in the parameter list nor those encountered during the recursive copy.
Just copy them as symbolic link.
.LP
-There is no default - one should specify the desired behaviour.
+There is no default: one should specify the desired behaviour.
.SH "GNU DETAILS"
.PP
Generally, files are written just as they are read. For exceptions,
With file-utils 4.0 this option was implied by \-f.
.TP
.BI "\-\-sparse=" "WHEN"
-A `sparse file' contains `holes' - sequences of zero bytes that
+A `sparse file' contains `holes' \(em sequences of zero bytes that
do not occupy any physical disk blocks; the `read' system call
reads these as zeroes. This can both save considerable disk space
and increase speed, since many binary files contain lots of
.BR "\-\-target\-directory=\fIDIR\fP" " (since file-utils 4.1)"
Specify the destination directory. Meant for use with
.BR xargs (1),
-as in "ls | xargs cp --target-directory=../d".
+as in "ls | xargs cp \-\-target-directory=../d".
.TP
.B "\-u, \-\-update"
Do not copy a nondirectory that has an existing destination with
.IR mode ,
which can be either an octal number, or a symbolic mode as in
.BR chmod ,
-with 0 as the point of departure. The default mode is 0755 - read,
+with 0 as the point of departure. The default mode is 0755 \(em read,
write, and execute for the owner, and read and execute for group and other.
.TP
.BI "\-o " "owner" ", \-\-owner=" "owner"
and here typing Control-D ended the session.
The
.B "% "
-here was the command prompt - it is the shell's way of indicating
+here was the command prompt \(em it is the shell's way of indicating
that it is ready for the next command. The prompt can be customized
in lots of ways, and one might include stuff like user name,
machine name, current directory, time, etc.
.LP
The command
.I ls
-lists the contents of the current directory - it tells you what
+lists the contents of the current directory \(em it tells you what
files you have. With a \-l option it gives a long listing,
that includes the owner and size and date of the file, and the
permissions people have for reading and/or changing the file.
The command
.I find
(with a rather baroque syntax) will find files with given name
-or other properties. For example, "find . -name tel" would find
+or other properties. For example, "find . \-name tel" would find
the file "tel" starting in the present directory (which is called ".").
-And "find / -name tel" would do the same, but starting at the root
+And "find / \-name tel" would do the same, but starting at the root
of the tree. Large searches on a multi-GB disk will be time-consuming,
and it may be better to use
.BR locate (1).
The command
.I kill
allows you to get rid of them. Without option this is a friendly
-request: please go away. And "kill -9" followed by the number
+request: please go away. And "kill \-9" followed by the number
of the process is an immediate kill.
Foreground processes can often be killed by typing Control-C.
.SS "Getting information"
.B ln
can treat the destination just as it would a normal directory and
create the link in it. On the other hand, the destination can be
-viewed as a non-directory - as the symlink itself. In that case,
+viewed as a non-directory \(em as the symlink itself. In that case,
.B ln
must delete or backup that symlink before creating the new link.
The default is to treat a destination that is a symlink to a directory
Append a character to each file name indicating the file type. This is like
.B \-F
except that executables aren't marked.
-(In fact fileutils-4.0 treats the --file-type option like --classify.)
+(In fact fileutils-4.0 treats the \-\-file-type option like \-\-classify.)
.TP
.B "\-q, \-\-hide\-control\-chars"
Print question marks instead of nongraphic characters in file names. This
in the shell, an initial `.' in a filename does not match a wildcard at
the start of
.I pattern.
-For simple-minded root-kits: add LS_OPTIONS="$LS_OPTIONS -I mystuff"
+For simple-minded root-kits: add LS_OPTIONS="$LS_OPTIONS \-I mystuff"
in /etc/profile or so, to hide your directories.
.TP
.B "\-L, \-\-dereference"
.SH "EXAMPLE OF USE"
The command `\fIrmdir foo\fP' will remove the directory \fIfoo\fP
if it is empty. To remove a nonempty directory, together with everything
-below, use `\fIrm -r foo\fP'.
+below, use `\fIrm \-r foo\fP'.
.SH NOTES
This page describes
.B rmdir
.B time
to
.br
-.I bug-utils@prep.ai.mit.edu
+.I bug\-utils@prep.ai.mit.edu
.br
Please include the version of
.B time ,
which you can get by running
.br
-.I time --version
+.I time \-\-version
.br
and the operating system
and C compiler you used.
.I op
is O_DSYNC, this call is the asynchronous analog of
.BR fdatasync (2).
-Note that this is a request only - this call does not wait
+Note that this is a request only \- this call does not wait
for I/O completion.
.LP
Apart from
\-1 to 1, \fBasin()\fP fails and \fIerrno\fP is set.
.SH "RETURN VALUE"
The \fBasin()\fP function returns the arc sine in radians and the
-value is mathematically defined to be between -PI/2 and PI/2
+value is mathematically defined to be between \-PI/2 and PI/2
(inclusive).
.SH ERRORS
.TP
the value whose tangent is \fIx\fP.
.SH "RETURN VALUE"
The \fBatan()\fP function returns the arc tangent in radians and the
-value is mathematically defined to be between -PI/2 and PI/2
+value is mathematically defined to be between \-PI/2 and PI/2
(inclusive).
.SH "CONFORMING TO"
SVID 3, POSIX, BSD 4.3, ISO 9899.
arguments are used to determine the quadrant of the result.
.SH "RETURN VALUE"
The \fBatan2()\fP function returns the result in radians, which
-is between -PI and PI (inclusive).
+is between \-PI and PI (inclusive).
