed a system-imposed limit, the request will fail.
.Pp
.Dv F_LOCK
@ -133,15 +137,19 @@ file descriptor for the file.
.Pp
.Dv F_ULOCK
requests release (wholly or in part) one or more locked sections
controlled by the process. Locked sections will be unlocked starting
controlled by the process.
Locked sections will be unlocked starting
at the current file offset through
.Fa size
bytes or to the end of file if size is 0. When all of a locked section
bytes or to the end of file if size is 0.
When all of a locked section
is not released (that is, when the beginning or end of the area to be
unlocked falls within a locked section), the remaining portions of
that section are still locked by the process. Releasing the center
that section are still locked by the process.
Releasing the center
portion of a locked section will cause the remaining locked beginning
and end portions to become two separate locked sections. If the
and end portions to become two separate locked sections.
If the
request would cause the number of locks in the system to exceed a
system-imposed limit, the request will fail.
.Pp
@ -152,13 +160,15 @@ the requested section is the maximum value for an object of type
off_t, when the process has an existing lock in which size is 0 and
which includes the last byte of the requested section, will be treated
as a request to unlock from the start of the requested section with a
size equal to 0. Otherwise an
size equal to 0.
Otherwise an
.Dv F_ULOCK
request will attempt to unlock only the requested section.
.Pp
A potential for deadlock occurs if a process controlling a locked
region is put to sleep by attempting to lock the locked region of
another process. This implementation detects that sleeping until a
another process.
This implementation detects that sleeping until a
locked region is unlocked would cause a deadlock and fails with an
.Er EDEADLK
error.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: nlist.3,v 1.8 2002/02/07 07:00:16 ross Exp $
.\" $NetBSD: nlist.3,v 1.9 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1980, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -50,7 +50,8 @@ The
.Fn nlist
function
retrieves name list entries from the symbol table of an
executable file. (See
executable file.
(See
.Xr a.out 5 . )
The argument
.Fa \&nl

View File

@ -1,4 +1,4 @@
.\" $NetBSD: psignal.3,v 1.12 2002/02/07 07:00:16 ross Exp $
.\" $NetBSD: psignal.3,v 1.13 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -72,11 +72,12 @@ is produced.
.Pp
The message strings can be accessed directly using the external array
.Va sys_siglist ,
indexed by recognized signal numbers. The external array
indexed by recognized signal numbers.
The external array
.Va sys_signame
is used similarly and contains short, upper-case abbreviations for signals
which are useful for recognizing signal names in user input. The defined
variable
which are useful for recognizing signal names in user input.
The defined variable
.Dv NSIG
contains a count of the strings in
.Va sys_siglist

