IMD 1.17: 25/11/2014 14:58:52 Sn: 42359 (BATWINGS) MOTOROLA PHE:8503 (C) 1984 Motorola Inc. SYSTEM V/68 is a Trademark of Motorola Inc. M68000 SOFTWARE 82NNXBSV10 B* SYSTEM V68 OBJECT Release 1, Version 2.8 DISK 23 of 27 "on-line documentation"  ) 0420-;852/,)&#  +~}|{zyxwvutsrqponmlkjihg>+iA~ 77 >*>*>*A0>*>*>*A0>*>*>*A0>*>*>*A0>*>*>*A ">*>+>+ >%8v>*ҁ#&>%8y>*3)>%8z>*Ӂ,>%8|>*ӁI/>%8>*Ӂe258;>A>%8>*DG>%8>*ԁJMPSV>%8>*ԁ Y\_b>%8>*Ձ4e>%8>*5h>%8>*Ձ4k>%8>*ց5n>%8>*ցqt>%8>*5w>%8>*ց$z>%8>*ׁ L}>%8>*ׁ >%8>*>%8>*؁>%8>*؁>%8>*؁ V>%8>*>%8>*ف>%8>*ف(>%8>*ځ!$>%8>*'*-03>%8>*ہ 69<>%8>*ہ%?BEHKNQTWZ>%8>*ہ!]`>%8>* cfi>%8>*܁lorux>%8>*݁ {~>%8>*݁>%8>*8>%8>*ށ >%8>*ށ>%8>*ށ>%8>*>%8>*߁:>%8>*߁>%8>*8>%8>* >%8>* "%>%8>*ၴ{(+>%8>*ၴ j.14>%8>*7>%8>*⁴e:=@CFILORUX>%8 >*ぴ!>%8>*䁴 ;>%8>*4>%8>*側>%8>*側>%8>*側U>%8!>*6>%8#>*恴%E>%8(>*灴O>%8,>*聴k >%8/>* 5 >%81>*聴4>%85>*遴4>%8;>*遴>%8?>* !$'>%8D>*ꁴ*>%8L>*ꁴ -03>%8X>*ꁴ669<?BEHKNQT>%8]>*@cfilorux{~>%8c>*클>%8i>* (>%8l>*>%8o>*h>%8q>* >%8s>*>%8v>*9>%8y>*9>%8{>*8 >%8>* >%8>* >%8>*4>%8>*>%8>*m">%8>*%(+>%8>*.1>%8>*N47:=@CF>%8>*RIL>%8>*'OR>%8>*!UX[^adg>%8>*9jmpsvy>%8>*|>%8>*>%8>*w>%8>*/>%8>*E>%8>*@>%8>*>%8>*>%8>* >%8>*W>%8>* ,>%8>* >%8>* M #&),/2>%8>*5>%8>*8;>AD>%8>*CGJMPSVY\_be>%8>*}>%8>*>%8>*5>%8>*>%8>*6>%8>*E>%8>* >%8>+/>%8>+1>%8>+2>%8 >+>%8>+>%8>+>%8>+y>%8>+>%8!>+>%8&>+>%8->+>%8/>+ 2  >%8=>+1>%8A>+>%8D>+>%8F>+ %(+>%8I>+3.>%8J>+01>%8L>+64>%8M>+I7:=@>%8P>+ 2CFI>%8T>+LORU>%8Y>+>%8_>+  >%8a>+ j>%8c>+ >%8f>+ 0>%8h>+ >%8m>+  >%8y>+ 4>%8>+ >%8>+ 2>%8>+ 0>%8>+ >%8>+ >%8>+  >%8>+v>%8>+,>%8>+ >%8>+w>%8>+K #&),/25>%8>+SV>%8>+ .\" @(#)disable.1 1.2 .so /usr/man/u_man/man1/enable.1 ...usr .if '\*p'' \{\ .ds N 3B20S .ds p .ds P .ds l libc.a\} .TH \*PCPRS 1 "\*N only" .SH NAME cprs \- compress an \s-1IS\s+125 object file .SH SYNOPSIS .B \*pcprs .RB [ \-pv ] file1 file2 .SH DESCRIPTION The .I cprs command reduces the size of an \s-1IS\s+125 object file, .IR file1 , by removing duplicate structure and union descriptors. The reduced file, .IR file2 , is produced as output. .PP The options are: .PP .TP 6 .B \-p Print statistical messages including: total number of tags, total duplicate tags, and total reduction of .IR file1 . .PP .TP 6 .B \-v Print verbose error messages if error condition occurs. .SH SEE ALSO strip(1). .\" @(#)cprs.1 1.1 .TH DPD 1C .SH NAME dpd, lpd \- \s-1HONEYWELL\s+1 sending daemon, line printer daemon .SH SYNOPSIS .B /usr/lib/dpd .br .B /usr/lib/lpd .SH DESCRIPTION .I Dpd\^ is the daemon for the 200-series .SM DATA-PHONE\*S\*R data set or for a .SM KMC\*S11-B using .IR vpm (7). It is designed to submit jobs to the .SM HONEYWELL 6000 computer via the .SM GRTS interface. .I Lpd\^ is the daemon for a line printer. .PP .I Dpd\^ uses the directory .BR /usr/spool/dpd . .I Lpd\^ uses the directory .BR /usr/spool/lpd . The file .B lock in either directory is used to prevent two daemons from becoming active simultaneously. After the program has successfully set the lock, it forks and the main path exits, thus spawning the daemon. The directory is scanned for files beginning with ``df''. Each such file is submitted as a job. Each line of a job file must begin with a key character to specify what to do with the remainder of the line. .PP .PD 0 .TP 7 .B S directs .I dpd\^ to generate a unique .IR "snumb card" . The .I snumb\^ number ...man.TH CSPLIT 1 .bd S B 3 .SH NAME csplit \- context split .SH SYNOPSIS .B csplit .RB [ \-s ] .RB [ \-k ] .RB [ \-f \ prefix ] file arg1 [\s+3.\|.\|.\s0 argn] .SH DESCRIPTION .I Csplit\^ reads .I file\^ and separates it into n+1 sections, defined by the arguments .IR arg1 "\s+3.\|.\|.\s0" .IR argn . By default the sections are placed in xx00 \s+3.\|.\|.\s0 .RI xx n\^ .RI ; n\^ may not be greater than 99. These sections get the following pieces of .IR file : .RS 6 .TP 6 00: From the start of .I file\^ up to (but not including) the line referenced by .IR arg1 . .PD 0 .TP 6 01: From the line referenced by .I arg1\^ up to the line referenced by .IR arg2 . .RS 6 .sp -.5v .B "." .sp -.5v .B "." .sp -.5v .B "." .RE .TP 6 n+1: From the line referenced by .I argn\^ to the end of .IR file . .PD .RE .PP The options to .I csplit\^ are: .RS 6 .TP "\w'\-t\ prefix\ \ 'u" .B \-s .I Csplit\^ normally prints the character counts for each file created. If the .B \-s option is present, .I csplit\^ suppresses the printing of all ch is generated from the file .I snumb\^ in the spooling directory in the case of the .SM DATA-PHONE data set daemon. This key character is not used by .IR lpd . .TP 7 .B L specifies that the remainder of the line is to be sent as a literal. .TP 7 .B I is the same as .BR L , but signals the $ .SM IDENT card which is to be mailed back by the mail option. .TP 7 .B B specifies that the rest of the line is a file name. That file is to be sent as binary cards. .TP 7 .B F is the same as .B B except a form-feed is prepended to the file. .TP 7 .B U specifies that the rest of the line is a file name. After the job has been transmitted, the file is unlinked. .TP 7 .B M is followed by a user \s-1ID\s+1; after the job is sent, a message is mailed to the user via the .IR mail (1) command to verify the sending of the job. .TP 7 .B N is followed by a user file name, to be sent back under the mail option. .TP 7 .B Q is followed by a string of characters, which is a message to be sent back to the user under the mail option. (Not...u_manaracter counts. .TP .B \-k .I Csplit\^ normally removes created files if an error occurs. If the .B \-k option is present, .I csplit\^ leaves previously created files intact. .TP .BI \-f \ prefix If the .B \-f option is used, the created files are named .IB prefix 00 \&\s+3.\|.\|.\s0\& .IR prefixn . The default is \fBxx00\fP \s+3.\|.\|.\s0 .BI xx n\fR.\fP .RE .PP The arguments .RI ( arg1 " \s+3.\|.\|.\s-3" .IR argn ) to .I csplit\^ can be a combination of the following: .RS 6 .TP 8 .RI / rexp / A file is to be created for the section from the current line up to (but not including) the line containing the regular expression .IR rexp . The current line becomes the line containing .IR rexp . This argument may be followed by an optional .BR + " or" .B \- some number of lines (e.g., \fB/Page/\-5\fP). .TP 8 .RI % rexp % This argument is the same as .RI / rexp /, except that no file is created for the section. .TP 8 .I lnno\^ A file is to be created from the current line up to (but not including) .IR lnno . The curr used by .IR lpd ). .PD .PP Any error encountered will cause the daemon to drop the call, wait up to 20 minutes, (only 10 seconds for .IR lpd ), and start over. This means that an improperly constructed ``df'' file may cause the same job to be submitted every 20 minutes. .PP .I Dpd\^ is automatically initiated by all of the .SM GCOS commands .RI ( dpr , .IR gcat , .IR gcosmail , .IR fget , and .IR fsend ). .I Lpd\^ is automatically initiated by the line printer command, .IR lpr . .PP To restart .I dpd\^ or .I lpd\^ (in the case of hardware or software malfunction), it is necessary to first kill the old daemon (if it is still alive), and remove the lock file (if present), before initiating the new daemon. This can be done automatically by .B /etc/rc when the system is brought up, in the event there were jobs left in the spooling directory when the system last went down. .SH FILES .PD 0 .TP 20 /usr/spool/dpd/\(** spool area for .SM GCOS daemons. .TP /usr/spool/lpd/\(** spool area for line printer daemon. .TP / ...man1ent line becomes .IR lnno . .TP 8 .RI { num } Repeat argument. This argument may follow any of the above arguments. If it follows a .I rexp\^ type argument, that argument is applied .I num\^ more times. If it follows .IR lnno , the file will be split every .I lnno\^ lines .RI ( num\^ times) from that point. .RE .PP Enclose all .I rexp\^ type arguments that contain blanks or other characters meaningful to the shell in the appropriate quotes. Regular expressions may not contain embedded new lines. .I Csplit\^ does not affect the original file; it is the user's responsibility to remove it. .SH EXAMPLES .sp .nf .B "csplit \-f cobol file\ \ \(fm/procedure division/\(fm\ \ /par5./\ \ /par16./" .fi .sp This example command creates four files, \fBcobol00\fP \s+3.\|.\|.\s0 \fBcobol03\fP. After the split files have been edited, they can be recombined as follows: .sp .RS 10n .nf \fBcat cobol0[0\-3] > file\fP .fi .RE .sp Note that this example overwrites the original file. .sp .RS 10n .nf \fBcsplit \-k file\ \ 100\ \ {etc/passwd to get the user's name. .TP /dev/dn? .SM ACU device. .TP /dev/du? .SM DATA-PHONE data set. .TP /dev/vpm? .SM VPM device to interface to .SM KMC\*S11-B. .TP /dev/lp line printer device. .PD .SH SEE ALSO dpr(1C), fget(1C), fsend(1C), gcat(1C), gcosmail(1C), lpr(1). .SH BUGS If a .IR umask (1) of 077 is used, the print jobs may be spooled but won't be able to be printed. .\" @(#)dpd.1c 1.1 ...cal.1calendar.1 cancel.1 cat.1 cb.1 cc.1 cd.1cdc.1cflow.1checkcw.1checkeq.1checkmm.1chgrp.1chmod.1chown.1cmp.1col.1comb.1comm.1conv.1cp.1cpio.1cpp.1cprs.1csplit.1 ct.1c!cu.1c"cut.1#cw.1$cxref.1%date.1&dc.1'dd.1(delta.1)deroff.1*diff.1+diff3.1,diffmk.1-dircmp.1.dirname.1/dis.10disable.11dpd.1c2dpr.1c3du.14dump.15echo.16ed.17edit.18efl.19egrep.1:enable.1;env.1ex.1?expr.1@f77.1Afactor.1Bfalse.1Cfgrep.1Dfile.1 99}\fP .fi .RE .sp This example splits the file at every 100 lines, up to 10,000 lines. The .B \-k option causes the created files to be retained if there are less than 10,000 lines; however, an error message is still printed. .sp .RS 5n .nf .B "csplit \-k prog.c\ \ \(fm%main(%\(fm\ \ \(fm/^}/+1\(fm\ \ {20}" .fi .RE .sp Assuming that .B prog.c follows the normal .B C coding convention of ending routines with a .B } at the beginning of the line, this example creates a file containing each separate .B C routine (up to 21) in .BR prog.c . .SH SEE ALSO ed(1), sh(1), regexp(5). .SH DIAGNOSTICS Self-explanatory except for: .RS 5n .nf \fBarg \- out of range\fP .fi .RE which means that the given argument did not reference a line between the current position and the end of the file. .\" @(#)csplit.1 1.4 .TH DPR 1C .SH NAME dpr \- off-line print .SH SYNOPSIS .B dpr [ .BR \- destination ] [ options ] [ files ] .SH DESCRIPTION .I Dpr\^ causes the named files to be printed off-line at the specified destination, by .SM GCOS at the Murray Hill Computation Center. .SM GCOS identification must appear in the .SM UNIX System password file (see .IR passwd (4)), or be supplied by the .B \-i option. If no files are listed the standard input is assumed; thus .I dpr\^ may be used as a filter. .PP The destination is a two-character code which is taken to be a Murray Hill .SM GCOS ``station id.'' Useful codes are .B r1 for quality print, and .B q1 for quality print with special ribbon, both on regular wide paper. The codes .B r2 and .B q2 give the same print on narrow paper. The code .B mx is a Xerox 9700 printer. The default destination is on-line at the Murray Hill Computation Center. .PP The following options, each as a separate argument, and in any combination (multiple outputs are permitted), may be given before or afte.TH CAL 1 .SH NAME cal \- print calendar .SH SYNOPSIS .B cal [ month ] year .SH DESCRIPTION .I Cal\^ prints a calendar for the specified \f2year\f1. The \f2year\f1 must be specified with four digits. If a month is also specified, a calendar just for that month is printed. .I Year\^ can be between 1 and 9999. The .I month\^ is a number between 1 and 12. The calendar produced is that for England and her colonies. .PP Try September 1752. .SH BUGS The year is always considered to start in January even though this is historically naive. .br Beware that ``cal 78'' refers to the early Christian era, not the 20th century. .\" @(#)cal.1 1.3 .tr ~ .TH CT 1C .SH NAME ct \- spawn getty to a remote terminal .SH SYNOPSIS .B ct [ .B \-h ] [ .B \-v ] [ .BR \-w n ] [ .BR \-s speed ] telno ... .SH DESCRIPTION .I Ct\^ dials the phone number of a modem that is attached to a terminal, and spawns a .I getty\^ process to that terminal. .I Telno\^ is a telephone number, with equal signs for secondary dial tones and minus signs for delays at appropriate places. If more than one telephone number is specified, .I ct\^ tries each in succession until one answers; this is useful for specifying alternate dialing paths. .PP .I Ct\^ tries each line listed in the file .B \%/usr/lib/uucp/L-devices until it finds an available line with appropriate attributes or runs out of entries. If there are no free lines, .I ct\^ asks if it should wait for one, and if so, for how many minutes it should wait before it gives up. .I Ct\^ continues to try to open the dialers at one-minute intervals until the specified limit is exceeded. The dialogue may be overridden by specifying the .BI r the destination: .PP .PD 0 .TP 7 .B \-c Makes a copy of the file to be sent before returning to the user. .TP 7 .B \-r Removes the file after sending it. .TP 7 .BI \-f file Use .I file as a dummy file name to report back in the mail. (This is useful for distinguishing multiple runs, especially when .I dpr\^ is being used as a filter). .TP 7 .BI \-i job,bin Supply the .SM GCOS ``ident card'' image as the parameter .BI \-i job,bin where .I job is the .SM GCOS job number and .I bin the .SM GCOS bin number or any comment to the .SM GCOS operators. .TP 7 .B \-m When transmission is complete, reports by .IR mail (1) the so-called .I snumb\^ of the receiving .SM GCOS job. The mail is sent by the .SM UNIX daemon; there is no guarantee that the .SM GCOS job ran successfully. This is the default option. .TP 7 .B \-n Does not report the completion of transmission by .IR mail (1). .TP 7 .B \-p Selects portrait mode. Used in conjunction with a XEROX 9700 printer. .TP 7 .BI \-s n\^ Submits job to .SM GCOS with service gr.TH CALENDAR 1 .SH NAME calendar \- reminder service .SH SYNOPSIS .B calendar [ \- ] .SH DESCRIPTION .I Calendar\^ consults the file .B calendar\^ in a user's current directory and prints out lines containing today's or tomorrow's date. .I Calendar uses .I calprog to figure out today's and tomorrow's dates. The date read by .I calprog may appear anywhere in a line, and most reasonable date representations are recognized, although the month must appear first. For example, ``Dec. 7,'' ``december 7,'' and ``12/7'' are recognized; ``7 Dec'' or ``seven december'' are not. On weekends ``tomorrow'' extends through Monday. If the .I calendar command is run on a Friday, lines containing the dates for Friday, Saturday, Sunday, and Monday are selected. .PP When  an argument is present, .I calendar\^ does its job for all users who have a file .B calendar\^ in their login directory and sends them any positive results by .IR mail (1). Normally this is done daily by facilities in the operating system. .SH FILES cale \-w n\^ option, where .I n\^ is the maximum number of minutes that .I ct\^ is to wait for a line. .PP Normally, .I ct\^ hangs up the current line so that line can answer the incoming call. The .B \-h option prevents this action. If the .B \-v option is used, .I ct\^ sends a running narrative to the standard error output stream. .PP The data rate may be set with the .B \-s option, where .I speed\^ is expressed in baud. The default rate is 300. .PP After the user on the destination terminal logs out, .I ct\^ prompts, \f3Reconnect?\f1~. If the response begins with the letter \f3n\f1, the line is dropped; otherwise, .I getty\^ is started again and the \f3login:\f1 prompt is printed. .PP Of course, the destination terminal must be attached to a modem that can answer the telephone. .SH FILES /usr/lib/uucp/L-devices .br /usr/adm/ctlog .SH "SEE ALSO" cu(1C), login(1), uucp(1C). .\" @(#)ct.1c 1.4 ade .I n\^ .RI ( n "=1, 2, 3, 4)." Default is .BR \-s2 . .PD .SH EXAMPLES The command: .RS .PP dpr \|\-r \|\-n \|error1 \|error2 .RE .PP will send the files .B error1 and .B error2 to .SM GCOS for printing, removing the files after they have been sent, but not sending mail. The line: .RS .PP pr \|file1 \|\(bv \|dpr \|\-s1 \|\-f\|job1 \|\-r1 .RE .PP will send the output of .I pr\^ to .SM GCOS for printing on the quality printer with service grade 1, and will send mail that .I job1\^ has been sent. .SH FILES .PD 0 .TP 20 /etc/passwd user's identification and .SM GCOS ident card. .TP /usr/lib/dpd sending daemon. .TP /usr/spool/dpd/\(** spool area. .PD .SH SEE ALSO dpd(1C), fget(1C), fsend(1C), gcat(1C). .\" @(#)dpr.1c 1.1  ndar .br /usr/lib/calprog .br /etc/passwd .br /tmp/cal\(** .SH "SEE ALSO" mail(1). .SH BUGS The .B calendar\^ file must be public information for a user to get reminder service. .br .I Calendar's\^ extended idea of ``tomorrow'' does not account for holidays. .br Numeric dates must be in the form month/day. Separators other than a slash prevent recognition of the date. .\" @(#)calendar.1 1.8 .tr ~~ .TH CU 1C .SH NAME cu \- call another \*(5) system .SH SYNOPSIS .B cu .RB [\| \-s speed\|] .RB [\| \-l line\|] .RB [\| \-h \|] .RB [\| \-t \|] .RB [\| \-d \|] .RB [\| \-m \|] .RB [\| \-o \(bv \-e \|] telno \(bv .B dir .SH DESCRIPTION .I Cu\^ calls up another \*(5) system, a terminal, or possibly a non-\*(5) system. It manages an interactive conversation with possible transfers of .SM ASCII files. .I Speed\^ gives the transmission speed (110, 150, 300, 600, 1200, 4800, 9600); 300 is the default value. Most modems are either 300 or 1200 baud. For dial-out lines, \fIcu\fP chooses a modem speed (300 or 1200) as the slowest available which can handle the specified transmission speed. Directly connected lines may be set to speeds higher than 1200 baud. .PP The .B \-l value may be used to specify a device name for the communications line device to be used. This can be used to override searching for the first available line having the right speed. The speed of a line is taken from the file .IR \%/usr/lib/uucp/.TH DU 1 .SH NAME du \- summarize disk usage .SH SYNOPSIS .B du [ .B \-ars ] [ names ] .SH DESCRIPTION .I Du\^ gives the number of blocks contained in all files and (recursively) directories within each directory and file specified by the .I names\^ argument. The block count includes the indirect blocks of the file. If the .I names\^ argument is missing, .B . (all) is assumed. .PP The optional argument .B \-s causes only the grand total for each of the specified .I names to be given. The optional argument .B \-a causes an entry to be generated for each file. Absence of both options causes an entry to be generated for each directory only. .PP .I Du\^ is normally silent about directories that cannot be read, files that cannot be opened, etc. The .B \-r option causes .I du\^ to generate messages in such instances. .PP A file with two or more links is only counted once. .SH BUGS If the .B \-a option is not used, non-directories given as arguments are not listed. .br If there are too many distinct linked files, .I.\" @(#)cancel.1 1.2 .so /usr/man/u_man/man1/lp.1  L-devices , overriding any speed specified by the .B \-s option. The .B \-h option emulates local echo, supporting calls to other computer systems which expect terminals to be in half-duplex mode. The .B \-t option is used when dialing an \s-1ASCII\s+1 terminal which has been set to auto-answer. Appropriate mapping of carriage-returns to carriage-return-line-feed pairs is set. The .B \-d option causes diagnostic traces to be printed. The .B \-m option specifies a direct line which has modem control. The .B \-e .RB( \-o ) option designates that even (odd) parity is to be generated for data sent to the remote. .I Telno\^ is the telephone number, with equal signs for secondary dial tone or minus signs for delays, at appropriate places. The string .B dir for .I telno\^ may be used for directly connected lines, and implies a null \s-1ACU\s+1. Using .B dir insures that a line has been specified by the .B \-l option. .PP .I Cu\^ tries each line listed in the file .I \%/usr/lib/uucp/L-devices until it finds an availa du\^ counts the excess files more than once. .br Files with holes in them get an incorrect block count. .\" @(#)du.1 1.3 .TH CAT 1 .SH NAME cat \- concatenate and print files .SH SYNOPSIS .B cat [ .B \-u ] [ .B \-s ] file .\|.\|. .SH DESCRIPTION .I Cat\^ reads each .I file\^ in sequence and writes it on the standard output. Thus: .PP .RS \f3cat file\f1 .RE .PP prints the file, and: .PP .RS \f3cat file1 file2 > file3\f1 .RE .PP concatenates the first two files and places the result on the third. .PP If no input file is given, or if the argument .B \- is encountered, .I cat\^ reads from the standard input file. Output is buffered unless the .B \-u option is specified. The .B \-s option makes .I cat\^ silent about non-existent files. No input file may be the same as the output file unless it is a special file. .SH WARNING Command formats such as .sp .RS .B "cat file1 file2 > file1" .RE .sp cause the original data in \f3file1\fP to be lost. To append \f3file2\f1 to \f3file1\f1, use: .sp .RS .BR "cat file2 >> file1" . .RE .SH SEE ALSO cp(1), pr(1). .\" @(#)cat.1 1.5 ble line with appropriate attributes or runs out of entries. After making the connection, .I cu\^ runs as two processes: the .I transmit\^ process reads data from the standard input and, except for lines beginning with .BR ~ , passes it to the remote system; the .I receive\^ process accepts data from the remote system and, except for lines beginning with .BR ~ , passes it to the standard output. Normally, an automatic \s-1DC\s+1\&3/\s-1DC\s+1\&1 protocol is used to control input from the remote so the buffer is not overrun. Lines beginning with \f3~\fP have special meanings. .PP The .I transmit\^ process interprets the following: .TP 20 .B ~. Terminate the conversation. .TP .B ~! Escape to an interactive shell on the local system. .TP .BI ~! cmd\|.\|.\|. Run .I cmd\^ on the local system (via .BR "sh \-c" ). .TP .BI ~$ cmd\|.\|.\|. Run .I cmd\^ locally and send its output to the remote system. .TP \&\f3~%take\fP \|\f2from\fP \|[ \|\f2to\fP \|] Copy file .I from\^ (on the remote system) to file .I to\^ on the l .TH DUMP 1 .tr ~ .SH NAME dump \- dump selected parts of an object file .SH SYNOPSIS .B dump .RB [ \-acfghlorst ] .RB [ \-z " name]" files .SH DESCRIPTION The .I dump command dumps selected parts of each of its object \fIfile\fP arguments. .PP This command accepts both object files and archives of object files. It processes each file argument according to one or more of the following options: .TP \w'\fB\-d~number~~'u .B \-a Dump the archive header of each member of each archive file argument. .TP .B \-f Dump each file header. .TP .B \-g Dump the global symbols in the symbol table of a 6.0 archive. .TP .B \-o Dump each optional header. .TP .B \-h Dump section headers. .TP .B \-s Dump section contents. .TP .B \-r Dump relocation information. .TP .B \-l Dump line number information. .TP .B \-t Dump symbol table entries. .TP .BI \-z name Dump line number entries for the named function. .TP .BR \-c Dump the string table. .PP The following \fImodifiers\fP are used in conjunction with the options listed above to .TH CB 1 .SH NAME cb \- C program beautifier .SH SYNOPSIS .B cb [ .B \-s ] [ .B \-j ] [ .B \-l leng ] [ file ... ] .SH DESCRIPTION .I Cb reads C programs either from its arguments or from the standard input and writes them on the standard output with spacing and indentation that display the structure of the code. Under default options, .I cb preserves all user new-lines. Under the .B \-s flag, .I cb canonicalizes the code to the style of Kernighan and Ritchie in .IR "The C Programming Language" . The .B \-j flag causes split lines to be put back together. The .B \-l flag causes .I cb to split lines that are longer than .IR leng . .SH "SEE ALSO" cc(1). .br ``The C Programming Language'' by B. W. Kernighan and D. M. Ritchie. .SH BUGS Punctuation that is hidden in preprocessor statements causes indentation errors. .\" @(#)cb.1 1.6 ocal system. If .I to\^ is omitted, the .I from\^ argument is used in both places. .TP \&\f3~%put\fP \|\f2from\fP \|[ \|\f2to\fP \|] Copy file .I from\^ (on local system) to file .I to\^ on remote system. If .I to\^ is omitted, the .I from\^ argument is used in both places. .TP .BR ~~ .\|.\|. Send the line .BR ~ ".\|.\|." to the remote system. .TP .B ~%nostop Turn off the \s-1DC\s+1\&3/\s-1DC\s+1\&1 input control protocol for the remainder of the session. This is useful in case the remote system is one which does not respond properly to the \s-1DC\s+1\&3 and \s-1DC\s+1\&1 characters, .PP The .I receive\^ process normally copies data from the remote system to its standard output. A line from the remote that begins with \f3~>\fP initiates an output diversion to a file. The complete sequence is: .PP .RS \&\f3~>\fP\^[\^\f3>\fP\^]\^\f3:\fP\^\|\f2file\fP .br zero or more lines to be written to .I file\^ .br .B ~> .RE .PP Data from the remote is diverted (or appended, if .B >> is used) to file. The trailing \f3~>\fPmodify their capabilities. .TP \w'\fB\-d~number~~'u .BI \-d number Dump the section number or range of sections starting at \fInumber\fP and ending either at the last section number or \fInumber\fP specified by .BR +d . .TP .BI +d number Dump sections in the range either beginning with first section or beginning with section specified by \fB\-d\fP. .TP .BI \-n name Dump information pertaining only to the named entity. This .I modifier applies to .BR \-h , .BR \-s , .BR \-r , .BR \-l , and .BR \-t . .TP .BR \-p Suppress printing of the headers. .TP .BI \-t index Dump only the indexed symbol table entry. When the .B \-t is used in conjunction with .BR +t , it specifies a range of symbol table entries. .TP .BI +t index Dump the symbol table entries in the range ending with the indexed entry. The range begins at the first symbol table entry or at the entry specified by the .B \-t option. .TP .BR \-u Underline the name of the file for emphasis. .TP .B \-v Dump information in symbolic representation rather than .TH CC 1 .SH NAME cc\- C compiler .SH SYNOPSIS .B cc [ options ] ... files ... .SH DESCRIPTION The .I cc\^ command is the C compiler. It generates assembly instructions. .I Cc\^ accepts the following types of arguments: .PP Arguments whose names end with .B .c\^ are taken to be C source programs; they are compiled, and each object program is left on the file whose name is that of the source, with .B .o\^ substituted for .BR .c . The .B .o\^ file is normally deleted; however, if a single C program is compiled and loaded all at one go, no .B .o\^ is produced. In the same way, arguments whose names end with .B .s\^ are taken to be assembly source programs and are assembled to produce a .B .o\^ file. .PP The following flags are interpreted by .I cc\^. See .IR ld (1) for link editor options and .IR as (1) for assembler options. .TP 8 .B \-c Suppress the link-editing phase of the compilation, and force an object file to be produced even if only one program is compiled. .TP .B \-p Arrange for the compiler to produc terminates the diversion. .PP The use of .B ~%put requires .IR stty (1) and .IR cat (1) on the remote side. It also requires that the current erase and kill characters on the remote system be identical to the current ones on the local system. Backslashes are inserted at appropriate places. .PP The use of .B ~%take requires the existence of .IR echo (1) and .IR cat (1) on the remote system. Also, .B stty tabs mode should be set on the remote system if tabs are to be copied without expansion. .SH FILES /usr/lib/uucp/L-devices .br /usr/spool/uucp/\s-1LCK\s+1..(tty-device) .br /dev/null .SH SEE ALSO cat(1), ct(1C), echo(1), stty(1), uucp(1C). .SH DIAGNOSTICS Exit code is zero for normal exit, non-zero (various values) otherwise. .SH BUGS .I Cu\^ buffers input internally. .br There is an artificial slowing of transmission by .I cu\^ during the .B ~%put operation so that loss of data is unlikely. .\" @(#)cu.1c 1.5  numeric (e.g., .SM C_STATIC instead of .BR \s-10X02\s+1 ). This \fImodifier\fP can be used with all the above options except the .B \-s and .B \-o options of .IR dump. .TP .BI \-z name,number Dump line number entry or range of line numbers starting at .I number for the named function. .TP .BI +z\ number Dump line numbers starting at either function .IR name " or " number specified by .BR \-z, up to .I number specified by .BR +z . .PP .PP Blanks separating an \fIoption\fP and its \fImodifier\fP are optional. The comma separating the name from the number modifying the .B \-z option may be replaced by a blank. .PP The .I dump command attempts to format the information it dumps in a meaningful way, printing certain information in character, hex, octal, or decimal representation, as appropriate. .SH "SEE ALSO" a.out(4), ar(4). .tr ~~ '\" \%W\% .\" @(#)dump.1 1.8 e code which counts the number of times each routine is called. Also, if link editing takes place, replace the standard startoff routine by one which automatically calls \f2monitor\f1(3C) at the start and arranges to write out a \f3mon.out\f1 file at normal termination of execution of the object program. .TP .B \-g Cause the compiler to generate additional information needed for the use of .IR sdb (1). .TP .B \-O Invoke an object-code optimizer. The optimizer moves, merges, and deletes code, so symbolic debugging with line numbers could be confusing when the optimizer is used. .TP .BI \-W c,arg1[,arg2...] Hand off the argument[s] .I argi to pass .IR c , where .I c is one of .RB [ p012al ] indicating preprocessor, compiler first pass, compiler second pass, optimizer, assembler, or link editor, respectively. For example: .TP .BI \-W a,-m Invoke the .B m4\^ macro preprocessor on the input to the assembler. This must be done for a source file that contains assembler escapes. .TP .B \-S Compile the named C prog .if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH CUT 1 .SH NAME cut \- cut out selected fields of each line of a file .SH SYNOPSIS \fBcut \-c\fP\^list [\|file1 file2 ...] .br \fBcut \-f\fP\^list [\fB\-d\fP\|char\|] [\fB\-s\fP] [\|file1 file2 ...] .SH DESCRIPTION Use .I cut\^ to remove columns from a table or fields from each line of a file; in data base parlance, .I cut\^ implements the projection of a relation. The fields specified by .I list\^ can be fixed length, i.e., character positions as on a punched card (\fB\-c\fP option), or the length can vary from line to line and can be marked with a field delimiter character such as .I tab\^ (\fB\-f\fP option). .I Cut\^ can be used as a filter; if no files are given, the standard input is used. .PP The meanings of the options are: .br .TP "\w'\-d\ char\ \ 'u" .I list\^ A comma-separated list of integer field numbers (in increasing order), with optional \fB\-\fP t.TH ECHO 1 .SH NAME echo \- echo arguments .SH SYNOPSIS .B echo [ arg ] ... .SH DESCRIPTION .I Echo\^ writes its arguments on the standard output, separated by blanks and terminated by a new-line character. It also understands C-like escape conventions; beware of conflicts with the shell's use of \fB\e\fP: .PP .RS .PD 0 .TP .B \eb backspace .TP .B \ec print line without new-line character .TP .B \ef form feed .TP .B \en new line .TP .B \er carriage return .TP .B \et tab .TP .B \e\e backslash .TP .BI \e n\^ the 8-bit character whose \s-1ASCII\s0 code is the 1-, 2- or 3-digit octal number .IR n , which must start with a zero. .RE .PD .PP .I Echo\^ is useful for producing diagnostics in command files and for sending known data into a pipe. .SH SEE ALSO sh(1). .\" @(#)echo.1 1.4 rams, and leave the assembler-language output on corresponding files suffixed \f3.s\fP. .TP .B \-E Run only .IR cpp (1) on the named C programs, and send the result to the standard output. .TP .B \-P Run only .IR cpp (1) on the named C programs, and leave the result on corresponding files suffixed \f3.i\fP. .TP .BI \-D symbol\^ Define .I symbol to the preprocessor. This mechanism is useful with the conditional statements in the preprocessor by allowing symbols to be defined external to the source file. .TP .BI \-U symbol\^ Undefine .I symbol to the preprocessor. .TP .BI \-I dir\^ Change the algorithm for searching for .B \#include\^ files whose names do not begin with .B \/\^ to look in .I dir before looking in the directories on the standard list. Thus, \fB\#include\fP files whose names are enclosed in double quotes are searched for first in the directory of the .I file argument, then in directories named in .I -I options, and last in directories on a standard list. For \fB\#include\fP files whose nameo indicate ranges as in the .B \-o option of .IR nroff / troff for page ranges; e.g., .BR 1,4,7 ; .BR 1\-3,8 ; .B \-5,10 (short for \fB1\-5,10\fP); or .B 3\- (short for third through last field). .TP \fB\-c\fP\^\fIlist\fP The .I list\^ following .B \-c (no space) specifies character positions (e.g., .B \-c1\-72 would pass the first 72 characters of each line). .TP \fB\-f\fP\^\fIlist\fP The \fIlist\fP following .B \-f (no space) is a list of fields assumed to be separated in the file by a delimiter character (see .B \-d ); e.g. , .B \-f1,7 copies the first and seventh field only. Lines with no field delimiters are passed through intact (useful for table subheadings), unless .B \-s is specified. .TP \fB\-d\fP\^\fIchar\fP The character following .B \-d (no space) is the field delimiter (\c .B \-f option only). Default is .IR tab . Space or other characters with special meaning to the shell must be quoted. .TP .B \-s Suppresses lines with no delimiter characters in case of .B \-f option. Unless specified, l .ds ^ ^ .TH ED 1 .SH NAME ed, red \- text editor .SH SYNOPSIS .B ed [ .B \- ] [ file ] .PP .B red [ .B \- ] [ file ] .SH DESCRIPTION .I Ed\^ is the standard text editor. If the .I file\^ argument is given, .I ed\^ simulates an .I e\^ command (see below) on the named file; i.e., the file is read into .IR ed 's buffer so that it can be edited. The optional .B \- suppresses the printing of character counts by .IR e , .IR r , and .I w\^ commands, of diagnostics from .I e\^ and .I q\^ commands, and of the .B ! prompt after a \f3!\fP\f2shell\ command\^\fP. .I Ed\^ operates on a copy of the file it is editing; changes made to the copy have no effect on the file until a .I w\^ (write) command is given. The copy of the text being edited resides in a temporary file called the buffer. There is only one buffer. .sp .5 .I Red\^ is a restricted version of .IR ed . It only allows editing of files in the current directory. It prohibits executing shell commands via \f3!\fP\f2shell\ command\^\fP. Attempts to bypass these ress are enclosed in .BR <> , the directory of the .I file\^ argument is not searched. .TP .BI \-B string\^ Construct pathnames for substitute preprocessor, compiler, assembler, and link editor passes by concatenating .I string\^ with the suffixes .BR cpp , .BR comp , .BR optim , .BR as , and .BR ld . If .I string\^ is empty it is taken to be .BR /lib/o . .PP Other arguments are taken to be either link editor option arguments or C-compatible object programs, typically produced by an earlier .I cc\^ run, or perhaps libraries of C-compatible routines. These programs, together with the results of any compilations specified, are link-edited (in the order given) to produce an executable program with the name .BR a.out unless the .BR -o option of the link editor is used. .PP The C language standard was extended after UNIX 5.0 to allow arbitrary length variable names. This standard is supported on the M68000 family of processors. The .BR -T option causes .I cc\^ to truncate variable names to provide backward compines with no delimiters are passed through untouched. .PP Either the .B \-c or .B \-f option must be specified. .SH HINTS Use .IR grep (1) to make horizontal ``cuts'' (by context) through a file, or .IR paste (1) to put files together column-wise (i.e., horizontally). To reorder columns in a table, use .I cut\^ and .IR paste . .SH EXAMPLES The command .PP .RS 5n .nf .B "cut \-d: \-f1,5 /etc/passwd" .fi .RE .PP maps user \s-1ID\s0s to names. .PP The command .PP .RS 5n .nf .B "name=\*`who am i | cut \-f1 \-d" "\*`" .fi .RE .PP sets .B name to the current login name. .SH SEE ALSO grep(1), paste(1). .SH DIAGNOSTICS .PP .TP 1.25i .B "line too long\^" A line can have no more than 511 characters or fields. .TP .B "bad list for c\|/\|f option\^" Missing .B \-c or .B \-f option or incorrectly specified .IR list . No error occurs if a line has fewer fields than the .I list\^ calls for. .TP .B "no fields\^" The .I list\^ is empty. .\" @(#)cut.1 1.6 trictions result in an error message (\fBrestricted shell\fP). .sp .5 Both .I ed and .I red support the .IR fspec (4) formatting capability. After including a format specification as the first line of .I file and invoking .I ed with your terminal in .B "stty\ \-tabs or .B "stty\ tab3" mode (see .IR stty (1), the specified tab stops are used automatically when scanning .IR file . For example, if the first line of a file contains: .RS .B "\&<:t5,10,15\ s72:>" .RE tab stops are set at columns 5, 10 and 15, and a maximum line length of 72 is imposed. .SM NOTE\*S: While inputting text, typed tab characters are expanded to every eighth column, as is the default. .PP Commands to .I ed\^ have a simple and regular structure: zero, one, or two addresses followed by a single-character command, possibly followed by parameters to the command. The addresses specify one or more lines in the buffer. Every command that requires addresses has default addresses, so that the addresses can often be omitted. .sp .5 In general, o atibility with earlier systems. .SH FILES .PD 0 .TP 20 file.c input file .TP file.o object file .TP file.s assembly language file .TP a.out link-edited output .TP /usr/tmp/mc68? temporary .TP LIBDIR/cpp preprocessor .TP LIBDIR/ccom compiler .TP LIBDIR/optim optimizer .TP BINDIR/as assembler, .IR as (1) .TP BINDIR/ld link editor, .IR ld (1) .TP /lib/libc.a standard library, see (3) .PD .SH SEE ALSO as(1), dis(1), ld(1). .br ``The C Programming Language'' by B. W. Kernighan and D. M. Ritchie, Prentice\-Hall, 1978. .br ``Programming in C \- A Tutorial'' by B. W. Kernighan. .br ``C Reference Manual'' by D. M. Ritchie. .br ``The C Programming Language'' in the .IR "\*(6) Programming Guide" . .SH DIAGNOSTICS The diagnostics produced by the C compiler are sometimes cryptic. Occasional messages may be produced by the assembler or link editor. .SH WARNING By default, the return value from a C program is completely random. The only two guaranteed ways to return a specific value are to explicitly call .IR exit (2) '\" ct .if n .tr%\& .if t .tr%\& .CD -l% -r% .de CW .PP .RS .nf .ps -1 .vs -1p .ta 16m/3u 32m/3u 48m/3u 64m/3u 80m/3u 96m/3u 112m/3u .. .de CN .DT .vs .ps .fi .RE .PP .. .TH CW 1 .SH NAME cw, checkcw \- prepare constant-width text for troff .SH SYNOPSIS .B cw [ .BR -l xx ] [ .BR -r xx ] [ .BR -f n ] [ .B -t ] [ .B +t ] [ .B -d ] [ files ] .PP .B checkcw [ .BR -l xx ] [ .BR -r xx ] files .SH DESCRIPTION .I Cw\^ is a preprocessor for .IR troff (1) input files that contain text to be typeset in the constant-width (\s-1CW\s+1) font. .PP Text typeset with the .SM CW font resembles the output of terminals and line printers. This font is used to typeset examples of programs and computer output in user manuals, programming texts, etc. (An earlier version of this font was used in typesetting .I "The C Programming Language\^" by B.\ W. Kernighan and D.\ M. Ritchie.) It has been designed to be quite distinctive (but not overly obtrusive) when used together with the Times Roman font. .PP Because the .SM CW font contains nly one command may appear on a line. Certain commands allow the input of text. This text is placed in the appropriate place in the buffer. While .I ed\^ is accepting text, it is said to be in input mode. In this mode, no commands are recognized; all input is merely collected. Input mode is left by typing a period (\^\f3.