.SH "CONFORMING TO"
SVID 3, POSIX, BSD 4.3, ISO 9899.
The float and long double variants are C99 requirements.
If y = cacos(z), then z = ccos(y).
The real part of y is chosen in the interval [0,pi].
.LP
-One has cacos(z) = -i clog(z+csqrt(z*z-1)).
+One has cacos(z) = \-i clog(z+csqrt(z*z-1)).
.SH "CONFORMING TO"
C99
.SH "SEE ALSO"
The real part of y is chosen in the interval [-pi/2,pi/2].
.LP
One has
-casin(z) = -i clog(iz+csqrt(1-z*z)).
+casin(z) = \-i clog(iz+csqrt(1-z*z)).
.SH "CONFORMING TO"
C99
.SH "SEE ALSO"
.BR CMSG_DATA ,
and
.B CMSG_ALIGN
-are constant expressions (assuming their argument is constant) -
+are constant expressions (assuming their argument is constant);
this could be used to declare the size of global
variables. This may be not portable, however.
.SH "CONFORMS TO"
The entire key is significant here (instead of only the first
8 bytes).
.LP
-Programs using this function must be linked with -lcrypt.
+Programs using this function must be linked with \-lcrypt.
.SH "CONFORMING TO"
SVID, X/OPEN, BSD 4.3, POSIX 1003.1-2001
.SH "SEE ALSO"
with nonnegative real part, and
with a branch cut along the negative real axis.
(That means that csqrt(-1+eps*I) will be close to I while
-csqrt(-1-eps*I) will be close to -I, if eps is a small positive
+csqrt(-1-eps*I) will be close to \-I, if eps is a small positive
real number.)
.SH "CONFORMING TO"
C99
or
.B _SVID_SOURCE
is defined (either explicitly, or implicitly, by not defining
-_POSIX_SOURCE or compiling with the -ansi flag).
+_POSIX_SOURCE or compiling with the \-ansi flag).
.SH "CONFORMING TO"
This is a BSD extension, present in 4.3BSD-Reno, not in 4.2BSD.
Present in libc5 (since 5.1.2) and in glibc2.
with the following command:
.RS
.LP
-gcc -rdynamic -o foo foo.c -ldl
+gcc \-rdynamic \-o foo foo.c \-ldl
.RE
.PP
Libraries exporting _init() and _fini() will want to be compiled as
follows, using bar.c as the example name:
.RS
.LP
-gcc -shared -nostartfiles -o bar bar.c
+gcc \-shared \-nostartfiles \-o bar bar.c
.RE
.SH NOTES
The symbols RTLD_DEFAULT and RTLD_NEXT are defined by
.BI "void encrypt_r (char *" block ", int " edflag ", struct crypt_data *" data );
.sp
Each of these requires linking with
-.BR -lcrypt .
+.BR \-lcrypt .
.SH DESCRIPTION
These functions encrypt and decrypt 64-bit messages. The
.B setkey()
erf(x) = 2/sqrt(pi)* integral from 0 to x of exp(-t*t) dt
.PP
The \fBerfc()\fP function returns the complementary error function of
-\fIx\fP, that is 1.0 - erf(x).
+\fIx\fP, that is 1.0 \- erf(x).
.SH "CONFORMING TO"
SVID 3, BSD 4.3, C99.
The float and long double variants are requirements of C99.
No such process
.TP
.B ESTALE
-Reserved
+Stale file handle
+.\" Can occur for NFS and for other file systems
.\" ETIME is part of XSR option
.TP
.B ETIME
.BI "long double exp2l(long double " x );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The \fBexp2()\fP function returns the value of 2
raised to the power of \fIx\fP.
.br
.BI "long double fdiml(long double " x ", long double " y );
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions return max(\fIx\fP-\fIy\fP,0).
If
.SH NAME
feclearexcept, fegetexceptflag, feraiseexcept, fesetexceptflag,
fetestexcept, fegetenv, fegetround, feholdexcept, fesetround,
-fesetenv, feupdateenv - C99 floating point rounding and exception handling
+fesetenv, feupdateenv \- C99 floating point rounding and exception handling
.SH SYNOPSIS
.nf
.B #include <fenv.h>
It may occur whenever Overflow or Underflow occurs.
.LP
The Invalid exception occurs when there is no well-defined result
-for an operation, as for 0/0 or infinity - infinity or sqrt(-1).
+for an operation, as for 0/0 or infinity \- infinity or sqrt(-1).
.SS "Exception handling"
Exceptions are represented in two ways: as a single bit
(exception present/absent), and these bits correspond in some
.BI "long double fmal(long double " x ", long double " y ", long double " z );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The
.B fma()
.br
.BI "long double fmaxl(long double " x ", long double " y );
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
Find the larger value of x and y.
.SH "CONFORMING TO"
.br
.BI "long double fminl(long double " x ", long double " y );
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
Find the lesser value of x and y.
.SH "CONFORMING TO"
.BI "int isinf(" x );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
Floating point numbers can have special values, such as
infinite or NaN. With the macro
is only available if
.B _BSD_SOURCE
is defined (either explicitly, or implicitly, by not defining
-_POSIX_SOURCE or compiling with the -ansi flag).
+_POSIX_SOURCE or compiling with the \-ansi flag).
.SH "SEE ALSO"
.BR getgroups (2),
.BR setgroups (2)
.BI "int isunordered(x,y);
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The normal relation operations (like less) will fail if one of the
operands is NaN. This will cause an exception. To avoid this, C99 defines
.BI "long double lgammal_r(long double " x ", int *" signp );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
For the definition of the Gamma function, see
.BR tgamma (3).
