diff options
| author | Jacob McDonnell <jacob@jacobmcdonnell.com> | 2026-04-26 16:38:00 -0400 |
|---|---|---|
| committer | Jacob McDonnell <jacob@jacobmcdonnell.com> | 2026-04-26 16:38:00 -0400 |
| commit | 97d5c458cfa039d857301e1ca7d5af3beb37131d (patch) | |
| tree | b460cd850d0537eb71806ba30358840377b27688 /static/v10/man8 | |
| parent | b89dc2331a50c63f8b33272a5c4c61ab98abdaa3 (diff) | |
build: Better Build System
Diffstat (limited to 'static/v10/man8')
119 files changed, 0 insertions, 11832 deletions
diff --git a/static/v10/man8/11.8 b/static/v10/man8/11.8 deleted file mode 100644 index ed079810..00000000 --- a/static/v10/man8/11.8 +++ /dev/null @@ -1,12 +0,0 @@ -.TH 11 8 -.CT 1 prog_c -.SH NAME -11as, 11cc, 11ld, 11nm, 11ranlib, 11reloc, 11size, 11strip \- pdp11 support -.SH DESCRIPTION -These programs do cross-compiling and related support -functions for the DEC PDP-11 family of computers. -Their descriptions correspond closely with those of -similarly named programs in Section 1 of this manual. -.SH FILES -.F 11a.out -output file diff --git a/static/v10/man8/20boot.8 b/static/v10/man8/20boot.8 deleted file mode 100644 index 893cb167..00000000 --- a/static/v10/man8/20boot.8 +++ /dev/null @@ -1,31 +0,0 @@ -.pa 1 -.he '20BOOT (VIII)'1/25/73'20BOOT (VIII)' -.ti 0 -NAME 20boot -- install new 11/20 system -.sp -.ti 0 -SYNOPSIS 20boot______ [ x_ ] -.sp -.ti 0 -DESCRIPTION This -shell command file copies the current version -of the 11/20 program used to run the VT01 display -onto the /dev/vt0 file. - -If no argument is given, the 11/20 program should be executing -but idle; the 11/20 program is sent preceded by a -"reboot" command. -If an argument is given, the 11/20 should -have been restarted at its ROM location -777300. -.sp -.ti 0 -FILES /dev/vt0; -.br -/sys/mdec/20.o (11/20 program) -.sp -.ti 0 -SEE ALSO vt0 (IV) -.sp -.ti 0 -DIAGNOSTICS -- diff --git a/static/v10/man8/Makefile b/static/v10/man8/Makefile deleted file mode 100644 index a2af6bc6..00000000 --- a/static/v10/man8/Makefile +++ /dev/null @@ -1,3 +0,0 @@ -MAN = $(wildcard *.8) - -include ../../mandoc.mk diff --git a/static/v10/man8/ac.8 b/static/v10/man8/ac.8 deleted file mode 100644 index 1048aa19..00000000 --- a/static/v10/man8/ac.8 +++ /dev/null @@ -1,56 +0,0 @@ -.TH AC 8 -.CT 1 sa_nonmortals -.SH NAME -ac \- login accounting -.SH SYNOPSIS -.B /etc/ac -[ -.I option ... -] -[ -.I person ... -] -.SH DESCRIPTION -.I Ac -prints the total connect time -recorded in the accounting file, -.FR /usr/adm/wtmp . -If -.I persons -are named, only those login names are considered. -The options are -.TP -.BI -w " file" -Use -.I file -instead of -.FR /usr/adm/wtmp ; -.L - -means the standard input. -.TP -.B -p -Print total connect time for each -user. -.TP -.B -d -Print totals for each day. -.PP -The accounting file -.F /usr/adm/wtmp -is maintained by -.I init -and -.IR login (8), -provided it exists. -To start accounting, create it with length 0. -When accounting is turned on, the file grows without limit. -It is prudent periodically -to process the data and truncate the file. -.SH FILES -.F /usr/adm/wtmp -.SH "SEE ALSO" -.IR init (8), -.IR sa (8), -.IR login (8), -.IR utmp (5), -.IR who (1) diff --git a/static/v10/man8/acct.8 b/static/v10/man8/acct.8 deleted file mode 100644 index fe5bebbc..00000000 --- a/static/v10/man8/acct.8 +++ /dev/null @@ -1,37 +0,0 @@ -.pa 1 -.he 'ACCT (VIII)'1/20/73'ACCT (VIII)' -.ti 0 -NAME acct -- login accounting -.sp -.ti 0 -SYNOPSIS acct____ [ -w__ wtmp ] [ -p__ ] [ -d__ ] people -.sp -.ti 0 -DESCRIPTION acct____ -produces a printout giving -connect time -for each user who has logged in -during the life of the current wtmp____ file. -A total is also produced. --w__ is used to specify an alternate wtmp file. --p__ prints individual totals; without this option, -only totals are printed. --d__ causes a printout for each midnight to midnight -period. -The people______ argument will limit the -printout to only the specified login names. -If no wtmp file is given, -/usr/adm/wtmp_____________ -is used. -.sp -.ti 0 -FILES /usr/adm/wtmp -.sp -.ti 0 -SEE ALSO init(VII), login(I), wtmp(V). -.sp -.ti 0 -DIAGNOSTICS "Cannot open 'wtmp'" if argument is unreadable. -.sp -.ti 0 -BUGS -- diff --git a/static/v10/man8/adduser.8 b/static/v10/man8/adduser.8 deleted file mode 100644 index c22c10b1..00000000 --- a/static/v10/man8/adduser.8 +++ /dev/null @@ -1,87 +0,0 @@ -.TH ADDUSER 8 -.UC 4 -.SH NAME -adduser \- procedure for adding new users -.SH DESCRIPTION -A new user must choose a login name, which must not already appear in -.I /etc/passwd. -An account can be added by editing a line into the passwd file; this must -be done with the password file locked e.g. by using -.IR vipw (8). -.PP -A new user is given a group and user id. -User id's should be distinct across a system, since they -are used to control access to files. -Typically, users working on -similar projects will be put in the same group. Thus at UCB we have -groups for system staff, faculty, graduate students, and a few special -groups for large projects. System staff is group \*(lq10\*(rq for historical -reasons, and the super-user is in this group. -.PP -A skeletal account for a new user \*(lqernie\*(rq would look like: -.IP -ernie::235:20:& Kovacs,508E,7925,6428202:/mnt/grad/ernie:/bin/csh -.PP -The first field is the login name \*(lqernie\*(rq. The next field is the -encrypted password which is not given and must be initialized using -.IR passwd (1). -The next two fields are the user and group id's. -Traditionally, users in group 20 are graduate students and have account -names with numbers in the 200's. -The next field gives information about ernie's real name, office and office -phone and home phone. -This information is used by the -.IR finger (1) -program. -From this information we can tell that ernie's real name is -\*(lqErnie Kovacs\*(rq (the & here serves to repeat \*(lqernie\*(rq -with appropriate capitalization), that his office is 508 Evans Hall, -his extension is x2-7925, and this his home phone number is 642-8202. -You can modify the -.IR finger (1) -program if necessary to allow different information to be encoded in -this field. The UCB version of finger knows several things particular -to Berkeley \- that phone extensions start \*(lq2\-\*(rq, that offices ending -in \*(lqE\*(rq are in Evans Hall and that offices ending in \*(lqC\*(rq are -in Cory Hall. -.PP -The final two fields give a login directory and a login shell name. -Traditionally, user files live on a file system which has the machines -single letter -.IR net (1) -address as the first of two characters. Thus on the Berkeley CS Department -VAX, whose Berknet address is ``csvax'' abbreviated ``v'' the user file -systems are mounted on ``/va'', ``/vb'', etc. -On each such filesystem there are subdirectories there for each group -of users, i.e.: \*(lq/va/staff\*(rq and \*(lq/vb/prof\*(rq. -This is not strictly necessary but keeps the number of files in the -top level directories reasonably small. -.PP -The login shell will default to \*(lq/bin/sh\*(rq if none is given. -Most users at Berkeley choose \*(lq/bin/csh\*(rq so this is usually -specified here. -.PP -It is useful to give new users some help in getting started, supplying -them with a few skeletal files such as -.I \&.profile -if they use \*(lq/bin/sh\*(rq, or -.I \&.cshrc -and -.I \&.login -if they use \*(lq/bin/csh\*(rq. -The directory -\*(lq/usr/skel\*(rq contains skeletal definitions of such files. -New users should be given copies of these files which, for instance, -arrange to use -.IR tset (1) -automatically at each login. -.SH FILES -.ta 2i -/etc/passwd password file -.br -/usr/skel skeletal login directory -.SH SEE ALSO -passwd(1), finger(1), chsh(1), chfn(1), passwd(5), vipw(8) -.SH BUGS -User information should be stored in its own data base separate from -the password file. diff --git a/static/v10/man8/analyze.8 b/static/v10/man8/analyze.8 deleted file mode 100644 index 72c8769c..00000000 --- a/static/v10/man8/analyze.8 +++ /dev/null @@ -1,117 +0,0 @@ -.lg 0 -.TH ANALYZE 8 -.UC 4 -.SH NAME -analyze \- Virtual UNIX postmortem crash analyzer -.SH SYNOPSIS -.B /etc/analyze -[ -.B \-s -swapfile -] [ -.B \-f -] [ -.B \-m -] [ -.B \-d -] [ -.B \-D -] [ -.B \-v -] -corefile -[ system ] -.SH DESCRIPTION -.I Analyze -is the post-mortem analyzer for the state of the paging system. -In order to use -.I analyze -you must arrange to get a image of the memory (and possibly the -paging area) of the system after it crashes (see -.IR crash (8)). -.PP -The -.I analyze -program reads the relevant system data structures from the core -image file and indexing information from -.B /vmunix -(or the specified file). -to determine the state of the paging subsystem at the point of crash. -It looks at each process in the system, and the resources each is -using in an attempt to determine inconsistencies in the paging system -state. Normally, the output consists of a sequence of lines showing -each active process, its state (whether swapped in or not), its -.I p0br, -and the number and location of its page table pages. -Any pages which are locked while raw i/o is in progress, or which -are locked because they are -.I intransit -are also printed. (Intransit text pages often diagnose as duplicated; -you will have to weed these out by hand.) -.PP -The program checks that any pages in core which are marked as not -modified are, in fact, identical to the swap space copies. -It also checks for non-overlap of the swap space, and that the core -map entries correspond to the page tables. -The state of the free list is also checked. -.PP -Options to -.I analyze: -.TP -.B \-D -causes the diskmap for each process to be printed. -.TP -.B \-d -causes the (sorted) paging area usage to be printed. -.TP -.B \-f -which causes the free list to be dumped. -.TP -.B \-m -causes the entire coremap state to be dumped. -.TP -.B \-v -(long unused) which causes a hugely verbose output format to be used. -.PP -In general, the output from this program can be confused by processes -which were forking, swapping, or exiting or -happened to be in unusual states when the -crash occurred. You should examine the flags fields of relevant processes -in the output of a -.IR pstat (8) -to weed out such processes. -.PP -It is possible to look at the core dump with -.I adb -if you do -.IP -adb /vmunix /vmcore -.br -.lg 0 -/m 80000000 #ffffffff -.LP -which fixes the map of -.I vmcore -so that symbols in data space will work. -Note that the debugger is looking at the physical memory at the point -of crash; you will have to determine which pages of physical memory -virtual pages are in if you wish to look at them. -If -.I analyze -says that a processes page tables are in page 218 (hex of course), then -you can look at them by looking at address 0x80043000 in the dump, i.e. -\*(lq80043000,80/X\*(rq will print the page of page tables. -.SH FILES -/vmunix default system namelist -.SH SEE ALSO -ps(1), crash(8), pstat(8) -.SH AUTHORS -Ozalp Babaoglu and William Joy -.SH DIAGNOSTICS -Various diagnostics about overlaps in swap mappings, missing swap mappings, -page table entries inconsistent with the core map, incore pages which -are marked clean but differ from disk-image copies, pages which are -locked or intransit, and inconsistencies in the free list. -.PP -It would be nice if this program analyzed the system in general, rather -than just the paging system in particular. diff --git a/static/v10/man8/apx.8 b/static/v10/man8/apx.8 deleted file mode 100644 index 3d2cd296..00000000 --- a/static/v10/man8/apx.8 +++ /dev/null @@ -1,33 +0,0 @@ -.TH APX 8 -.CT 1 sa_nonmortals secur -.SH NAME -apx \- mark an open stream device trusted -.SH SYNOPSIS -.B /etc/apx -[ -.I arg -] -.SH DESCRIPTION -By default, a freshly opened stream device has the -.B APX -bit cleared: it will reject all pex requests. -If invoked without an argument, -.I apx -will set the APX bit on its standard input -(by calling the -.B FIOAPX -control). -If invoked without an argument the -.B APX -bit is cleared. -.I Apx -needs licence -.B T_EXTERN -to run. -It is usually automatically invoked at login time, -provided that the source identifier of the standard input -of the login session is worthy. -.SH FILES -.F /etc/privs -.SH SEE ALSO -.IR pex (4) diff --git a/static/v10/man8/arcv.8 b/static/v10/man8/arcv.8 deleted file mode 100644 index a55ac199..00000000 --- a/static/v10/man8/arcv.8 +++ /dev/null @@ -1,23 +0,0 @@ -.TH ARCV 8 -.UC 4 -.SH NAME -arcv \- convert archives to new format -.SH SYNOPSIS -.B /etc/arcv -file ... -.SH DESCRIPTION -.I Arcv -converts archive files -(see -.IR ar (1), -.IR ar (5)) -from 32v and Third Berkeley editions to a new portable format. -The conversion is done in place, and the command -refuses to alter a file not in old archive format. -.PP -Old archives are marked with a magic number of 0177545 at the start; -new archives have a first line ``!<arch>''. -.SH FILES -/tmp/v*, temporary copy -.SH SEE ALSO -ar(1), ar(5) diff --git a/static/v10/man8/arff.8 b/static/v10/man8/arff.8 deleted file mode 100644 index 4f082533..00000000 --- a/static/v10/man8/arff.8 +++ /dev/null @@ -1,64 +0,0 @@ -.TH ARFF 8 -.CT 1 sa_nonmortals -.SH NAME -arff \- read RT11 files -.SH SYNOPSIS -.B arff -[ -.I key -] -[ -.I name ... -] -.SH DESCRIPTION -.I Arff -reads and writes files -on an RT11 volume, -such as the VAX-11/780 console floppy or -11/750 console tape. -Its actions are controlled by the -.I key -argument, in the manner of -.IR ar (1). -Other arguments -are the names of files -to be read or written. -.PP -The RT11 filesystem restricts names to the character set -.BR a - z0 - 9.\| , -and there are no subdirectories. -Filename arguments are trimmed to the last pathname element -and mapped to lower case. -.PP -The key must contain one of the letters -.LR rxdt , -which mean the same as in -.I ar. -Unlike -.I ar, -however, -.I arff -may reorder files to fit without moving existing files. -.PP -Other key letters are -.TP -v -Verbose. -.TP -.B f -The next argument is the name of the archive instead -of the default -.FR /dev/floppy . -.TP -.B m -Omit the DEC-standard sector interleaving algorithm; -needed when the file isn't a floppy; -e.g. the 11/750 console cassette. -.SH FILES -.F /dev/floppy -.SH BUGS -Floppy errors are handled ungracefully. -.br -The program is too floppy-dependent. -Mapping belongs in the device driver, -or at least shouldn't be the default. diff --git a/static/v10/man8/asd.8 b/static/v10/man8/asd.8 deleted file mode 100644 index 1bf1ff51..00000000 --- a/static/v10/man8/asd.8 +++ /dev/null @@ -1,174 +0,0 @@ -.TH ASD 8 -.CT 1 sa_auto -.SH NAME -asd \- automatic software distribution -.SH SYNOPSIS -.B /usr/lib/asd/cdaemon -.br -.B /usr/lib/asd/dkinstall -.br -.B /usr/lib/asd/mkspool -.br -.B /usr/lib/asd/rmlocks -.br -.B /usr/lib/asd/udaemon -.SH DESCRIPTION -These programs constitute the innards of the -automatic software distribution system -invoked by -.IR ship (8). -.PP -.I Mkspool -creates an -.SM ASD -spool directory for its invoker (if necessary), -puts a file named -.F dummy -in the directory to prevent -.I cdaemon -from deleting it, -and prints the directory's name. -.PP -.I Udaemon -examines its invoker's -.SM ASD -spool directory in lexical order -for things to do. -To forestall multiple daemons, it first makes an empty file named -.BI L. pid -in the spool directory -and tries to link to it a file -.FR lock . -If the link fails, -.BI L. pid -is removed and -.I udaemon -exits. -.PP -Shipping instructions -appear in pairs of files with -.B .s -and -.B .d -suffixes. -.I Udaemon -examines each status -.RB ( .s ) -file for destination names and -places a network call -to send the corresponding data -.RB ( .d ) -file to -.I dkinstall -at each destination. -.I Dkinstall -verifies the data -and gives it to -.IR inspkg , -see -.IR mkpkg (8). -.PP -A status file contains -zero or more entries, -each of which has one or more lines. -The first line of an entry is a -network address, -with default network -.B dk -and default service -.BR asd , -possibly followed by a blank and a failure report. -An entry with destination -.L # -is a comment and is ignored. -Lines after the first begin with -a tab, -and contain output generated by the entry. -If an entry has output, -it is considered complete -and will be processed no further. -.PP -.I Udaemon -scans each status file once, -and attempts to send the corresponding data file to the destination -for each incomplete entry. -If the attempt fails, -a failure report is appended to the entry, -and it remains incomplete. -If the attempt succeeds, -or the failure is severe, -an error message -or output from -.I dkinstall -is appended to the entry, -which makes the entry complete. -If an entry is completed successfully -but there are no output lines, -the entry is deleted. -.PP -Each instance of -.I udaemon -remembers which network addresses failed with non-severe errors; -entries with the same address in later status files -are given failure status `deferred for sequence.' -.PP -If at least one additional entry was completed, -.I udaemon -sends the new status file to the owner by -.IR mail (1) -after the whole file has been scanned. -If no incomplete entries remain, -both status and data files are removed. -.PP -.I Cdaemon -examines every subdirectory of -.FR /usr/spool/asd , -deletes empty directories and, impersonating the owner, -invokes -.I udaemon -for nonempty directories. -.I Cdaemon -should be run regularly by -.IR cron (8) -with super-user permissions. -.PP -.IR Rmlocks -removes all lock files in -subdirectories of -.FR /usr/spool/asd . -It should be called from -.IR rc (8). -.PP -Entries in an -.SM ASD -spool directory may be made without regard to locks -provided that everything is done in the right -sequence: -(1) call -.IR mkspool ; -(2) create the data file; -(3) create the status file under a temporary name; -(4) rename the status file to end with -.BR .s ; -(5) remove the -.F dummy -file, if present; and -(6) call -.IR udaemon . -.PP -Because -.I mail -will not send an empty file, -a status file must have a comment entry if -acknowledgment is desired after a -successful -.I udaemon -run. -.SH FILES -.BI /usr/spool/asd/ "userid " -user's -.SM ASD -spool directory -.SH SEE ALSO -.IR mkpkg (8), -.IR ship (8) diff --git a/static/v10/man8/atalla.8 b/static/v10/man8/atalla.8 deleted file mode 100644 index 3e73746e..00000000 --- a/static/v10/man8/atalla.8 +++ /dev/null @@ -1,62 +0,0 @@ -.TH ATALLA 8 -.SH NAME -atalla \- initializing a challenge box -.SH DESCRIPTION -It is easiest to initialize an Atalla -(a.k.a. SNK) box at the same time you use the -.B -c -option of -.IR pwx , -before you hand it to the user, not in the user's presence. -To initialize the box: -freak it out by giving five consecutive wrong PIN entries, for example by -pushing the sequence -.B ON -.B 0 -.B ENTER -five times. -The box's display should now read -.BR "ES0 ----" , -you push -.B 1 -.BR ENTER . -The display now reads -.BR "ES1 ----" , -you now enter eight bytes of secret key, which you may ask -.I pwx -to invent, and which the user will not know. -Each byte is represented by three octal digits, in the range -.B 000 -through -.BR 277 , -so it takes 24 key strokes to enter the secret key. -Now push -.BR ENTER , -and a check sum of form -.B "C xxxxxxxx" -is displayed. -Push -.B ENTER -again -and another check sum is displayed, -this time of form -.BR "F xxxxxxxx" . -Push -.B ENTER -yet again -and -the display reads -.BR "EP1 ----" . -At this point the box may be handed to the user. -The user enters a personal password (his ``PIN'') -of 4 through 8 digits' length, -followed by -.BR ENTER , -and again, as a check. -Thereafter the user must -type his personal password whenever he uses the box. -Instruct the user not to divulge his personal password, and -promise the user you will not divulge -his secret key. -.SH SEE ALSO -.IR passwd (1) diff --git a/static/v10/man8/authmgr.8 b/static/v10/man8/authmgr.8 deleted file mode 100644 index a20c22e2..00000000 --- a/static/v10/man8/authmgr.8 +++ /dev/null @@ -1,204 +0,0 @@ -.TH AUTHMGR 8 -.CT 1 sa_auto secur -.SH NAME -authmgr \- authenticate users and make secure calls -.SH SYNOPSIS -.B authmgr -.BI [ "options ..." ] -.SH DESCRIPTION -.I Authmgr -receives authentication requests from the network via -.IR svcmgr (8), -authenticates the requesting user, and redials their -call using one of the network interfaces, such as -.IR dkmgr (8). -The actual method used to authenticate the user depends -on the command line arguments and the environment at the -time -.I authmgr -is executed. -.PP -One mode is used when a user connects directly to the authentication -service. -In this mode, the user is asked to enter a login name (unless -there is a login name present in the CSOURCE environment variable). -The user is then challenged to encode some character string with -their challenge box (or possibly just enter their password), and -enter this as a response. -If the response is correct (i.e. the user had the correct encryption -key or password), the user is asked to enter the name of a new -destination, and the call is redialed to this new destination. -.PP -The other mode is used when a call to a service using the V9 authentication -protocol is rerouted through the authentication server (this is currently -only possible if the call was placed over the datakit, through a trunk). -In this case, the authentication server uses an extension of the "OK"/"NO" -protocol used by -.IR con (1). -Here, -.I authmgr -responds to a connection with a string ``CH''. -The calling program should prompt the user for a login name, and -send that login back, followed by a newline. -.I Authmgr -responds with a challenge string, up to 60 characters long, followed -by a newline (the challenge will be printable ASCII). -The calling process must encode this string (unless it is blank; then -it should obtain the user's password), and send this response back, also -terminated by a newline. -If the response is correct, the "OK"/"NO" protocol continues as -normal (that is, the call is automatically redialed by the server -without further intervention); otherwise, the "CH" challenge is -repeated. -.PP -The options are -.TP -.B -n -Do not prompt the user for a new destination, even if we don't have -one already. -This option is useful for authenticating an entire host (or a -powerful terminal) as one user. -The call will automatically be redialed in a special way. -.TP -.BI -f file -Use -.I file -as the configuration file rather than the default. -.PP -When a call is redialed, the security ID of the new call is that -of the authentication server itself, rather than the original security ID. -.PP -Much of the operation of the server is keyed off its configuration -file. Each line in the file contains an initial keyword, followed -by a number of arguments (there are no continuation lines), a line -starting with a ``#'' is a comment. The various keywords are: -.TP -.BI admin " address ..." -This defines the names of the administrators of the authentication server. -The addresses (up to 10 may be specified) are the electronic mail -addresses of the administrators. These names will received mail -if the server detects a possibly security violation. -.TP -.BI failures " number" -This sets the maximum number of failures to allow an individual -instantiation of -.I authmgr -before the connection is closed and the administrators are notified. -The default is 3. -.TP -.BI disallow " login" -Defines a login name that may not authenticate itself, even if it -exists in the keys file. -Any number of -.B disallow -lines may appear in the configuration file. -.TP -.BI usepasswd " regexp" -Tells -.I authmgr -that despite what the key file says, if the source of this call -matches -.IR regexp , -the user should be requested to enter their password from the -/etc/passwd file, rather than doing some kind of key encryption. -This is useful when -.I authmgr -is being used for authentication inside a trusted network, and -using encryption boxes would be too cumbersome. -.TP -.BI setuser " regexp user" -Map all calls from machines matching -.IR regexp -to -.IR user . -If the -.I user -field is empty, prompt for the login name. This can be useful -for calls coming from untrusted machines. -.TP -.BI setsvc " regexp service" -If a call comes from a machine matching -.IR regexp , -set the default service of the redialed call to -.IR service . -.TP -.BI setlog " regexp file" -Log calls from machines matching -.I regexp -in -.IR file . -.TP -.BI secmapid " regexp securityid" -If the security ID of the incoming call matches -.I regexp -(in the format of -.IR regexp (3)) -the outgoing security ID will be -.IR securityid . -There must be at least one -.B secmapid -lines in the configuration file, that of the default (``.*'') -outgoing security ID. -Because of the way the security ID mappings are stored, any -mappings that contain wildcards should appear after those without; -the mappings are tried against an incoming security ID in top-down -order (this implies that the default mapping should appear last). -.PP -The keys are stored in a key file. -Each line in the key file is of the form -.RS -.sp -login:keytype:key encoding: -.sp -.RE -Login is a usual login name. -Keytype is the type of the key (more than one encryption box type -are supported by -.IR authmgr ). -The key encoding is the key for this user; this encoding differs -depending on the keytype. -Currently, two key types recognized. -One is -.BR atalla , -for the Atalla Confidante style key (the key encoding for this -type is 8 groups of octal numbers between 0 and 0377, specifying the DES -key kept in this box, for example ``010 342 176 214 212 101 414 527''). -The other is -.BR passwd , -which means the key encoding is a standard password file 13 character -password entry (if the key encoding is blank, -.I authmgr -look in the password file for the password). -Because these keys are stored -in the clear, this file should be well protected, and probably -should be encrypted. -.PP -Currently, the authentication server may be connected to at the -service point ``security'' on the security host. -If you use the service ``gsecurity'', you get the no-redial -option of the server. -.SH FILES -.nf -.F /usr/net/authmgr.conf -.F /usr/net/authmgr.keys -.F /etc/passwd -.fi -.SH "SEE ALSO" -.IR con (1), -.IR regexp (3), -.IR svcmgr (8), -.IR dkmgr (8) -.SH BUGS -There is currently no support for encrypting the keys file. -.br -The only current use for this is over the datakit, and the -regular expressions in the secmapid line are not of the same -format as would be expected for wildcard datakit names. -.br -Users will still have to enter a login and password if the -service they redial doesn't believe -.IR authmgr . -.br -The -.I secmapid -parameter is currently ignored. diff --git a/static/v10/man8/backup.8 b/static/v10/man8/backup.8 deleted file mode 100644 index 793f463e..00000000 --- a/static/v10/man8/backup.8 +++ /dev/null @@ -1,90 +0,0 @@ -.TH BACKUP 8 -.CT 1 sa_nonmortals -.SH NAME -backup \- backup client administration -.SH SYNOPSIS -.B /usr/lib/backup/sel -.PP -.B /usr/lib/backup/fcheck -.I maxsize -.I maxdays -.I files ... -.PP -.B /usr/lib/backup/act -[ -.I stat -] -.SH DESCRIPTION -These programs select and back up files -to the incremental file backup system, -.IR backup (1). -.PP -.I Sel -prints on the standard output -a list of filenames that might need to be backed up. -The initial version -picks out files that have been changed in the past few days, -skipping huge files -and eliding boring names like -.BR core . -.I Sel -is a shell script; -the local administrator is expected to customize it. -.PP -.I Fcheck -is a fast, -specialized file scanning program, -used by -.IR sel . -It examines each of the -.IR files , -descending into directories, -and prints the name of each file -that has been changed in the last -.I maxdays -days and is smaller than -.I maxsize -kilobytes. -Symbolic links are followed when presented as arguments, -examined but not followed otherwise. -.PP -.I Act -reads a list of filenames from the standard input. -It searches the backup database -.IR backup (5) -for the current version of each file, -and backs up files that aren't registered. -.PP -By default, -.I act -sends errors by -.IR mail (1) -to user -.BR backup . -If the -.I stat -argument is non-empty, -errors and additional comforting chatter -are printed on the standard output instead. -.PP -One way to request automatic backups is to run -.IP -.L -/usr/lib/backup/sel | /usr/lib/backup/act -.LP -regularly from -.IR cron (8). -Particular files may be backed up by hand at any time -by running -.I act -with a list of filenames. -There are no special permissions involved; -any user may run -.IR act . -.SH SEE ALSO -.IR backup (1), -.IR backup (5) -.br -A. Hume, `The File Motel: An Owner's Manual', -this manual, -Volume 2 diff --git a/static/v10/man8/blmount.8 b/static/v10/man8/blmount.8 deleted file mode 100644 index de9f167e..00000000 --- a/static/v10/man8/blmount.8 +++ /dev/null @@ -1,23 +0,0 @@ -.TH BLMOUNT 8 -.CT 1 sa_nonmortals -.SH NAME -blmount \- mark directories blind -.SH SYNOPSIS -.B /etc/blmount -[ -.B -u -] -.I directory -.SH DESCRIPTION -.I Blmount -without options -mounts the named directory on itself as a blind file system -.IR bl (4) . -With option -.BR -u , -the treatment is reversed. -The -.I directory -must be on a traditional (disk) file system. -.SH SEE ALSO -.IR bl (4) diff --git a/static/v10/man8/bproc.8 b/static/v10/man8/bproc.8 deleted file mode 100644 index fd4f5a77..00000000 --- a/static/v10/man8/bproc.8 +++ /dev/null @@ -1,235 +0,0 @@ -.pa 1 -.he 'BOOT PROCEDURES (VIII)'2/6/73'BOOT PROCEDURES (VIII)' -.ti 0 -NAME bos, maki, vcboot, msys, et__ al__. -.sp -.ti 0 -DESCRIPTION -.br -.in 8 -On -the RF disk, the highest 16K words are -reserved for stand-alone programs. -These 16K words are allocated as follows: -.sp -bos (1K) -.br -Warm UNIX (7K) -.br -Cold UNIX (8K) -.sp -The program bos___ (Bootstrap Operating System) -examines the console switches and executes -one of several internal programs depending on the setting. -The following settings are currently recognized: -.sp -.in +8 -.ti -8 -??? Will read Warm UNIX from -the RF into core location 0 and transfer to 600. -.sp -.ti -8 -1 Will read Cold UNIX from the -RF into core location 0 and transfer to 600. -.sp -.ti -8 -10 Will dump all of memory -from core location 0 onto DECtape drive 7 -and then halt. -.sp -.ti -8 -20 Will read 256 words from RK0 into -core 0 and transfer to zero. -This is the procedure to boot -DOS from an RK. -.sp -.ti -8 -40 This is the same as 10 above, but -instead of halting, UNIX warm is loaded. -.sp -.ti -8 -0 Will load a standard UNIX binary paper tape -into core location 0 and transfer to 0. -.sp -.ti -8 -77500 Will load the standard DEC absolute and binary -loaders and transfer to 77500. -.sp -.in 8 -All manual methods of booting the system involve -manipulation of the console switches. -In order for this to be possible, -the panel must be unlocked -and the machine must be halted. -Also, remember that at the time UNIX comes up, -the console switches must contain 773030 -for a single-user system; anything else gives -a multi-user system. - -There are four temperatures of boots. -They are: - -.in +4 -Hot boot: restart the system without refreshing -its code, that is simply by transferring to -its start. -The only use for this procedure is if the -system has been patched and one doesn't wish -to redo the patches. -The procedure is: - - 600 in switches - Load address - (773030 in switches for single-user system) - start - -Warm boot: refresh system code from the RF disk, but -the "panic" routine must be in core. -Best for general use if it works, since -outstanding I/O -is cleaned up. -Procedure: - - 602 in switches - load address - (773030 in switches for single-user system) - start (flushes any I/O, then executes bos___) - -Cool boot: RF disk is OK, but nothing in core. -Procedure: - - UTIL DECtape on drive 0 - 773030 in switches - load address - (602 in switches for multi-user system) - start - type "boot" on console tty to load bos___ - -Cold boot: nothing in core, nothing on RF. -Best to have an expert around for this -one. -Procedure: - - INIT DECtape on drive 0 - 773030 in switches - load address - 1 in switches - start - (machine halts. last chance to preserve RF!) - 773030 in switches - continue - (reads in basic files) - -UNIX is then up, but for various reasons, one should -do a warm boot (single user) right away. -At this point also, one might -consider whether the INIT tape UNIX is the -latest version. -If there is reason for doubt, -mount the /sys disk pack, change to directory -/sys/sys, do "msys u unix", and reboot. -Then get the /bin-/etc-/lib tape which contains -the rest of of the RF disk, -and do an "mt x". -Conceivably, "create errors" due to lack of some -directories will occur; make the directories, -then try again. -Set the date correctly; the system starts off -at time 0. - -At this point UNIX is in full operation and -can be rebooted for -a multi-user system. -.sp -.in 8 -Here is what happens during a cold boot: -the INIT tape contains a program called -.ul -vcboot. -The ROM program reads vcboot -from the tape into -core location 0 and transfers to it. -vcboot then reads 16K words from -the DECtape (blocks 1-32) -and copies the data to the highest 16K words of -the RF. -Thus this initializes the read-only part of the RF. -vcboot then reads in bos___ and executes it. -bos___ reads in