\fP\^) alone at the beginning of a line. .sp .5 .I Ed\^ supports a limited form of regular expression (RE) notation; regular expressions are used in addresses to specify lines and in some commands (e.g., .IR s ) to specify portions of a line that are to be substituted. A regular expression specifies a set of character strings. A member of this set of strings is said to be "matched" by the RE. The REs allowed by .I ed\^ are constructed as follows: .sp .5 The following one-character REs match a .I single\^ character: .TP "\w'1.1\ \ \ \ 'u" 1.1 An ordinary character (not one of those discussed in 1.2 below) is a one-character RE that matches itself. .TP "\w'1.1\ \ \ \ 'u" 1.2 A backslash (\f3\^\or to leave the function .BR main () with a .I "return expression;" construct. .\" @(#)cc.1 1.14  a non-standard set of characters and because text typeset with it requires different character and inter-word spacing than is used for standard fonts, documents that use the .SM CW font must be preprocessed by .IR cw . .PP The .SM CW font contains the 94 printing .SM ASCII characters: .RS .nf \f3abcdefghijklmnopqrstuvwxyz\f1 \f3ABCDEFGHIJKLMNOPQRSTUVWXYZ\f1 \f30123456789\f1 \f3!$%&()`'*+@.,/:;=?[]|-_^~"<>{}#\e\f1 .fi .RE plus 8 non-\s-1ASCII\s+1 characters represented by 4-character .IR troff (1) names (in some cases attaching these names to non-standard graphics): .br .ne 10 .PP .RS .if t .ig }} .TS box; c3 c3 c l c l . Character Symbol Troff Name _ ``Cents'' sign \(ct \e(ct \s-1EBCDIC\s+1 ``not'' sign \(no \e(no Left arrow \(<- \e(<- Right arrow \(-> \e(-> Down arrow \(da \e(da Vertical single quote \(fm \e(fm Control-shift indicator \(dg \e(dg Visible space indicator \(sq \e(sq Hyphen \(hy \e(hy .TE .}} .if n .ig }} .TS box; cI3 cI3 cI l c l . Character\^ Symbol Troff Name _ ``Cents'' sign %\(ct% %\%%(ct% e\fP\|) followed by any special character is a one-character RE that matches the special character itself. The special characters are: .RS .TP "\w'a.\ \ \ \ 'u" a. \&\f3.\fP, \f3\(**\fP, \f3[\fP, and \f3\^\e\fP (period, asterisk, left square bracket, and backslash, respectively), which are always special, except when they appear within square brackets (\^\f3[\|]\fP\^; see 1.4 below). .TP b. \*^ (caret or circumflex), which is special at the beginning of an entire RE (see 3.1 and 3.2 below), or when it immediately follows the left of a pair of square brackets (\^\f3[\|]\fP\^) (see 1.4 below). .TP c. \f3$\fP (currency symbol), which is special at the end of an entire RE (see 3.2 below). .TP d. The character used to bound (i.e., delimit) an entire RE, which is special for that RE (for example, see below how slash (\^\f3/\fP\^) is used in the .I g\^ command.) .RE .TP "\w'1.1\ \ \ \ 'u" 1.3 A period (\^\f3.\fP\^) is a one-character RE that matches any character except new line. .TP 1.4 A non-empty string of charac.TH CD 1 .SH NAME cd \- change working directory .SH SYNOPSIS .B cd [ directory ] .SH DESCRIPTION The \f2cd\f1 command is used to change from one working directory to another. The optional argument \f2directory\f1 can be specified in several ways. A complete pathname can be specified (e.g., \f3cd /usr/food/cabbage/cooked\f1). \f2Directory\f1 can also specify a pathname relative to the current directory. If the current directory is \f3/usr\f1 and you want to change to \f3/usr/food\f1, the command would be \f3cd food\f1. If .I directory\^ is not specified, the value of shell parameter .B .SM $HOME is used as the new working directory. If the command \f3cd ..\f1 is given, the new working directory will be one level higher in the directory hierarchy. For example, if the current working directory is \f3/x/y/z\f1, and the command \f3cd ..\f1 is given, the new working directory will be \f3/x/y\f1. ``Search paths'' may be specified by the shell variables \f3\s-1$PATH\s+1\f1 and \f3\s-1$CDPATH\s+1\f1 (refer to \f\s-1EBCDIC\s+1 ``not'' sign %\(no% %\%%(no% Left arrow %\(<-% %\%%(<-% Right arrow %\(->% %\%%(->% Down arrow %\(da% %\%%(da% Vertical single quote %\(fm% %\%%(fm% Control-shift indicator %\(dg% %\%%(dg% Visible space indicator %\(sq% %\%%(sq% Hyphen %\(hy% %\%%(hy% .TE .}} .RE .PP The hyphen is a synonym for the unadorned minus sign .RB ( - ). Certain versions of .I cw\^ recognize two additional names: .CD -t .if t %\e(ua% .if n \e(ua for an up arrow and .if t %\e(lh% .CD +t .if n \e(lh for a diagonal left-up (home) arrow. .PP .I Cw\^ recognizes 5 request lines, as well as user-defined delimiters. The request lines look like .IR troff (1) macro requests, and are copied in their entirety by .I cw\^ onto its output; thus, they can be defined by the user as .IR troff (1) macros; in fact, the %.CW% and %.CN% macros should be so defined (see .SM .I HINTS\^ below). The 5 requests are: .TP .B .CW Start of text to be set in the .SM CW font; %.CW% causes a break; it can take precisely the same options, in precisely t  ters enclosed in square brackets (\^\f3[\|]\fP\^) is a one-character RE that matches any single character in that string. If, however, the first character of the string is a circumflex (\*^), the one-character RE matches any character except new line and the remaining characters in the string. The \*^ has this special meaning only if it occurs first in the string. The minus (\f3\-\fP) may be used to indicate a range of consecutive .SM ASCII characters; for example, \f3[0\-9]\fP is equivalent to \f3[0123456789]\fP. The \f3\-\fP loses this special meaning if it occurs first (after an initial \*^, if any) or last in the string. The right square bracket (\^\f3]\fP\^) does not terminate such a string when it is the first character within it (after an initial \*^, if any); e.g., \f3[\|]a\-f]\fP matches either a right square bracket (\^\f3]\fP\^) or one of the letters \f3a\fP through \f3f\fP, inclusive. The four characters listed in 1.2.a above stand for themselves within such a string of characters. .sp .5 The foll2sh\f1(1)). The current values for these variables can be reviewed by using the \f2env\f1(1) command. .PP .I Cd\^ must have execute (search) permission in .IR directory\^ . .PP Because a new process is created to execute each command, .I cd\^ would be ineffective if it were written as a normal command; therefore, it is recognized and internal to the shell. .SH SEE ALSO pwd(1), sh(1), chdir(2). .\" @(#)cd.1 1.3 he same format, as are available on the .I cw\^ command line. .TP .B .CN End of text to be set in the .SM CW font; %.CN% causes a break; it can take the same options as are available on the .I cw\^ command line. .TP .B .CD Change delimiters and/or settings of other options; takes the same options as are available on the .I cw\^ command line. .TP .BI .CP " \^arg1 \^arg2 \^arg3 " ... " \^argn\^ All the arguments (which are delimited like .IR troff (1) macro arguments) are concatenated, with the odd-numbered arguments set in the .SM CW font and the even-numbered ones in the prevailing font. .TP .BI .PC " \^arg1 \^arg2 \^arg3 " ... " \^argn\^ Same as %.CP%, except that the even-numbered arguments are set in the .SM CW font and the odd-numbered ones in the prevailing font. .PP The %.CW% and %.CN% requests are meant to bracket text (e.g., a program fragment) that is to be typeset in the .SM CW font ``as is.''\ Normally, .I cw\^ operates in the .I transparent\^ mode. In that mode, except for the %.CD% request and towing rules may be used to construct REs from one-character REs: .TP "\w'1.1\ \ \ \ 'u" 2.1 A one-character RE is a RE that matches whatever the one-character RE matches. .TP 2.2 A one-character RE followed by an asterisk (\f3\(**\fP) is a RE that matches zero or more occurrences of the one-character RE. If there is any choice, the longest leftmost string that permits a match is chosen. .TP 2.3 A one-character RE followed by \f3\^\e\|{\fP\^\f2m\fP\^\f3\e\|}\fP, \f3\^\e\|{\fP\^\f2m,\fP\^\f3\e\|}\fP, or \f3\^\e\|{\fP\^\f2m,n\fP\^\f3\e\|}\fP is a RE that matches a range of occurrences of the one-character RE. The values of .I m\^ and .I n\^ must be non-negative integers less than 256; \f3\^\e\|{\fP\^\f2m\fP\^\f3\e\|}\fP matches exactly .I m\^ occurrences; \f3\^\e\|{\fP\^\f2m,\fP\^\f3\e\|}\fP matches at least .I m\^ occurrences; \f3\^\e\|{\fP\^\f2m,n\fP\^\f3\e\|}\fP matches any number of occurrences between .I m\^ and .I n\^ inclusive. Whenever a choice exists, the RE matches as many occurrences as possible. .TP   .tr ~ .nr f 0 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR[\fI\\$2\^\fR] \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR\fI\\$2\^\fR \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .ds W) \fI\s-1WARNINGS\s+1\^\fR .ds X) \fI\s-1EXAMPLES\s+1\^\fR .ds M) \fB\s-1MR\s+1\fR .ds S) \s-1SCCS\s+1 .ds I) \fI\s-1SID\s+1\fR .TH CDC 1 .SH NAME cdc \- change the delta commentary of an \s-1SCCS\s+1 delta .SH SYNOPSIS .B cdc \fB\-r\fR\c .SM SID .SP m [mrlist]] .SP y [comment]] files .SH DESCRIPTION .I Cdc\^ changes the delta commentary, for the \*(I) specified by the .B \-r keyletter, of each named \*(S) file. .PP Delta commentary is defined as the Modification Request (\*(M)) and/or comment information normally specified via the .IR delta (1) command .Rhe nine special 4-character names listed in the table above, every character between %.CW% and %.CN% request lines stands for itself. In particular, .I cw\^ arranges for periods .RB ( . ) and apostrophes .RB ( ' ) at the beginning of lines, and backslashes .if t (%\%) .if n (\e) everywhere to be ``hidden'' from .IR troff (1). The transparent mode can be turned off (see below), in which case normal .IR troff (1) rules apply; in particular, lines that begin with %.% and %'% are passed through untouched (except if they contain delimiters\-see below). In either case, .I cw\^ hides the effect of the font changes generated by the %.CW% and %.CN% requests; .I cw\^ also defeats all ligatures (%fi%, %ff%, etc.) in the .SM CW font. .PP The only purpose of the %.CD% request is to allow the changing of various options other than just at the beginning of a document. .PP The user can also define .IR delimiters . The left and right delimiters perform the same function as the %.CW%\|/%.CN% requests; they are meant, however, 2.4 The concatenation of REs is a RE that matches the concatenation of the strings matched by each component of the RE. .TP 2.5 A RE enclosed between the character sequences \f3\^\e\|(\fP and \f3\^\e\|)\fP is a RE that matches whatever the unadorned RE matches. .TP 2.6 The expression \f3\^\e\fP\f2\|n\fP\^ matches the same string of characters as was matched by an expression enclosed between \f3\^\e\|(\fP and \f3\^\e\|)\fP earlier in the same RE. Here .I n\^ is a digit; the sub-expression specified is that beginning with the .IR n -th occurrence of \f3\^\e\|(\fP counting from the left. For example, the expression \*^\f3\e\|(.\(**\e\|)\e\|1$\fP matches a line consisting of two repeated appearances of the same string. .sp .5 Finally, an entire RE may be constrained to match only an initial segment or final segment of a line (or both): .TP "\w'1.1\ \ \ \ 'u" 3.1 A circumflex (\*^) at the beginning of an entire RE constrains that RE to match an initial segment of a line. .TP 3.2 A currency symbol (\^\f3$\fP\^) at B ( \-m and .B \-y keyletters). .PP If a directory is named, .I cdc\^ behaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of the pathname does not begin with \fBs.\fR) and unreadable files are silently ignored. If a name of .B \- is given, the standard input is read (see \%\*(W)); each line of the standard input is taken to be the name of an \*(S) file to be processed. .PP Arguments to .IR cdc , which may appear in any order, consist of .I keyletter\^ arguments, and file names. .PP All the described .I keyletter\^ arguments apply independently to each named file: .A2 r \s-1SID\s+1 Used to specify the .IR S \s-1CCS\s+1 .IR ID entification (\*(I)) string of a delta for which the delta commentary is to be changed. .A1 m mrlist If the \*(S) file has the .B v flag set (see .IR admin (1)) then a list of \*(M) numbers to be added and/or deleted in the delta commentary of the \*(I) specified by the .B \-r keyletter .I may\^ be supplied. A null \*(M)  to enclose .SM CW ``words'' or ``phrases'' in running text (see example under .SM .I BUGS\^ below). .I Cw\^ treats text between delimiters in the same manner as text enclosed by %.CW%\|/%.CN% pairs, except that, for aesthetic reasons, spaces and backspaces inside %.CW%\|/%.CN% pairs have the same width as other .SM CW characters, while spaces and backspaces between delimiters are half as wide, so they have the same width as spaces in the prevailing text (but are .I not\^ adjustable). Font changes due to delimiters are .I not hidden. .PP Delimiters have no special meaning inside %.CW%\|/%.CN% pairs. .PP The options are: .TP .BI -l xx\^ The 1- or 2-character string .I xx\^ becomes the left delimiter; if .I xx\^ is omitted, the left delimiter becomes undefined, which it is initially. .TP .BI -r xx\^ Same for the right delimiter. The left and right delimiters may (but need not) be different. .TP .BI -f n\^ The .SM CW font is mounted in font position .IR n ; acceptable values for .I n\^ are 1, 2, and 3 (default isthe end of an entire RE constrains that RE to match a final segment of a line. .TP 3.3 The construction \%\*^\f2entire RE\fP\|\f3$\fP constrains the entire RE to match the entire line. .TP 3.4 The null RE (e.g., \f3//\fP) is equivalent to the last RE encountered. See also the last paragraph before .SM .I FILES\^ below. .sp .5 To understand addressing in .I ed\^ it is necessary to know what the current line is at any given time. Generally speaking, the current line is the last line affected by a command; the exact effect on the current line is discussed under the description of each command. Addresses are constructed as follows: .TP "\w'1.1\ \ \ \ 'u" \01. The character \f3.\fP addresses the current line. .TP \02. The character \f3$\fP addresses the last line of the buffer. .TP \03. A decimal number .I n\^ addresses the .IR n -th line of the buffer. .TP \04. \f2\(fmx\fP\^ addresses the line marked with the mark name character .IR x , which must be a lower-case letter. Lines are marked with the .I k\^ command  list has no effect. .C1 \& \*(M) entries are added to the list of \*(M)s in the same manner as that of .IR delta (1). In order to delete an \*(M), precede the \*(M) number with the character \fB!\fR (see \*(X)). If the \*(M) to be deleted is currently in the list of \*(M)s, it is removed and changed into a ``comment'' line. A list of all deleted \*(M)s is placed in the comment section of the delta commentary and preceded by a comment line stating that they were deleted. .C1 \& If .B \-m is not used and the standard input is a terminal, the prompt .B \s-1MR\s+1s? is issued on the standard output before the standard input is read; if the standard input is not a terminal, no prompt is issued. The \fB\s-1MR\s+1s?\fR prompt always precedes the \fBcomments?\fR prompt (see .B \-y keyletter). .C1 \& \*(M)s in a list are separated by blanks and/or tab characters. An unescaped new-line character terminates the \*(M) list. .C1 \& Note that if the .B v flag has a value (see .IR admin (1)), it is taken to be the name of  3, replacing the bold font). This option is only useful at the beginning of a document. .TP .B -t Turn transparent mode .IR off . .TP .B +t Turn transparent mode .I on\^ (this is the initial default). .TP .B -d Print current option settings on file descriptor 2 in the form of .IR troff (1) comment lines. This option is meant for debugging. .PP .I Cw\^ reads the standard input when no .I files\^ are specified (or when .B - is specified as the last argument), so it can be used as a filter. Typical usage is: .RS \f3cw \f2files\f3 | troff ...\f1 .RE .I Checkcw\^ checks that left and right delimiters, as well as the %.CW%\|/%.CN% pairs, are properly balanced. It prints out all offending lines. .br .ne 14v .SH HINTS Typical definitions of the %.CW% and %.CN% macros meant to be used with the .IR mm (5) macro package: .if n .ig }} .RS .nf \&.de CW \&.DS I \&.ps 9 \&.vs 10.5p \&.ta 16m\^/3u 32m\^/3u 48m\^/3u 64m\^/3u 80m\^/3u 96m\^/3u ... \&.. \&.de CN \&.ta .5i 1i 1.5i 2i 2.5i 3i ... \&.vs \&.ps \&.DE \&.. .fi .RE .  described below. .TP \05. A RE enclosed by slashes (\^\f3/\fP\^) addresses the first line containing a matching RE found by searching forward from the line following the current line. If necessary, the search wraps around to the beginning of the buffer and continues up to and including the current line, so that the entire buffer is searched. See also the last paragraph before .SM .I FILES\^ below. .TP \06. A RE enclosed in question marks (\^\f3?\fP\^) addresses the first line containing a matching RE found by searching backward from the line preceding the current line. If necessary, the search wraps around to the end of the buffer and continues up to and including the current line. See also the last paragraph before .SM .I FILES\^ below. .TP \07. An address followed by a plus sign (\^\f3+\fP\^) or minus sign (\f3\-\fP) and a decimal number specifies that address plus (or minus) the indicated number of lines. The plus sign may be omitted. .TP \08. If an address begins with \f3+\fP or \f3\-\fP, the addition or a program (or shell procedure) which validates the correctness of the \*(M) numbers. If a non-zero exit status is returned from the \*(M) number validation program, .I cdc\^ terminates and the delta commentary remains unchanged. .A1 y comment Arbitrary text used to replace the \fIcomment\^\fR(s) already existing for the delta specified by the .B \-r keyletter. The previous comments are kept and preceded by a comment line stating that they were changed. A null \fIcomment\^\fR has no effect. .C1 \& If .B \-y is not specified and the standard input is a terminal, the prompt \fBcomments?\fR is issued on the standard output before the standard input is read; if the standard input is not a terminal, no prompt is issued. An unescaped new-line character terminates the \fIcomment\^\fR text. .i0 .PP The exact permissions necessary to modify the \*(S) file are documented in the ``Source Code Control System User's Guide'' in the .IR "System V/68 User's Guide" . Simply stated, if you made the delta, you can change its delPP .}} .PP At the very least, the %.CW% macro should invoke the .IR troff (1) no-fill (%.nf%) mode. .PP When set in running text, the .SM CW font is meant to be set in the same point size as the rest of the text. In displayed matter, on the other hand, it can often be profitably set one point .I smaller\^ than the prevailing point size (the displayed definitions of %.CW% and %.CN% above are one point smaller than the running text on this page). The .SM CW font is sized so that, when it is set in 9-point, there are 12 characters per inch. .PP Documents that contain .SM CW text may also contain tables and/or equations. If this is the case, the order of preprocessing should be: .IR cw , .IR tbl , and .IR eqn . Usually, the tables contained in such documents will not contain any .SM CW text, although it is entirely possible to have .I elements\^ of the table set in the .SM CW font; of course, care must be taken that .IR tbl (1) format information not be modified by .IR cw . Attempts to set equations in the .SM CWsubtraction is taken with respect to the current line; e.g, \f3\-5\fP is understood to mean \f3.\-5\fP. .TP \09. If an address ends with \f3+\fP or \f3\-\fP, then 1 is added to or subtracted from the address, respectively. As a consequence of this rule and of rule 8 immediately above, the address \f3\-\fP refers to the line preceding the current line. (To maintain compatibility with earlier versions of the editor, the character \*^ in addresses is entirely equivalent to \f3\-\fP.) Moreover, trailing \f3+\fP and \f3\-\fP characters have a cumulative effect, so \f3\-\-\fP refers to the current line less 2. .TP 10. For convenience, a comma (\^\f3,\fP\^) stands for the address pair \f31,\^$\fP, while a semicolon (\^\f3;\fP\^) stands for the pair \f3.\^,\^$\fP. .br .if \n()s .bp .sp .5 Commands may require zero, one, or two addresses. Commands that require no addresses regard the presence of an address as an error. Commands that accept one or two addresses assume default addresses when an insufficient number of ad  ta commentary; if you own the file and directory you can modify the delta commentary. .SH EXAMPLES .RS 5n .B "cdc \-r1.6 \-m"bl78-12345 !bl77-54321 bl79-00001" \-ytrouble s.file" .RE .PP adds bl78-12345 and bl79-00001 to the \*(M) list, removes bl77-54321 from the \*(M) list, and adds the comment \fBtrouble\fR to delta 1\fB.\fR6 of s\fB.\fRfile. .PP The same changes can be accomplished with: .sp .RS 5n .B "cdc \-r1.6 s.file" .br .B "\s-1MR\s+1s? !bl77-54321 bl78-12345 bl79-00001" .br .B "comments? trouble" .RE .PP .DT .SH WARNINGS If \*(S) filenames are supplied to the .I cdc\^ command via the standard input (\fB\-\fR on the command line), the .B \-m and .B \-y keyletters must also be used. .SH FILES .PD 0 .TP 10 x-file (see .IR delta (1)) .TP z-file (see .IR delta (1)) .PD .SH SEE ALSO admin(1), delta(1), get(1), help(1), prs(1), sccsfile(4). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .tr ~~ .\" @(#)cdc.1 1.6  font are not likely to be either pleasing or successful. .PP In the .SM CW font, overstriking is most easily accomplished with backspaces: letting %\(<-% represent a backspace, %d\(<-\(<-\(%%dg% yields %d\(dg%. Because backspaces are half as wide between delimiters as inside %.CW%\|/%.CN% pairs, two backspaces are required for each overstrike between delimiters (see paragraph describing delimiters above). .SH FILES /usr/lib/font/ft\s-1CW\s+1\ \ \ \ .SM CW font-width table .SH SEE ALSO eqn(1), mmt(1), tbl(1), troff(1), mm(5), mv(5). .SH WARNINGS If text preprocessed by .I cw\^ is to make any sense, it must be set on a typesetter equipped with the .SM CW font or on a .SM STARE facility; on the latter, the .SM CW font appears as bold, but with the proper .SM CW spacing. .PP Do not use periods (%.%), backslashes (%\%), or double quotes (%"%) as delimiters, or as arguments to %.CP% and %.PC%. .SH BUGS Certain .SM CW characters don't concatenate gracefully with certain Times Roman characters, e.g., a .SM CW amp[^adgjmpsvy|.TH CFLOW 1 .SH NAME cflow \- generate C flow graph .SH SYNOPSIS .B cflow .RB [ \-r ] .RB [ \-ix ] .RB [ \-i_ ] .RB [ \-d num] files .SH DESCRIPTION .I Cflow analyzes a collection of .SM C\*S, .SM YACC\*S, .SM LEX\*S, assembler, and object files and attempts to build a graph charting the external references. Files suffixed in .BR .y " (for YACC)," .BR .l " (for LEX)," .BR .c " (for C)," and .BR .i are preprocessed (bypassed for .B .i files) as appropriate and then run through the first pass of .IR lint (1). (The .BR \-I \*S, .BR \-D \*S, and .BR \-U options of the C-preprocessor are also understood.) Files suffixed with .B .s are assembled and information is extracted (as in .B .o files) from the symbol table. The output of all this non-trivial processing is collected and turned into a graph of external references which is displayed upon the standard output. .PP Each line of output begins with a reference number (line number), followed by a suitable number of tabs indicating the level. These are followed by t  ersand (%&%) followed by a Times Roman comma(%,%); in such cases, judicious use of .IR troff (1) half- and quarter-spaces .if t (%\|% and %\^%) .if n (\e| and \e^) is most salutary, e.g., one should use .if t %_&_\^,% .if n _&_\e^, (rather than just plain %_&_,%) to obtain %&%\^, (assuming that %_% is used for both delimiters). .br Use of .I cw\^ with .I nroff\^ is unproductive. .br The output of .I cw\^ is hard to read. .br See also .SM .I BUGS\^ under .IR troff (1). .\" @(#)cw.1 1.7 dresses is given; if more addresses are given than such a command requires, the last one(s) are used. .sp .5 Typically, addresses are separated from each other by a comma (\^\f3,\fP\^). They may also be separated by a semicolon (\^\f3;\fP\^). In the latter case, the current line (\^\f3.\fP\^) is set to the first address, and only then is the second address calculated. This feature can be used to determine the starting line for forward and backward searches (see rules 5. and 6. above). The second address of any two-address sequence must correspond to a line that follows, in the buffer, the line corresponding to the first address. .sp .5 In the following list of .I ed\^ commands, the default addresses are shown in parentheses. The parentheses are .I not\^ part of the address; they show that the given addresses are the default. .sp .5 It is generally illegal for more than one command to appear on a line. However, any command (except .IR e , .IR f , .IR r , or .IR w ) may be suffixed by \f3l\fP, \f3n\fP or \f3p\fhe name of the global (normally only a function not defined as an external or beginning with an underscore; see below for the .B \-i inclusion option), a colon, and the definition of the global. For information extracted from C source, the definition consists of an abstract type declaration (e.g., .BR "char \(**" ), and, delimited by angle brackets, the name of the source file and the line number where the definition was found. Definitions extracted from object files indicate the filename and location counter under which the symbol appeared (e.g., .IR text ). Leading underscores in C-style external names are deleted. .PP Once a definition of a name has been printed, subsequent references to that name contain only the reference number of the line where the definition may be found. For undefined references, only .B <\|> is printed. .PP As an example, given the following in .IR file.c : .sp .nf .na int i; main() { f(); g(); f(); } f() { i = h(); } .ad .fi .sp the command .sp .nf .na cflow file..TH CXREF 1 .SH NAME cxref \- generate C program cross-reference .SH SYNOPSIS .B cxref \&[ options ] files .SH DESCRIPTION .I Cxref analyzes a collection of C files and attempts to build a cross-reference table. .I Cxref utilizes a special version of .I cpp to include .B #define information in its symbol table. It produces a listing on standard output of all symbols (auto, static, and global) in each file separately, or with the .B \-c option, in combination. Each symbol contains an asterisk (\(**) before the declaring reference. .PP In addition to the .BR \-D \*S, .B \-I and .B \-U options (which are identical to their interpretation by .IR cc (1)), the following \fIoptions\fP are interpreted by .IR cxref : .TP 8 .B \-c Print a combined cross-reference of all input files. .TP .B \-w Format output no wider than (decimal) columns. This option defaults to 80 if is not specified or is less than 51. .TP .BI \-o file Direct output to named \fIfile\fP. .TP .B \-s Operate silently; input filenames   P, in which case the current line is either listed, numbered or printed, respectively, as discussed below under the .IR l\^ , .I n and .I p\^ commands. .ne 7 .HP .B (\|.\|)a .br .ns .HP .br .ns .HP .if t .rs .if t .sp -.5v \&\f3.\fP .br The .IR a ppend command reads the given text and appends it after the addressed line; \&\f3.\fP is left at the last inserted line, or, if there were none, at the addressed line. Address 0 is legal for this command: it causes the ``appended'' text to be placed at the beginning of the buffer. The maximum number of characters that may be entered from a terminal is 256 per line (including the new-line character). .HP .B (\|.\|)c .br .ns .HP .br .ns .HP .if t .rs .if t .sp -.5v \&\f3.\fP .br The .IR c hange command deletes the addressed lines, then accepts input text that replaces these lines; \&\f3.\fP is left at the last line input, or, if there were none, at the first line that was not deleted. .HP .B (\|.\|,\|.\|)d .br The .IR d elete command deletes the addressedc .fi .ad .sp produces the the output .sp .nf .na 1 main: int(), 2 f: int(), 3 h: <> 4 i: int, 5 g: <> .ad .fi .sp When the nesting level becomes too deep, the .BR \-e option of .IR pr (1) can be used to compress the tab expansion to something less than every eight spaces. .PP The following options are interpreted by .IR cflow : .TP \w'\fB\-d\fPnum\ \ 'u .B \-r Reverse the ``caller:callee'' relationship to produce an inverted listing showing the callers of each function. The listing is sorted in lexicographical order by callee. .TP .B \-ix Include external and static data symbols. The default is to include only functions in the flow graph. .TP .B \-i_ Include names that begin with an underscore. The default is to exclude these functions (and data if \fI-ix\fP is used). .TP .BI \-d num Terminate the flow graph at the level specified by the .I num decimal integer. By default this is a very large number. The cutoff depth should not be set to a nonpositive integer. .SHnot printed. .TP .BR \-t Format listing for 80-column width. .SH FILES .TP \w'/usr/lib/xcpp\ \ \ \ 'u /usr/lib/xcpp special version of C-preprocessor. .SH SEE ALSO cc(1). .SH DIAGNOSTICS Error messages are cryptic, but usually mean that you can't compile these files. .\" @(#)cxref.1 1.4  lines from the buffer. The line after the last line deleted becomes the current line; if the lines deleted were originally at the end of the buffer, the new last line becomes the current line. .HP .BI e " file\^" .br The .IR e dit command causes the entire contents of the buffer to be deleted, and then the named file to be read in; \&\f3.\fP is set to the last line of the buffer. If no filename is given, the currently-remembered filename, if any, is used (see the .I f\^ command). The number of characters read is typed; .I file\^ is remembered for possible use as a default filename in subsequent .IR e , .IR r , and .IR w " commands." If .I file\^ is replaced by \f3!\fP, the rest of the line is taken to be a shell (\f2sh\fP\^(1)) command whose output is to be read. Such a shell command is not remembered as the current filename. See also .SM .I DIAGNOSTICS\^ below. .HP .BI E " file\^" .br The .IR E dit command is like .IR e , except that the editor does not check to see if any changes have been made to the buff   DIAGNOSTICS Complains about bad options. Complains about multiple definitions and only believes the first. Other messages may come from the various programs used (e.g., the C-preprocessor). .SH SEE ALSO as(1), cc(1), lex(1), lint(1), nm(1), pr(1), yacc(1). .SH BUGS Files produced by .IR lex (1) and .IR yacc (1) cause the reordering of line number declarations which can confuse .IR cflow . To get proper results, feed .I cflow the .I yacc or .I lex input. .\" @(#)cflow.1 1.6 .TH DATE 1 .SH NAME date \- print and set the date .SH SYNOPSIS .B date [ mmddhhmm[yy] ] [ \fB+\fPformat ] .SH DESCRIPTION If no argument is given, or if the argument begins with \fB+\fP, the current date and time are printed; otherwise, the current date is set. The first .I mm\^ is the month number;\fR .I dd\^ is the day number in the month;\fR .I hh\^ is the hour number (24-hour system).\fR The second .I mm\^ is the minute number.\fR .I yy\^ is the last 2 digits of the year number and is optional. For example: .PP .RS \f3date\| 10080045\f1 .RE .PP sets the date to Oct 8, 12:45 \s-1AM\s+1. The current year is the default if no year is mentioned. The system operates in \s-1GMT\s0. .I Date\^ takes care of the conversion to and from local standard and daylight time. .PP If the argument begins with \fB+\fP, the output of .I date\^ is under the control of the user. The format for the output is similar to that of the first argument to .IR printf (3S). All output fields are of fixed size (zero padded if necessary).er since the last .I w\^ command. .HP .BI f " file\^" .br If .I file\^ is given, the .IR f \|ile-name command changes the currently-remembered filename to .IR file ; otherwise, it prints the currently-remembered filename. .HP .BI (\|1\|,\|$\|)g/ RE / "command list\^" .br In the .IR g lobal command, the first step is to mark every line that matches the given RE. Then, for every such line, the given .I "command list\^" is executed with \f3.\fP initially set to that line. A single command or the first of a list of commands appears on the same line as the global command. All lines of a multi-line list except the last line must be ended with a \f3\^\e\fP\|; .IR a , .IR i , and .I c\^ commands and associated input are permitted; the \f3.\fP terminating input mode may be omitted if it would be the last line of the .IR "command list" . An empty .I "command list\^" is equivalent to the .I p\^ command. The .IR g , .IR G , .IR v , and .I V\^ commands are .I not\^ permitted in the .IR "command list" . See also .SM .I BUG.\" @(#)checkcw.1 1.2 .so /usr/man/u_man/man1/cw.1    Each field descriptor is preceded by \fB%\fP and is replaced in the output by its corresponding value. A single \fB%\fP is encoded by \fB%%\fP. All other characters are copied to the output without change. The string is always terminated with a new-line character. .PP Field Descriptors: .RS .PD 0 .TP 5 .B n insert a new-line character .TP 5 .B t insert a tab character .TP 5 .B m month of year \- 01 to 12 .TP 5 .B d day of month \- 01 to 31 .TP 5 .B y last 2 digits of year \- 00 to 99 .TP 5 .B D date as mm/dd/yy .TP 5 .B H hour \- 00 to 23 .TP 5 .B M minute \- 00 to 59 .TP 5 .B S second \- 00 to 59 .TP 5 .B T time as \s-1HH:MM:SS\s+1 .TP 5 .B j day of year \- 001 to 366 .TP 5 .B w day of week \- Sunday = 0 .TP 5 .B a abbreviated weekday \- Sun to Sat .TP 5 .B h abbreviated month \- Jan to Dec .TP 5 .B r time in .SM AM/PM notation .RE .ne 8 .SH EXAMPLE The command .sp .RS .B "date\| \(fm+DATE: %m/%d/%y%nTIME: %H:%M:%S\(fm" .RE .sp generates as output: .sp .RS .B "DATE: 08/01/76" .br .B "TIME: 14:S\^ and the last paragraph before .SM .I FILES\^ below. .HP .BI (\|1\|,\|$\|)G/ RE /\^ .br In the interactive .IR G lobal command, the first step is to mark every line that matches the given RE. Then, for every such line, that line is printed, \f3.\fP is changed to that line, and any .I one\^ command (other than one of the .IR a , .IR c , .IR i , .IR g , .IR G , .IR v , and .I V\^ commands) may be input and is executed. After the execution of that command, the next marked line is printed, and so on; a new-line character acts as a null command; an \f3&\fP causes the re-execution of the most recent command executed within the current invocation of .IR G . Note that the commands input as part of the execution of the .I G\^ command may address and affect .I any\^ lines in the buffer. The .I G\^ command can be terminated by an interrupt signal (\s-1ASCII\s0 \s-1DEL\s0 or \s-1BREAK\s0). .HP .br .B h .br The .IR h elp command gives a short error message that explains the reason for the most recent \f3?\fP diagnostic.\" @(#)checkeq.1 1.2 .so /usr/man/u_man/man1/eqn.1 45:05" .RE .sp .PP .SH DIAGNOSTICS .TP "\w'\fIbad\ format\ character\ \ \fP'u" .B No permission\^ you aren't the superuser and are trying to change the date; .TP .B bad conversion\^ the date set is syntactically incorrect; .TP .B bad format character\^ the field descriptor is not recognizable. .SH FILES /dev/kmem .SH WARNING It is a bad practice to change the date while the system is running multi-user. .\" @(#)date.1 1.5   . .HP .B H .br The .IR H elp command causes .I ed\^ to enter a mode in which error messages are printed for all subsequent \f3?\fP diagnostics. It also explains the previous \f3?\fP if there was one. The .I H\^ command alternately turns this mode on and off; it is off initially. .HP .B (\|.\|)i .br .ns .HP .br .ns .HP .if t .rs .if t .sp -.5v \&\f3.\fP .br The .IR i nsert command inserts the given text before the addressed line; \&\f3.\fP is left at the last inserted line, or, if there were none, at the addressed line. This command differs from the .I a\^ command only in the placement of the input text. Address 0 is not legal for this command. The maximum number of characters that may be entered from a terminal is 256 per line (including the new-line character). .HP .B (\|.\|,\|.+1\|)j .br The .IR j oin command joins contiguous lines by removing the appropriate new-line characters. If exactly one address is given, this command does nothing. .HP .BI (\|.\|)k x\^ .br The mar\f2k\fP\^ command marks the ad.\" @(#)checkmm.1 1.2 .so /usr/man/u_man/man1/mm.1 .TH DC 1 .SH NAME dc \- desk calculator .SH SYNOPSIS .B dc [ file ] .SH DESCRIPTION .I Dc\^ is an arbitrary precision arithmetic package. Ordinarily it operates on decimal integers, but one may specify an input base, output base, and a number of fractional digits to be maintained. The overall structure of .I dc\^ is a stacking (reverse Polish) calculator. If an argument is given, input is taken from that file until its end, then from the standard input. .PP \f2Bc\f1(1), a preprocessor for \f2dc\f1, provides infix notation and a C-like syntax to implement funcitons and reasonable control structures for programs. .PP The following constructions are recognized by \f2dc\f1: .HP 6 .I number\^ .br The value of the number is pushed on the stack. A number is an unbroken string of the digits 0\-9. It may be preceded by an underscore (\f3_\fP) to input a negative number. Numbers may contain decimal points. .HP 6 .B "+ \- / \(** % ^" .br The top two values on the stack are added .RB ( + ), subtracted .RB ( \- ), multipdressed line with name .IR x , which must be a lower-case letter. The address \f2\(fmx\fP\^ then addresses this line; \&\f3.\fP is unchanged. .HP .B (\|.\|,\|.\|)l .br The .IR l ist command prints the addressed lines in an unambiguous way: a few non-printing characters (e.g., .IR "tab, backspace" ) are represented by mnemonic overstrikes; all other non-printing characters are printed in octal and long lines are folded. The .I l\^ command may be appended to any other command except .IR e , .IR f , .IR r , or .IR w . .HP .BI (\|.\|,\|.\|)m a\^ .br The .IR m ove command repositions the addressed line(s) after the line addressed by .IR a . Address 0 is legal for .I a\^ and causes the addressed line(s) to be moved to the beginning of the file; it is an error if address .I a\^ falls within the range of moved lines; \&\f3.\fP is left at the last line moved. .HP .B (\|.\|,\|.\|)n .br The .IR n umber command prints the addressed lines, preceding each line by its line number and a tab character; \&\f3.\fP is left at th .\" @(#)chgrp.1 1.2 .so /usr/man/u_man/man1/chown.1 lied (\f3\(**\fP), divided (\f3/\fP), remaindered (\f3%\fP), or exponentiated (\f3^\fP). The two entries are popped off the stack; the result is pushed on the stack in their place. Any fractional part of an exponent is ignored. .TP .BI s x\^ The top of the stack is popped and stored into a register named .IR x , where .I x\^ may be any character. If the .B s is capitalized, .I x\^ is treated as a stack and the value is pushed on it. .TP .BI l x\^ The value in register .I x\^ is pushed on the stack. The register .I x\^ is not altered. All registers start with zero value. If the .B l is capitalized, register .I x\^ is treated as a stack and its top value is popped onto the main stack. .TP .B d The top value on the stack is duplicated. .TP .B p The top value on the stack is printed. The top value remains unchanged. .B P interprets the top of the stack as an \s-1ASCII\s0 string, removes it, and prints it. .TP .B f All values on the stack are printed. .TP .B q exits the program. If executing a string, the recue last line printed. The .I n\^ command may be appended to any other command other than .IR e , .IR f , .IR r , or .IR w . .HP .B (\|.\|,\|.\|)p .br The .IR p rint command prints the addressed lines; \&\f3.