.BI "long double log1pl(long double " x );
.sp
.fi
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
.BI log1p( x )
returns a value equivalent to `log (1 + \fIx\fP)'. It is computed in a way
.BI "long double log2l(long double " x );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The \fBlog2()\fP function returns the base 2 logarithm of \fIx\fP.
.SH ERRORS
.BI "long long int llrintl(long double " x );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round their argument to the nearest integer value,
using the current rounding direction.
.BI "long long int llroundl(long double " x );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round their argument to the nearest integer value,
rounding away from zero, regardless of the current rounding direction.
.br
.BI "long double nanl(const char *" tagp );
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions return a representation (determined by
.IR tagp )
.sp
.BI "pid_t forkpty(int *" amaster ", char *" name ", struct termios *" termp ", struct winsize *" winp );
.sp
-Link with -lutil.
+Link with \-lutil.
.SH DESCRIPTION
The
.B openpty()
.SH BUGS
It is not advisable to mix calls to output functions from the
.B stdio
-library with low - level calls to
+library with low-level calls to
.B write()
for the file descriptor associated with the same output stream; the results
will be undefined and very probably not what you want.
.BI "long double roundl(long double " x );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round \fIx\fP to the nearest integer, but
round halfway cases away from zero (regardless of the current rounding
.br
.BI "long double scalblnl(long double " x ", long int " exp );
.sp
-Link with -lm.
+Link with \-lm.
.SH DESCRIPTION
These functions multiply their first argument
.I x
.SH "RETURN VALUE"
These functions return the number of input items assigned, which can be
fewer than provided for, or even zero, in the event of a matching failure.
-Zero indicates that, while there was input available, no conversions were
-assigned; typically this is due to an invalid input character, such as an
-alphabetic character for a `%d' conversion. The value
+A return of zero indicates that, while there was input available,
+no conversions were assigned;
+typically this is due to an invalid input character, such as an
+alphabetic character for a `%d' conversion.
+
+The value
+.B EOF
+is returned if the end of input is reached before the first
+successful conversion or matching failure.
.B EOF
-is returned if an input failure occurs before any conversion such as an
-end-of-file occurs. If an error or end-of-file occurs after conversion has
+is also returned if a read error occurs,
+in which case the error indicator for the stream (see
+.BR ferror (3))
+is set, and
+.I errno
+is set indicate the error.
+
+If an error or end-of-file occurs after conversion has
begun, the number of conversions which were successfully completed is
returned.
.SH "SEE ALSO"
.sp
.BI "int signbit (" X ");"
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
`signbit' is a generic macro which can work on all real floating-point
types. It returns a non-zero value if the value of X has its sign
.br
.BI "long double tgammal(long double " x );
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
The Gamma function is defined by
.sp
.B """C"""
locale does not know about umlauts, so no conversion is done for them.
.PP
-In some non - English locales, there are lowercase letters with no
+In some non-English locales, there are lowercase letters with no
corresponding uppercase equivalent; the German sharp s is one
example.
.SH "SEE ALSO"
.BI "long double truncl(long double " x );
.fi
.sp
-Compile with -std=c99; link with \-lm.
+Compile with \-std=c99; link with \-lm.
.SH DESCRIPTION
These functions round \fIx\fP to the nearest integer
not larger in absolute value.
.IR "screen positions" .
The array must contain a terminating null byte, unless a precision is given
and it is so small that the number of converted wide characters reaches it
-before the end of the array is reached. -- If an
+before the end of the array is reached. If an
.B l
modifier is present: The
.IR "" `` "const wchar_t *" ''
(b) ask
.BR openvt (1)
to start a process on the console;
-(c) start X - it will find the first unused console,
+(c) start X \(em it will find the first unused console,
and display its output there.
(There is also the ancient
.BR doshell (8).)
.SH "CHARACTER SETS"
The kernel knows about 4 translations of bytes into console-screen symbols.
-The four tables are: a) Latin1 -> PC, b) VT100 graphics -> PC, c) PC -> PC,
-d) user-defined.
+The four tables are: a) Latin1 \-> PC,
+b) VT100 graphics \-> PC, c) PC \-> PC, d) user-defined.
There are two character sets, called G0 and G1, and one of them
is the current character set. (Initially G0.)
FIFO special files can be created by
.BR mkfifo (3),
and are specially indicated in
-.IR "ls -l" .
+.IR "ls \-l" .
.SH "SEE ALSO"
.BR mkfifo (1),
.BR open (2),
They are typically created by:
.RS
.sp
-mknod -m 660 /dev/hda b 3 0
+mknod \-m 660 /dev/hda b 3 0
.br
-mknod -m 660 /dev/hda1 b 3 1
+mknod \-m 660 /dev/hda1 b 3 1
.br
-mknod -m 660 /dev/hda2 b 3 2
+mknod \-m 660 /dev/hda2 b 3 2
.br
\&...
.br
-mknod -m 660 /dev/hda8 b 3 8
+mknod \-m 660 /dev/hda8 b 3 8
.br
-mknod -m 660 /dev/hdb b 3 64
+mknod \-m 660 /dev/hdb b 3 64
.br
-mknod -m 660 /dev/hdb1 b 3 65
+mknod \-m 660 /dev/hdb1 b 3 65
.br
-mknod -m 660 /dev/hdb2 b 3 66
+mknod \-m 660 /dev/hdb2 b 3 66
.br
\&...