View File

@ -1,4 +1,4 @@
.\" $NetBSD: shquote.3,v 1.4 2002/02/07 09:24:04 ross Exp $
.\" $NetBSD: shquote.3,v 1.5 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 2001 Christopher G. Demetriou
.\" All rights reserved.
@ -53,7 +53,8 @@ The
and
.Fn shquotev
functions copy strings and transform the copies by adding shell
escape and quoting characters. They are used to encapsulate
escape and quoting characters.
They are used to encapsulate
arguments to be included in command strings passed to the
.Fn system
and
@ -97,11 +98,11 @@ function transforms each of the
.Fa argc
strings specified by the array
.Fa argv
independently. The transformed strings are
placed in the memory pointed to by
independently.
The transformed strings are placed in the memory pointed to by
.Fa buf ,
separated by spaces. It does not modify the pointer array
specified by
separated by spaces.
It does not modify the pointer array specified by
.Fa argv
or the strings pointed to by the pointers in the arrary.
.Pp
@ -111,7 +112,8 @@ Both functions write up to
.Fa buf ,
then add a
.Li NUL
character to terminate the output string. If
character to terminate the output string.
If
.Fa bufsize
is given as zero, the
.Fa buf
@ -137,9 +139,10 @@ The following code fragment demonstrates how you might use
to construct a command string to be used with
.Fn system .
The command uses an environment variable (which will be expanded by
the shell) to determine the actual program to run. Note that
the environment variable may be expanded by the shell into multiple
words. The first word of the expansion will be used by the shell
the shell) to determine the actual program to run.
Note that the environment variable may be expanded by
the shell into multiple words.
The first word of the expansion will be used by the shell
as the name of the program to run,
and the rest will be passed as arguments to the program.
.Bd -literal -offset indent
@ -227,7 +230,8 @@ cmd[--len] = '\0';
.Xr system 3
.Sh BUGS
This implementation does not currently handle strings containing multibyte
characters properly. To address this issue,
characters properly.
To address this issue,
.Pa /bin/sh
.Po
the shell used by
@ -235,5 +239,6 @@ the shell used by
and
.Fn popen
.Pc
must first be fixed to handle multibyte characters. When that has been
done, these functions can have multibyte character support enabled.
must first be fixed to handle multibyte characters.
When that has been done,
these functions can have multibyte character support enabled.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: signal.3,v 1.19 2002/07/10 23:30:48 wiz Exp $
.\" $NetBSD: signal.3,v 1.20 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1980, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -57,7 +57,8 @@ facility.
.Pp
Signals allow the manipulation of a process from outside its
domain as well as allowing the process to manipulate itself or
copies of itself (children). There are two general types of signals:
copies of itself (children).
There are two general types of signals:
those that cause termination of a process and those that do not.
Signals which cause termination of a program might result from
an irrecoverable error or might be the result of a user at a terminal
@ -81,7 +82,8 @@ and
signals, the
.Fn signal
function allows for a signal to be caught, to be ignored, or to generate
an interrupt. See
an interrupt.
See
.Xr signal 7
for comprehensive list of supported signals.
.Pp
@ -100,7 +102,8 @@ To ignore the signal
should be
.Dv SIG_IGN .
This will cause subsequent instances of the signal to be ignored
and pending instances to be discarded. If
and pending instances to be discarded.
If
.Dv SIG_IGN
is not used,
further occurrences of the signal are

View File

@ -1,4 +1,4 @@
.\" $NetBSD: sleep.3,v 1.12 2002/02/07 07:00:17 ross Exp $
.\" $NetBSD: sleep.3,v 1.13 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1986, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -53,13 +53,15 @@ number of seconds specified by
.Fa seconds
have elapsed or a signal is delivered to the calling process and its
action is to invoke a signal-catching function or to terminate the
process. The suspension time may be longer than requested due to the
process.
The suspension time may be longer than requested due to the
scheduling of other activity by the system.
.Sh RETURN VALUES
If the
.Fn sleep
function returns because the requested time has elapsed, the value
returned will be zero. If the
returned will be zero.
If the
.Fn sleep
function returns due to the delivery of a signal, the value returned
will be the unslept amount (the request time minus the time actually