Cold UNIX and executes that. -Cold UNIX halts for a last chance before -it completely initializes the RF file system. -When continue is pressed, -Cold UNIX initializes the RF. -It then reads the DECtape for initialization files -starting from block 33. -Normal operation then commences -with the execution of "/etc/init". -.sp -The INIT tape is made by the program maki____ -running under UNIX. -maki____ writes vcboot______ on block 0 of -.ul -/dev/tap7. -It then copies the RF 16K words (using -.ul -/dev/rf0) -onto blocks 1 thru 32. -It has internally a list of files to -be copied from block 33 on. -This list follows: -.sp -.nf -.in +8 -/etc/init -/bin/chmod -/bin/date -/bin/login -/bin/ls -/bin/mkdir -/etc/mount -/bin/sh -/bin/tap -/bin/mt -.in -8 -.fi -.sp -Thus this is the set of programs available after a cold boot. -init____ and sh__ are mandatory. -For multi-user UNIX, -getty_____ and login_____ are also necessary. -mkdir_____ is necessary due to a bug in tap___. -mt__, tap___ and mount_____ are useful to -bring in new files. -As soon as possible, date____ should be done. -That leaves ls__ and chmod_____ as frosting. -.sp -The last link in this incestuous -daisy chain is the program msys____. -.sp - msys____ char file -.sp -will copy the file file____ onto the -RF read only slot specified by the character char____. -Char is taken from the following set: -.sp - b_ bos - u_ Warm UNIX - 1_ Cold UNIX -.sp -.in 16 -.ti 0 -FILES /dev/rf0, -/dev/tap? -.sp -.ti 0 -SEE ALSO init(VII), -tap(I), -sh(I), -mkdir(I) -.sp -.ti 0 -DIAGNOSTICS -- -.sp -.ti 0 -BUGS This -section is very configuration dependent. diff --git a/static/v10/man8/check.8 b/static/v10/man8/check.8 deleted file mode 100644 index 9f6e030b..00000000 --- a/static/v10/man8/check.8 +++ /dev/null @@ -1,50 +0,0 @@ -.pa 1 -.he 'CHECK (VIII)'1/20/73'CHECK (VIII)' -.ti 0 -NAME check -- file system consistency check -.sp -.ti 0 -SYNOPSIS check_____ [ filesystem [ blockno918 ... ] ] -.sp -.ti 0 -DESCRIPTION check_____ -will examine a file system, -build a bit map of used blocks, -and compare this bit map against -the bit map maintained on the file system. -If the file system is not specified, -a check of all -of the normally mounted file systems -is performed. -Output includes the number of files on the file system, -the number of these that are 'large', the number -of indirect blocks, -the number -of used blocks, and the number of free blocks. -.sp -check_____ works by examining the i-nodes -on the file system and is entirely -independent of its directory hierarchy. -The file system may be, -but need not be, mounted. - -.ti 0 -FILES /dev/rf?, -/dev/rk?, -/dev/rp? -.sp -.ti 0 -SEE ALSO find(I), ds(I) -.sp -.ti 0 -DIAGNOSTICS Diagnostics are produced for -blocks missing, duplicated, and bad block addresses. -Diagnostics are also produced for block numbers passed as parameters. -In each case, the block number, i-number, and -block class (i_ = inode, x_ indirect, f_ free) is printed. -.sp -.ti 0 -BUGS The -checking process is two pass in nature. -If checking is done on an active file system, -extraneous diagnostics may occur. diff --git a/static/v10/man8/chk.8 b/static/v10/man8/chk.8 deleted file mode 100644 index 54114b62..00000000 --- a/static/v10/man8/chk.8 +++ /dev/null @@ -1,21 +0,0 @@ -.pa 1 -.he 'CHK (VIII)'1/20/73'CHK (VIII)' -.ti 0 -NAME chk -- check + dcheck -.sp -.ti 0 -SYNOPSIS chk -.sp -.ti 0 -DESCRIPTION This -command file does a check_____ and a dcheck______ of all of the normally mounted -file systems. -.sp -.ti 0 -FILES /dev/[fkp]* -.sp -.ti 0 -SEE ALSO check (VIII), dcheck (VIII) -.sp -.ti 0 -DIAGNOSTICS see "SEE ALSO" diff --git a/static/v10/man8/chown.8 b/static/v10/man8/chown.8 deleted file mode 100644 index ba114a64..00000000 --- a/static/v10/man8/chown.8 +++ /dev/null @@ -1,47 +0,0 @@ -.TH CHOWN 8 -.CT 1 sa_nonmortals secur -.SH NAME -chown \- change owner or group -.SH SYNOPSIS -.B /etc/chown -.IB owner , group -.I file ... -.SH DESCRIPTION -.I Chown -changes the owner of the -.I files -to -.I owner -and the groupid to -.IR group . -Either -.I owner -or -.I group -may be omitted -to leave the owner or groupid unchanged. -.PP -.I Owner -may be either a decimal userid or -a login name found in -.FR /etc/passwd . -.I Group -may be either a decimal groupid or -a group name found in -.FR /etc/group . -.PP -The owner of a file -may change its group -to that of the current process. -Other changes are restricted to the super-user. -.SH FILES -.F /etc/passwd -.br -.F /etc/group -.SH "SEE ALSO" -.I chown -in -.IR chmod (2), -.IR passwd (5), -.IR chmod (1), -.IR chdate (1) diff --git a/static/v10/man8/chuck.8 b/static/v10/man8/chuck.8 deleted file mode 100644 index 087b6d50..00000000 --- a/static/v10/man8/chuck.8 +++ /dev/null @@ -1,116 +0,0 @@ -.TH CHUCK 8 -.CT 1 sa_nonmortals -.SH NAME -chuck \- a file system checking program -.SH SYNOPSIS -.B /etc/chuck -[ -.I option ... -] -.I device -.PP -.B /etc/chuck -.B -M -.I blocks -.I device -.PP -.B /etc/upchuck -[ -.B -w -] [ -.B -p -.I program -] -.SH DESCRIPTION -.PP -.I Chuck -checks and optionally repairs the file system on the named -.I device. -It is normally invoked by -.I upchuck -by -.IR rc (8) -during reboots. -The -.B -w -flag to -.I upchuck -is passed on to -.I program. -If -.I program -is not present, the default is -.FR /etc/chuck . -(Try, as super-user, -.B "/etc/upchuck -p /bin/echo -to see the normal arguments to -.IR chuck .) -If -.I upchuck -can read the raw version of -.I device, -it will, except for the root file system. -.PP -The options are -.TP -.B -w -Try to do standard repairs. -.TP -.BI -b " blocksize -Specify file system block size; default is 4096. -.TP -.B -i -Interactive. -Ask approval for each change. -.TP -.BI -I " inode ... -.br -.ns -.TP -.BI -B " block ... -Report on inodes or blocks specified by number. -.TP -.B -v -Verbose. -Give more commentary. -.PP -.I Chuck -can also make a new file system: -.B "chuck -M" -.I size device -makes a bitmapped file system (only) -of -.I size -4096-byte blocks -on -.IR device . -It asks approval before writing. -.SH FILES -.F /etc/fstab -.SH "SEE ALSO" -.IR fstab (5), -.IR filsys (5), -.IR fsck (8), -.IR reboot (8) -.SH BUGS -.I Chuck -does not replace real expertise. -It will not automatically repair a file system with duplicate blocks. -In complicated situations it may have to be run -several times to get complete consistency. -.br -It will not recover from I/O errors in reading the inodes, -and does not yet extend -.F lost+found -when necessary. -.br -It uses memory freely (about 12 bytes per file system block -and 84 bytes per inode). -.br -.I Chuck -is still experimental, -and acts the part. -Error messages are usually inscrutable. -.br -It believes even preposterous super-blocks and -consequently can get core images. diff --git a/static/v10/man8/cl.8 b/static/v10/man8/cl.8 deleted file mode 100644 index 75a0de9e..00000000 --- a/static/v10/man8/cl.8 +++ /dev/null @@ -1,100 +0,0 @@ -.TH CL 8 -.CT 1 sa_nonmortals -.SH NAME -cl, integrity \- file system label check -.SH SYNOPSIS -.B /etc/cl -[ -.IR specfile " | " dir -] ... -.PP -.B /etc/integrity -[ -.I rootdir -] -.SH DESCRIPTION -.I Cl -examines file trees for correctness of labels. -Each -.I specfile -argument names a file containing a description -of the labels expected in a given subtree of a file system. -Each line of a -.I specfile -has the form -.IP -.L -filename uid,gid mode capabilities licenses label -.LP -User and group ids are specified in the style of -.IR chown (8). -The mode is specified in the style of -.IR chmod (2); -only the 07777 bits are significant. -Capabilities and licenses are in the style of -.IR atopriv ; -see -.IR labtoa (3). -The label is in the style of -.IR atolab, -without capabilities or licenses. -.PP -The first valid line names the root of the tree in question. -Subsequent lines name particular files in the tree. -A report is made for each `suspicious' file and for each -particular file which does -not match its description in -.IR specfile . -.LP -A suspicious file is a file that is not named in the -.I specfile -for which one of the following holds: -.IP -The label has flag -.B L_UNDEF -or -.BR L_YES . -.br -The file is a special file the label flag is -.BR L_NO . -.br -The file is not a special file the label flag is not -.BR L_NO . -.br -The lattice value of the label is not dominated by the -label in the first line of -.IR specfile . -.br -The capability or license is not dominated by the corresponding -value in the first line of -.IR specfile . -.LP -Each named directory argument -.I dir -is treated as if there were a -.I specfile -argument -consisting of just a single line -.IP -.EX -\fIdir\fP bin,bin 666 ----- ----- 0000... -.EE -.I Integrity -surveys the directory tree dependent from -.I rootdir, -or -.L / -if no -.I rootdir -is given. -It reports non-bottom labels, which are possible signs -of loss of integrity \- modification without privilege. -The search cuts off at directories with non-bottom labels. -.SH "SEE ALSO" -.IR getflab (2), -.IR ftw (3), -.IR lcheck (8) -.SH BUGS -Extraneous diagnostics -may be produced if this command is applied to -active file systems. diff --git a/static/v10/man8/clri.8 b/static/v10/man8/clri.8 deleted file mode 100644 index 68ec27af..00000000 --- a/static/v10/man8/clri.8 +++ /dev/null @@ -1,41 +0,0 @@ -.pa 1 -.he 'CLRI (VIII)'1/20/73'CLRI (VIII)' -.ti 0 -NAME clri -- clear i-node -.sp -.ti 0 -SYNOPSIS clri i-number [ file system ] -.sp -.ti 0 -DESCRIPTION clri____ -writes zeros on the 32 bytes occupied by the i-node -numbered -.ul -i-number. -If the -.ul -file system -argument is given, the i-node resides on -the given device, otherwise on a -default file system. -The file system argument -must be a special file -name referring to a device -containing a file system. - -After clri____, any blocks -in the affected file -will show up as "missing" in a check_____ of -the file system. - -Read and write permission is required on the specified -file system device. -The i-node becomes allocatable. - -The primary purpose of this routine -is to remove a file which -for some reason appears in no -directory. -.sp -.ti 0 -DIAGNOSTICS "error" diff --git a/static/v10/man8/config.8 b/static/v10/man8/config.8 deleted file mode 100644 index dc215527..00000000 --- a/static/v10/man8/config.8 +++ /dev/null @@ -1,48 +0,0 @@ -.TH CONFIG 8 -.SH NAME -config \- configure a Unix kernel -.SH SYNOPSIS -.B /etc/config -[ machine ] -.SH DESCRIPTION -.I Config -generates files used to build a Unix kernel -for the named -.IR machine . -The working directory should be -.I /usr/sys/conf -or -.IR /usr/sys/ machine; -if the latter, -.I machine -may be omitted from the command. -.PP -A machine description is expected in -.RI machine /conf ; -a makefile, -a number of header files, -and some C and assembler programs -are generated from the description. -.PP -The usual way to configure a new system is: -.nf -mkdir /usr/sys/newmach -cd /usr/sys/newmach -(create conf) -/etc/config -make -.fi -.SH FILES -\&../conf/makefile makefile template -.br -\&../conf/files list of kernel source files -.br -files more sources specific to this machine -.br -\&../conf/devices list of device handlers -.br -devices more devices specific to this machine -.br -conf machine description -.SH SEE ALSO -config(5) diff --git a/static/v10/man8/cpp.8 b/static/v10/man8/cpp.8 deleted file mode 100644 index fa52b773..00000000 --- a/static/v10/man8/cpp.8 +++ /dev/null @@ -1,114 +0,0 @@ -.TH CPP 8 -.CT 1 prog_c -.SH NAME -cpp \- C language preprocessor -.SH SYNOPSIS -.B /lib/cpp -[ -.I option ... -] -[ -.I ifile -[ -.I ofile -] -] -.SH DESCRIPTION -.I Cpp\^ -interprets preprocessor directives -and does macro substitution -for -.IR cc (1) -and other compilers. -The input -.I ifile -and output -.I ofile -default to standard input and standard output respectively. -.PP -The options are: -.TP -.B -P -Do not place line number markings in output. -.TP -.B -C -Do not remove comments. -.TP -.BI -U name\^ -.PD 0 -.TP -.BI -D name\^ -.TP -.BI -D name=def\^ -.TP -.BI -I dir\^ -Same as in -.IR cc (1). -.B -U -overrides -.BR -D . -.PD -.TP -.B -H -Report all included files on standard error file,. -.TP -.B -M -Attach modification date to file names in line number -directives thus: -.IB file @ modtime, -where modtime is the integer number of seconds since the epoch. -.TP -.B -T -Truncate preprocessor symbols to eight characters. -.TP -.BI -Y dir -Use -.I dir -instead of -.F /usr/include -as the last resort in searching for include files. -.PP -The output file contains processed text sprinkled -with lines that show the original input line numbering: -.IP -.B # -.I linenumber -.L -"\fIifile\fP" -.PP -The input language is as described in the reference, -with a few additions: -.PP -The -.B # -.I linenumber -marks placed in the output are accepted as an alternative -to the official -.B #line -directive. -.PP -These symbols are predefined in various implementations: -.IP -.EX -ibm gcos os tss unix -interdata pdp11 u370 u3b u3b5 vax -RES RT -lint -.EE -.PP -Preprocessor formal parameters are recognized within -quoted strings in the replacement text. -.PP -When comments are removed they are replaced by null strings; -this unofficial feature makes it possible to construct -identifiers by concatenation. -.SH FILES -.TF /usr/include -.TP -.F /usr/include -standard directory for include files -.SH SEE ALSO -B. W. Kernighan and D. M. Ritchie, -.I The C Programming Language, -Prentice-Hall, -1988 diff --git a/static/v10/man8/crash.8 b/static/v10/man8/crash.8 deleted file mode 100644 index e38a694c..00000000 --- a/static/v10/man8/crash.8 +++ /dev/null @@ -1,268 +0,0 @@ -.TH CRASH 8 VAX-11 -.UC 4 -.SH NAME -crash \- what happens when the system crashes -.SH DESCRIPTION -This section explains what happens when the system crashes and how -you can get a crash dump for analysis of non-transient problems. -.PP -When the system crashes voluntarily it prints a message of the form -.IP -panic: why i gave up the ghost -.LP -on the console, and then invokes an automatic reboot procedure as -described in -.IR reboot (8). -If the auto-reboot switch is off on the console, then the processor -will simply halt at this point. -Otherwise the registers and the top few locations of the stack will -be printed on the console, and then the system will check the disks -and (unless some unexpected inconsistency is encountered), resume -multi-user operations. -.PP -The system has a large number of internal consistency checks; if one -of these fails, then it will panic with a very short message indicating -which one failed. In the absence of a dump, little can be done about -one of these. If the problem recurs, you should arrange to get a dump -for further analysis by running with auto-reboot disabled during normal -working hours and then following the procedure described below. -.PP -The most common cause of system failures is hardware failure, which -can reflect itself in different ways. Here are the messages which -you are likely to encounter, with some hints as to causes. -Left unstated in all cases is the possibility that hardware or software -error produced the message in some unexpected way. -.TP -IO err in push -.ns -.TP -hard IO err in swap -The system encountered an error trying to write to the paging device -or an error in reading critical information from a disk drive. -You should fix your disk if it is broken or unreliable. -.TP -Timeout table overflow -.ns -.TP -ran out of bdp's -.ns -.TP -ran out of uba map -These really shouldn't be panics, but until we fix up the data structures -involved, running out of entries causes a crash. If the timeout table -overflows, you should make it bigger. If you run out of bdp's or uba map -you probably have a buggy device driver in your system, allocating and -not releasing UNIBUS resources. -.TP -KSP not valid -.ns -.TP -SBI fault -.ns -.TP -Machine check -.ns -.TP -CHM? in kernel -These indicate either a serious bug in the system or, more often, -a glitch or failing hardware. For the machine check, the top part of -the resulting stack frame gives more information. You can refer to a -VAX 11/780 System Maintenance Guide for information on machine checks. -If machine checks or SBI faults recur, check out the hardware or call -field service. If the other faults recur, there is likely a bug somewhere -in the system, although these can be caused by a flakey processor. -Run processor microdiagnostics. -.TP -trap type %d, code=%d -A unexpected trap has occurred within the system; the trap types are: -.RS -.TP 10 -0 -reserved addressing mode -.br -.ns -.TP 10 -1 -privileged instruction -.br -.ns -.TP 10 -2 -BPT -.br -.ns -.TP 10 -3 -XFC -.br -.ns -.TP 10 -4 -reserved operand -.br -.ns -.TP 10 -5 -CHMK (system call) -.br -.ns -.TP 10 -6 -arithmetic trap -.br -.ns -.TP 10 -7 -reschedule trap (software level 3) -.br -.ns -.TP 10 -8 -segmentation fault -.br -.ns -.TP 10 -9 -protection fault -.br -.ns -.TP 10 -10 -trace pending (TP bit) -.RE -.IP -The favorite trap type in system crashes is trap type 9, indicating -a wild reference. The code is the referenced address. If you look -down the stack, just after the trap type and the code are the pc and -the ps of the processor when it trapped, showing you where in the -system the problem occurred. These problems tend to be easy to track -down if they are kernel bugs since the processor stops cold, but random -flakiness seems to cause this sometimes, e.g. we have trapped with -code 80000800 three times in six months as an instruction fetch went across -this page boundary in the kernel but have been unable to find any reason -for this to have happened. -.TP -init died -The system initialization process has exited. This is bad news, as no new -users will then be able to log in. Rebooting is the only fix, so the -system just does it right away. -.PP -That completes the list of panic types you are likely to see. -Now for the crash dump procedure: -.PP -At the moment a dump can be taken only on magnetic tape. -Before you do anything, be sure that a clean tape is mounted with a ring-in -on the tape drive if you plan to make a dump. -.PP -Write the date and time on the console log. -Use the console commands to examine the registers, program status long word, -and the top several locations on the stack. -A suggested command sequence, which is executed by the \*(lq@DUMP\*(rq -console command script, is: -.DS -.nf - E PSL<return> - E R0/NE:F<return> - E SP<return> - E/V @ /NE:40<return> -.fi -.DE -If hardware problems dictate a special set of commands be executed when -the system crashes, a sequence of commands can be saved using the console -command \*(lqLINK\*(rq to be reexecuted with \*(lqPERFORM\*(rq (which can be -abbreviated \*(lqP\*(rq). -If a dump is to be taken on magnetic tape (this is a good idea -in most any case where the cause of the crash is not immediately obvious) -then the following commands will (should) be executed: -.DS -.nf - D PSL 0<return> - D PC 80000200<return> - C<return> -.fi -.DE -These commands are actually part of the standard \*(lq@DUMP\*(rq script. -This should write a copy of all of memory -on the tape, followed by two EOF marks. -Caution: -Any error is taken to mean the end of memory has been reached. -This means that you must be sure the ring is in, -the tape is ready, and the tape is clean and new. -.PP -If there are not 40(hex) locations active on the kernel stack when the -procedure is begun, then the console may begin to print error diagnostics. -You can stop this by hitting \*(lq^C\*(rq (control-C), and then give the -last three commands above. -.PP -If the dump fails, you can try again, -but some of the registers will be lost. -See below for what to do with the tape. -.PP -To restart after a crash, follow the directions in -.IR reboot (8); -if the virtual memory subsystem is suspected as the cause of the crash, -then a version of the system other than \*(lqvmunix\*(rq should be booted -which will leave the paging areas temporarily intact -for use by the post-mortem analysis program -.I analyze. -After checking your root file system consistency with -.IR fsck (8), -you can read the core dump tape into the file /vmcore with -.IP -dd if=/dev/rmt0 of=/vmcore bs=20b -.LP -It does not work to use just -.IR cp (1), -as the tape is blocked. -With the system still in single-user mode, run the analysis program -.I analyze, -e.g.: -.IP -analyze \-s /dev/drum /vmcore /vmunix -.LP -and save the output. -Then boot up -\*(lqvmunix\*(rq -and let it do the automatic reboot, i.e. to boot multi-user from -an RM03/RM05/RP06 on the MASSBUS -.IP ->>> BOOT RPM -.PP -After rebooting, to analyze a dump you should execute -.I "ps \-alxk" -to print the process table at the time of the crash. -Use -.IR adb (1) -to examine -.IR /vmcore . -The location -.I dumpstack\-80000000 -is the bottom of a stack onto which were pushed the stack pointer -.BR sp , -.B PCBB -(containing the physical address of a -.IR u_area ), -.BR MAPEN , -.BR IPL , -and registers -.BR r13 \- r0 -(in that order). -.BR r13 (fp) -is the system frame pointer and the stack is used in standard -.B calls -format. Use -.IR adb (1) -to get a reverse calling order. -In most cases this procedure will give -an idea of what is wrong. -A more complete discussion -of system debugging is impossible here. -See, however, -.IR analyze (8) -for some more hints. -.SH "SEE ALSO" -analyze(8), reboot(8) -.br -.I "VAX 11/780 System Maintenance Guide" -for more information about machine checks. -.SH BUGS diff --git a/static/v10/man8/cron.8 b/static/v10/man8/cron.8 deleted file mode 100644 index 3a58416f..00000000 --- a/static/v10/man8/cron.8 +++ /dev/null @@ -1,86 +0,0 @@ -.TH CRON 8 -.CT 1 sa_auto -.SH NAME -cron \- clock daemon -.SH SYNOPSIS -.B /etc/cron -.SH DESCRIPTION -.I Cron -executes commands at specified dates and times -according to the instructions in the file -.FR /etc/crontab . -It should be run once from -.IR rc (8). -.PP -.I Crontab -entries are lines of seven fields separated by blanks or tabs: -.IP -.I -login minute hour day month weekday command -.PP -.I Login -is the login name under -whose userid and groupid -the command should be executed. -The next five fields are integer patterns for -.PD0 -.RS -.TP \w'day\ of\ month\ \ 'u -minute -0-59 -.TP -hour -0-23 -.TP -day of month -1-31 -.TP -month of year -1-12 -.TP -day of week -0-6; 0=Sunday -.PD -.RE -.PP -Each pattern may -contain a number in the range above; -two numbers separated by -a hyphen -meaning an inclusive range; -a list of numbers separated by -commas meaning any of the numbers; -or an asterisk meaning all legal values. -.PP -The last field is a string -to be executed by the shell, -after replacing -.L % -with newline. -.PP -It is wise to spread the times of activities to avoid -bogging the system down at favorite hours. -.PP -.I Cron -examines -.I crontab -every minute. -.SH EXAMPLES -.EX -daemon 17 3 * * * /usr/bin/calendar - # reminders at 0317 -adm 15 4 1,15 * * ac -p | mail adm # bimonthly accounts -root 0 12 22-28 11 4 /etc/wall Time for Thanksgiving dinner -.EE -.SH FILES -.F /etc/crontab -.SH SEE ALSO -.IR at (1) -.SH BUGS -The behavior of -.L % -in -.I crontab -entries is nonstandard. -Strings following -.L % -should be delivered to the command as standard input. diff --git a/static/v10/man8/dcheck.8 b/static/v10/man8/dcheck.8 deleted file mode 100644 index 9f9d8eec..00000000 --- a/static/v10/man8/dcheck.8 +++ /dev/null @@ -1,44 +0,0 @@ -.pa 1 -.he 'DCHECK (VIII)'1/20/73'DCHECK (VIII)' -.ti 0 -NAME dcheck -- directory consistency check -.sp -.ti 0 -SYNOPSIS dcheck______ [ -l__ ] [ device ] -.sp -.ti 0 -DESCRIPTION dcheck______ -builds an image of the directory hierarchy -of the specified device -by reading all its directories (using physical I/O -guided by the i-nodes on the device). -A list entry is made for -each file encountered. -A second pass reads the i-nodes and for -each file compares the number of links -specified in its i-node -with the number of entries actually seen. -All discrepancies are noted. -.sp -If no device is specified, -a default device is assumed. -.sp -The argument -l__ causes a complete -listing of the file names on the device -in i-node order. -.sp -.ti 0 -FILES /dev/rk? -.sp -.ti 0 -SEE ALSO check(VIII) -.sp -.ti 0 -DIAGNOSTICS inconsistent i-numbers, -unnamed files, -unreachable files, -loops in directory "hierarchy". -.sp -.ti 0 -BUGS Unreachable files and loops are -discovered only under the "-l" option. diff --git a/static/v10/man8/delivermail.8 b/static/v10/man8/delivermail.8 deleted file mode 100644 index 5c1070b4..00000000 --- a/static/v10/man8/delivermail.8 +++ /dev/null @@ -1,248 +0,0 @@ -.TH DELIVERMAIL 8 -.UC 4 -.SH NAME -delivermail \- deliver mail to arbitrary people -.SH SYNOPSIS -.B /etc/delivermail -[ -.BR \- [ fr ] -.I address -] [ -.B \-a -] [ -.BI \-e x -] [ -.B \-n -] [ -.B \-m -] [ -.B \-s -] [ -.B \-i -] [ -.B \-h -.I N -] address ... -.SH DESCRIPTION -.I Delivermail -delivers a letter to one or more people, -routing the letter over whatever networks -are necessary. -.I Delivermail -will do inter-net forwarding as necessary -to deliver the mail to the correct place. -.PP -.I Delivermail -is not intended as a user interface routine; -it is expected that other programs will provide user-friendly -front ends, -and -.I delivermail -will be used only to deliver pre-formatted messages. -.PP -.I Delivermail -reads its standard input -up to a control-D -or a line with a single dot -and sends a copy of the letter found there -to all of the addresses listed. -If the -.B \-i -flag is given, -single dots are ignored. -It determines the network to use -based on the syntax of the addresses. -Addresses containing the character `@' -or the word \*(lqat\*(rq -are sent to the -.SM ARPANET; -addresses containing `!' -are sent to the -.SM UUCP -net, -and addresses containing `:' or `.' -are sent to the Berkeley network. -Other addresses are assumed to be local. -.PP -Local addresses are looked up in a file -constructed by -.IR newaliases (1) -from the data file -.I /usr/lib/aliases -and aliased appropriately. -Aliasing can be prevented by preceding the address -with a backslash or using the -.B \-n -flag. -Normally the sender is not included in any alias -expansions, e.g., -if `john' sends to `group', -and `group' includes `john' in the expansion, -then the letter will not be delivered to `john'. -The -.B \-m -flag disables this suppression. -.PP -.I Delivermail -computes the person sending the mail -by looking at your login name. -The \*(lqfrom\*(rq person -can be explicitly specified by using the -.B \-f -flag; -or, if the -.B \-a -flag is given, -delivermail looks in the body of the message -for a \*(lqFrom:\*(rq or \*(lqSender:\*(rq -field in -.SM ARPANET -format. -The -.B \-f -and -.B \-a -flags can be used -only by the special users -.I root -and -.I network, -or if the person you are trying to become -is the same as the person you are. -The -.B \-r -flag is entirely equivalent to the -.B \-f -flag; it is provided for ease of interface only. -.PP -The -.BI \-e x -flag controls the disposition of error output, -as follows: -.TP 3n -.B e -Print errors on the standard output, -and echo a copy of the message when done. -It is assumed that a network server will -return the message back to the user. -.TP -.B m -Mail errors back to the user. -.TP -.B p -Print errors on the standard output. -.TP -.B q -Throw errors away; -only exit status is returned. -.TP -.B w -Write errors back to the user's terminal, -but only if the user is still logged in -and write permission is enabled; -otherwise errors are mailed back. -.LP -If the error is not mailed back, -and if the mail originated on the machine where the error occurred, -the letter is appended to the file -.I dead.letter -in the sender's home directory. -.PP -If the first character of the user name -is a vertical bar, -the rest of the user name is used as the name of a program -to pipe the mail to. -It may be necessary to quote the name of the user -to keep -.I delivermail -from suppressing the blanks from between arguments. -.PP -The message is normally edited to eliminate \*(lqFrom\*(rq -lines that might confuse other mailers. -In particular, -\*(lqFrom\*(rq lines in the header are deleted, -and \*(lqFrom\*(rq lines in the body are prepended by `>'. -The -.B \-s -flag saves \*(lqFrom\*(rq lines in the header. -.PP -The -.B \-h -flag gives a \*(lqhop-count\*(rq, i.e., -a measure of how many times this message -has been processed by -.I delivermail -(presumably on different machines). -Each time -.I delivermail -processes a message, -it increases the hop-count by one; -if it exceeds 30 -.I delivermail -assumes that an alias loop has occurred -and it aborts the message. -The hop-count defaults to zero. -.PP -.I Delivermail -returns an exit status -describing what it did. -The codes are defined in <sysexits.h> -.ta 3n +\w'EX_UNAVAILABLE'u+3n -.de XX -.ti \n(.iu -.. -.in +\w'EX_UNAVAILABLE'u+6n -.XX - EX_OK Successful completion on all addresses. -.XX - EX_NOUSER User name not recognized. -.XX - EX_UNAVAILABLE Catchall meaning necessary resources -were not available. -.XX - EX_SYNTAX Syntax error in address. -.XX - EX_SOFTWARE Internal software error, -including bad arguments. -.XX - EX_OSERR Temporary operating system error, -such as \*(lqcannot fork\*(rq. -.XX - EX_NOHOST Host name not recognized. -.SH FILES -.if t .ta 2i -.if n .ta 3i -/usr/lib/aliases raw data for alias names -.br -/usr/lib/aliases.dir data base of alias names -.br -/usr/lib/aliases.pag -.br -/bin/mail to deliver uucp mail -.br -/usr/net/bin/v6mail to deliver local mail -.br -/usr/net/bin/sendmail to deliver Berknet mail -.br -/usr/lib/mailers/arpa to deliver ARPANET mail -.br -/tmp/mail* temp file -.br -/tmp/xscript* saved transcript -.SH SEE\ ALSO -biff(1), binmail(1), mail(1), newaliases(1), aliases(5) -.SH BUGS -.I Delivermail -sends one copy of the letter -to each user; -it should send one copy -of the letter to each host -and distribute to multiple users there -whenever possible. -.PP -.I Delivermail -assumes the addresses can be represented as one word. -This is incorrect according to the -.SM ARPANET -mail protocol RFC 733 (NIC 41952), -but is consistent with the real world. diff --git a/static/v10/man8/df.8 b/static/v10/man8/df.8 deleted file mode 100644 index 49713d39..00000000 --- a/static/v10/man8/df.8 +++ /dev/null @@ -1,21 +0,0 @@ -.th DF VIII 1/20/73 -.sh NAME -df \*- disk free -.sh SYNOPSIS -.bd df -[ filesystem ] -.sh DESCRIPTION -.it Df -prints out the number of free blocks -available on a file system. -If the file system is unspecified, -the free space on all of -the normally mounted file systems -is printed. -.sh FILES -/dev/rf?, -/dev/rk?, -/dev/rp? -.sh "SEE ALSO" -check(VIII) -.sh BUGS diff --git a/static/v10/man8/dist.8 b/static/v10/man8/dist.8 deleted file mode 100644 index 37f65622..00000000 --- a/static/v10/man8/dist.8 +++ /dev/null @@ -1,146 +0,0 @@ -.TH DIST 8 -.ds ld /usr/lib/dist -.SH NAME -connect, dispatch \(mi generic network client and server -.PP -query, receive, notify \(mi network clients -.PP -answer, transmit, notified \(mi network servers -.SH SYNOPSIS -.B \*(ld/connect -.I remote-system remote-cmd io local-cmd local-args -.PP -.B \*(ld/query -.PP -.B \*(ld/receive -.I package-id -.PP -.B \*(ld/notify -.I package-id -.PP -.B \*(ld/dispatch -.I remote-system remote-user -.PP -.B \*(ld/answer -.I remote-system remote-user -.PP -.B \*(ld/transmit -.I remote-system remote-user -.PP -.B \*(ld/notified -.I remote-system remote-user -.SH DESCRIPTION -These programs act behind the scenes on behalf of -.IR dist (1). -.I Connect -and -.I dispatch -deal with all the details of establishing and authenticating connections -on the network. The remaining programs are independent of the underlying -network. -.PP -.I Connect -encapsulates all the details of making a call on the underlying network. -Its arguments are mostly self explanatory. -.I Remote-cmd -must be one of -.BR answer ", " transmit ", or " notified "." -If -.I io -is -.BR i , -the standard input of the local command is connected -to the standard output of the remote command. If -.B i -is not specified, the local command inherits its local -standard input, and the remote command has its standard -output directed to a log file. -Similarly, -.B o -means the standard output of the local command is connected -to the standard input of the remote command. If -.B o -is not specified, the local command inherits its local -standard output, and the remote command has its standard -input attached to -.BR /dev/null . -Legal possibilities are -.BR i , -.BR o , -and -.BR io. -.PP -.I Dispatch -is intended to be called by a generic network daemon -such as -.IR svcmgr (8). -It talks to -.I connect -and takes care of establishing the appropriate standard input and -output before calling -.IR answer , -.IR transmit , -or -.IR notified . -.I Dispatch -expects arguments giving the remote system, remote user, and remote -address, and passes these to whatever program it calls. -.PP -.I Query -is a simple program called by -.I connect -with its standard input attached to the remote -.IR answer . -.I Query -displays a formatted version of the queue list from the remote machine. -(It may even turn out to be the same as -.BR /bin/cat .) -.PP -.I Receive -is a more complicated program that is called by -.I connect -with both its input and output attached to the remote -.IR transmit . -.I Receive -performs actual software installation and sends a transcript of any -errors back to the remote system. -.PP -.I Notify -is a simple program called by -.I connect -with its standard output attached to the remote -.IR notified . -.I Notify -sends an announcement of the availability of some specific package. -.PP -All of the servers read a configuration file, -.BR \*(ld/conf , -to determine how to handle installation on behalf -of a given remote system and user. The file consists of lines -containing patterns and actions. Empty lines or lines beginning -with a '\c -.BR "#" "'" -are ignored. The first three fields (separated by white space) -of each line are regular -expressions to be matched the remote system name, remote user name, -and file name respectively. The first line in which all three match -will be chosen. -The remainder of the line contains -the associated actions. -Each action is an alphanumeric name, optionally followed immediately -by a parenthesized argument. -.PP -Someday the actions will be enumerated here, but I don't know what -they are yet. -.SH EXAMPLES -A simple configuration file: -.EX -.ta \w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u -# system user pathname action -# we are willing to distribute stuff to coma and pyxis. -(coma|pyxis) .