.br
-mknod -m 660 /dev/hdb8 b 3 72
+mknod \-m 660 /dev/hdb8 b 3 72
.br
chown root:disk /dev/hd*
.RE
It is typically created by:
.RS
.sp
-mknod -m 660 /dev/mem c 1 1
+mknod \-m 660 /dev/mem c 1 1
.br
chown root:kmem /dev/mem
.sp
It is typically created by:
.RS
.sp
-mknod -m 640 /dev/kmem c 1 2
+mknod \-m 640 /dev/kmem c 1 2
.br
chown root:kmem /dev/kmem
.sp
It is typically created by:
.RS
.sp
-mknod -m 660 /dev/port c 1 4
+mknod \-m 660 /dev/port c 1 4
.br
chown root:mem /dev/port
.sp
\fBnull\fP and \fBzero\fP are typically created by:
.RS
.sp
-mknod -m 666 /dev/null c 1 3
+mknod \-m 666 /dev/null c 1 3
.br
-mknod -m 666 /dev/zero c 1 5
+mknod \-m 666 /dev/zero c 1 5
.br
chown root:root /dev/null /dev/zero
.sp
It is typically created by:
.RS
.sp
-mknod -m 660 /dev/ram b 1 1
+mknod \-m 660 /dev/ram b 1 1
.br
chown root:disk /dev/ram
.sp
.BR ioctl (2)
parameter is required, and it is NULL, then
.IR ioctl ()
-will return -EINVAL.
+will return \-EINVAL.
.SH FILES
/dev/sd[a-h]: the whole device
.br
.br
.IR Dynamic
-Interrupt moderation might be applied on the adapter card, depending on the load of the system. If the driver detects that the system load is too high, the driver tries to shield the system against too much network load by enabling interrupt moderation. If - at a later time - the CPU utilization decreases again (or if the network load is negligible) the interrupt moderation will automatically be disabled.
+Interrupt moderation might be applied on the adapter card, depending on the load of the system. If the driver detects that the system load is too high, the driver tries to shield the system against too much network load by enabling interrupt moderation. If \(em at a later time \(em the CPU utilization decreases again (or if the network load is negligible) the interrupt moderation will automatically be disabled.
-Interrupt moderation should be used when the driver has to handle one or more interfaces with a high network load, which - as a consequence - leads also to a high CPU utilization. When moderation is applied in such high network load situations, CPU load might be reduced by 20-30% on slow computers.
+Interrupt moderation should be used when the driver has to handle one or more interfaces with a high network load, which \(em as a consequence \(em leads also to a high CPU utilization. When moderation is applied in such high network load situations, CPU load might be reduced by 20-30% on slow computers.
Note that the drawback of using interrupt moderation is an increase of the round-trip-time (RTT), due to the queuing and serving of interrupts at dedicated
moderation times.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
-.TH ST 4 2005-03-13 "Linux 2.0 - 2.6" "Linux Programmer's Manual"
+.TH ST 4 2005-03-13 "Linux 2.0 \- 2.6" "Linux Programmer's Manual"
.SH NAME
st \- SCSI tape device
.SH SYNOPSIS
They are typically created by:
.RS
.sp
-mknod -m 660 /dev/ttyS0 c 4 64 # base address 0x3f8
+mknod \-m 660 /dev/ttyS0 c 4 64 # base address 0x3f8
.br
-mknod -m 660 /dev/ttyS1 c 4 65 # base address 0x2f8
+mknod \-m 660 /dev/ttyS1 c 4 65 # base address 0x2f8
.br
-mknod -m 660 /dev/ttyS2 c 4 66 # base address 0x3e8
+mknod \-m 660 /dev/ttyS2 c 4 66 # base address 0x3e8
.br
-mknod -m 660 /dev/ttyS3 c 4 67 # base address 0x2e8
+mknod \-m 660 /dev/ttyS3 c 4 67 # base address 0x2e8
.br
chown root:tty /dev/ttyS[0-3]
.sp
You may do a screendump on vt3 by switching to vt1 and typing
\fIcat /dev/vcs3 >foo\fP. Note that the output does not contain
newline characters, so some processing may be required, like
-in \fIfold -w 81 /dev/vcs3 | lpr\fP or (horrors)
-\fIsetterm -dump 3 -file /proc/self/fd/1\fP.
+in \fIfold \-w 81 /dev/vcs3 | lpr\fP or (horrors)
+\fIsetterm \-dump 3 \-file /proc/self/fd/1\fP.
.LP
The \fI/dev/vcsa0\fP device is used for Braille support.
.br
Jean Tourrilhes \- jt@hplb.hpl.hp.com
.br
-(+ others - see source code for details)
+(and others; see source code for details)
.\"
.\" SEE ALSO part
.\"
.B #include <complex.h>
.SH DESCRIPTION
Complex numbers are numbers of the form z = a+b*i, where a and b are
-real numbers and i = sqrt(-1), so that i*i = -1.
+real numbers and i = sqrt(\-1), so that i*i = \-1.
.br
There are other ways to represent that number. The pair (a,b) of real
numbers may be viewed as a point in the plane, given by X- and
.TP
.B addition: z+w = (a+c) + (b+d)*i
.TP
-.B multiplication: z*w = (a*c - b*d) + (a*d + b*c)*i
+.B multiplication: z*w = (a*c \- b*d) + (a*d + b*c)*i
.TP
-.B division: z/w = ((a*c + b*d)/(c*c + d*d)) + ((b*c - a*d)/(c*c + d*d))*i
+.B division: z/w = ((a*c + b*d)/(c*c + d*d)) + ((b*c \- a*d)/(c*c + d*d))*i
.PP
Nearly all math function have a complex counterpart but there are
some complex only functions.