View File

@ -1,4 +1,4 @@
.\" $NetBSD: sysctl.3,v 1.97 2002/08/20 15:34:44 wiz Exp $
.\" $NetBSD: sysctl.3,v 1.98 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1993
.\" The Regents of the University of California. All rights reserved.
@ -351,13 +351,15 @@ This structure contains the clock, statistics clock and profiling clock
frequencies, the number of micro-seconds per hz tick, and the clock
skew rate.
.It Li KERN_CP_TIME
Return an array if CPUSTATES longs is returned. This array contains the
Return an array if CPUSTATES longs is returned.
This array contains the
number of clock ticks spent in different CPU states.
.It Li KERN_DEFCORENAME
Default template for the name of core dump files (see also PROC_PID_CORENAME
in the per-process variables CTL_PROC, and
.Xr core 5
for format of this template). The default value is
for format of this template).
The default value is
.Nm %n.core
and can be changed with the kernel configuration option
.Cd options DEFCORENAME
@ -416,13 +418,14 @@ The maximum number of partitions allowed per disk.
.It Li KERN_MAXPROC
The maximum number of simultaneous processes the system will allow.
.It Li KERN_MAXPTYS
The maximum number of pseudo terminals. This value can be both
raised and lowered, though it cannot
be set lower than number of currently used ptys. See also
The maximum number of pseudo terminals.
This value can be both raised and lowered, though it cannot
be set lower than number of currently used ptys.
See also
.Xr pty 4 .
.It Li KERN_MAXVNODES
The maximum number of vnodes available on the system. This can only
be raised.
The maximum number of vnodes available on the system.
This can only be raised.
.It Li KERN_MBUF
Return information about the mbuf control variables.
the third level names for the mbuf variables are detailed below.
@ -519,14 +522,16 @@ The third and fourth level names are as follows:
.It Li KERN_PROC2
As for KERN_PROC, but an array of
.Va struct kinfo_proc2
structures are returned. The fifth level name is the size of the
structures are returned.
The fifth level name is the size of the
.Va struct kinfo_proc2
and the sixth level name is the number of structures to return.
.It Li KERN_PROC_ARGS
Return the argv or environment strings (or the number thereof)
of a process. Multiple strings are returned separated by NUL
characters. The third level name is the process ID. The fourth
level name is as follows:
of a process.
Multiple strings are returned separated by NUL characters.
The third level name is the process ID.
The fourth level name is as follows:
.Bl -column "Third level nameXXXXXX" -offset indent
.It KERN\_PROC\_ARGV The argv strings
.It KERN\_PROC\_NARGV The number of argv strings
@ -595,17 +600,20 @@ The third level name selects the System V style IPC facility.
.Pp
.Bl -tag -width "123456"
.It Li KERN_SYSVIPC_MSG_INFO
Return information on the System V style message facility. The
Return information on the System V style message facility.
The
.Sy msg_sysctl_info
structure is defined in
.Aq Pa sys/msg.h .
.It Li KERN_SYSVIPC_SEM_INFO
Return information on the System V style semaphore facility. The
Return information on the System V style semaphore facility.
The
.Sy sem_sysctl_info
structure is defined in
.Aq Pa sys/sem.h .
.It Li KERN_SYSVIPC_SHM_INFO
Return information on the System V style shared memory facility. The
Return information on the System V style shared memory facility.
The
.Sy shm_sysctl_info
structure is defined in
.Aq Pa sys/shm.h .
@ -624,8 +632,9 @@ on this system,
otherwise 0.
.It Li KERN_TKSTAT
Return information about the number of characters sent and received
on ttys. The third level names for the tty statistic variables
are detailed below. The changeable column shows whether a process
on ttys.
The third level names for the tty statistic variables are detailed below.
The changeable column shows whether a process
with appropriate privilege may change the value.
.Bl -column "KERNXTKSTATXRAWCCXXX" "struct integerXXX" -offset indent
.It Sy Pa Third level name Type Changeable
@ -768,8 +777,8 @@ the system.
This value applies to normal transport protocols, not to ICMP.
.It Li ip.forwsrcrt
Returns 1 when forwarding of source-routed packets is enabled for
the host. This value may only be changed if the kernel security
level is less than 1.
the host.
This value may only be changed if the kernel security level is less than 1.
.It Li ip.directed-broadcast
Returns 1 if directed broadcast behavior is enabled for the host.
.It Li ip.allowsrcrt
@ -788,7 +797,8 @@ be greater than
.Li ip.anonportmin .
.It Li ip.mtudisctimeout
Returns the number of seconds in which a route added by the Path MTU
Discovery engine will time out. When the route times out, the Path
Discovery engine will time out.
When the route times out, the Path
MTU Discovery engine will attempt to probe a larger path MTU.
.It Li ip.gifttl
The maximum time-to-live (hop count) value for an IPv4 packet generated by
@ -838,8 +848,8 @@ Returns the default TCP receive buffer size.
.It Li tcp.mssdflt
Returns the default maximum segment size both advertsized to the peer
and to use when the peer does not advertize a maximum segment size to
us during connection setup. Do not change this value unless you really
know what you are doing.
us during connection setup.
Do not change this value unless you really know what you are doing.
.It Li tcp.syn_cache_limit
Returns the maximum number of entries allowed in the TCP compressed state
engine.
@ -849,15 +859,15 @@ compressed state engine.
.It Li tcp.syn_cache_interval
Returns the TCP compressed state engine's timer interval.
.It Li tcp.init_win
Returns a value indicating the TCP initial congestion window. If this
value is 0, an auto-tuning algorithm designed to use an initial window
of approximately 4K bytes is in use. Otherwise, this value indicates
a fixed number of packets.
Returns a value indicating the TCP initial congestion window.
If this value is 0, an auto-tuning algorithm designed to use an initial