* .* accept(yes) -\&.* .* .* accept(no) -.EE -.SH "SEE ALSO" -.IR dist (1), -.IR dist (5) diff --git a/static/v10/man8/dkmgr.8 b/static/v10/man8/dkmgr.8 deleted file mode 100644 index 168f6640..00000000 --- a/static/v10/man8/dkmgr.8 +++ /dev/null @@ -1,165 +0,0 @@ -.TH DKMGR 8 -.CT 1 sa_auto -.SH NAME -dkhup, dkmgr, dkzap \- manage Datakit interface -.SH SYNOPSIS -.B /usr/ipc/mgrs/dkhup -[ -.B -N -.I prefix -] -.br -.B /usr/ipc/mgrs/dkmgr -[ -.B -N -.I prefix -] [ -.B -m -.I outname -] [ -.B -n -.I service -] -.br -.B /usr/ipc/mgrs/dkzap -[ -.B -N -.I prefix -] -.SH DESCRIPTION -.I Dkhup -starts the common signaling channel protocol -for a Datakit interface. -Initially it sends several reset messages, -and tells the controller -to hang up all outstanding calls; -thereafter it simply keeps the signaling protocol running. -.PP -.I Dkmgr -receives and places Datakit calls. -Outbound calls may be placed by calling -.I ipcopen -.RI ( ipc (3)) -with the -.I outname -specified by option -.BR -m ; -the default is -.BR dk . -.I Dkmgr -announces itself to the Datakit network -with the -.I service -name specified by option -.BR -n ; -the default is taken from -.FR /etc/whoami . -Inbound calls to -.I service -are connected to the local -.L login -service; -inbound calls to -Datakit address -.IB service . serv -are handed to local service -.IR serv . -.PP -.I Dkhup -and -.I dkmgr -are normally run once from -.IR rc (8). -Both programs must be running -to make the network available. -.PP -.I Dkzap -arranges for a KMC11-assisted Datakit interface -to be reset, reloaded, and restarted. -This should be done only if things are badly broken, -as it hangs up all existing calls through that interface. -.PP -Datakit devices are expected to have names of the form -.BI /dev/dk/dk nn -with -.I nn -a two-digit channel number. -If there are more than 100 channels, -the first digit overflows to lower-case letters: -channel 100 is -.LR a0 . -The common signaling control channel -is named -.BR /dev/dk/dkctl . -All three programs accept an option -.B -N -.I prefix -to change the naming convention; -for example, -.B -N /dev/kb/kb -means that the files have names like -.B /dev/kb/kb32 -and -.BR /dev/kb/kbctl . -.PP -Support also exists for a less general naming convention: -there may be two sets of files, -named -.BI /dev/dk/dk0 nn -and -.BI /dev/dk/dk2 nn\c -, -with control channels -.B /dev/dk/dkctl0 -and -.BR /dev/dk/dkctl2 . -.I Dkhup -and -.I dkzap -take the extra argument -.B 0 -or -.B 2 -to point at one or the other of the control names. -A separate copy of -.I dkhup -is needed for each name. -.I Dkmgr -takes an option -.B -u -.IR c , -where -.I c -is -.B 0 -or -.B 2 -to use one set of files, -or -.B b -to use both simultaneously; -in the latter case, -.I service -is announced to both networks. -This scheme is obsolete and overdue for replacement; -the missing piece is something to pick an interface for outcalls. -.PP -.I Dkmgr -records its activity in file -.I service -in directory -.BR /usr/ipc/log , -default -.BR /usr/ipc/log/dk . -.SH FILES -.F /dev/dk -.SH "SEE ALSO" -.IR con (1), -.IR kmc (8), -.IR svcmgr (8), -.IR ipc (3) -.SH BUGS -.I Dkhup -should be folded into -.IR dkmgr ; -it is separate for historic reasons. diff --git a/static/v10/man8/dli.8 b/static/v10/man8/dli.8 deleted file mode 100644 index b63e9af0..00000000 --- a/static/v10/man8/dli.8 +++ /dev/null @@ -1,27 +0,0 @@ -.pa 1 -.he 'DLI (VIII)'3/15/72'DLI (VIII)' -.ti 0 -NAME dli -- load DEC binary paper tapes -.sp -.ti 0 -SYNOPSIS dli output [input] -.sp -.ti 0 -DESCRIPTION dli___ -will load a DEC binary paper tape -into the output file. -The binary format paper tape -is read from the input file -(/dev/ppt is default.) -.sp -.ti 0 -FILES /dev/ppt -.sp -.ti 0 -SEE ALSO -- -.sp -.ti 0 -DIAGNOSTICS "checksum" -.sp -.ti 0 -BUGS -- diff --git a/static/v10/man8/dmesg.8 b/static/v10/man8/dmesg.8 deleted file mode 100644 index 162b84fd..00000000 --- a/static/v10/man8/dmesg.8 +++ /dev/null @@ -1,64 +0,0 @@ -.TH DMESG 8 -.CT 1 sa_nonmortals -.SH NAME -dmesg \- system diagnostic messages -.SH SYNOPSIS -.B /etc/dmesg -[ -.B - -] -[ -.B -i -] -[ -.I core namelist -] -.SH DESCRIPTION -.I Dmesg -looks in a system buffer -for recent console messages from the operating system -and reproduces them on the standard output. -Under option -.LR - , -.I dmesg -produces only those messages printed by the system -since the last time -.L dmesg\ - -was run. -It is normally run periodically by -.IR cron (8) -to produce the error log -.FR /usr/adm/messages . -.PP -Option -.B -i -prints messages produced since the last -.L dmesg\ - -without changing any records. -.PP -If -.I core -and -.I namelist -are specified, -they are used in place of -.F /dev/kmem -and -.FR /unix . -.SH FILES -.TF /usr/adm/messages -.TP -.F /usr/adm/messages -error log -.br -.TP -.F /usr/adm/msgbuf -record of option -.L - -.SH BUGS -Since the system error message buffer is small, -not all error messages -are guaranteed to be logged. -.br -Error messages generated immediately before a system crash -may not be logged. diff --git a/static/v10/man8/downgrade.8 b/static/v10/man8/downgrade.8 deleted file mode 100644 index 9ab11d51..00000000 --- a/static/v10/man8/downgrade.8 +++ /dev/null @@ -1,37 +0,0 @@ -.TH DOWNGRADE 8 -.CT 8 sa_nonmortals -.SH NAME -downgrade \- downgrade a file -.SH SYNOPSIS -.B /etc/downgrade -.I label -.I file ... -.SH DESCRIPTION -.I Downgrade -clears from the label of each -.I file -all bits that correspond to one bits in -.I label. -Capabilities or licenses specified in -.I label -are ignored. -The -.I files -must be readable and must be specified by full path name. -.LP -.I Downgrade -requires -.B T_EXTERN -privilege, which may be granted to authorized users by -.IR priv (8). -.SH EXAMPLES -.L -priv downgrade 0110 /usr/myproject/*.c -.SH FILES -.F /dev/log -.SH "SEE ALSO" -.IR getlab (2), -.IR setlab (1) -.SH BUGS -Downgrading is not an atomic operation. If a file is -relinked underfoot misleading logging records may result. diff --git a/static/v10/man8/dump.8 b/static/v10/man8/dump.8 deleted file mode 100644 index 51a70ec8..00000000 --- a/static/v10/man8/dump.8 +++ /dev/null @@ -1,94 +0,0 @@ -.th DUMP VIII 11/24/73 -.sh NAME -dump \*- incremental file system dump -.sh SYNOPSIS -.bd dump -[ key [ arguments ] filesystem ] -.sh DESCRIPTION -.it Dump -will make an incremental file system dump -on magtape -of all files changed after a certain date. -The argument -.it key, -specifies the date and other options about the dump. -.it Key -consists of characters from -the set -.bd iu0hds. -.s3 -.lp +5 3 -\fBi\fR the -dump date is taken from the file -.bd /etc/ddate. -.s3 -.lp +5 3 -\fBu\fR the date just prior to this dump -is written on -.bd /etc/ddate -upon successful completion of this dump. -.s3 -.lp +5 3 -\fB0\fR the dump date is taken as the epoch -(beginning of time). -Thus this option causes an entire file system dump to be taken. -.s3 -.lp +5 3 -\fBh\fR the dump date is some number of hours before the current date. -The number of hours is taken from the next argument in -.it arguments. -.s3 -.lp +5 3 -\fBd\fR the dump date is some number of days before the current date. -The number of days is taken from the next argument in -.it arguments. -.s3 -.lp +5 3 -\fBs\fR the size of the dump tape is specified in feet. -The number of feet is taken from the next argument in -.it arguments. -It is assumed that there are 9 standard UNIX records per foot. -When the specified size is reached, -the dump will wait for reels to be changed. -The default size is 1700 feet. -.s3 -.i0 -If no arguments are given, -the -.it key -is assumed to be -.bd i -and the file system is -assumed to be -.bd /dev/rp1. -.s3 -Full dumps -should be taken on quiet file systems as follows: -.s3 - dump 0u /dev/rp1 -.br - check -l /dev/rp1 -.s3 -The -.it check -will come in handy in case it is necessary -to resore indiviidual files from this dump. -Incremental dumps should then be taken -when desired by: -.s3 - dump -.s3 -When the incremental dumps get cumbersome, -a new complete dump should be taken. -In this way, -a restore requires -loading of the complete dump tape and only the latest incremental tape. -.sh FILES -/dev/mt0 magtape -.br -/dev/rp1 default file system -.br -/etc/ddate -.sh "SEE ALSO" -restor, check(VIII), dump(V) -.sh BUGS diff --git a/static/v10/man8/dumpdir.8 b/static/v10/man8/dumpdir.8 deleted file mode 100644 index 005bd8ef..00000000 --- a/static/v10/man8/dumpdir.8 +++ /dev/null @@ -1,38 +0,0 @@ -.TH DUMPDIR 8 -.UC 4 -.SH NAME -dumpdir \- print the names of files on a dump tape -.SH SYNOPSIS -.B /etc/dumpdir -[ -.B f -filename ] -.SH DESCRIPTION -.I Dumpdir -is used to read magtapes dumped with the -.I dump -command and list the names and inode numbers -of all the files and directories on the tape. -.PP -The -.B f -option causes -.I filename -as the name of the tape instead -of the default. -.SH FILES -default tape unit varies with installation -.br -rst* -.SH "SEE ALSO" -dump(1), restor(1) -.SH DIAGNOSTICS -If the dump extends over more than one tape, -it may ask you to change tapes. -Reply with a new-line when the next tape has been mounted. -.SH BUGS -There is redundant information on the tape -that could be used in case of tape reading problems. -Unfortunately, -.I dumpdir -doesn't use it. diff --git a/static/v10/man8/expire.8 b/static/v10/man8/expire.8 deleted file mode 100644 index 3c5a2672..00000000 --- a/static/v10/man8/expire.8 +++ /dev/null @@ -1,67 +0,0 @@ -.TH EXPIRE 8 -.SH NAME -expire \- remove outdated news articles -.SH SYNOPSIS -.BR /usr/lib/news/expire " [ " \-n -.IR newsgroups " ] [ " -.BR \-i " ] [ " \-I " ] [ " \-v " [ " -.IR level " ] ] [ " -.BI \-e days - ] - [ -.B \-a - ] -.SH DESCRIPTION -.PP -.I Expire -is normally started up by -.IR cron (8) -every night to remove all expired news. -If no newsgroups are specified, the default is to expire -.BR all . -.PP -Articles whose specified expiration date has already passed -are considered expirable. -The -.B \-a -option causes expire to archive articles in /usr/spool/oldnews. -Otherwise, the articles are unlinked. -.PP -The -.B \-v -option causes expire to be more verbose. -It can be given a verbosity level (default 1) as in -.B \-v3 -for even more output. -This is useful if articles aren't being expired and you want to know why. -.PP -The -.B \-e -flag gives the number of days to use for a default expiration date. -If not given, an installation dependent default (often 2 weeks) is used. -.PP -The -.B \-i -and -.B \-I -flags -tell -.B expire -to ignore any expiration date explicitly given on articles. -This can be used when disk space is really tight. -The -.B \-I -flag will always ignore expiration dates, -while the -.B \-i -flag will only ignore the date if ignoring it would expire the article sooner. -.I WARNING: -If you have articles archived by giving them expiration dates far into the -future, these options might remove these files anyway. -.SH "SEE ALSO" -checknews(1), -inews(1), -readnews(1), -recnews(8), -sendnews(8), -uurec(8) diff --git a/static/v10/man8/fsck.8 b/static/v10/man8/fsck.8 deleted file mode 100644 index 2f6841c5..00000000 --- a/static/v10/man8/fsck.8 +++ /dev/null @@ -1,248 +0,0 @@ -.TH FSCK 8 -.CT 1 sa_nonmortals -.SH NAME -fsck \- file system consistency check and interactive repair -.SH SYNOPSIS -.B /etc/fsck -.B -p -[ -.I special ... -] -.br -.B /etc/fsck -[ -.B -y -] -[ -.B -n -] -[ -.BI -s X -] -[ -.BI -S X -] -[ -.B -t -.I filename -] [ -.I special ... -] -.SH DESCRIPTION -.I Fsck -inspects the disk filesystems -in the named -.I special -files -and repairs inconsistencies. -If no files are named, -every file system listed in -.IR fstab (5) -with type 0 -and a nonzero pass number -is checked. -.PP -Under option -.BR -p , -.I fsck -runs without intervention, -repairing minor inconsistencies -and aborting on major ones. -This form is usually called from -.IR rc (8). -If no special files are named, -file systems in -.I fstab -are checked in parallel passes: -all file systems with pass number 1 -are checked simultaneously, -then all file systems with pass number 2, -and so on until -.I fstab -is exhausted. -.PP -Here are the minor ailments -repaired automatically -under -.BR -p : -.RS -unreferenced inodes; -.br -wrong link counts in inodes; -.br -missing blocks in the free list; -.br -blocks in the free list also in files; and -.br -counts wrong in the super-block. -.RE -.PP -Other inconsistencies -cause -.I fsck -to abandon the inconsistent file system, -and exit with a nonzero status -when the current pass finishes. -.PP -Without the -.B -p -option, -.I fsck -inspects one file system at a time, -interactively. -Each inconsistency causes -.I fsck -to print a message -and ask permission to fix the problem. -The operator may require arcane knowledge -to guide -.I fsck -safely through repair of a badly damaged file system. -.PP -Here are the remaining options. -They are allowed only if -.B -p -is absent. -.TP -.B -y -Assume a yes response to all questions. -This should be used with great caution. -.TP -.B -n -Assume a no response to all questions; -do not open the file system for writing. -This option is assumed if the file system cannot be opened for writing. -.TP -.BI -s X -Ignore the actual free list and (unconditionally) reconstruct a new -one by rewriting the super-block of the file system. -The file system should be unmounted while this is done; if this -is not possible, care should be taken that the system is quiescent -and that it is rebooted immediately afterwards. -This precaution is necessary so that the old, bad, in-core copy -of the superblock will not continue to be used, or written on the file system. -If the file system has a bitmap free list (see -.IR filsys (5)), -the free list is always reconstructed unless the -.B -n -option is enabled. -.IP -Parameter -.I X -allows free-list parameters to be specified: -.BI -s blocks-per-cylinder : blocks-to-skip\c -\&. -If -.I X -is not given, -the values used when the file system was created -are used; see -.IR mkfs (8). -If these values were not specified, -.I X -is assumed to be -.BR 400:9 . -.TP -.BI -S X -Conditionally reconstruct the free list. -This option -is like -.BI -s X -except that the free list is rebuilt only -if no discrepancies were found. -.B -S -implies -.BR -n . -.TP -.B -t -If -.I fsck -cannot obtain enough memory to keep its tables, -it uses a scratch file. -If the -.B -t -option is -specified, the file named in the next argument -is used as the scratch file, if needed. -Without -.BR -t , -.I fsck -will prompt the operator for the name of the -scratch file. -The file chosen should not be on the -file system being checked. -If it did not already exist, -it is removed when -.I fsck -completes. -.PD -.br -.ne 6 -.PP -Inconsistencies checked are: -.IP -.nf -Blocks claimed more than once. -Blocks designated outside the file system. -Incorrect link counts. -Directory size not 16-byte aligned. -Bad inode format. -Blocks not accounted for anywhere. -Directory entry pointing to unallocated inode. -Inode number out of range. -More than 65536 inodes. -More blocks for inodes than there are in the file system. -Bad free block list format. -Total free block and/or free inode count incorrect. -.fi -.PP -Orphaned files and directories (allocated but unreferenced) are -reconnected by -placing them in the directory -.F lost+found -in the root of the file system being checked. -The name assigned is the inode number, -prefixed by -.LR # . -.PP -Checking the raw device is almost always faster, -but -.I fsck -distinguishes bitmapped from non-bitmapped file systems -by examining the minor device number, -so the block device is safer. -.SH FILES -.F /etc/fstab -.SH "SEE ALSO" -.IR fstab (5), -.IR filsys (5), -.IR mkfs (8), -.IR reboot (8) -.br -T. J. Kowalski, -`Fsck\(emthe -.SM UNIX -File System Check Program', -this manual, Volume 2 -.SH BUGS -Inode numbers for -.B . -and -.B .. -in each directory should be checked for validity. -.PP -Some systems save core images after a crash -in the swap area; -on such machines, -checking many large file systems in parallel -may cause swapping, overwriting the crash dump. -It is best just to write crash dumps in a a safer place. -If disk space for dumps and swapping is scarce, -avoid checking more than three 120-megabyte file systems -in parallel on a machine with four megabytes of physical memory. -.PP -Examining the minor device number is a botch; -there should be an explicit flag somewhere. -.PP -.I Fsck -does not have supernatural powers. diff --git a/static/v10/man8/fstat.8 b/static/v10/man8/fstat.8 deleted file mode 100644 index 7abf677b..00000000 --- a/static/v10/man8/fstat.8 +++ /dev/null @@ -1,49 +0,0 @@ -.TH FSTAT 1 -.SH NAME -fstat \- file status -.SH SYNOPSIS -.B /etc/fstat -[ -.B \-u -user ] [ -.B \-p -pid ] [ -.B \-f -filename ] -.SH DESCRIPTION -.I Fstat -identifies open files. -A file is considered open if a process has it open, -if it is the working directory for a process, -or if it is an active pure text file. -Under default options, -.I fstat -reports on all open files. -.PP -Options: -.TP 6 -.B \-u -Report all files open by a specified user. -.TP 6 -.B \-p -Report all files open by a specified process id. -.TP 6 -.B \-f -Restrict reports to the specified file. -If the file is a character special file, -.I fstat -additionally reports on any open files on that device, -treating it as a mounted file system. -.dt -.SH "SEE ALSO" -ps(1), pstat(8) -.SH DIAGNOSTICS -Yet to be determined. -.SH BUGS -.I Fstat -tries to be clever if you elide the -.B \-u , -.B \-f , -or -.B \-p -flags for the argument. Like any expert system, it is sometimes wrong. diff --git a/static/v10/man8/gacct.8 b/static/v10/man8/gacct.8 deleted file mode 100644 index bc72d1a3..00000000 --- a/static/v10/man8/gacct.8 +++ /dev/null @@ -1,22 +0,0 @@ -.pa 1 -.he 'GACCT (VIII)'4/27/73'GACCT (VIII)' -.ti 0 -NAME gacct -- command accounting statistics -.sp -.ti 0 -SYNOPSIS gacct [ -arnl ] [ files ] -.sp -.ti 0 -DESCRIPTION X -.sp -.ti 0 -FILES /usr/adm/tacct -.sp -.ti 0 -SEE ALSO sh(i) -.sp -.ti 0 -DIAGNOSTICS -- -.sp -.ti 0 -BUGS -- diff --git a/static/v10/man8/gettable.8 b/static/v10/man8/gettable.8 deleted file mode 100644 index 32ed9d57..00000000 --- a/static/v10/man8/gettable.8 +++ /dev/null @@ -1,65 +0,0 @@ -.\" Copyright (c) 1983 The Regents of the University of California. -.\" All rights reserved. -.\" -.\" Redistribution and use in source and binary forms are permitted -.\" provided that the above copyright notice and this paragraph are -.\" duplicated in all such forms and that any documentation, -.\" advertising materials, and other materials related to such -.\" distribution and use acknowledge that the software was developed -.\" by the University of California, Berkeley. The name of the -.\" University may not be used to endorse or promote products derived -.\" from this software without specific prior written permission. -.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR -.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED -.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. -.\" -.\" @(#)gettable.8 6.3 (Berkeley) 9/20/88 -.\" -.TH GETTABLE 8 "September 20, 1988" -.UC 5 -.SH NAME -gettable \- get NIC format host tables from a host -.SH SYNOPSIS -.B /etc/gettable -[ -.B \-v -] -.I host -[ outfile ] -.SH DESCRIPTION -.I Gettable -is a simple program used to obtain the NIC standard -host tables from a ``nicname'' server. The indicated -.I host -is queried for the tables. The tables, if retrieved, -are placed in the file -.I outfile -or by default, -.IR hosts.txt . -.PP -The -.B \-v -option will get just the version number instead of the complete host table -and put the output in the file -.I outfile -or by default, -.IR hosts.ver . -.PP -.I Gettable -operates by opening a TCP connection to the port indicated -in the service specification for ``nicname''. A request -is then made for ``ALL'' names and the resultant information -is placed in the output file. -.PP -.I Gettable -is best used in conjunction with the -.IR htable (8) -program which converts the NIC standard file format to -that used by the network library lookup routines. -.SH "SEE ALSO" -intro(3), htable(8), named(8) -.SH BUGS -If the name-domain system provided network name mapping well as host -name mapping, -.I gettable -would no longer be needed. diff --git a/static/v10/man8/getty.8 b/static/v10/man8/getty.8 deleted file mode 100644 index 41c7cf37..00000000 --- a/static/v10/man8/getty.8 +++ /dev/null @@ -1,88 +0,0 @@ -.TH GETTY 8 -.CT 1 sa_auto secur -.SH NAME -getty \- set terminal mode -.SH SYNOPSIS -.B /etc/getty -[ -.I char -] -.SH DESCRIPTION -.I Getty -is invoked by -.IR init (8) -after a terminal is opened. -While reading the user's name -.I getty -attempts to adapt the system to the speed and type of terminal -being used. -.PP -.I Init -calls -.I getty -with an argument specified by the -.IR ttys (5) -entry for the terminal line. -The argument -.I char -determines the line speed -and other characteristics; -see below. -.I Getty -then types a banner identifying the system (from -.FR /etc/whoami ) -and the -.L login: -message. -The user's name is then read, a character at a time. -If a null character is received, it is assumed to be the result -of the user pushing the `break' (`interrupt') key. -The speed is then -changed to another baud rate and -.L login: -is typed again. -Successive breaks cycle through a set of speeds. -.PP -The user's name is terminated by a newline or -carriage return. -The latter results in the system being set to -treat carriage returns appropriately (see -.IR ioctl (2)). -.PP -Finally, -.IR login (8) -is called with the user's name as argument. -.PP -Here are the possible values for -.IR char . -If more than one speed is given, -the first speed is used initially; -others are selected by successive depressions of the -BREAK key. -Other things, -like delays and tab expansion, -are set in various ways as well. -.PP -.de fq -\f5\\$1 \fR\\$2 \\$3 \\$4 \\$5 \\$6 -.. -.nf -char speed -.fq 0 300-1200-150-110 -.fq 2 9600 -.fq 3 1200-300 -.fq 4 300 -.fq 5 300-1200 -.fq 6 2400 -.fq 7 4800 -.fq 8 9600-1200-300 -.fq 9 300-9600-1200 -.fq a 2400-1200 -.fq b 1200-2400 -.fq j exta (usually 19200) -.fi -.SH "SEE ALSO" -.IR init (8), -.IR login (8), -.IR ioctl (2), -.IR ttys (5) diff --git a/static/v10/man8/halt.8 b/static/v10/man8/halt.8 deleted file mode 100644 index cd4de601..00000000 --- a/static/v10/man8/halt.8 +++ /dev/null @@ -1,21 +0,0 @@ -.TH HALT 8 -.UC 4 -.SH NAME -halt \- halt the processor -.SH SYNOPSIS -.B /etc/halt -[ -.B \-n -] -.SH DESCRIPTION -.I Halt -writes out sandbagged information to the disks and then halts -the processor. The machine does not reboot, even if the auto-reboot -switch is set on the console. -.PP -The -.B \-n -option prevent the sync before the reboot. -.SH SEE ALSO -reboot(8) -.SH BUGS diff --git a/static/v10/man8/htable.8 b/static/v10/man8/htable.8 deleted file mode 100644 index f98c9b05..00000000 --- a/static/v10/man8/htable.8 +++ /dev/null @@ -1,116 +0,0 @@ -.\" Copyright (c) 1983 The Regents of the University of California. -.\" All rights reserved. -.\" -.\" Redistribution and use in source and binary forms are permitted -.\" provided that the above copyright notice and this paragraph are -.\" duplicated in all such forms and that any documentation, -.\" advertising materials, and other materials related to such -.\" distribution and use acknowledge that the software was developed -.\" by the University of California, Berkeley. The name of the -.\" University may not be used to endorse or promote products derived -.\" from this software without specific prior written permission. -.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR -.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED -.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. -.\" -.\" @(#)htable.8 6.4 (Berkeley) 9/20/88 -.\" -.TH HTABLE 8 "September 20, 1988" -.UC 5 -.SH NAME -htable \- convert NIC standard format host tables -.SH SYNOPSIS -.B /etc/htable -[ -.B \-c -.I connected-nets -] [ -.B \-l -.I local-nets -] -.I file -.SH DESCRIPTION -.I Htable -is used to convert host files in the format specified -in Internet RFC 810 to the format used by the network -library routines. Three files are created as a result -of running -.IR htable : -.IR hosts , -.IR networks , -and -.IR gateways . -The -.I hosts -file may be used by the -.IR gethostbyname (3N) -routines in mapping host names to addresses -if the nameserver, -.IR named (8), -is not used. -The -.I networks -file is used by the -.IR getnetent (3N) -routines in mapping network names to numbers. -The -.I gateways -file may be used by the routing daemon -in identifying ``passive'' Internet gateways; -see -.IR routed (8C) -for an explanation. -.PP -If any of the files -.IR localhosts , -.IR localnetworks , -or -.I localgateways -are present in the current directory, -the file's contents is prepended to the -output file. -Of these, only the gateways file is interpreted. -This allows sites to maintain local aliases and -entries which are not normally present in the -master database. -Only one gateway to each network will be placed in the gateways file; -a gateway listed in the localgateways file will override any in the -input file. -.PP -If the gateways file is to be used, -a list of networks to which the host is directly connected -is specified with the -.B \-c -flag. -The networks, separated by commas, -may be given by name or in Internet-standard dot notation, -e.g. -.B \-c -arpanet,128.32,local-ether-net. -.I Htable -only includes gateways -which are directly connected to one of the networks specified, -or which can be reached from another gateway on a connected net. -.PP -If the -.B \-l -option is given with a list of networks (in the same format as for -.BR \-c ), -these networks will be treated as ``local,'' -and information about hosts on local networks is -taken only from the localhosts file. -Entries for local hosts from the main database will be omitted. -This allows the localhosts file to completely override -any entries in the input file. -.PP -.I Htable -is best used in conjunction with the -.IR gettable (8) -program which retrieves the NIC database from a host. -.SH "SEE ALSO" -netintro(4), gettable(8), named(8) -.SH BUGS -If the name-domain system provided network name mapping well as host -name mapping, -.I htable -would no longer be needed. diff --git a/static/v10/man8/icheck.8 b/static/v10/man8/icheck.8 deleted file mode 100644 index b4ae5804..00000000 --- a/static/v10/man8/icheck.8 +++ /dev/null @@ -1,182 +0,0 @@ -.TH ICHECK 8 -.CT 1 sa_nonmortals -.SH NAME -icheck, dcheck, ncheck \- file system consistency check -.SH SYNOPSIS -.B /etc/icheck -[ -option ... ] -.I filesystem ... -.PP -.B /etc/dcheck -[ -option ... ] -.I filesystem ... -.PP -.B /etc/ncheck -[ -option ... ] -.I filesystem ... -.SH DESCRIPTION -These programs perform -consistency checks on file systems. -For normal file system maintenance, see -.IR fsck (8). -Common options are -.TP -.B -B -The file system is bitmapped. -If -.I filesystem -is a special file, this option is set automatically from -the minor device number. -.TP -.BI -i " number ... -Report only on specified inode -.I numbers -.RI ( dcheck -and -.I ncheck -only). -.PP -.I Icheck -examines each -.I filesystem, -builds a list of used blocks, -and compares this list against -the free list maintained on the file system. -The normal output of -.I icheck -includes a report of -.IP "" -The total number of files and the numbers of -regular, directory, block special and character special files. -.IP "" -The total number of blocks in use and the numbers of -single-, double-, and triple-indirect blocks and directory blocks. -.IP "" -The number of free blocks. -.IP "" -The number of blocks missing; -.I i.e.