.SH EXAMPLE
Your C-compiler can work with complex numbers if it supports the C99 standard.
-Link with -lm. The imaginary unit is represented by I.
+Link with \-lm. The imaginary unit is represented by I.
.sp
.nf
/* check that exp(i*pi) == -1 */
.SH "ESCAPE SEQUENCES"
To specify control- or blank characters in the color sequences or
filename extensions, either C-style \e-escaped notation or
-.BR stty -style
+.BR stty \-style
^-notation can be used. The C-style notation
includes the following characters:
.sp
.PP
The file uses the following format:
.TP
-\fI[ + | - ]\fP \fI[hostname]\fP \fI[username]\fP
+\fI[ + | \- ]\fP \fI[hostname]\fP \fI[username]\fP
.PP
The \fIhostname\fP is the name of a host which is logically equivalent
to the local host. Users logged into that host are allowed to access
The \fIhostname\fP may be (optionally) preceded by a plus (+) sign.
If the plus sign is used alone it allows any host to access your system.
You can explicitly deny access to a host by preceding the \fIhostname\fP
-by a minus (-) sign. Users from that host must always supply a password.
+by a minus (\-) sign. Users from that host must always supply a password.
For security reasons you should always use the FQDN of the hostname and
not the short hostname.
.PP
user is NOT restricted to like-named accounts. The \fIusername\fP may
be (optionally) preceded by a plus (+) sign. You can also explicitly
deny access to a specific user by preceding the \fIusername\fP with
-a minus (-) sign. This says that the user is not trusted no matter
+a minus (\-) sign. This says that the user is not trusted no matter
what other entries for that host exist.
.PP
Netgroups can be specified by preceding the netgroup by an @ sign.
.\"
.TH NSCD.CONF 5 1999-10 "GNU C Library"
.SH NAME
-/etc/nscd.conf - name service cache daemon configuration file
+/etc/nscd.conf \- name service cache daemon configuration file
.SH DESCRIPTION
The file
.B /etc/nscd.conf
locked or a server currently cannot accept more connections. The
default action is `continue'.
.LP
-.SS Interaction with +/- syntax (compat mode)
+.SS Interaction with +/\- syntax (compat mode)
Linux libc5 without NYS does not have the name service switch but does
allow the user some policy control. In
.B /etc/passwd
you could have entries of the form +user or +@netgroup
(include the specified user from the NIS passwd map),
--user or -@netgroup (exclude the specified user),
+\-user or \-@netgroup (exclude the specified user),
and + (include every user, except the excluded ones, from the NIS
passwd map). Since most people only put a + at the end of
.B /etc/passwd
.ft
Note that the pwd command is often a shell builtin, and might
-not work properly. In bash, you may use pwd -P.
+not work properly. In bash, you may use pwd \-P.
.TP
.I /proc/[number]/environ
This file contains the environment for the process.
.I /proc/[number]/exe
Under Linux 2.2 and later, this file is a symbolic link
containing the actual path name of the executed command.
-This symbolic link can be dereferenced normally - attempting to open
+This symbolic link can be dereferenced normally; attempting to open
it will open the executable. You can even type
.I /proc/[number]/exe
to run another copy of the same executable as is being run by
MFM, etc. drives) minor 01 (first partition on the first drive).
.BR find (1)
-with the -inum option can be used to locate the file.
+with the \-inum option can be used to locate the file.
.TP
.I /proc/[number]/fd
This is a subdirectory containing one entry for each file which the
Programs that will take a filename, but will not take the standard
input, and which write to a file, but will not send their output to
-standard output, can be effectively foiled this way, assuming that -i
-is the flag designating an input file and -o is the flag designating
+standard output, can be effectively foiled this way, assuming that \-i
+is the flag designating an input file and \-o is the flag designating
an output file:
.br
.nf
This is the "channel" in which the process is waiting. It is the
address of a system call, and can be looked up in a namelist if you
need a textual name. (If you have an up-to-date /etc/psdatabase, then
-try \fIps -l\fP to see the WCHAN field in action.)
+try \fIps \-l\fP to see the WCHAN field in action.)
.TP
\fInswap\fP %lu
-Number of pages swapped - not maintained.
+Number of pages swapped (not maintained).
.TP
\fIcnswap\fP %lu
-Cumulative \fInswap\fP for child processes - not maintained.
+Cumulative \fInswap\fP for child processes (not maintained).
.TP
\fIexit_signal\fP %d
Signal to be sent to parent when we die.
.SH CAVEATS
Note that many strings (i.e., the environment and command line) are in
the internal format, with sub-fields terminated by NUL bytes, so you
-may find that things are more readable if you use \fIod -c\fP or \fItr
+may find that things are more readable if you use \fIod \-c\fP or \fItr
"\\000" "\\n"\fP to read them.
Alternatively, \fIecho `cat <file>`\fP works well.
`ad' for Atari ACSI disk, with Y in `a'-`e',
`ez' for a Syquest EZ135 parallel port removable drive, with Y=`a',
`xd' for XT compatible disk, with Y either `a' or `b'; `fd' for
-floppy disk, with Y the floppy drive number - fd0 would be
+floppy disk, with Y the floppy drive number \(em fd0 would be
the DOS `A:' drive, and fd1 would be `B:'), Y the driver letter or
number, and N the number (in decimal) of the partition on this device
(absent in the case of floppies). Recent kernels allow many other
as `readonly' so that filesystem consistency check programs (fsck)
can do their work on a quiescent file system. No processes can
write to files on the filesystem in question until it is `remounted'
-as read/write capable, e.g., by `mount -w -n -o remount /'.