\fP is left at the last line printed. The .I p\^ command may be appended to any other command other than .IR e , .IR f , .IR r , or .IR w ; for example, \f2dp\fP\^ deletes the current line and prints the new current line. .HP .br .B P .br The editor prompts with a \f3\(**\fP for all subsequent commands. The .I P\^ command alternately turns this mode on and off; it is off initially. .HP .B q .br The .IR q uit command causes .I ed\^ to exit. No automatic write of a file is done (but see .SM .I DIAGNOSTICS\^ below). .HP .br .B Q .br The editor exits without checking for changes made in the buffer since the last .I w\^ command. .HP .BI (\|$\|)r " file\^" .br The .IR r ead command reads in the given file after the addressed line. If no filename is given, the currently-remembered filename, if any, is used (see .I.TH CHMOD 1 .SH NAME chmod \- change mode .SH SYNOPSIS .B chmod mode files .SH DESCRIPTION The permissions of the named .I files\^ are changed according to .IR mode , which may be absolute or symbolic. An absolute .I mode\^ is an octal number constructed from the \s-1OR\s+1 of the following modes: .PP .PD 0 .RS .TP 10 4000 set user .SM ID on execution .TP 10 2000 set group .SM ID on execution .TP 10 1000 sticky bit, see .IR chmod (2) .TP 10 0400 read by owner .TP 10 0200 write by owner .TP 10 0100 execute (search in directory) by owner .TP 10 0070 read, write, execute (search) by group .TP 10 0007 read, write, execute (search) by others .RE .PD .PP A symbolic .I mode\^ has the form: .IP .RI [ " who " ] " op permission " [ " op permission " ] ] .PP The .I who\^ part is a combination of the letters .B u (user), .B g (group) and .B o (other). The letter .B a stands for all .RB "(" "ugo" ")," the default if .I who\^ is omitted. .PP .I Op\^ can be .B + to add .I permission\^ to the file's mode, .B \- to take away  rsion level is popped by two. If .B q is capitalized, the top value on the stack is popped and the string execution level is popped by that value. .TP .B x The top element of the stack is treated as a character string and is executed as a string of .I dc\^ commands. .TP .B X The number on the top of the stack is replaced with its scale factor. .TP .B "[ ... ]" The bracketed \s-1ASCII\s0 string is put onto the top of the stack. .HP 6 .BI < "x " > "x " = "x \^" .br The top two elements of the stack are popped and compared. Register .I x\^ is evaluated if they obey the stated relation. .TP .B v The top element on the stack is replaced by its square root. Any existing fractional part of the argument is taken into account, but otherwise the scale factor is ignored. .TP .B ! The rest of the line is interpreted as a \*(5) command. .TP .B c All values on the stack are popped. .TP .B i The top value on the stack is popped and used as the number radix for further input. .B I pushes the input base on the to e\^ and .I f\^ commands). The currently-remembered filename is not changed unless .I file\^ is the very first filename mentioned since .I ed\^ was invoked. Address 0 is legal for .I r\^ and causes the file to be read at the beginning of the buffer. If the read is successful, the number of characters read is typed; \&\f3.\fP is set to the last line read in. If .I file\^ is replaced by \f3!\fP, the rest of the line is taken to be a shell (\f2sh\fP\^(1)) command whose output is to be read. For example, "$r !ls" appends current directory to the end of the file being edited. Such a shell command is not remembered as the current filename. .HP .BI (\|.\|,\|.\|)s/ RE / replacement /\^ \ \ \ \ \ \ \ \ or .br .ns .HP .BI (\|.\|,\|.\|)s/ RE / replacement /g\^ .br The .IR s ubstitute command searches each addressed line for an occurrence of the specified RE. In each line in which a match is found, all (non-overlapped) matched strings are replaced by the .I replacement\^ if the global replacement indicator \f3g\fP appear.IR permission , or .B = to assign .I permission\^ absolutely (all other bits will be reset). .PP .I Permission\^ is any combination of the letters .B r (read), .B w (write), .B x (execute), .B s (set owner or group \s-1ID\s0), and .B t (save text, or sticky); .BR u , .BR g , or .B o indicate that .I permission\^ is to be taken from the current mode. Omitting .I permission\^ is only useful with .B = to take away all permissions. .PP Multiple symbolic modes separated by commas may be given. Operations are performed in the order specified. The letter .B s is useful only with .B u or .BR g ; .B t works only with .BR u . .PP Only the owner of a file (or the superuser) may change its mode. .SH EXAMPLES The first example denies write permission to others, the second makes a file executable: .IP .B "chmod o\-w file" .IP .B "chmod +x file" .PP .SH "SEE ALSO" ls(1), chmod(2). .\" @(#)chmod.1 1.4 p of the stack. .TP .B o The top value on the stack is popped and used as the number radix for further output. .TP .SM .B O The output base is pushed on the top of the stack. .TP .B k The top of the stack is popped, and that value is used as a non-negative scale factor: the appropriate number of places are printed on output, and maintained during multiplication, division, and exponentiation. The interaction of scale factor, input base, and output base will be reasonable if all are changed together. .TP .B z The stack level is pushed onto the stack. .TP .SM .B Z The number on the top of the stack is replaced with its length. .TP .B ? A line of input is taken from the input source (usually the terminal) and executed. .TP .B "; :" are used by .IR bc\^ (1) for array operations. .SH EXAMPLE This example prints the first ten values of n!: .nf .PP .in +3 \f3[la1+dsa\(**pla10>y]sy\f1 .br \f30sa1\f1 .br \f3lyx\f1 .fi .SH SEE ALSO bc(1). .br ``Desk Calculator Program (DC)'' in the .IR "\*(6) Support Tools Guide"  s after the command. If the global indicator does not appear, only the first occurrence of the matched string is replaced. It is an error for the substitution to fail on .I all\^ addressed lines. Any character other than space or new line may be used instead of \f3/\fP to delimit the RE and the .IR replacement ; \&\f3.\fP is left at the last line on which a substitution occurred. See also the last paragraph before .SM .I FILES\^ below. .IP An ampersand (\^\f3&\fP\^) appearing in the .I replacement\^ is replaced by the string matching the RE on the current line. The special meaning of \f3&\fP in this context may be suppressed by preceding it by \f3\^\e\fP\|. As a more general feature, the characters \f3\^\e\fP\f2\|n\fP\^, where .I n\^ is a digit, are replaced by the text matched by the .IR n -th regular subexpression of the specified RE enclosed between \f3\^\e\|(\fP and \f3\^\e\|)\fP. When nested parenthesized subexpressions are present, .I n\^ is determined by counting occurrences of \f3\^\e\|(\fP starting f.TH CHOWN 1 .SH NAME chown, chgrp \- change owner or group .SH SYNOPSIS .B chown owner file ... .PP .B chgrp group file ... .SH DESCRIPTION .I Chown\^ changes the owner of the .I files\^ to .IR owner . The owner may be either a decimal user \s-1ID\s+1 or a login name found in the password file. .PP .I Chgrp\^ changes the group .SM ID of the .I files\^ to .IR group . The group may be either a decimal group \s-1ID\s+1 or a group name found in the group file. .SH FILES /etc/passwd .br /etc/group .SH "SEE ALSO" chown(2), group(4), passwd(4). .\" @(#)chown.1 1.2 . .SH DIAGNOSTICS .TP 22 .B "x is unimplemented\^" .I x\^ is an octal number. .TP .B "stack empty\^" There are not enough elements on the stack to do what was asked. .TP .B "Out of space\^" The free list is exhausted (too many digits). .TP .B "Out of headers\^" Too many numbers are being kept. .TP .B "Out of pushdown\^" Too many items are on the stack. .TP .B "Nesting Depth\^" There are too many levels of nested execution. .\" @(#)dc.1 1.8 rom the left. When the character \f3%\fP is the only character in the .IR replacement , the .I replacement\^ used in the most recent substitute command is used as the .I replacement\^ in the current substitute command. The \f3%\fP loses its special meaning when it is in a replacement string of more than one character or is preceded by a \f3\^\e\fP\|. .IP A line may be split by substituting a new-line character into it. The new line in the .I replacement\^ must be escaped by preceding it by \f3\^\e\fP\|. Such substitution cannot be done as part of a .I g\^ or .I v\^ command list. .HP .BI (\|.\|,\|.\|)t a\^ .br This command acts just like the .I m\^ command, except that a .I copy\^ of the addressed lines is placed after address .I a\^ (which may be 0); \&\f3.\fP is left at the last line of the copy. .HP .B u .br The .IR u ndo command nullifies the effect of the most recent command that modified anything in the buffer (i.e., the most recent .IR a , .IR c , .IR d , .IR g , .IR i , .IR j , .IR m , .IR r , .IR s ,  .TH CMP 1 .SH NAME cmp \- compare two files .SH SYNOPSIS .B cmp [ .B \-l ] [ .B \-s ] file1 file2 .SH DESCRIPTION The two files are compared. (If .I file1\^ is .BR \- , the standard input is used.) Under default options, .I cmp\^ makes no comment if the files are the same; if they differ, it announces the byte and line number at which the difference occurred. If one file is an initial subsequence of the other, that fact is noted. .PP Options: .TP 6 .B \-l Print the byte number (decimal) and the differing bytes (octal) for each difference. .TP 6 .B \-s Print nothing for differing files; return codes only. .dt .SH "SEE ALSO" comm(1), diff(1). .SH DIAGNOSTICS Exit codes returned are: 0 for identical files, 1 for different files, and 2 for an inaccessible or missing argument. .\" @(#)cmp.1 1.3 .TH DD 1 .SH NAME dd \- convert and copy a file .SH SYNOPSIS .B dd [option=value] ... .SH DESCRIPTION .I Dd\^ copies the specified input file to the specified output with possible conversions. The standard input and output are used by default. The input and output block size may be specified to take advantage of raw physical I/O. .PP .br .ns .TP "\w'\fBconv=.\|.\|.\ ,\ .\|.\|.\ \ \fP'u" .I OPTION\^ .I VALUES\^ .br .ns .TP .BI if= file\^ input filename; standard input is default .br .ns .TP .BI of= file\^ output filename; standard output is default .br .ns .TP .BI ibs= n\^ input block size .I n\^ bytes (default 512) .br .ns .TP .BI obs= n\^ output block size (default 512) .br .ns .TP .BI bs= n\^ set both input and output block size, superseding .I ibs\^ and .IR obs ; also, if no conversion is specified, it is particularly efficient since no in-core copy need be done .br .ns .TP .BI cbs= n\^ conversion buffer size .br .ns .TP .BI skip= n\^ skip .IR n "" input records before starting copy .br .ns .TP .BI seek= n.IR t , .IR v , .IR G , or .I V\^ command). .HP .BI (\|1\|,\|$\|)v/ RE / "command list\^" .br This command is the same as the global command .I g\^ except that the .I "command list\^" is executed with \f3.\fP initially set to every line that does .I not\^ match the RE. .HP .BI (\|1\|,\|$\|)V/ RE /\^ .br This command is the same as the interactive global command .I G\^ except that the lines that are marked during the first step are those that do .I not\^ match the RE. .HP .BI (\|1\|,\|$\|)w " file\^" .br The .IR w rite command writes the addressed lines into the named file. If the file does not exist, it is created with mode 666 (readable and writable by everyone), unless your .I umask\^ setting (see .IR sh (1)) dictates otherwise. The currently-remembered filename is .I not\^ changed unless .I file\^ is the very first filename mentioned since .I ed\^ was invoked. If no filename is given, the currently-remembered filename, if any, is used (see .I e\^ and .I f\^ commands); \&\f3.\fP is unchanged. If the command.TH COL 1 .SH NAME col \- filter reverse line feeds .SH SYNOPSIS .B col [ .B \-bfpx ] .SH DESCRIPTION .I Col\^ reads from the standard input and writes onto the standard output. It performs the line overlays implied by reverse line feeds (\s-1ASCII\s+1 code \%\fB\s-1ESC\s+1-7\fP), and by forward and reverse half-line feeds (\fB\s-1ESC\s+1-9\fP and \fB\s-1ESC\s+1-8\fP). .I Col\^ is particularly useful for filtering multicolumn output made with the .B \&.rt command of .I nroff and output resulting from use of the .IR tbl (1) preprocessor. .PP If the .B \-b option is given, .I col\^ assumes that the output device in use is not capable of backspacing. In this case, if two or more characters are to appear in the same place, only the last one read is output. .PP Although .I col\^ accepts half-line motions in its input, it normally does not emit them on output. Instead, text that would appear between lines is moved to the next lower full-line boundary. This treatment can be suppressed by the .B \-f (fine) option; in \^ seek .I n\^ records from beginning of output file before copying .br .ns .TP .BI count= n\^ copy only .IR n "" input records .br .ns .TP .B conv=ascii convert \s-1EBCDIC\s0 to \s-1ASCII\s0 .br .ns .RS "\w'\fBconv=\fP'u" .TP "\w'\fB.\|.\|.\ ,\ .\|.\|.\ \ \fP'u" .B ebcdic convert \s-1ASCII\s0 to \s-1EBCDIC\s0 .br .ns .TP .B ibm slightly different map of \s-1ASCII\s0 to \s-1EBCDIC\s0 .br .ns .TP .B lcase map alphabetics to lower case .br .ns .TP .B ucase map alphabetics to upper case .br .ns .TP .B swab swap every pair of bytes .br .ns .TP .B noerror do not stop processing on an error .br .ns .TP .B sync pad every input record to .I ibs\^ .br .ns .TP .B ".\|.\|. , .\|.\|." several comma-separated conversions .RE .PP .fi Where sizes are specified, a number of bytes is expected. A number may end with .BR k , .BR b , or .B w to specify multiplication by 1024, 512, or 2 respectively; a pair of numbers may be separated by .B x to indicate a product. .PP .I Cbs\^ is used only if .I ascii\^ or .I ebcdic\^ conversio is successful, the number of characters written is typed. If .I file\^ is replaced by \f3!\fP, the rest of the line is taken to be a shell (\f2sh\fP\^(1)) command whose standard input is the addressed lines. Such a shell command is not remembered as the current filename. .HP .B (\|$\|)= .br The line number of the addressed line is typed; \&\f3.\fP is unchanged by this command. .HP .BI ! "shell\| command\^" .br The remainder of the line after the \f3!\fP is sent to the system shell (\f2sh\fP\^(1)) to be interpreted as a command. Within the text of that command, the unescaped character .B % is replaced with the remembered filename; if a .B ! appears as the first character of the shell command, it is replaced with the text of the previous shell command. Thus, .B !! repeats the last shell command. If any expansion is performed, the expanded line is echoed; \&\f3.\fP is unchanged. .HP .BR (\|.+1\|) .br An address alone on a line causes the addressed line to be printed. A new line alone is equivalent to this case, the output from .I col\^ may contain forward half-line feeds (\fB\s-1ESC\s+1-9\fP), but never contains either kind of reverse line motion. .PP Unless the .B \-x option is given, .I col\^ converts white space to tabs on output wherever possible to shorten printing time. .PP The \s-1ASCII\s+1 control characters Shift Out (\s-1\fBSO\fP\s+1) (\e017) and Shift In (\s-1\fBSI\fP\s+1) (\e016) are assumed by .I col\^ to start and end text in an alternate character set. The character set to which each input character belongs is remembered, and on output \s-1\fBSI\fP\s+1 and \s-1\fBSO\fP\s+1 characters are generated as appropriate to ensure that each character is printed in the correct character set. .PP On input, the only control characters accepted are space, backspace, tab, return, new line, \s-1\fBSI\fP\s+1, \s-1\fBSO\fP\s+1, \s-1\fBVT\fP\s+1 (\e013), and \fB\s-1ESC\s+1\fP followed by .BR 7 , .BR 8 , or .BR 9 . The \s-1\fBVT\fP\s+1 character is an alternate form of full reverse line feed, included for con is specified. In the former case, .I cbs\^ characters are placed into the conversion buffer, converted to \s-1ASCII\s0. Trailing blanks are trimmed and a new-line character is added before sending the line to the output. In the latter case, \s-1ASCII\s0 characters are read into the conversion buffer, converted to \s-1EBCDIC\s0, and blanks are added to make up an output record of size .IR cbs . .PP After completion, .I dd\^ reports the number of whole and partial input and output blocks. .SH EXAMPLE This command reads an \s-1EBCDIC\s0 tape blocked ten 80-byte \s-1EBCDIC\s0 card images per record into the \s-1ASCII\s0 file .BR x\| : .PP .nf .B "dd if=/dev/rmt0 of=x ibs=800 cbs=80 conv=ascii,lcase" .fi .PP Note the use of raw magtape. .I Dd\^ is especially suited to I/O on the raw physical devices because it allows reading and writing in arbitrary record sizes. .SH "SEE ALSO" cp(1). .if t .bp .SH DIAGNOSTICS .TP 23 .B "f+p records in(out)" numbers of full and partial records read(written) .SH BUGS The \s-  \f3.+1p\fP; it is useful for stepping forward through the buffer. .sp .5 If an interrupt signal (\s-1ASCII\s0 \s-1DEL\s0 or \s-1BREAK\s0) is sent, .I ed\^ prints a \f3?\fP and returns to the command level. .sp .5 Some size limitations: 512 characters per line, 256 characters per global command list, 64 characters per filename, and 128K characters in the buffer. The limit on the number of lines depends on the amount of user memory: each line takes 1 word. .sp .5 When reading a file, .I ed\^ discards .SM ASCII .SM NUL characters and all characters after the last new line. Files (e.g., .BR a.out ) that contain characters not in the .SM ASCII set (bit 8 on) cannot be edited by .IR ed . .sp .5 If the closing delimiter of a RE or of a replacement string (e.g., \f3/\fP) would be the last character before a new line, that delimiter may be omitted, in which case the addressed line is printed. The following pairs of commands are equivalent: .PD 0 .RS .TP 10 s/s1/s2 s/s1/s2/p .TP g/s1 g/s1/p .TP ?s1 ?s1? .RE .SH FILES mpatibility with some earlier programs of this type. All other non-printing characters are ignored. .PP Normally, .I col\^ ignores any unknown escape sequences found in the input; the .B \-p option may be used to cause .I col\^ to output these sequences as regular characters, subject to overprinting from reverse line motions. The use of this option is highly discouraged unless the user is fully aware of the textual position of the escape sequences. .SH SEE ALSO nroff(1), tbl(1). .SH NOTES The input format accepted by .I col\^ matches the output produced by .I nroff with either the .B \-T37 or .B \-Tlp options. Use .B \-T37 (and the .B \-f option of .IR col ) if the ultimate disposition of the output of .I col\^ is a device that can interpret half-line motions; otherwise, use .BR "\-Tlp" . .SH BUGS Cannot back up more than 128 lines. .br Allows at most 800 characters, including backspaces, on a line. .br Local vertical motions that would result in backing up over the first line of the document are ignored. As 1ASCII\s0/\s-1EBCDIC\s0 conversion tables are taken from the 256-character standard in the \s-1CACM\s0 Nov, 1968. The .I ibm\^ conversion, while less accepted as a standard, corresponds better to certain \s-1IBM\s0 print train conventions. There is no universal solution. .PP New-line characters are inserted only on conversion to \s-1ASCII\s0; padding is done only on conversion to \s-1EBCDIC\s0. These should be separate options. .\" @(#)dd.1 1.5 .PD 0 .TP 10 /tmp/e# temporary; # is the process number. .TP ed.hup work is saved here if the terminal is hung up. .SH "SEE ALSO" grep(1), sed(1), sh(1), stty(1), fspec(4), regexp(5). .br ``A Tutorial Introduction to the .I .SM UNIX .I Text Editor'' by B.\ W. Kernighan. .br ``Advanced Editing on .SM .IR UNIX '' by B.\ W. Kernighan. .br ``Text Editors'' in the .IR "\*(6) User's Guide" . .br ``Advanced Editing'' in the .IR "\*(6) Document Processing Guide" . .SH DIAGNOSTICS .TP 10 .B ? command errors .TP .BI ? file\^ inaccessible file .br (use the .IR h elp and .IR H elp commands for detailed explanations). .PD .sp .5 If changes have been made in the buffer since the last .I w\^ command that wrote the entire buffer, .I ed\^ warns the user if an attempt is made to destroy .IR ed 's buffer via the .I e\^ or .I q\^ commands: it prints .B ? and allows one to continue editing. A second .I e\^ or .I q\^ command at this point destroys the buffer. The \f3\-\fP command-line option inhibits this feature. .SH WARNINGS AND a result, the first line must not have any superscripts. .\" @(#)col.1 1.4 .tr ~ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR[\fI\\$2\fR] \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fI\\$2\fR \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .ds W) \fI\s-1WARNINGS\s+1\fR .ds M) \fB\s-1MR\s+1\fR .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .TH DELTA 1 .SH NAME delta \- make a delta (change) to an \s-1SCCS\s+1 file .SH SYNOPSIS .B delta .SP r SID ] .SF s .SF n .SP g list] .SP m \%[mrlist] ] .SP y \%[comment] ] .SF p files .SH DESCRIPTION .I Delta\^ is used to permanently introduce into the named \*(S) file changes that were mad BUGS A .I !\^ command cannot be subject to a .I g\^ or a .I v\^ command. .br The .I !\^ command and the .B ! escape from the .IR e , .IR r , and .I w\^ commands cannot be used if the the editor is invoked from a restricted shell (see .IR sh (1)). .br The sequence \f3\^\e\|n\fP in a RE does not match a new-line character. .br The .I l\^ command mishandles .SM DEL. .br Characters are masked to 7 bits on input. .\" @(#)ed.1 1.7 .tr ~ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .TP 8 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .TP 8 \f3\-\\$1\f2\\$2\fR \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .TH COMB 1 .SH NAME comb \- combine \s-1SCCS\s+1 deltas .SH SYNOPSIS .B comb .SF o .SF s .SP p sid ] .SP c list] files .SH DESCRIPTION .I Comb\^ generates a shell procedure (see .IR sh (1)) to reconstruct \s-1SCCS\s+1 files. The reconstructed files should be smaller than the original files. The arguments may be specified in any order, but all keyletter arguments apply to all named \s-1SCCS\s+1 files. If a directory is named, .I comb\^ behaves as though each file in the directory were specified as a named file, except that non-\s-1SCCS\s+1 files (last component of the pathname does not begin with \fBs.\fR) and unreadable files are silently ignor e to the file retrieved by .IR get (1) (called the .IR g-file , or generated file). .PP .I Delta\^ makes a delta to each named \*(S) file. If a directory is named, .I delta\^ behaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of the pathname does not begin with \fBs.\fR) and unreadable files are silently ignored. If a name of \fB\-\fR is given, the standard input is read (see \*(W)); each line of the standard input is taken to be the name of an \*(S) file to be processed. .PP .I Delta\^ may issue prompts on the standard output depending upon certain keyletters specified and flags (see .IR admin (1)) that may be present in the \*(S) file (see .B \-m and .B \-y keyletters below). .PP Keyletter arguments apply independently to each named file. .A2 r SID Uniquely identifies which delta is to be made to the \*(S) file. The use of this keyletter is necessary only if two or more outstanding .IR get s for editing .RB ( "get \-e" ) on the same \*(S).\" @(#)edit.1 1.9 .\" --- 6/30/81 (4/8/79) .TH EDIT 1 .UC .SH NAME edit \- text editor (variant of ex for casual users) .SH SYNOPSIS .B edit [ .B \-r ] name ... .SH DESCRIPTION .I Edit is a variant of the text editor .I ex recommended for new or casual users who wish to use a command oriented editor. The following brief introduction should help you get started with .I edit. A more complete basic introduction is provided by tutorial materials in the .IR "\*(6) User's Guide" . See .IR ex (1) for other useful documents; in particular, if you are using a \s-2CRT\s0 terminal you may want to learn about the display editor .I vi. .SH "BRIEF INTRODUCTION" To edit the contents of an existing file, begin with the following command to the shell: .ce .BI edit " filename" .I Edit makes a copy of the file which you can then edit, and tells you how many lines and characters are in the file. To create a new file, just make up a name for the file and try to run .I edit on it; you will cause an error diagnostic, but don'ted. If \fB\-\fR is the name given, the standard input is read; each line of the standard input is taken to be the name of an \s-1SCCS\s+1 file to be processed; non-\s-1SCCS\s+1 files and unreadable files are silently ignored. .PP The generated shell procedure is written on the standard output. .PP Keyletter arguments are as follows. Each is explained as though only one named file is to be processed, but the effects of any keyletter argument apply independently to each named file. .A2 p \s-1SID\s+1 The .IR S "\s-1CCS\s+1 " ID entification string (\s-1SID\s+1) of the oldest delta to be preserved. All older deltas are discarded in the reconstructed file. .A2 c list A .I list\^ (see .IR get (1) for the syntax of a \fIlist\fR) of deltas to be preserved. All other deltas are discarded. .AR o For each .B get \-e generated, this argument causes the reconstructed file to be accessed at the release of the delta to be created; otherwise, the reconstructed file would be accessed at the most recent ancestor. Use of the .B file were done by the same person (login name). The \*(I) value specified with the .B \-r keyletter can be either the \*(I) specified on the .I get\^ command line or the \*(I) to be made as reported by the .I get\^ command (see .IR get (1)). A diagnostic results if the specified \*(I) is ambiguous, or if it is necessary but omitted on the command line. .AR s Suppresses the issue, on the standard output, of the created delta's \*(I), as well as the number of lines inserted, deleted and unchanged in the \*(S) file. .AR n Specifies retention of the edited .I g-file\^ (normally removed at completion of delta processing). .A2 g list Specifies a \fIlist\fR (see .IR get (1) for the definition of \fIlist\fR) of deltas which are to be .I ignored\^ when the file is accessed at the change level (\*(I)) created by this delta. .A1 m mrlist If the \*(S) file has the .B v flag set (see .IR admin (1)) then a Modification Request (\*(M)) number \fImust\fR be supplied as the reason for creating the new delta. .C1 \& If .B \-m  worry. .sp .5 .I Edit prompts for commands with the character `:', which you should see after starting the editor. If you are editing an existing file, then you have some lines in the .I edit buffer (its name for the copy of the file you are editing). Most commands to .I edit use the ``current line'' if you don't specify which line to use. Thus, if you type .B print (which can be abbreviated \fBp\fR) and hit carriage return (as you should after all .I edit commands), the current line is printed. If you .B delete (\fBd\fR) the current line, .I edit prints the new current line. When you start editing, .I edit makes the last line of the file the current line. If you .B delete this last line, then the new last line becomes the current one. In general, after a .B delete, the next line in the file becomes the current line. (Deleting the last line is a special case.) .sp .5 If you start with an empty file, or wish to add some new lines, then the .B append (\fBa\fR) command can be used. After you give this command ( \-o keyletter may decrease the size of the reconstructed \s-1SCCS\s+1 file. It may also alter the shape of the delta tree of the original file. .AR s This argument causes .I comb\^ to generate a shell procedure which, when run, produces a report giving, for each file: the filename, size (in blocks) after combining, original size (also in blocks), and percentage change computed by: .br .ce 1 \%100~\fB\(**\fR~(original~\-~combined)~/~original .br It is recommended that before any \s-1SCCS\s+1 files are actually combined, one should use this option to determine exactly how much space is saved by the combining process. .PP If no keyletter arguments are specified, .I comb\^ preserves only leaf deltas and the minimal number of ancestors needed to preserve the tree. .SH FILES .PD 0 .TP 14 .RB s . \s-1COMB\s+1 The name of the reconstructed \s-1SCCS\s+1 file. .RE .TP 14 comb????? Temporary. .PD .SH "SEE ALSO" admin(1), delta(1), get(1), help(1), prs(1), sccsfile(4). .br ``Source Code Control System User's Guide'' in is not used and the standard input is a terminal, the prompt .SM .B MR\*Ss? is issued on the standard output before the standard input is read; if the standard input is not a terminal, no prompt is issued. The .SM .B MR\*Ss? prompt always precedes the .B comments? prompt (see .B \-y keyletter). .PP .C1 \& \*(M)s in a list are separated by blanks and/or tab characters. An unescaped new-line character terminates the \*(M) list. .C1 \& Note that if the .B v flag has a value (see .IR admin (1)), it is taken to be the name of a program (or shell procedure) for validating the correctness of the \*(M) numbers. If a non-zero exit status is returned from the \*(M) number validation program, .I delta\^ terminates (it is assumed that the \*(M) numbers were not all valid). .A1 y comment Arbitrary text used to describe the reason for making the delta. A null string is considered a valid \fIcomment\fR. .C1 \& If .B \-y is not specified and the standard input is a terminal, the prompt .B comments? is issued on the standardtyping a carriage return after the word \fBappend\fR) .I edit reads lines from your terminal, placing these lines after the current line. You terminate the input process by typing a line consisting of just a ``\fB.\fR''. The last line of text before the ``\fB.\fR'' line becomes the current line. The command .B insert (\fBi\fR) is like .B append but places the lines you give before, rather than after, the current line. .sp .5 .I Edit numbers the lines in the buffer, the first line having number 1. If you give the command ``1'' then .I edit types this first line. If you then give the command .BR delete , .I edit deletes the first line, line 2 becomes line 1, and .I edit prints the current line (the new line 1) so you can see where you are. In general, the current line is always the last line affected by a command. .sp .5 You can make a change to some text within the current line by using the .B substitute (\fBs\fR) command. You type ``s/\fIold\fR\|/\fInew\fR/'', where .I old is replaced by the characters you   the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .SH BUGS .I Comb\^ may rearrange the shape of the tree of deltas. It may not save any space; in fact, it is possible for the reconstructed file to be larger than the original. .tr ~~ .\" @(#)comb.1 1.6  output before the standard input is read; if the standard input is not a terminal, no prompt is issued. An unescaped new-line character terminates the comment text. .AR p Causes .I delta\^ to print (on the standard output) the \*(S) file differences before and after the delta is applied in a .IR diff (1) format. .RE .SH FILES All files of the form .IR ?- file are explained in the ``Source Code Control System User's Guide'' section of the .IR "\*(6) User's Guide" . The naming convention for these files is also described there. .PP .PD 0 .TP "\w`/usr/bin/bdiff\ \ \ `u" g-file Existed before the execution of .IR delta ; removed after completion of .IR delta . .TP p-file Existed before the execution of .IR delta ; may exist after completion of .IR delta . .TP q-file Created during the execution of .IR delta ; removed after completion of .IR delta . .TP x-file Created during the execution of .IR delta ; renamed to \*(S) file after completion of .IR delta . .TP z-file Created during the execution of .IR delta ; rewant to eliminate and .I new is the new characters you want to insert. .sp .5 The command .B file (\fBf\fR) tells you how many lines are in the buffer you are editing and says ``[Modified]'' if you have changed it. After modifying a file you can put the buffer text back to replace the file by giving a .B write (\fBw\fR) command. You can then leave the editor by issuing a .B quit (\fBq\fR) command. If you run .I edit on a file, but don't change it, it is not necessary (but does no harm) to .B write the file back. If you try to .B quit from .I edit after modifying the buffer without writing it out, you are warned that there has been ``No \fBwrite\fR since last change'' and .I edit awaits another command. If you wish not to .B write the buffer out then you can issue another .B quit command. The buffer is then irretrievably discarded, and you return to the shell. .sp .5 By using the .B delete and .B append commands, and giving line numbers to see lines in the file, you can make any changes you desire. You should .TH COMM 1 .SH NAME comm \- select or reject lines common to two sorted files .SH SYNOPSIS .B comm [ .B \- [ .B 123 ] ] file1 file2 .SH DESCRIPTION .I Comm\^ reads .I file1\^ and .IR file2 , which should be ordered in \s-1ASCII\s0 collating sequence (see .IR sort (1)), and produces a three-column output: lines only in .IR file1 ; lines only in .IR file2 ; and lines in both files. The filename .B \- means the standard input. .PP Flags 1, 2, or 3 suppress printing of the corresponding column. Thus .B comm .B \-12 prints only the lines common to the two files; .B comm .B \-23 prints only lines in the first file but not in the second; .B comm .B \-123 is a no-op. .PP .SH "SEE ALSO" cmp(1), diff(1), sort(1), uniq(1). .\" @(#)comm.1 1.3  moved during the execution of .IR delta . .TP d-file Created during the execution of .IR delta ; removed after completion of .IR delta . .TP /usr/bin/bdiff Program to compute differences between the ``gotten'' file and the .IR g-file . .PD .SH WARNINGS Lines beginning with the \s-1\fBSOH\fP ASCII\s+1 character (binary 001) cannot be placed in the \*(S) file unless the .SM .B SOH is escaped. This character has special meaning to \*(S) (see .I sccsfile\c\^ (5)) and causes an error. .PP A .I get\^ of many \*(S) files, followed by a .I delta\^ of those files, should be avoided when the .I get\^ generates a large amount of data. Instead, multiple .I "get/delta\^" sequences should be used. .PP If the standard input (\fB\-\fR) is specified on the .I delta\^ command line, the .B \-m (if necessary) and .B \-y keyletters .I must\^ also be present. Omission of these keyletters causes an error to occur. .PP Comments are limited to text strings of at most 512 characters. .SH "SEE ALSO" admin(1), bdiff(1), cdc(1), get(1), learn at least a few more things, however, if you are to use .I edit more than a few times. .sp .5 The .B change (\fBc\fR) command changes the current line to a sequence of lines you supply (as with .B append you terminate .B change with a line consisting of only a ``.''). You can tell .B change to change more than one line by giving the line numbers of the lines you want to change, i.e., ``3,5change''. You can print lines this way too. Thus ``1,23p'' prints the first 23 lines of the file. .sp .5 The .B undo (\fBu\fR) command reverses the effect of the last command that changed the buffer. Thus, if a .B substitute command doesn't do what you want, you can type .B undo and the old contents of the line are restored. You can also .B undo an .B undo command so that you can continue to change your mind. .I Edit issues a warning message when commands you give affect more than one line of the buffer. If the amount of change seems unreasonable, type .I undo and look to see what happened. If you decide that the chang.\" @(#)conv.1 1.8 .TH CONV 1 .SH NAME conv \- object file converter .SH SYNOPSIS .BR "conv [\-] [\-a] [\-o] [\-p] [\-s] \-t " "target files" .SH DESCRIPTION The .I conv\^ command converts object files from their current format to the format of the .I target\^ machine. The converted file is written to .BR file.v . .PP Command line options are: .TP 14 .B \- read .I files\^ from .IR stdin . .TP 14 .B \-a If the input file is an archive, produce the output file in the \s-1UNIX\s+1 6.0 portable archive format. .TP 14 .B \-o If the input file is an archive, produce the output file in the old archive format. .TP 14 .B \-p \s-1UNIX\s+1 5.0 random access archive format. This is the default. .TP 14 .B \-s Function exactly as 3bswab, i.e., ``preswab'' all characters in the object file. This is useful only for 3B20 object files which are to be ``swab-dumped'' from a DEC machine to a 3B20. .TP 14 .BI \-t " target" Convert the object file to the byte ordering of the machine (target) to which the object file is beinghelp(1), prs(1), rmdel(1), sccsfile(4). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .tr ~~ .\" @(#)delta.1 1.6  e is ok, then you can type .I undo again to get it back. Note that commands such as .I write and .I quit cannot be undone. .sp .5 To look at the next line in the buffer, hit carriage return. To look at a number of lines, hit ^D (control key and, while it is held down, D key, then let up both) rather than carriage return. This shows you a half screen of lines on a CRT or 12 lines on a hardcopy terminal. You can look at the text surrounding the current line by giving the command ``z.''. The current line becomes the last line printed; you can get back to the line where you were before the ``z.'' command by saying ``\'\'''. The .B z command can also be given following characters. .B "z\-" prints a screen of text (or 24 lines) ending where you are; .B "z+" prints the next screenful. If you want less than a screenful of lines you can specify the number you want. For example, .B z.12 produces 12 lines of text. This method of giving counts can be used with other commands. You can delete 5 lines starting with the c shipped. This may be another host or a target machine. Legal values for .I target\^ are: pdp, vax, ibm, i80, x86, b16, n3b, m32, and mc68. .PP .I Conv\^ can be used to convert all object files in common object file format. It can be used on either the source (``sending'') or target (``receiving'') machine. .PP .I Conv\^ is meant to ease the problems created by a multi-host cross-compilation development environment. .I Conv\^ is best used within a procedure for shipping object files from one machine to another. .PP .I Conv\^ will recognize and produce archive files in three formats: the \s-1UNIX\s+1 pre-5.0 format, the 5.0 random access format, and the 6.0 portable \s-1ASCII\s+1 .SH "EXAMPLE" \f3*ship object files from pdp11 to ibm\f1 .br \f3$echo *.out | conv \-t ibm \-$OFC/foo.o\f1 .br \f3$uucp *.v my370!~/rje/\f1 .SH "DIAGNOSTICS" All diagnosics for the \f2conv\f1 command are intended to be self-explanatory. Fatal diagnostics on the command lines cause termination. Fatal diagnostics on an input fi.TH DEROFF 1 .SH NAME deroff \- remove nroff/troff, tbl, and eqn constructs .SH SYNOPSIS .B deroff .RB [\| \-m x\|] .RB [\| \-w \|] [ files ] .SH DESCRIPTION .I Deroff\^ reads each of the .I files\^ in sequence and removes all .IR troff (1) requests, macro calls, backslash constructs, .IR eqn (1) constructs (between .SM .B \&.EQ and .SM .B \&.EN lines, and between delimiters), and .IR tbl (1) descriptions, perhaps replacing them with white space (blanks and blank lines), and writes the remainder of the file on the standard output. .I Deroff\^ follows chains of included files .RB ( \&.so and .B \&.nx .I troff\^ commands); if a file has already been included, a .B \&.so naming that file is ignored and a .B \&.nx naming that file terminates execution. If no input file is given, .I deroff\^ reads the standard input. .PP The .B \-m option may be followed by an .BR m , .BR s , or .BR l . The .B \-mm option causes the macros to be interpreted so that only running text is output (i.e., no text from macro lines.)\ Thurrent line with the command .B "delete 5". .sp .5 You can use line numbers to find things in a file; since the line numbers change when you insert and delete lines, this is somewhat unreliable. You can search backward and forward in the file for strings by giving commands of the form \fB/text/\fR to search forward for .I text or \fB?text?\fR to search backward for .I text. If a search reaches the end of the file without finding the text, it wraps, end around, and continues to search back to the current line. A useful feature is a search of the form \fB/^text/\fR which searches for .I text at the beginning of a line. Similarly, \fB/text$/\fR searches for .I text at the end of a line. You can leave off the trailing / or ? in these commands. .sp .5 The current line has a symbolic name ``\fB.