window of approximately 4K bytes is in use.
Otherwise, this value indicates a fixed number of packets.
.It Li tcp.mss_ifmtu
Returns 1 if TCP calculates the outgoing maximum segment size based on
the MTU of the appropriate interface. Otherwise, it is calculated based on
the greater of the MTU of the interface, and the largest (non-loopback)
interface MTU on the system.
the MTU of the appropriate interface.
Otherwise, it is calculated based on the greater of the MTU of the
interface, and the largest (non-loopback) interface MTU on the system.
.It Li tcp.sack
TCP Selective ACKnowledgement (RFC 2018) is not implemented in
.Nx
@ -871,41 +881,49 @@ If rfc1323 is enabled, a value of 1 indicates RFC1323 time stamp options,
used for measuring TCP round trip times, are enabled.
.It Li tcp.compat_42
Returns 1 if work-arounds for bugs in the 4.2BSD TCP implementation are
enabled. Use of this option is not recommended, although it may be
enabled.
Use of this option is not recommended, although it may be
required in order to communicate with extremely old TCP implementations.
.It Li tcp.cwm
Returns 1 if use of the Hughes/Touch/Heidemann Congestion Window Monitoring
algorithm is enabled. This algorithm prevents line-rate bursts of packets
that could otherwise occur when data begins flowing on an idle TCP
connection. These line-rate bursts can contribute to network and router
congestion. This can be particularly useful on World Wide Web servers
algorithm is enabled.
This algorithm prevents line-rate bursts of packets that could
otherwise occur when data begins flowing on an idle TCP connection.
These line-rate bursts can contribute to network and router congestion.
This can be particularly useful on World Wide Web servers
which support HTTP/1.1, which has lingering connections.
.It Li tcp.cwm_burstsize
Returns the Congestion Window Monitoring allowed burst size, in terms
of packet count.
.It Li tcp.ack_on_push
Returns 1 if TCP is to immediately transmit an ACK upon reception of
a packet with PUSH set. This can avoid losing a round trip time in some
rare situations, but has the caveat of potentially defeating TCP's delayed
ACK algorithm. Use of this option is generally not recommended, but
a packet with PUSH set.
This can avoid losing a round trip time in some rare situations,
but has the caveat of potentially defeating TCP's delayed ACK algorithm.
Use of this option is generally not recommended, but
the variable exists in case your configuration really needs it.
.It Li tcp.keepidle
Time a connection must be idle before keepalives are sent (if keepalives
are enabled for the connection). See also tcp.slowhz.
are enabled for the connection).
See also tcp.slowhz.
.It Li tcp.keepintvl
Time after a keepalive probe is sent until, in the absence of any response,
another probe is sent. See also tcp.slowhz.
another probe is sent.
See also tcp.slowhz.
.It Li tcp.keepcnt
Number of keepalive probes sent before declaring a connection dead. If
set to zero, there is no limit; keepalives will be sent until some kind of
Number of keepalive probes sent before declaring a connection dead.
If set to zero, there is no limit;
keepalives will be sent until some kind of
response is received from the peer.
.It Li tcp.slowhz
The units for tcp.keepidle and tcp.keepintvl; those variables are in ticks
of a clock that ticks tcp.slowhz times per second. (That is, their values
of a clock that ticks tcp.slowhz times per second.
(That is, their values
must be divided by the tcp.slowhz value to get times in seconds.)
.It Li tcp.newreno
Returns 1 if the use of J. Hoe's NewReno congestion control algorithm is
enabled. This algorithm improves the start-up behavior of TCP connections.
Returns 1 if the use of J.
Hoe's NewReno congestion control algorithm is enabled.
This algorithm improves the start-up behavior of TCP connections.
.It Li tcp.log_refused
Returns 1 if refused TCP connections to the host will be logged.
.It Li tcp.rstppslimit
@ -1239,9 +1257,11 @@ The string and integer information available for the CTL_PROC
is detailed below.
The changeable column shows whether a process with appropriate
privilege may change the value.
These values are per-process, and as such may change from one process
to another. When a process is created, the default values are inherited from
its parent. When a set-user-ID or set-group-ID binary is executed, the
These values are per-process,
and as such may change from one process to another.
When a process is created,
the default values are inherited from its parent.
When a set-user-ID or set-group-ID binary is executed, the
value of PROC_PID_CORENAME is reset to the system default value.
The second level name is either the magic value PROC_CURPROC, which
points to the current process, or the PID of the target process.
@ -1255,10 +1275,11 @@ points to the current process, or the PID of the target process.
.It Li PROC_PID_CORENAME
The template used for the core dump file name (see
.Xr core 5
for details). The base name must either be
for details).
The base name must either be
.Nm core
or end with the suffix ``.core'' (the super-user may set arbitrary names). By
default it points to KERN_DEFCORENAME.
or end with the suffix ``.core'' (the super-user may set arbitrary names).
By default it points to KERN_DEFCORENAME.
.It Li PROC_PID_LIMIT
Return resources limits, as defined for the
.Xr getrlimit 2
@ -1494,13 +1515,14 @@ If not zero, DDB may be entered by sending a break on a serial
console or by a special key sequence on a graphics console.
.El
.Pp
These MIB nodes are also available as variables from within the
DDB. See
These MIB nodes are also available as variables from within the DDB.
See
.Xr ddb 4
for more details.
.Sh CTL_VENDOR
The "vendor" toplevel name is reserved to be used by vendors who wish to
have their own private MIB tree. Intended use is to store values under
have their own private MIB tree.
Intended use is to store values under
.Dq vendor.\*[Lt]yourname\*[Gt].* .
.Sh RETURN VALUES
If the call to