+as read/write capable, e.g., by `mount \-w \-n \-o remount /'.
(See also
.BR mount (8).)
operation with initrd, it should not go through the above steps, but
leave the initrd data under
.IR /dev/initrd .
-(This device can be used only once - the data is freed as soon as
+(This device can be used only once: the data is freed as soon as
the last process that used it has closed
.IR /dev/initrd .)
The standard disk driver can accept geometry arguments for the disks
similar to the IDE driver. Note however that it only expects three
-values (C/H/S) -- any more or any less and it will silently ignore
+values (C/H/S); any more or any less and it will silently ignore
you. Also, it only accepts `hd=' as an argument, i.e. `hda='
and so on are not valid here. The format is as follows:
.IP
where each deviceN value is of the following format 0xTaaaId and the
bytes are used as follows:
-T - device type: 1=FM, 2=SB, 3=PAS, 4=GUS, 5=MPU401, 6=SB16,
+T \- device type: 1=FM, 2=SB, 3=PAS, 4=GUS, 5=MPU401, 6=SB16,
7=SB16-MPU401
-aaa - I/O address in hex.
+aaa \- I/O address in hex.
-I - interrupt line in hex (i.e 10=a, 11=b, ...)
+I \- interrupt line in hex (i.e 10=a, 11=b, ...)
-d - DMA channel.
+d \- DMA channel.
As you can see it gets pretty messy, and you are better off to compile
in your own personal values as recommended. Using a boot arg of
set, etc. etc.
.LP
A 96-character set is designated as G\fIn\fP character set
-by an escape sequence ESC - xx (for G1), ESC . xx (for G2)
+by an escape sequence ESC \- xx (for G1), ESC . xx (for G2)
or ESC / xx (for G3).
-For example, ESC - G selects the Hebrew alphabet as G1.
+For example, ESC \- G selects the Hebrew alphabet as G1.
.LP
A multibyte character set is designated as G\fIn\fP character set
by an escape sequence ESC $ xx or ESC $ ( xx (for G0),
can only be invoked for codes with the high order bit set.
In particular, ^N and ^O are not used anymore, ESC ( xx
can be used only with xx=B, and ESC ) xx, ESC * xx, ESC + xx
-are equivalent to ESC - xx, ESC . xx, ESC / xx, respectively.
+are equivalent to ESC \- xx, ESC . xx, ESC / xx, respectively.
.SH "SEE ALSO"
.BR console (4),
.SS Ranges
There is one special convention:
-two characters separated by `-' denote a range.
-(Thus, `[A-Fa-f0-9]' is equivalent to `[ABCDEFabcdef0123456789]'.)
-One may include `-' in its literal meaning by making it the
+two characters separated by `\-' denote a range.
+(Thus, `[A\-Fa\-f0\-9]' is equivalent to `[ABCDEFabcdef0123456789]'.)
+One may include `\-' in its literal meaning by making it the
first or last character between the brackets.
-(Thus, `[]-]' matches just the two characters `]' and `-',
-and `[--0]' matches the three characters `-', `.', `0', since `/'
+(Thus, `[]\-]' matches just the two characters `]' and `\-',
+and `[\-\-0]' matches the three characters `\-', `.', `0', since `/'
cannot be matched.)
.SS Complementation
An expression `[!...]' matches a single character, namely
any character that is not matched by the expression obtained
by removing the first `!' from it.
-(Thus, `[!]a-]' matches any single character except `]', `a' and `-'.)
+(Thus, `[!]a\-]' matches any single character except `]', `a' and `\-'.)
One can remove the special meaning of `?', `*' and `[' by
preceding them by a backslash, or, in case this is part of
.SH PATHNAMES
Globbing is applied on each of the components of a pathname
separately. A `/' in a pathname cannot be matched by a `?' or `*'
-wildcard, or by a range like `[.-0]'. A range cannot contain an
+wildcard, or by a range like `[.\-0]'. A range cannot contain an
explicit `/' character; this would lead to a syntax error.
If a filename starts with a `.', this character must be matched explicitly.
.SS Character classes and Internationalization
Of course ranges were originally meant to be ASCII ranges,
-so that `[ -%]' stands for `[ !"#$%]' and `[a-z]' stands
+so that `[\ \-%]' stands for `[\ !"#$%]' and `[a\-z]' stands
for "any lowercase letter".
-Some Unix implementations generalized this so that a range X-Y
+Some Unix implementations generalized this so that a range X\-Y
stands for the set of characters with code between the codes for
X and for Y. However, this requires the user to know the
character coding in use on the local system, and moreover, is
and (iii) ranges. POSIX specifies ranges in an internationally
more useful way and adds three more types:
-(iii) Ranges X-Y comprise all characters that fall between X
+(iii) Ranges X\-Y comprise all characters that fall between X
and Y (inclusive) in the current collating sequence as defined
by the LC_COLLATE category in the current locale.
[:digit:] [:graph:] [:lower:] [:print:]
[:punct:] [:space:] [:upper:] [:xdigit:]
.fi
-so that one can say `[[:lower:]]' instead of `[a-z]', and have
+so that one can say `[[:lower:]]' instead of `[a\-z]', and have
things work in Denmark, too, where there are three letters past `z'
in the alphabet.
These character classes are defined by the LC_CTYPE category
.TP
.BR ip_nonlocal_bind " (Boolean; default: disabled)"
If set, allows processes to bind() to non-local IP addresses,
-which can be quite useful - but may break some applications.
+which can be quite useful, but may break some applications.