\& -not in any file -nor in the free list. -.PP -Other -.I icheck -options are -.TP -.B -s -Ignore the free list and reconstruct a new one -by rewriting the super-block of the file system. -The file system should be dismounted while this is done; -if this is not possible (for example if -the root file system has to be salvaged) -care should be taken that the system is quiescent. -The words in the super-block -which indicate the size of the free list and of the -i-list are believed. -If the super-block has been curdled -these words will have to be patched. -The normal output reports are suppressed. -.TP -.BI -b " number ... -Report each appearance of the selected block -.I numbers -in a file or on the free list. -.TP -.B -d -Report each duplicate block. -.TP -.B -m -Report each missing block. -.TP -.B -e -Print at most one diagnostic per file; -useful for badly curdled file systems. -.PP -.I Dcheck -reads the directories in each -.I filesystem -and compares -the link count in each inode with the number of directory -entries by which it is referenced. -.PP -.I Ncheck -generates a list of pathname vs i-number for each named -.I filesystem. -Other -.I ncheck -options are -.TP -.B -a -Report -.L . -and -.LR .. , -which are normally ignored. -.TP -.B -s -Report only special files, and files with -set-userid or set-groupid mode; -helpful in finding security breaches. -.SH "SEE ALSO" -.IR filsys (5), -.IR chuck (8), -.IR fsck (8), -.IR clri (8) -.SH DIAGNOSTICS -For duplicate blocks -and bad blocks (which lie outside the file system) -.I icheck -announces the difficulty, the i-number, and the kind of block involved. -If a read error is encountered, -the block number of the bad block is printed and -.I icheck -considers it to contain 0. -`Bad freeblock' means that -a block number outside the available space was encountered in the free list. -`Dups in free' -means that -blocks were found in the free list which -duplicate blocks either in some file or in the -earlier part of the free list. -.PP -When a file turns up for which the link-count and the number -of directory entries disagree, -.I dcheck -reports the relevant facts. -Allocated files which have 0 link-count and no entries are also -listed. -The only dangerous situation -occurs when there are more entries than links; -if entries are removed, -so the link-count drops to 0, -the remaining entries point to thin air. -They should be removed. -When there are more links than entries, or there is -an allocated file with neither links nor entries, -some disk space may be lost but the situation will not degenerate. -.PP -When the filesystem structure is improper, -.I ncheck -prints -.L ?? -to denote the `parent' of -a parentless file. -A pathname beginning with -.L ... -denotes a loop. -.SH BUGS -Extraneous diagnostics -may be produced if these commands are applied to -active file systems. -.br -They believe even preposterous super-blocks and -consequently can get core images. -.br -.I Ncheck's -report is in no useful -order, and probably should be sorted. -.I Ncheck -fails to report the root inode. diff --git a/static/v10/man8/inews.8 b/static/v10/man8/inews.8 deleted file mode 100644 index 561d345f..00000000 --- a/static/v10/man8/inews.8 +++ /dev/null @@ -1,93 +0,0 @@ -.TH INEWS 8 -.SH NAME -inews \- submit news articles -.SH SYNOPSIS -.B inews -[ -.B \-h -] -.B \-t -title [ -.B \-n -newsgroup ... ] [ -.B \-e -expiration ] -.PP -.B inews \-p -[ file ] -.PP -.B inews \-C -newsgroup -.SH DESCRIPTION -.I Inews -submits netnews articles. -It is not intended for people; see -.IR postnews (1) -for routine use. -The first form is for submitting articles; -the second for receiving articles from other machines; -the third for creating newsgroups. -.PP -In the first form, the article is read from the standard input. -A -.I title -must be specified, one or more -.I newsgroups -(default `general') -may be specified, and a nonstandard -.I expiration -date may be specified. -Option -.B \-f -substitutes another sender's name instead of the user. -Option -.B \-h -specifies that headers are present at the beginning of the -article and should be included with the article -header instead of as text. -.PP -The sender's full name is taken from the environment variable NAME, -or from the system index (often -.IR passwd (5)). -The environment variable ORGANIZATION overrides the system default. -.PP -In the second form -.I inews -reads the article from the named -.I file. -.PP -The third form is for creating new newsgroups. -This may -be limited to specific users such as the super-user or news administrator. -.SH FILES -.PD 0 -.TP \w'/usr/spool/news/newsgroup/article_no 'u -/usr/spool/news/.sys.nnn -temporary articles -.TP -.RI /usr/spool/news/ newsgroup / article_no -articles -.TP -/usr/spool/oldnews/ -expired articles -.TP -/usr/lib/news/active -known newsgroups and highest article number in each -.TP -/usr/lib/news/seq -sequence number of last article -.TP -/usr/lib/news/history -list of all articles ever seen -.TP -/usr/lib/news/sys -system subscription list -.PD -.SH "SEE ALSO" -news(5), -newsrc(5), -postnews(1), -readnews(1), -recnews(8), -sendnews(8) -uurec(8) diff --git a/static/v10/man8/init.8 b/static/v10/man8/init.8 deleted file mode 100644 index 72def2a8..00000000 --- a/static/v10/man8/init.8 +++ /dev/null @@ -1,147 +0,0 @@ -.TH INIT 8 -.CT 1 sa_auto secur -.SH NAME -init \- process control initialization -.SH SYNOPSIS -.B /etc/init -.SH DESCRIPTION -.I Init -is invoked by the kernel as the last step in the boot procedure. -It is always process 1. -.PP -When started normally, -.I init -calls -.IR rc (8). -The security label is set at bottom. -If this succeeds, -.I init -begins multi-user operation. -If -.I rc -fails, -.I init -commences single user operation by executing -a superuser shell, -.IR nosh (8), -with bottom security label, top ceiling, and all privileges. -.PP -When started by a cold boot from the console, -.I init -starts single user operation immediately. -When the single user shell terminates, -.I init -runs -.IR rc -without the parameter, -and begins multi-user operation. -.PP -In multi-user operation, -.IR init 's -role is to create a process for each -directly connected terminal port on which a user may log in. -To begin such operations, it reads the -.IR ttys (5) -file and forks to create a process -for each terminal specified in the file. -Each of these processes opens the appropriate terminal -for reading and writing -on file descriptors 0, 1, 2, and 3 (the standard input and -output, the diagnostic output and -.FR /dev/tty ). -The security label of each port is set to that of file -.FR /etc/floor . -Opening the terminal will usually involve a delay, -since the -.I open -is not completed until someone -dials and carrier is established on the channel. -Then -.IR getty (8) -is called with argument as specified by the second character of -the -.I ttys -file line. -.I Getty -reads the user's name and invokes -.IR login (8) -to log in the user and execute the shell. -.PP -Ultimately the shell will terminate -because of an end-of-file or as a result of hanging up. -The main path of -.IR init , -which has been waiting -for such an event, -wakes up and removes the appropriate entry from the -file -.IR utmp (5), -which records current users, and -makes an entry in -.IR wtmp , -which maintains a history -of logins and logouts. -Then the appropriate terminal is reopened and -.I getty -is -invoked again. -.PP -.I Init -catches signal -.B SIGHUP -and interprets it to mean that -the -.I ttys -file -should be read again. -The shell process on each line that has become inactive -according to -.I ttys -is terminated; -a new process is created for each line added; -lines unchanged in the file are undisturbed. -Thus it is possible to drop or add terminal lines without -rebooting the system by changing the -.I ttys -file and sending a -.I hangup -signal to the -.I init -process: use -.LR "kill -1 1" . -.PP -.I Init -will terminate multi-user operations, -kill all outstanding processes, -and resume single-user mode -if sent signal -.BR SIGTERM : -use -.LR "kill 1" . -.I Init -will wait at most 30 seconds for outstanding processes to die, -to avoid waiting forever. -.PP -If, at bootstrap time, the -.I init -program cannot be executed, -the system will loop in user mode at a low address. -.SH FILES -.nf -.F /dev/console -.F /dev/tty -.F /etc/utmp -.F /usr/adm/wtmp -.F /etc/ttys -.F /etc/rc.nosh -.fi -.SH "SEE ALSO" -.IR login (8), -.IR kill (1), -.IR sh (1), -.IR ttys (5), -.IR getty (8), -.IR rc (8), -.IR reboot (8) -.SH BUGS -The single-user shell has all privileges. diff --git a/static/v10/man8/ino.8 b/static/v10/man8/ino.8 deleted file mode 100644 index be9c35c4..00000000 --- a/static/v10/man8/ino.8 +++ /dev/null @@ -1,10 +0,0 @@ -.th INO VIII 11/1/73 -.sh NAME -ino \*- get the i-number of a file -.sh SYNOPSIS -.bd ino -file ... -.sh DESCRIPTION -The i-number of each file argument is printed. -An i-number of zero is printed if a bad argument is given. -.sh BUGS diff --git a/static/v10/man8/ins.8 b/static/v10/man8/ins.8 deleted file mode 100644 index f4efaa4e..00000000 --- a/static/v10/man8/ins.8 +++ /dev/null @@ -1,103 +0,0 @@ -.TH INS 8 -.SH NAME -ins \- install software -.SH USAGE -.B ins -[ -.I option ... -] -[ -[ -.I source -] -.I target -] -.SH DESCRIPTION -.I Ins -queues a request to `install' the named -.I target -file \- in the simplest case, by copying from -.I source -to -.BR target " \- -and then attempts to execute all pending requests -for the target, -until thwarted by lack of privilege. -By default, each target has a separate queue, but if several files are -to be updated together their requests can -also be placed in another separate queue. -If modification requests for a given target file appear in several -different queues, those requests will be executed in correct time -order. -A request will be served only when it is at the front of all the queues -it is in. -.PP -If no target is named, -.I ins -attempts to serve all pending requests. -The options are -.TP -.B -x -Verify consistency of currently queued-up requests -with historical record in -.F /usr/spool/ins/log. -.TP -.B -v -Print a verbose commentary -(by copying logging data to standard output). -.TP -.B -n -Print, but do not execute, the modification requests. -.TP -.BI -j " jobnumber" "... -Delete a queued-up request. -Possible values for -.I jobnumber -are revealed by using the -.B -n -flag, where they are listed in the style -.BI /usr/spool/ins/job jobnumber. -.TP -.BI -q " queuename -Put the request in special named queue, in addition to the -queue for -.I target. -.TP -.B -r -Remove target. -.TP -.BI -o " owner -Set uid of target. -.TP -.BI -g " group -Set gid of target. -.TP -.BI -m " mode -Set file mode of target, as in -.IR chmod (1). -.TP -.BI -l " label -Set file label of target, as in -.IR setlab (1). -.TP -.BI -p " cap lic -Set file privileges, as in -.IR setpriv (8). -.PP -.I Ins -records -.IR xs (8)-style -checksums of both modified software and of its own queues, -keeps a verbose log file, etc, etc. -.SH FILES -.F /usr/spool/ins/log -.br -.F /usr/spool/ins/lock -.br -.F /usr/spool/ins/pending -.br -.F /usr/spool/ins/job* -.br -.F /usr/spool/ins/dat* -.SH BUGS -Not written yet. diff --git a/static/v10/man8/install.8 b/static/v10/man8/install.8 deleted file mode 100644 index 966aeffa..00000000 --- a/static/v10/man8/install.8 +++ /dev/null @@ -1,34 +0,0 @@ -.TH INSTALL 8 bowell -.SH NAME -install \- place files in their proper homes -.SH SYNOPSIS -.B /etc/install -[ -.B \-c -] [ \-s ] -file dest -.SH DESCRIPTION -.I Install -moves or copies the -.I file -to -.I dest. -If -.I dest -is a directory, the file is installed in the directory. -Its main use is in makefiles subsidiary to the primary source directory /src. -.PP -Option -.B \-c -causes the file to be copied, otherwise it is moved. -Option -.B \-s -invokes -.IR strip (1) -on the file first. -.PP -If possible, the group and owner of -.I dest -are changed to `bin'. -.SH BUGS -Only one option can appear. diff --git a/static/v10/man8/ipconfig.8 b/static/v10/man8/ipconfig.8 deleted file mode 100644 index 6fcc66c7..00000000 --- a/static/v10/man8/ipconfig.8 +++ /dev/null @@ -1,125 +0,0 @@ -.TH IPCONFIG 8 -.CT 1 sa_auto -.SH NAME -ipconfig, dkipconfig, udpconfig \- set up DARPA Internet protocols -.SH SYNOPSIS -.B /usr/ipc/mgrs/ipconfig -[ -.B -m -.I mask -] [ -.B -df -] -.I "ip-device localhost network" -.BI [ arp-device ] -.B & -.br -.B /usr/ipc/mgrs/dkipconfig -.I "gatemachine localhost remotehost" -.B & -.br -.B /usr/ipc/mgrs/udpconfig -.I udp-device -.B & -.SH DESCRIPTION -.I Ipconfig -activates the DARPA Internet protocol on a communications device, -with Internet address -.I localhost -for the host -and network address -.I network -for the device. -.PP -If -.I arp-device -is specified, -the ARP address resolution protocol -is started on that device. -Option -.B -d -causes -.I ipconfig -to print ARP requests on the standard output -as they are received. -.PP -Option -.B -m -declares a subnet mask -for the network reached through -.IR ip-device . -.I Mask -may be a four-piece IP address like -.L 255.255.255.0 -or a 32-bit hexadecimal number like -.LR ffffff00 . -.PP -Option -.B -f -is a special workaround for networks with obsolete hosts. -It causes -.I ipconfig -to answer illegal ARP requests for the subnet's broadcast address -with an illegal Ethernet address, -to prevent broadcast storms. -.PP -.I Dkipconfig -places a network call to -.I gatemachine -and activates the IP protocol on the connection, -so that the remote machine becomes a gateway for the caller's IP traffic. -.I Localhost -becomes the calling machine's Internet address -through this IP interface; -.I remotehost -is the Internet address -to which local IP packets should be sent -to reach the gateway. -.PP -.I Ipconfig -and -.I dkipconfig -record unusual events and errors in -log files -.F /usr/ipc/log/ipconfig -and -.FR /usr/ipc/log/dkipconfig . -.PP -.I Udpconfig -activates the UDP datagram protocol -on the named -.IR udp-device , -usually -.FR /dev/ipudp . -Only one -.I udpconfig -is needed for the entire collection of IP networks. -.PP -These programs are usually run once from -.IR rc (8). -.SH EXAMPLES -The following calls start IP -on system -.B fs -on the first Interlan Ethernet controller, -with ARP active; -arrange for machine -.B nj/astro/research -to pass IP packets to -.BR fs ; -and activate -UDP. -.EX -/usr/ipc/mgrs/ipconfig /dev/il00 fs mh-astro-net /dev/il01 & -/usr/ipc/mgrs/dkipconfig nj/astro/research fs-dk research-dk127 & -/usr/ipc/mgrs/udpconfig /dev/ipudp & -.EE -.SH FILES -.F /usr/ipc/log/ipconfig -.br -.F /usr/ipc/log/dkipconfig -.SH "SEE ALSO" -.IR con (1), -.IR qns (7), -.IR route (8), -.IR tcpmgr (8) diff --git a/static/v10/man8/istat.8 b/static/v10/man8/istat.8 deleted file mode 100644 index d44f3133..00000000 --- a/static/v10/man8/istat.8 +++ /dev/null @@ -1,35 +0,0 @@ -.pa 1 -.he 'ISTAT (VIII)'1/20/73'ISTAT (VIII)' -.ti 0 -NAME istat -- get inode status -.sp -.ti 0 -SYNOPSIS istat_____ [ filesystem ] inumber\d1\u ... -.sp -.ti 0 -DESCRIPTION istat_____ -gives information about one or more i-nodes -on the given file system or on /dev/rk0 if no file system -is given. -.sp -The information is in exactly the same form -as that for stat(I), -except that mode letter "a" is -used to indicate that the i-node is allocated, -"u" that it is unallocated. -.sp -.ti 0 -FILES /etc/uids, -/dev/rk0 -.sp -.ti 0 -SEE ALSO stat(I), ls(I) (-l option) -.sp -.ti 0 -DIAGNOSTICS -- -.sp -.ti 0 -BUGS istat_____ -ignores any read error -and pretends to give status even if the file system -is not physically present. diff --git a/static/v10/man8/kill.8 b/static/v10/man8/kill.8 deleted file mode 100644 index 0c6db3ff..00000000 --- a/static/v10/man8/kill.8 +++ /dev/null @@ -1,36 +0,0 @@ -.pa 1 -.he 'KILL (VIII)'1/20/73'KILL (VIII)' -.ti 0 -NAME kill -- terminate process with extreme prejudice -.sp -.ti 0 -SYNOPSIS /usr/adm/kill_____________ processnumber -.sp -.ti 0 -DESCRIPTION After ps__ -(q.v.) has given you the unique ID of a process, you can terminate -it by this command. -A core image is produced in the process's working directory. - -Only the super-user can exercise this privilege. -.sp -.ti 0 -FILES -- -.sp -.ti 0 -SEE ALSO ps (VIII) -.sp -.ti 0 -DIAGNOSTICS yes -.sp -.ti 0 -BUGS If the process -has executed sys nice (II) -and there is another process which has not, but -which loops, -the first process cannot be done in properly, -since it has to be swapped in so as cooperate -in its own murder. - -It would also be nice if ordinary people could -kill their own processes. diff --git a/static/v10/man8/kmc.8 b/static/v10/man8/kmc.8 deleted file mode 100644 index a2e40dc2..00000000 --- a/static/v10/man8/kmc.8 +++ /dev/null @@ -1,107 +0,0 @@ -.TH KMC 8 -.CT 1 sa_nonmortals -.SH NAME -kmc, kdiload, kmcdump \- control KMC11 input/output processors -.SH SYNOPSIS -.B /etc/kdiload -[ -.I dev -[ -.I file -] ] -.PP -.B /etc/kmcdump -[ -.I dev -] -.SH DESCRIPTION -These commands control the KMC11-B -microprocessors -used for Datakit protocol processing. -.PP -.I Kdiload -resets KMC device -.IR dev , -copies the microcode in -.IR file -into the KMC's memory, -and starts the KMC. -.I Dev -may be a pathname -or a single character key -identifying the KMC; -the default is -.LR 2 . -.I File -defaults to that specified in -.F /etc/kmctab -if a single character key is used, -.F /etc/dkk.dubhi -otherwise. -.PP -.I Kmcdump -stops the KMC -and copies its state into files -in the working directory. -.I Dev -may be a single character key -or a pathname; -the default is -.LR 2 . -The KMC's memory is copied to the file -.BI core. k . nnn\c -, -where -.I k -is the keyletter -and -.I nnn -is some number; -the state of the KMC's registers and some trace information from Unix -is written to -.BI regs. k . nnn\c -\&. -.PP -These commands search the file -.F /etc/kmctab -for KMC devices and microcode files. -The file contains lines of -three blank-separated fields: -.PP -.RS -single character identifying this KMC -.br -full pathname of the KMC device file -.br -full pathname of the microcode to be used in this KMC -.RE -.PP -The KMC with key -.I K -uses Datakit special files with names like -.BI /dev/dk/dk K 03\c -\&. -If there is only one KMC for Datakit, -its key is -.LR 2 . -If the only KMC is the only Datakit interface in a machine, -its key is -.LR 2 , -and its special files look like -.BR /dev/dk/dk03 . -.SH FILES -.F /etc/kmctab -.br -.F /bin/kasb -.SH SEE ALSO -.IR dkmgr (8) -.SH BUGS -For the moment, -the only permissible keys are -.L 0 -and -.LR 2 . -The KMC and Datakit filename conventions -are arcane, -and based on obsolete notions; -they should be replaced. diff --git a/static/v10/man8/ldpcs.8 b/static/v10/man8/ldpcs.8 deleted file mode 100644 index 31db6da2..00000000 --- a/static/v10/man8/ldpcs.8 +++ /dev/null @@ -1,58 +0,0 @@ -.TH LDPCS 8 VAX-11/750 -.CT 1 sa_auto -.SH NAME -ldpcs \- load comet microcode -.SH SYNOPSIS -.B /etc/ldpcs -[ -.B -f -] -[ -.B -v -] -.I pcsfile -.SH DESCRIPTION -.I Ldpcs -loads microcode -from -.I pcsfile -into the VAX-11/750 patchable control store. -Normally, -the hardware ID register is checked -to see that the system is an 11/750 -and that its base microcode revision level -is appropriately high; -the -.B -f -option -removes the checks. -The -.B -v -option causes the microcode version number -to be printed after loading. -.PP -.I Ldpcs -is usually called from -.IR rc (8) -to load the most recent -.SM DEC -microcode patches from -.FR /etc/pcs750.bin . -.PP -The patch file consists of -1024 bytes of patch bits, -followed by 10240 bytes of actual patches. -Each patch bit represents a 20-bit microcode word; -the patches themselves are 20-bit words -packed together. -The format is the same as that distributed by DEC. -.SH FILES -.F /dev/mem -.br -.F /dev/mtpr -.SH BUGS -Calling -.I ldpcs -is a good idea, -but it is not mandatory; -the system will run without the patches. diff --git a/static/v10/man8/login.8 b/static/v10/man8/login.8 deleted file mode 100644 index 50336078..00000000 --- a/static/v10/man8/login.8 +++ /dev/null @@ -1,138 +0,0 @@ -.TH LOGIN 8 -.CT 1 sa_auto -.SH NAME -login \- sign on -.SH SYNOPSIS -.B /etc/login -.I name -.br -.B /etc/login -.B -f -.I name -[ -.I cmd -] -.br -.B /etc/login -.B -p -.I passwd-line -[ -.I cmd -] -.SH DESCRIPTION -.I Login -is executed by -.IR getty (8). -See the Introduction to this volume for how to dial up initially. -.PP -.I Login -asks for a password if appropriate. -Echoing is turned off during the typing of the password. -The -.B -f -option forces login of the named user, without a password. -.B -p -is similar to -.BR -f , -but an entire line of password file information -is supplied. -.PP -.I Login -initializes the userid, the groupid, and the working directory -according to specifications found in the password file; -see -.IR passwd (5). -It also initializes environment variables -.SM PATH -and -.SM HOME . -Finally it executes a command interpreter (usually -.IR sh (1)). -Argument 0 of the command interpreter is its name with -a dash -.RL ( - ) -prepended. -If -a -.I cmd -argument was present, -two additional arguments -.B -c -.I cmd -are passed, -and environment variable -.SM REXEC -is set to -.LR 1 . -.PP -Upon a successful login, -accounting files are updated and, -if no options are present, -the message of the day is printed -and the user is informed of the -existence of mail. -.PP -Successful logins are recorded in -.F /etc/utmp -and -.FR /usr/adm/wtmp . -If -.I cmd -was present, -.L * -is appended to the login name in -.IR wtmp , -and -no record is made in -.IR utmp . -.PP -Only the super-user may execute -.IR login . -.SH FILES -.TF /usr/spool/mail/* -.TP -.F /etc/utmp -accounting -.TP -.F /usr/adm/wtmp -accounting -.TP -.F /usr/spool/mail/* -mail -.TP -.F /etc/motd -message-of-the-day -.TP -.F /etc/passwd -password file -.TP -.F /etc/group -groups file -.SH "SEE ALSO" -.IR newgrp (1), -.IR passwd (1), -.IR environ (5), -.IR passwd (5), -.IR getty (8), -.IR init (8), -.IR su (8), -.IR svcmgr (8). -.SH DIAGNOSTICS -`Login incorrect': -the name or the password is bad. -.br -`No Shell' or `no directory': the initial shell or -home directory specified in the password file does not exist. -.br -`Cannot open password file': things are badly curdled. -.SH BUGS -Information passed to options -.B -p -and -.B -f -is not checked. -Only trusted programs should run -.IR login . -Only trusted programs may usefully do so anyway; -.I login -has no privileges. diff --git a/static/v10/man8/makekey.8 b/static/v10/man8/makekey.8 deleted file mode 100644 index 193201bf..00000000 --- a/static/v10/man8/makekey.8 +++ /dev/null @@ -1,53 +0,0 @@ -.TH MAKEKEY 8 -.CT 1 sa_nonmortals -.SH NAME -makekey \- generate encryption key -.SH SYNOPSIS -.B /usr/lib/makekey -.SH DESCRIPTION -.I Makekey -improves the usefulness of encryption schemes depending on a key by -increasing the amount of time required to search the key space. -It -reads 10 bytes from its standard input, and writes 13 bytes on its -standard output. -The output depends on the input in a way intended to -be difficult to compute (i.e. to require a substantial fraction of a -second). -.PP -The first eight input bytes -(the -.IR "input key" ) -can be arbitrary -.SM ASCII -characters. -The last -two (the -.IR salt ) -are best chosen from the set of digits, upper- and lower-case -letters, -.L . -and -.LR / . -The salt characters are repeated as the first two characters of the output. -The remaining 11 output characters are chosen from the same set as the salt -and constitute the -.I "output key." -.PP -The salt is used to select one of 4096 cryptographic -machines all based on the National Bureau of Standards -.SM DES -algorithm, but modified in 4096 different ways. -Using the input key as key, -a constant string is fed into the machine and recirculated -a number of times. -The 64 bits that come out are distributed into the -66 useful key bits in the result. -.PP -.I Makekey -is intended for programs, such as -.IR crypt (1), -that perform encryption. -Usually its input and output will be pipes. -.SH SEE ALSO -.IR crypt (1) diff --git a/static/v10/man8/mkfs.8 b/static/v10/man8/mkfs.8 deleted file mode 100644 index 595723ba..00000000 --- a/static/v10/man8/mkfs.8 +++ /dev/null @@ -1,138 +0,0 @@ -.th MKFS VIII 11/1/73 -.sh NAME -mkfs \*- construct a file system -.sh SYNOPSIS -.bd /etc/mkfs -special -proto -.sh DESCRIPTION -.it Mkfs -constructs a file system -by writing on the special file -.it special -according to the directions -found in -the prototype file -.it proto. -The prototype file -contains tokens separated by spaces or -new lines. -The first token is the name of a file -to be copied onto block zero as -the bootstrap program -(see boot procedures(VIII)). -The second token is a number specifying the -size of the created file system. -Typically it will be the number of blocks on the device, -perhaps diminished -by space for swapping. -The next token is the i-list size in blocks -(remember there are 16 i-nodes per block). -The next set of tokens comprise the specification -for the root file. -File specifications consist of tokens -giving the mode, -the user-id, -the group id, -and the initial contents of the file. -The syntax of the contents field -depends on the mode. -.s3 -The mode token for a file is a 6 character string. -The first character -specifies the type of the file. -(The characters -.bd \*-bcd -specify regular, block special, -character special and directory files -respectively.) -The second character of the type -is either -.bd u -or -.bd \*- -to specify set-user-id mode or not. -The third is -.bd g -or -.bd \*- -for the set-group-id mode. -The rest of the mode -is a three digit octal number giving the -owner, group, and foreigner read, write, execute -permissions (see -.it chmod -(I)). -.s3 -Two decimal number -tokens come after the mode; they specify the -user and group ID's of the owner of the file. -.s3 -If the file is a regular file, -the next token is a pathname -whence the contents and size are copied. -.s3 -If the file is a block or character special file, -two decimal number tokens -follow which give the major and minor device numbers. -.s3 -If the file is a directory, -.it mkfs -makes the entries \fB.\fR and \fB..\fR -and then -reads a list of names and -(recursively) -file specifications for the entries -in the directory. -The scan is terminated with the -token \fB$\fR. -.s3 -If the prototype file cannot be opened and -its name consists of a string of digits, -.it mkfs -builds a file system with a single -empty directory on it. -The size of the file system is the value -of -.it proto -interpreted as a decimal number. -The i-list size is the file system size -divided by 50. -(This corresponds to an average size of -three blocks per file.) -The boot program is left uninitialized. -.s3 -A sample prototype specification follows: -.s3 -.nf -.in +5 -/usr/mdec/uboot -4872 55 -d\*-\*-777 3 1 -usr d\*-\*-777 3 1 - sh \*-\*-\*-755 3 1 /bin/sh - ken d\*-\*-755 6 1 - $ - b0 b\*-\*-644 3 1 0 0 - c0 c\*-\*-644 3 1 0 0 - $ -$ -.in -5 -.fi -.sh "SEE ALSO" -file system(V), -directory(V), -boot procedures(VIII) -.sh DIAGNOSTICS -There are various diagnostics for -syntax errors, -inconsistent values, -and sizes too small. -.sh BUGS -It is not possible to initialize a file larger than -64K bytes. -.br -The size of the file system is restricted to -64K blocks. -.br -There should be some way to specify links. diff --git a/static/v10/man8/mknod.8 b/static/v10/man8/mknod.8 deleted file mode 100644 index ea3a5137..00000000 --- a/static/v10/man8/mknod.8 +++ /dev/null @@ -1,79 +0,0 @@ -.th MKNOD VIII 10/31/73 -.sh NAME -mknod \*- build special file -.sh SYNOPSIS -.bd /etc/mknod -name -[ -.bd c -] [ -.bd b -] -major -minor -.sh DESCRIPTION -.it Mknod -makes a directory entry and corresponding i-node -for a special file. -The first argument is the -.it name -of the entry. -The second is -.bd b -if the special file is block-type (disks, tape) or -.bd c -if it is character-type (other devices). -The last two arguments are -numbers specifying the -.it major -device type -and the -.it minor -device (e.g. unit, drive, or line number). -.s3 -The assignment of major device numbers is specific to each system. -For reference, here are the numbers for the MH 2C-644 machine. -Do not believe them too much. -.s3 -Block devices: -.lp +8 4 -0 RF fixed-head disk -.lp +8 4 -1 RK moving-head disk -.lp +8 4 -2 TC DECtape -.lp +8 4 -3 TM magtape -.lp +8 4 -4 RP moving-head disk -.lp +8 4 -5 Vermont Research moving-head disk -.i0 -.s3 -Character devices: -.lp +8 4 -0 KL on-line console -.lp +8 4 -1 DC communications lines -.lp +8 4 -2 PC paper tape -.lp +8 4 -3 DP synchronous interface -.lp +8 4 -4 DN ACU interface -.lp +8 4 -5 core memory -.lp +8 4 -6 VT scope (via 11/20) -.lp +8 4 -7 DA voice response unit -.lp +8 4 -8 CT phototypesetter -.lp +8 4 -9 VS voice synthesizer -.lp +8 4 -10 TIU Spider interface -.i0 -.sh "SEE ALSO" -mknod (II) -.sh BUGS diff --git a/static/v10/man8/mkpkg.8 b/static/v10/man8/mkpkg.8 deleted file mode 100644 index 50032998..00000000 --- a/static/v10/man8/mkpkg.8 +++ /dev/null @@ -1,179 +0,0 @@ -.TH MKPKG 8 -.CT 1 comm_mach -.SH NAME -mkpkg, inspkg, seal, unseal \- package files for automatic software distribution -.SH SYNOPSIS -.B mkpkg -[ -.I option ... -] -.I file ... -.PP -.B inspkg -[ -.I option ... -] -[ -.I file ... -] -.PP -.B seal -[ -.I option -] -[ -.I file ... -] -.PP -.B unseal -[ -.I option -] -[ -.I file ... -] -.SH DESCRIPTION -These programs are used by -.IR ship (8) -to keep files identical across machines. -.PP -.I Mkpkg -packages -.I files -and writes the result on the standard output. -.I Inspkg -installs the named packages -or the standard input. -.PP -Non-existent files given to -.I mkpkg -are deleted upon installation. -Directories are copied with all their contents. -Hard links are reproduced. -Symbolic links and special files -are reproduced with the same inode contents. -File modification and access times and owner and group names -are reproduced as far as possible. -Old versions of files are removed before installation: -.I inspkg -needs write permission in containing directories. -.PP -Options for both -.I mkpkg -and -.IR inspkg : -.nr xx \w'\f5-K \f2keyfile ' -.TP \n(xxu -.B -v -Place running commentary on the standard error file. -.br -.ns -.TP -.BI -D path1 = path2 -Pretend that any pathname beginning with -.I path1 -really begins with -.IR path2 . -Relative pathnames are extended to full pathnames before comparison. -.PP -Options for -.IR mkpkg ; -only one may occur: -.TP \n(xxu -.BI -x command -Include in the package instructions to execute the shell -.I command -after all files have been installed. -.I Command -is unaffected by option -.BR -D . -.br -.ns -.TP -.BI -X file -Include in the package instructions to -run the shell script -.I file -after all files have been installed. -The file name is subject to option -.BR -D . -.PP -Options for -.IR inspkg : -.TP \n(xxu -.B -n -Skip the actual installation, but verify -the input packages and produce a backup if requested. -.br -.ns -.TP -.B --b -Write on the standard output a backup package -that contains whatever was destroyed. -.PP -A package is an -.IR ar (1) -archive containing an extra -.SM ASCII -file named -.FR Instructions . -.PP -.I Seal -concatenates the named -.I files -or the standard input -onto the standard output in -an error-detecting form suitable for shipment by -.IR mail (1). -.I Unseal -reverses the process, concatenating copies of all the -original inputs onto the standard output. -When -.IR asd (8) -uses -.IR uucp (1), -it sends sealed packages. -.PP -A sealed file is printable, has -fewer than 128 characters per line, and has no lines -consisting of a single period. -The first line is -.L !<seal> -and the last one begins with -.LR !end . -Other lines, such as mail headers, can be added to -either end of a sealed file -without hindering -.IR unseal . -.PP -Options for -.I seal -and -.IR unseal : -.TP \n(xxu -.B -k -A key will be demanded to encrypt the -checksum calculation. -.br -.ns -.TP -.BI -K " keyfile" -Same, but taking the first line of -.I keyfile -as the key. -.SH SEE ALSO -.IR ar (1), -.IR cpio (1), -.IR tar (1), -.IR bundle (1), -.IR ship (8), -.IR ar (5), -.IR asd (8) -.SH BUGS -The pipeline -.L mkpkg ... | inspkg -fails if input and output files overlap. -.br -.I Inspkg -fills any holes in files. diff --git a/static/v10/man8/mount.8 b/static/v10/man8/mount.8 deleted file mode 100644 index 1dfa16a2..00000000 --- a/static/v10/man8/mount.8 +++ /dev/null @@ -1,153 +0,0 @@ -.TH MOUNT 8 -.CT 1 sa_nonmortals -.SH NAME -mount, umount \- mount and dismount file system -.SH SYNOPSIS -.B /etc/mount -[ options ] -[ -.I special name -[ -.I fstype -[ -.I flags -] ] ] -.PP -.B /etc/mount -.B -a -.PP -.B /etc/mount -[ -.I special name -[ -.B -r -] -] -.PP -.B /etc/umount -.I name -.PP -.B /etc/umount -.B -a -.SH DESCRIPTION -.I Mount -announces to the system that a removable file system -of type -.I fstype -is present on the file -.I special. -The file -.I name -must exist already; it -must be a directory (unless the root of the -mounted file system is not a directory). -It becomes the name of the newly mounted root. -See -.IR fmount (2) -for a list of file system types -and appropriate flags. -If -.I fstype -or -.I flags -is omitted, -zero is assumed; -file system type 0 -is an ordinary disk file system. -.PP -The options are -.TP -.B -a -Mount all the files designated in -.FR /etc/fstab ; -see -.IR fstab (5). -No other arguments are legal with -.BR -a . -.TP -.B -r -Read only; shorthand for -.I fstype -0 -and -.I flag -1. -A deprecated usage allows -.B -r -to follow -.I name. -.TP -.BI -l " label -The -.I label, -given in the form of -.I atolab -(see -.IR labtoa (3)), -becomes the file system ceiling described in -.IR fmount (2). -.PP -.I Umount -announces to the system that the file system mounted on file -.I name -is to be removed. -.PP -If the -.B -a -option is present for -.I mount -.RI ( umount ), -an attempt is made to mount (remove) each file system named in -.FR /etc/fstab -(\c -.FR /etc/mtab ). -.PP -These commands -maintain a table of mounted devices in -.FR /etc/mtab . -If invoked without an argument, -.I mount -prints the table. -.PP -Physically write-protected and magnetic tape file -systems must be mounted read-only -or errors will occur when access times are updated, -whether or not any explicit write is attempted. -.SH EXAMPLES -.TP -.B "/etc/mount /dev/ra02 /usr" -Mount the file system on disk -.L /dev/ra02 -on directory -.LR /usr . -.TP -.B "/etc/mount /dev/null /proc 2" -Mount the process file system. -.TP -.B " /etc/mount -l 'nu u ffff...' /dev/ra02 /usr -File capabilities on -.IR exec (2) -are limited to -.BR T_NOCHK -and -.BR T_UAREA , -with self-licensing only for -.BR T_UAREA ; -all lattice labels are accessible (ceiling is lattice top). -.SH FILES -.TF /etc/fstab -.TP -.F /etc/mtab -mount table -.TP -.F /etc/fstab -file system table -.SH "SEE ALSO" -.IR fmount (2), -.IR fstab (5), -.IR netfs (8) -.SH BUGS -Mounting file systems full of garbage will crash the system. -.br -Mounting a root directory on a non-directory -makes some apparently good pathnames invalid. diff --git a/static/v10/man8/netfs.8 b/static/v10/man8/netfs.8 deleted file mode 100644 index d4b97656..00000000 --- a/static/v10/man8/netfs.8 +++ /dev/null @@ -1,315 +0,0 @@ -.TH NETFS 8 -.CT 1 sa_nonmortals -.SH NAME -netfs \- network file system -.SH SYNOPSIS -.nf -.B /usr/netb/setup.go -.fi -.SH DESCRIPTION -The network file system is conventionally a set of directories -contained in -.FR /n , -and a set of files and programs in -.FR /usr/netb . -Connections in the network file system are asymmetric: -files on a `server' system are made accessible on a `client' system, -usually in directory -.BI /n/ server-name. -.SS Client -The client runs -.FR /usr/netb/setup -to maintain connections; -it is started by invoking -.F /usr/netb/setup.go -from -.IR rc (8). -.I Setup -uses -.F /usr/netb/friends -to control the connections to servers. -Each line in -.I friends -contains six fields: -.RS -network address -.br -network call argument -.br -mount point -.br -protocol id -.br -unique identifier -.br -debugging flag -.br -network calling username -.RE -.PP -The network address and argument give the location of the server. -They are interpreted differently according to the protocol id, -which should be one of -.TP -.B d -Call the server on the named network address, -with default network -.L dk -and default service name -.LR fsb . -The network call argument is ignored. -The server machine should respond by calling -.IR zarf , -described below; -see -.IR svcmgr (8). -.TP -.B t -Call the named network address, -with default network -.LR tcp , -and invoke the program named in the -network call argument -using the protocol of -.IR rsh ; -.IR con (1). -.PP -.I Setup -calls -.IR setlogname -(see -.IR getuid (2)) -to make the network call appear to have been placed -by the calling username. -The username may be omitted; -.LR daemon -is the default. -.PP -The mount point is the directory -on which the remote file system is to appear. -The unique identifier is a integer in the range 0-255; -it is used internally to distinguish connections, -and must be unique among all active remote file systems -(including those not maintained by -.IR setup , -e.g. -.IR faced (9.5)). -The debugging flag is usually 0; -nonzero numbers -increase the chatter in various logfiles. -.PP -.I Setup -reads the -.I friends -file when it starts, -and checks for changes once a minute. -Each remote file system is probed once a minute; -if there is no response to several consecutive probes, -the connection is torn down and restarted. -Failed connections are retried every minute. -.SS Server -The server program is -.FR /usr/netb/zarf . -A separate -.I zarf -process exists for each client. -.PP -When a connection is started, -the client sends the server a list of valid user and group names -and the corresponding numerical IDs -on