View File

@ -1,4 +1,4 @@
.\" $NetBSD: syslog.3,v 1.13 2002/07/10 14:37:14 yamt Exp $
.\" $NetBSD: syslog.3,v 1.14 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1985, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -74,7 +74,8 @@ The message is identical to a
format string, except that
.Ql %m
is replaced by the current error
message. (As denoted by the global variable
message.
(As denoted by the global variable
.Va errno ;
see
.Xr strerror 3 . )

View File

@ -1,4 +1,4 @@
.\" $NetBSD: times.3,v 1.12 2002/06/23 21:32:01 perry Exp $
.\" $NetBSD: times.3,v 1.13 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1990, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -62,7 +62,8 @@ The number of clock ticks per second may be determined by calling
.Xr sysconf 3
with the
.Dv _SC_CLK_TCK
request. It is generally (but not always) between 60 and 1024.
request.
It is generally (but not always) between 60 and 1024.
.Pp
Note that at the common rate of 100 ticks per second on many
.Nx
@ -111,9 +112,10 @@ and
of the child processes.
.El
.Pp
All times are measured in clock ticks, as defined above. Note that at
100 ticks per second, and with a 32-bit unsigned clock_t, the values
wrap after 497 days.
All times are measured in clock ticks, as defined above.
Note that at 100 ticks per second,
and with a 32-bit unsigned clock_t,
the values wrap after 497 days.
.Pp
The times of a terminated child process are included in the
.Fa tms_cutime