\fR''; this is most useful in a range of lines, as in \fB.,$print\fP, which prints the rest of the lines in the file. To get to the last line in the file you can refer to it by its symbolic name ``$''. Thus the command \fB le cause the program to continue to the next input file. .SH "WARNINGS" \f2Conv\f1 does not convert archives from one format to another if both the source and target machines have the same byte ordering. e .B \-ml option forces the .B \-mm option and also causes deletion of lists associated with the .B mm macros. .PP If the .B \-w option is given, the output is a word list, one ``word'' per line, with all other characters deleted. Otherwise, the output follows the original, with the deletions mentioned above. In text, a ``word'' is any string that .I contains\^ at least two letters and is composed of letters, digits, ampersands .RB ( & ), and apostrophes .RB ( \^\(fm\^ ); in a macro call, however, a ``word'' is a string that .I begins\^ with at least two letters and contains a total of at least three letters. Delimiters are any characters other than letters, digits, apostrophes, and ampersands. Trailing apostrophes and ampersands are removed from ``words.'' .PP .SH SEE ALSO eqn(1), nroff(1), tbl(1), troff(1). .SH BUGS .I Deroff\^ is not a complete .I troff\^ interpreter, so it can be confused by subtle constructs. Most such errors result in too much rather than too little output. .PP The .B \-ml option does n$ delete\fP or \fB$d\fP deletes the last line in the file, no matter which line was the current line before. Arithmetic with line references is also possible. Thus the line \fB$\-5\fP is the fifth before the last, and \fB.+20\fP is 20 lines after the present one. .sp .5 You can find out the line number of the current line by typing \fB.=\fP. This is useful if you wish to move or copy a section of text within a file or between files. Find out the first and last line numbers you wish to copy or move (say 10 to 20). For a move you can then type \fB10,20delete a\fP, which deletes these lines from the file and places them in a buffer named .I a. .I Edit has 26 such buffers named .I a through .I z. You can later get these lines back by typing \fBput a\fP to put the contents of buffer .I a after the current line. If you want to move or copy these lines between files you can give an .B edit (\fBe\fR) command after copying the lines, following it with the name of the other file you wish to edit, i.e., \fBedit chapter2.TH CP 1 .SH NAME cp, ln, mv \- copy, link or move files .SH SYNOPSIS .B cp file1 [ file2 ...] target .br .B ln file1 [ file2 ...] target .br .B mv file1 [ file2 ...] target .SH DESCRIPTION .I File1\^ is copied (linked, moved) to .IR target . Under no circumstance can .I file1\^ and .I target\^ be the same (take care when using .IR sh (1) metacharacters). If .I target\^ is a directory, then one or more files are copied (linked, moved) to that directory. .PP If .I mv\^ determines that the mode of .I target\^ forbids writing, it prints the mode (see .IR chmod (2)) and reads the standard input for one line (if the standard input is a terminal); if the line begins with .BR y , the move takes place; if not, .I mv\^ exits. .PP Only .I mv\^ allows .I file1\^ to be a directory, in which case the directory rename occurs only if the two directories have the same parent. .SH SEE ALSO cpio(1), rm(1), chmod(2). .br ``Basics For Beginners'' in the \f2\*(6) User's Guide\f1. .SH BUGS If .I file1\^ and .I target\^ lie on dif ot handle nested lists correctly. .\" @(#)deroff.1 1.5 \fR. By changing .I delete to .I yank in the command shown above, you can get a pattern for copying lines. If the text you wish to move or copy is all within one file it is not necessary to use named buffers. \fB10,20move $\fR, for example, moves lines 10 through 20 to the end of the file. .SH "SEE ALSO" ex (1), vi (1), .br ``Edit: A tutorial'', by Ricki Blau and James Joyce. .br ``Text Editors'' in the .IR "\*(6) User's Guide" . .SH BUGS See .IR ex (1). .\" @(#)edit.1 1.9 ferent file systems, .I mv\^ must copy the file and delete the original. In this case the owner name becomes that of the copying process and any linking relationship with other files is lost. .PP .I Ln\^ does not link across file systems. .\" @(#)cp.1 1.4  .TH DIFF 1 .SH NAME diff \- differential file comparator .SH SYNOPSIS .B diff [ .B \-efbh ] file1 file2 .SH DESCRIPTION .I Diff\^ tells what lines must be changed in two files to bring them into agreement. If .I file1\^ .RI ( file2 ) is .BR \- , the standard input is used. If .I file1\^ .RI ( file2 ) is a directory, then a file in that directory with the name .I file2\^ .RI ( file1 ) is used. The normal output contains lines of these forms: .IP "" 5 .I n1\^ .B a .I n3,n4\^ .br .I n1,n2\^ .B d .I n3\^ .br .I n1,n2\^ .B c .I n3,n4\^ .PP These lines resemble .I ed\^ commands to convert .I file1\^ into .IR file2 . The numbers after the letters pertain to .IR file2 . In fact, by exchanging .B a for .B d and reading backward one may ascertain equally how to convert .I file2\^ into .IR file1 . As in .IR ed , identical pairs where .I n1\^ = .I n2\^ or .I n3\^ = .I n4\^ are abbreviated as a single number. .PP Following each of these lines come all the lines that are affected in the first file flagged by \f3<\fP, t .TH EFL 1 .SH NAME ef\&l \- Extended \s-1FORTRAN\s+1 Language .SH SYNOPSIS .B ef\&l [ options ] [ files ] .SH DESCRIPTION .I Ef\&l\^ compiles a program written in the .SM EFL language into clean \s-1FORTRAN\s+1 on the standard output. .I Ef\&l\^ provides the C-like control constructs of .IR ratfor (1): .RS .TP statement grouping with braces. .TP decision-making: .BR if , .BR if - else , and .BR select - case (also known as .BR switch - case ); .br .BR while , .BR for , \s-1FORTRAN\s+1 .BR do , .BR repeat , and .BR repeat " .\|.\|. " until loops; .br multi-level .B break and .BR next . .RE .sp .5 .SM EFL has C-like data structures, e.g.: .RS .TP struct .nf { integer \|flags(3) character(8) \|name long \|real \|coords(2) } \|table(100) .fi .RE .sp .5 The language offers generic functions, assignment operators .RB ( += , .BR &= , etc.), and sequentially evaluated logical operators .RB ( && and .BR \(bv\(bv\^ ). There is a uniform input/output syntax: .IP write(6,x,y\f3:\fPf(7,2), \|do \|i=1,10 \|{ \|a(i,j),z\f3..TH CPIO 1 .SH NAME cpio \- copy file archives in and out .SH SYNOPSIS .B cpio .B \-o [ .B acBv ] .PP .B cpio .B \-i [ .B BcdmrtuvfsSb6 ] [ patterns ] .PP .B cpio .B \-p [ .B adlmruv ] directory .SH DESCRIPTION .B Cpio \-o (copy out) reads the standard input to obtain a list of pathnames and copies those files onto the standard output together with pathname and status information. .PP .B Cpio \-i (copy in) extracts files from the standard input which is assumed to be the product of a previous .BR "cpio \-o" . Only files with names that match .I patterns\^ are selected. .I Patterns\^ are given in the name-generating notation of .IR sh (1). In .IR patterns , metacharacters .BR ? , .BR \(** , and .BR [ \|.\|.\|. ] match the slash .B / character. Multiple .I patterns\^ may be specified and if no .I patterns\^ are specified, the default for .I patterns\^ is .BR \(** (i.e., select all files). The extracted files are conditionally created and copied into the current directory tree based upon the options described behen all the lines that are affected in the second file flagged by \f3>\fP. .PP The .B \-b option causes trailing blanks (spaces and tabs) to be ignored and other strings of blanks to compare equal. .PP The .B \-e option produces a script of .IR a, .I c\^ and .I d\^ commands for the editor .IR ed , which can be used to recreate .I file2\^ from .IR file1 . The .B \-f option produces a similar script, not useful with .IR ed , in the opposite order. In connection with .BR \-e , the following shell program may help maintain multiple versions of a file. Only an ancestral file ($1) and a chain of version-to-version .I ed\^ scripts ($2,$3,...) made by .I diff\^ need be on hand. A ``latest version'' appears on the standard output. .IP "" 5 \f3(shift; cat $\(**; echo \(fm1,$p\(fm) \(bv ed \- $1\f1 .PP Except in rare circumstances, .I diff\^ finds a smallest sufficient set of file differences. .PP Option .B \-h does a fast, but incomplete, job. It works only when changed stretches are short and well-separated; however\fPb(i) \|}\|) .sp .5 .SM EFL also provides some syntactic ``sugar'': .RS .TP free-form input: multiple statements per line; automatic continuation; statement label names (not just numbers). .TP comments: .B # this is a comment. .TP translation of relational and logical operators: .BR > , .BR >= , .BR & , etc., become .BR \&.\s-1GT\s+1. , .BR \&.\s-1GE\s+1. , .BR \&.\s-1AND\s+1. , etc. .TP return expression to caller from function: .BI "return (" expression )\fR .TP defines: .br .B define .I name replacement\^ .TP includes: .br .B include .I file\^ .RE .sp .5 .I Efl\^ understands several option arguments: .B \-w suppresses warning messages, .B \-# suppresses comments in the generated program, and the default option .B \-C causes comments to be included in the generated program. .sp .5 An argument with an embedded .B = (equal sign) sets an .SM EFL option as if it had appeared in an .B option statement at the start of the program. Many options are described in the reference manual cited below. A set of defaults low. .PP .B Cpio \-p (pass) reads the standard input to obtain a list of pathnames of files that are conditionally created and copied into the destination .IR directory tree based upon the options described below. .PP The meanings of the available options are: .PP .PD 0 .TP .B a Reset access times of input files after they have been copied. .TP .B B Block input/output 5,120 bytes to the record (does not apply to the .I pass\^ option; meaningful only with data directed to or from .BR /dev/rmt? ). .TP .B d Create .I directories\^ as needed. .TP .B c Write .I header\^ information in .SM ASCII character form for portability. .TP .B r Interactively .I rename\^ files. If the user types a null line, the file is skipped. .TP .B t Print a .I table of contents\^ of the input. No files are created. .TP .B u Copy .I unconditionally\^ (normally, an older file cannot replace a newer file with the same name). .TP .B v .IR Verbose : print a list of filenames. When used with the .B t option, the table of contents looks like t, it does work on files of unlimited length. Options .B \-e and .B \-f are unavailable with .BR \-h . .SH FILES /tmp/d????? .br /usr/lib/diffh for the .B \-h option .SH "SEE ALSO" cmp(1), comm(1), ed(1). .SH DIAGNOSTICS Exit status is 0 for no differences, 1 for some differences, 2 for trouble. .SH BUGS Editing scripts produced under the .BR \-e " or" .BR \-f " option are naive about" creating lines consisting of a single period (\fB.\fP). .\" @(#)diff.1 1.4  for a particular target machine may be selected by one of the choices: .BR "system=unix" , .BR "system=gcos" , or .BR "system=cray" . The default setting of the .B system option is the same as the machine the compiler is running on. Other specific options determine the style of input/output, error handling, continuation conventions, the number of characters packed per word, and default formats. .sp .5 .I Ef\&l\^ is best used with .IR f77 (1). .SH SEE ALSO cc(1), f77(1), ratfor(1). .br .I "The Programming Language \s-1EFL\s+1\^" by S.I. Feldman. .\" @(#)efl.1 1.4 he output of an .B ls\ \|\-l command (see .IR ls (1)). .TP .B l Whenever possible, link files rather than copying them. Usable only with the .B \-p option. .TP .B m Retain previous file modification time. This option is ineffective on directories that are being copied. .TP .B f Copy in all files except those in .I patterns.\^ .TP .B s Swap bytes. Use only with the .B \-i option. .TP .B S Swap halfwords. Use only with the .B \-i option. .TP .B b Swap both bytes and halfwords. Use only with the .B \-i option. .TP .B 6 Process an old (i.e., .SM UNIX System .I Sixth\^ Edition format) file. Use only with the .B \-i option. .PD .SH EXAMPLES The first example below copies the contents of a directory into an archive; the second duplicates a directory hierarchy: .PP .RS .B "ls \|\(bv \|cpio \|\-o \|>/dev/mt0" .PP .PP .B "cd \|olddir" .br .B find .B \|.\| .B "\-depth \-print \|\(bv \|cpio \|\-pdl \|newdir" .RE .PP The trivial case .B find .B \|.\| .B "\-depth \-print \|\(bv \|cpio \|\-oB \|>/dev/rmt0" can be handled mo .TH DIFF3 1 .SH NAME diff3 \- 3-way differential file comparison .SH SYNOPSIS .B diff3 [ .B \-ex3 ] file1 file2 file3 .SH DESCRIPTION .I Diff3\^ compares three versions of a file, and publishes disagreeing ranges of text flagged with these codes: .RS .TP 16 ==== all three files differ .TP 16 ====1 .IR file1 " is different" .TP 16 ====2 .IR file2 " is different" .TP 16 ====3 .IR file3 " is different" .RE .PP The type of change suffered in converting a given range of a given file to some other is indicated in one of these ways: .RS .TP 16 .IB f " : " n1 " a" Text is to be appended after line number .I n1\^ in file .IR f , where .I f\^ = 1, 2, or 3. .TP 16 .IB f " : " n1 " , " n2 " c" Text is to be changed in the range line .I n1\^ to line .IR n2 . If .I n1\^ = .IR n 2, the range may be abbreviated to .IR n1 . .RE .PP The original contents of the range follow immediately after a .B c indication. When the contents of two files are identical, the contents of the lower-numbered file are suppressed. .PP Under the .\" @(#)egrep.1 1.2 .so /usr/man/u_man/man1/grep.1 re efficiently by: .PP .RS .B find .B \|.\| .B "\-cpio \|/dev/rmt0" .RE .SH SEE ALSO ar(1), find(1), cpio(4). .SH BUGS Pathnames are restricted to 128 characters. If there are too many unique linked files, the program runs out of memory; thereafter, linking information is lost. Only the superuser can copy special files. .\" @(#)cpio.1 1.3 .B \-e option, .I diff3\^ publishes a script for the editor .I ed\^ that incorporates into .I file1\^ all changes between .I file2\^ and .IR file3 , i.e., the changes that normally would be flagged ==== and ====3. Option .B \-x (\fB\-3\fR) produces a script to incorporate only changes flagged ==== (====3). The following command can be used to apply the resulting script to .IR file1 . .PP .ti 16n .B "(cat script; echo \(fm1,$p\(fm) \(bv ed \- file1" .SH FILES /tmp/d3\(** .br /usr/lib/diff3prog .SH "SEE ALSO" diff(1). .SH BUGS Text lines that consist of a single \fB.\fP negate the effect of option .BR \-e . .br .I Diff3\^ cannot process files longer than 64K bytes. .\" @(#)diff3.1 1.3  .TH ENABLE 1 .SH NAME enable, disable \- enable/disable \s-1LP\s+1 printers .SH SYNOPSIS .B enable .RB printers .br .B disable .RB [\| \-c \|] .RB [\| \-r [\|reason\|]\|] .RB printers .SH DESCRIPTION .I Enable activates the named .IR printers , enabling them to print requests taken by .IR lp (1). Use .IR lpstat (1) to find the status of printers. .PP .I Disable deactivates the named .IR printers , preventing them from printing requests taken by .IR lp (1). By default, any requests that are currently printing on the designated printers are reprinted in their entirety either on the same printer or on another member of the same class. Use .IR lpstat (1) to find the status of printers. Options useful with .I disable are: .TP "\w'\-r[\|reason\|]\ \ \ \ 'u" .B \-c Cancel any requests that are currently printing on any of the designated printers. .TP .BR \-r [\|\fIreason\fP\|] Associates a .I reason with the deactivation of the printers. This reason applies to all printers mentioned up to the next .B \-r option. If .TH CPP 1 .SH NAME cpp \- the C language preprocessor .SH SYNOPSIS .B /lib/cpp [ option ... .B ] .B [ ifile .B [ ofile .B ] ] .SH DESCRIPTION .PP .I Cpp\^ is the C language preprocessor which is invoked as the first pass of any C compilation using the .IR cc (1) command. The output of .I cpp\^ is designed to be in a form acceptable as input to the next pass of the C compiler. As the C language evolves, .I cpp\^ and the rest of the C compilation package will be modified to follow these changes. Therefore, the use of .I cpp\^ other than in this framework is not suggested. The preferred way to invoke .I cpp\^ is through the .IR cc (1) command since the functionality of .I cpp\^ may someday be moved elsewhere. See .IR m4 (1) for a general macro processor. .PP .I Cpp\^ optionally accepts two filenames as arguments. .I Ifile\^ is the input and .I ofile\^ is the output for the preprocessor. They default to standard input and standard output if not supplied. .PP The following \f2options\f1 to .I cpp\^ are recogniz.if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH DIFFMK 1 .SH NAME diffmk \- mark differences between files .SH SYNOPSIS .B diffmk name1 name2 name3 .SH DESCRIPTION .I Diffmk\^ is a shell procedure that compares two versions of a file and creates a third file that includes ``change mark'' commands for .IR nroff or .IR troff (1). .I Name1\^ and .I name2\^ are the old and new versions of the file. .I Diffmk\^ generates .IR name3 , which contains the lines of .I name2\^ plus inserted formatter ``change mark'' .RB ( .mc ) requests. When .I name3\^ is formatted, changed or inserted text is shown by \(bv at the right margin of each line. The position of deleted text is shown by a single .BR \(** . .PP .I Diffmk\^ can be used to produce listings of C (or other) programs with changes marked. A typical command line for such use is: .PP .RS .B "diffmk \|old.c \|new.c \|tmp; \|nroff \|macs \|tmp \|\(bv \|pr" .RE .PP where the .B \-r option is not present or the .B \-r option is given without a reason, then a default reason is used. .I Reason is reported by .IR lpstat (1). .SH FILES /usr/spool/lp/\(** .SH SEE ALSO lp(1), lpstat(1). .\" @(#)enable.1 1.3  ed: .TP .B \-P Preprocess the input without producing the line control information used by the next pass of the C compiler. .TP .B \-C Pass along all comments except those found on .I cpp directive lines. By default, .I cpp\^ strips C-style comments. .TP .BI \-U name\^ Remove any initial definition of .IR name , where .I name\^ is a reserved symbol that is predefined by the particular preprocessor. The current list of these possibly reserved symbols includes: .PD 0 .ne 3v .RS 10 .TP 21 operating system: ibm, gcos, os, tss, unix .TP hardware: interdata, pdp11, u370, u3b, vax, m68k .TP \s-1UNIX\s+1 System variant: .SM RES\*S, .SM RT .RE .PD .TP .BI \-D name\^ .PD 0 .TP .BI \-D name=def\^ Define .I name\^ as if by a .B #define directive. If no .I =def\^ is given, .I name\^ is defined as 1. .PD .TP .BI \-I dir\^ Change the algorithm for searching for .B #include files whose names do not begin with \f3/\f1 to look in .I dir\^ before looking in the directories on the standard list. When this option is used, .B #inthe file .B macs contains: .RS .PP .nf \&.pl \|1 \&.ll \|77 \&.nf \&.eo \&.nc \|\*` .fi .RE .PP The .B \&.ll request can be used to specify a different line length, depending on the nature of the program being printed. The .B \&.eo and .B \&.nc requests are probably needed only for C programs. .PP If the characters \(bv and .B \(** are inappropriate, a copy of .I diffmk\^ can be edited to change them. .SH SEE ALSO diff(1), nroff(1), troff(1). .SH BUGS Aesthetic considerations may dictate manual adjustment of some output. File differences involving only formatting requests may produce undesirable output, i.e., replacing .B \&.sp by .B \&.sp 2 produces a ``change mark'' on the preceding or following line of output. .\" @(#)diffmk.1 1.4 .TH ENV 1 .SH NAME env \- set environment for command execution .SH SYNOPSIS .B env .RB [ \- ] [ name=value ] ... [ command args ] .SH DESCRIPTION .I Env\^ obtains the current .IR environment , modifies it according to its arguments, then executes the command with the modified environment. Arguments of the form .IB name = value are merged into the inherited environment before the command is executed. The \f3\-\fP flag causes the inherited environment to be ignored completely, so that the command is executed with exactly the environment specified by the arguments. .PP If no command is specified, the resulting environment is printed, one name-value pair per line. .SH SEE ALSO sh(1), exec(2), profile(4), environ(5). .\" @(#)env.1 1.2 clude files whose names are enclosed in \f3"\|"\f1 are searched for first in the directory of the .I ifile\^ argument, then in directories named in .B \-I options, and last in directories on a standard list. For .B #include files whose names are enclosed in .BR <> , the directory of the .I ifile\^ argument is not searched. .PP Two special names are understood by .IR cpp . The name .B _\s-1LINE\s+1_ is defined as the current line number (as a decimal integer) as known by .IR cpp , and .B _\s-1FILE\s+1_ is defined as the current filename (as a C string) as known by .I cpp.\^ They can be used anywhere (including in macros) just as any other defined name. .PP All .I cpp\^ directives start with lines begun by .BR # . The directives are: .TP .BI #define " name" " " token-string Replace subsequent instances of .I name\^ with .IR token-string . .TP \f3#define\f2 name\f3(\f2 arg\f3, ...,\f2 arg\f3 )\f2 token-string\f1 Notice that there can be no space between .I name and the .BR ( . Replace subsequent instances of .I .TH DIRCMP 1 .SH NAME dircmp \- directory comparison .SH SYNOPSIS .B dircmp [ .B \-d ] [ .B \-s ] dir1 dir2 .SH DESCRIPTION .I Dircmp\^ examines .I dir1\^ and .I dir2\^ and generates various tabulated information about the contents of the directories. Listings of files that are unique to each directory are generated for all the options. If no option is entered, a list is output indicating whether the filenames common to both directories have the same contents. .TP .B \-d Compare the contents of files with the same name in both directories and output a list telling what must be changed in the two files to bring them into agreement. The list format is described in .IR diff (1). .TP .B \-s Suppress messages about identical files. .SH SEE ALSO cmp(1), diff(1). .\" @(#)dircmp.1 1.2 .EQ delim $$ .EN .if t .ds ^ \s+4\v@.3m@^\v@-.3m@\s-4 .if n .ds ^ ^ .if t .ds ~ \s+4\v@.3m@~\v@-.3m@\s-4 .if n .ds ~ ~ .TH EQN 1 .SH NAME eqn, neqn, checkeq \- format mathematical text for nroff or troff .SH SYNOPSIS .B eqn [ .BR \-d xy ] [ .BR \-p n ] [ .BR \-s n ] [ .BR \-f n ] [ files ] .PP .B neqn [ .BR \-d xy ] [ .BR \-p n ] [ .BR \-s n ] [ .BR \-f n ] [ files ] .PP .B checkeq [ files ] .SH DESCRIPTION .I Eqn\^ is a .IR troff (1) preprocessor for typesetting mathematical text on a phototypesetter, while .I neqn\^ is used for the same purpose with .I nroff on typewriter-like terminals. Usage is almost always: .PP .RS \f3eqn \|files \|\(bv \|troff\f1 .br \f3neqn \|files \|\(bv \|nroff\f1 .PP .RE or equivalent. .PP If no files are specified (or if .B \- is specified as the last argument), these programs read the standard input. A line beginning with .SM .B \&.EQ marks the start of an equation; the end of an equation is marked by a line beginning with .SM .BR \&.EN\*S . Neither of these lines is altered, so  name followed by a .BR ( , a list of comma-separated tokens, and a .B ) by .I token-string where each occurrence of an .I arg in the .I token-string is replaced by the corresponding token in the comma-separated list. .TP .BI #undef " name" Cause the definition of .I name (if any) to be forgotten from now on. .TP \f3#include\f1 "filename" .PD 0 .TP .BI #include " " < filename > Include at this point the contents of .I filename (which will then be run through .IR cpp ). When the .BI < filename > notation is used, .I filename is only searched for in the standard places. See the .B \-I option above for more detail. .PD .TP \f3#line\f2 integer-constant "filename" Causes .I cpp to generate line control information for the next pass of the C compiler. .I Integer-constant is the line number of the next line and .I filename is the file where it comes from. If \f2"filename"\f1 is not given, the current filename is unchanged. .TP .B #endif .br Ends a section of lines begun by a test directive .RB ( #if , .BR #ifdef , o.\" @(#)dirname.1 1.2 .so /usr/man/u_man/man1/basename.1  they may be defined in macro packages to get centering, numbering, etc. It is also possible to designate two characters as .IR delimiters ; subsequent text between delimiters is then treated as .I eqn\^ input. Delimiters may be set to characters .I x\^ and .I y\^ with the command-line argument .BI \-d xy\^ or (more commonly) with .B delim .I xy\^ between .SM .B \&.EQ and .SM .BR \&.EN\*S . The left and right delimiters may be the same character; the dollar sign is often used as such a delimiter. Delimiters are turned off by .BR "delim off" . All text that is neither between delimiters nor between .SM .B \&.EQ and .SM .B \&.EN is passed through untouched. .PP The program .I checkeq\^ reports missing or unbalanced delimiters and \&\f3\s-1.EQ\s+1\fP/\f3\s-1.EN\s+1\fP pairs. .PP Tokens within .I eqn\^ are separated by spaces, tabs, new lines, braces, double quotes, tildes, and circumflexes. Braces {\|} are used for grouping; generally speaking, anywhere a single character such as .I x\^ could appear, a complicater .BR #ifndef ). Each test directive must have a matching .BR #endif . .TP .BI #ifdef " name" The lines following appear in the output if and only if .I name has been the subject of a previous .B #define without being the subject of an intervening .BR #undef . .TP .BI #ifndef " name" The lines following do not appear in the output if and only if .I name has been the subject of a previous .B #define without being the subject of an intervening .BR #undef . .TP .BI #if " constant-expression" Lines following appear in the output if and only if the .I constant-expression evaluates to non-zero. All binary non-assignment C operators, the .B ?: operator, the unary .BR \(mi , .BR ! , and .B ~ operators are all legal in .IR constant-expression . The precedence of the operators is the same as defined by the C language. There is also a unary operator .BR defined , which can be used in .I constant-expression in these two forms: .BI defined " " ( " name " ) or .BI defined " name" . This allows the utility of .BR #ifdef " a.TH DIS 1 .SH NAME dis \- disassembler .SH SYNOPSIS .B dis .RB [ \-o ] .RB [ \-V ] .RB [ \-L ] .RB [ \-d " sec]" .RB [ \-da " sec]" .RB [ \-F " function]" .RB [ \-t " sec]" .RB [ \-l " string]" files .SH DESCRIPTION The .I dis command produces an assembly language listing of each of its object .IR file arguments. The listing includes assembly statements and the binary that produced those statements. .PP The following options are interpreted by the disassembler and may be specified in any order. .PP .TP 12 .B \-o Print numbers in octal. Default is hexadecimal. .PP .TP 12 .B \-V Write the version number of the disassembler to standard error. .PP .TP 12 .B \-L Invoke a lookup of C source labels in the symbol table for subsequent printing. .PP .TP 12 .BI \-d " sec\^" Disassemble the named section as data, printing the offset of the data from the beginning of the section. .PP .TP 12 .BI \-da " sec\^" Disassemble the named section as data, printing the actual address of the data. .PP .TP 12 .BI \-t " sec\^" Dd construction enclosed in braces may be used instead. Tilde (\*~) represents a full space in the output, circumflex (\*^) half as much. .br .if t .vs +1p .PP Subscripts and superscripts are produced with the keywords .B sub and .BR sup ", as shown in the following examples:" .PP .RS .BR "x\ \^sub\ \^j\^" " makes" $x sub j$. .br .B "a\ \^sub\ \^k\ \^sup\ \^2\^" \%produces $a sub k sup 2$. .br .B "e\ sup\ \^{x\ \^sup\ \^2\ \^+\ \^y\ \^sup\ \^2\^}" makes $e sup {x sup 2 + y sup 2}$. .RE .PP Fractions are made with \f3over\f1:\|\|\|\| .B "a\ \^over\ \^b\^" yields $a over b$. .PP Square roots are made with \f3sqrt\f1:\|\| .B "1\ \^over\ \^sqrt\ \^{ax\ \^sup\ \^2+bx+c\^}\^" results in $1 over sqrt {ax sup 2 +bx+c}$ . .PP The keywords .B from and .B to introduce lower and upper limits: .br $lim from {n -> inf} \(*S from 0 to n x sub i$ is made with .BR "lim\ from\ \^{n\ \^\->\ \^inf\ \^}\ \^sum\ \^from\ \^0\ \^to\ \^n\ \^x\ \^sub\ \^i" . .PP Left and right brackets, braces, etc., of the right height are made with . nd " #ifndef in a .B #if directive. Only these operators, integer constants, and names which are known by .I cpp should be used in .IR constant-expression . In particular, the .B sizeof operator is not available. .TP .B #else Reverses the notion of the test directive that matches this directive. If lines previous to this directive are ignored, the following lines appear in the output. If lines previous to this directive are not ignored, the following lines do not appear in the output. .PP The test directives and the possible .B #else directives can be nested. .SH FILES .TP 1.5i /usr/include standard directory for .B #include files .SH SEE ALSO .PP cc(1), m4(1). .SH DIAGNOSTICS .PP The error messages produced by .I cpp\^ are self-explanatory. The line number and filename where the error occurred are printed along with the diagnostic. .SH NOTES When newline characters were found in argument lists for macros to be expanded, previous versions of .I cpp\^ put out the newlines as they were found and expanded. Theisassemble the named section as text. .PP .TP 12 .BI \-l " string\^" Disassemble the library file specified as .IR string . For example, one would issue the command .B "dis \-l x \-l z" to disassemble .B libx.a and .B libz.a\c \&. All libraries are assumed to be in .BR /lib . .PP If the .BR \-d , .BR \-da , or .BR \-t options are specified, only those named sections from each user supplied filename are disassembled. Otherwise, all sections containing text are disassembled. .PP If the .BR \-F option is specified, only those named functions from each user supplied filename are disassembled. .PP On output, a number enclosed in brackets at the beginning of a line, such as .BR [5] , represents that the C breakpointable line number starts with the following instruction. An expression such as .B <40> in the operand field, following a relative displacement for control transfer instructions, is the computed address within the section to which control will be transferred. A C function name will appear in the first coB left and .BR right : .br .B "left\ \^[\ \^x\ \^sup\ \^2\ \^+\ \^y\ \^sup\ \^2\ \^over\ \^alpha\ \^right\ \^]\ \^\*~=\*~\ \^1\^" \%produces .if t .vs +2p $left [ x sup 2 + y sup 2 over alpha right ] ~=~ 1$. .br Legal characters after .B left and .B right are braces, brackets, bars, .if t .vs -2p .B c and .B f for ceiling and floor, and \f3``\|''\fP for nothing at all (useful for a right-side-only bracket). A .B left .I value\^ need not have a matching .B right .IR value . .PP .ne 4v Vertical piles of things are made with .BR pile , .BR lpile , .BR cpile , and .BR rpile : .RS .B "pile\ \^{a\ \^above\ \^b\ \^above\ \^c\^}\^" \%produces $pile {a above b above c}$. .RE Piles may have arbitrary numbers of elements; .B lpile left-justifies, .B pile and .B cpile center (but with different vertical spacing), and .B rpile right justifies. Matrices are made with .BR matrix : .RS .B "matrix { lcol { x sub i above y sub 2 } ccol { 1 above 2 } }\^" \%produces $matrix { lcol { x sub i above y sub 2 } ccol { 1 above 2 } }$ current version of .I cpp\^ replaces these newlines with blanks to alleviate problems that the previous versions had when this occurred. .\" @(#)cpp.1 1.7  lumn, followed by .BR (\|) . .SH "SEE ALSO" .IR as (1), .IR cc (1), .IR ld (1). .SH "DIAGNOSTICS" The self-explanatory diagnostics indicate errors in the command line or problems encountered with the specified files. .\" @(#)dis.1 1.8 . .RE In\ addition, there is .B rcol for a right-justified column. .br .if t .vs -1p .PP Diacritical marks are made with .BR dot , .BR dotdot , .BR hat , .BR tilde , .BR bar , .BR vec , .BR dyad , and .BR under : .PP .RS .B "x\ \^dot\ \^=\ \^f(t)\ \^bar\^" is $x dot = f(t) bar$. .br .B "y\ \^dotdot\ \^bar\ \^\*~=\*~\ \^n\ \^under\^" is $y dotdot bar ~=~ n under$. .br .B "x\ \^vec\ \^\*~=\*~\ \^y\ \^dyad\^" is $x vec ~=~ y dyad$. .RE .PP Point sizes and fonts can be changed with .B size .I n\^ or .B size \f3\(+-\fP\f2n\^\fP, .BR roman , .BR italic , .BR bold , and .BR font .IR n . Point sizes and fonts can be changed globally in a document by .B gsize .I n\^ and .B gfont .IR n , or by the command-line arguments .BI \-s n\^ and .BI \-f n\fR.\fP .PP Normally, subscripts and superscripts are reduced by 3 points from the previous size; this may be changed by the command-line argument .BI \-p n\fR.\fP .PP Successive display arguments can be lined up. Place .B mark before the desired lineup point in the first equatil tab character. A blank line terminates each entry. .PP The .I p-file\^ is used to pass information resulting from a .I get\^ with an .B \-e keyletter along to .IR delta . Its contents are also used to prevent a subsequent execution of .I get\^ with an .B \-e keyletter for the same \*(I) until .I delta\^ is executed or the joint edit flag, .BR j , (see .IR admin (1)) is set in the \*(S) file. The .I p-file\^ is created in the directory containing the \*(S) file and the effective user must have write permission in that directory. Its mode is 644 and it is owned by the effective user. The format of the .I p-file\^ is: the gotten \*(I), followed by a blank, followed by the \*(I) that the new delta will have when it is made, followed by a blank, followed by the login name of the real user, followed by a blank, followed by the date-time the .I get\^ was executed, followed by a blank and the .B \-i keyletter argument if it was present, followed by a blank and the .B \-x keyletter argument if it was present, followlarations of local variables so that they can be distinguished by the symbolic debugger. .PP The .B \-V flag will supply version information of the .I \*plist command. .PP The .B \-h flag will suppress heading output. .SH "CAVEATS" Object files given to .I \*plist must have symbolic debugging symbols. .PP Since .I \*plist does not use the C preprocessor, it may be unable to recognize function definitions whose syntax has been distorted by the use of C preprocessor macro substitutions. .SH "SEE ALSO" \*pas(1), \*pcc(1), \*pld(1). .SH "DIAGNOSTICS" ``\*plist: name: cannot open'' if .I name cannot be read. .\" @(#)list.1 1.1  on; place .B lineup at the place that is to line up vertically in subsequent equations. .PP Shorthands may be defined or existing keywords redefined with .BR define : .PP .RS \f3define\f2 \|thing\f3 \|%\f2 \|replacement\f3 \|%\f1 .PP .RE defines a new token called .I thing\^ that will be replaced by .I replacement\^ whenever it appears thereafter. The .I %\^ may be any character that does not occur in .IR replacement . .PP Keywords such as .B sum .RB ( \(*S ) .B int .EQ ( int ), .EN .B inf .EQ ( inf ), .EN and shorthands such as >= .EQ (>=), .EN != .EQ ( != ), .EN and \-> .EQ (->) .EN are recognized. Greek letters are spelled out in the desired case, as in .B alpha .EQ ( alpha ), .EN or .SM .B GAMMA .EQ ( GAMMA ). .EN Mathematical words such as .BR sin , .BR cos , and .B log are made Roman automatically. .IR Troff (1) four-character escapes such as \f3\e(dd\fP (\(dd) .if t and \f3\e(rh\fP (\(rh) may be used anywhere. Strings enclosed in double quotes (\f3"\^\fP.\|.\|.\^\f3"\fP) are passed through untouched; ted by a new-line. There can be an arbitrary number of lines in the .I p-file\^ at any time; no two lines can have the same new delta \*(I). .PP The .I z-file\^ serves as a .I lock-out\^ mechanism against simultaneous updates. Its contents are the binary (2 bytes) process \s-1ID\s+1 of the command (i.e., .I get\c\^ ) that created it. The .I z-file\^ is created in the directory containing the \*(S) file for the duration of .IR get . The same protection restrictions as those for the .I p-file\^ apply for the .IR z-file . The .I z-file\^ is created mode 444. .SH "SEE ALSO" admin(1), delta(1), help(1), prs(1), what(1), sccsfile(4). .br ``Source Code Control System'' in the .I "\*(6) Support Tools Guide" and the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .SH BUGS If the effective user has write permission (either explicitly or implicitly) in the directory containing the \*(S) files, but the real user doesn't, then only one file may be named when the .B \-e keyletter is used. .tr.\" @(#)ln.1 1.2 .so /usr/man/u_man/man1/cp.1 his permits keywords to be entered as text, and can be used to communicate with .IR troff (1) when all else fails. Full details are given in the manual cited below. .SH SEE ALSO cw(1), mm(1), mmt(1), nroff(1), tbl(1), troff(1), eqnchar(5), mm(5), mv(5). .br ``Mathematics Typesetting Program'' in the .IR "\*(6) Document Processing Guide" . .br ``Typesetting Mathematics\-User's Guide'' by B. W. Kernighan and L. L. Cherry. .SH BUGS To embolden digits, parentheses, etc., it is necessary to quote them, as in \f3bold ``12.3''\fP. .br See also .SM .I BUGS\^ under .IR troff (1). .\" @(#)eqn.1 1.7   ~~ .\" @(#)get.1 1.6 .TH LOGIN 1 .SH NAME login \- sign on .SH SYNOPSIS .B login [ name [ env-var .\|.\|. ]\|] .SH DESCRIPTION The .I login command is used at the beginning of each terminal session and allows you to identify yourself to the system. It may be invoked as a command or by the system when a connection is first established. It is invoked by the system when a previous user has terminated the initial shell by typing a CONTROL-D to indicate an end-of-file. (See ``How to Get Started'' at the beginning of this volume for instructions on how to dial up initially.) .PP If .I login is invoked as a command it must replace the initial command interpreter. This is accomplished by typing: .RS \f3exec login\f1 .RE from the initial shell. .PP .I Login asks for your user name (if not supplied as an argument), and, if appropriate, your password. Echoing is turned off (where possible) during the typing of your password, so it does not appear on the written record of the session. .PP At some installations, an option may be invoked that .\" @(#)erase.1g 1.2 .so /usr/man/u_man/man1/gdev.1g .if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH GETOPT 1 .SH NAME getopt \- parse command options .SH SYNOPSIS .B set \-\- \*`getopt optstring .B $\(**\*` .SH DESCRIPTION .I Getopt\^ is used to break up options in command lines for easy parsing by shell procedures and to check for legal options. .I Optstring\^ is a string of recognized option letters (see \fIgetopt\fP(3C)); if a letter is followed by a colon, the option is expected to have an argument which may or may not be separated from it by white space. The special option \fB\-\^\-\fP is used to delimit the end of the options. If it is used explicitly, .I getopt\^ recognizes it; otherwise, .I getopt\^ generates it; in either case, .I getopt\^ places it at the end of the options. The shell's positional parameters ($1 $2 .\|.\|.