the client system. -The userid and groupid of user and group names that exist -on both machines are mapped so that -client and server see IDs -under the same names. -Unmapped IDs on the server appear as \-1 on the client. -Client processes with unmapped IDs are denied access. -.PP -.I Zarf -is subject to access control on the server. -It will have access only to files that its own userid -and groupid admit. -Unless run as super-user, it will create files with its own, -not mapped, userid. -.PP -.I Zarf -reads configuration information -from -.F /usr/netb/except.local -and -.FR /usr/netb/except . -The -files are read only once, -when -.I zarf -starts, -.B except.local -first. -Usually -.B except -is the same on all machines in some administrative cluster, -.B except.local -contains things specific to a particular server system. -.PP -The files contain sections -beginning with the line -.B client -.I origin. -.I Origin -is the name of the calling client, -as provided by the network; -.L * -matches any client. -The first matching section is used. -.PP -Within each section, -lines have of one of the following forms. -Lines beginning with -.L # -are ignored. -.TP -.BI "uid " cname = sname -Regardless of the contents of password files, -map client user name -.I cname -to server user name -.IR sname . -If -.I cname -is not announced as valid by the client, -the line is ignored. -If -.I sname -is not a valid name on the server, -any previous mapping for -.I cname -is discarded. -.TP -.BI "gid " cname = sname -Map client group name -.I cname -to server group name -.IR sname , -as above. -.TP -.BI "param otherok=" val -If -.I val -is -.LR 1 , -client processes with unmapped userids -are granted world access -to existing files on the server. -Unmapped userids -may never create files -(who would own them?). -If -.I val -is anything else, -no access is permitted -to -unmapped client userids. -.TP -.BI "param root=" pathname -Use -.I pathname -rather than -.B / -as the root of the filename hierarchy -made visible on the client. -.SH EXAMPLES -A -.I friends -file -for a connection to -.B alice -over Datakit, -.B shamash -over TCP/IP, -and -.B bebop -over TCP/IP -without administrative help: -.RS -.EX -.ta \w'tcp!shamash!400 'u +\w'/usr/pjw/netb/zarf 'u +\w'/n/alice 'u +.3i +.3i +.3i -alice - /n/alice d 0 0 -tcp!shamash!400 - /n/sun d 1 0 -bebop /usr/pjw/netb/zarf /n/bebop t 2 0 pjw -.EE -.RE -.PP -Some -.I except -file rules: -.RS -.EX -client dk!nj/astro/research -param otherok=1 -client * -uid root= -gid mail=other -param otherok=0 -param root=/usr/spool -.EE -.RE -.PP -If the -.I research -machine calls as a client, -the whole file system tree is visible, -all userids including the super-user -are permitted normal access, -and user names unknown to the server -are permitted world access. -If any other machine calls, -only the contents of -.B /usr/spool -are visible, -.I root -and unknown users -are explicitly denied access, -and -processes in group -.I mail -on the client -are treated as if in group -.I other -on the server. -.SH FILES -.PD 0 -.TF /usr/netb/except.local -.TP -.F /n/* -.TP -.F /usr/netb/friends -client connection info -.TP -.F /usr/netb/except.local -.TP -.F /usr/netb/except -.TP -.F /usr/netb/setupl -log file for -.I setup -.TP -.F /usr/netb/zarf.log -log file for zarf -server control info -.SH SEE ALSO -S. A. Rago, `A Look at the Version 9 Network File System', -this manual, Volume\ 2 -.SH BUGS -The scheme works only in a modest-sized, friendly community, as it -requires a process per client, trust of clients' security, and common -login names. -.br -File modification times are adjusted for clock-time differences -between machines. -Thus, when viewed across the network, -identical files installed on different machines by -.IR asd (8) -may appear to have different modification times, and -symbol tables of random libraries -.RI ( ar (1)) -may appear to be out of date. diff --git a/static/v10/man8/netstat.8 b/static/v10/man8/netstat.8 deleted file mode 100644 index 2cc7257f..00000000 --- a/static/v10/man8/netstat.8 +++ /dev/null @@ -1,100 +0,0 @@ -.TH NETSTAT 8 -.CT 1 sa_nonmortals -.SH NAME -netstat, dkstat \- show network status for internet and datakit networks -.SH SYNOPSIS -.B netstat -[ -.B \-acCirRst -] -[ -.I system -] -[ -.I core -] -.PP -.B dkstat -[ -.I interval -[ -.I count -] -] -.SH DESCRIPTION -.I Netstat -displays internet -(TCP/IP and UDP/IP) -traffic and configuration -data. -Without options, -it lists all TCP and UDP connection assignments. -A single option -changes the listing: -.TP -.B -a -known mappings between internet names and -Ethernet addresses. -.TP -.B -c -all TCP and UDP connection assignments -(the default). -.TP -.B -C -detailed state of active TCP connections. -.TP -.B -i -active IP interfaces. -.TP -.B -n -display numeric internet addresses rather than host and -network names. -.TP -.B -s -protocol statistics. -.TP -.B -r -routing tables. -.TP -.B -R -routing tables, -including deleted entries -(for debugging). -.TP -.BI -t buf -running trace of -packets passing through -.IR buf : -.L il -for the Interlan Ethernet controller, -.L qe -for the DEQNA, -.L tcp -(the default) -for all packets passing through TCP. -.PP -The arguments -.I system -and -.I core -are substitutes for the defaults -.F /unix -and -.FR /dev/kmem . -.PP -.I Dkstat -reports the number of bytes received and sent over -the Datakit network, together with error reports if any occurred. -The first report is cumulative since a reboot. -Further reports may be requested every -.I interval -seconds; these reports are incremental. -.PP -The optional -.I count -argument restricts the number of reports. -.SH DIAGNOSTICS -.BR "nlist /unix failed" : -.I netstat -could not find pertinent system information, -perhaps because this system isn't set up for TCP/IP. diff --git a/static/v10/man8/nosh.8 b/static/v10/man8/nosh.8 deleted file mode 100644 index 7447f767..00000000 --- a/static/v10/man8/nosh.8 +++ /dev/null @@ -1,138 +0,0 @@ -.TH NOSH 8 -.CT 1 shell proc_man dirs files -.SH NAME -nosh \- `no-surprise' shell, a sub-standard command interpreter -.SH SYNOPSIS -.B /etc/nosh -[ -.I file -] -.PP -.B priv nosh -gunxlp -.I file -.SH DESCRIPTION -.I Nosh -executes commands read from its standard input -or from the named -.IR file . -It has few of the advanced features of -.IR sh (1), -making it more trustable for use in -security administration tasks. -In the second usage, -.I nosh -is endowed with one or more of the licenses -.BR gunxlp ; -see -.IR labtoa (3). -.SS Commands -A -command is either -.I simple -or -.I builtin. -Each command consists of -a sequence of -.I words -separated by white space, -terminated by a new-line character or end of input. -Backslash quoting and sharp commenting are honored. -The first word specifies the name of the command to -be executed. -If the command name matches one of the builtins -listed below it is executed in the shell process. -If the command name matches no -builtin command, it is taken to be the -pathname of an executable file; the name must begin with -.L / -or -.LR . . -A new process is created and an attempt is made to -execute the file via -.IR exec (2) -with an empty environment. -.SS Input-Output Redirection -The standard input is inherited by simple commands. -Simple -.B > -output redirection to named files as in -.IR sh (1) -works only for simple commands, and only for file -descriptors 1 (default) and 2. -.SS Builtin Commands -.PP -.PD 0 -.TP -.BI cd " dir -Change the current directory to -.I dir. -.TP -.BI exit " status -Exit with given status, 0 by default. -.TP -.B set +e -.TP -.B set -e -Turn an ignore-error switch on -.RB ( +e , -default) or off -.RB ( -e ). -.I Nosh -normally ignores nonzero exit status from an executed -command, but exits with that status if -.B -e -is set. -.TP -.B set +x -.TP -.B set -x -Refrain from echoing -.RB ( +x , -default) or echo -.RB ( -x ) -each command as it is executed. -.TP -.BI lmask " licenses command \fR[\fP arg \fR... ]\fP -Run a simple command, allowing licenses -indicated by a nonempty string from the set -.BR gunxlp- -to be inherited from -.I nosh. -Normally no licenses are inherited. -.SS Missing features -Features of -.IR sh (1) -that -.IR nosh -lacks include: -background commands, pipelines, compound commands, most builtins, -multicharacter quotation, -command substitution, parameter substitution, variables, environments, -file name generation, redirection of input, signal traps, -search paths, mail notification, -.BR .profile , -user specification of prompts. -.SH DIAGNOSTICS -.I Nosh -prints nonzero exit or termination status -of executed commands as octal numbers labeled -.L e= -and -.LR t= ; -see -.IR wait (2). -If invoked with a -.I file -argument, it exits unconditionally for nonzero termination -status or syntax error, and conditionally (under control of -.LR set ) -for nonzero exit status. -.PP -.I Nosh -exits immediately if -invoked with more than one argument, -if invoked with an argument with a relative path name, -if invoked by a relative path name, or if invoked -with interrupt or quit signals ignored. -.SH SEE ALSO -.IR sh (1) diff --git a/static/v10/man8/ns.8 b/static/v10/man8/ns.8 deleted file mode 100644 index 620e80e3..00000000 --- a/static/v10/man8/ns.8 +++ /dev/null @@ -1,153 +0,0 @@ -.TH NS 8 -.CT 1 sa_auto -.SH NAME -ns \- name server database -.SH SYNOPSIS -.B /usr/ipc/mgrs/ns -[ -.B -m -.I server -] [ -.B -d -] -.SH DESCRIPTION -.I Ns -maintains a database -of naming information, -accessed by -.IR qns (7) -and other programs. -It should be run once from -.IR rc (8). -.PP -The database is accessed -through local service -.BR ns , -or service -.I server -if option -.B -m -was specified. -.PP -The file -.F /usr/ipc/lib/ns.db -contains instructions for building the database. -These instructions are lines -of one of the following forms: -.TP \w'#include\0file\0\0\0\0'u \" wrong fonts; near enough? -.BI #uusys " file" -Read the named -.I uucp -.B Systems -.IR file . -For entries using caller -.LR ACU , -add a database entry containing -.RS -.IP -.I system\0 -.IB telephone-number ,tel\0 -.B uucp,svc -.PP -For entries using caller -.LR DK -or -.LR DKH , -add an entry containing -.IP -.I system\0 -.IB datakit-address ,dk\0 -.B uucp,svc -.PP -For any other entry, -add -.IP -.I system\0 -.B uucp,svc -.RE -.TP -.BI #inhost " file" -For each line in the named -4BSD-style internet hosts -.IR file , -add a database entry of the form -.RS -.IP -.IB ip-address ,in\0 -.I hostname\0 -.IB host-domain-name ,dom -.RE -.TP -.BI #innet " file" -For each line in the named -4BSD-style internet networks -.IR file , -add a database entry of the form -.RS -.IP -.IB ip-net-address ,in\0 -.I netname -.RE -.TP -.BI #include " file" -Interpret -the contents of -.IR file -in the same format -as -.BR ns.db . -.PP -In all cases, -.I file -may be followed by -a list of -.I value,attribute -pairs to be included with any -database entries caused by that file. -If the filename doesn't begin with -.LR / , -it is prefixed with -.BR /usr/ipc/lib . -.PP -Blank lines -and -lines beginning with -.L # -followed by a space or tab -are ignored. -.PP -Any other lines are taken as literal database entries: -a collection of -.I value,attribute -pairs separated by spaces. -Each line is a single entry. -.PP -The database is ephemeral; -it is rebuilt whenever -.I ns -starts, -when requested by -.BR "qns reset" , -or when -.I ns -notices that -.B ns.db -or one of the files named therein -has changed. -Rebuilding can take several minutes, -especially on a busy machine. -During a rebuild, -the server appears active but does not answer requests; -calls will block until the rebuild finishes. -.PP -.I Ns -leaves remarks in file -.FR /usr/ipc/log/ns . -There are more remarks if the -.B -d -option was used. -.SH FILES -.F /usr/ipc/lib/ns.db -.SH SEE ALSO -.IR ipc (3), -.IR qns (7) diff --git a/static/v10/man8/postbgi.8 b/static/v10/man8/postbgi.8 deleted file mode 100644 index 48e2742f..00000000 --- a/static/v10/man8/postbgi.8 +++ /dev/null @@ -1,138 +0,0 @@ -.TH POSTBGI 8 local -.SH NAME -postbgi \- PostScript translator for BGI (Basic Graphical Instructions) files -.SH SYNOPSIS -.B postbgi -[ options ] [ files ] -.SH DESCRIPTION -.I Postbgi -translates BGI (Basic Graphical Instructions) -.I files -into PostScript and writes the results on the -standard output. -If no -.I files -are specified, or if \- is one of the input -.I files, -the standard input is read. -The following -.I options -are understood: -.TP 1.0i -.BI \-c num -Print -.I num -copies of each page. -By default only one copy is printed. -.TP 1.0i -.BI \-f name -Print text using font -.I name. -Any PostScript font can be used, -although the best results will only be -obtained with constant width fonts. -The default font is Courier. -.TP 1.0i -.BI \-m num -Magnify each logical page by the factor -.I num. -Pages are scaled uniformly about the origin, -which by default is located at the center of -each page. -The default magnification is 1.0. -.TP 1.0i -.BI \-n num -Print -.I num -logical pages on each piece of paper, -where -.I num -can be any positive integer. -By default -.I num -is set to 1. -.TP 1.0i -.BI \-o list -Print pages whose numbers are given in the comma-separated -.IR list . -The list contains single numbers -.I N -and ranges -.IB N1 \- N2. -A missing -.I N1 -means the lowest numbered page, a missing -.I N2 -means the highest. -.TP 1.0i -.BI \-p mode -Print -.I files -in either -.B portrait -or -.B landscape -.I mode. -Only the first character of -.I mode -is significant. -The default -.I mode -is portrait. -.TP 1.0i -.BI \-w num -Set the line width used for graphics to -.I num -points, where a point is approximately 1/72 -of an inch. -By default -.I num -is set to 0.0 points, which forces lines to be -one pixel wide. -.TP 1.0i -.BI \-x num -Translate the origin -.I num -inches along the positive x axis. -The default -coordinate system has the origin fixed at the -center of the page, with positive -x to the right and positive y up the page. -Positive -.I num -moves everything right. -The default offset is 0 inches. -.TP 1.0i -.BI \-y num -Translate the origin -.I num -inches along the positive y axis. -Positive -.I num -moves everything up the page. -The default offset is 0 inches. -.TP 1.0i -.BI \-A file -Append a simple accounting record to -.I file -after all the input -.I files -have been successfully translated. -By default no accounting data is produced. -.TP 1.0i -.BI \-L file -Use -.I file -as the PostScript prologue, -which by default is /usr/lib/postscript/postbgi.ps. -.SH DIAGNOSTICS -0 exit status is returned if -.I files -were successfully processed. -.SH BUGS -The default line width is too small for 'write to white' -print engines, like the one used by the PS-2400. -.SH FILES -/usr/lib/postscript/postbgi.ps -.SH SEE ALSO -dpost(1), postprint(1), posttek(1), postdmd(1) diff --git a/static/v10/man8/postio.8 b/static/v10/man8/postio.8 deleted file mode 100644 index fdd5721e..00000000 --- a/static/v10/man8/postio.8 +++ /dev/null @@ -1,205 +0,0 @@ -.TH POSTIO 8 -.CT 1 sa_auto -.SH NAME -postio \- serial interface for postscript printers -.SH SYNOPSIS -.B /usr/bin/postscript/postio -[ -.I option ... -] [ -.I file ... -] -.SH DESCRIPTION -.I Postio -sends -.I files -to a PostScript printer. -It is usually called by the innards of -.IR lp (1). -If no files are named, -the standard input is sent. -.PP -Mandatory argument -.B -l -names the printer. -If -the first character of -.I line -is -.LR / , -it is assumed to be a local filename like -.LR /dev/tty37 . -Otherwise it is taken to be a network address, -with default network -.LR dk , -to which the printer is connected. -.PP -These options are probably the most useful: -.nr xx \w'\fL-b\ \fIspeed\ 'u -.TP \n(xxu -.BI \-b speed -Transmit data -at baud rate -.I speed, -one of 1200, 2400, 4800, 9600 (default), and 19200. -.TP -.B \-q -Disable status queries while -.I files -are being sent to the printer. -When status queries are disabled a dummy message is appended -to the log file before each block is transmitted. -.TP -.BI \-B num -Set the internal buffer size for reading and writing -.I files -to -.I num -bytes, 2048 by default. -.TP -.B \-D -Debug mode: -copy everything read from the printer -to the log file -or standard error. -.TP -.BI \-L file -Log data read from the printer in -.IR file . -Standard error is the default. -Normally only messages indicating a change in the printer's state are logged. -.TP -.BI \-P string -Send -.I string -to the printer before any input -.IR files . -The default -is PostScript code that disables timeouts. -.TP -.BI \-R num -If -.I num -is -.LR 1 , -run as a single process; -if -.LR 2 , -use separate processes for reading and writing. -.PP -These options are not useful to spoolers like -.IR lp . -.TP \n(xxu -.B \-i -Interactive mode: -send the -.I files -to the printer, -then copy standard input to the printer -and printer output to standard error. -Overrides many other options. -To have a friendly chat with the printer, -begin by typing -.L executive -on a line by itself. -.TP -.B \-t -Copy printer output that doesn't look like -status information to the standard output; -intended for use with PostScript programs that write results. -.PP -This option should be used only as a last resort: -.TP \n(xxu -.B \-S -Take special measures to send data slowly. -Limits the internal buffer to 1024 bytes, -implies -.B -R1 -and disables -.BR -q -and -.BR -i . -Expensive in CPU time. -.PP -When -.I postio -starts, -it attempts to force the printer into IDLE state -by sending a sequence of -.RB control- t -(status query), -.RB control- c -(interrupt), -and -.RB control- d -(end of job) -characters. -When the printer is idle, -the files are transmitted -with an occasional -.RB control- t -interspersed -(except under -.BR -q ). -After all data have been sent, -.I postio -waits until the printer appears to have finished -before exiting. -Fatal error messages from the printer -cause -.I postio -to exit prematurely. -.SH EXAMPLES -.TP -.L -postio -l/dev/tty01 file1 file2 -Runing as a single process at 9600 baud, send file1 and file2 -to printer -.LR /dev/tty01 . -.TP -.L -postio -R2 -B4096 -l/dev/tty01 -Llog file1 file2 -Similarly, -but use two processes -and a 4096-byte buffer, -and copy printer messages to file -.BR log . -.TP -.L -postio -t -l/dev/tty22 -Llog program >results -Send the PostScript -.L program -to printer -.BR /dev/tty22 , -place any data in -.BR results , -put error messages in -.BR log . -.TP -.L -postio -i -l/cs/dk!my/printer -Connect interactively to the printer at network address -.BR /cs/dk!my/printer . -.SH SEE ALSO -.IR lp (1), -.IR postscript (8) -.SH DIAGNOSTICS -Exit status 1 means a system error -(e.g. can't open the printer), -2 means a PostScript error, -3 means both. -Status 2 is usually caused by a syntax error in an input file. -.SH BUGS -Multiple -files -with PostScript end-of-job marks -are not guaranteed to work. -.PP -If a network is involved, -.B \-b -may be ineffective and attempts by -.I postio -to flow-control data in both directions may not work. -Option -.B \-q -can help if the printer is connected to Radian Datakit. diff --git a/static/v10/man8/postreverse.8 b/static/v10/man8/postreverse.8 deleted file mode 100644 index 4b16537e..00000000 --- a/static/v10/man8/postreverse.8 +++ /dev/null @@ -1,97 +0,0 @@ -.TH POSTREVERSE 8 local -.SH NAME -postreverse \- reverse the page order in a postscript file -.SH SYNOPSIS -.B postreverse -[ options ] [ file ] -.SH DESCRIPTION -.I Postreverse -reverses the page order in a minimally conforming PostScript -.I file -and writes the results on the standard output. -If no -.I file -is specified, the standard input is read. -The following -.I options -are understood: -.TP 1.0i -.BI \-o list -Select pages whose numbers are given in the comma-separated -.IR list . -The list contains single numbers -.I N -and ranges -.IB N1 \- N2. -A missing -.I N1 -means the lowest numbered page, a missing -.I N2 -means the highest. -.TP 1.0i -.B \-r -Don't reverse the pages in -.I file. -.TP 1.0i -.BI \-T dir -Use -.I dir -as the temporary file directory when -reading from the standard input. -By default -.I dir -is set to /tmp. -.PP -.I Postreverse -can handle files the violate page independence, -provided all global definitions are bracketed by -\&\f(CW%%BeginGlobal\fP and \&\f(CW%%EndGlobal\fP -comments. -In addition files that mark the end of each page -with \&\f(CW%%EndPage: label ordinal\fP comments -will also reverse properly, provided the prologue and -trailer sections can be located. -If the end of the prologue isn't found, the entire -.I file -is copied, unmodified, to the standard output. -.PP -Since global definitions are pulled out of individual -pages and put in the prologue, the output file can be -minimally conforming, even if the input -.I file -wasn't. -.SH EXAMPLES -Select pages 1 to 100 from -.B file -and reverse the pages, -.PP -.RS -\f(CWpostreverse -o1-100 file\fP -.RE -.PP -Print 4 logical pages on each physical page -and reverse all the pages, -.PP -.RS -\f(CWpostprint -n4 file | postreverse\fP -.RE -.PP -Produce a minimally conforming file from output -generated by dpost without reversing the pages, -.PP -.RS -\f(CWdpost file | postreverse -r\fP -.RE -.PP -.SH DIAGNOSTICS -0 exit status is returned if -.I file -was successfully processed. -.SH BUGS -No attempt has been made to deal with redefinitions of global -variables or procedures. -If standard input is used, the input -.I file -will be read three times before being reversed. -.SH SEE ALSO -dpost(1), postprint(1), posttek(1), postbgi(1), postdmd(1) diff --git a/static/v10/man8/postscript.8 b/static/v10/man8/postscript.8 deleted file mode 100644 index 2143c6b2..00000000 --- a/static/v10/man8/postscript.8 +++ /dev/null @@ -1,283 +0,0 @@ -.TH POSTSCRIPT 8 -.CT 1 sa_auto -.SH NAME -dpost, postdaisy, postdmd, postprint \- filters to produce postscript -.SH SYNOPSIS -.B /usr/bin/postscript/dpost -[ -.I option ... -] [ -.I file ... -] -.PP -.B /usr/bin/postscript/postdaisy -[ -.I option ... -] [ -.I file ... -] -.PP -.B /usr/bin/postscript/postdmd -[ -.I option ... -] [ -.I file ... -] -.PP -.B /usr/bin/postscript/postprint -[ -.I option ... -] [ -.I file ... -] -.PP -.B /usr/bin/postscript/posttek -[ -.I option ... -] [ -.I file ... -] -.SH DESCRIPTION -These programs convert files of various formats into -PostScript. -The input formats are -.nr xx \w'\fL-p\ \fImode\ 'u -.TP \n(xxu -.I dpost -.IR troff (1) -output -.TP -.I postdaisy -Diablo 1640 daisy-wheel -.TP -.I postdmd -.IR bitfile (9.5) -files, as produced by -.IR blitblt (9.1) -.TP -.I postprint -.SM -ASCII -text -.TP -.I posttek -Tektronix 4014 graphics -.PP -Except as noted, -the options are common to all the programs: -.TP \n(xxu -.BI \-c num -Print -.I num -copies of each page. -By default only one copy is printed. -.TP -.BI \-m num -Magnify each logical page by the factor -.I num. -Pages are scaled uniformly about the origin, -located near the upper left corner of -the page. -The default magnification is 1.0. -.TP -.BI \-n num -Print -.I num -logical pages on each piece of paper. -The default is 1. -.TP -.BI \-o list -Print only pages specified in -the comma-separated -.I list -of numbers and ranges. -A range -.IB N - M -means pages -.I N -through -.IR M ; -an initial -.BI - N -means -from the beginning to page -.IR N ; -and a final -.IB N - -means -from -.I N -to the end. -Print only pages whose numbers are given in the comma-separated -.IR list . -The list contains single numbers -.I N -and ranges -.IB N1 \- N2. -A missing -.I N1 -means the lowest numbered page, a missing -.I N2 -means the highest. -.TP -.BI \-p mode -Print -in -.I mode -.B p -(portrait) -or -.B l -(landscape). -The default is -.BR p . -.TP -.BI \-x num -Translate the origin -.I num -inches along the positive x axis. -By default, -the origin is -fixed near the -upper left corner of the page, with positive -x to the right and positive y down the page. -Positive -.I num -moves everything right. -The default offset is 0 inches. -.TP -.BI \-y num -Translate the origin -.I num -inches along the positive y axis. -Positive -.I num -moves text down the page. -The default offset is 0. -.TP -.BI \-A file -Append a simple accounting record to -.I file -after all input -.I files -have been successfully translated. -By default no accounting data is produced. -.TP -.BI \-L file -Use -.I file -as the PostScript prologue. -.TP -.BI \-f name -Print -.I files -using font -.I name. -Any PostScript font can be used, -but constant width fonts yield the best results. -The default font is Courier. -.RI ( postdaisy, -.IR postprint, -and -.IR posttek -only) -.TP -.BI \-f -Flip the sense of the bits in -.I files -before printing the bitmaps. -.RI ( postdmd -only) -.PP -In addition, three options allow the insertion of arbitrary PostScript -at controlled points in the translation process: -.TP \n(xxu -.BI \-C file -Copy -.I file -to the output file. -.I File -follows the prologue but -precedes any job initialization commands. -.I File -becomes part of the job's global environment -and must contain legitimate PostScript commands. -.TP -.BI \-P string -Like -.BR -C , -using a -.I string -instead of the contents of a file. -.TP -.BI \-R action -Requests special -.I action -(e.g. manualfeed) on a per page or global basis. -The -.I action -string has the general form -.IB request : page : file, -from which -.BI : page : file -or -.B : file -can be omitted. -An omitted or 0 page number -applies to all pages. -If file is omitted the request -lookup is done in -.FR /usr/lib/postscript/ps.requests . -The collection of recognized requests can be modified or extended -by changing this file. -Multiple occurrences of the -.B \-R -option behave as expected. -.SH FILES -.TF /usr/lib/font/devpost/charlib/* -.TP -.F /usr/lib/font/devpost/*.out -.TP -.F /usr/lib/font/devpost/charlib/* -.TP -.F /usr/lib/postscript/*.ps -default prologues -.TP -.F /usr/lib/tmac/tmac.pictures -.I troff -macros for PostScript -.SH SEE ALSO -.IR lp (1), -.IR postio (8) -.SH DIAGNOSTICS -Exit status 2 -usually means a syntax error in some input file. -.SH BUGS -Output files -will often violate Adobe's -file structuring conventions. -Pipe the output of -.I dpost -through -.I postreverse -to produce a minimally conforming PostScript file. -.PP -Although -.I dpost -can handle files formatted for any -.IR troff -device, emulation is expensive and -can easily double the print time and the size of the output file. -.PP -No attempt has been made to implement the character sets -or fonts available on all devices supported by -.I troff. -Missing characters are replaced by white space; -unrecognized fonts are replaced by one of the Times fonts. -.PP -.I Dpost -requires an -.B x res -command before the first -.B x init -and any file data. diff --git a/static/v10/man8/privserv.8 b/static/v10/man8/privserv.8 deleted file mode 100644 index 8029ddb4..00000000 --- a/static/v10/man8/privserv.8 +++ /dev/null @@ -1,60 +0,0 @@ -.TH PRIVSERV 8 -.SH NAME -privserv \- privilege server -.SH SYNOPSIS -.B lmask nuxl /etc/privserv -[ -.I option ... -] -.SH DESCRIPTION -.I Privserv -is the keeper and interpreter of the -.IR privs (5) -file. -.I Priv (1) -calls on -.I privserv -to hand out privileges in accordance with the rules given in -.I privs. -.I Privserv -is a permanent process, normally started by the boot script -.IR rc (8). -It receives service requests through the mounted pipe -.FR /cs/priv . -The options are -.TP -.BI -p " name -The file name of the server, -.B /etc/privserv -by default -(used to reinvoke the priv server when the -.IR privs (5) -file is modified by a -.B PRIVEDIT -request.) -.TP -.BI -m " mountpt -The file system mount point for privilege service, -.F /cs/priv -by default. -.TP -.BI -l " logfile -The file in which to record logging information, -.F /usr/adm/privlog -by default. -.TP -.BI -f " privs -The data base of privileges, -.F /etc/privs -by default. -Unless -.I privs -is itself a privileged file, -.I privserv -will not actually grant the privileges there specified. -.SH FILES -.F /etc/privs -.br -.F /cs/priv -.SH SEE ALSO -.IR priv (1) diff --git a/static/v10/man8/ps.8 b/static/v10/man8/ps.8 deleted file mode 100644 index fcab9ac7..00000000 --- a/static/v10/man8/ps.8 +++ /dev/null @@ -1,77 +0,0 @@ -.pa 1 -.he 'PS (VIII)'1/20/73'PS (VIII)' -.ti 0 -NAME ps -- process status -.sp -.ti 0 -SYNOPSIS /usr/adm/ps [ -xlt____ ] -.sp -.ti 0 -DESCRIPTION -.br -.in 8 -ps__ -prints certain facts about active -processes. -The information is columnar and consists of: - -.in +3 -The (numerical) ID of the user associated -with the process; - -The last character of the control typewriter of the process -or "x" if there is no control typewriter; -"x" lines are suppressed unless the "x" option -is given. - -The number of 512-byte disk blocks holding the core -image of the process; - -The process's unique ID (only with "l" option) - -The number of hours (mod 100) and minutes of system, disk, and -user-process time accumulated by the process and -all its terminated descendants (only with "t" option) - -An educated guess as to the command line which caused the -process to be created. - -.in -3 -Some caveats: - -The guess as to the command name and arguments is obtained by examining -the process's stack. -The process is entitled to destroy this information. -Also, only processes whose core images are on disk have -visible names. -The ps__ command in particular -does not, nor does any other process which happens to -be in core at the same time. -ps__ tries to overcome this limitation by spawning -a subprocess designed to take up the other core -slot, and is usually successful. -Because ps__ examines a dynamically changing data structure, -it can produce incorrect results, for example if -a process's core image moves between the time -ps__ gets its disk address and reads its stack. - -Besides its utility for simple spying, -ps__ is the only plausible -way to find the process number of someone you are trying -to kill (VIII). -.sp -.in 16 -.ti 0 -FILES /dev/rf0, -/sys/sys/unix (to get magic numbers). -.sp -.ti 0 -SEE ALSO kill (VIII) -.sp -.ti 0 -DIAGNOSTICS "Bad RF", if -a bad swap address turns up; -various missing-file diagnostics. -.sp -.ti 0 -BUGS As described. diff --git a/static/v10/man8/pstat.8 b/static/v10/man8/pstat.8 deleted file mode 100644 index 61942bbf..00000000 --- a/static/v10/man8/pstat.8 +++ /dev/null @@ -1,418 +0,0 @@ -.TH PSTAT 8 -.CT 1 sa_mortals -.SH NAME -pstat \- print system facts -.SH SYNOPSIS -.B /etc/pstat -[ -.B \-afipstuxT -] -[ -.I suboptions -] -[ -.I file -] -[ -.I namelist -] -.SH DESCRIPTION -.I Pstat -interprets the contents of certain system tables. -If -.I file -is given, the tables are sought there, otherwise -in -.FR /dev/kmem . -The required namelist is taken from -.IR namelist , -default -.FR /unix . -Options are -.TP -.B -a -Under -.BR -p , -describe all process slots rather than just active ones. -.TP -.B -i -Print the inode table with the these headings: -.RS -.PD 0 -.TF SIGNAL -.TP -.B LOC -The core location of this table entry. -.TP -.B FLAGS -Miscellaneous state variables encoded thus: -.RS -.TP -.B L -locked -.TP -.B U -modified time -.RI ( filsys (5)) -must be corrected -.TP -.B A -access time must be corrected -.TP -.B O -file was opened -.TP -.B W -wanted by another process -.RB ( L -flag is on) -.TP -.B T -contains an active text -.RE -.TP -.B CNT -Number of active references to this inode. -.TP -.B FS -File system type, see -.IR fmount (2). -.TP -.B DEVICE -Device number of file system in which -this inode resides. -.TP -.B INO -I-number within the file system. -.TP -.B MODE -Mode, see -.IR stat (2). -.TP -.B NLN -Number of links to this inode. -.TP -.B UID -Userid of owner. -.TP -.B SPTR -Core location of corresponding stream header, -0 if this is not a stream. -.TP -.B SIZ/DEV -Number of bytes in an ordinary file, or -device number of a special file. -.TP -.B MROOT -Core location of root inode -of file system mounted here, -0 if none. -.PD -.RE -.TP 0 -.B -x -Print the text table with these headings: -.PD 0 -.RS -.TF SIGNAL -.TP -.B LOC -The core location of this table entry. -.TP -.B FLAGS -Miscellaneous state variables encoded thus: -.RS -.TP -.B P -resulted from demand-page-from-inode exec format, see -.IR exec (2) -.TP -.B T -traced through -.IR proc (4) -.TP -.B W -text not yet written to swap device -.TP -.B L -loading in progress -.TP -.B K -locked -.TP -.B w -wanted -.RB ( L -flag is on) -.RE -.TP -.B DADDR -Disk address in swap, in multiples of 512 bytes. -.TP -.B CADDR -Head of a linked list of loaded processes using this text segment. -.TP -.B RSS -Size of physical memory occupied -by text segment, -in multiples of 512 bytes. -.TP -.B SIZE -Size of text segment, in multiples of 512 bytes. -.TP -.B IPTR -Core location of corresponding inode. -.TP -.B CNT -Number of processes using this text segment. -.TP -.B CCNT -Number of processes in core using this text segment. -.PD -.RE -.TP 0 -.B -p -Print process table for active processes with these headings: -.RS -.TP -.B LOC -The core location of this table entry. -.PD 0 -.TF SIGNAL -.TP -.B S -Run state encoded thus: -.RS -.TP -.B 0 -no process -.TP -.B 1 -waiting for some event -.TP -.B 3 -runnable -.TP -.B 4 -being created -.TP -.B 5 -being terminated -.TP -.B 6 -stopped under trace -.RE -.TP -.B F -Miscellaneous state variables, or-ed together (hexadecimal): -.RS -.TF SIGNAL -.TP -.B 0000001 -loaded in memory -.TP -.B 0000002 -special system process (swapper or pager) -.TP -.B 0000004 -being swapped out -.TP -.B 0000008 -obscure swapout flag -.TP -.B 0000010 -traced -.TP -.B 0000020 -used in tracing -.TP -.B 0000040 -locked in core -.TP -.B 0000080 -waiting for pagein -.TP -.B 0000100 -prevented from swapping during -.IR fork (2) -.TP -.B 0000200 -gathering pages for raw i/o -.TP -.B 0000400 -exiting -.TP -.B 0008000 -associated text is demand paged from file -.TP -.B 0030000 -anomalous paging behaviour expected, -see -.IR vlimit -in -.IR deprecated (2) -.TP -.B 0040000 -in a sleep which will time out -.TP -.B 0400000 -in -.IR select (2) -.TP -.B 0800000 -traced via -.IR proc (4) -.TP -.B 1000000 -i/o via -.IR proc -in progress -.TP -.B 2000000 -stop on exec -.TP -.B 4000000 -wanted by -.I proc -after pagein -.RE -.TF SIGNAL -.TP -.B ADDR -The core location of the page table entry for the first page of the `u-area.' -.TP -.B PRI -Scheduling priority; -smaller numbers run first. -.TP -.B SIG -Signals received; signals 1-32 coded in bits 0-31. -.TP -.B UID -Real userid. -.TP -.B SLP -Time blocked in seconds; -times over 127 coded as 127. -.TP -.B TIM -Time resident in seconds; -times over 127 coded as 127. -.TP -.B CPU -Weighted integral of CPU time, for scheduler. -.TP -.B NI -Nice level, -see -.IR nice (2). -.TP -.B PGRP -Process group number. -.TP -.B PID -Process ID number. -.TP -.B PPID -Process ID of parent process. -.TP -.B RSS -Number of physical page frames allocated -to this process. -.TP -.B SRSS -RSS at last swap, 0 if never swapped. -.TP -.B SIZE -Virtual size of process image (data+stack) in multiples of 512 bytes. -.TP -.B WCHAN -Event address if waiting. -.TP -.B LINK -Pointer to next entry in list of runnable processes. -.TP -.B TEXTP -If text is pure, pointer to location of text table entry. -.TP -.B CLKT -Countdown for -.IR alarm (2) -measured in seconds. -.PD -.RE -.TP 0 -.B -u -Print information about a user process; -the next argument is its address as given -by -.L ADDR -under -.B -p -above. -The process must be in main memory, or the file used can -be a core image -.RI ( core (5)) -and the address 0. -.TP -.B -f -Print the open file table with these headings: -.PD0 -.RS -.TF SIGNAL -.TP -.B LOC -The core location of this table entry. -.PD 0 -.TP -.B FLG -Miscellaneous state variables encoded thus: -.RS -.TP -.B R -open for reading -.TP -.B W -open for writing -.RE -.TP -.B CNT -Number of processes that know this open file. -.TP -.B INO -The core location of the inode table entry for this file. -.TP -.B OFFS -The file offset, see -.IR lseek (2). -.PD -.RE -.TP 0 -.B -s -Print information about swap space usage: -the number of 1024 byte pages used -and free, -and the number of pages belonging -to text images. -.TP -.B -T -Print the number of used and free slots in several system tables; -useful to see if they are nearly full. -.SH FILES -.TF /dev/kmem -.TP -.F /unix -namelist -.TP -.F /dev/kmem -default source of tables -.SH SEE ALSO -.IR ps (1), -.IR stat (2), -.IR filsys (5) -.br -M. J. Bach, -.IR "The Design of the UNIX Operating System" , -Prentice-Hall, 1986 -.SH BUGS -This program is never up to date. diff --git a/static/v10/man8/pwserv.8 b/static/v10/man8/pwserv.8 deleted file mode 100644 index bb7fb90e..00000000 --- a/static/v10/man8/pwserv.8 +++ /dev/null @@ -1,77 +0,0 @@ -.TH PWSERV 8 -.CT 1 sa_auto -.SH NAME -pwserv \- password verification service -.SH SYNOPSIS -.B /etc/pwserv -.SH DESCRIPTION -.I Pwserv, -normally started from -.IR rc (8), -handles password verification requests initiated by (say) -.IR pwquery (3) -through the conventional -process mount point -.FR /cs/pw . -When a request is made a file descriptor (called the `line' below) -is passed to -.I pwserv -together with a user name and an optional parameter string. -Normally, -.I pwserv -writes a prompt on the line, reads a reply, and returns -an indication of success to the invoking client. -Valid passwords are taken from the file -.FR /etc/pwfile , -which lists for each user an ordinary (encrypted, -.IR crypt (3)-style) -password and an -SNK (Secure Net Key) challenge-response key. -Before prompting, an -.B FIOPX -IO control is attempted to render the line to the end user private; -see -.IR pex (4). -If this succeeds -either a classical or an Atalla password is accepted. -If the pex bid fails, the prompt warns that the line -is not private, and only an SNK response is accepted. -.PP -In the pexed case the prompt looks like -.B Password(pjw:31416): -and in the unpexed case like -.B "Password(TAPPED LINE:01492): -The five digit string after the colon is the Atalla challenge string. -Only the first five digits of the Atalla response string are significant. -Hex digits in the response must be typed in lower case. -.PP -Possible values of the optional parameter string are -.TP -.B pex -(specified by opening the server with -.B ipcopen("/cs/pw!pex") ) -Accept passwords only if the -.B FIOPX -succeeds. -.PP -When the line's stream identifier asserts previous confirmation -of the same password, -.I pwserv -answers affirmatively without demanding a password; see -.IR session (1) -and -.IR src (5). -.SH FILES -.nf -.F /etc/pwserv -.F /etc/pwfile -.fi -.SH "SEE ALSO" -.IR pwquery (3), -.IR ipc (3), -.IR pex (4), -.IR stream (4), -.IR pwfile (5), -.IR passwd (1) -.SH BUGS -Jammable. diff --git a/static/v10/man8/quot.8 b/static/v10/man8/quot.8 deleted file mode 100644 index dca6bbad..00000000 --- a/static/v10/man8/quot.8 +++ /dev/null @@ -1,135 +0,0 @@ -.TH QUOT 8 -.CT 1 sa_mortals -.SH NAME -quot, findo \- file system usage and hogs -.SH SYNOPSIS -.B /etc/quot -[ -.I option ... -] -[ -.I filesystem -] -.PP -.BI findo -[ -.B -f -] -[ -.B -n -] -[ -.B -u -.I userid -] -.I device mount-directory -.SH DESCRIPTION -.I Quot -prints the number of blocks in the named -.I filesystem -device currently owned by each user. -If no -.I filesystem -is named, -.F /dev/usr -is assumed. -The options are: -.TP -.B -n -Use as in the example below to list all files and owners. -.TP -.B -c -Print three columns giving file size in blocks, number of -files of that size, and cumulative total of blocks -in files of that size or smaller. -.TP -.B -f -Print count of number of files as well as space owned by each user. -.TP -.B -b -Print space-time product in block-years in addition to space owned by -each user. -.PP -.I Findo -discovers files you might want to delete on the -given block -.I device, -which must be mounted on the given directory. -It lists, on the standard output, the -sizes, ages in days, and names of files -with any of the following characteristics: -.IP - -.IR Troff (1) -output files older than 24 hours. -The names are marked -.L troff: -in the output. -.IP - -Week-old files named -.BR core , -.BR a.out , -.BR mon.out , -.BR .pilog , -.BR junk* , -.BR temp* , -.BR ed.hup , -.BR qed.hup:* , -.BR jim.recover , -.BR sam.save , -.BR sam.err , -.BR ~~sam~~ , -.BR [a-z] , -.BR dead.letter , -.BR foo[0-9]* , -.BR rst[0-9]+ , -.BR .jx* , -.BR *.dvi , -and files whose names -resemble -.IR apnews (7) -spool entries. -.IP - -Files over a month old named -.BR *.o . -The names are marked -.LR old: . -.IP - -Files owned by users selected with option -.BR -u ; -the names are marked -.LR user: . -.PP -The options are -.TP -.B -f -List files owned by users not in the password file. -.TP -.BI -u " userid -List files over 2 days old owned by the user with the given numeric -.I userid. -.TP -.B -n -List files of any age owned by the specified users. -.SH EXAMPLES -.TP -.L -ncheck filesystem | sort -n | quot -n filesystem -List all files and their owners. -.SH FILES -.F /etc/passwd -to get user names -.SH "SEE ALSO" -.IR ls (1), -.IR du (1), -.IR icheck (8), -.IR fstab (5) -.SH BUGS -.I Quot -counts holes in files as if they actually occupied space. -.br -Patterns specifying the names and ages are compiled into -.I findo. -.br -.I Findo's -age distinction for files owned by a specific user is a -historical dreg. diff --git a/static/v10/man8/rarepl.8 b/static/v10/man8/rarepl.8 deleted file mode 100644 index 5d9fabef..00000000 --- a/static/v10/man8/rarepl.8 +++ /dev/null @@ -1,115 +0,0 @@ -.TH RAREPL 8 -.CT 1 sa_nonmortals -.SH NAME -rarepl, rarct \- replace bad blocks on MSCP disks -.SH SYNOPSIS -.B /etc/rarct -[ -.B -c -] -[ -.B -h -] -.I special ... -.PP -.B /etc/rarepl -.I special -.I lbn ... -.SH DESCRIPTION -.I Rarct -prints status information -about MSCP disk drives -like the RA60 and RA81. -Normally the replacement table (RCT) -is listed, -as lines of the form -.IP -.IB rbn : \0flags : \0lbn -.PP -where -.I rbn -is the replacement block number, -.I lbn -is the logical block number -replaced by -.IR rbn , -and -.I flags -are constructed from the following bits: -.TP -.PD 0 -.B 01 -alternate (not primary) replacement block -.TP -.B 02 -normal, allocated replacement block -.TP -.B 04 -this replacement block is bad -.TP -.B 010 -this replacement block does not exist -.PD -.PP -Entries whose -.I flags -are zero, -indicating a good, -unused replacement block, -are not listed. -.PP -The options suppress the RCT listing and perform other functions: -.TP -.B -h -Print some header data -from the first block of the RCT. -The system does not use this information. -.TP -.B -c -Print geometry information for the drive. -.PP -.I Rarepl -causes logical block -.I lbn -on device -.I dev -to be marked as bad -and replaced. -The nearest available replacement block -is used. -The contents of -.I lbn -are copied into the replacement block if possible; -if -.I lbn -is unreadable, -the replacement block -is initialized with zeros. -.PP -Both programs -work only -on the raw devices. -.I Rarepl -should be used only -on a device -which covers the entire drive -(usually partition 7). -.SH SEE ALSO -.IR ra (4), -.IR smash (8) -.SH BUGS -There are various controller- and drive-dependent anomalies. -Some controllers, -like the RQDX3, -report an RCT -but don't allow forwarding. -On many controllers, -the RCT exists -only so programs in the host can look at it; -the controller ignores its contents. -There is no way to read the controller's `real' forwarding data, -only a way to set it for a particular block. -Hence if the RCT is corrupted, -the disk may still be used, -but must be reformatted -before additional bad blocks are remapped. diff --git a/static/v10/man8/rc.8 b/static/v10/man8/rc.8 deleted file mode 100644 index f46cff12..00000000 --- a/static/v10/man8/rc.8 +++ /dev/null @@ -1,77 +0,0 @@ -.TH RC 8 -.CT 1 sa_auto -.SH NAME -rc \- boot script -.SH SYNOPSIS -.B /etc/rc -.SH DESCRIPTION -.I Rc -is the command script -invoked by -.IR init (8) -to control reboots. -During an automatic reboot, -.I rc -is invoked with the argument -.BR autoboot ; -typically this invokes -.L /etc/fsck -p -to repair minor filesystem inconsistencies. -If -.I rc -exits with a successful status, -.I init -proceeds to multi-user mode. -.PP -When the system enters multi-user mode, -either during an auto-reboot -or after the single-user shell terminates, -.I rc -is invoked without arguments. -This usually causes it to -mount filesystems, -start daemons, -clear -.FR /tmp , -and perform other housekeeping. -.PP -If any call to -.I rc -returns a nonzero status, -.I init -reverts to single-user mode. -.SH EXAMPLES -A typical -.I rc -script: -.PP -.EX -date -case $1 in -autoboot) - echo Autoboot: - /etc/fsck -p || {echo "error in reboot"; exit 1} -esac -/etc/ldpcs /etc/pcs750.bin ->/etc/mtab -/etc/mount -a -/etc/savecore /tmp/dump /dev/ra11 -/etc/swapon -a -trap "" 1 2 3 -/etc/update -/etc/cron & -rm -f /tmp/* -/usr/lib/asd/rmlocks -date >> /usr/adm/lastboot -/etc/accton /tmp/acct > /tmp/acct -/usr/ipc/mgrs/svcmgr -/etc/kdiload -/usr/ipc/mgrs/dkhup; sleep 10 -/usr/ipc/mgrs/dkmgr -/usr/netb/setup.go -/usr/net/face.go -wwv -s -.EE -.SH SEE ALSO -.IR init (8), -.IR reboot (8) diff --git a/static/v10/man8/reboot.8 b/static/v10/man8/reboot.8 deleted file mode 100644 index 50e1c453..00000000 --- a/static/v10/man8/reboot.8 +++ /dev/null @@ -1,127 +0,0 @@ -.TH REBOOT 8 -.CT 1 sa_auto -.SH NAME -reboot \- bootstrapping procedures -.SH DESCRIPTION -.PP -Here are some recipes for booting and crashing the operating system -on VAXes. -.SS Rebooting a running system -The preferred way to reboot is to log in on the console as super-user, -invoke -.B kill 1 -to take the system to single user, -unmount file systems with -.B /etc/umount -a -and halt and restart the system -as described below under `Console boots.' -.SS Power fail and crash recovery -The system will reboot itself at power-up or after crashes if -auto-boot is enabled on the machine front panel -or in the console software. -If auto-restart is enabled, -the system will first attempt to save a copy of physical memory -on a reserved piece of disk. -An automatic consistency check of the file systems is performed. -Unless this fails the system will resume multi-user operations. -.SS Console boots -Sync the disks if necessary and possible. -To recover hardware control of the console, type a -.RB control- P . -This will yield a -.L >>> -prompt from the VAX -console subsystem (sic). -The command -.IP -.B >>> H -.LP -will halt the CPU -(except on the 11/750, -where -.RB control- P -halts the CPU right away). -.PP -On MicroVAXes, -.RB control- P -doesn't work; -hit the -.SM BREAK -key instead. -.PP -To boot multi-user with an automatic file system check, -give the console command -.IP -.B >>> B -.LP -Commands to boot single-user vary. -On the VAX-11/750 and on MicroVAXes, -use -.IP -.B >>> B/3 -.LP -On the VAX-11/780 and VAX 8550 and 8700, -use -.IP -.B >>> B MAN -.LP -This will prompt with -.LR * -for the name of the file to boot. -The filename should be an executable image -in the root directory -of the filesystem at the beginning of the disk. -.SS System core images -If the system crashes -and auto-restart is enabled, -a copy of physical memory is written -to a reserved piece of disk. -To save a core image of a hung system, type on the console (after -.RB control- P -if necessary): -.IP -.EX ->>> S 80000010 -.EE -.PP -The system will write the core image, -then reboot automatically. -.PP -If the core image was written on -.LR /dev/ra11 , -the following incantation will print a stack traceback -from the time of the crash: -.IP -.EX -adb /unix /dev/ra11 -$<crash -$c -.EE -.PP -To save disk space, -the core image is sometimes overlaid on part of the swap area, -where normal system operation will soon overwrite it. -.IR Savecore (8) -will copy the core image -to an ordinary disk file. -.SH FILES -.TP -.F /unix -default system binary -.SH "SEE ALSO" -.IR fsck (8), -.IR init (8), -.IR rc (8), -.IR savecore (8) -.SH BUGS -Older boot programs with different syntax are still around in a few places, -especially on machines with Emulex UNIBUS disk controllers, -for which silly boot ROMs are common. -.PP -There are commands -.B /etc/reboot -and -.B /etc/halt -which attempt to reboot and halt the system; -their function is indeterminate -and likely to change. diff --git a/static/v10/man8/recnews.8 b/static/v10/man8/recnews.8 deleted file mode 100644 index 59a707ef..00000000 --- a/static/v10/man8/recnews.8 +++ /dev/null @@ -1,24 +0,0 @@ -.TH RECNEWS 8 -.SH NAME -recnews \- receive unprocessed articles via mail -.SH SYNOPSIS -.BR /usr/lib/news/recnews " [ " -.IR newsgroup " [ " sender " ] ] " -.SH DESCRIPTION -.I Recnews -reads a letter from the standard input; determines the article title, -sender, and newsgroup; and gives the body to inews with the right -arguments for insertion. -.PP -If -.I newsgroup -is omitted, the to line of the letter will be used. If -.I sender -is omitted, the sender will be determined from the from line of the letter. -The title is determined from the subject line. -.SH SEE ALSO -inews(1), -uurec(8), -sendnews(8), -readnews(1), -checknews(1) diff --git a/static/v10/man8/reloc.8 b/static/v10/man8/reloc.8 deleted file mode 100644 index a34054c6..00000000 --- a/static/v10/man8/reloc.8 +++ /dev/null @@ -1,45 +0,0 @@ -.th RELOC VIII 2/7/73 -.sh NAME -reloc \*- relocate object files -.sh SYNOPSIS -.bd reloc -file octal [ -.bd \*- -] -.sh DESCRIPTION -.it Reloc -modifies the named object program file so that it will operate correctly -at a different core origin than the one for which -it was assembled or loaded. -.s3 -The new core origin is the old origin -increased by -the given -.it octal -number (or decreased if the number has a `\*-' sign). -.s3 -If the object file was generated by -.it ld, -the -.bd \*-r -and -.bd \*-d -options must have been given to -preserve the relocation information and define any common symbols -in the file. -.s3 -If the optional last argument is given, then any -.it setd -instruction at the start of the file -will be replaced by a no-op. -.s3 -The purpose of this command is to simplify the -preparation of object programs for systems -which have no relocation hardware. -It is hard to imagine a situation -in which it would be useful to attempt directly to execute -a program treated by -.it reloc. -.sh "SEE ALSO" -as(I), ld(I), a.out(V) -.sh BUGS diff --git a/static/v10/man8/renice.8 b/static/v10/man8/renice.8 deleted file mode 100644 index 0f08f491..00000000 --- a/static/v10/man8/renice.8 +++ /dev/null @@ -1,31 +0,0 @@ -.TH RENICE 8 -.CT 1 sa_nonmortals -.SH NAME -renice \- change priority of running process -.SH SYNOPSIS -.B /etc/renice -[ -.BI - priority -] -.I pid ... -.SH DESCRIPTION -.I Renice -increments the scheduling priority -of the processes with the named -.I process-ids -by -.IR pri . -The default -.IR pri -is 19, -making the process least likely to run. -.PP -Only the owner of the process -or the super-user may change the priority. -Only the super-user may use negative increments. -.SH FILES -.BI /proc -.SH SEE ALSO -.IR nice (1), -.IR nice (2), -.IR proc (4) diff --git a/static/v10/man8/restor.8 b/static/v10/man8/restor.8 deleted file mode 100644 index 359164a1..00000000 --- a/static/v10/man8/restor.8 +++ /dev/null @@ -1,112 +0,0 @@ -.th RESTOR VIII 11/24/73 -.sh NAME -restor \*- incremental file system restore -.sh SYNOPSIS -.bd restor -key [ arguments ] -.sh DESCRIPTION -.it Restor -is used to read magtapes dumped with the -.it dump -command. -The -.it key -argument specifies what is to be done. -.it Key -is a character from the set -.bd trxw. -.s3 -.lp +5 3 -\fBt\fR The date that the tape was made and the date that -was specified in the -.it dump -command are printed. -A list of all of the i-numbers on the tape -are also given. -.s3 -.lp +5 3 -\fBr\fR The tape -is read and loaded into the file system -specified in -.it arguments. -This should not be done lightly (see below). -.s3 -.lp +5 3 -\fBx\fR Each file on the -tape is individually extracted into -a file whose name is the file's i-number. -If -there are -.it arguments, -they are interpreted as i-numbers and only they are -extracted. -.s3 -.lp +5 3 -\fBw\fR In conjunction with the -.bd x -option, -before each file is extracted, -its i-number is typed out. -To extract this file, -you must respond with -.bd y. -.s3 -.i0 -The -.bd r -option should only be used to restore -a complete dump tape onto a clear file system -or to restore an incremental dump tape onto this. -Thus -.s3 - /etc/mkfs /dev/rp0 40600 -.br - restor r /dev/rp0 -.s3 -is a typical sequence to restore a complete dump. -Another -.it restor -can be done to get an incremental dump -in on top of this. -.s3 -A -.it dump -followed by a -.it mkfs -and a -.it restor -is used to -change the size of a file system. -.sh FILES -/dev/mt0 -.sh "SEE ALSO" -dump, mkfs, check, clri (VIII) -.sh DIAGNOSTICS -There are various diagnostics -involved with reading the tape and writing the disk. -There are also diagnostics if the i-list or the free list -of the file system is not large enough to hold the dump. -.sh BUGS -There is redundant information on the tape -that could be used in case of tape reading problems. -Unfortunately, -.it restor's -approach is to exit if anything is wrong. -.s3 -Files that have been deleted are -not removed when incremental tapes are loaded. -It will be necessary to -.it check -the restored file system and -.it clri -any files that show up with -a 201 delta diagnostic. -.s3 -The current version of -.it restor -does not free space occupied -by files that are overwritten. -Thus a -.it check -will have to be performed to reclain the missing -space. diff --git a/static/v10/man8/route.8 b/static/v10/man8/route.8 deleted file mode 100644 index 1f99f156..00000000 --- a/static/v10/man8/route.8 +++ /dev/null @@ -1,95 +0,0 @@ -.TH ROUTE 8 -.CT 1 sa_auto -.SH NAME -route, routed, remroutes \- IP gateway routing -.SH SYNOPSIS -.B /usr/ipc/mgrs/routed -[ -.B -v -] [ -.B -t -] [ -.B -q -] [ -.BI - hops -] [ -.I addr ... -] -.br -.B route add -.I "dest gateway" -.br -.B route delete -.I "dest" -.B -.br -.B /etc/remroutes -.br -.SH DESCRIPTION -.I Routed -runs the 4BSD RIP routing protocol on an IP network. -It broadcasts routing information to the network at large, -listens for routing messages from elsewhere, -and informs the system of the routes it receives. -.PP -The options are -.TP -.BI \-v -Log transmitted messages on the standard output. -.TP -.BI \-t -Log received messages on the standard output. -.TP -.BI \-q -Accept routing information but do not broadcast any. -.TP -.BI \- hops -Add -.I hops -(a decimal number) -to the hop count -when broadcasting routes. -.PD -.LP -Information received for any named -.I addrs -is ignored. -.PP -.I Routed -is usually run without options on gateway machines, -and with the -.B -q -option on non-gateway machines. -.PP -.I Route -sets up specific routes, -to establish static routing -or to adjust that set up by -.IR routed . -The -.B add -command informs the system that -internet address -.I dest -may be reached through -internet address -.IR gateway ; -.B delete -removes any routing for -.IR dest . -The special -destination -.L * -represents the default routing: -.B route add * -.I gate -sets the default, -.B route delete * -removes any default. -.PP -.I Remroutes -removes all known routes. -.SH FILES -.F /usr/ipc/log/routed -.SH "SEE ALSO" -.IR ipconfig (8) diff --git a/static/v10/man8/sa.8 b/static/v10/man8/sa.8 deleted file mode 100644 index 45c77ec9..00000000 --- a/static/v10/man8/sa.8 +++ /dev/null @@ -1,185 +0,0 @@ -.TH SA 8 -.CT 1 sa_nonmortals -.SH NAME -sa, accton \- system accounting -.SH SYNOPSIS -.B /etc/sa -[ -.B -abcdDfgijkKlnrstuv -] -[ -.B -e prefix -] -[ -.I file -] -.PP -.B /etc/accton -[ -.I file -] -.SH DESCRIPTION -With an argument naming an existing -.I file, -.I accton -causes system accounting information for -every process executed to be placed at the end of the file. -If no argument is given, accounting is turned off. -.PP -.I Sa -reports on, cleans up, and generally maintains -accounting files. -.PP -.I Sa -is able to condense -the information in -.F /usr/adm/acct -into a summary file -.F /usr/adm/savacct -which contains a count of the -number of times each command was called and the time resources -consumed. -This condensation is desirable because on a large system -.F /usr/adm/acct -can grow by 10000 blocks per day. -The summary file is normally read before the accounting file, -so the reports include all available information. -.PP -If a file name is given as the last argument, -that file will be treated -as the accounting file; -.F /usr/adm/acct -is the default. -.PP -Output fields are labeled: -.L cpu -for the sum of user and system times -(in minutes), -.L re -for real time (also in minutes), -.L k -for cpu-time averaged core usage (in 1K units), -.L avio -for average number of IO operations per execution. -With options fields labelled -.L tio -for total IO operations, -.L k*sec -for cpu storage integral (kilo-core seconds), -.L u -and -.L s -for user and system cpu time alone (both in minutes) will sometimes -appear. -.PP -There are zillions of options: -.TP -.B a -Place all command names containing unprintable characters -and those used only once under the name -.LR ***other . -.TP -.B b -Sort output by sum of user and system time divided by number of -calls. -Default sort is by sum of user and system times. -.TP -.B c -Besides total user, system, and real time for each command print percentage -of total time over all commands. -.TP -.B d -Sort by average number of disk IO operations. -.TP -.B D -Sort by total number of disk IO operations. -.TP -.B e -Set the prefix for accounting file names to the next argument -.RB ( /usr/adm/ -is the default). -.TP -.B f -Assume answer -.L y -for option -.BR -v . -.TP -.B g -Ignore -.BR /usr/adm/acct . -Useful for processing only -.L savacct -and -.LR usracct . -.TP -.B i -Don't read in summary file. -.TP -.B j -Instead of total minutes time for each category, -give seconds per call. -.TP -.B k -Sort by cpu-time average memory usage. -.TP -.B K -Print and sort by cpu-storage integral. -.TP -.B l -Separate system and user time; normally they are combined. -.TP -.B m -(money) Print number of processes and number of CPU minutes for each user. -.TP -.B n -Sort by number of calls. -.TP -.B r -Reverse order of sort. -.TP -.B s -Merge accounting file into summary file -.F /usr/adm/savacct -when done. -.TP -.B t -For each command report ratio of real time to the sum of user and -system times. -.TP -.B u -Superseding all other flags, -print for each command in the accounting file the -userid and command name. -.TP -.B v -Followed by a number -.I n, -types the name of -each command used -.I n -times or fewer. -Await a reply from the terminal; -if it begins with -.LR y , -add the command to -the category -.LR **junk** . -This is used to strip out garbage. -.SH FILES -.TF /usr/adm/usracct -.TP -.F /usr/adm/acct -raw accounting -.TP -.F /usr/adm/savacct -summary -.TP -.F /usr/adm/usracct -per-user summary -.SH "SEE ALSO" -.IR ac (8), -.IR acct (2) -.SH BUGS -.I Sa -needs more options. diff --git a/static/v10/man8/salv.8 b/static/v10/man8/salv.8 deleted file mode 100644 index cf9d808f..00000000 --- a/static/v10/man8/salv.8 +++ /dev/null @@ -1,86 +0,0 @@ -.pa 1 -.he 'SALV (VIII)'1/20/73'SALV (VIII)' -.ti 0 -NAME salv -- file system salvage -.sp -.ti 0 -SYNOPSIS /etc/salv_________ filesystem [ -akfs_____ ] -.sp -.ti 0 -DESCRIPTION -.br -.in 8 -salv____ -will place a given file system -in a consistent state with -almost no loss of information. -This is the first step in putting things -together after a bad crash. -Salv performs the following functions: -.sp -.in +3 -A valid free list is constructed. - -.in -3 -The previous step is always performed; the following steps -are performed only if the "a" option is given. -If the file system's only defect is missing blocks, -"a" should not be specified. -.in +3 -.sp -All bad pointers in the file system are zeroed. -.sp -All duplicate pointers to the same block -are resolved by changing one of the pointers -to point at a new block containing a copy of the data. -.sp -Inodes (not directory entries) for special files -are generated (mode 16). - -Files whose size is too large for the number of -blocks they contain (after bad pointers are zeroed) -have their size revised downward. - -.in -3 -The file system should be unmounted while it is -being salvaged. -In cases of extreme need the permanently mounted -file system may be salvaged; in such a case -the system must be rebooted before it -has a chance to write out the old, bad super-block. - -The "k", "f", and "s" options -tell salv what magic numbers to use to generate -the size of the free list and the i-node map. -"k" is default (RK disk); "f" is RF; "s" is RK with -swap space on it. -If salv is to be used away -from the mother system its code should be cheked -to verify the numbers. -.sp -After a salv, files may be safely created -and removed without causing -more trouble. -If the "a" option had to be used, -a dcheck (VIII) should be done to find the degree -of the damage to the hierarchy. -.sp -.in 16 -.ti 0 -FILES /dev/rk0 -.sp -.ti 0 -SEE ALSO check(I), ds(I) -.sp -.ti 0 -DIAGNOSTICS -- -.sp -.ti 0 -BUGS In -only one (known) way does salv____ destroy information: -if some random block appears to be an indirect block -for a file, -all "bad pointers" (for example, ASCII text) in it -will be zeroed. If -the block also appears in another file, it may be -scribbled on before it is copied. diff --git a/static/v10/man8/savecore.8 b/static/v10/man8/savecore.8 deleted file mode 100644 index 37ace4af..00000000 --- a/static/v10/man8/savecore.8 +++ /dev/null @@ -1,83 +0,0 @@ -.TH SAVECORE 8 -.CT 1 sa_auto -.SH NAME -savecore \- save a core image of the operating system -.SH SYNOPSIS -.B /etc/savecore -.I target -.I dump -.SH DESCRIPTION -.I Savecore -copies the core image -saved after an operating system crash -to an ordinary file. -This is worth doing -so that the crash image will not be overwritten -immediately by another crash, -or sometimes because the crash image was written -in a place where normal system operation will overwrite it -(e.g. in the swap area). -.PP -The crash image is taken from -.I dump -and written to -.IR target . -If -.I target -exists and is a directory, -the image is copied to -a file in that directory -with the first nonexistent name -in the sequence -.BR "z.0 z.1 z.2 ..." ; -otherwise -.I target -is created or overwritten. -.PP -The crash image to be copied -is checked for a magic number -in a known location. -If the magic number is correct, -it is followed by the size of the image, -and the time it was written; -these numbers are printed -before the dump is copied. -If the magic number is wrong, -the image is not copied. -.I Savecore -overwrites the magic number in -.I dump -after a successful copy. -.PP -The program runs faster -if -.I dump -is the raw device. -.PP -For compatibility with an older program of the same name, -the -.I dump -argument may be omitted; -.I savecore -will noisily examine each device specified for swapping in -.IR fstab (5) -and each of several popular default swap devices -for a valid magic number. -The first device that looks right -is taken to be the crash image. -.PP -.I Savecore -is usually called when the system is booted, -from -.IR rc (8). -.SH EXAMPLE -.EX -/etc/savecore /tmp/dump /dev/rra11 -.EE -.SH SEE ALSO -.IR reboot (8) -.SH BUGS -The argument convention -(the file to be written comes first) -is unfortunate; -it stems from compatibility. diff --git a/static/v10/man8/scsish.8 b/static/v10/man8/scsish.8 deleted file mode 100644 index b1c9b08a..00000000 --- a/static/v10/man8/scsish.8 +++ /dev/null @@ -1,222 +0,0 @@ -.TH SCSISH 8 -.CT 1 sa_nonmortals -.SH NAME -scsish \- SCSI shell -.SH SYNOPSIS -.B /usr/lib/worm/scsish -.SH DESCRIPTION -.I Scsish -is a command interpreter for SCSI commands executed through -.B /dev/scsi -(see -.IR scsi (4)). -Many commands are applicable to more or less all SCSI devices; -some are specific to the SONY WDA-3000-10 optical disk jukebox. -Any details not found here are in the manual for the jukebox. -.PP -Typically commands are sent to a particular drive -(a number between 0 and 7 inclusive) -on a particular device -(normally a number between 0 and 5 inclusive). -Most commands take a drive parameter (a number). -The device number is set by the -.B id -command. -.PP -Occasionally, commands fail and will print the result of a -.B sense -command which is normally needed to clear the error status. -.PP -All input is in lower case and keywords and numbers are separated by white space. -Commands are separated by a newline or semicolon. -.SS "General SCSI Commands" -.TF "disk eject drive" -.TP -.BI capacity " drive" -Report the capacity of -.I drive -as -.BR "nblocks x blocksize" . -.TP -.BI "disk eject" " drive" -Eject the disk -(or other removable medium) -from -.IR drive . -.TP -.BI echo " number" -Print -.I number -on standard output. -.TP -.B help -Print a summary of the available commands. -.TP -.BI id " n" -Set the destination SCSI bus device number. -By default, it is 2 which is the normal device number for the SONY jukebox. -.TP -.BI inquiry " drive" -Print various bits of status about -.IR drive . -For example, -.IP -.EX -drive 2,0: WORM device, ' SONY WDA-3000-10 2.D' - disk,write protect,,,ready (0x9) -.EE -.IP -If -.I drive -is omitted, an inquiry is performed for drives 0 through 7. -.TP -.BI read " drive block" -Print the contents of the 1024 byte block at -.I block -on -.I drive -in hexadecimal. -.TP -.BI "read id" " drive" -Print the string starting at byte 42 in block 1 on -.IR drive . -This corresponds to the initial -.I vol_id -for -.IR worm (8) -disks. -.TP -.B reset -Attempt to reset the SCSI interface. -.TP -.BI sense " drive" -Print the sense data for -.IR drive . -Some of the interpretations of the sense bytes are idiosyncratic to SONY. -.TP -.BI "ext sense" " drive" -Print the extended sense data for -.IR drive . -Most of the interpretations of the extended sense bytes are idiosyncratic to SONY. -.TP -.BI sleep " n" -Sleep for -.I n -seconds. -.TP -.BI start " drive" -Start -.I drive -spinning. -.TP -.BI stop " drive" -Stop -.IR drive . -.TP -.BI test " drive" -Test unit ready for -.IR drive . -.PD -.SS "SONY Commands" -.TP -.BI alternate " drive" -Print the replacement block tables from the disk. -.TP -.BI media " drive blkno nblks" -Print a summary of the media quality in -.I drive -for the -.I nblks -blocks starting at block number -.IR blkno . -For example, a dirty disk can yield -.IP -.EX -drive 0: media check for 1000 blocks [0-999], upper drive -849 good, 1 unwritten, 147 <50% burst, 3 >96% burst, -.EE -.IP -Please report any instances of messages including -.B "rare error" -to the jukebox guru. -.PD -.TP -.BI "ext media" " drive blkno