.\"
.\" The following is from 2.6.12: Doumentation/networking/ip-sysctl.txt
.TP
.SS "Relative Margin Indent"
.TP 9m
.BI \&.RS " i"
-Start relative margin indent - moves the left margin
+Start relative margin indent: moves the left margin
.I i
to the right (if
.I i
.B mr_type
parameter specifies which action to perform.
.B PACKET_MR_PROMISC
-enables receiving all packets on a shared medium - often known as
-``promiscuous mode'',
+enables receiving all packets on a shared medium (often known as
+``promiscuous mode''),
.B PACKET_MR_MULTICAST
binds the socket to the physical layer multicast group specified in
.B mr_address
.RB ( sched_setaffinity (2))
.SS "Compiling on Linux"
On Linux, programs that use the Pthreads API should be compiled using
-.IR "cc -pthread" .
+.IR "cc \-pthread" .
.SS "Linux Implementations of POSIX Threads"
Over time, two threading implementations have been provided by
the GNU C library on Linux:
and should not be used in portable programs.
Linux 2.0 enabled some bug-to-bug compatibility with BSD in the raw socket code
-when the SO_BSDCOMPAT flag was set - that has been removed in 2.2.
+when the SO_BSDCOMPAT flag was set \- that has been removed in 2.2.
.SH BUGS
Transparent proxy extensions are not described.
.\"
.TH SOCKET 7 2004-05-27 "Linux 2.6.6" "Linux Programmer's Manual"
.SH NAME
-socket - Linux socket interface
+socket \- Linux socket interface
.SH SYNOPSIS
.B #include <sys/socket.h>
.br
that are understood by many tools.
Note that many tools using URIs also have internal schemes or specialized
schemes; see those tools' documentation for information on those schemes.
-.SS "http - Web (HTTP) server"
+.SS "http \- Web (HTTP) server"
.RI http:// ip_server / path
.br
.RI http:// ip_server / path ? query
interaction mechanism (called POST) which does not include the data in the URI.
See the Common Gateway Interface specification at
<http://www.w3.org/CGI> for more information.
-.SS "ftp - File Transfer Protocol (FTP)"
+.SS "ftp \- File Transfer Protocol (FTP)"
.RI ftp:// ip_server / path
.PP
This is a URL accessing a file through the file transfer protocol (FTP).
Internet email address.
An example is
<ftp://ftp.is.co.za/rfc/rfc1808.txt>.
-.SS "gopher - Gopher server"
+.SS "gopher \- Gopher server"
.RI gopher:// ip_server / "gophertype selector"
.br
.RI gopher:// ip_server / "gophertype selector" %09 search
Gopher selector strings are a sequence of octets which may contain
any octets except 09 hexadecimal (US-ASCII HT or tab), 0A hexadecimal
(US-ASCII character LF), and 0D (US-ASCII character CR).
-.SS "mailto - Email address"
+.SS "mailto \- Email address"
.RI mailto: email-address
.PP
This is an email address, usually of the form
for more information on the correct format of an email address.
Note that any % character must be rewritten as %25.
An example is <mailto:dwheeler@dwheeler.com>.
-.SS "news - Newsgroup or News message"
+.SS "news \- Newsgroup or News message"
.RI news: newsgroup-name
.br
.RI news: message-id
.IR unique @ full_domain_name .
A message identifier may be distinguished from a news group name by the
presence of the "@" character.
-.SS "telnet - Telnet login"
+.SS "telnet \- Telnet login"
.RI telnet:// ip_server /
.PP
The Telnet URL scheme is used to designate interactive text services that
may be accessed by the Telnet protocol. The final "/" character may be omitted.
The default port is 23.
An example is <telnet://melvyl.ucop.edu/>.
-.SS "file - Normal file"
+.SS "file \- Normal file"
.RI file:// ip_server / path_segments
.br
.RI file: path_segments
specify the scheme at all; use a relative address like <../test.txt>,
which has the side-effect of being scheme-independent.
An example of this scheme is <file:///etc/passwd>.
-.SS "man - Man page documentation"
+.SS "man \- Man page documentation"
.RI man: command-name
.br
.RI man: command-name ( section )
This URI scheme is unique to Unix-like systems (such as Linux)
and is not currently registered by the IETF.
An example is <man:ls(1)>.
-.SS "info - Info page documentation"
+.SS "info \- Info page documentation"
.RI info: virtual-filename
.br
.RI info: virtual-filename # nodename
nodename is assumed to be "Top".
Examples of the GNOME format are <info:gcc> and <info:gcc#G++_and_GCC>.
Examples of the KDE format are <info:(gcc)> and <info:(gcc)G++ and GCC>.
-.SS "whatis - Documentation search"
+.SS "whatis \- Documentation search"
.RI whatis: string
.PP
This scheme searches the database of short (one-line) descriptions of commands
.BR whatis (1).
This URI scheme is unique to Unix-like systems (such as Linux)
and is not currently registered by the IETF.
-.SS "ghelp - GNOME help documentation"
+.SS "ghelp \- GNOME help documentation"
.RI ghelp: name-of-application
.PP
This loads GNOME help for the given application.
Note that not much documentation currently exists in this format.
-.SS "ldap - Lightweight Directory Access Protocol"
+.SS "ldap \- Lightweight Directory Access Protocol"
.RI ldap:// hostport
.br
.RI ldap:// hostport /
.RS
ldap://host.com:6666/o=University%20of%20Michigan,c=US??sub?(cn=Babs%20Jensen)
.RE
-.SS "wais - Wide Area Information Servers"
+.SS "wais \- Wide Area Information Servers"
.RI wais:// hostport / database
.br
.RI wais:// hostport / database ? search
decimal digits, and the following
limited set of punctuation marks and symbols:
.IP
- - _ . ! ~ * ' ( )
+ \- _ . ! ~ * ' ( )
.PP
All other characters must be escaped.