\|) are reset so that each option is preceded by a \fB\-\fP and is in its own positional parameter; each option argument is also par requires you to enter a second password. This occurs only for dial-up connections, and is prompted by the message ``\f3dialup password:\f1''. Both passwords are required for a successful login. .PP If you do not complete the login successfully within a certain period of time (e.g., one minute), you are likely to be silently disconnected. .PP After a successful login, accounting files are updated, the procedure .B /etc/profile is performed, the message-of-the-day, if any, is printed. The user-ID, the group-ID, the working directory, and the command interpreter (usually .IR sh (1)) are initialized, and the file .B \&.profile in the working directory is executed, if it exists. These specifications are found in the .B /etc/passwd file entry for the user. The name of the command interpreter is .B \- followed by the last component of the interpreter's pathname (i.e., .BR \-sh ). If this field in the password file is empty, then the default command interpreter, .B /bin/sh is used. .PP The basic .I environment (se.TH EX 1 .UC .SH NAME ex \- text editor .SH SYNOPSIS .B ex [ .B \- ] [ .B \-v ] [ .BI "\-t" " tag" ] [ .B \-r ] [ \fB\+\fIcommand\fR ] [ .B \-l ] name ... .SH DESCRIPTION .I Ex is the root of a family of editors which includes .I edit, .I ex and .I vi. .I Ex is a line oriented editor which is a superset of .IR ed . .PP If you have a \s-2CRT\s0 terminal, you may wish to use the display based editor \fIvi\fP (see .IR vi (1)), which focuses on the display editing portion of .I ex. .SH "FOR ED USERS" If you have used .IR ed , you will find that .I ex has a number of new features useful on CRT terminals. Intelligent terminals and high speed terminals are very pleasant to use with .I vi. .I Ex uses many more terminal capabilities than .I ed does. It uses the data base .IR termcap (5) and your terminal type (from the variable TERM in the environment) to determine how to drive your terminal efficiently. The editor makes use of features such as insert and delete character and line in its .B visual command (which csed into its own positional parameter. .SH EXAMPLE The following code fragment shows how one might process the arguments for a command that can take the options .B a or .BR b , as well as the option .BR o , which requires an argument: .PP .RS .nf .ss 18 .ta +.5i +1i \f3set \-\^\- \*`getopt abo: $\(**\*`\f1 \f3if [ $? != 0 ]\f1 \f3then\f1 \f3echo $\s-1USAGE\s+1\f1 \f3exit 2\f1 \f3fi\f1 \f3for i in $\(**\f1 \f3do\f1 \f3case $i in\f1 \f3\-a \(bv \-b) \s-1FLAG\s+1=$i; shift;;\f1 \f3\-o) \s-1OARG\s+1=$2; shift 2;;\f1 \f3\-\^\-) shift; break;;\f1 \f3esac\f1 \f3done\f1 .fi .ta .ss 12 .RE .PP This code accepts any of the following as equivalent: .PP .RS .nf .ss 18 \f3cmd \-aoarg file file\f1 \f3cmd \-a \-o arg file file\f1 \f3cmd \-oarg \-a file file\f1 \f3cmd \-a \-oarg \-\^\- file file\f1 .fi .ss 12 .RE .SH SEE ALSO sh(1), getopt(3C). .SH DIAGNOSTICS .I Getopt\^ prints an error message on the standard error when it encounters an option letter not included in .IR optstring . .\" @(#)getopt.1 1.4 e .IR environ (5)) is initialized to: .PP .RS \f3\s-1HOME\s+1=\f2your-login-directory\f1 .br \f3\s-1PATH\s+1=:/bin:/usr/bin\f1 .br \f3\s-1SHELL\s+1=\fIlast-field-of-passwd-entry\f1 .br \f3\s-1MAIL\s+1=/usr/mail/\fIyour-login-name\f1 .br \f3\s-1TZ\s+1=\fItimezone-specification\f1 .RE .sp 1v The environment may be expanded or modified by supplying additional arguments to .I login, either at execution time or when .I login requests your login name. The arguments may take either the form .I xxx or .I xxx=yyy. Arguments without an equal sign are placed in the environment as .RS \f3L\f2n\f1=xxx .RE where .I n is a number starting at 0 and is incremented each time a new variable name is required. Variables containing an .B = are placed into the environment without modification. If they already appear in the environment, then they replace the older value. There are two exceptions. The variables .B \s-1PATH\s+1 and .B \s-1SHELL\s+1 cannot be changed. This prevents people from logging into restricted shell environ an be abbreviated \fBvi\fR and is the central mode of editing when using .IR vi (1)). There is also an interline editing command, .B open (\fBo\fR), which works on all terminals. .PP .I Ex contains a number of new features for easily viewing the text of the file. The .B z command gives access to windows of text. Hitting ^D causes the editor to scroll a half-window of text, which is useful for quickly stepping through a file. Of course, the screen oriented .B visual mode gives constant access to editing context. .PP .I Ex gives you more help when you make mistakes. The .B undo (\fBu\fR) command allows you to reverse any single change which goes astray. .I Ex gives you feedback, normally printing changed lines, and indicates when more than a few lines are affected by a command. This makes it easy to detect when a command has affected more lines than you intended. .PP The editor normally prevents overwriting existing files so that you can't accidentally clobber a file other than the one you are editing. If the s.TH GRAPH 1G .SH NAME graph \- draw a graph .SH SYNOPSIS .B graph [ options ] .SH DESCRIPTION .I Graph\^ with no options takes pairs of numbers from the standard input as abscissas and ordinates of a graph. Successive points are connected by straight lines. The graph is encoded on the standard output for display by the .IR tplot (1G) filters. .PP If the coordinates of a point are followed by a non-numeric string, that string is printed as a label beginning on the point. Labels may be surrounded with quotes \f3"\fP, in which case they may be empty or contain blanks and numbers; labels never contain new-lines. .PP The following options are recognized, each as a separate argument: .PP .PD 0 .TP 10 .B \-a Supply abscissas automatically (they are missing from the input); spacing is given by the next argument (default 1). A second optional argument is the starting point for automatic abscissas (default 0 or lower limit given by .BR \-x ). .TP .B \-b Break (disconnect) the graph after each label in the input. .TP .ments and from spawning secondary shells which aren't restricted. Both .I login and .I getty understand simple single-character quoting conventions. Typing a backslash in front of a character quotes it and allows the inclusion of such things as spaces and tabs. .SH FILES .ta \w'/usr/mail/your-name\ \ 'u /etc/utmp accounting .br /etc/wtmp accounting .br /usr/mail/\fIyour-name\fP mailbox for user \fIyour-name\fP .br /etc/motd message-of-the-day .br /etc/passwd password file .br /etc/profile system profile .br \&.profile user's login profile .SH "SEE ALSO" mail(1), newgrp(1), sh(1), su(1), passwd(4), profile(4), environ(5). .SH DIAGNOSTICS .TP 17 .B "Login incorrect" The user name or password cannot be matched. .TP 17 \f3No shell\f1, \f3cannot open password file\f1, or \f3no directory\f1. Consult a system programming counselor. .TP 17 .tr ~" .B "No utmp entry. You must exec ~login~ from the lowest level ~sh~." You attempted to execute \f2login\fP as a command without using the shell's \f2exec\fP internal commaystem (or editor) crashes, or you accidentally hang up the phone, you can use the .B recover command to retrieve your work. This gets you back to within a few lines of where you left off. .PP .I Ex has several features for dealing with more than one file at a time. You can give it a list of files on the command line and use the .B next (\fBn\fR) command to edit each in turn. The .B next command can also be given a list of filenames, or a pattern (as used by the shell) to specify a new set of files to be edited. In general, filenames in the editor may be formed with full shell metasyntax. The metacharacter `%' is also available in forming filenames and is replaced by the name of the current file. .\" For editing large groups of related files you can use .\" .I ex's .\" .B tag .\" command to quickly locate functions and other important points in .\" any of the files. .\" This is useful when working on a large program when you want to quickly .\" find the definition of a particular function. .\" The command .\ B \-c Character string given by next argument is default label for each point. .TP .B \-g Next argument is grid style, 0 no grid, 1 frame with ticks, 2 full grid (default). .TP .B \-l Next argument is label for graph. .TP .B \-m Next argument is mode (style) of connecting lines: 0 disconnected, 1 connected (default). Some devices give distinguishable line styles for other small integers (e.g., the Tektronix 4014: 2=dotted, 3=dash-dot, 4=short-dash, 5=long-dash). .TP .B \-s Save screen, don't erase before plotting. .TP .BR \-x " [ " l " ]" If .B l is present, x axis is logarithmic. Next 1 (or 2) arguments are lower (and upper) .IR x "" limits. Third argument, if present, is grid spacing on .I x\^ axis. Normally these quantities are determined automatically. .TP .BR \-y " [ " l " ]" Similarly for .IR y . .TP .B \-h Next argument is fraction of space for height. .TP .B \-w Similarly for width. .TP .B \-r Next argument is fraction of space to move right before plotting. .TP .B \-u Similarly to move up before plond or from other than the initial shell. .tr ~~ .\" @(#)login.1 1.6 " .IR ctags (1) .\" builds a .\" .I tags .\" file or a group of C programs. .PP For moving text between files and within a file the editor has a group of buffers, named .I a through .I z. You can place text in these named buffers and carry it over when you edit another file. .PP There is a command .B & in .I ex which repeats the last .B substitute command. In addition there is a confirmed substitute command. You give a range of substitutions to be done and the editor interactively asks whether each substitution is desired. .PP It is possible to ignore the case of letters in searches and substitutions. .I Ex also allows regular expressions which match words to be constructed. This is convenient, for example, in searching for the word ``edit'' if your document also contains the word ``editor.'' .PP .I Ex has a set of .I options which you can set to tailor it to your liking. One very useful option is .IR autoindent , which allows the editor to automatically supply leading white space to align text. You can thtting. .TP .B \-t Transpose horizontal and vertical axes. (Option .B \-x now applies to the vertical axis.) .PP A legend indicating grid range is produced with a grid unless the .B \-s option is present. If a specified lower limit exceeds the upper limit, the axis is reversed. .PD .SH SEE ALSO graphics(1G), spline(1G), tplot(1G). .SH BUGS .I Graph\^ stores all points internally and drops those for which there isn't room. .br Segments that run out of bounds are dropped, not windowed. .br Logarithmic axes may not be reversed. .\" @(#)graph.1g 1.3  .TH LOGNAME 1 .SH NAME logname \- get login name .SH SYNOPSIS .B logname .SH DESCRIPTION .I Logname\^ returns the contents of the environment variable .SM \fB$LOGNAME\fP, which is set when a user logs into the system. .SH FILES /etc/profile .SH SEE ALSO env(1), login(1), logname(3X), environ(5). .\" @(#)logname.1 1.2 en use the ^D key as a backtab and space and tab forward to align new code easily. .PP Miscellaneous new features include an intelligent .B join (\fBj\fR) command which supplies white space between joined lines automatically, commands < and > which shift groups of lines, and the ability to filter portions of the buffer through commands such as .I sort. .SH " INVOCATION OPTIONS" The following invocation options are interpreted by .IR ex\^ : .TP 15 .B \- Suppress all interactive user feedback. This is useful in processing editor scripts. .TP .B \-v Invoke .I vi\^ .TP .BI \-t tag\^ Edit the file containing the .I tag\^ and position the editor at its definition. .TP .BI \-r file\^ Recover .I file\^ after an editor or system crash. If .I file\^ is not specified a list of all saved files is printed. .TP .BI \+ command Begin editing by executing the specified editor search or positioning .I command\^. .TP .B \-l .B LISP mode; indents appropriately for lisp code. The .B "() {} [[" and .B ]] commands in .I vi\^ .TH GRAPHICS 1G .SH NAME graphics \- access graphical and numerical commands .SH SYNOPSIS .B graphics [ \f3\-r\f1 ] .SH DESCRIPTION .I Graphics\^ appends the pathname .B /usr/bin/graf to the current .B $\s-1PATH\s+1 value, changes the primary shell prompt to \f3^\f1, and executes a new shell. The directory .B /usr/bin/graf contains all of the Graphics subsystem commands. If the \f3\-r\f1 option is given, access to the graphical commands is created in a restricted environment; that is, .B $\s-1PATH\s+1 is set to \f3/:rbin:\%/usr/rbin:\%/bin:\%/usr/bin:\%/usr/bin/graf\f1 and the restricted shell, .IR rsh , is invoked. To restore the environment that existed prior to issuing the .I graphics\^ command, type .B \s-1EOT\s+1 (control-d on most terminals). To log off from the graphics environment, type .BR quit . .PP The command line format for a command in .I graphics\^ is \f2command name\f1 followed by \f2argument\f1(s). An \f2argument\f1 may be a \f2filename\f1 or an \f2option string\f1. A \f2filename\f1 is the na.if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH LORDER 1 .SH NAME lorder \- find ordering relation for an object library .SH SYNOPSIS .B lorder file ... .SH DESCRIPTION The input is one or more object or library archive .I files\^ (see .IR ar (1)). The standard output is a list of pairs of object filenames; the first file of the pair refers to external identifiers defined in the second. The output may be processed by .IR tsort (1) to find an ordering of a library suitable for one-pass access by .IR ld (1). Note that the link editor .IR ld (1) is capable of multiple passes over an archive in the portable archive format (see .IR ar (4)) and does not require that .IR lorder (1) be used when building an archive. The usage of the .IR lorder (1) command may, however, allow for slightly more efficient access of the archive during the link edit process. .PP The following example builds a new library from existing .B  and .I open are modified to have meaning for .I lisp . .PP The .I name\^ argument indicates files to be edited. .SH "Ex States" .TP 15 Command Normal and initial state. Input prompt is a colon (\fB:\fP). The kill character cancels a partial command. .TP 15 Insert Entered by \fBa\fP, \fBi\fP, and \fBc\fP. Arbitrary text may be entered. Insert is terminated normally by a line having only a period (\fB.\fP) on it, or abnormally with an interrupt. .TP 15 Open/visual Entered by \fBopen\fP or \fBvi\fP; terminated with \fBQ\fP or \fB^\e\fP. .SH "Ex Command Names and Abbreviations" .TS lw(.45i) lw(.08i)b lw(.45i) lw(.08i)b lw(.45i) lw(.08i)b. abbrev ab \|\|\|next n \|\|\|unabbrev una append a \|\|\|number nu \|\|\|undo u args ar \|\|\|open o \|\|\|unmap unm change c \|\|\|preserve pre \|\|\|version ve copy co \|\|\|print p \|\|\|visual vi delete d \|\|\|put pu \|\|\|write w edit e \|\|\|quit q \|\|\|xit x file f \|\|\|read re \|\|\|yank ya global g \|\|\|recover rec \|\|\|window z insert i \|\|\|rewind rew \|\|\|me of any system file except those beginning with \f3\-\f1. The \f2filename\f1 \f3\-\f1 is the name for the standard input. An \f2option string\f1 consists of \f3\-\f1 followed by one or more \f2option\f1(s). An \f2option\f1 consists of a keyletter possibly followed by a value. \f2Options\f1 may be separated by commas. .PP The graphical commands have been partitioned into 4 groups. .IP Commands that manipulate and plot numerical data; see .IR stat (1G). .IP Commands that generate tables of contents; see .IR toc (1G). .IP Commands that interact with graphical devices; see .IR gdev (1G) and .IR ged (1G). .IP A collection of graphical utility commands; see .IR gutil (1G). .PP A list of the .I graphics\^ commands can be generated by typing .B whatis in the .I graphics\^ environment. .SH SEE ALSO gdev(1G), ged(1G), gutil(1G), stat(1G), toc(1G), gps(4). .br .IR "\*(6) Graphics Guide" . .\" @(#)graphics.1g 1.6 \&.o files. .PP .RS .B "ar \|cr \|library \|\(ga\|lorder \|\(**.o \|\(bv \|tsort\(ga" .RE .SH FILES \(**symref, \(**symdef temporary files .SH "SEE ALSO" ar(1), ld(1), tsort(1), ar(4). .SH BUGS Object files whose names do not end with .BR .o , even when contained in library archives, are overlooked. Their global symbols and references are attributed to some other file. .\" @(#)lorder.1 1.6 escape ! join j \|\|\|set se \|\|\|lshift < list l \|\|\|shell sh \|\|\|print next CR map \|\|\|source so \|\|\|resubst & mark ma \|\|\|stop st \|\|\|rshift > move m \|\|\|substitute s \|\|\|scroll ^D .TE .SH "Ex Command Addresses" .TS l l l l. \fIn\fP line \fIn\fP /\fIpat\fP next line with \fIpat\fP \&\f3.\f1 current line \f3?\fIpat\fP previous line with \fIpat\fP \f3$\f1 last line \fIx\fP-\fIn\fP \fIn\fP lines before linenumber \fIx\fP \f3+\f1 next line \fIx\fP,\fIy\fP lines \fIx\fP through \fIy\fP \f3\-\f1 previous line \(aa\fIx\fP marked with \fIx\fP \f3+\fIn\fP \fIn\fP lines forward \(aa\(aa previous context \f3%\f1 1,$ .TE .SS "Initializing options" .TS lw(.9i)b aw(1.5i). EXINIT environmental variable for options $HOME/.exrc editor initialization file \&./.exrc editor initialization file set \fIx\fP enable option set no\fIx\fP disable option set \fIx\fP=\fIval\fP give value \fIval\fP set show changed options set all show all options set \fIx\fP? show value of option \fIx\fP .TE .SS "Useful options" . .TH GREEK 1 .SH NAME greek \- select terminal filter .SH SYNOPSIS .B greek [ .BR \-T terminal ] .SH DESCRIPTION .I Greek\^ is a filter that reinterprets the extended character set, as well as the reverse and half-line motions, of a 128-character .SM TELETYPE\*S\*R Teletypewriter Model 37 terminal (which is the .I nroff default terminal) for certain other terminals. Special characters are simulated by overstriking, if necessary and possible. If the argument is omitted, .I greek\^ attempts to use the environment variable .SM .B $TERM (see .IR environ (5)). The following .IR terminal s are recognized currently: .RS .PP .PD 0 .TP 10 300 .SM DASI 300. .TP 300-12 .SM DASI 300 in 12-pitch. .TP 300s .SM DASI 300s. .TP 300s-12 .SM DASI 300s in 12-pitch. .TP 450 .SM DASI 450. .TP 450-12 .SM DASI 450 in 12-pitch. .TP 1620 Diablo 1620 (alias .SM DASI 450). .TP 1620-12 Diablo 1620 (alias .SM DASI 450) in 12-pitch. .TP 2621 Hewlett-Packard 2621, 2640, and 2645. .TP 2640 Hewlett-Packard 2621, 2640, and 2645. .TP 2645 Hewlet.TH LP 1 .SH NAME lp, cancel \- send/cancel requests to an \s-1LP\s+1 line printer .SH SYNOPSIS .B lp .RB [ \-c ] .RB [ \-d \^dest] .RB [ \-m ] .RB [ \-n \^number] .RB [ \-o \^option] .RB [ \-s ] .RB [ \-t \^title] .RB [ \-w ] files .br .B cancel [\|ids\|] [\|printers\|] .SH DESCRIPTION .I Lp arranges for the named files and associated information (collectively called a .IR request ) to be printed by a line printer. If no filenames are specified, the standard input is assumed. The filename .B \- stands for the standard input and may be supplied on the command line in conjunction with named .IR files . The order in which .I files are specified is the same order in which they are printed. .sp .5v .I Lp associates a unique .I id with each request and prints it on the standard output. This .I id can be used later to cancel (see .IR cancel ) or find the status (see .IR lpstat (1)) of the request. .sp .5v The following options to .I lp may appear in any order and may be intermixed with filenames: .TP "\w'\-n\|numbeTS lb lb l. autoindent ai supply indent autowrite aw write before changing files ignorecase ic in scanning lisp \fB( ) { }\fP are s-exp's list print ^I for tab, $ at end magic \fB. [ *\fP special in patterns number nu number lines paragraphs para macro names which start ... redraw simulate smart terminal scroll command mode lines sections sect macro names ... shiftwidth sw for \fB< >\fP, and input \fB^D\fP showmatch sm to \fB)\fP and \fB}\fP as typed slowopen slow stop updates during insert window visual mode lines wrapscan ws around end of buffer? wrapmargin wm automatic line splitting .TE .SS "Scanning pattern formation" .TS lb l. ^ beginning of line $ end of line \fB.\fR any character \e< beginning of word \e> end of word [\fIstr\fP] any char in \fIstr\fP [\(ua\fIstr\fP] ... not in \fIstr\fP [\fIx\-y\fP] ... between \fIx\fP and \fIy\fP * any number of preceding .TE .SH FILES .TS lw(.9i) w(1.5i). /usr/lib/ex?.?strings error messages /usr/lib/ex?.?recover recover command /usr/lib/ex?.?preserve preservet-Packard 2621, 2640, and 2645. .TP 4014 Tektronix 4014. .TP hp Hewlett-Packard 2621, 2640, and 2645. .TP tek Tektronix 4014. .PD .RE .SH FILES /usr/bin/300 .br /usr/bin/300s .br /usr/bin/4014 .br /usr/bin/450 .br /usr/bin/hp .SH SEE ALSO 300(1), 4014(1), 450(1), eqn(1), hp(1), mm(1), tplot(1G), nroff(1), environ(5), greek(5), term(5). .\" @(#)greek.1 1.2  r\ \ 'u" .B \-c Make copies of the .I files to be printed immediately when .I lp is invoked. Normally, .I files are not copied, but are linked whenever possible. If the .B \-c option is not given, then the user should be careful not to remove any of the .I files before the request has been printed in its entirety. It should also be noted that in the absence of the .B \-c option, any changes made to the named .I files after the request is made but before it is printed will be reflected in the printed output. .TP .BI \-d dest Choose .I dest as the printer or class of printers that is to do the printing. If .I dest is a printer, then the request is printed only on that specific printer. If .I dest is a class of printers, then the request is printed on the first available printer that is a member of the class. Under certain conditions (e.g., printer unavailability, file space limitation), requests for specific destinations may not be accepted (see .IR accept (1M) and .IR lpstat (1)). By default, .I dest is taken  command /etc/termcap describes capabilities of terminals $HOME/.exrc editor startup file \&./.exrc editor startup file /tmp/Ex\fInnnnn\fR editor temporary /tmp/Rx\fInnnnn\fR named buffer temporary /usr/preserve preservation directory .TE .SH "SEE ALSO" awk(1), ed(1), grep(1), vi(1), termcap(5). .br ``Text Editors'' in the .IR "\*(6) User's Guide" . .br ``Advanced Editing'' in the .IR "\*(6) Document Processing Guide" . .br ``A Tutorial Introduction to the UNIX Text Editor'' by Brian W. Kernighan. .br ``Advanced Editing on UNIX'' by Brian W. Kernighan. .br ``VI/EX Quick Reference Card'', University of California, Berkeley. .SH "WARNINGS AND BUGS" The .I undo\^ command causes all marks to be lost on lines changed and then restored if the marked lines were changed. .PP .I Undo\^ never clears the buffer modified condition. .PP The .I z\^ command prints a number of logical rather than physical lines. More than a screen full of output may result if long lines are present. .PP File input/output errors don't print.TH GREP 1 .SH NAME grep, egrep, fgrep \- search a file for a pattern .SH SYNOPSIS .B grep [ options ] expression [ files ] .sp .5 .B egrep [ options ] [ expression ] [ files ] .sp .5 .B fgrep [ options ] [ strings ] [ files ] .SH DESCRIPTION Commands of the .I grep\^ family search the input .I files\^ (standard input default) for lines matching a pattern. Normally, each line found is copied to the standard output. .I Grep\^ patterns are limited regular .IR expression s in the style of .IR ed (1); it uses a compact non-deterministic algorithm. .I Egrep\^ patterns are full regular .IR expression s; it uses a fast deterministic algorithm that sometimes needs exponential space. .I Fgrep\^ patterns are fixed .IR strings ; it is fast and compact. The following .I options\^ are recognized: .sp .5 .PD 0 .TP 6 .B \-v All lines but those matching are printed. .TP .B \-x (Exact) only lines matched in their entirety are printed .RI ( fgrep\^ only). .TP .B \-c Only a count of matching lines is printed. .TP .B \-l Only thfrom the environment variable .SM .B LPDEST (if it is set); otherwise, a default destination (if one exists) for the computer system is used. Destination names vary between systems (see .IR lpstat (1)). .TP .B \-m Send mail (see .IR mail(1)) after the files have been printed. By default, no mail is sent upon normal completion of the print request. .TP .BI \-n number Print .I number copies (default of 1) of the output. .TP .BI \-o option Specify printer-dependent or class-dependent .IR options . Several such .I options may be collected by specifying the .B \-o keyletter more than once. For more information about what is valid for .IR options , see .I Models in .IR lpadmin (1M). .TP .B \-s Suppress messages from .IR lp (1) such as ``\f3request id is ...\f1''. .TP .BI \-t title Print .I title on the banner page of the output. .TP .B \-w Write a message on the user's terminal after the .I files have been printed. If the user is not logged in, then mail is sent instead. .sp .5v .I Cancel cancels line printer reque  a name if the command line \fB`\-'\fR option is used. .PP There is no easy way to do a single scan ignoring case. .PP The editor does not warn if text is placed in named buffers and not used before exiting the editor. .PP Null characters are discarded in input files, and cannot appear in resultant files. .\" @(#)ex.1 1.4 e names of files with matching lines are listed (once), separated by new lines. .TP .B \-n Each line is preceded by its relative line number in the file. .TP .B \-b Each line is preceded by the block number on which it was found. This is sometimes useful in locating disk block numbers by context. .TP .B \-s The error messages produced for nonexistent or unreadable files are suppressed .RI ( grep\^ only). .TP .BI \-e " expression\^" Same as a simple .I expression\^ argument, but useful when the .I expression\^ begins with a .B \- (does not work with .IR grep ). .TP .BI \-f " file\^" The regular .I expression\^ .RI ( egrep ) or .I strings\^ list .RI ( fgrep ) is taken from the .IR file . .PD .sp .5 In all cases, the filename is output if there is more than one input file. Care should be taken when using the characters .BR $ , .BR * , .BR [ , .BR ^ , \(bv, .BR ( , .BR ) , and .B \e in .IR expression , because they are also meaningful to the shell. It is safest to enclose the entire .I expression\^ argument in sists made by the .IR lp (1) command. The command line arguments may be either request .I ids (as returned by .IR lp (1)) or .I printer names (for a complete list, use .IR lpstat (1)). Specifying a request .I id cancels the associated request even if it is currently printing. Specifying a .I printer cancels the request that is currently printing on that printer. In either case, the cancellation of a request that is currently printing frees the printer to print its next available request. .SH FILES /usr/spool/lp/\(** .SH SEE ALSO enable(1), lpstat(1), mail(1). .br accept(1M), lpadmin(1M), lpsched(1M) in the .IR "\*(6) Administrator's Manual" . .\" @(#)lp.1 1.5 .if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH EXPR 1 .SH NAME expr \- evaluate arguments as an expression .SH SYNOPSIS .B expr arguments .SH DESCRIPTION The arguments are taken as an expression. After evaluation, the result is written on the standard output. Terms of the expression must be separated by blanks. Characters special to the shell must be escaped. Note that \fB0\fP is returned to indicate a zero value, rather than the null string. Strings containing blanks or other special characters should be quoted. Integer-valued arguments may be preceded by a unary minus sign. Internally, integers are treated as 32-bit, 2's complement numbers. .PP The operators and keywords are listed below. Characters that need to be escaped are preceded by \f3\\\fP\|. The list is in order of increasing precedence, with equal precedence operators grouped within \f3{\|}\fP symbols. .TP .5i \fIexpr \fB\e\|\(bv\fI expr\fR returns ngle quotes .BR \&\|\(fm \|.\|.\|.\| \(fm . .sp .5 .I Fgrep\^ searches for lines that contain one of the .I strings\^ separated by new lines. .sp .5 .I Egrep\^ accepts regular expressions as in .IR ed (1), except for .B \e( and .BR \e) , with the addition of: .sp .5 .PD 0 .TP 6 1. A regular expression followed by .B + matches one or more occurrences of the regular expression. .TP 2. A regular expression followed by .B ? matches 0 or 1 occurrences of the regular expression. .TP 3. Two regular expressions separated by \(bv or a new-line character match strings that are matched by either. .TP 4. A regular expression may be enclosed in parentheses .B (\|) for grouping. .PD .sp .5 The order of precedence of operators is .BR [\|] , then .BR \(**\|?\|+ , then concatenation, then \(bv and new-line. .SH SEE ALSO ed(1), sed(1), sh(1). .SH DIAGNOSTICS Exit status is 0 if any matches are found, 1 if none, 2 for syntax errors or inaccessible files (even if matches were found). .SH BUGS Ideally there should be only one .IR.TH LPD 1C .SH NAME lpd \- line printer daemon .SH SYNOPSIS .B /usr/lib/lpd .SH DESCRIPTION .I Lpd\^ is the daemon for a line printer and uses the directory .BR /usr/spool/lpd . The file .B lock in either directory is used to prevent two daemons from becoming active simultaneously. After the program has successfully set the lock, it forks and the main path exits, thus spawning the daemon. The directory is scanned for files beginning with ``df''. Each such file is submitted as a job. Each line of a job file must begin with a key character to specify what to do with the remainder of the line. .PP .PD 0 .TP 7 .B L specifies that the remainder of the line is to be sent as a literal. .TP 7 .B I is the same as .BR L , but signals the $ .SM IDENT card which is to be mailed back by the mail option. .TP 7 .B B specifies that the rest of the line is a filename. That file is to be sent as binary cards. .TP 7 .B F is the same as .B B except a form-feed is prepended to the file. .TP 7 .B U specifies that the rest of the  the first .I expr\^ if it is neither null nor \fB0\fP, otherwise returns the second .IR expr . .TP .5i \fIexpr \fB\e\|&\fI expr\fR returns the first .I expr\^ if neither .I expr\^ is null or \fB0\fP, otherwise returns \fB0\fP. .TP .5i \fIexpr \fR{ \fB=\fR, \fB\e\|>\fR, \fB\e\|>=\fR, \fB\e<\fR, \fB\e<=\fR, \fB!=\fR } \fIexpr\fR returns the result of an integer comparison if both arguments are integers, otherwise returns the result of a lexical comparison. .TP .5i \fIexpr \fR{ \fB+\fR, \fB\- \fR} \fIexpr\fR addition or subtraction of integer-valued arguments. .TP .5i \fIexpr \fR{ \fB\e\(**\fR, \fB/\fR, \fB% \fR} \fIexpr\fR multiplication, division, or remainder of the integer-valued arguments. .TP .5i \fIexpr\fB : \fIexpr\fR The matching operator \fB:\fP compares the first argument with the second argument which must be a regular expression; regular expression syntax is the same as that of .IR ed (1), except that all patterns are ``anchored'' (i.e., begin with \f3^\fP). Therefore, \fB^\fP is not a special char grep , but we don't know a single algorithm that spans a wide enough range of space-time tradeoffs. .br Lines are limited to 256 characters; longer lines are truncated. .br .I Egrep\^ does not recognize ranges, such as .BR [a\-z] , in character classes. .\" @(#)grep.1 1.4  line is a filename. After the job has been transmitted, the file is unlinked. .TP 7 .B M is followed by a user \s-1ID\s+1; after the job is sent, a message is mailed to the user via the .IR mail (1) command to verify the sending of the job. .TP 7 .B N is followed by a user filename, to be sent back under the mail option. .PD .PP Any error encountered causes the daemon to drop the call, wait up to 10 seconds, and start over. This means that an improperly constructed ``df'' file may cause the same job to be submitted every 10 seconds. .PP .I Lpd\^ is automatically initiated by the line printer command, .IR lpr . .PP To restart .I lpd\^ (in the case of hardware or software malfunction), it is necessary to first kill the old daemon (if it is still alive), and remove the lock file (if present), before initiating the new daemon. This can be done automatically by .B /etc/rc when the system is brought up, in the event there were jobs left in the spooling directory when the system last went down. .SH FILES .PD 0 .TP 2acter in that context. Normally, the matching operator returns the number of characters matched (\fB0\fP on failure). Alternatively, the \fB\\\|(\|.\|.\|.\|\\\|)\fP pattern symbols can be used to return a portion of the first argument. .SH EXAMPLES .TP 1. \f3a=\*`expr $a\|\(pl\|1\*`\f1 .PP .RS adds \f31\f1 to the shell variable \f3a\f1. .RE .TP 2. \fB#\fP \*'For $a equal to either ``/usr/abc/file'' or just ``file''\*' .PP .RS \f3expr $a : \*'.\(**/\^\e\|(.\(**\e\|)\*'\|\|\e\^| $a\f1 .PP returns the last segment of a pathname (i.e., file). Watch out for \f3/\fP alone as an argument: .I expr\^ will take it as the division operator (see .SM BUGS below). .RE .ne 6 .TP 3. \fB#\fP \ A better representation of example 2. .PP .RS \f3expr //$a : \*'.\(**/\^\e\|(.\(**\e\|)\*'\f1 .PP The addition of the .B // characters eliminates any ambiguity about the division operator and simplifies the whole expression. .RE .TP 4. \f3expr $\s-1VAR\s+1 : \*'.\(**\*'\f1 .PP .RS returns the number of characters in .SM .BR $VAR . .RE .if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .bd S B 3 .TH GUTIL 1G .SH NAME gutil \- graphical utilities .SH SYNOPSIS command-name [options] [files] .SH DESCRIPTION Below is a list of miscellaneous device independent utility commands found in .BR /usr/bin/graf . If no .I files\^ are given, input is from the standard input. All output is to the standard output. Graphical data is stored in graphical primitive string (GPS) format; see .IR gps (4). .sp .PP .TP 10 .B bel \c \- send bel character to terminal .PP .TP 10 .B cvrtopt [\|=\c .BI s "string\^" .BI f "string\^" .BI i "string " t string\c\^ \|\|] [\|\c .I args\c\^ \|\|] \c \- options converter .br .I Cvrtopt\^ reformats \fIargs\fR (usually the command line arguments of a calling shell procedure) to facilitate processing by shell procedures. An \fIarg\fR is either a file name (a string not beginning with a \fB\-\fR, or a \fB\-\fR by itself) or an option st0 /usr/spool/lpd/\(** spool area for line printer daemon. .TP /etc/passwd to get the user's name. .TP /dev/lp line printer device. .PD .SH SEE ALSO lpr(1). .SH BUGS If a .IR umask (1) of 077 is used, the print jobs may be spooled but cannot be printed. .\" @(#)lpd.1c 1.3  .SH "SEE ALSO" ed(1), sh(1). .SH "EXIT CODE" As a side effect of expression evaluation, .I expr\^ returns the following exit values: .br 0 if the expression is neither null nor \fB0\fP .br 1 if the expression .I is\^ null or \fB0\fP .br 2 for invalid expressions. .SH DIAGNOSTICS .PD 0 .TP 1.5i .B syntax error\^ for operator/operand errors .TP .B non-numeric argument\^ if arithmetic is attempted on such a string .PD .SH BUGS After argument processing by the shell, .I expr\^ cannot tell the difference between an operator and an operand except by the value. If .B $a is an .BR = , the command: .PP \f3expr \ $a \ = \ \*'=\*'\f1 .PP looks like: .PP \f3expr \ = \ = \ =\f1 .PP as the arguments are passed to .I expr\^ (and they will all be taken as the .B = operator). The following works: .PP \f3expr \ X$a \ = \ X=\f1 .\" @(#)expr.1 1.4 ring (a string of options beginning with a \fB\-\fR). Output is of the form: .br \fB\-\fIoption \fB\-\fIoption . . . file name(s) .br \fRAll options appear singularly and preceding any file names. Options that take values (e.g., \fB\-\fRr1.1) or are two letters long must be described through options to \fIcvrtopt\fR. .sp \fICvrtopt\fR is usually used with \fIset\fR in the following manner as the first line of a shell procedure: .br .BI " set \- \*`cvrtopt =[" options "] $@\*`\^" .br .I Options\^ to .I cvrtopt\^ are: .RS 10n .TP 10 .BI s string\^ \fIString\fP accepts string values. .TP 10 .BI f string\^ \fIString\fP accepts floating point numbers as values. .TP 10 .BI i string\^ \fIString\fP accepts integers as values. .TP 10 .BI t string\^ \fIString\fP is a 2-letter option name that takes no value. .TP 10 \fIString\fP is a 1-letter or 2-letter option name. .RE .PP .TP 10 .B gd [\| GPS .I files\^ \|\|] \c \- GPS dump .br .I Gd\^ prints a human readable listing of GPS. .PP .TP 10 .B gtop [\|\fB\-\c .BI r n\.TH LPR 1 .SH NAME lpr \- line printer spooler .SH SYNOPSIS .B lpr [ option ... ] [ name ... ] .SH DESCRIPTION .I Lpr\^ causes the named files to be queued for printing on a line printer. If no names appear, the standard input is assumed; thus .I lpr\^ may be used as a filter. .PP The following \fIoptions\fP may be given (each as a separate argument and in any order) before any filename arguments: .PP .PD 0 .TP 10 .B \-c Make a copy of the file to be sent before returning to the user. .TP 10 .B \-r Remove the file after sending it. .TP 10 .B \-m Report by \fImail\fR(1) when printing is complete. .IR mail (1). .TP 10 .B \-n Do not report the completion of printing by .IR mail (1). This is the default option. .TP 10 .BI \-f file Use .I file as a dummy filename to report back by .IR mail (1). This is useful for distinguishing multiple runs, especially when .I lpr\^ is being used as a filter. .PD .SH FILES .PD 0 .TP 20 /etc/passwd user's identification and accounting data. .TP /usr/lib/lpd line printer daemon. ..TH F77 1 .SH NAME f77 \- \s-1FORTRAN\s+1 77 compiler .SH SYNOPSIS .B f77 [ options ] files .SH DESCRIPTION .I F77\^ is the \*(5) \s-1FORTRAN\s+1 77 compiler; it accepts several types of .I file\^ arguments: .RS .PP Arguments whose names end with .B \&.f are taken to be \s-1FORTRAN\s+1 77 source programs; they are compiled and each object program is left in the current directory in a file whose name is that of the source, with .B \&.o substituted for .BR \&.f . .PP Arguments whose names end with .B \&.r or .B \&.e are taken to be \f2ratfor\f1(1) or \f2efl\f1(1) source programs, respectively; these are first transformed by the appropriate preprocessor, then compiled by .IR f77 , producing .B \&.o files. .PP In the same way, arguments whose names end with .B \&.c or .B \&.s are taken to be C or assembly source programs and are compiled or assembled, producing .B \&.o files. .RE .PP The following .I options\^ have the same meaning as in .IR cc (1) (see .IR ld (1) for link editor options): .PP .PD 0 .TP 12 .B \-c  | u\^ \|\|] [\| GPS .I files\^ \|\|] \c \- GPS to \fIplot\^\fR(4) filter .br .I Gtop\^ transforms a GPS into \fIplot\^\fR(4) commands displayable by \fIplot\fR filters. GPS objects are translated if they fall within the window that circumscribes the first \fIfile\fR unless an \fIoption\fR is given. .br Options: .RS 10n .TP 10 .BI r n\^ translate objects in GPS \fBr\fRegion \fIn\fR. .TP 10 .B u translate all objects in the GPS \fBu\fRniverse. .RE .PP .TP 10 .B pd [ .I plot\c\^ \^(5) .I files\^ \|\|] \c \- \fIplot\^\fR(4) dump .br .I Pd\^ prints a human readable listing of \fIplot\^\fR(4) format graphical commands. .RE .PP .TP 10 .B ptog [ .I plot\c\^ \^(5) .I files\^ \|\|] \c \- \fIplot\^\fR(4) to GPS filter .br .I Ptog\^ transforms \fIplot\^\fR(4) commands into a GPS. .PP .TP 10 .B quit \c \- terminate session .PP .TP 10 .B remcom [ .I files\^ \|\|] \c \- remove comments .br .I Remcom\^ copies its input to its output with comments removed. Comments are as defined in C (i.e., /\(** comment \(**/). .PP .TP /usr/spool/lpd/\(** spool area. .PD .SH SEE ALSO lpd(1C), lp(1). .\" @(#)lpr.1 1.4  Suppress link editing and produce .B \&.o files for each source file. .TP .B \-p Prepare object files for profiling (see .IR prof (1)). .TP .B \-O Invoke an object code optimizer. .TP .B \-S Compile the named programs and leave the assembler language output in corresponding files whose names are suffixed with .BR \&.s . (No .B \&.o files are created.) .TP .BI \-o "output\^" Name the final output file .IR output , instead of .BR a.out . .TP .B \-f In systems without floating-point hardware, use a version of .I f77\^ that handles floating-point constants and links the object program with the floating-point interpreter. .TP .B \-g Generate additional information needed for the use of .IR sdb (1) .PD .PP The following .I options\^ are peculiar to .IR f77 : .PP .PD 0 .TP 12 .B \-onetrip Compile .SM \f3DO\f1 loops that are performed at least once if reached. (\s-1FORTRAN\s+1 77 .SM \f3DO\f1 loops are not performed at all if the upper limit is smaller than the lower limit.) .TP .B \-1 Same as .BR \-onetrip . .TP .BTP 10 .B whatis [\|\fB\-\c .B o \|\|] [\| .I names\^ \|\|] \c \- brief online documentation .br .I Whatis\^ prints a brief description of each \fIname\fR given. If no \fIname\fR is given, then the current list of description \fInames\fR is printed. .B whatis \e\(** prints out every description. .br Option: .RS 10n .TP 10 .B o print command .BR o "ptions only" .RE .PP .TP 10 .B yoo .I file\^\c \- pipe fitting .br .I Yoo\^ is a piping primitive that deposits the output of a pipeline into a \fIfile\fR used in the pipeline. Note that, without \fIyoo\fR, this is not usually successful as it causes a read and write on the same file simultaneously. .SH "SEE ALSO" graphics(1G), gps(4). .