nblks" -A verbose form of the -.B media -command. -.PD -.SS "Jukebox Commands" -.TP -.B config -Print the configuration data for the jukebox. -.TP -.BI "rel" " drive shelf side" -Release the disk from -.I drive -to -.IR shelf . -The value of -.I side -indicates whether it should be inverted on the way -.RB ( b ) -or not -.RB ( a ). -If -.I shelf -and -.I side -are absent, -the disk is restored to its former shelf. -.PD0 -.TP -.BI "set" " shelf side drive" -Put the disk from -.I shelf -into -.IR drive . -The value of -.I side -indicates whether it should be inverted on the way -.RB ( b ) -or not -.RB ( a ). -.TP -.BI internal " n" -Execute various internal reports and diagnostics. -.B "internal -1" -with no argument will print a list of available diagnostics. -.TP -.BI "status" " drive" -Print the status for -.IR drive . -An absent -.I drive -is taken as 0. -As the status is for the jukebox as a whole, -the value of -.I drive -doesn't matter. -A sample status output shows the jukebox hides the mapping -of logical drive number and actual drive: -.IP -.EX -drive 0: ready,disk in LUN,power on,disk in drive 0, return shelf 2 -drive 1: not ready,no disk in LUN,power on,disk in shelf 0 -drive 2: not ready,no disk in LUN,power on,disk in shelf 0 -drive 3: ready,disk in LUN,power on,disk in drive 1, return shelf 0 -drive 4: not ready,no disk in LUN,power on,disk in shelf 0 -drive 5: not ready,no disk in LUN,power on,disk in shelf 0 -drive 6: not ready,no disk in LUN,power on,disk in shelf 0 -drive 7: not ready,no disk in LUN,power on,disk in shelf 0 -0: no disk -1: no disk -2: disk, -I/O shelf: no disk -carrier: disk shelf=0 -upper drive: disk, LUN=0 -lower drive: disk, LUN=3 -.EE -.SH "SEE ALSO" -.IR worm (8), -.IR scsi (4) diff --git a/static/v10/man8/sendcover.8 b/static/v10/man8/sendcover.8 deleted file mode 100644 index 04be2b38..00000000 --- a/static/v10/man8/sendcover.8 +++ /dev/null @@ -1,28 +0,0 @@ -.TH SENDCOVER 8 -.CT 1 writing_output -.SH NAME -sendcover \- send cover sheet to the library -.SH SYNOPSIS -.B sendcover -.I file ... -.SH DESCRIPTION -.I Sendcover -sends a document cover sheet to the -Bell Laboratories library for their document database. -It is invoked automatically as a byproduct of -running -.I troff -mcs. -.PP -The cover sheet is translated from the form of -.IR mcs (6) -to a form used in the library -and certain other protocol information is added. -The destination is not the same as that of -.IR docsubmit (1). -.SH FILES -.F /usr/lib/tmac/tmac.cs -.br -.F /usr/lib/tmac/cstrans -.SH "SEE ALSO" -.IR docsubmit (1), -.IR mcs (6) diff --git a/static/v10/man8/sendnews.8 b/static/v10/man8/sendnews.8 deleted file mode 100644 index 6aba6dee..00000000 --- a/static/v10/man8/sendnews.8 +++ /dev/null @@ -1,60 +0,0 @@ -.TH SENDNEWS 8 -.SH NAME -sendnews \- send news articles via mail -.SH SYNOPSIS -sendnews -[ -.B \-o -] -[ -.B \-a -] -[ -.B \-b -] -[ -.B \-n -newsgroups -] -destination -.SH DESCRIPTION -.I sendnews -reads an article from it's standard input, performs a set of changes -to it, and gives it to the mail program to mail it to -.I destination. -.PP -An `N' is prepended to each line for decoding by -.I uurec(1). -.PP -The -.B \-o -flag handles old format articles. -.PP -The -.B \-a -flag is used for sending articles via the -.B ARPANET. -It maps the article's path from -.I uucphost!xxx -to -.I xxx@arpahost. -.PP -The -.B \-b -flag is used for sending articles via the -.B Berknet. -It maps the article's path from -.I uucphost!xxx -to -.I berkhost:xxx. -.PP -The -.B \-n -flag changes the article's newsgroup to the specified -.I newsgroup. -.SH SEE ALSO -inews(1), -uurec(8), -recnews(8), -readnews(1), -checknews(1) diff --git a/static/v10/man8/ship.8 b/static/v10/man8/ship.8 deleted file mode 100644 index 2901d1c9..00000000 --- a/static/v10/man8/ship.8 +++ /dev/null @@ -1,118 +0,0 @@ -.TH SHIP 8 -.CT 1 comm_mach sa_nonmortals -.SH NAME -ship, shipstat \(mi automatic software distribution -.SH SYNOPSIS -.B ship -[ -.I option ... -] -[ -.I file ... -] -.PP -.B shipstat -.SH DESCRIPTION -.I Ship -distributes the named files to other computers, where -the files are installed under the same names. -Shipping privileges are determined -by the network manager on the receiving machine; -see -.IR svcmgr (8). -.PP -Destinations are taken from environment variable -.BR dest , -or from -.F /usr/lib/asd/dest/default -if -.B dest -is empty. -If a destination is the name of a file in -.FR /usr/lib/asd/dest , -it is replaced by the contents of that file, -each word of which is then examined in the same way. -Otherwise the destination is a network address. -The sending machine is omitted unless explicitly named in -the environment variable, -or unless option -.B -f -is present or environment variable -.B force -has a non-empty value. -.PP -.I Ship -uses -.I inspkg -and -.IR mkpkg (8) -to do its work. -Links among the named files are imitated -on the receiving computer, and -named files that do not exist on the sending -computer are deleted on the receiving computer. -Other options are the same as those of -.IR mkpkg : -.PP -.TP \w'\-X file 'u -.B -v -Emit running commentary on the standard error file. -.TP -.BI -D path1 = path2 -Pretend that any -.I file -name that begins with -.I path1 -really begins with -.IR path2 . -Relative pathnames are extended to full pathnames before comparison. -.TP -.BI -x command -.br -.ns -.TP -.BI -X file -Include in the package instructions to execute the shell -.I command -or run the shell script -.I file -after all files have been installed. -Only one of these options may occur. -The -.I file -name in -.BR -X -is affected by -.BR -D . -.PP -Shipments are generally acknowledged by mail after each destination -has been tried at least once; -see -.IR asd (8) -for details. -.PP -.I Shipstat -reports the status of all its caller's -incomplete shipments, -with the most recent first. -.SH FILES -.TF/usr/lib/asd/dest/default -.TP -.F /usr/lib/asd/dest/* -distribution lists -.TP -.F -/usr/lib/asd/dest/default -default distribution list -.TP -.BI /usr/spool/asd/ logname -outgoing spool directories -.SH SEE ALSO -.IR mkpkg (8), -.IR asd (8), -.IR svcmgr (8) -.SH BUGS -The -.B -f -option, if given, must be the first option and -must not be combined with any other. diff --git a/static/v10/man8/showq.8 b/static/v10/man8/showq.8 deleted file mode 100644 index cf46ea27..00000000 --- a/static/v10/man8/showq.8 +++ /dev/null @@ -1,56 +0,0 @@ -.TH SHOWQ 8 -.CT 1 sa_nonmortals -.SH NAME -showq \- status of stream input/output system -.SH SYNOPSIS -.B /etc/showq -[ -.B "-v -V -s -m -] -[ -.I system -] -[ -.I mem -] -.SH DESCRIPTION -.I Showq -reports connectivity and contents of I/O streams. -By default, it lists the maximum number of stream blocks -(of various sizes) ever used, then each stream and the queue modules -in each stream, and then blocks that are unaccounted for (not on any -queue or the free list). -.PP -By default, the system namelist is -.B /unix -and the place the streams are kept is -.BR /dev/mem . -.PP -The options are: -.TP -.B -v -Verbose. -Show more, in particular the contents of data and control blocks on each queue. -.TP -.B -V -Very verbose. -Show all blocks on every queue instead of giving up after a while. -.TP -.B -s -Silent. -Examine queues for consistency, printing only a summary. -.TP -.B -m -Missing. -Show the contents of missing blocks. -(Perhaps this will give a clue about who lost them.) -.SH FILES -.F /unix -.br -.F /dev/mem -.SH SEE ALSO -.IR stream (4), -.IR netstat (8) -.br -.IR mesgld (4) -for a list of message types diff --git a/static/v10/man8/shutdown.8 b/static/v10/man8/shutdown.8 deleted file mode 100644 index bfee17cb..00000000 --- a/static/v10/man8/shutdown.8 +++ /dev/null @@ -1,9 +0,0 @@ - -.TH SHUTDOWN 8 -.UC 4 -.SH NAME -shutdown \- take system down gracefully -.SH DESCRIPTION -To be supplied. -.SH "SEE ALSO" -reboot(8) diff --git a/static/v10/man8/smash.8 b/static/v10/man8/smash.8 deleted file mode 100644 index 5f076ad7..00000000 --- a/static/v10/man8/smash.8 +++ /dev/null @@ -1,43 +0,0 @@ -.TH SMASH 8 -.CT 1 sa_nonmortals -.SH NAME -smash \- rewrite bad disk sectors -.SH SYNOPSIS -.B /etc/smash -.I device sector -.SH DESCRIPTION -.I Smash -attempts to read the named (decimal, 512-byte) -.I sector -from the named -.IR device , -and prints the error status from the read -and the data read, -in octal, -regardless of the error status. -It then prompts -.LR write? , -to which there are three answers: -.TP -.B y -Write the data back to the sector. -.TP -.B c -Write zeros to the sector. -.TP -anything else -Quit. -.PP -After the sector is written, -it is read again -and the cycle repeats. -.PP -Writing the sector, -even if its contents could be correctly read, -will recompute the error correcting code. -This may make soft ECC errors vanish, -and will recover what can be recovered -(sometimes not much) -from hard ECC errors. -.SH SEE ALSO -.IR rarepl (8) diff --git a/static/v10/man8/smstat.8 b/static/v10/man8/smstat.8 deleted file mode 100644 index b4cce1ab..00000000 --- a/static/v10/man8/smstat.8 +++ /dev/null @@ -1,24 +0,0 @@ -.TH SMSTAT 8 -.CT 1 comm_mach -.SH NAME -smstat \- list smtp queues -.SH SYNOPSIS -.B smstat -.SH DESCRIPTION -.I Smstat -prints a summary of pending mail messages -queued by -the programs in -.IR smtp (8). -Each line contains the name of a spooling directory; -the number of outbound messages, -followed by -.LR C ; -and the number of inbound messages, -followed by -.LR X . -.SH FILES -.F /usr/spool/smtpq/* -spool directories -.SH SEE ALSO -.IR smtp (8) diff --git a/static/v10/man8/smtp.8 b/static/v10/man8/smtp.8 deleted file mode 100644 index b6c6315d..00000000 --- a/static/v10/man8/smtp.8 +++ /dev/null @@ -1,200 +0,0 @@ -.TH SMTP 8 -.CT 1 sa_auto -.SH NAME -smtp, smtpqer, smtpd, smtpsched \- handle simple mail transfer protocol -.SH SYNOPSIS -.B /usr/lib/upas/smtp -[ -.I option ... -] -.I replyaddr -.I dest -.I recipient ... -.PP -.B /usr/lib/upas/smtpqer -[ -.I option ... -] -.I replyaddr -.I dest -.I recipient ... -.PP -.B /usr/lib/upas/smtpd -[ -.B -n -] [ -.B -H -.I host -] -.PP -.B /usr/lib/upas/smtpsched -[ -option ... -] [ -.I queue ... -] -.SH DESCRIPTION -.I Smtp -reads a mail message from the standard input, -and sends it with the Internet SMTP protocol -to the named -.I recipients -at -network address -.IR dest . -.I Dest -has default network -.B tcp -and default -service -.B tcp.25 -(the conventional Internet SMTP port). -Error reports are mailed to local address -.IR replyaddr . -.PP -.I Smtp -operates in two modes, `Internet' (default) and `Unix'. -In Internet mode -.I recipient -addresses should be in full domain form. -.L From: -and -.L Date: -headers will be inserted as necessary -to conform to Internet standards. -In Unix mode -addresses and message contents -are not touched. -The options are -.TP -.B -u -Run in Unix mode. -.TP -.BI -H " host" -Use -.I host -as the name of the sending system (taken from -.IR whoami (5) -by default). -.TP -.BI -d " domain -Append the specified domain suffix to -incomplete addresses. -.PP -.I Smtpqer -reads a mail message from the standard input -and stashes it away -to be sent later -by -.IR smtpsched . -By default, -.I smtpsched -is started immediately; -option -.B -n -prevents this. -Other options and arguments are the same as for -.IR smtp . -.PP -.I Smtpd -receives a message by -speaking the server part of SMTP -on the standard input and output. -The message is stashed in a queue for later delivery -as by -.IR smtpqer . -Option -.B -n -prevents -.I smtpsched -from running immediately; -option -.B -H -is as for -.I smtp. -.PP -.I Smtpsched -processes the queues assembled by -.I smtpqer -and -.IR smtpd , -calling -.IR mail (1) -for local messages and -.I smtp -for others. -It should be run occasionally from -.IR cron (8). -.PP -The -.I queue -arguments name particular queue directories to be processed; -if no queue is named, -all queues are processed. -The options are -.TF "-s\0nproc" -.TP -.BI -w " days" -Send a warning about each message more than -.I days -old to the reply address. -.TP -.BI -r " days" -Mail an error reply about each message more than -.I days -old, -and discard the message. -.TP -.BI -s " nproc" -Do not run more than -.I nproc -simultaneous copies of -.I smtpsched -started with this option. -.TP -.B -c -Remove empty directories and inconsistent files. -.TP -.B -t -Log actions without performing them. -.TP -.B -C -Process `C' command files -.RI ( smtp -calls) only. -.TP -.B -X -Process `X' command files -.RI ( rmail -calls) only. -.TP -.B -v -Enable verbose logging. -.PD -.PP -The queues are kept in subdirectories of -.FR /usr/spool/smtpq , -named by splitting the lower case remote system name -into components separated by -periods, -concatenating the last two or fewer components, -taking the last 14 characters, -and stripping leading periods. -.SH FILES -.TF /usr/spool/smtpq/smtpqsched.log -.TP -.B /usr/spool/smtpq -spooling directory -.TP -.B /usr/spool/smtpq/smtpqsched.log -logging -.TP -.B /usr/spool/smtpq/.consumers -list of process IDs running -.I smptqsched -s -.SH SEE ALSO -.IR mail (1), -.IR upas (8), -.IR smstat (8) -.br -DARPA standards RFC 822, RFC 976 diff --git a/static/v10/man8/sticky.8 b/static/v10/man8/sticky.8 deleted file mode 100644 index e9d9e1a5..00000000 --- a/static/v10/man8/sticky.8 +++ /dev/null @@ -1,44 +0,0 @@ -.TH STICKY 8 -.UC 4 -.SH NAME -sticky \- executable files with persistent text -.SH DESCRIPTION -While the `sticky bit', mode 01000 (see -.IR chmod (2)), -is set on a sharable executable file, -the text of that file will not be removed from the system swap area. -Thus the file does not have to be fetched from the file system -upon each execution. -As long as a copy remains in the swap area, the -original text cannot be overwritten in the file system, -nor can the file be deleted. -(Directory entries can be removed so long as one link remains.) -.PP -Sharable files are made by the -.B \-n -and -.B \-z -options of -.IR ld (1). -.PP -To replace a sticky file that has been used do: -(1) Clear the sticky bit with -.IR chmod (1). -(2) Execute the old program to flush the swapped copy. -This can be done safely even if others are using it. -(3) Overwrite the sticky file. -If the file is being executed by any process, -writing will be prevented; it suffices to simply remove the file -and then rewrite it, being careful to reset the owner and mode with -.I chmod -and -.IR chown (2). -(4) Set the sticky bit again. -.PP -Only the super-user can set the sticky bit. -.SH BUGS -Are self-evident. -.PP -Is largely unnecessary on the VAX; matters only for large programs that -will page heavily to start, since text pages are normally cached incore -as long as possible after all instances of a text image exit. diff --git a/static/v10/man8/su.8 b/static/v10/man8/su.8 deleted file mode 100644 index 99721bb9..00000000 --- a/static/v10/man8/su.8 +++ /dev/null @@ -1,34 +0,0 @@ -.pa 1 -.he 'SU (VIII)'1/20/73'SU (VIII)' -.ti 0 -NAME su -- become privileged user -.sp -.ti 0 -SYNOPSIS su__ -.sp -.ti 0 -DESCRIPTION su -allows one to become the super-user, who has -all sorts of marvelous (and correspondingly dangerous) powers. -In order for su to do its magic, the user must -supply a password. -If the password is correct, su -will execute the shell with the UID set to -that of the super-user. -To restore normal UID privileges, -type an end-of-file to the super-user shell. - -To remind the super-user of his responsibilities, -the shell substitutes "#" for its usual prompt "%". -.sp -.ti 0 -FILES -- -.sp -.ti 0 -SEE ALSO sh(I) -.sp -.ti 0 -DIAGNOSTICS "Sorry" if password is wrong -.sp -.ti 0 -BUGS -- diff --git a/static/v10/man8/svcmgr.8 b/static/v10/man8/svcmgr.8 deleted file mode 100644 index 2b9ab3a8..00000000 --- a/static/v10/man8/svcmgr.8 +++ /dev/null @@ -1,331 +0,0 @@ -.TH SVCMGR 8 -.CT 1 sa_auto -.SH NAME -svcmgr \- service remote computing requests -.SH SYNOPSIS -.B /usr/ipc/mgrs/svcmgr -[ -.B -d -] -.SH DESCRIPTION -.I Svcmgr -performes services -such as login and command execution, -often in response to requests from network listeners -like -.IR dkmgr -and -.IR tcpmgr (8). -It should be run once from -.IR rc (8). -.PP -.I Svcmgr -is controlled by several files in directory -.FR /usr/ipc/lib : -services are defined in files -.B serv -and -.BR serv.local , -authorization in -.B auth -and -.BR auth.local . -The -.B .local -files are searched first. -The idea is that -.B serv -and -.B auth -will be the same throughout an administrative cluster of machines, -and anything peculiar to specific systems -will be kept in -.B serv.local -and -.BR auth.local . -.PP -Each service is announced -as a name in directory -.F /cs -using the routines in -.IR ipc (3). -When a connection is requested to one of these services, -.I svcmgr -receives a file descriptor -connected to the requester. -A new process is created -to perform the actions listed for that service -in the -.I serv -files, -usually resulting in a -.IR login (8) -with standard input, output, and error files -attached to the connection. -Often -there are flags to -.I login -specifying a local user name -or a command to be executed. -Environment variable -.SM CSOURCE -is set to a string -of the form -.IP -.BI source= remote-machine -.BI user= ruser -.BI line= lineinfo -.PP -.I Remote-machine -and -.I ruser -are supplied in the connection message; -.I lineinfo -network-dependent stuff -of varying interest and meaning. -If a particular command was specified -(the -.B cmd -or -.B exec -action), -.I login -sets -environment variable -.SM REXEC -to -.LR 1 . -.PP -The -.I auth -files are used to translate remote user names to local ones. -They contain lines with four fields: -.RS -service name -.br -calling system name -.br -calling user name -.br -local user name -.RE -.LP -The service, calling system, and calling user names -are regular expressions -in the style of -.IR regexp (3). -The calling system and calling user fields may be omitted; -.L .* -is assumed. -The local user name -is a literal name, -.L & -to repeat the calling user name provided in the request, -or -.L : -to explicitly reject a call. -If the local user name is omitted, -.L & -is assumed. -.PP -Several service actions `look up the connection in the -.I auth -files.'\0 -This means to -find the first line in -.B auth.local -or -.B auth -for which the service, -calling system, -and calling user -match the patterns, -and return the local user name in that line -(the same as the calling user if -.LR & ). -If no matching line is found, -or if the first match has local user name -.LR : , -the lookup fails. -.PP -The -.I serv -files contain lines with three fields: -.RS -service name -.br -a list of actions, -separated by -.L + -.br -the calling system name -.RE -.PP -The calling system name is a regular expression as in -the -.I auth -file. -The line matching an incoming call is the first whose service -matches the requested service and whose regular expression -matches the calling machine. -.PP -The possible actions are: -.de XP -.TP -.ie '\\$2'' .L "\\$1" -.el .L "\\$1(\f2\\$2\fP)" -.. -.TF password -.PD -.XP user x -Use local username -.IR x . -.XP auth -Look up the connection -in the -.I auth -files. -If a match is found, -use the resulting local user. -Otherwise reject the call. -.XP v9auth -Look up the connection -in the -.I auth -files; -if a match is found, -send -.L OK -to the caller, -and use the result. -If there is no match, send -.LR NO , -and read a string of the form `login,passwd\\n'. -If the login and password -describe a valid local user, -send -.L OK -and use that user; -otherwise send -.L NO -and try again -(until the caller gives up). -This is the authentication protocol used by -.IR ipclogin -(see -.IR ipc (3)), -hence by -.IR con (1), -.IR push (1), -and -.IR pull. -.XP inauth -Read two null-terminated strings -from the caller. -If they aren't the same, -reject the call. -Otherwise look up the service, -calling system, -and the null-terminated string -(as a user name) -in the -.I auth -files, -use the resulting local user if there's a match, -reject the call otherwise. -This is the authentication protocol used by -.IR ipcrogin, -hence by -.IR rsh -and -.IR rlogin ; -see -.IR ipc (3) -and -.IR con (1). -.XP ttyld -Push the terminal line discipline -.IR ttyld (4) -onto the connection. -.XP mesgld -Push the reverse message line discipline -(see -.IR mesgld (4)) -onto the connection. -.XP term -Read a null-terminated string from the caller, -and set environment variable -.SM TERM -to the result. -.XP args -Read a null-terminated string from the caller, -and save the result as arguments to a possible command. -.XP s5parms -Extract arguments from the destination address -in a way compatible with the -DKHOST network software -used by System V Datakit implementations, -and save for later use. -.XP cmd x -Execute shell command -.IR x , -with any saved arguments, -and with the connection as standard input, output, and error. -.XP login -Provide a login session with the connection as standard input, output, and error. -.XP password -Provide a login session, -but ignore any local user name; -always demand a login and password. -.XP exec -Use any saved arguments -as a shell command to be executed. -.XP gateout gateway -Call network address -.IR gateway -and send the connection info there, -If all is well, -pass the new connection's file descriptor -to the original caller: -the result is a connection through the gateway. -.I Gateway -should be a -.I svcmgr -service, -perhaps on some other machine, -with action -.BR gateway . -.XP gateway localout -The intended target for -.BR gateout : -read new connection info from the connection, -and place a call to the new destination; -if it succeeds, -loop passing data between the new connection and the original one. -.PP -If the file -.F /usr/ipc/log/svc -can be opened, -.I svcmgr -prints miscellaneous chatter there, -including a record of each service request. -The -.B -d -(debug) -option increases the chatter. -...SH EXAMPLES -...to be supplied -.SH FILES -.nf -.F /usr/ipc/lib/serv -.F /usr/ipc/lib/serv.local -.F /usr/ipc/lib/auth -.F /usr/ipc/lib/auth.local -.F /usr/ipc/log/svc -.fi -.SH "SEE ALSO" -.IR con (1), -.IR ipc (3), -.IR dkmgr (8), -.IR tcpmgr (8), -.IR ipc (3) diff --git a/static/v10/man8/swapon.8 b/static/v10/man8/swapon.8 deleted file mode 100644 index 7193e909..00000000 --- a/static/v10/man8/swapon.8 +++ /dev/null @@ -1,37 +0,0 @@ -.TH SWAPON 8 -.CT 1 sa_auto -.SH NAME -swapon \- specify swapping device -.SH SYNOPSIS -.B "/etc/swapon" -.B -a -.br -.B "/etc/swapon" -.I name ... -.SH DESCRIPTION -.I Swapon -specifies additional devices on which paging and swapping -are to take place. -The system begins by using a single device; -.I swapon -must be used to enable others. -.PP -Usually there is a call to -.L "swapon -a" -in -.IR rc (8). -Specific swap devices may be nominated with the second form. -.SH SEE ALSO -.IR rc (8), -.I vswapon -in -.IR deprecated (2) -.SH BUGS -There is no way to stop paging and swapping on a device. -It is therefore not possible to make use of devices which may be -dismounted during system operation. -.br -Possible swap devices -must be listed in a table configured into the system; -.I swapon -can only enable devices in the table. diff --git a/static/v10/man8/swtmp.8 b/static/v10/man8/swtmp.8 deleted file mode 100644 index e19ed31c..00000000 --- a/static/v10/man8/swtmp.8 +++ /dev/null @@ -1,24 +0,0 @@ -.pa 1 -.he 'SWTMP (VIII)'2/11/73'SWTMP (VIII)' -.ti 0 -NAME swtmp -- update accounting file -.sp -.ti 0 -SYNOPSIS swtmp_____ -.sp -.ti 0 -DESCRIPTION This -shell sequence concatenates /tmp/wtmp onto /usr/adm/wtmp -and truncates /tmp/wtmp. -It should be used before -using acct(VIII) -and every so often in any case if accounting -is to be maintained. -.sp -.ti 0 -FILES /tmp/wtmp, -/usr/adm/wtmp -.sp -.ti 0 -SEE ALSO acct(VIII), -wtmp(V) diff --git a/static/v10/man8/symorder.8 b/static/v10/man8/symorder.8 deleted file mode 100644 index 9d2668dc..00000000 --- a/static/v10/man8/symorder.8 +++ /dev/null @@ -1,23 +0,0 @@ -.TH SYMORDER 8 -.UC -.SH NAME -symorder \- rearrange name list -.SH SYNOPSIS -.B symorder -orderlist symbolfile -.SH DESCRIPTION -.I Orderlist -is a file containing symbols to be found in symbolfile, -1 symbol per line. -.PP -.I Symbolfile -is updated in place to put the requested symbols first -in the symbol table, in the order specified. This is done -by swapping the old symbols in the required spots with the -new ones. If all of the order symbols are not found, an -error is generated. -.PP -This program was specifically designed to cut down on the -overhead of getting symbols from /vmunix. -.SH "SEE ALSO" -nlist(3) diff --git a/static/v10/man8/sync.8 b/static/v10/man8/sync.8 deleted file mode 100644 index d95c8ad8..00000000 --- a/static/v10/man8/sync.8 +++ /dev/null @@ -1,18 +0,0 @@ -.th SYNC VIII 11/1/73 -.sh NAME -sync \*- update the super block -.sh SYNOPSIS -.bd sync -.sh DESCRIPTION -.it Sync -executes the -.it sync -system primitive. -If the system is to be stopped, -.it sync -must be called to insure -file system integrity. -See sync(II) for details. -.sh "SEE ALSO" -sync(II) -.sh BUGS diff --git a/static/v10/man8/syslog.8 b/static/v10/man8/syslog.8 deleted file mode 100644 index da1f5040..00000000 --- a/static/v10/man8/syslog.8 +++ /dev/null @@ -1,172 +0,0 @@ -.TH SYSLOG 8 -.CT 1 sa_nonmortals -.SH NAME -syslog, logpr \- system security logging -.SH SYNOPSIS -.B priv syslog -.I command -[ -.I arg2 -[ -.I arg3 -] -] -.PP -.B /etc/logpr -.I file -[ -.I offset -] -.SH DESCRIPTION -.I Syslog -controls the mandatory logging scheme. -License -.B T_LOG -is required. -The variety of different commands and command formats -reflects the full complexity of the -protean -.IR syslog (2) -system call. -In the usages given below a -.I mask -argument is a combination of letters -.BR NILESDATUPX , -meaning: -.TP -.PD0 -.B N -Record all uses of file names. -.TP -.B S -Record all seek calls. -.TP -.B U -Record all writes to the `u area'. -.TP -.B I -Record all accesses of inode contents. -.TP -.B D -Record possession and use of file descriptors. -.TP -.B P -Record process history: -.IR exec (2), -.IR fork (2), -.IR kill (2), -.IR exit (2). -.TP -.B L -Record all explicit changes of labels by -.IR setflab -(see -.IR getflab (2)) -and -.IR setplab -(see -.IR getplab (2)). -.TP -.B A -Record all changes of labels. -.TP -.B X -Record all uses of privilege. -.TP -.B E -Record all -.B ELAB -error returns. -.TP -.B T -Record all uses of a traced file or process. -.PD -.PP -Valid arguments to -.I syslog -are: -.TP -.BI "on " file " " logdev -Nominate -.I file -as repository for user generated -logging records written to logging special file -.IR logdev . -.I File -must be a full path name, and must be openable for writing. -If -.IR logdev 's -minor device number is zero, -.I file -will also receive mandatory (kernel generated) logging records. -.I Logdev -may be a full path name or a minor device number. -.PD0 -.TP -.BI "off " logdev -Cancel the effect of an -.B on -command. -.TP -.BI "get " n -Print the value of the -.IR n -th -log mask. -Values of -.I n -are 0, 1, 2, or 3 -for the `poison' masks; 4 is `global' mask. -.TP -.BI "set " n " " mask -Set the value of the -.IR n -th -log mask. -.TP -.BI "fget " file -Print the poison level of -.IR file , -one of the integers 0, 1, 2, or 3. -.I File -must be the full path name of a readable file. -.TP -.BI "fset " file " " n -Set the poison level of -.I file -to -.IR n . -.I File -must be the full path name of a readable file. -.TP -.BI "pget " pid -Print the logging mask of process -.IR pid . -.TP -.BI "pset " pid " " mask -Set the logging mask of process -.I pid -to -.IR mask . -.PD -.PP -.I Logpr -converts to cryptic -.SM ASCII -the cryptic binary format of a log file described in -.IR log (5). -The optional numerical byte offset tells where in the file printing -is to start. -.SH FILES -.TF /dev/log/log00 -.TP -.F /dev/log/log00 -where -.I syslog -makes voluntary entries -.SH "SEE ALSO" -.IR syslog (2), -.IR log (4), -.IR log (5). -.SH DIAGNOSTICS -`Covert channel warning': the log file has -a label that is neither top nor flagged -.BR L_NO . diff --git a/static/v10/man8/tcpmgr.8 b/static/v10/man8/tcpmgr.8 deleted file mode 100644 index ce77d7be..00000000 --- a/static/v10/man8/tcpmgr.8 +++ /dev/null @@ -1,73 +0,0 @@ -.TH TCPMGR 8 -.CT 1 sa_auto -.SH NAME -tcpmgr \- accept and place calls via the TCP protocol -.SH SYNOPSIS -.B /usr/ipc/mgrs/tcpmgr -[ -.BI -m " outnet" -] -.SH DESCRIPTION -.I Tcpmgr -receives and places TCP calls on an Internet TCP/IP network. -Outbound TCP calls may be placed by calling -.I ipcopen -with network name -.B tcp -(see -.IR ipc (3)). -Inbound calls to TCP port -.I n -are handed to the local service -listed for that port in -.FR /usr/ipc/lib/inservices , -or to service -.BI tcp. n -if there is no listing. -.PP -Option -.B -m -tells -.I tcpmgr -to claim to place outbound calls for network -.I outnet -rather than -.BR tcp . -.PP -The TCP protocol runs atop one or more IP networks. -.I Tcpmgr -arranges to receive all inbound TCP calls on all active IP networks, -but other arrangements -must be used to activate the IP networks themselves; -see -.IR ipconfig (8). -.PP -.I Tcpmgr -records its activity -in file -.I outnet -in directory -.BR /usr/ipc/log , -default -.BR /usr/ipc/log/tcp . -.PP -This command is usually run once from -.IR rc (8). -.SH FILES -.TP 2i -.PD 0 -.F /usr/ipc/log/tcp -.TP -.FR /dev/tcp* -TCP network devices -.TP -.F /dev/iptcp -IP channel for the TCP protocol -.TP -.F /usr/ipc/lib/inservices -mapping between service name and port number -.SH "SEE ALSO" -.IR con (1), -.IR ipconfig (8), -.IR svcmgr (8), -.IR ipc (3) diff --git a/static/v10/man8/tm.8 b/static/v10/man8/tm.8 deleted file mode 100644 index 4240c173..00000000 --- a/static/v10/man8/tm.8 +++ /dev/null @@ -1,48 +0,0 @@ -.pa 1 -.he 'TM (VIII)'3/15/72'TM (VIII)' -.ti 0 -NAME tm -- provide time information -.sp -.ti 0 -SYNOPSIS tm__ -.sp -.ti 0 -DESCRIPTION tm__ -is used to provide timing information. -Output like the following -is given: -.sp -.in +5 - tim 371:51:09 2:00.8 - ovh 20:00:33 17.0 - swp 13:43:20 4.6 - dsk 27:14:35 4.5 - idl 533:08:03 1:33.3 - usr 24:53:50 1.2 - der 0, 54 0, 0 -.sp -.in -5 -The first column of numbers gives totals in the named categories -since the last time the system was cold-booted; the second -column gives the changes since the last time tm__ was invoked. -The top left number is badly truncated and should be ignored. -ovh___ is time spent -executing in the system; -swp___ is time waiting for swap I/O; -dsk___ is time spent waiting for -file system disk I/O; idl___ is idle time; usr___ is user execution -time; der___ is RF disk error count (left number) and RK disk error -count (right number). - -.ti 0 -FILES /dev/rf0 (for absolute times); -/tmp/ttmp for differential timing history. -.sp -.ti 0 -SEE ALSO time(I), file system(V) -.sp -.ti 0 -DIAGNOSTICS -- -.sp -.ti 0 -BUGS -- diff --git a/static/v10/man8/tp.8 b/static/v10/man8/tp.8 deleted file mode 100644 index 7e27f382..00000000 --- a/static/v10/man8/tp.8 +++ /dev/null @@ -1,175 +0,0 @@ -.TH TP 8 -.SH NAME -tp \- manipulate tape archive -.SH SYNOPSIS -.B tp -[ key ] [ name ... ] -.SH DESCRIPTION -.PP -.I Tp -saves and restores files -on DECtape or magtape. -Its actions are controlled by the -.I key -argument. -The key is a string of characters containing -at most one function letter and possibly -one or more function modifiers. -Other arguments to the command are file or directory -names specifying which files are to be dumped, restored, -or listed. -In all cases, appearance of a directory name refers to -the files and (recursively) subdirectories of that directory. -.PP -The function portion of -the key is specified by one of the following letters: -.TP 8 -.B r -The named files -are written -on the tape. -If files with the same names -already exist, they are replaced. -`Same' is determined by string comparison, so -`./abc' can never be the same as `/usr/dmr/abc' even -if `/usr/dmr' is the current directory. -If no file argument is given, `\fB.