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ttyname.3,v 1.11 2002/02/07 07:00:18 ross Exp $
.\" $NetBSD: ttyname.3,v 1.12 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -54,7 +54,8 @@
.Fn ttyslot
.Sh DESCRIPTION
These functions operate on the system file descriptors for terminal
type devices. These descriptors are not related to the standard
type devices.
These descriptors are not related to the standard
.Tn I/O
.Dv FILE
typedef, but refer to the special device files found in
@ -159,6 +160,7 @@ appeared in
The
.Fn ttyname
function leaves its result in an internal static object and returns
a pointer to that object. Subsequent calls to
a pointer to that object.
Subsequent calls to
.Fn ttyname
will modify the same object.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ulimit.3,v 1.4 2002/02/07 07:00:18 ross Exp $
.\" $NetBSD: ulimit.3,v 1.5 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1999 The NetBSD Foundation, Inc.
.\" All rights reserved.
@ -50,7 +50,8 @@
The
.Fn ulimit
function provides a method to query or alter resource limits of the calling
process. The method to be performed is specified by the
process.
The method to be performed is specified by the
.Fa cmd
argument; possible values are:
.Bl -tag -width UL_GETFSIZEXX

View File

@ -1,4 +1,4 @@
.\" $NetBSD: usleep.3,v 1.15 2002/09/04 01:03:58 wiz Exp $
.\" $NetBSD: usleep.3,v 1.16 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1986, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -54,18 +54,21 @@ until either the number of microseconds specified by
.Fa microseconds
have elapsed or a signal is delivered to the calling process and its
action is to invoke a signal catching function or to terminate the
process. The suspension time may be longer than requested due to the
process.
The suspension time may be longer than requested due to the
scheduling of other activity by the system.
.Pp
The
.Fa microseconds
argument must be less than 1,000,000. If the value of
argument must be less than 1,000,000.
If the value of
.Fa microseconds
is 0, then the call has no effect.
.Sh RETURN VALUES
On successful completion,
.Fn usleep
returns 0. Otherwise, it returns \-1 and sets
returns 0.
Otherwise, it returns \-1 and sets
.Va errno
to indicate the error.
.Sh ERRORS

View File

@ -1,4 +1,4 @@
.\" $NetBSD: vis.3,v 1.16 2002/03/23 17:38:27 christos Exp $
.\" $NetBSD: vis.3,v 1.17 2002/10/01 16:48:35 wiz Exp $
.\"
.\" Copyright (c) 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -70,9 +70,10 @@ a string which represents the character
.Fa c .
If
.Fa c
needs no encoding, it is copied in unaltered. The string is
null terminated, and a pointer to the end of the string is
returned. The maximum length of any encoding is four
needs no encoding, it is copied in unaltered.
The string is null terminated, and a pointer to the end of the string is
returned.
The maximum length of any encoding is four
characters (not including the trailing
.Dv NUL ) ;
thus, when
@ -143,10 +144,10 @@ but have an additional argument
.Fa extra ,
pointing to a
.Dv NUL
terminated list of characters. These characters will be copied encoded or
backslash-escaped into
terminated list of characters.
These characters will be copied encoded or backslash-escaped into
.Fa dst .
These functions are useful e. g. to remove the special meaning
These functions are useful e.g. to remove the special meaning
of certain characters to shells.
.Pp
The encoding is a unique, invertible representation composed entirely of
@ -185,11 +186,11 @@ Synonym for
\&|
.Dv VIS_NL .
.It Dv VIS_SAFE
Only encode "unsafe" characters. Unsafe means control
characters which may cause common terminals to perform
unexpected functions. Currently this form allows space,
tab, newline, backspace, bell, and return - in addition
to all graphic characters - unencoded.
Only encode "unsafe" characters.
Unsafe means control characters which may cause common terminals to perform
unexpected functions.
Currently this form allows space, tab, newline, backspace, bell, and
return - in addition to all graphic characters - unencoded.
.El
.Pp
(The above flags have no effect for
@ -292,7 +293,8 @@ If
is an octal digit, the latter representation is used to
avoid ambiguity.
.It Dv VIS_OCTAL
Use a three digit octal sequence. The form is
Use a three digit octal sequence.
The form is
.Ql \eddd
where
.Em d