\" @(#)gutil.1g 1.4   .TH LPSTAT 1 .SH NAME lpstat \- print \s-1LP\s+1 status information .SH SYNOPSIS .B lpstat [\|options\|] .SH DESCRIPTION .I Lpstat prints information about the current status of the .SM LP line printer system. .PP If no .I options are given, then .I lpstat prints the status of all requests made to .IR lp (1) by the user. Any arguments that are not .I options are assumed to be request .IR id 's (as returned by .IR lp ). .I Lpstat prints the status of such requests. .I Options may appear in any order and may be repeated and intermixed with other arguments. Some of the keyletters below may be followed by an optional .I list that can be in one of two forms: a list of items separated from one another by a comma, or a list of items enclosed in double quotes and separated from one another by a comma and/or one or more spaces. For example: .PP .RS .B "\-u``user1, user2, user3''" .RE .PP The omission of a .I list following such keyletters causes all information relevant to the keyletter to be printed. For example, .P \-66 Suppress extensions which enhance \s-1FORTRAN\s+1 66 compatibility. .TP .B \-C Generate code for run-time subscript range-checking. .TP .BR \-I [ 24s ] Change the default size of integer variables (only valid on machines where the ``normal'' integer size is not equal to the size of a single precision real). .BR \-I2 causes all integers to be 2-byte quantities, .BR \-I4 (default) causes all integers to be 4-byte quantities, and .BR \-Is changes the default size of subscript expressions (only) from the size of an integer to 2 bytes. .TP .B \-U Do not ``fold'' cases. .I F77 is normally a no-case language (i.e., .B a is equal to .BR A ). The .B \-U option causes .I f77 to treat upper and lower cases separately. .TP .B \-u Make the default type of a variable .IR undefined , rather than using the default \s-1FORTRAN\s+1 rules. .TP .B \-w Suppress all warning messages. If the option is .BR \-w66 , only \s-1FORTRAN\s+1 66 compatibility warnings are suppressed. .TP .B \-F Apply \f2efl\f1(1) and \f2ratfor\f1(1) .\" @(#)hardcopy.1g 1.2 .so /usr/man/u_man/man1/gdev.1g P .RS .B "lpstat \-o" .RE .PP prints the status of all output requests. .TP "\w'\-a[\|list\|]\ \ \ \ 'u" .BR \-a [\|\fIlist\fP\|] Print acceptance status (with respect to .IR lp ) of destinations for requests. .I List is a list of intermixed printer names and class names. .TP .BR \-c [\|\fIlist\fP\|] Print class names and their members. .I List is a list of class names. .TP .B \-d Print the system default destination for .IR lp . .TP .BR \-o [\|\fIlist\fP\|] Print the status of output requests. .I List is a list of intermixed printer names, class names, and request .IR id 's. .TP .BR \-p [\|\fIlist\fP\|] Print the status of printers. .I List is a list of printer names. .TP .B \-r Print the status of the LP request scheduler .TP .B \-s Print a status summary, including the status of the line printer scheduler, the system default destination, a list of class names and their members, and a list of printers and their associated devices. .TP .B \-t Print all status information. .TP .BR \-u [\|\fIlist\fP\|] Print s! preprocessor to relevant files and put the result in files whose names have their suffix changed to .BR \&.of . No .B \&.o files are created. .TP .B \-m Apply the M4 preprocessor to each \f2efl\f1(1) or \f2ratfor\f1(1) source file before transforming with the .IR ratfor (1) or .IR ef\&l (1) processors. .TP .B \-E The remaining characters in the argument are used as an \f2efl\f1(1) flag argument whenever processing a .B \&.e file. .TP .B \-R The remaining characters in the argument are used as a \f2ratfor\f1(1) flag argument whenever processing a .B \&.r file. .PD .PP Other arguments are taken to be link editor option arguments, .IR f77 -compilable object programs (typically produced by an earlier run), or libraries of .IR f77 -compilable routines. These programs, together with the results of any compilations specified, are linked (in the order given) to produce an executable program with the default name .BR "a.out" . .SH FILES .PD 0 .TP 20 file.[fresc] input file .TP file.o object file .TP a.out linked outp.\" @(#)hashcheck.1 1.2 .so /usr/man/u_man/man1/spell.1 tatus of output requests for users. .I List is a list of login names. .TP .BR \-v [\|\fIlist\fP\|] Print the names of printers and the pathnames of the devices associated with them. .I List is a list of printer names. .SH FILES /usr/spool/lp/\(** .SH SEE ALSO enable(1), lp(1). .\" @(#)lpstat.1 1.4 ut .TP \&./fort[\fIpid\fP].? temporary .TP /usr/lib/f77pass1 compiler .TP /lib/f1 pass 2 .TP /lib/c2 optional optimizer .TP /usr/lib/libF77.a intrinsic function library .TP /usr/lib/libI77.a \s-1FORTRAN\s+1 I/O library .TP /lib/libc.a C library; see Section 3 of this Manual. .PD .SH SEE ALSO .I "A Portable Fortran 77 Compiler" by S. I. Feldman and P. J. Weinberger. .br asa(1), cc(1), ef\&l(1), fsplit(1), ld(1), m4(1), prof(1), ratfor(1), sdb(1). .SH DIAGNOSTICS The diagnostics produced by .I f77\^ itself are self-explanatory. Occasional messages may be produced by the link editor .IR ld (1). .\" @(#)f77.1 1.8 ! .\" @(#)hashmake.1 1.2 .so /usr/man/u_man/man1/spell.1 .TH LS 1 .SH NAME ls \- list contents of directories .SH SYNOPSIS .B ls [ .B \-logtasdrucifp ] names .SH DESCRIPTION .I Ls\^ lists the contents of each named directory; for each file named, .I ls\^ repeats the filename and any other information requested. By default, the output is sorted alphabetically. When no argument is given, the current directory is listed. When several arguments are given, the arguments are first sorted appropriately, but file arguments are processed before directories and their contents. There are several options: .TP .B \-l List in long format, giving mode, number of links, owner, group, size in bytes, and time of last modification for each file (see below). If the file is a special file, the size field contains the major and minor device numbers, rather than a size. .TP .B \-o The same as .BR \-l , except that the group is not printed. .TP .B \-g The same as .BR \-l , except that the owner is not printed. .TP .B \-t Sort by time of last modification (latest first) instead of by name..TH FACTOR 1 .SH NAME factor \- factor a number .SH SYNOPSIS .B factor [ number ] .SH DESCRIPTION When .I factor\^ is invoked without an argument, it waits for a number to be typed in. If you type in a positive number less than 2\u\s756\s0\d (about .if n 7.2e16) .if t 7.2\(mu10\u\s716\s0\d\|) it factors the number and prints its prime factors; each one is printed the proper number of times. Then it waits for another number. It exits if it encounters a zero or any non-numeric character. .PP If .I factor\^ is invoked with an argument, it factors the number as above and then exits. .PP Maximum time to factor is proportional to .if n sqrt(n) .if t \(sr\o'\fIn\fR\(rn' and occurs when .I n\^ is prime or the square of a prime. .SH DIAGNOSTICS .TP 10 .B Ouch input out of range or garbage input. .\" @(#)factor.1 1.4 .TH HELP 1 .SH NAME help \- ask for help .SH SYNOPSIS .B help [\^args\^] .SH DESCRIPTION .I Help\^ finds information to explain a message from a command or explain the use of a command. Zero or more arguments may be supplied. If no arguments are given, .I help\^ prompts for one. .PP The arguments may be either message numbers (which normally appear in parentheses following messages) or command names, of one of the following types: .PP .RE .RS 10 .TP 10 type 1 Begins with non-numerics, ends in numerics. The non-numeric prefix is usually an abbreviation for the program or set of routines which produced the message (e.g., \fBge6\fP, for message 6 from the .I get\^ command). .PP .RE .RS 10 .TP 10 type 2 Does not contain numerics (as a command, such as .BR get ) .PP .RE .RS 10 .TP 10 type 3 Is all numeric (e.g., \fB212\fP) .RE .PP The response of the program is the explanatory information related to the argument, if there is any. .PP When all else fails, try the command .BR "help stuck" . .SH FILES .PP .TP 20 /"  .TP .B \-a List all entries; in the absence of this option, entries whose names begin with a period .RB (\^ \&. \^) are .I not\^ listed. .TP .B \-s Give size in blocks (including indirect blocks) for each entry. .TP .B \-d If argument is a directory, list only its name; often used with .B \-l to get the status of a directory. .TP .B \-r Reverse the order of sort to get reverse alphabetic or oldest first, as appropriate. .TP .B \-u Use time of last access instead of last modification for sorting (with the .B \-t option) and/or printing (with the .B \-l option). .TP .B \-c Use time of last modification of the inode (mode, etc.) instead of last modification of the file for sorting .RB ( \-t ) and/or printing .RB ( \-l ). .TP .B \-i For each file, print the i-number in the first column of the report. .TP .B \-f Force each argument to be interpreted as a directory and list the name found in each slot. This option turns off .BR \-l , .BR \-t , .BR \-s , and .BR \-r , and turns on .BR \-a ; the order is the order i.\" @(#)false.1 1.2 .so /usr/man/u_man/man1/true.1 usr/lib/help directory containing files of message text. .PP .TP 20 /usr/lib/help/helploc file containing locations of help files not in \fB/usr/lib/help\fP. .SH DIAGNOSTICS Use .IR help (1) for explanations. .\" @(#)help.1 1.3 n which entries appear in the directory. .TP .B \-p Put a slash after each filename if that file is a directory. Especially useful for .SM CRT terminals when combined with the .IR pr (1) command as follows: .BR "ls \-p | pr \-5 \-t \-w80" . .PP The mode printed under the .B \-l option consists of 11 characters that are interpreted as follows: .RS .sp \n(PDu The first character is: .sp \n(PDu .RS .PD 0 .TP 4 .B d if the entry is a directory; .TP .B b if the entry is a block special file; .TP .B c if the entry is a character special file; .TP .B p if the entry is a fifo (a.k.a. ``named pipe'') special file; .TP .B \- if the entry is an ordinary file. .RE .PD .sp \n(PDu The next 9 characters are interpreted as three sets of three bits each. The first set refers to the owner's permissions; the next to permissions of others in the user group of the file; and the last to all others. Within each set, the three characters indicate permission to read, to write, and to execute the file as a program, respectively. For a" .\" @(#)fgrep.1 1.2 .so /usr/man/u_man/man1/grep.1 .TH HP 1 .SH NAME hp \- handle special functions of \s-1HP\s+1 2640 and 2621-series terminals .SH SYNOPSIS .B hp [ .B \-e ] [ .B \-m ] .SH DESCRIPTION .I Hp\^ supports special functions of the Hewlett-Packard 2640 series of terminals, with the primary purpose of producing accurate representations of most .I nroff output. A typical use is: .PP .RS .B "nroff \|\-h \|files \|.\|.\|. \|\(bv \|hp" .RE .PP Regardless of the hardware options on your terminal, .I hp\^ tries to do sensible things with underlining and reverse line-feeds. If the terminal has the ``display enhancements'' feature, subscripts and superscripts can be indicated in distinct ways. If it has the ``mathematical-symbol'' feature, Greek and other special characters can be displayed. .PP The flags are: .PD 0 .TP .B \-e It is assumed that your terminal has the ``display enhancements'' feature, and so maximal use is made of the added display modes. Overstruck characters are presented in the Underline mode. Superscripts are shown in Half-bright mode,  directory, execute permission is interpreted to mean permission to search the directory for a specified file. .sp \n(PDu The permissions are indicated as follows: .sp \n(PDu .RS .PD 0 .TP 4 .B r if the file is readable; .TP .B w if the file is writable; .TP .B x if the file is executable; .TP .B \- if the indicated permission is .I not\^ granted. .RE .PD .sp \n(PDu The group-execute permission character is given as .B s if the file has set-group-\s-1ID\s+1 mode; likewise, the user-execute permission character is given as .B s if the file has set-user-\s-1ID\s+1 mode. The last character of the mode (normally .B x or .BR \- ) is .B t if the 1000 (octal) bit of the mode is on; see .IR chmod (1) for the meaning of this mode. The indications of set-\s-1ID\s+1 and 1000 bit of the mode are capitalized ( .B S and .B T respectively) if the corresponding execute permission is .I not\^ set. .RE .PP When the sizes of the files in a directory are listed, a total count of blocks, including indirect blocks, is printed. .SH.\" @(#)file.1 1.5 .TH FILE 1 .SH NAME file \- determine file type .SH SYNOPSIS .B file .RB "[ " \-c " ] [ " .BR \-f " ffile ] [ " .BR \-m " mfile ] " arg ... .SH DESCRIPTION .I File\^ performs a series of tests on each argument in an attempt to classify it. If an argument appears to be \s-1ASCII\s0, .I file\^ examines the first 512 bytes and tries to guess its language. If an argument is an executable .BR a.out , .I file\^ prints the version stamp, provided it is greater than 0 (see .IR ld (1)). .PP If the .B \-f option is given, the next argument is taken to be a file containing the names of the files to be examined. .PP .I File uses the file .B /etc/magic to identify files that have some sort of .IR "magic number" , that is, any file containing a numeric or string constant that indicates its type. Commentary at the beginning of .B /etc/magic explains its format. .PP The .B \-m option instructs .I file to use an alternate magic file. .PP The .B \-c flag causes .I file to check the magic file for format err# and subscripts in Half-bright, Underlined mode. If this flag is omitted, .I hp\^ assumes that your terminal lacks the ``display enhancements'' feature. In this case, all overstruck characters, subscripts, and superscripts are displayed in Inverse Video mode, i.e., dark-on-light, rather than the usual light-on-dark. .TP .B \-m Requests minimization of output by removal of new-lines. Any contiguous sequence of 3 or more new-lines is converted into a sequence of only 2 new-lines; i.e., any number of successive blank lines produces only a single blank output line. This allows you to retain more actual text on the screen. .PD .PP For Greek and other special characters, .I hp\^ provides the same set as .IR 300 (1), except that ``not'' is approximated by a right arrow, and only the top half of the integral sign is shown. The display is adequate for examining output from .IR neqn . .SH DIAGNOSTICS The exit codes are .B 0 for normal termination, .B 2 for all errors. .TP 15 .B "line too long" the representation of a l FILES .PD 0 .TP 8m /etc/passwd to get user .SM ID\*Ss for .B "ls \-l" and .BR "ls \-o" . .TP /etc/group to get group .SM ID\*Ss for .B "ls \-l" and .BR "ls \-g" . .PD .SH SEE ALSO chmod(1), find(1). .\" @(#)ls.1 1.3 ors. This validation is not normally carried out for reasons of efficiency. No file typing is done under .BR \-c . .SH FILES /etc/magic .SH "SEE ALSO" ld(1). ine exceeds 1,024 characters. .SH SEE ALSO 300(1), col(1), eqn(1), greek(1), nroff(1), tbl(1). .SH BUGS An overstriking sequence is defined as a printing character followed by a backspace followed by another printing character. In such sequences, if either printing character is an underscore, the other printing character is shown underlined or in Inverse Video; otherwise, only the first printing character is shown (again, underlined or in Inverse Video). Nothing special is done if a backspace is adjacent to an .SM ASCII control character. Sequences of control characters (e.g., reverse line-feeds, backspaces) can make text ``disappear''; in particular, tables generated by .IR tbl (1) that contain vertical lines often are missing the lines of text that contain the ``foot'' of a vertical line, unless the input to .I hp\^ is piped through .IR col (1). .br Although some terminals provide numerical superscript characters, no attempt is made to display them. .\" @(#)hp.1 1.4 # .if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH M4 1 .SH NAME m4 \- macro processor .SH SYNOPSIS .B m4 [ options ] [ files ] .SH DESCRIPTION .I M4\^ is a macro processor intended as a front end for Ratfor, C, and other languages. Each of the argument files is processed in order; if there are no files, or if a filename is .BR \- , the standard input is read. The processed text is written on the standard output. .PP The options and their effects are as follows: .TP 10 .B \-e Operate interactively. Interrupts are ignored and the output is unbuffered. .TP 10 .B \-s Enable line sync output for the C preprocessor .RB ( # "line .\|.\|.\|)" .TP 10 .BI \-B int\^ Change the size of the push-back and argument collection buffers from the default of 4,096. .TP 10 .BI \-H int\^ Change the size of the symbol table hash array from the default of 199. The size should be prime. .TP 10 .BI \-S int\^ Change the size of the call stEfind.1Ffsplit.1Ggdev.1gHged.1gIget.1Jgetopt.1Kgraph.1gLgraphics.1gMgreek.1Ngrep.1Ogutil.1gPhardcopy.1gQhashcheck.1Rhashmake.1Shelp.1Thp.1Uhpd.1gVhyphen.1Wid.1Xintro.1Yipcrm.1Zipcs.1[join.1\kill.1]ld.1^lex.1_line.1`lint.1alist.1bln.1clogin.1dlogname.1elorder.1flp.1glpd.1chlpr.1ilpstat.1jls.1km4.1lmachid.1mmail.1nmake.1omakekey.1pman.1qmanprog.1rmesg.1smkdir.1tmm.1ummt.1vmv.1wmvt.1xneqn.1ynewform.1znewgrp.1{news.1|nice.1}nl.1~nm.1nohup.1nroff.1od.1osdd.1pack.1passwd.1.\" @(#)hpd.1g 1.2 .so /usr/man/u_man/man1/gdev.1g ack from the default of 100 slots. Macros take three slots, and non-macro arguments take one. .TP 10 .BI \-T int\^ Change the size of the token buffer from the default of 512 bytes. .PP To be effective, these flags must appear before any filenames and before any .B \-D or .B \-U flags: .TP 15 \f3\-D\fP\f2name\^\fP[\f3=\fP\f2val\^\fP] Defines .I name\^ to .I val\^ or to null in the absence of .IR val . .TP 15 .BI \-U name\^ undefines .IR name . .PP Macro calls have the form: .PP .RS .I "name(arg1,arg2, .\|.\|., argn)" .RE .PP The .B ( must immediately follow the name of the macro. If the name of a defined macro is not followed by a .BR ( , it is assumed to be a call of that macro with no arguments. Potential macro names consist of alphabetic letters, digits, and underscore .BR _ , where the first character is not a digit. .PP .I M4 ignores leading unquoted blanks, tabs, and new-line characters while collecting arguments. Left and right single quotes are used to quote strings. The value of a quoted string is th$ .TH FIND 1 .SH NAME find \- find files .SH SYNOPSIS .B find pathname-list expression .SH DESCRIPTION .I Find\^ recursively descends the directory hierarchy for each pathname in the .I pathname-list\^ (i.e., one or more pathnames) seeking files that match a Boolean .I expression\^ written in the primaries given below. In the descriptions, the argument .I n\^ is used as a decimal integer where .BI + n\^ means more than .IR n , .BI \- n\^ means less than .IR n , and .I n\^ means exactly .IR n . .TP 16 .BI \-name " file\^" True if .I file\^ matches the current filename. Normal shell argument syntax may be used if escaped (watch out for .BR [ ", " .BR ? " and " .BR \(** ). .TP 16 .BI \-perm " onum\^" True if the file permission flags exactly match the octal number .I onum\^ (see .IR chmod (1)). If .I onum\^ is prefixed by a minus sign, more flag bits (017777, see .IR stat (2)) become significant and the flags are compared: .sp \n(PDu .RS 10m \f3(flags&onum)==onum\f1 .RE .sp \n(PDu .TP 16 .BI \-type " c\^" True if.TH HYPHEN 1 .SH NAME hyphen \- find hyphenated words .SH SYNOPSIS .B hyphen [ files ] .SH DESCRIPTION .I Hyphen\^ finds all the hyphenated words ending lines in .I files\^ and prints them on the standard output. If no arguments are given, the standard input is used; thus, .I hyphen\^ may be used as a filter. .SH EXAMPLE The following allows the proofreading of .I nroff\^ hyphenation in .IR textfile . .PP .RS .B "mm textfile \(bv hyphen" .RE .SH "SEE ALSO" mm(1), troff(1). .SH BUGS .I Hyphen\^ can't cope with hyphenated .I italic\^ (i.e., underlined) words; it often misses them completely or mangles them. .br .I Hyphen\^ occasionally gets confused, but with no ill effects other than spurious extra output. .\" @(#)hyphen.1 1.3 e string stripped of the quotes. .PP When a macro name is recognized, its arguments are collected by searching for a matching right parenthesis. If fewer arguments are supplied than are in the macro definition, the trailing arguments are taken to be null. Macro evaluation proceeds normally during the collection of the arguments, and any commas or right parentheses that appear within the value of a nested call are as effective as those in the original input text. After argument collection, the value of the macro is pushed back onto the input stream and rescanned. .PP .I M4\^ makes available the following built-in macros. They may be redefined, but once this is done the original meaning is lost. Their values are null unless otherwise stated. .TP 12 define the second argument is installed as the value of the macro whose name is the first argument. Each occurrence of .BI $ n\^ in the replacement text, where .I n\^ is a digit, is replaced by the .IR n -th argument. Argument 0 is the name of the macro; missing argu the type of the file is .IR c , where .I c\^ is .BR b , .BR c , .BR d , .BR p , or .B f for block special file, character special file, directory, fifo (a.k.a named pipe), or plain file. .TP 16 .BI \-links " n\^" True if the file has .I n\^ links. .TP 16 .BI \-user " uname\^" True if the file belongs to the user .IR uname . If .I uname\^ is numeric and does not appear as a login name in the .B /etc/passwd file, it is taken as a user \s-1ID\s0. .TP 16 .BI \-group " gname\^" True if the file belongs to the group .IR gname . If .I gname\^ is numeric and does not appear in the .B /etc/group file, it is taken as a group \s-1ID\s0. .TP 16 .BI \-size " n\^" True if the file is .I n\^ blocks long (512 bytes per block). .TP 16 .BI \-atime " n\^" True if the file has not been accessed in .I n\^ days. .TP 16 .BI \-mtime " n\^" True if the file has not been modified in .I n\^ days. .TP 16 .BI \-ctime " n\^" True if the file has not been changed in .I n\^ days. .TP 16 .BI \-exec " cmd\^" True if the executed .I cmd\^ re$ .TH ID 1 .SH NAME id \- print user and group \s-1ID\s+1s and names .SH SYNOPSIS .B id .SH DESCRIPTION .I Id\^ writes a message on the standard output giving the user and group \s-1ID\s+1s and the corresponding names of the invoking process. If the effective and real \s-1ID\s+1s do not match, both are printed. .SH SEE ALSO logname(1), getuid(2). .\" @(#)id.1 1.2 ments are replaced by the null string; .B $# is replaced by the number of arguments; .B $\(** is replaced by a list of all the arguments separated by commas; .B $@ is like .BR $\(** , but each argument is quoted (with the current quotes). .TP undefine removes the definition of the macro named in its argument. .TP defn returns the quoted definition of its argument(s). It is useful for renaming macros, especially built-in ones. .TP pushdef like .IR define , but saves any previous definition. .TP popdef removes current definition of its argument(s), exposing the previous one if any. .TP ifdef if the first argument is defined, the value is the second argument, otherwise the third. If there is no third argument, the value is null. The word .I unix\^ is predefined on the .SM UNIX System versions of .IR m4 . .TP shift returns all but its first argument. The other arguments are quoted and pushed back with commas in between. The quoting nullifies the effect of the extra scan that is subsequently performed. .TP changeqturns a zero value as exit status. The end of .I cmd\^ must be punctuated by an escaped semicolon. A command argument .B {} is replaced by the current pathname. .TP 16 .BI \-ok " cmd\^" Like .B \-exec except that the generated command line is printed with a question mark first, and is executed only if the user responds by typing .BR y . .TP 16 .B \-print Always true; causes the current pathname to be printed. .TP 16 .BI \-cpio " device\^" Write the current file on .I device\^ in .IR cpio\| (4) format (5120 byte records). .TP 16 .BI \-newer " file\^" True if the current file has been modified more recently than the argument .IR file . .TP 16 .BI ( " expression " ) True if the parenthesized expression is true (parentheses are special to the shell and must be escaped). .PP The primaries may be combined using the following operators (in order of decreasing precedence): .TP 4 1) The negation of a primary .RB ( ! is the unary .I not\^ operator). .TP 4 2) Concatenation of primaries (the .I and\^ operation is implie.TH INTRO 1 .SH NAME intro \- introduction to commands and application programs .SH DESCRIPTION This section describes, in alphabetical order, publicly-accessible commands. Certain distinctions of purpose are made in the headings: .TP (1) Commands of general utility. .PD 0 .TP (1C) Commands for communication with other systems. .TP (1G) Commands used primarily for graphics and computer-aided design. .PD .SH COMMAND SYNTAX Unless otherwise noted, commands described in this section accept options and other arguments according to the following syntax: .PP .I name .RI [ option ( s )] .RI [ cmdarg ( s )] .br where: .TP 13 .I name The name of an executable file. .TP .I option\^ .B \- .IR noargletter ( s ) or .br .B \- .IR argletter <> optarg .br where <> is optional white space. .TP .I noargletter\^ A single letter representing an option without an argument. .TP .I argletter\^ A single letter representing an option requiring an argument. .TP .I optarg\^ An argument (character string) satisfying preceding .IR a% uote changes quote symbols to the first and second arguments. The symbols may be up to five characters long. .I Changequote\^ without arguments restores the original values (i.e., \*`\|\*'). .TP changecom changes left and right comment markers from the default .B # and new line. With no arguments, the comment mechanism is effectively disabled. With one argument, the left marker becomes the argument and the right marker becomes new line. With two arguments, both markers are affected. Comment markers may be up to five characters long. .TP divert .I m4\^ maintains 10 output streams, numbered 0-9. The final output is the concatenation of the streams in numerical order; initially stream 0 is the current stream. The .I divert\^ macro changes the current output stream to its (digit-string) argument. Output diverted to a stream other than 0 through 9 is discarded. .TP undivert causes immediate output of text from diversions named as arguments, or from all diversions if no argument is present. Text may be undiverted id by the juxtaposition of two primaries). .TP 4 3) Alternation of primaries .RB "(" \-o " is the" .I or\^ operator). .SH EXAMPLE To remove all files named \f3a.out\fP or \f3\(**.o\fP that have not been accessed for a week: .PP \f3find / \\\|( \-name a.out \-o \-name \(fm\(**.o\(fm \\\|) \-atime +7 \-exec rm {} \\\|;\f1 .SH FILES /etc/passwd, /etc/group .SH "SEE ALSO" cpio(1), sh(1), test(1), stat(2), cpio(4), fs(4). .\" @(#)find.1 1.7 rgletter . .TP .I cmdarg\^ A pathname (or other command argument) .I not\^ beginning with .B \- or .B \- by itself indicating the standard input. .SH SEE ALSO getopt(1), getopt(3C). .br Section\ 6 of this volume for computer games. .PD 0 .PP The ``How to Get Started'' section in the Introduction to this manual. .PD .SH DIAGNOSTICS Upon termination, each command returns two bytes of status, one supplied by the system, giving the cause for termination, and (in the case of ``normal'' termination) one supplied by the program (see .IR wait (2) and .IR exit (2)). The former byte is 0 for normal termination; the latter is customarily 0 for successful execution and non-zero to indicate troubles such as erroneous parameters, bad or inaccessible data, or other inability to cope with the task at hand. It is called variously ``exit code'', ``exit status'', or ``return code'', and is described only where special conventions are involved. .SH BUGS Regretfully, many commands do not adhere to the aforementioned syntax. .\" @nto another diversion. Undiverting discards the diverted text. .TP divnum returns the value of the current output stream. .TP dnl reads and discards characters up to and including the next new-line character. .TP ifelse has three or more arguments. If the first argument is the same string as the second, then the value is the third argument. If not, and if there are more than four arguments, the process is repeated with arguments 4, 5, 6 and 7. Otherwise, the value is either the fourth string, or, if it is not present, null. .TP incr returns the value of its argument incremented by 1. The value of the argument is calculated by interpreting an initial digit-string as a decimal number. .TP decr returns the value of its argument decremented by 1. .TP eval evaluates its argument as an arithmetic expression, using 32-bit arithmetic. Operators include .BR + , .BR \- , .BR \(** , .BR / , .BR % , .B ^ (exponentiation), bitwise .BR & , \(bv, .BR ^ , and .BR ~ ; relationals; parentheses. Octal and hex numbers may be spe% .TH FSPLIT 1 .SH NAME fsplit \- split f77, ratfor, or ef\&l files .SH SYNOPSIS .B fsplit options files .SH DESCRIPTION .I Fsplit splits the named \fIfile(s)\fP into separate files, with one procedure per file. A procedure includes \fIblockdata\fP, \fIfunction\fP, \fImain\fP, \fIprogram\fP, and \fIsubroutine\fP program segments. Procedure \fIX\fP is put in file .IB X .f, .IB X .r\fR,\fP or .IB X .e depending on the language option chosen, with the following exceptions: \fImain\fP is put in the file .IB MAIN .[efr] and unnamed \fIblockdata\fP segments are put in the files .IB blockdataN .[efr] where \fIN\fP is a unique integer value for each file. .PP The following .I options pertain: .TP 8 .B \-f (default) Input files are .IR f77 (1). .TP .B \-r Input files are .IR ratfor (1). .TP .B \-e Input files are .IR ef\&l (1). .TP .B \-s Strip .I f77 input lines to 72 or fewer characters with trailing blanks removed. .SH SEE ALSO csplit(1), ef\&l(1), f77(1), ratfor(1), split(1). .\" @(#)fsplit.1 1.3 (#)intro.1 1.5 cified as in C. The second argument specifies the radix for the result; the default is 10. The third argument may be used to specify the minimum number of digits in the result. .TP len returns the number of characters in its argument. .TP index returns the position in its first argument where the second argument begins (zero origin), or \-1 if the second argument does not occur. .TP substr returns a substring of its first argument. The second argument is a zero origin number selecting the first character; the third argument indicates the length of the substring. A missing third argument is taken to be large enough to extend to the end of the first string. .TP translit transliterates the characters in its first argument from the set given by the second argument to the set given by the third. No abbreviations are permitted. .TP include returns the contents of the file named in the argument. .TP sinclude is identical to .IR include , except that it says nothing if the file is inaccessible. .TP syscmd executes th.tr ~ .TH GDEV 1G .SH NAME hpd, erase, hardcopy, tekset, td \- graphical device routines and filters .SH SYNOPSIS .B hpd .RB [ \- options] .RB "[\s-1GPS\s+1~file" "~.\|.\|." ] .br .B erase .br .B hardcopy .br .B tekset .br .B td .RB [ \-eur n] .RB "[\s-1GPS\s+1~file" "~.\|.\|." ] .SH DESCRIPTION All the commands described below reside in .B /usr/bin/graf (see .IR graphics (1G)). .TP 10 .B hpd .I Hpd translates a graphical primitive string (GPS) (see .IR gps (4)) to instructions for the Hewlett-Packard 7221A Graphics Plotter. A viewing window is computed from the maximum and minimum points in .I file\^ unless the .B \-u or .B \-r .I option\^ is provided. If no .I file\^ is given, the standard input is assumed. .I Options\^ are: .RS 10 .TP 5 .BI c n\^ Select character set .IR n , .I n\^ between 0 and 5 (see the .SM .IR "HP\*S7221A Plotter Operating and Programming Manual" ", " "Appendix A" ). .TP 5 .BI p n\^ Select pen numbered .IR n , .I n\^ between 1 and 4 inclusive. .TP 5 .BI r n\^ Window on \s-1GPS\s+1 regi& .TH IPCRM 1 .SH NAME ipcrm \- remove a message queue, semaphore set or shared memory id .SH SYNOPSIS .B ipcrm [ \fIoptions\fR ] .SH DESCRIPTION .I Ipcrm\^ removes one or more specified messages, semaphores, or shared memory identifiers. The identifiers are specified by the following \fIoptions\fR: .TP 12 \fB\-q\fI msqid\fR removes the message queue identifier \fImsqid\fR from the system and destroys the message queue and data structure associated with it. .TP \fB\-m\fI shmid\fR removes the shared memory identifier \fIshmid\fR from the system. The shared memory segment and data structure associated with it are destroyed after the last detach. .TP \fB\-s\fI semid\fR removes the semaphore identifier \fIsemid\fR from the system and destroys the set of semaphores and data structure associated with it. .TP 12 \fB\-Q\fI msgkey\fR removes the message queue identifier, created with key \fImsgkey\fR, from the system and destroys the message queue and data structure associated with it. .TP \fB\-M\fI shmkey\fR removes e system command given in the first argument. No value is returned. .TP sysval is the return code from the last call to .IR syscmd . .TP maketemp fills in a string of .SM XXXXX in its argument with the current process .SM ID\*S. .TP m4exit causes immediate exit from .IR m4 . Argument 1, if given, is the exit code; the default is 0. .TP m4wrap pushes back argument 1 at final .SM EOF\*S; example: \f3m4wrap(\*`cleanup(\|)\*')\f1 .TP errprint prints its argument on the diagnostic output file. .TP dumpdef prints current names and definitions, for the named items, or for all if no arguments are given. .TP traceon with no arguments, turns on tracing for all macros (including built-in ones); otherwise, it turns on tracing for named macros. .TP traceoff turns off trace globally and for any macros specified. Macros specifically traced by .I traceon\^ can be untraced only by specific calls to .IR traceoff . .dt .SH SEE ALSO cc(1), cpp(1). .br ``The M4 Macro Processor'' by B. W. Kernighan and D. M. Ritchie. .br ``The M4 on .IR n , .I n\^ between 1 and 25 inclusive. .TP 5 .BI s n\^ Slant characters .I n\^ degrees clockwise from the vertical. .TP 5 .B u Window on the entire \s-1GPS\s+1 universe. .TP 5 .BI xd n\^ Set x displacement of the viewport's lower left corner to .I n\^ inches. .TP 5 .BI xv n\^ Set width of viewport to .I n\^ inches. .TP 5 .BI yd n\^ Set y displacement of the viewport's lower left corner to .I n\^ inches. .TP 5 .BI yv n\^ Set height of viewport to .I n\^ inches. .RE .TP 10 \fBerase\fR \fIErase\fR sends characters to a Tektronix 4010 series storage terminal to erase the screen. .TP 10 \fBhardcopy\fR When issued at a Tektronix display terminal with a hard copy unit, \fIhardcopy\fR generates a screen copy on the unit. .TP 10 \fBtekset\fR \fITekset\fR sends characters to a Tektronix terminal to clear the display screen, set the display mode to alpha, and set characters to the smallest font. .TP 10 \fBtd\fR \fITd\fR translates a \s-1GPS\s+1 to scope code for a Tektronix 4010 series storage terminal. the shared memory identifier, created with key \fIshmkey\fR, from the system. The shared memory segment and data structure associated with it are destroyed after the last detach. .TP \fB\-S\fI semkey\fR removes the semaphore identifier, created with key \fIsemkey\fR, from the system and destroys the set of semaphores and data structure associated with it. .PP The details of the removes are described in \fImsgctl\fR(2), \fIshmctl\fR(2), and \fIsemctl\fR(2). The identifiers and keys may be found by using \fIipcs\fR(1). .SH "SEE ALSO" ipcs(1), msgctl(2), msgget(2), msgop(2), semctl(2), semget(2), semop(2), shmctl(2), shmget(2), shmop(2). .\" @(#)ipcrm.1 1.3 & Macro Processor'' in the .IR "\*(6) Support Tools Guide" . .\" @(#)m4.1 1.6 A viewing window is computed from the maximum and minimum points in .I file\^ unless the .B \-u or .B \-r .I option\^ is provided. If no .I file\^ is given, the standard input is assumed. Options are: .RS 10 .TP 5 .B e Do not erase screen before initiating display. .TP 5 .BI r n\^ Display \s-1GPS\s+1 region \fIn\fR, \fIn\fR between 1 and 25 inclusive. .TP 5 .B u Display the entire \s-1GPS\s+1 universe. .RE .DT .SH "SEE ALSO" ged(1G), graphics(1G), gps(4). .br .IR "\*(6) Graphics Guide" . .tr ~~ .\" @(#)gdev.1g 1.5 .TH IPCS 1 .SH NAME ipcs \- report inter-process communication facilities status .SH SYNOPSIS .B ipcs [ options ] .SH DESCRIPTION .I Ipcs\^ prints information about active inter-process communication facilities. Without .IR options , information is printed in short format for message queues, shared memory, and semaphores that are currently active in the system. Otherwise, the information that is displayed is controlled by the following .IR options : .PP .PD 0 .TP \w'-N namelist\ \ \ 'u .B \-q Print information about active message queues. .TP & .B \-m Print information about active shared memory segments. .TP & .B \-s Print information about active semaphores. .PP If one of the options .BR \-q , .BR \-m , or .B \-s is specified, only information about the indicated facility is printed. If none of the three options is specified, information about all three is printed. .sp .TP & .B \-b Print biggest allowable size information. (Maximum number of bytes in messages on queue for message queues; size of segments fo.TH MACHID 1 .SH NAME pdp11, u3b, vax, m68k \- provide truth value about your processor type .SH SYNOPSIS .B pdp11 .PP .B u3b .PP .B vax .PP .B m68k .SH DESCRIPTION The following commands return a true value (exit code of 0) if you are on the processor that the command name indicates. .RS .TP \w'pdp11\ \ \ 'u .B pdp11 True if you are on a PDP-11/45 or PDP-11/70. .TP & .B u3b True if you are on a 3B20S. .TP & .B vax True if you are on a VAX-11/750 or VAX-11/780. .TP & .B m68k True if you are on a Motorola M68000 processor. .dt .RE .PP The commands that do not apply return a false (non-zero) value. These commands are often used within .IR make (1) makefiles and shell procedures to increase portability. .SH SEE ALSO sh(1), test(1), true(1). .\" @(#)machid.1 1.5 ' .tr ~ .TH GED 1G .SH NAME ged \- graphical editor .SH SYNOPSIS .B ged .RB [ \-euRr n] .RB "[\s-1GPS~file\s+1" "~.\|.\|." ] .SH DESCRIPTION \f2Ged\f1 is an interactive graphical editor used to display, construct, and edit \s-1GPS\s+1 files on Tektronix 4010 series display terminals. If \s-1GPS\s+1 \f2file\f1(s) are given, \f2ged\f1 reads them into an internal display buffer and displays the buffer. The \s-1GPS\s+1 in the buffer can then be edited. If \f3\-\f1 is given as a file name, \f2ged\f1 reads a \s-1GPS\s+1 from the standard input. .PP \f2Ged\f1 accepts the following command line options: .RS 5 .TP 5 \f3e\f1 Do not erase the screen before the initial display. .TP 5 \f3r\f1\f2n\f1 Display region number \f2n\f1. .TP 5 \f3u\f1 Display the entire \s-1GPS\s+1 \f2universe\f1. .TP 5 \f3R\f1 Restricted shell invoked on use of \f3!\f1. .RE .PP A \s-1GPS\s+1 file is composed of instances of three graphical objects: \f2lines\f1, \f2arc\f1, and \f2text\f1. \f2Arc\f1 and \f2lines\f1 objects have a start point, or shared memory; number of semaphores in each set for semaphores.)\ See below for meaning of columns in a listing. .sp .TP & .B \-c Print creator's login name and group name. See below. .sp .TP & .B \-o Print information on outstanding usage. (Number of messages on queue and total number of bytes in messages on queue for message queues; number of processes attached to shared memory segments.)\ .sp .TP & .B \-p Print process number information. (Process .SM ID of last process to send a message and process .SM ID of last process to receive a message on message queues; process .SM ID of creating process and process .SM ID of last process to attach or detach on shared memory segments)\ See below. .sp .TP & .B \-t Print time information. (Time of the last control operation that changed the access permissions for all facilities. Time of last .I msgsnd and last .I msgrcv on message queues; last .I shmat and last .I shmdt on shared memory; last .IR semop (2) on semaphores.)