An escaped octet is encoded as a character triplet, consisting of the
the HTML 4.01 specification (section B.2) and
IETF RFC 2718 (section 2.2.5) recommend the following approach:
.IP 1. 4
-translate the character sequences into UTF-8 (IETF RFC 2279) - see
+translate the character sequences into UTF-8 (IETF RFC 2279) \(em see
.BR utf-8 (7)
-- and then
+\(em and then
.IP 2.
use the URI escaping mechanism, that is,
use the %HH encoding for unsafe octets.
The following byte sequences are used to represent a character. The
sequence to be used depends on the UCS code number of the character:
.TP 0.4i
-0x00000000 - 0x0000007F:
+0x00000000 \- 0x0000007F:
.RI 0 xxxxxxx
.TP
-0x00000080 - 0x000007FF:
+0x00000080 \- 0x000007FF:
.RI 110 xxxxx
.RI 10 xxxxxx
.TP
-0x00000800 - 0x0000FFFF:
+0x00000800 \- 0x0000FFFF:
.RI 1110 xxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.TP
-0x00010000 - 0x001FFFFF:
+0x00010000 \- 0x001FFFFF:
.RI 11110 xxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.TP
-0x00200000 - 0x03FFFFFF:
+0x00200000 \- 0x03FFFFFF:
.RI 111110 xx
.RI 10 xxxxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.RI 10 xxxxxx
.TP
-0x04000000 - 0x7FFFFFFF:
+0x04000000 \- 0x7FFFFFFF:
.RI 1111110 x
.RI 10 xxxxxx
.RI 10 xxxxxx
.BR /etc/ld.so.cache
which contains a compiled list of candidate libraries previously found
in the augmented library path. If, however, the binary was linked with
-.B -z nodeflib
+.B \-z nodeflib
linker option, libraries in the default library paths are skipped.
.IP o
In the default path
and then
.BR /usr/lib .
If the binary was linked with
-.B -z nodeflib
+.B \-z nodeflib
linker option, this step is skipped.
.SH SYNOPSIS
The dynamic linker can be run either indirectly through running some
[OPTIONS] [PROGRAM [ARGUMENTS]]
.SH COMMAND LINE OPTIONS
.TP
-.B --list
+.B \-\-list
List all dependencies and how they are resolved.
.TP
-.B --verify
+.B \-\-verify
Verify that program is dynamically linked and this dynamic linker can handle
it.
.TP
-.B --library-path PATH
+.B \-\-library\-path PATH
Override
.B LD_LIBRARY_PATH
environment variable setting (see below).
.TP
-.B --ignore-rpath LIST
+.B \-\-ignore\-rpath LIST
Ignore RPATH and RUNPATH information in object names in LIST.
This option has been supported by glibc2 for about one hour.
Then it was renamed into:
.TP
-.B --inhibit-rpath LIST
+.B \-\-inhibit\-rpath LIST
.SH ENVIRONMENT
There are four important environment variables.
.TP
program if querying information about the program (ie. either
.B LD_TRACE_LOADED_OBJECTS
has been set, or
-.B --list
+.B \-\-list
or
-.B --verify
+.B \-\-verify
options have been given to the dynamic linker).
.TP
.B LD_PROFILE
.B LD_AOUT_LIBRARY_PATH
(libc5)
Version of LD_LIBRARY_PATH for a.out binaries only.
-Old versions of ld-linux.so.1 also supported LD_ELF_LIBRARY_PATH.
+Old versions of ld\-linux.so.1 also supported LD_ELF_LIBRARY_PATH.
.TP
.B LD_AOUT_PRELOAD
(libc5)
Version of LD_PRELOAD for a.out binaries only.
-Old versions of ld-linux.so.1 also supported LD_ELF_PRELOAD.
+Old versions of ld\-linux.so.1 also supported LD_ELF_PRELOAD.
.TP
.B LD_SHOW_AUXV
(glibc since 2.1)
.B /lib/ld.so
a.out dynamic linker/loader
.TP
-.BR /lib/ld-linux.so. { 1 , 2 }
+.BR /lib/ld\-linux.so. { 1 , 2 }
ELF dynamic linker/loader
.TP
.B /etc/ld.so.cache
.PP
.B ldconfig
will attempt to deduce the type of ELF libs (ie. libc5 or libc6/glibc)
-based on what C libs, if any, the library was linked against. Therefore, when
-making dynamic libraries, it is wise to explicitly link against libc (use -lc).
+based on what C libs, if any, the library was linked against.
+.\" FIXME: I think the following sentence is suspect (perhaps historical
+.\" cruft) -- MTK, Jul 2005
+Therefore, when making dynamic libraries,
+it is wise to explicitly link against libc (use \-lc).
.PP
Some existing libs do not contain enough information to allow the deduction of
their type. Therefore, the
(This syntax also works on the command line.) Spaces are
.B not
allowed. Also see the
-.B -p
+.B \-p
option.
.B ldconfig
should normally be run by the superuser as it may require write
.\"
.TH NSCD 8 1999-10 "GNU C Library" "Linux Programmer's Manual"
.SH NAME
-/usr/sbin/nscd - name service cache daemon
+/usr/sbin/nscd \- name service cache daemon
.SH DESCRIPTION
Nscd is a daemon that provides a cache for the most common name service
requests. The default configuration file,