\fR' is the default. -.TP 8 -.B u -updates the tape. -.B u -is like -.B r, -but a file is replaced only if its -modification date is later than the date stored on the tape; -that is to say, if it has changed since it was dumped. -.B u -is the default command if none is given. -.TP 8 -.B d -deletes the named files from -the tape. -At least one name argument must be given. -This function is not permitted on magtapes. -.TP 8 -.B x -extracts the named files from the tape to the file system. -The owner and mode are restored. -If no file argument is given, the entire contents of the -tape are extracted. -.TP 8 -.B t -lists the names of the specified files. -If no file argument is given, -the entire contents of the tape is listed. -.PP -The following characters may be used in addition to the letter -which selects the function desired. -.TP 10 -.B m -Specifies magtape as opposed to DECtape. -.TP 10 -.B 0,...,7 -This -modifier selects the drive on which the tape is mounted. -For DECtape, -.B x -is default; for magtape -`0' is the default. -.TP 10 -.B v -Normally -.I tp -does its work silently. -The -.B v -(verbose) -option causes it to type the name of each file it treats -preceded by the function letter. -With the -.B t -function, -.B v -gives more information about the -tape entries than just the name. -.TP 10 -.B c -means a fresh dump is being created; the tape directory -is cleared before beginning. -Usable only with -.B r -and -.B u. -This option is assumed with magtape since -it is impossible to selectively overwrite -magtape. -.TP 10 -.B i -Errors reading and writing the -tape are noted, but no action is taken. -Normally, errors cause a return to the command level. -.TP 10 -.B f -Use the first named file, rather than a tape, -as the archive. -This option currently acts like -.BR m ; -.I i.e. -.BR r -implies -.BR c , -and neither -.BR d -nor -.BR u -are permitted. -.TP 10 -.B w -causes -.I tp -to pause before treating each file, type -the indicative letter and the file name (as with -.BR v ) -and await the user's response. -Response -.B y -means `yes', so the file is treated. -Null response -means `no', and the file does not take part -in whatever is being done. -Response -.B x -means `exit'; -the -.I tp -command terminates immediately. -In the -.B x -function, -files previously asked about -have been extracted already. -With -.B "r, u," -and -.B d -no change has been made to the tape. -.PP -.SH FILES -/dev/tap? -.br -/dev/rmt? -.SH SEE ALSO -ar(1), tar(1) -.SH DIAGNOSTICS -Several; the non-obvious one is -`Phase error', which means the file changed after it was selected for -dumping but before it was dumped. -.SH BUGS -A single file with several links to it is treated like several files. -.PP -Binary-coded control information makes -magnetic tapes written by -.I tp -difficult to carry to other machines; -.IR tar (1) -avoids the problem. diff --git a/static/v10/man8/umount.8 b/static/v10/man8/umount.8 deleted file mode 100644 index a69a5b8d..00000000 --- a/static/v10/man8/umount.8 +++ /dev/null @@ -1,31 +0,0 @@ -.pa 1 -.he 'UMOUNT (VIII)'1/20/73'UMOUNT (VIII)' -.ti 0 -NAME umount -- dismount file system -.sp -.ti 0 -SYNOPSIS /etc/umount___________ special -.sp -.ti 0 -DESCRIPTION umount______ -announces to the system that the removable file system previously -mounted on special file special_______ is to be removed. - -The user must take care not -only that all I/O activity on the file system has ceased, -but that no one has his current directory on it. - -Only the super-user may issue this command. -.sp -.ti 0 -FILES -- -.sp -.ti 0 -SEE ALSO mount(VIII) -.sp -.ti 0 -DIAGNOSTICS "?" -.sp -.ti 0 -BUGS This -command is not, in fact, restricted to the super-user. diff --git a/static/v10/man8/unspk.8 b/static/v10/man8/unspk.8 deleted file mode 100644 index af99d8c1..00000000 --- a/static/v10/man8/unspk.8 +++ /dev/null @@ -1,43 +0,0 @@ -.pa 1 -.he 'UNSPK (VIII)'4/13/73'UNSPK (VIII)' -.ti 0 -NAME unspk -- decode voice synthesizer text -.sp -.ti 0 -SYNOPSIS unspk_____ [ -_ ] [ input [ output ] ] -.sp -.ti 0 -DESCRIPTION unspk_____ -is inverse to -.ul -speak. -It translates coded voice synthesizer input, as created by -.ul -speak, -into phonetic strings -of the sort accepted by -.ul -speak. -Standard output or input is assumed when one or the other -is unspecified. -.sp -The -_ option produces output in a different phonetic code -for another vocal tract synthesizer [C. H. Coker, -Speech synthesis by modelling the human articulatory -system, MM69-1232-29]. -.sp -unspk_____ lives in /crp/vs -.sp -.ti 0 -FILES -- -.sp -.ti 0 -SEE ALSO speak(I), vsp(VII) -.sp -.ti 0 -DIAGNOSTICS "Input file." -- can't open it -.br -"Output file." -- can't create it -.sp -.ti 0 -BUGS -- diff --git a/static/v10/man8/upas.8 b/static/v10/man8/upas.8 deleted file mode 100644 index 8cf496bd..00000000 --- a/static/v10/man8/upas.8 +++ /dev/null @@ -1,275 +0,0 @@ -.TH UPAS 8 -.CT 1 sa_auto sa_mortals -.SH NAME -upas, rmail, translate \- mail delivery system -.SH SYNOPSIS -.B rmail -.I person ... -.PP -.B /usr/lib/upas/translate -.I name -.PP -.B /usr/lib/upas/auth -.I sender -.I receiver -.SH DESCRIPTION -Users send mail by -.IR mail (1). -Remote machines use -.I rmail. -Both call on -.I upas -programs. -.PP -Mail addresses are interpreted -according to rewrite rules as -described below. -When the addresses for a -.I mail -or -.I rmail -command have been interpreted, they are bundled by -network and passed to network-specific handlers, -such as -.IR route.inet . -.PP -.I Translate -looks up a mail -.I name -in an alias list (see -.IR mail (6)) -and places the result on standard output. -.PP -.I Auth -is called by -.I upas -to authorize mail delivery for each -.I sender, receiver -pair. -The mail is accepted if -the previous hop was a trusted gateway machine in -.FR /usr/lib/upas/gateways , -or all the machines in the source or destination path are in -.FR /usr/lib/upas/attlist . -.SS Rewrite rules -Each line of the file -.F /usr/lib/upas/rewrite -is a rule. -Blank lines and lines beginning with -.B # -are ignored. -.PP -Each rewriting rule consists of (up to) 4 strings: -.TP -.I pattern -A regular expression in the style of -.IR regexp (3). -The -.I pattern -is applied to mail destination addresses. -The pattern match is case-insensitive -and must match the entire address. -.TP -.I type -The type of rule; see below. -.TP -.I arg1 -An -.IR ed (1) -style replacement string, with -.BI \e n -standing for the text matched by the -.IR n th -parenthesized subpattern. -.TP -.I arg2 -Another -.IR ed (1) -style replacement string. -.PP -In each of these fields the substring -.L \es -is replaced by the login id of the -sender and the substring -.L \el -is replaced by the name of the local machine. -.PP -When delivering a message, -.I mail -starts with the first rule and continues down the list until a pattern -matches the destination address. -It then performs one of the following actions depending on rule type: -.PD 0 -.TP -.B >> -Append the mail to the file indicated by expanding -.IR arg1 , -provided that file appears to be a valid mailbox. -.TP -.B | -Pipe the mail through the command formed from concatenating the -expanded -.I arg1 -and -.I arg2. -.TP -.B alias -Replace the address by the address(es) specified -by expanding -.I arg1 -and recur. -.TP -.B translate -Replace the address by the address(es) output by the -command formed by expanding -.I arg1 -and recur. -.TP -.B auth -Call the program in expanded -.I arg1 -and authorize(reject) the mail if it returns a zero(non-zero) return code. -.PD -.PP -.I Mail -expands the addresses recursively until each address has matched a -.L >> -or -.L | -rule or until the recursion depth indicates a rewriting loop -(currently 32). -.PP -An -.L auth -operator is only applied once per address. -If no -.L auth -rule is encountered, the mail is accepted. -.PP -If several addresses match -.L | -rules and result in the same -expanded -.IR arg1 , -the message is delivered to all those addresses -by a single command, -composed by concatenating the common -expanded -.I arg1 -and each expanded -.IR arg2 . -This is meant to make less work of -a message to several recipients on the same machine. -For example, the rule -.IP -.L -([^!]+)!(.+) | "uux - -a \\s \\1!rmail" \\2 -.LP -causes -.L mail r70!pjw r70!ken -to generate the single delivery command -.LR "uux -a rob r70!rmail pjw ken" . -.SH EXAMPLES -A sample rewrite file: -.PP -.EX -.ta \w'([^!]+)[%@]([^!@%]+) 'u +\w'alias 'u -# local mail -[^!@%]+ translate "exec translate '&'" -local!([^!@%]+) >> /usr/spool/mail/\e1 -\el!(.+) alias \e1 -.EE -.PP -.EX -# convert %@ format to ! format -(_822_)!((.+)!)?([^!]+)[%@]([^!%@]+) \e - alias \e1!\e2\e5!\e4 -([^!]+)[%@]([^!@%]+) alias _822_!\e2!\e1 -_822_!(.+) alias \e1 -.EE -.PP -.EX -# special domains -[^!]+wisc\e.edu!.+ alias xunet!& -.EE -.PP -.EX -# network gateways -(csnet|bitnet)!(.+) alias inet!& -acsnet!.+ -.EE -.PP -.EX -# real networks -inet!([^!]+)!(.+) | "/usr/lib/upas/route.inet '\es' '\e1'" "'\e2'" -([^!]+)!(.+) | "/usr/lib/upas/route '\es' '\e1'" "'\e2'" -.EE -.PP -.EX# anything else goes to research -.* alias research!& -.EE -.SH FILES -.TF /n/bowell/usr/lib/upas/mkfile -.TP -.F /usr/lib/upas/namefiles -list of files to search -.TP -.F $HOME/lib/names -private aliases -.TP -.F /usr/lib/upas/rewrite -rewriting rules -.TP -.F /usr/lib/upas/attlist -known AT&T machines -.TP -.F /usr/lib/upas/gateways -machines that check mail authorization reliably -.TP -.F /usr/lib/upas/translate -alias lookup -.TP -.F /usr/lib/upas/route.* -mail interfaces to specific networks -.TP -.F /usr/lib/upas/route -interface to local (i.e. AT&T) Datakit network -.TP -.F /bin/mail -shell file that calls the mailer -.TP -.F /usr/lib/upas/send -actually delivery program -.TP -.F /bin/rmail -linked to /usr/lib/upas/send -.TP -.F /usr/spool/mail/* -mailboxes -.TP -.F /usr/spool/mail/mail.log* -delivery logs -.TP -.F /n/bowell/usr/lib/upas/mkfile -updates various mail and uucp files -.TP -.F /etc/passwd -authentication -.TP -.F /tmp/ma* -temp file -.TP -.F /tmp/ml* -lock file -.TP -.F $HOME/dead.letter -unmailable text -.SH "SEE ALSO" -.IR uucp (1), -.IR mail (1), -.IR mail (6), -.IR smtp (8) -.br -D. L. Presotto and W. R. Cheswick, -`Upas\(ema simpler approach to network mail', -this manual, Volume\ 2 diff --git a/static/v10/man8/update.8 b/static/v10/man8/update.8 deleted file mode 100644 index a670606c..00000000 --- a/static/v10/man8/update.8 +++ /dev/null @@ -1,25 +0,0 @@ -.th UPDATE VIII 11/1/73 -.sh NAME -update \*- periodically update the super block -.sh SYNOPSIS -.bd update -.sh DESCRIPTION -.it Update -is a program that executes -the -.it sync -primitive every 30 seconds. -This insures that the file system -is fairly up to date in case of a crash. -This command should not be executed directly, -but should be executed out of the -initialization shell command file. -See sync(II) for details. -.sh "SEE ALSO" -sync(II), init(VII) -.sh BUGS -There is a system bug which, it is suspected, -may be aggravated by this program. -Until further notice, -.it update -should not be run. diff --git a/static/v10/man8/uucico.8 b/static/v10/man8/uucico.8 deleted file mode 100644 index ba88daa7..00000000 --- a/static/v10/man8/uucico.8 +++ /dev/null @@ -1,205 +0,0 @@ -.TH UUCICO 8 -.CT 1 sa_auto -.SH NAME -uucico, uusched, uuxqt, kick, debug \- uucp file transport and execution -.SH SYNOPSIS -.B /usr/lib/uucp/uucico -[ -.B -r1 -.B -s -.I system -] -[ -.B -x -.I debug -] -[ -.B -d -.I spool_directory -] -.PP -.B /usr/lib/uucp/uusched -[ -.B -x -.I debug -] -[ -.B -u -.I debug -] -.PP -.B /usr/lib/uucp/kick -.I system -.PP -.B /usr/lib/uucp/debug -.I system -.PP -.B /usr/lib/uucp/uuxqt -[ -.B -s -.I system -] -[ -.B -x -.I debug -] -.SH DESCRIPTION -.I Uucico -transfers files between systems -for -.IR uucp (1). -It is normally invoked by -.I login -for -an incoming connection -(a slave), -or by -.IR uusched -to call out to another system -(a master). -The options are -.TP \w'\f5-s\ \fIsystem\ 'u -.B -r1 -This is a master; -option -.B -s -is required. -In the absence of -.B -r1 -the process is a slave and expects to speak to a master on -standard input and standard output. -.TP \w'\f5-s\ \fIsystem\ 'u -.BI -s " system -Call the named -.I system. -.TP -.BI -x " debug -Turn on debugging output; -.I debug -is a single digit, larger for more output. -.ig -.PP -For example, -the shell -.I Uutry -starts -.I uucico -with debugging turned on. -.. -.PP -.I Uusched -invokes -.I uucico -for each system -with work pending. -It is called by -.IR uucp -and -.IR uux (1) -after work is queued, -and should be invoked regularly by -.IR cron (8). -The options are -.TP \w'\f5-s\ \fIsystem\ 'u -.BI -x " debug -As for -.I uucico. -.TP -.BI -u " debug -Invoke -.I uucico -with option -.B -x -.I debug. -.PP -.I Kick -invokes -.I uucico -in the background -to call out to the specified -.IR system . -.I Debug -causes a call with -a moderate amount -of debugging output -.RB ( -x4 ). -Both attempt to remove -existing system status information -for -.IR system , -so that a call will be attempted -regardless of recent failures. -.PP -.I Uuxqt -executes commands requested remotely by -.IR uux (1). -It searches the -.I uucp -spool directories looking for -filenames starting with -.BR X. , -checks the -.I Permissions -file to see that all required data files are available -and accessible -and that the requested command is permitted for the -requesting system, -and invokes the command if all is well. -.PP -Before a command is invoked, -the file creation mask -.RI ( umask (2)) -is set to 0 and these -environment variables are set: -.TF UU_MACHINE -.TP -.B UU_MACHINE -the name of the last sending machine -.TP -.B UU_USER -the user that sent the job -.TP -.B PATH -set to -.LR /bin:/usr/bin -.TP -.B USER -set to -.L uucp -.PD -.SH FILES -.TF /usr/lib/uucp/Maxuuscheds -.TP -.F /usr/lib/uucp/Systems* -.TP -.F /usr/lib/uucp/Permissions -.TP -.F /usr/lib/uucp/Devices -.TP -.F /usr/lib/uucp/Maxuuscheds -how many copies of -.I uusched -may be active at once -.TP -.F /usr/lib/uucp/Maxuuxqts -ditto for -.I uuxqt -.TP -.F /usr/spool/uucp/* -.TP -.F /usr/spool/uucppublic/* -.TP -.F /usr/spool/uucp/LCK* -.fi -.SH "SEE ALSO" -.IR uucp (1), -.IR uux (1), -.IR uustat (1) -.br -D. A. Nowitz, -`UUCP Administration', -this manual, Volume 2 -.SH BUGS -System and user names received by -.I uuxqt -should not be believed. diff --git a/static/v10/man8/uucleanup.8 b/static/v10/man8/uucleanup.8 deleted file mode 100644 index 650af0d7..00000000 --- a/static/v10/man8/uucleanup.8 +++ /dev/null @@ -1,103 +0,0 @@ -.TH UUCLEANUP 8 -.CT 1 sa_auto -.SH NAME -uucleanup \- uucp spool directory clean-up -.SH SYNOPSIS -.B /usr/lib/uucp/uucleanup -[ -.I options -] -.SH DESCRIPTION -.I Uucleanup\^ -removes old files from the -.I uucp -spool directories. -It is typically called by -.FR /usr/lib/uucp/uudemon.cleanu , -which may be run regularly by -.IR cron (8). -The options are: -.TF -mstring -.TP -.BI -C days\^ -Remove -.B C. -(control) files that are at least -.I days -old, -and send a message to the user who queued the job. -.PD -.TP -.BI -D days\^ -Remove -.B D. -(data) files that are at least -.I days -old. -If the data file appears to contain a mail message, -an attempt will be made to deliver it; -if it contains a netnews article -from another system, -it will be handed to -.IR rnews . -.TP -.BI -W days\^ -Send a warning to the user who queued any jobs -.RB ( C. -files) -at least -.I days -old. -If one of the data files for the job appears to be a mail message, -the message is included in the warning. -.TP -.BI -X days\^ -Remove any -.B X. -(remote execution) files at least -.I days -old. -.TP -.BI -m string\^ -Include -.I string -in warning messages. -The default is -`See your local administrator to locate the problem.' -.TP -.BI -o days\^ -Remove any other files -that are at least -.I days -old. -.TP -.BI -s system\^ -Examine only files associated with -.IR system . -.PP -By default, -.B C. -files generate a warning when -one day old, -and are removed after 7 days; -.B D. -files are removed after 7 days; -and -.B X. -and other files -are removed after 2 days. -.SH FILES -.TF /usr/spool/uucp -.TP -.F /usr/lib/uucp -directory with commands used by -.I uucleanup -.TP -.F /usr/spool/uucp -spool directory -.SH SEE ALSO -.IR uucp (1) -.br -D. A. Nowitz, -`UUCP Administration', -this manual, Volume 2 diff --git a/static/v10/man8/uurec.8 b/static/v10/man8/uurec.8 deleted file mode 100644 index 38dae752..00000000 --- a/static/v10/man8/uurec.8 +++ /dev/null @@ -1,18 +0,0 @@ -.TH UUREC 8 -.SH NAME -uurec \- receive processed news articles via mail -.SH SYNOPSIS -uurec -.SH DESCRIPTION -.I uurec -reads news articles on the standard input sent by -.I sendnews(8), -decodes them, and gives them to -.I inews(1) -for insertion. -.SH SEE ALSO -inews(1), -readnews(1), -recnews(8), -sendnews(8), -newscheck(1) diff --git a/static/v10/man8/vipw.8 b/static/v10/man8/vipw.8 deleted file mode 100644 index 05f46458..00000000 --- a/static/v10/man8/vipw.8 +++ /dev/null @@ -1,23 +0,0 @@ -.TH VIPW 8 -.UC 4 -.SH NAME -vipw \- edit the password file with vi -.SH SYNOPSIS -.B vipw -.SH DESCRIPTION -.I Vipw -edits the password file while setting the appropriate locks, -and does any necessary processing after the password file is unlocked. -If the password file is already being edited, then you will be told -to try again later -.SH SEE ALSO -chfn(1), chsh(1), passwd(1), passwd(5), adduser(8) -.SH FILES -/etc/vipw.lock -.SH BUGS -.I Vipw -does not remove the vipw.lock file; this is not a bug, but people tend -to think it is. -.PP -No one deals with left-over /etc/ptmp (the real lock) files after a system -crash. diff --git a/static/v10/man8/vmstat.8 b/static/v10/man8/vmstat.8 deleted file mode 100644 index dd267fb0..00000000 --- a/static/v10/man8/vmstat.8 +++ /dev/null @@ -1,143 +0,0 @@ -.TH VMSTAT 8 -.CT 1 sa_mortals -.SH NAME -vmstat \- report virtual memory statistics -.SH SYNOPSIS -.B vmstat -[ -.B -st -] -[ -.I interval -[ -.I count -] -] -.SH DESCRIPTION -.I Vmstat -reports statistics about certain system activity. -.ig x -Option -.B -f -reports on -.I forks -since system startup and the number of pages of virtual memory involved. -.x -Option -.B -s -prints totals for miscellaneous events -since the last boot. -Option -.B -t -reports on paging events. -.PP -In the absence of other options, the optional -.I interval -argument causes -.I vmstat -to report once each -.I interval -seconds, repeated -.I count -times or forever. -.PP -The default format fields are: -.TF faults -.TP -.B procs -information about numbers of processes in various states: -.RS -.PD 0 -.TP -.B r -in run queue -.TP -.B b -blocked for resources (I/O, paging, etc.) -.TP -.B w -runnable or short sleeper (< 20 secs) but swapped -.RE -.PD -.TP -.B memory -use of virtual and real memory: -.RS -.PD 0 -.TP -.B avm -number of -pages belonging to processes that have run -in the last 20 seconds -.TP -.B fre -size of memory free list -.RE -.PD -.TP -.B page -paging activity, -averaged each five seconds, in units per second: -.RS -.PD 0 -.TP -.B re -page reclaims (simulating reference bits) -.TP -.B at -text pages recovered from memory -.TP -.B pi -page-in events -.TP -.B po -page-out events -.TP -.B fr -pages freed per second -.TP -.B de -anticipated short term memory shortfall -.TP -.B sr -scan rate: pageout daemon rpm -.RE -.PD -.TP -.B faults -trap rates, averaged each five seconds, in units per second: -.RS -.PD 0 -.TP -.B sy -system calls -.TP -.B cs -process context switches -.RE -.PD -.TP -.B cpu -percentage use of CPU time: -.RS -.PD 0 -.TP -.B us -user time, both normal and low priority -.TP -.B sy -system time -.TP -.B id -cpu idle time -.TP -.B st -stream queue processing time -.RE -.PD -.SH FILES -.F /dev/kmem -.br -.F /unix -.SH BUGS -This program is never up to date. diff --git a/static/v10/man8/vpac.8 b/static/v10/man8/vpac.8 deleted file mode 100644 index 6acf1fce..00000000 --- a/static/v10/man8/vpac.8 +++ /dev/null @@ -1,49 +0,0 @@ -.TH VPAC 8 2/21/80 -.UC 4 -.SH NAME -vpac \- print raster printer/ploter accounting information -.SH SYNOPSIS -.B /etc/vpac -[ -.B \-W -] [ -.B \-s -] [ -.B \-r -] [ -.B \-t -] [ name ... ] -.SH DESCRIPTION -.I Vpac -reads the raster printer/plotter accounting files, accumulating the number -of pages (for narrow fan-fold devices) or feet (for wide, roll paper devices) -of paper consumed by each user, and printing out -how much each user consumed in pages or feet and dollars (billed at -2 cents / page or 8 cents / foot). If any -.I names -are specified, then statistics are only printed for those users; -usually, statistics are printed for every user who has used any paper. -.PP -The -.B \-W -flag causes accounting to be done for a wide roll paper device. The default is -to do accounting for a narrow, fan-fold device. -The -.B \-t -flag causes the output to be sorted by feet of paper; usually the -output is sorted alphabetically by name. The -.B \-r -flag reverses the sorting order. -The -.B \-s -flag causes the accounting information to be summarized on the -summary accounting file; this summarization is necessary since on a -busy system, the accounting file can grow by several lines per day. -.SH FILES -.ta 2i -/usr/adm/v?acct raw accounting files -.br -/usr/adm/v?_sum summary accounting files -.SH BUGS -The relationship between the computed price and reality is -as yet unknown. diff --git a/static/v10/man8/wall.8 b/static/v10/man8/wall.8 deleted file mode 100644 index 57918100..00000000 --- a/static/v10/man8/wall.8 +++ /dev/null @@ -1,23 +0,0 @@ -.TH WALL 8 -.CT 1 sa_nonmortals -.SH NAME -wall \- write to all users -.SH SYNOPSIS -.B /etc/wall -.SH DESCRIPTION -.I Wall -reads its standard input until an end-of-file. -It then sends this message, -preceded by -`Broadcast Message ...', -to all logged in users. -.PP -The sender should be super-user to override -any protections the users may have invoked. -.SH FILES -.F /etc/utmp -.SH "SEE ALSO" -.IR write (1) -.SH DIAGNOSTICS -`Cannot send to ...' when the open on -a user's tty file fails. diff --git a/static/v10/man8/worm.8 b/static/v10/man8/worm.8 deleted file mode 100644 index 004f4a05..00000000 --- a/static/v10/man8/worm.8 +++ /dev/null @@ -1,436 +0,0 @@ -.TH WORM 8 "wild" -.CT 1 sa_nonmortals -.SH NAME -worm, jukebox \- optical disk utilities -.SH SYNOPSIS -.B "worm mkfs" -[ -.BI -f device -] [ -.BI -c comments -] [ -.BI -b blksz -] [ -.BI -n nblks -] [ -.BI -v newvol_id -] -.I vol_id -.PP -.B "worm stat" -[ -.BI -f device -] [ -.BI -F n -] [ -.B -v -] [ -.I vol_id -] -.PP -.B "worm ls" -[ -.BI -f device -] [ -.B -l -] [ -.I file ... -] -.PP -.B "worm rm" -[ -.BI -f device -] -.I vol_id -[ -.I file ... -] -.PP -.B "worm mv" -[ -.BI -f device -] -.I vol_id -.I "src dest" -.PP -.B "worm write" -[ -.BI -f device -] -.I vol_id -[ -.I file ... -] -.PP -.B "worm read" -[ -.BI -f device -] [ -.B -dm -] -.I vol_id -[ -.I file ... -] -.PP -.B "worm cat" -[ -.BI -f device -] -.I vol_id -.I file -.PP -.B "worm copy" -[ -.B -v -] [ -.BI -m min_free -] [ -.BI -f src_dev -] -.I src_vol_id -.I dest_dev -.I dest_vol_id -.PP -.B "worm offline" -[ -.BI -f device -] -.PP -.B "worm btree" -[ -.BI -f device -] -.I vol_id -.PP -.B "worm dir" -[ -.BI -f device -] -.I vol_id -.PP -.B "worm tmpdir" -[ -.BI -f device -] -.I vol_id -.PP -.B "worm mount" -[ -.BI -w secs -] [ -.I vol_id -] -.PP -.B "jukebox" -[ -.B -aemprsuU -] [ -.BI -w secs -] [ -.I vol_id -] -.SH DESCRIPTION -The -.I worm -programs manipulate arbitrary files. -They are intended for use with the raw device associated -with a Write-Once Read-Many (WORM) optical disk. -The default device is -.FR /dev/worm0 . -Other devices are specified by -.BI -f device -and a device name of a single digit -.I n -is taken as an abbreviation for -.FR /dev/worm \f2n\fP. -Most of the commands implement a simple file system. -Programs just wanting a raw device should still use -.B "worm mkfs" -so that the disk is properly labeled. -The -.IR vol_id , -or label, -should be unique and by convention, the vol_id's -for the A and B sides of a disk should be the same string suffixed by -a lowercase -.B a -and -.B b -respectively. -.PP -.I "Worm mkfs" -labels an optical disk. -The -.I comments -field is limited to 256 chars. -It is purely descriptive and is printed by -.IR "worm stat \-v" . -The (default) blocksize is 1024 for our SONY disks. -The number of blocks on a disk can be found by -.IR ra (4) -or -.IR scsish (8); -the default size -(1,600,000 for single density, 3,250,000 for double density) -sets aside 30MB or so as a hedge against oversights. -If the disk has already been initialised, its vol_id must match -.IR vol_id . -A new vol_id can be set with -.BR -v . -.PP -.I "Worm stat" -prints out labeling information -including the amount of free space left on the disk. -Option -.I vol_id -turns off all output except exit status: zero if -.I vol_id -matches that of the disk, -one otherwise. -Option -.B -F -similarly exits with status zero if the disk has more than -.I n -free blocks, otherwise three. -Option -.B -v -produces more output. -.PP -.I "Worm ls" -simulates an emasculated -.IR ls (1). -.PP -.I "Worm rm" -makes the specifed files unavailable to the rest of the -.I worm -commands. -.PP -.I "Worm mv" -renames -.I src -to -.IR dest . -.PP -.I "Worm write" -copies files onto the WORM. -If no file arguments are given, -filenames are read one per line from standard input. -The total number of files and bytes is printed on standard output. -.PP -.I "Worm read" -restores files from the WORM. -If no file arguments are given, -filenames are read one per line from standard input. -Option -.B -d -causes directories to be created as needed. -Option -.B -m -restores the original modification times. -.PP -.I "Worm cat" -copies the named file from the WORM to the standard output. -.PP -.I "Worm copy" -copies files directly from one disk to another. -The names of the files to be copied are taken from standard input; -groups (separated by blank lines) will be kept together. -The names are typically generated by -.BR "worm ls" . -The -.B -v -option prints out progress and summary information. -The copy will terminate before copying a group that would leave the destination -volume with less than -.I minfree -(deafult value is 40000) blocks free. -.PP -.I "Worm offline" -makes the WORM go offline, ready for ejecting. -This command is harmless; -accessing an offline drive will cause it to spin up and go online -without operator intervention. -.I "Worm offline" -only takes effect after the last close of the WORM -and as a bonus, applies to any MSCP device such as an RA81. -.PP -.I "Worm tmpdir" -saves a copy of the directory in -.BI /usr/worm/tmp/ vol_id -if the directory -.F /usr/worm/tmp -exists. -This will speed up subsequent access substantially, -although it will still be slower than -.I "worm btree" -below. -On the other hand, -.I worm tmpdir -typically takes 5 minutes to run (on a VAX 11/750) -whereas -.I worm btree -takes about 45 minutes. -.PP -.I "Worm btree" -constructs a new directory for the whole disk (in the form of a -.IR cbt (1) -database). -The new superblock is at zero. -All the worm commands go faster with such an index but it is intended to be done -just once, after the disk is complete. -The directory occupies of the order of 10MB but may be more. -If you really have to add more files to the disk, -you need to write zeros on the first 1K block of the WORM before using -.IR "worm write" . -.PP -.I "Worm dir" -takes the btree directory from the disk and stores in -.FR /usr/worm/dirs . -Future uses of the disk will be much faster. -.PP -.I "Worm mount" -returns the device on which the disk labelled -.I vol_id -is mounted. -If the drive(s) are busy and you have a jukebox, the -.BI -w s -option tells how many seconds to wait before failing. -The default is wait forever. -If no -.I vol_id -is given, print the drive status. -.PP -.I "Jukebox" -manages the disks in the SONY jukebox. -There are several options (default is -.BR -s ): -.TP 10 -.B -a -Allocate a blank disk and label it -.IR vol_id . -Use -.I "worm mkfs" -to change any fields from their default value. -.TP -.B -e -Eject the disk labeled -.I vol_id. -To physically retrieve the disk, -press the -.B OUT -button (the -.B "OUT READY" -light should be on). -Repeat until the -.B "IN READY" -light goes on. -.TP -.B -m -Mount the disk labelled -.I vol_id -in some drive and print the drive number on standard output. -.TP -.B -p -Print the list of disks in the jukebox. -.TP -.B -r -Rebuild the list of disks by examining each disk in the jukebox. -Do not do this unless you are sure you need to. -If -.I vol_id -is given, it should be one of the following letters and governs -how disks are assigned shelf numbers. -The default is to leave the shelf number unchanged. -Other options (mainly useful for demos) are -.B c -(compresses the disks in the jukebox towards the bottom or lower numbered shelves), -.B r -(distributes the disks randomly), and -.B s -(sorts the disks by vol_id). -.TP -.B -s -Print the status of the jukebox. -.TP -.B -u -Unload offline disks back onto their shelves. -.TP -.B -U -Unload all disks (offline or not) back onto their shelves. -.TP -.BI -w secs -This option only affects the behavior of -.BR -m . -If all drives are busy, try again for -.I secs -seconds before failing. -.PP -To load a disk into the jukebox, press the -.B IN -button on the jukebox when the -.B "IN READY" -light is on. -After the shutter opens, push the disk in firmly. -The disk (blank or initialised) is not examined immediately but on demand. -.SS Etiquette -Vol_ids should be unique as discussed above. -The file -.F /n/wild/usr/worm/vol_ids -contains known vol_ids. -The commands for reading and writing require vol_id's -to guard against accessing the wrong disk. -.PP -The recommended protocol for changing disks is -if no one appears to be using the drive -(by using -.IR ps (1)), -execute -.I "worm offline" -and go to the drive. -If, and only if, the drive has the DRIVE OFF (middle) light on, -hit the EJECT button and change disks. -If the light is not on, then -someone is still using the disk and you should wait until they are done -before hitting EJECT. -.SS Programming considerations -Programs should not depend on writing any block more than once; however, -our SONY optical disks implement a small number of multiple writes -via bad block replacement. -A -.IR read (2) -of an unwritten block returns with an errno of -.BR ENXIO . -On Vaxes, the WORM is an MSCP device; -thus geometry information can be fetched as in -.IR ra (4). -.PP -For maximum speed, read and write in large blocks (preferably 63K) -and avoid seeks. -A seek across the whole disk takes about 1 second. -.PP -The device -.F /dev/worm? -is simply an appropriate raw -.IR ra (4) -device, partition 7 (the whole disk). -.SH EXAMPLES -.EX -worm mkfs -c"512x512x24 movies" tdmoviesa -worm write tdmoviesa < filenames -worm read -d tdmoviesa bumblebee/act2/frame1 -.EE -.SH FILES -.F /dev/worm? -.br -.F /n/wild/usr/worm/vol_ids -.br -.F /n/wild/usr/worm/jukedir -.SH SEE ALSO -.IR backup (8), -.IR scsish (8), -.IR backup (1) -.SH BUGS -The output of -.I "worm ls" -is not necessarily sorted. diff --git a/static/v10/man8/xs.8 b/static/v10/man8/xs.8 deleted file mode 100644 index 7c7339d2..00000000 --- a/static/v10/man8/xs.8 +++ /dev/null @@ -1,63 +0,0 @@ -.TH XS 8 -.CT 1 sa_nonmortals -.SH NAME -xs \- checksums -.SH SYNOPSIS -.B xs -[ --s -] -[ --k -.I keystring -] -[ --f -.I official-list -] -.IR file ... -.SH DESCRIPTION -.I Xs -computes and reports -checksums of named files, -one report per line, in the form -.IP -filename s1 s2 s3 s4 -.LP -where the checksum comprises four groups of four hex digits each. -The checksum algorithm may be perturbed by specifying a -.I keystring -argument. -The -.B -s -argument causes the file's mode, label, owner and group -to enter into the checksum calculation. -.PP -The -.B -f -argument causes -.I xs -to verify checksums of files against -values -given -in the -.I official-list -file, which has the format of the output of an earlier -.I xs -run: -lines consisting of -one file name followed by four groups of hex digits per line. -Text after a -.L # -sign is ignored. -.PP -The checksum algorithm used is meant to be secure: to create a file -whose checksum agrees with that of another given file is very difficult. -.SH EXAMPLES -.EX -xs -s `find /bin -print` | xs /dev/stdin -.EE -.IP -This should return a different value if -.B /bin -changes in any way. diff --git a/static/v10/man8/xstr.8 b/static/v10/man8/xstr.8 deleted file mode 100644 index 681f2e2f..00000000 --- a/static/v10/man8/xstr.8 +++ /dev/null @@ -1,108 +0,0 @@ -.TH XSTR 8 -.CT 1 prog_c -.SH NAME -xstr \- preprocessor for sharing strings in C programs -.SH SYNOPSIS -.B xstr -[ -.B -c -] -[ -.B - -] -[ -.I file -] -.SH DESCRIPTION -.I Xstr -maintains a file -.F strings -into which strings in component parts of a large program are hashed. -These strings are replaced with references to this common area. -This serves to implement shared constant strings, most useful if they -are also read-only. -.PP -The command -.IP -.L -xstr -c name.c -.PP -will extract the strings from the named C source, replacing -string references by expressions of the form -.BI (&xstr[ number ]) -for some -.I number. -An appropriate declaration of -.I xstr -is prepended to the file. -The resulting C text is placed in the file -.BR x.c . -The strings from this file are placed in the -.F strings -data base if they are not there already. -Repeated strings and strings which are suffixes of existing strings -do not cause changes to the data base. -.PP -After all components of a large program have been compiled a file -.B xs.c -declaring the common -.I xstr -space can be created by running -.B xstr -with no arguments. -This -.B xs.c -file should then be compiled and loaded with the rest -of the program. -If possible, the array can be made read-only (shared) saving -space and swap overhead. -.PP -Without option -.BR -c , -creates files -.I x.c -and -.I xs.c -as before, but does not use or affect any -.F strings -file in the same directory. -.PP -It may be useful to run -.I xstr -after the C preprocessor if any macro definitions yield strings -or if there is conditional code which contains strings -which may not, in fact, be needed. -.I Xstr -reads from its standard input when the argument -.L - -is given. -An appropriate command sequence for running -.I xstr -after the C preprocessor is: -.IP -.EX -cc -E name.c | xstr -c - -cc -c x.c -mv x.o name.o -.EE -.SH FILES -.TF /tmp/xs* -.TP -.F strings -Data base of strings -.TP -.F x.c -Massaged C source -.TP -.F xs.c -C source for definition of array -.L xstr -.TP -.F /tmp/xs* -Temp file -.SH BUGS -If a string is a suffix of another string in the data base, -but the shorter string is seen first by -.I xstr -both strings will be placed in the data base, when just -placing the longer one there will do. |