\ See below. .sp .TP & .B \-a Use all pr.\"@(#)mail.1 5.2 .TH MAIL 1 .SH NAME mail, rmail \- send mail to users or read mail .SH SYNOPSIS .B mail [ .B \-epqr ] [ .B \-f file ] .PP .B mail [ .B \-t ] persons .PP .B rmail [ .B \-t ] persons .SH DESCRIPTION .I Mail\^ without arguments prints a user's mail, message-by-message, in last-in, first-out order. For each message, the user is prompted with a .BR ? , and a line is read from the standard input to determine the disposition of the message: .RS .PP .PD 0 .TP 16 Go on to next message. .TP .B + Same as . .TP .B d Delete message and go on to next message. .TP .B p Print message again. .TP .B \- Go back to previous message. .TP \f3s\fP [ \f2files\^\fP ] Save message in the named .I files\^ .RB ( mbox is default). .TP \f3w\fP [ \f2files\^\fP ] Save message, without its header, in the named .I files\^ .RB ( mbox is default). .TP \f3m\fP [ \f2persons\^\fP ] Mail the message to the named .I persons\^ (yourself is default). .TP .B q Put undeleted mail back in the .I mailfile\^ and stop.r \f2object-handle\f1, followed by zero or more points, or \f2point-handles\f1. \f2Text\f1 has only an object-handle. The objects are positioned within a Cartesian plane, or \f2universe\f1, having 64K (\-32K to +32K) points, or \f2universe-units\f1, on each axis. The universe is divided into 25 equal sized areas called \f2regions\f1. Regions are arranged in five rows of five squares each, numbered 1 to 25 from the lower left of the universe to the upper right. .PP \f2Ged\f1 maps rectangular areas, called \f2windows\f1, from the universe onto the display screen. Windows allow the user to view pictures from different locations and at different magnifications. The \f2universe-window\f1 is the window with minimum magnification, i.e., the window that views the entire universe. The \f2home-window\f1 is the window that completely displays the contents of the display buffer. .SH COMMANDS .I Ged\^ commands are entered in .IR stages . Typically each stage ends with a \f3\f1 (return). Prior to the final \f3\f1' int .IR options . This is a shorthand notation for .BR \-b , .BR \-c , .BR \-o , .BR \-p , and .BR \-t .\ .sp .TP & .BI \-C " corefile\^" Use the file .I corefile\^ in place of .BR /dev/kmem . .sp .TP & .BI \-N " namelist\^" The argument is taken as the name of an alternate .I namelist\^ .RB ( /unix is the default). .PD .PP The column headings and the meaning of the columns in an .I ipcs\^ listing are given below; the letters in parentheses indicate the .I options that cause the corresponding heading to appear; .B all means that the heading always appears. Note that these .I options only determine what information is provided for each facility; they do .I not\^ determine which facilities are to be listed. .ta .75i .ne 5 .PP .PD 0 .TP 16 .SM .BR T\*S " (all)" Type of facility: .RS 20 .TP 6 .B q message queue; .TP .B m shared memory segment; .TP .B s semaphore. .RE .TP .SM .BR ID\*S " (all)" The identifier for the facility entry. .TP .SM .BR KEY\*S " (all)" The key used as an argument to .IR msgget , .IR semge .TP .SM .BR EOT\*S " (control-d)" Same as .BR q . .TP .B x Put all mail back in the .I mailfile\^ unchanged and stop. .TP .BI ! command\^ Escape to the shell to do .IR command . .TP .B \(** Print a command summary. .PD .PP .RE The optional arguments alter the printing of the mail: .PP .PD 0 .TP .B \-e causes mail not to be printed. An exit value of 0 is returned if the user has mail; otherwise, an exit value of 1 is returned. .TP .B \-p causes all mail to be printed without prompting for disposition. .TP .B \-q causes .I mail\^ to terminate after interrupts. Normally an interrupt only causes the termination of the message being printed. .TP .B \-r causes messages to be printed in first-in, first-out order. .TP .BI \-f file\^ causes .I mail\^ to use .I file\^ (e.g., .BR mbox ) instead of the default .IR mailfile . .PD .PP When .I persons\^ are named, .I mail\^ takes the standard input up to an end-of-file (or up to a line consisting of just a .BR \&. ) and adds it to each .IR person 's .IR mailfile . The mess the command may be aborted by typing \f3rubout\f1. The input of a stage may be edited during the stage using the erase and kill characters of the calling shell. The prompt \f3\(**\f1 indicates that \f2ged\f1 is waiting at stage 1. .sp Each command consists of a subset of the following stages: .TP 12 1. \f2Command line\f1 A \f2command line\f1 consists of a command \f2name\f1 followed by \f2argument\f1(s) followed by a \f3\f1. A command \f2name\f1 is a single character. Command \f2arguments\f1 are either \f2option\f1(s) or a \f2filename\f1. \f2Options\f1 are indicated by a leading \f3\-\f1. .TP 12 2. \f2Text\f1 \f2Text\f1 is a sequence of characters terminated by an unescaped \f3\f1 (120 lines of text maximum). .TP 12 3. \f2Points\f1 \f2Points\f1 is a sequence of one or more screen locations (maximum of 30) indicated either by the terminal crosshairs or by name. The prompt for entering \f2points\f1 is the appearance of the crosshairs. When the crosshairs are visible, typing: .RS 12 .TP 5 \f3sp\f1t , or .I shmget to create the facility entry. (Note:\ The key of a shared memory segment is changed to .SM .B IPC_PRIVATE when the segment has been removed until all processes attached to the segment detach it.)\ .TP .SM .BR MODE\*S " (all)" The facility access modes and flags: The mode consists of 11 characters, interpreted as follows: .RS .sp \n(PDu The first two characters are: .sp \n(PDu .RS .PD 0 .TP 4 .B R if a process is waiting on a .IR msgrcv ; .TP .B S if a process is waiting on a .IR msgsnd ; .TP .B D if the associated shared memory segment has been removed. It disappears when the last process attached to the segment detaches it; .TP .B C if the associated shared memory segment is to be cleared when the first attach is executed; .TP .B \- if the corresponding special flag is not set. .RE .PD .sp \n(PDu The next 9 characters are interpreted as three sets of three bits each. The first set refers to the owner's permissions; the next to permissions of others in the user-group of the facility entry; ( age is preceded by the sender's name and a postmark. Lines that look like postmarks in the message, (i.e., ``From\ .\|.\|.'') are preceded with a .BR > . The .B \-t option causes the message to be preceded by all .I persons\^ the .I mail\^ is sent to. A .I person\^ is usually a user name recognized by .IR login (1). If a .I person\^ being sent mail is not recognized, or if .I mail\^ is interrupted during input, the file .B dead.letter is saved to allow editing and resending. .PP To denote a recipient on a remote system, prefix .I person\^ by the system name and exclamation mark (see .IR uucp (1C)). Everything after the first exclamation mark in .I persons\^ is interpreted by the remote system. In particular, if .I persons\^ contains additional exclamation marks, it can denote a sequence of machines through which the message is to be sent on the way to its ultimate destination. For example, specifying .B a!b!cde as a recipient's name causes the message to be sent to user .B b!cde on system .BR a . System .B a  (space) enters the current location as a \f2point\f1. The \f2point\f1 is identified with a number. .TP 5 \f3$\f2n\f1 enters the previous \f2point\f1 numbered \f2n\f1. .TP 5 \f3>\f2x\f1 labels the last \f2point\f1 entered with the uppercase letter \f2X\f1. .TP 5 \f3$\f2x\f1 enters the \f2point\f1 labeled \f2x\f1. .TP 5 \&\f3.\f1 establishes the previous \f2points\f1 as the current \f2points\f1. At the start of a command the previous \f2points\f1 are those locations given with the previous command. .TP 5 \f3=\f1 echoes the current \f2points\f1. .TP 5 \f3$.\f2n\f1 enters the \f2point\f1 numbered \f2n\f1 from the previous \f2points\f1. .TP 5 \f3#\f1 erases the last \f2point\f1 entered. .TP 5 \f3@\f1 erases all of the \f2points\f1 entered. .RE .TP 12 4. \f2Pivot\f1 The \f2pivot\f1 is a single location, entered by typing \f3\f1 or by using the \f3$\f1 operator, and indicated with a \f3\(**\f1. .TP 12 5. \f2Destination\f1 The \f2destination\f1 is a single location entered by typing \f3\f1 or by using \fand the last to all others. Within each set, the first character indicates permission to read, the second character indicates permission to write or alter the facility entry, and the last character is currently unused. .sp \n(PDu The permissions are indicated as follows: .sp \n(PDu .RS .PD 0 .TP 4 .B r if read permission is granted; .TP .B w if write permission is granted; .TP .B a if alter permission is granted; .TP .B \- if the indicated permission is .I not granted. .RE .RE .TP .SM .BR OWNER\*S " (all)" The login name of the owner of the facility entry. .TP .SM .BR GROUP\*S " (all)" The group name of the group of the owner of the facility entry. .TP .SM .BR CREATOR\*S " (a,c)" The login name of the creator of the facility entry. .TP .SM .BR CGROUP\*S " (a,c)" The group name of the group of the creator of the facility entry. .TP .SM .BR CBYTES\*S " (a,o)" The number of bytes in messages currently outstanding on the associated message queue. .TP .SM .BR QNUM\*S " (a,o)" The number of messages currently outstinterprets that destination as a request to send the message to user .B cde on system .BR b . This might be useful, for instance, if the sending system can access system .B a but not system .BR b , and system .B a has access to system .BR b . .PP The .I mailfile\^ may be manipulated in two ways to alter the function of .IR mail . The .I other\^ permissions of the file may be read-write, read-only, or neither read nor write to allow different levels of privacy. If changed to other than the default, the file is preserved even when empty to perpetuate the desired permissions. The file may also contain the first line: .PP .RS .BI "Forward to" " person" .RE .PP which causes all mail sent to the owner of the .I mailfile\^ to be forwarded to .IR person . This is especially useful to forward all of a person's mail to one machine in a multiple machine environment. .PP .I Rmail\^ only permits the sending of mail; .IR uucp (1C) uses .I rmail\^ as a security precaution. .PP When a user logs in, the presence of mail, if a( 3$\f1. .RE .sp .SS "\s-1COMMAND SUMMARY\s+1" In the summary, characters typed by the user are printed in \f3bold\f1. Command stages are printed in \f2italics\f1. Arguments surrounded by brackets .RB `` [\|] '' are optional. Parentheses .RB `` (\|) '' surrounding arguments separated by ``or'' mean that exactly one of the arguments must be given. .sp .SS Construct commands: .RS 5 .TP 12 \f3A\f1rc [\f3\-e\f1cho,\f3s\f1tyle,\f3w\f1eight] \f2points\f1 .TP 12 \f3B\f1ox [\f3\-e\f1cho,\f3s\f1tyle,\f3w\f1eight] \f2points\f1 .TP 12 \f3C\f1ircle [\f3\-e\f1cho,\f3s\f1tyle,\f3w\f1eight] \f2points\f1 .TP 12 \f3H\f1ardware [\f3\-e\f1cho] \f2text points\f1 .TP 12 \f3L\f1ines [\f3\-e\f1cho,\f3s\f1tyle,\f3w\f1eight] \f2points\f1 .TP 12 \f3T\f1ext [\f3\-a\f1ngle,\f3e\f1cho,\f3h\f1eight,\f3m\f1id-point,\f3r\f1ight-point,\f3t\f1ext,\f3w\f1eight] \f2text points\f1 .RE .sp .SS "Edit commands:" .RS 5 .TP 12 \f3D\f1elete ( \f3\-\f1 (\f3u\f1niverse or \f3v\f1iew) or \f2points\f1 ) .TP 12 \f3E\f1dit [\f3\-a\f1ngle,\f3e\f1cho,\f3h\f1eiganding on the associated message queue. .TP .SM .BR QBYTES\*S " (a,b)" The maximum number of bytes allowed in messages outstanding on the associated message queue. .TP .SM .BR LSPID\*S " (a,p)" The process .SM ID of the last process to send a message to the associated queue. .TP .SM .BR LRPID\*S " (a,p)" The process .SM ID of the last process to receive a message from the associated queue. .TP .SM .BR STIME\*S " (a,t)" The time the last message was sent to the associated queue. .TP .SM .BR RTIME\*S " (a,t)" The time the last message was received from the associated queue. .TP .SM .BR CTIME\*S " (a,t)" The time when the associated entry was created or changed. .TP .SM .BR NATTCH\*S " (a,o)" The number of processes attached to the associated shared memory segment. .TP .SM .BR SEGSZ\*S " (a,b)" The size of the associated shared memory segment. .TP .SM .BR CPID\*S " (a,p)" The process .SM ID of the creator of the shared memory entry. .TP .SM .BR LPID\*S " (a,p)" The process .SM ID of the last process to attach orny, is indicated. Also, notification is made if new mail arrives while using .I mail. .SH FILES .PD 0 .TP 18 /etc/passwd to identify sender and locate persons .TP /usr/mail/\fIuser\fP incoming mail for \fIuser\fP; i.e., the .I mailfile\^ .TP .SM $HOME\*S/mbox saved mail .TP .SM $MAIL\*S variable containing pathname of .I mailfile\^ .TP /tmp/ma\(** temporary file .TP /usr/mail/\(**\f3.\fPlock lock for mail directory .TP dead\f3.\fPletter unmailable text .PD .SH SEE ALSO login(1), uucp(1C), write(1). .SH BUGS Race conditions sometimes result in a failure to remove a lock file. .br After an interrupt, the next message may not be printed; printing may be forced by typing a .BR p . .\" @(#)mail.1 1.4 ht,\f3s\f1tyle,\f3w\f1eight] ( \f3\-\f1 (\f3u\f1niverse or \f3v\f1iew) or \f2points\f1 ) .TP 12 \f3K\f1opy [\f3\-e\f1cho,\f3p\f1oints,\f3x\f1] \f2points\f1 \f2pivot\f1 \f2destination\f1 .TP 12 \f3M\f1ove [\f3\-e\f1cho,\f3p\f1oints,\f3x\f1] \f2points\f1 \f2pivot\f1 \f2destination\f1 .TP 12 \f3R\f1otate [\f3\-a\f1ngle,\f3e\f1cho,\f3k\f1opy,\f3x\f1] \f2points\f1 \f2pivot\f1 \f2destination\f1 .TP 12 \f3S\f1cale [\f3\-e\f1cho,\f3f\f1actor,\f3k\f1opy,\f3x\f1] \f2points\f1 \f2pivot\f1 \f2destination\f1 .sp .RE .SS "View commands:" .RS 5 .TP 16 \f3c\f1oordinates .I points\^ .TP 16 \f3e\f1rase .TP 16 \f3n\f1ew-display .TP 16 \f3o\f1bject-handles ( \f3\-\f1 (\f3u\f1niverse or \f3v\f1iew) or \f2points\f1 ) .TP 16 \f3p\f1oint-handles ( \f3\-\f1 (\f3l\f1abelled-points or \f3u\f1niverse or \f3v\f1iew) or \f2points\f1 ) .TP 16 \f3v\f1iew ( \f3\-\f1 (\f3h\f1ome or \f3u\f1niverse or \f3r\f1egion) or [\f3\-x\f1] \f2pivot destination\f1 ) .TP 16 \f3x\f1 [\f3\-v\f1iew] \f2points\f1 .TP 16 \f3z\f1oom [\f3\-o\f1ut] \f2points\f1 .)  detach the shared memory segment. .TP .SM .BR ATIME\*S " (a,t)" The time the last attach was completed to the associated shared memory segment. .TP .SM .BR DTIME\*S " (a,t)" The time the last detach was completed on the associated shared memory segment. .TP .SM .BR NSEMS\*S " (a,b)" The number of semaphores in the set associated with the semaphore entry. .TP .SM .BR OTIME\*S " (a,t)" The time the last semaphore operation was completed on the set associated with the semaphore entry. .DT .PD .SH FILES .ta \w'/etc/passwd 'u /unix system namelist .br /dev/kmem memory .br /etc/passwd user names .br /etc/group group names .DT .SH SEE ALSO msgop(2), semop(2), shmop(2). .SH BUGS The report .I ipcs\^ produces is only a close approximation of the real status, since information can be changed while the program is running. .\" @(#)ipcs.1 1.3 .TH MAKE 1 .SH NAME make \- maintain, update, and regenerate groups of programs .SH SYNOPSIS .B make .RB [ \-f " makefile]" .RB [ \-p ] .RB [ \-i ] .RB [ \-k ] .RB [ \-s ] .RB [ \-r ] .RB [ \-n ] .RB [ \-b ] .RB [ \-e ] .RB [ \-m ] .RB [ \-t ] .RB [ \-d ] .RB [ \-q ] [\|names\|] .SH DESCRIPTION The .I make\^ program provides a method for maintaining up-to-date versions of programs that result from many operations on a number of files. \fIMake\fR can keep track of the sequence of commands that create certain files and the list of files that require other files to be current before the operations can be done. Whenever a change is made in any part of a program, \fImake\fR creates the proper files correctly. It also provides a simple macro substitution facility and the ability to encapsulate commands in a single file for convenient administration. .PP The basic operation of \fImake\fR is to find the name of a needed target file in the description, ensure that all of the files on which it depends exist and are sp .RE .SS "Other commands:" .RS 5 .TP 12 \f3q\f1uit or \f3Q\f1uit .TP 12 \f3r\f1ead [\f3\-a\f1ngle,\f3e\f1cho,\f3h\f1eight,\f3m\f1id-point,\f3r\f1ight-point,\f3t\f1ext,\f3w\f1eight] \f2file-name\f1 [\f2destination\f1] .TP 12 \f3s\f1et [\f3\-a\f1ngle,\f3e\f1cho,\f3f\f1actor,\f3h\f1eight,\f3k\f1opy,\f3m\f1id-point,\f3p\f1oints,\f3r\f1ight-point,\f3s\f1tyle,\f3t\f1ext,\f3w\f1eight,\f3x\f1] .TP 12 \f3w\f1rite \f2file-name\f1 .TP 12 \f3!\f1\f2command\f1 .TP 12 \f3?\f1 .RE .sp .SS Options: \f2Options\f1 specify parameters used to construct, edit, and view graphical objects. If a parameter used by a command is not specifed as an \f2option\f1, the default value for the parameter will be used (see \f3s\f1et below). The format of command \f2options\f1 is .PP .RS 5 \f3\-\f1\f2option\|\f1[,\f2option\f1\|] .RE .PP where \f2option\f1 is \f2keyletter\f1[\f2value\f1]. Flags take on the \f2values\f1 of true or false indicated by \f3+\f1 and \f3\-\f1 respectively. If no \f2value\f1 is given with a flag, true is assumed. .s.TH JOIN 1 .SH NAME join \- relational database operator .SH SYNOPSIS .B join [ options ] file1 file2 .SH DESCRIPTION .I Join\^ forms, on the standard output, a join of the two relations specified by the lines of .I file1\^ and .IR file2 . If .I file1\^ is \f3\-\fP, the standard input is used. .PP .I File1\^ and .I file2\^ must be sorted in increasing \s-1ASCII\s+1 collating sequence on the fields on which they are to be joined, normally the first in each line. .PP There is one line in the output for each pair of lines in .I file1\^ and .I file2\^ that have identical join fields. The output line normally consists of the common field, then the rest of the line from .IR file1 , then the rest of the line from .IR file2 . .PP Fields are normally separated by a blank, tab, or new-line. In this case, multiple separators count as one, and leading separators are discarded. .PP These options are recognized: .TP .BI \-a n\^ In addition to the normal output, produce a line for each unpairable line in file .IR n , ) up-to-date, and then create the target file if it has not been modified since its generators were. The descriptor file defines the graph of dependencies. .PP The following is a brief description of all options and some special names: .TP "\w'\f3\-f\fP makefile\ \ 'u" .BI \-f " makefile\^" Description filename. .I Makefile\^ is assumed to be the name of a description file. A filename of .B \- denotes the standard input. The contents of .I makefile\^ override the built-in rules if they are present. .TP .B \-p Print out the complete set of macro definitions and target descriptions. .TP .B \-i Ignore error codes returned by invoked commands. This mode is entered if the fake target name .B \&.\s-1IGNORE\s+1 appears in the description file. .TP .B \-k Abandon work on the current entry, but continue on other branches that do not depend on that entry. .TP .B \-s Silent mode. Do not print command lines before executing. This mode is also entered if the fake target name .B \&.\s-1SILENT\s+1 appears in the description p Object options: .RS 5 .TP 12 \f3a\f1ngle\f2n\f1 Angle of \f2n\f1 degrees. .TP 12 \f3e\f1cho When true, echo additions to the display buffer. .TP 12 \f3f\f1actor\f2n\f1 \f3S\f1cale factor is \f2n\f1 percent. .TP 12 \f3h\f1eight\f2n\f1 Height of \f2text\f1 is \f2n\f1 universe-units (0\^\(<=\^\f2n\f1\^<\^1280). .TP 12 \f3k\f1opy When true, copy rather than move. .TP 12 \f3m\f1id-point When true, mid-point is used to locate text string. .TP 12 \f3p\f1oints When true, operate on points otherwise operate on objects. .TP 12 \f3r\f1ight-point When true, right-point is used to locate \f2text\f1 string. .TP 12 \f3s\f1tyle\f2type\f1 Line style set to one of following \f2types\f1\^: .br \f3so\f1 solid .br \f3da\f1 dashed .br \f3dd\f1 dot-dashed .br \f3do\f1 dotted .br \f3ld\f1 long-dashed .if \ns .bp .TP 12 \f3t\f1ext When false, \f2text\f1 strings are outlined rather than drawn. .TP 12 \f3w\f1eight\f2type\f1 Sets line weight to one of following \f2types\f1\^: .br \f3n\f1 narrow .br \f3m\f1 medium .br \f3b\f1 bwhere .I n\^ is 1 or 2. .TP .BI \-e \ s\^ Replace empty output fields by string .IR s . .TP .BI \-j n\ m\^ Join on the .IR m th field of file .IR n . If .I n\^ is missing, use the .IR m th field in each file. .TP .BI \-o \ list\^ Each output line comprises the fields specified in .IR list , each element of which has the form .IB n . m\^\fR, where .I n\^ is a file number and .I m\^ is a field number. .PP .TP .BI \-t c\^ Use character .I c\^ as a separator (tab character). Every appearance of .I c\^ in a line is significant. .SH "SEE ALSO" awk(1), comm(1), sort(1). .SH BUGS With default field separation, the collating sequence is that of .BR "sort \-b" ; with .BR \-t , the sequence is that of a plain sort. .PP The conventions of .IR join , .IR sort (1), .IR comm (1), .IR uniq (1), and .IR awk (1) are wildly incongruous. .\" @(#)join.1 1.3 file. .TP .B \-r Do not use the built-in rules. .TP .B \-n No execute mode. Print commands, but do not execute them. Even lines beginning with an @ are printed. .TP .B \-b Compatibility mode for old makefiles. .TP .B \-e Environment variables override assignments within makefiles. .TP .B \-m Print a memory map showing text, data, and stack. This option is a no-operation on systems without the \f2getu\^\fP system call. .TP .B \-t Touch the target files (causing them to be up-to-date) rather than issue the usual commands. .TP .B \-d Debug mode. Print out detailed information on files and times examined. .TP .B \-q Question. The \f2make\^\fP command returns a zero or non-zero status code depending on whether the target file is or is not up-to-date. .TP .B \&.\s-1DEFAULT\s+1 If a file must be made but there are no explicit commands or relevant built-in rules, the commands associated with the name .B \&.\s-1DEFAULT\s+1 are used if it exists. .TP .B \&.\s-1PRECIOUS\s+1 Dependents of this target are not removed when* old .RE Area options: .RS 5 .TP 12 \f3h\f1ome Reference the home-window. .TP 12 \f3o\f1ut Reduce magnification. .TP 12 \f3r\f1egion\f2n\f1 Reference region \f2n\f1. .TP 12 \f3u\f1niverse Reference the universe-window. .TP 12 \f3v\f1iew Reference those objects currently in view. .TP 12 \f3x\f1 Indicate the center of the referenced area. .RE .sp .SS "\s-1COMMAND DESCRIPTIONS\s+1" .SS "Construct commands:" .TP 5 \f3A\f1rc and \f3L\f1ines behave similarly. Each consists of a .I "command line\^" followed by .IR points . The first .I point\^ entered is the object-handle. Successive .I points\^ are point-handles. \f3L\f1ines connects the handles in numerical order. \f3A\f1rc fits a curve to the handles (currently a maximum of 3 points are fit with a circular arc; splines will be added in a later version). .TP 5 \f3B\f1ox and \f3C\f1ircle are special cases of \f3L\f1ines and \f3A\f1rc, respectively. \f3B\f1ox generates a rectangle with sides parallel to the universe axes. A diagonal of the rectangle would connect th.TH KILL 1 .SH NAME kill \- terminate a process .SH SYNOPSIS .B kill [ .BR \- signo ] \s-1PID\s+1 ... .SH DESCRIPTION .I Kill\^ sends signal 15 (terminate) to the specified processes. This normally kills processes that do not catch or ignore the signal. The process number of each asynchronous process started with \f3&\fP is reported by the shell (unless more than one process is started in a pipeline, in which case the number of the last process in the pipeline is reported). Process numbers can also be found by using .IR ps (1). .PP The details of the termination process are described in .IR kill (2). For example, if process number 0 is specified, all processes in the process group are signaled. .PP The killed process must belong to the current user unless he is the superuser. .PP If a signal number preceded by \f3\-\fP is given as the first argument, that signal is sent instead of terminate (see .IR signal (2)). In particular, the command \fBkill \-9 .\|.\|.\fR is a sure kill. .SH "SEE ALSO" ps(1), sh(1), k quit or interrupt is hit. .TP .B \&.\s-1SILENT\s+1 Same effect as the \f3\-s\fP option. .TP .B \&.\s-1IGNORE\s+1 Same effect as the \f3\-i\fP option. .PP The \fImake\fR program operates using three sources of information: a user-supplied description file; filenames and "last-modified" times from the file system; built-in rules to bridge some of the gaps. .PP .I Make\^ executes commands in .I makefile\^ to update one or more target .IR names . .I Name\^ is typically a program. If no .B \-f option is present, \f3makefile\fP, \f3Makefile\fP, \f3s.makefile\fP, and \f3s.Makefile\fP are tried in order. If .I makefile\^ is .BR \- , the standard input is taken. More than one .BI \- " makefile" argument pair may appear. .PP .I Make\^ updates a target only if it depends on files that are newer than the target. All prerequisite files of a target are added recursively to the list of targets. Missing files are deemed to be out of date. .PP .I Makefile\^ contains a sequence of entries that specify dependencies. The firste first \f2point\f1 entered with the last \f2point\f1. The first .I point\^ is the object-handle. Point-handles are created at each of the vertices. \f3C\f1ircle generates a circular arc centered about the \f2point\f1 numbered zero and passing through the last \f2point\f1. The circle's object-handle coincides with the last \f2point\f1. A point-handle is generated 180 degrees around the circle from the object-handle. .TP 5 \f3T\f1ext and \f3H\f1ardware generate \f2text\f1 objects. Each consists of a .IR "command line" , .I text\^ and .IR points . .I Text\^ is a sequence of characters delimited by \f3\f1. Multiple lines of text may be entered by preceding a .B cr with a backslash (i.e. \f3\ecr\f1). The \f3T\f1ext command creates software generated characters. Each line of software text is treated as a separate .I text\^ object. The first .I point\^ entered is the object-handle for the first line of text. The \f3H\f1ardware command sends the characters in \f2text\f1 uninterpreted to the terminal. .RE .sp* ill(2), signal(2). .\" @(#)kill.1 1.4  line of an entry is a blank-separated, non-null list of targets, then a .BR : , then a (possibly null) list of prerequisite files or dependencies. Text following a .B ; and all following lines that begin with a tab are shell commands to be executed to update the target. The first line that does not begin with a tab or .B # begins a new dependency or macro definition. Shell commands may be continued across lines with the sequence. Everything printed by make (except the initial tab) is passed directly to the shell as is. Thus, .PP .ss 18 .RS .PD 0 \f3echo a\\\f1 .br \f3b\f1 .RE .ss 12 .PD .PP produces .PP .ss 18 .RS .PD 0 \f3ab\f1 .RE .ss 12 .PD .PP exactly the same as the shell would. .PP Sharp .RB ( # ) and new line surround comments. .PP The following .I makefile\^ says that .B pgm depends on two files .B a.o and .BR b.o , and that they in turn depend on their corresponding source files .RB ( a.c and .BR b.c ) and a common file .BR incl.h : .PP .ss 18 .RS .PD 0 .TP \f3pgm: a.o b.o\f1 \WZ]`.TH LD 1 .SH NAME ld \- link editor for common object files .SH SYNOPSIS .B ld .RB [ \-a ] .RB [ \-e " epsym]" .RB [ \-f " fill] .RB [ \-l x] .RB [ \-m ] .RB [ \-r ] .RB [ \-s ] .RB [ \-o " outfile]" .RB [ \-u "symname]" .RB [ \-L "dir]" .RB [ \-N ] .RB [ \-V ] .RB [ \-VS " num] filenames .SH DESCRIPTION The .I ld command combines several object files into one, performs relocation, resolves external symbols, and supports symbol table information for symbolic debugging. In the simplest case, the names of several object programs are given, and .I ld combines them, producing an object module that can either be executed or used as input for a subsequent .I ld run. The output of .I ld is left in .I a.out . This file is executable if no errors occur during the load. If any input file, .IR filename , is not an object file, .I ld assumes it is either a text file containing link editor directives or an archive library. .PP If any argument is a library, it is searched exactly once at the point it is encountered in th+ f3cc a.o b.o \-o pgm\f1 .TP \f3a.o: incl.h a.c\f1 \f3cc \-c a.c\f1 .TP \f3b.o: incl.h b.c\f1 \f3cc \-c b.c\f1 .PD .RE .ss 12 .PP Command lines are executed one at a time, each by its own shell. The first one or two characters in a command can be the following: \f3\-\fP, @, \f3\-\fP@, or @\f3\-\fP. If @ is present, printing of the command is suppressed. If \f3\-\fP is present, \f2make\^\fP ignores an error. A line is printed when it is executed unless the .B \-s option is present, or the entry .B \&.\s-1SILENT\s+1: is in .IR makefile , or unless the initial character sequence contains a @. The .B \-n option specifies printing without execution; however, if the command line contains the string .BR "$(MAKE)" , the line is always executed (see discussion of the .SM .B MAKEFLAGS macro under .IR Environment ). The .B \-t (touch) option updates the modified date of a file without executing any commands. .PP Commands returning non-zero status normally terminate .IR make . If the .B \-i option is present, or the entry .SS "Edit commands:" .sp Edit commands operate on portions of the display buffer called \f2defined-areas\f1. A defined-area is referenced either with an area \f2option\f1 or interactively. If an area \f2option\f1 is not given, the perimeter of the defined-area is indicated by .I points.\^ If no \f2point\f1 is entered, a small defined-area is built around the location of the \f3\f1. This is useful to reference a single \f2point\f1. If only one \f2point\f1 is entered, the location of the \f3\f1 is taken in conjunction with the \f2point\f1 to indicate a diagonal of a rectangle. A defined-area referenced by \f2points\f1 is outlined with dotted lines. .TP 5 \f3D\f1elete removes all objects whose object-handle lies within a defined-area. The \f3u\f1niverse option removes all objects and erases the screen. .TP 5 \f3E\f1dit modifies the parameters of the objects within a defined-area. Parameters that can be edited are: .br \f3a\f1ngle angle of \f2text\f1 .br \f3h\f1eight height of \f2text\f1 .br \f3se argument list. Only those routines defining an unresolved external reference are loaded. The library (archive) symbol table (see .IR ar (4)) is searched sequentially with as many passes as are necessary to resolve external references that can be satisfied by library members. Thus, the ordering of library members is unimportant. .PP The following options are recognized by .IR ld . Note that there is no white space between the \f3\-u\f1 option and \f2symname\f1 and no white space between the \f3\-L\f1 option and \f2dir\f1. .TP .BR \-a Produce an absolute file; give warnings for undefined references. Relocation information is stripped from the output object file unless the .BR \-r option is given. The .BR \-r option is needed only when an absolute file should retain its relocation information (not the normal case). If neither .BR \-a nor .BR \-r is given, .BR \-a is assumed. .TP .BI \-e " epsym" Set the default entry point address for the output file to be that of the symbol .IR epsym . .TP .BI \-f " \f3.\s-1IGNORE\s+1:\fP appears in .IR makefile , or the initial character sequence of the command contains \f3\-\fP. the error is ignored. If the .B \-k option is present, work is abandoned on the current entry, but continues on other branches that do not depend on that entry. .PP The .B \-b option allows old makefiles (those written for the old version of \f2make\^\fP) to run without errors. The difference between the old version of \f2make\^\fP and this version is that this version requires all dependency lines to have a (possibly null or implicit) command associated with them. The previous version of .I make\^ assumed that if no command was specified explicitly, the command was null. .PP Interrupt and quit cause the target to be deleted unless the target is a dependency of the special name \f3.\s-1PRECIOUS\s+1\fP. .SS Environment The environment is read by \f2make\^\fP. All variables are assumed to be macro definitions and processed as such. The environment variables are processed before any makefile and + \f1tyle style of \f2lines\f1 and \f2arc\f1 .br \f3w\f1eight weight of \f2lines\f1, \f2arc\f1, and \f2text\f1. .br .TP 5 \f3K\f1opy (or \f3M\f1ove) copies (or moves) object- and/or point-handles within a defined-area by the displacement from the \f2pivot\f1 to the \f2destination\f1. .TP 5 \f3R\f1otate rotates objects within a defined-area around the \f2pivot\f1. If the \f3k\f1opy flag is true then the objects are copied rather than moved. .TP 5 \f3S\f1cale For objects whose object-handles are within a defined-area, point displacements from the \f2pivot\f1 are scaled by \f3f\f1actor percent. If the \f3k\f1opy flag is true then the objects are copied rather than moved. .sp .SS "View commands:" .TP 5 \f3c\f1oordinates prints the location of \f2point\f1(s) in universe- and screen-units. .TP 5 \f3e\f1rase clears the screen (but not the display buffer). .TP 5 \f3n\f1ew-display erases the screen then displays the display buffer. .TP 5 \f3o\f1bject-handles (or \f3p\f1oint-handles) labels object- (and/or point-han fill" Set the default fill pattern for ``holes'' within an output section as well as initialized \f3bss\f1 sections. The argument \fIfill\fP is a two-byte constant. .TP .BI \-l "x" Search a library .BI lib x\c .BR .a , where \fIx\fP is up to seven characters. A library is searched when its name is encountered, so the placement of a .BR \-l is significant. By default, libraries are located in \f3/lib\f1. .TP .BR \-m Produce a map or listing of the input/output sections on the standard output. .TP .BI \-o " outfile" Produce an output object file by the name .IR outfile . The name of the default object file is .BR a.out . .TP .BR \-r Retain relocation entries in the output object file. Relocation entries must be saved if the output file is to become an input file in a subsequent \fIld\fP run. Unless .BR \-a is also given, the link editor does not complain about unresolved references. .TP .BR \-s Strip line number entries and symbol table information from the output object file. .TP .BI \-u "symname" Enteafter the internal rules; thus, macro assignments in a makefile override environment variables. The .B \-e option causes the environment to override the macro assignments in a makefile. .PP The \f3\s-1MAKEFLAGS\s+1\fP environment variable is processed by \f2make\^\fP as containing any legal input option (except \f3\-f\fP, \f3\-p\fP, and \f3\-d\fP) defined for the command line. Further, upon invocation, \f2make\^\fP ``invents'' the variable if it is not in the environment, puts the current options into it, and passes it on to invocations of commands. Thus, \f3\s-1MAKEFLAGS\s+1\fP always contains the current input options. This proves very useful for ``super-makes''. In fact, as noted above, when the \f3\-n\fP option is used, the command .B $(\s-1MAKE\s+1) is executed anyway; hence, one can perform a \f3make \-n\fP recursively on a whole software system to see what would have been executed. This is because the \f3\-n\fP is put in \f3\s-1MAKEFLAGS\s+1\fP and passed to further invocations of .BR $(\s-1MAKE\s+1) .dles) that lie within the defined-area with \f3O\f1 (or \f3P\f1). \f3p\f1oint-handles identifies labelled points when the \f3l\f1abelled-points flag is true. .TP 5 \f3v\f1iew moves the window so that the universe point corresponding to the \f2pivot\f1 coincides with the screen point corresponding to the \f2destination\f1. Options for \f3h\f1ome, \f3u\f1niverse, and \f3r\f1egion display particular windows in the universe. .TP 5 .B x indicates the center of a defined-area. Option \f3v\f1iew indicates the center of the screen. .TP 5 \f3z\f1oom decreases (\f3z\f1oom \f3o\f1ut) or increases the magnification of the viewing window based on the defined-area. For increased magnification, the window is set to circumscribe the defined-area. For a decrease in magnification the current window is inscribed within the defined-area. .sp .RE .SS "Other commands:" .TP 5 \f3q\f1uit or \f3Q\f1uit exit from \f2ged\f1. \f3q\f1uit responds with \f3?\f1 if the display buffer has not been written since the last modification. .TP, r \fIsymname\fP as an undefined symbol in the symbol table. This is useful for loading entirely from a library, since initially the symbol table is empty and an unresolved reference is needed to force the loading of the first routine. .TP .BI \-L "dir" Change the algorithm of searching for .BI lib x\c .BR .a to look in .IR dir before looking in \f3/lib\f1 and \f3/usr/lib\f1. This option is effective only if it precedes the .BR \-l " option on the command line." .TP .BR \-N Put the data section immediately following the text in the output file. .TP .B \-V Output a message giving information about the version of \fIld\fP being used. .TP .BI \-VS " num" Use \fInum\fP as a decimal version stamp identifying the .I a.out file that is produced. The version stamp is stored in the optional header. .br .DT .PP The following information about section alignment and MMU requirements should be considered at system installation. .PP The default section alignment action for \fIld\fR on M68000 systems is to align the cod This is one way of debugging all the makefiles for a software project without actually doing anything. .PP .SS Macros Entries of the form .IB string1 " = " string2\^ are macro definitions. .I String2 is defined as all characters up to a comment character or an unescaped newline. Subsequent appearances of .RI $( string1 [: subst1 =[ subst2\^\fP]]) are replaced by .IR string2 . The parentheses are optional if a single-character macro name is used and there is no substitute sequence. The optional .RI : subst1 = subst2\^ is a substitute sequence. If it is specified, all non-overlapping occurrences of \f2subst1\^\fP in the named macro are replaced by \f2subst2\^\fP. Strings (for the purposes of this type of substitution) are delimited by blanks, tabs, new-line characters, and beginnings of lines. An example of the use of the substitute sequence is shown under .IR Libraries . .SS Internal Macros There are five internally maintained macros which are useful for writing rules for building targets. .TP 5 \f3$\(**\fP T 5 \f3r\f1ead inputs the contents of a file. If the file contains a \s-1GPS\s+1 it is read directly. If the file contains text it is converted into \f2text\f1 object(s). The first line of a text file begins at \f2destination\f1. .TP 5 \f3s\f1et when given \f2option\f1(s) resets default parameters; otherwise, it prints current default values. .TP 5 \f3w\f1rite outputs the contents of the display buffer to a file. .TP 5 \f3!\f1 escapes \f2ged\f1 to execute a system command. .TP 5 \f3?\f1 lists \f2ged\f1 commands. .RE .SH "SEE ALSO" gdev(1G), graphics(1G), sh(1), gps(4). .br ``An Introduction to the Graphical Editor'' in the .IR "\*(6) Graphics Guide" . .tr ~~ .\" @(#)ged.1g 1.6 e (\f3.text\f1) and data (\f3.data\f1 and \f3.bss\f1 combined) separately on 512-byte boundaries. Since MMU requirements vary from system to system, this alignment is not always desirable. The version of \fIld\fR for M68000 systems, therefore, provides a mechanism to allow the specification of different section alignments for each system. .PP When all input files have been processed (and if no override is provided), \fIld\fR will search the list of library directories (as with the \fB-l\fR option) for a file named \fBdefault.ld\fR. If this file is found, it is processed as an \fIld\fR instruction file (or \fBifile\fR). The \fBdefault.ld\fR file should specify the required alignment as outlined below. If it does not exist, the default alignment action will be taken. .PP The \fBdefault.ld\fR file should appear as follows, with \fI\fR replaced by the alignment requirement in bytes: .PP .nf SECTIONS { .text : {} GROUP ALIGN() : { .data : {} .bss : {} } } .fi ., he macro \f3$\(**\fP stands for the filename part of the current dependent with the suffix deleted. It is evaluated only for inference rules. .TP f3\$\fP@ The \f3$\fP@ macro stands for the full target name of the current target. It is evaluated only for explicitly named dependencies. .TP \f3$<\fP The \f3$<\fP macro is only evaluated for inference rules or the \f3.\s-1DEFAULT\s+1\fP rule. It is the module which is out of date with respect to the target (i.e., the ``manufactured'' dependent filename). Thus, in the \f3.c.o\fP rule, the \f3$<\fP macro would evaluate to the \f3.c\fP file. An example for making optimized \f3.o\fP files from \f3.c\fP files is: .PP .PD 0 .ss 18 .RS .RS .TP \f3\&.c.o:\f1 .br \f3cc \-c \-O $\(**.c\f1 .RE .RE .PD .TP 5 \& or: .PP .PD 0 .RS .RS .TP \f3\&.c.o:\f1 .br \f3cc \-c \-O $<\f1 .RE .RE .ss 12 .PD .TP 5 \f3$?\fP The \f3$?\fP macro is evaluated when explicit rules from the makefile are evaluated. It is the list of prerequisites that are out of date with respect to the target; essen'\" t .tr ~ .nr f 0 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. .ds M) \fB\s-1MR\s+1\fR .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .TH GET 1 .SH NAME get \- get a version of an \s-1SCCS\s+1 file .SH SYNOPSIS .B get .SP r SID ] .SP c cutoff ] .SP i list ] .SP x list ] .SP a seq-no. ] .SF k .SF e .if n .ul [\-l[p]] .if n .ul 0 .SF p .SF m .SF n .SF s .SF b .SF g .SF t file .B ".\|.\|." .SH DESCRIPTION .I Get\^ generates an \s-1ASCII\s+1 text file from each named \*(S) file according to the specifications given by its keyletter arguments, which begin with \fB\-\fR. The arguments may be specified in any order, but all keyletter arguments apply to all named \*(S) files. If a directory is named, .I get\^ behaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of the path name does not begin with .BR s. ) and unreadable files are silently ignored. If a name of \fB\-\fR is given, the standaPP For example, a \fBdefault.ld\fR file of the following form would provide the same alignment as the default (512-byte boundary): .PP .nf SECTIONS { .text : {} GROUP ALIGN(512) : { .data : {} .bss : {} } } .fi .PP To get alignment on 2K-byte boundaries, the following \fBdefault.ld\fR file would be specified: .PP .nf SECTIONS { .text : {} GROUP ALIGN(2048) : { .data : {} .bss : {} } } .fi .PP For more information about the format of \fIld\fR instruction files or the meaning of the commands, see the ``Common Link Editor Reference Manual.'' .SH FILES .PD 0 /lib .br /usr/lib .TP 25 a.out output file .PD .SH "SEE ALSO" as(1), cc(1), a.out(4), ar(4). .SH WARNINGS Through its options and input directives, the common link editor gives users great flexibility; however, those who use the input directives must assume some added responsibilities. Input directives should insure the following properties for programs: .IP \- 5 C defines a zero pointer as null. A pointer to whihknqtwz- rd input is read; each line of the standard input is taken to be the name of an \*(S) file to be processed. Again, non-\*(S) files and unreadable files are silently ignored. .PP The generated text is normally written into a file called the .I g-file\^ whose name is derived from the \*(S) filename by simply removing the leading .BR s. ; (see also \fI\s-1FILES\s+1\fP\^, below). .PP Each of the keyletter arguments is explained below as though only one \*(S) file is to be processed, but the effects of any keyletter argument apply independently to each named file. .TP "\w'\fB\-a\fIseq-no.\fR~~'u" .BI \-r SID\^ The .IR S "\s-1CCS\s+1 " ID entification string (\*(I)) of the version (delta) of an \*(S) file to be retrieved. Table~1 below shows, for the most useful cases, what version of an \*(S) file is retrieved (as well as the \*(I) of the version to be eventually created by .IR delta (1) if the .B \-e keyletter is also used), as a function of the \*(I) specified. .TP .BI \-c cutoff\^ \fICutoff\fR date-time, in thech zero has been assigned must not point to any object. To satisfy this, users must not place any object at virtual address zero in the data space. .IP \- 5 When the link editor is called through \fIcc\fP(1), a startup routine is linked with the user's program. This routine calls exit ( ) (see \fIexit\fP(2)) after execution of the main program. If the user calls the link editor directly, then the user must insure that the program always calls exit( ) rather than falling through the end of the entry routine. '\" \%W\% .\" @(#)ld.1 1.15 tially, those modules which must be rebuilt. .TP \f3$%\fP The \f3$%\fP macro is only evaluated when the target is an archive library member of the form \f3lib(file.o)\fP. In this case, \f3$\fP@ evaluates to \f3lib\fP and \f3$%\fP evaluates to the library member, \f3file.o\fP. .PP Four of the five macros can have alternative forms. When an upper case \f3D\fP or \f3F\fP is appended to any of the four macros the meaning is changed to ``directory part'' for \f3D\fP and ``file part'' for \f3F\fP. Thus, .BR $( @ D) refers to the directory part of the string \f3$\fP@. If there is no directory part, \&\f3./\fP is generated. The only macro excluded from this alternative form is \f3$?\fP. The reasons for this are debatable. .SS Suffixes Certain names (for instance, those ending with \f3.o\fP) have inferable prerequisites such as \f3.c\fP, \f3.s\fP, etc. If no update commands for such a file appear in .IR makefile , and if an inferable prerequisite exists, that prerequisite is compiled to make the target. In this case,  form: .IP \s-1YY[MM[DD[HH[MM[SS]]]]]\s+1 .IP No changes (deltas) to the \*(S) file which were created after the specified \fIcutoff\fR date-time are included in the generated \s-1ASCII\s+1 text file. Units omitted from the date-time default to their maximum possible values; that is, .B \-c7502 is equivalent to .BR \-c750228235959 . Any number of non-numeric characters may separate the various 2-digit pieces of the \fIcutoff\fR date-time. This feature allows one to specify a \fIcutoff\fR date in the form: \&"\fB\-c77/2/2 9:22:25\fP". Note that this implies that one may use the %\&E% and %\&U% identification keywords (see below) for nested .I gets\^ within, say the input to a .IR send (1C) command: .tr ~~ .IP ~!get "\-c%\&E% %\&U%" s.file .br .tr ~ .TP .B \-e Indicates that the .I get\^ is for the purpose of editing or making a change (delta) to the \*(S) file via a subsequent use of .IR delta (1). The .B \-e keyletter used in a .I get\^ for a particular version (\*(I)) of the \*(S) file prevents further - .TH LEX 1 .SH NAME lex \- generate programs for simple lexical tasks .SH SYNOPSIS .B lex [ .B \-rctvn ] [ file ] ... .SH DESCRIPTION .I Lex\^ generates programs to be used in simple lexical analysis of text. .PP The input .I files\^ (standard input default) contain strings and expressions to be searched for, and C text to be executed when strings are found. .PP A file .B lex.yy.c is generated which, when loaded with the library, copies the input to the output except when a string specified in the file is found; then the corresponding program text is executed. The actual string matched is left in .IR yytext , an external character array. Matching is done in order of the strings in the file. The strings may contain square brackets to indicate character classes, as in .B [abx\-z] to indicate .BR a , " b" , " x" , .BR y ", and " z ; and the operators .BR \(** ", " + ", and " ? mean respectively any non-negative number of, any positive number of, and either zero or one occurrences of, the previous character or cha.I make\^ has inference rules which allow building files from other files by examining the suffixes and determining an appropriate inference rule to use. The current default inference rules are: .PP .RS \&.c \|.c~ \|.sh \|.sh~ \|.c.o \|.c~.o \|.c~.c \|.s.o \|.s~.o \|.y.o \|.y~.o \|.l.o \|.l~.o .br \&.y.c \|.y~.c \|.l.c \|.c.a \|.c~.a \|.s~.a \|.h~.h .RE .PP The internal rules for \f2make\^\fP are contained in the source file \f3rules.c\fP for the \f2make\^\fP program. These rules can be locally modified. To print out the rules compiled into the \f2make\^\fP on any machine in a form suitable for recompilation, the following command is used: .PP .RS \f3make \|\-fp \|\- \|2>/dev/null \| ::= \(or , .br ::= \*(I) \(or \*(I) \- \*(I) .IP \*(I), the \*(S) Identification of a delta, may be in any form shown in the ``\*(I) Specified'' column of Table~1. Partial \*(I)s are interpreted as shown in the ``\*(I) Retrieved'' column of Table~1. .TP .BI \-x list\^ A \fIlist\fR of deltas to be excluded (forced not to be applied) in the creation of the generated file. See the .B \-i keyletter for the \fIlist\fR format. .TP .B \-k Suppresses replacement of identification keywords (see below) in the retrieved text by their value. The .B \-k keyletter is implied by the .B \-e keyletter. .TP .BR \-l [ p ] Causes a delta summary to be written into an .IR l-file . If .B \-lp is used then an .I l-file\^ is not created; the delta summary is written on the standarcharacter; .BI unput( c ) to replace a character read; and .BI output( c ) to place an output character. They are defined in terms of the standard streams, but you can override them. The program generated is named .BR yylex() , and the library contains a .B main() which calls it. The action .SM REJECT on the right side of the rule causes this match to be rejected and the next suitable match executed; the function .B yymore() accumulates additional characters into the same .IR yytext ; and the function .BI yyless( p ) pushes back the portion of the string matched beginning at .IR p , which should be between .I yytext\^ and .IR yytext + yyleng . The macros .I input\^ and .I output\^ use files .B yyin and .B yyout to read from and write to, defaulted to .B stdin and .BR stdout , respectively. .PP Any line beginning with a blank is assumed to contain only C text and is copied; if it precedes .B %% it is copied into the external definition area of the .B lex.yy.c file. All rules should follow a .BR %% , as in YACCThe first example can be done more briefly: .PP .ss 18 .RS .PD 0 .TP \f3pgm: a.o b.o\f1 .br \f3cc a.o b.o \-o pgm\f1 .TP \f3a.o b.o: incl.h\f1 .RE .ss 12 .PD .PP This is because \f2make\^\fP has a set of internal rules for building files. The user may add rules to this list by simply putting them in the \f2makefile\^\fP. .PP Certain macros are used by the default inference rules to permit the inclusion of optional matter in any resulting commands. For example, .SM .BR CFLAGS\*S , .SM .BR LFLAGS\*S , and .SM .B YFLAGS are used for compiler options to .IR cc (1), .IR lex (1), and .IR yacc (1) respectively. The previous method for examining the current rules is recommended. .PP The inference of prerequisites can be controlled. The rule to create a file with suffix .B \&.o from a file with suffix .B \&.c is specified as an entry with \f3.c.o:\fP as the target and no dependents. Shell commands associated with the target define the rule for making a \f3.o\fP file from a \f3.c\fP file. Any target that has no slashes. d output instead. See \fI\s-1FILES\s+1\fP for the format of the .IR l-file . .TP .B \-p Causes the text retrieved from the \*(S) file to be written on the standard output. No .I g-file\^ is created. All output which normally goes to the standard output goes to file descriptor 2 instead, unless the .B \-s keyletter is used, in which case it disappears. .TP .B \-s Suppresses all output normally written on the standard output. However, fatal error messages (which always go to file descriptor 2) remain unaffected. .TP .B \-m Causes each text line retrieved from the \*(S) file to be preceded by the \*(I) of the delta that inserted the text line in the \*(S) file. The format is: \*(I), followed by a horizontal tab, followed by the text line. .TP .B \-n Causes each generated text line to be preceded with the %\&M% identification keyword value (see below). The format is: %\&M% value, followed by a horizontal tab, followed by the text line. When both the .B \-m and .B \-n keyletters are used, the format is: %\&M% valu. Lines preceding .B %% which begin with a non-blank character define the string on the left to be the remainder of the line; it can be called out later by surrounding it with .BR {} . Note that curly brackets do not imply parentheses; only string substitution is done. .SH EXAMPLE .ta +8n +8n +8n +8n .nf \f3D [0\-9]\f1 \f3%%\f1 \f3if printf("\s-1IF\s+1 statement\\n");\f1 \f3[a\-z]+ printf("tag, value %s\\n",yytext);\f1 \f30{D}+ printf("octal number %s\\n",yytext);\f1 \f3{D}+ printf("decimal number %s\\n",yytext);\f1 \f3"++" printf("unary op\\n");\f1 \f3"+" printf("binary op\\n");\f1 \f3"/\(**" { loop:\f1 \f3while (input() != \(fm\(**\(fm);\f1 \f3switch (input())\f1 \f3{\f1 \f3case \(fm/\(fm: break;\f1 \f3case \(fm\(**\(fm: unput(\(fm\(**\(fm);\f1 \f3default: go to loop;\f1 \f3}\f1 \f3}\f1 .fi .PP The external names generated by .I lex\^ all begin with the prefix .BR yy " or " YY . .PP The flags must appear before any files. The flag .B \-r indicates \f2ratfor\f1(1) action in it and starts with a dot is identified as a rule and not a true target. .SS Libraries If a target or dependency name contains parentheses, it is assumed to be an archive library, the string within parentheses referring to a member within the library. Thus \f3lib(file.o)\fP and \f3$(\s-1LIB\s+1)(file.o)\fP both refer to an archive library which contains \f3file.o\fP. (This assumes the .SM .B LIB macro has been previously defined.)\ The expression \f3$(\s-1LIB\s+1)(file1.o file2.o)\fP is not legal. Rules pertaining to archive libraries have the form .BI \&. \s-1XX\s+1 .a , where .SM .I XX\^ is the suffix from which the archive member is to be made. An unfortunate byproduct of the current implementation requires .SM .I XX\^ to be different from the suffix of the archive member. Thus, one cannot have \f3lib(file.o)\fP depend upon \f3file.o\fP explicitly. The most common use of the archive interface follows. Here, we assume the source files are all C type source: .PP .ss 18 .RS .PD 0 .TP \f3lib:\f1 \f3lib(fe, followed by a horizontal tab, followed by the .B \-m keyletter generated format. .TP .B \-g Suppresses the actual retrieval of text from the \*(S) file. It is primarily used to generate an .IR l-file , or to verify the existence of a particular \*(I). .TP .B \-t Used to access the most recently created (``top'') delta in a given release (e.g., .BR \-r1 ), or release and level (e.g., .BR \-r1.2 ). .TP .BI \-a "seq-no." The delta sequence number of the \*(S) file delta (version) to be retrieved (see .I sccsfile\c\^ (5)). This keyletter is used by the .IR comb (1) command; it is not a generally useful keyletter, and users should not use it. If both the .B \-r and .B \-a keyletters are specified, the .B \-a keyletter is used. Care should be taken when using the .B \-a keyletter in conjunction with the .B \-e keyletter, as the \*(I) of the delta to be created may not be what one expects. The .B \-r keyletter can be used with the .B \-a and .B \-e keyletters to control the naming of the \*(I) of the delta to be / s, .B \-c indicates C actions and is the default, .B \-t causes the .B lex.yy.c program to be written instead to standard output, .B \-v provides a one-line summary of statistics of the machine generated, .B \-n causes the .BR \- " summary not to print." Multiple files are treated as a single file. If no files are specified, standard input is used. .PP Certain table sizes for the resulting finite state machine can be set in the definitions section: .RS .TP "@.TP .BI %p " n\^" number of positions is .I n\^ (default 2000) .ns .TP .BI %n " n\^" number of states is .I n\^ (500) .ns .TP .BI %t " n\^" number of parse tree nodes is .I n\^ (1000) .ns .TP .BI %a " n\^" number of transitions is .I n\^ (3000) .RE .PP The use of one or more of the above automatically implies the .B \-v option, unless the .B \-n option is used. .SH SEE ALSO yacc(1). .br ``LEX - Lexical Analyzer Generator'' by M. E. Lesk and E. Schmidt. .br ``Lexical Analyzer Generator (LEX)'' in the .IR "\*(6) Support Tools Guide" . .SH BUGS The \fB\-r\fPile1.o) lib(file2.o) lib(file3.o)\f1 .br \f3@echo lib is now up to date\f1 .TP \f3\&.c.a:\f1 .br \f3$(\s-1CC\s+1) \-c $(\s-1CFLAGS\s+1) $<\f1 .br \f3ar rv $@ $\(**.o\f1 .br \f3rm \-f $\(**.o\f1 .RE .ss 12 .PD .PP In fact, the \f3.c.a\fP rule listed above is built into \f2make\^\fP and is unnecessary in this example. A more interesting, but more limited example of an archive library maintenance construction follows: .PP .ss 18 .RS .PD 0 .TP \f3lib:\f1 \f3lib(file1.o) lib(file2.o) lib(file3.o)\f1 .br \f3$(\s-1CC\s+1) \-c $(\s-1CFLAGS\s+1) $(?:.o=.c)\f1 .br \f3ar rv lib $?\f1 .br \f3rm $?\f1 \f3@echo lib is now up to date\f1 .TP \f3\&.c.a:;\f1 .RE .ss 12 .PD .PP Here the substitution mode of the macro expansions is used. The \f3$?\fP list is defined to be the set of object filenames (inside \f3lib\fP) whose C source files are out of date. The substitution mode translates the \f3.o\fP to \f3.c\fP. (Unfortunately, one cannot as yet transform to \f3.c~\fP; however, this may become possible in the future.)\ Note alcreated. .i0 .PP For each file processed, .I get\^ responds (on the standard output) with the \*(I) being accessed and with the number of lines retrieved from the \*(S) file. If the .B \-e keyletter is used, the \*(I) of the delta to be made appears after the \*(I) accessed and before the number of lines generated. If there is more than one named file or if a directory or standard input is named, each filename is printed (preceded by a new-line) before it is processed. If the .B \-i keyletter is used, included deltas are listed following the notation ``Included''; if the .B \-x keyletter is used, excluded deltas are listed following the notation ``Excluded''. .ne 10v .PP .in 0 .TS center expand ; c s s s s c1 c1 c1 c1 c0 c c c c c l c l l l . TABLE 1. Determination of \s-1SCCS\s+1 Identification String .sp 1.5p = \s-1SID\s+1* \fB\-b\fP Keyletter Other \s-1SID\s+1 \s-1SID\s+1 of Delta Specified Used\(dg Conditions Retrieved to be Created .sp 1.5p = none\(dd no R defaults to mR mR.mL mR.(mL\^+1) _ none\(dd yes  option is not yet fully operational. .\" @(#)lex.1 1.7 / so, the disabling of the \&\f3.c.a:\fP rule, which would have created each object file, one by one. This particular construct speeds up archive library maintenance considerably, but becomes very cumbersome if the archive library contains a mix of assembly programs and C programs. .SH FILES [Mm]akefile and s\f3.\fP[Mm]akefile .SH SEE ALSO sh(1). .br ``Make - A Program for Maintaining Computer Programs'' by S. I. Feldman. .br ``An Augmented Version of Make'' by E. G. Bradford. .br .IR "\*(6) Support Tools Guide" . .SH BUGS Some commands return non-zero status inappropriately; use .B \-i to overcome the difficulty. Commands that are directly executed by the shell, notably .IR cd (1), are ineffectual across new-lines in .IR make . The syntax \f3(lib(file1.o file2.o file3.o)\fP is illegal. You cannot build \f3lib(file.o)\fP from \f3file.o\fP. The macro \f3$(a:.o=.c~)\fP doesn't work. .br .\" @(#)make.1 1.8 R defaults to mR mR.mL mR.mL.(mB\^+1).1 .sp 1.5p = R no R > mR mR.mL R.1*** _ R no R = mR mR.mL mR.(mL\^+1) _ R yes R > mR mR.mL mR.mL.(mB\^+1).1 _ R yes R = mR mR.mL mR.mL.(mB\^+1).1 _ R \- R < mR and hR.mL** hR.mL.(mB\^+1).1 \^ \^ R does \fInot\fP exist \^ \^ _ R \- Trunk succ.# R.mL R.mL.(mB\^+1).1 \^ \^ in release > R \^ \^ \^ \^ and R exists \^ \^ .sp 1.5p = R.L no No trunk succ. R.L R.(L\^+1) _ R.L yes No trunk succ. R.L R.L.(mB\^+1).1 _ R.L \- Trunk succ. R.L R.L.(mB\^+1).1 \^ \^ in release \(>= R \^ \^ .sp 1.5p = R.L.B no No branch succ. R.L.B.mS R.L.B.(mS\^+1) _ R.L.B yes No branch succ. R.L.B.mS R.L.(mB\^+1).1 .sp 1.5p = R.L.B.S no No branch succ. R.L.B.S R.L.B.(S\^+1) _ R.L.B.S yes No branch succ. R.L.B.S R.L.(mB\^+1).1 _ R.L.B.S \- Branch succ. R.L.B.S R.L.(mB\^+1).1 .sp 1.5p = .TE .in \n(INu .PP .PD 0 .TP "\w@***\ \ \ @u" * ``R'', ``L'', ``B'', and ``S'' are the ``release'', ``level'', ``branch'', and ``sequence'' components of the \s-1SID\s+1, respectively; ``m'' means ``maximum''. Thus, for exa.TH LINE 1 .SH NAME line \- read one line .SH SYNOPSIS .B line .SH DESCRIPTION .I Line\^ copies one line (up to a new line) from the standard input and writes it on the standard output. It returns an exit code of 1 on .SM .B EOF and always prints at least a new-line. It is often used within shell files to read from the user's terminal. .SH "SEE ALSO" sh(1), read(2). .\" @(#)line.1 1.3 .TH MAKEKEY 1 .SH NAME makekey \- generate encryption key .SH SYNOPSIS .B /usr/lib/makekey .SH DESCRIPTION .I Makekey\^ improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input, and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second). .PP The first eight input bytes (the .IR "input key" ) can be arbitrary .SM ASCII characters. The last two (the .IR salt ) are best chosen from the set of digits, .BR . , .BR / , and uppercase and lowercase letters. The salt characters are repeated as the first two characters of the output. The remaining 11 output characters are chosen from the same set as the salt and constitute the .IR "output key" . .PP The transformation performed is essentially the following: the salt is used to select one of 4,096 cryptographic machines all based on the Nati0 mple, ``R.mL'' means ``the maximum level number within release R''; ``R.L.(mB+1).1'' means ``the first sequence number on the .I new branch (i.e., maximum branch number plus one) of level L within release R''. Note that if the \s-1SID\s+1 specified is of the form ``R.L'', ``R.L.B'', or ``R.L.B.S'', each of the specified components .I must exist. .TP ** ``hR'' is the highest .I existing release that is lower than the specified, .IR nonexistent , release\ R. .TP *** This is used to force creation of the .I first delta in a .I new release. .TP # Successor. .TP \(dg The .B \-b keyletter is effective only if the .B b flag (see .IR admin\^ (1)) is present in the file. An entry of \fB\-\fR means ``irrelevant''. .TP \(dd This case applies if the .B d (default \s-1SID\s+1) flag is .I not present in the file. If the .B d flag .I is present in the file, then the \s-1SID\s+1 obtained from the .B d flag is interpreted as if it had been specified on the command line. Thus, one of the other cases in this table applies. .PD .TH LINT 1 .SH NAME lint \- a C program checker .SH SYNOPSIS .B lint [ .B \-abhlnpuvx ] file ... .SH DESCRIPTION .I Lint\^ attempts to detect features of the C program .I files\^ which are likely to be bugs, non-portable, or wasteful. It also checks type usage more strictly than the compilers. Among the features currently detected are unreachable statements, loops not entered at the top, automatic variables declared and not used, and logical expressions whose value is constant. Moreover, the usage of functions is checked to find functions which return values in some places and not in others, functions called with varying numbers of arguments, and functions whose values are not used. .PP It is assumed that all the .I files\^ are to be loaded together; they are checked for mutual compatibility. By default, .I lint\^ uses function definitions from the standard lint library .BR llib-lc.ln ; function definitions from the portable lint library .B llib-port.ln are used when .I lint\^ is invoked with the .B \-p optional Bureau of Standards .SM DES algorithm, but broken in 4,096 different ways. Using the .I input key\^ as key, a constant string is fed into the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 .I output key\^ bits in the result. .PP .I Makekey\^ is intended for programs that perform encryption. Usually, the input and output are pipes. .SH SEE ALSO passwd(4). .\" @(#)makekey.1 1.4 0 on. .PP Any number of .I lint\^ options may be used, in any order. The following options are used to suppress certain kinds of complaints: .TP .B \-a Suppress complaints about assignments of long values to variables that are not long. .TP .B \-b Suppress complaints about .B break statements that cannot be reached. (Programs produced by .I lex\^ or .I yacc\^ often result in a large number of such complaints.) .TP .B \-h Do not apply heuristic tests that attempt to intuit bugs, improve style, and reduce waste. .TP .B \-u Suppress complaints about functions and external variables used and not defined, or defined and not used. (This option is suitable for running .I lint\^ on a subset of files of a larger program.) .TP .B \-v Suppress complaints about unused arguments in functions. .TP .B \-x Do not report variables referred to by external declarations but never used. .PP The following arguments alter .I lint\^ behavior: .TP .BI \-l x\^ Include additional lint library .BI llib-l x .ln . You can include a lint ve.tr ~" .if t .ds i \(fm\(fm .if n .ds i "" .TH MAN 1 .SH NAME man, manprog \- print entries in this manual .SH SYNOPSIS .B man [ options ] [ section ] titles .PP .B /usr/lib/manprog file .SH DESCRIPTION .I Man\^ locates and prints the entry of this manual named .I title\^ in the specified .IR section . (For historical reasons, the word ``page'' is often used as a synonym for ``entry'' in this context.)\ The .I title\^ is entered in lower case. The .I section\^ number may not have a letter suffix. If no .I section\^ is specified, the whole manual is searched for .I title\^ and all occurrences of it are printed. .I Options\^ and their meanings are: .PP .PD 0 .TP 11 .B \-t Typeset the entry in the default format size (8.5\*i\(mu11\*i). .sp .TP .B \-s Typeset the entry in the small format size (6\*i\(mu9\*i). .sp .TP .B \-T4014 Display the typeset output on a Tektronix 4014 terminal using .IR tc (1). .sp .TP .B \-Ttek Same as .BR \-T4014 . .sp .TP .B \-Tst Print the typeset output on the .SM MHCC STARE facility;.SH IDENTIFICATION KEYWORDS Identifying information is inserted into the text retrieved from the \*(S) file by replacing .I "identification keywords\^" with their value wherever they occur. The following keywords may be used in the text stored in an \*(S) file: .br .ne 5v .PP .PD 0 .TP "\w'Keyword~~~'u" .I Keyword .I Value .TP .B %\&M% Module name: either the value of the .B m flag in the file (see .IR admin (1)), or if absent, the name of the \*(S) file with the leading .B s. removed. .TP .B %\&I% \*(S) identification (\*(I)) (%\&R%.%\&L%.%\&B%.%\&S%) of the retrieved text. .TP .B %\&R% Release. .TP .B %\&L% Level. .TP .B %\&B% Branch. .TP .B %\&S% Sequence. .TP .B %\&D% Current date (\s-1YY/MM/DD\s+1). .TP .B %\&H% Current date (\s-1MM/DD/YY\s+1). .TP .B %\&T% Current time (\s-1HH:MM:SS\s+1). .TP .B %\&E% Date newest applied delta was created (\s-1YY/MM/DD\s+1). .TP .B %\&G% Date newest applied delta was created (\s-1MM/DD/YY\s+1). .TP .B %\&U% Time newest applied delta was created (\s-1HH:MM:SS\s+1). .TP .rsion of the math library .B llib-lm.ln by inserting .B \-lm on the command line. This argument does not suppress the default use of .BR llib-lc.ln . This option can be used to keep local lint libraries and is useful in the development of multi-file projects. .TP .B \-n Do not check compatibility against either the standard or the portable lint library. .TP .B \-p Attempt to check portability to other dialects (\s-1IBM\s0 and \s-1GCOS\s0) of C. .PP The .BR \-D , .BR \-U , and .B \-I options of .IR cc (1) are also recognized as separate arguments. .PP Certain conventional comments in the C source change the behavior of .IR lint : .RS .TP /\(**\s-1NOTREACHED\s0\(**/ at appropriate points stops comments about unreachable code. .TP .RI /\(**\s-1VARARGS\s+1 n \(**/ suppresses the usual checking for variable numbers of arguments in the following function declaration. The data types of the first .I n\^ arguments are checked; a missing .I n\^ is taken to be 0. .TP /\(**\s-1ARGSUSED\s0\(**/ turns on the .B \-v option 1  this option is not usable on most systems. .sp .TP .B \-Tvp Print the typeset output on a Versatec printer; this option is not available at all sites. .sp .TP .BI \-T term\^ Format the entry using .IR nroff (1) and print it on the standard output (usually, the terminal); .I term\^ is the terminal type (see .IR term (5) and the explanation below); for a list of recognized values of .IR term , type .BR "help term2" . The default value of .I term\^ is .BR 450 . .sp .TP .B \-w Print on the standard output only the pathnames of the entries, relative to .BR /usr/man , or to the current directory for .B \-d option. .sp .TP .B \-d Search the current directory rather than .BR /usr/man ; requires the full filename (e.g., .BR cu.1c , rather than just .BR cu ). .sp .TP .B \-12 Indicates that the manual entry is to be produced in 12-pitch. May be used when .SM .B $TERM (see below) is set to one of .BR 300 , .BR 300s , .BR 450 , and .BR 1620 . The pitch switch on the .SM DASI 300 and 300s terminals must be manually set toB %\&Y% Module type: value of the .B t flag in the \*(S) file (see .IR admin (1)). .TP .B %\&F% \*(S) filename. .TP .B %\&P% Fully qualified \*(S) filename. .TP .B %\&Q% The value of the .B q flag in the file (see .IR admin (1)). .TP .B %\&C% Current line number. This keyword is intended for identifying messages output by the program such as ``this shouldn't have happened'' type errors. It is .I not\^ intended to be used on every line to provide sequence numbers. .TP .B %\&Z% The 4-character string \fB@\&(#)\fR recognizable by .IR what (1). .TP .B %\&W% A shorthand notation for constructing .IR what (1) strings for the \*(5) program files. %\&W%~=~%\&Z%%\&M%%\&I% .TP .B %\&A% Shorthand notation for constructing .IR what (1) strings for non-\*(5) program files. %\&A%~=~%\&Z%%\&Y%~%\&M%~%\&I%%\&Z% .PD .SH FILES Several auxiliary files may be created by .IR get , These files are known generically as the .IR g-file , .IR l-file , .IR p-file , and .IR z-file . The letter before the hyphen is calledfor the next function. .TP /\(**\s-1LINTLIBRARY\s0\(**/ at the beginning of a file shuts off complaints about unused functions in the file. .RE .PP .I Lint\^ produces its first output on a per source file basis. Complaints regarding included files are collected and printed after all source files have been processed. Finally, information gathered from all input files is collected and checked for consistency. At this point, if it is not clear whether a complaint stems from a given source file or from one of its included files, the source filename is printed, followed by a question mark. .PP .SH FILES .PD 0 .TP "\w'/usr/lib/llib-port.ln 'u" /usr/lib/lint[12] programs .TP /usr/lib/llib-lc.ln declarations for standard functions (binary format; source is in .BR /usr/lib/llib-lc ) .TP /usr/lib/llib-port.ln declarations for portable functions (binary format; source is in .BR /usr/lib/llib-port ) .TP /usr/lib/llib-lm.ln declarations for standard math functions (binary format; source is in .BR /usr/lib/llib-lm ) .T .B 12 if this option is used. .sp .TP .B \-c Causes .I man\^ to invoke .IR col (1); note that .IR col (1) is invoked automatically by .I man\^ unless .I term\^ is one of .BR 300 , .BR 300s , .BR 450 , .BR 37 , .BR 4000a , .BR 382 , .BR 4014 , .BR tek , .BR 1620 , and .BR X . .sp .TP .B \-y Causes .I man\^ to use the non-compacted version of the macros. .PD .PP The above .I options\^ other than .BR \-d , .BR \-c , and .B \-y are mutually exclusive, except that the .B \-s option may be used in conjunction with the first 4 .B \-T options above. Any other .I options\^ are passed to .IR troff (1), .IR nroff (1), or the .IR man (5) macro package. .PP When using .IR nroff (1), .I man\^ examines the environment variable .SM .B $TERM (see .IR environ (5)) and attempts to select options to .IR nroff (1), as well as filters, that adapt the output to the terminal being used. The .BI \-T term\^ option overrides the value of .SM .BR $TERM\*S ; in particular, one should use .B \-Tlp when sending the output of .I man\^ to a1  the tag. An auxiliary filename is formed from the \*(S) filename: the last component of all \*(S) filenames must be of the form \fBs.\fP\fImodule-name\fP; the auxiliary files are named by replacing the leading \fBs\fR with the tag. The .I g-file\^ is an exception to this scheme: the .I g-file\^ is named by removing the .B s. prefix. For example, for file .BR s.xyz.c , the auxiliary filenames would be .BR xyz.c , .BR l.xyz.c , .BR p.xyz.c , and .BR z.xyz.c , respectively. .PP The .IR g-file , which contains the generated text, is created in the current directory (unless the .B \-p keyletter is used). A .I g-file\^ is created in all cases, whether or not any lines of text were generated by the .IR get . It is owned by the real user. If the .B \-k keyletter is used or implied its mode is 644; otherwise its mode is 444. Only the real user need have write permission in the current directory. .PP The .I l-file\^ contains a table showing which deltas were applied in generating the retrieved text. The .I l-file\^ isP /usr/tmp/\(**lint\(** temporaries .PD .SH SEE ALSO cc(1). .br ``A C Program Checker - \f2lint\f1'' in the .IR "\*(6) Programming Guide" . .SH BUGS .IR Exit (2) and other functions which do not return are not understood; this causes various inaccuracies. .\" @(#)lint.1 1.6  line printer. .PP .I Section\^ may be changed before each .IR title . .PP As an example: .IP man \|man .PP would reproduce on the terminal this entry, as well as any other entries named .I man\^ that may exist in other sections of the manual, e.g., .IR man (5). .PP If the first line of the input for an entry consists solely of the string: .IP .BI \&\(fm\^\e~\| " x" .PP where .I x\^ is any combination of the three characters .BR c , .BR e , and .BR t , and where there is exactly one blank between the double quote .RB ( ~ ) and .IR x , then .I man\^ preprocesses its input through the appropriate combination of .IR cw (1), .IR eqn (1) (\fIneqn\fP for \fInroff\fP(1)) and .IR tbl (1), respectively; when invoked, .IR eqn (1) or .I neqn automatically read the file .B /usr/pub/eqnchar (see .IR eqnchar (5)). .PP The .I man\^ command executes .IR "manprog\^" , which takes a filename as its argument. .I Manprog\^ calculates and returns a string of three register definitions used by the formatters identifying the date  created in the current directory if the .B \-l keyletter is used; its mode is 444 and it is owned by the real user. Only the real user need have write permission in the current directory. .PP Lines in the .I l-file\^ have the following format: .PP .PD 0 .RS .nr a 0 1 .af a a .TP \n+a. A blank character if the delta was applied; .br \fB\(**\fR otherwise. .TP \n+a. A blank character if the delta was applied or wasn't applied and ignored; .br \fB\(**\fR if the delta wasn't applied and wasn't ignored. .TP \n+a. A code indicating a ``special'' reason why the delta was or was not applied: .RS 10 .BR "I" ": Included." .br .BR "X" ": Excluded." .br .BR "C" ": Cut off (by a" .B \-c keyletter). .RE .TP \n+a. Blank. .TP \n+a. \*(S) identification (\*(I)). .TP \n+a. Tab character. .TP \n+a. Date and time (in the form \s-1YY/MM/DD~HH:MM:SS\s+1) of creation. .TP \n+a. Blank. .TP \n+a. Login name of person who created \fIdelta\fP. .PD .RE .IP The comments and \*(M) data follow on subsequent lines, indented one horizonta2 .if '\*p'' \{\ .ds N 3B20S .ds p .ds P .ds l libc.a\} .if !'\*p'' \{\ .TH \*PLIST 1L \*N \} .if '\*p''\{\ .TH \*PLIST 1 "\*N only" \} .SH NAME \*plist \- produce C source listing from \*N object file .SH SYNOPSIS .B \*plist .B [ \-V ] .RB [ \-h ] source-file .B . \|. \|. [object-file] .SH DESCRIPTION The .I \*Plist command produces a C source listing with line number information attached. If multiple C source files were used to create the object file, .I \*plist will accept multiple file names. The object file is taken to be the last non-C source file argument. If no object file is specified the default object file, .B \*pa.out\c \&, will be used. .PP Line numbers will be printed for each breakpoint inserted by the compiler (generally, each executable C statement that begins a new line of source). Line numbering begins anew for each function. Line number 1 is always the line containing the left curly brace .RB (\| { \|) that begins the function body. Line numbers will also be supplied for inner block redecthe file was last modified. The returned string has the form: .PP .RS .BI \-rd day .BI \-rm month .BI \-ry year .RE .PP and is passed to .IR "nroff\^" (1), which sets this string as variables for the .I man\^ macro package. Months are given from 0 to 11, therefore month is always 1 less than the actual month. The .I man\^ macros calculate the correct month. If the .I man\^ macro package is invoked as an option to .IR nroff / troff (i.e., .IR "nroff \-man file" ), then the current day/month/year is used as the printed date. .SH FILES .PD 0 .TP \w'/usr/man/u_man/man[1-6]/\(**\ \ \ \ 'u /usr/man/u_man/man[1-6]/\(** the \*(6) User's Manual\fP .TP /usr/man/a_man/man[178]/\(** the \*(5) Administator's Manual\fP .TP /usr/man/local/man[1-8]/\(** local additions .TP /usr/lib/manprog calculates modification dates of entries .PD .SH SEE ALSO cw(1), eqn(1), nroff(1), tbl(1), tc(1), troff(1), environ(5), man(5), term(5). .SH BUGS All entries are supposed to be reproducible either on a typesetter or on a terminal. However,\fPDd\f3:\fP S \f3:\fPDy\f3:\fP T{ Year Delta created T} " nn S \f3:\fPDm\f3:\fP T{ Month Delta created T} " nn S \f3:\fPDd\f3:\fP T{ Day Delta created T} " nn S \f3:\fPT\f3:\fP T{ Time Delta created T} " \f3:\fPTh\f3:\fP\f3:\fP:Tm\f3:\fP\f3:\fP:Ts\f3:\fP S \f3:\fPTh\f3:\fP T{ Hour Delta created T} " nn S \f3:\fPTm\f3:\fP T{ Minutes Delta created T} " nn S \f3:\fPTs\f3:\fP T{ Seconds Delta created T} " nn S \f3:\fPP\f3:\fP T{ .nf Programmer who created Delta .fi T} " logname S \f3:\fPDS\f3:\fP T{ Delta seq. # T} " nnnn S \f3:\fPDP\f3:\fP T{ .nf Predecessor Delta seq. # .fi T} " nnnn S \f3:\fPDI\f3:\fP T{ Seq. # of deltas incl., excl., ignored T} " \f3:\fPDn\f3:\fP/\f3:\fPDx\f3:\fP/\f3:\fPDg\f3:\fP S \f3:\fPDn\f3:\fP T{ .nf Deltas included (seq. #) .fi T} " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPDx\f3:\fP T{ .nf Deltas excluded (seq. #) .fi T} " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPDg\f3:\fP T{ .nf Deltas ignored (seq. #) .fi T} " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\.TH PASTE 1 .SH NAME paste \- merge same lines of several files or subsequent lines of one file .SH SYNOPSIS \f3paste \fPfile1 file2 .\|.\|. .br \f3paste \-d\fP\|list file1 file2 .\|.\|. .br \f3paste \-s [\-d\fP\|list\|\f3] \fPfile1 file2 .\|.\|. .SH DESCRIPTION In the first two forms, .I paste\^ concatenates corresponding lines of the given input files .IR file1 , .IR file2 , etc. It treats each file as a column or columns of a table and pastes them together horizontally (parallel merging). .I Paste is the counterpart of .IR cat (1) which concatenates vertically, i.e., one file after the other. In the last form above, .I paste\^ subsumes the function of an older command with the same name by combining subsequent lines of the input file (serial merging). In all cases, lines are glued together with the .I tab\^ character, or with characters from an optionally specified .IR list . Output is to the standard output, so it can be used as the start of a pipe, or as a filter, if \f3\-\fP is used in place of a filena2  on a terminal some information is necessarily lost. .PP If pages bearing the same name appear in both manuals, the .I "\*(6) Administrator's Manual" entry is printed first, unless a \fIsection\fP argument is supplied. .tr ~~ .\" @(#)man.1 1.4 ^.\^.\fP S \f3:\fPMR\f3:\fP MR numbers for delta " text M \f3:\fPC\f3:\fP Comments for delta " text M \f3:\fPUN\f3:\fP User names User Names text M \f3:\fPFL\f3:\fP Flag list Flags text M \f3:\fPY\f3:\fP Module type flag " text S \f3:\fPMF\f3:\fP T{ MR validation flag T} " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPMP\f3:\fP T{ .nf MR validation pgm name .fi T} " text S \f3:\fPKF\f3:\fP T{ .nf Keyword error/ warning flag .fi T} " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPBF\f3:\fP Branch flag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPJ\f3:\fP Joint edit flag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPLK\f3:\fP Locked releases " \f3:\fPR\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPQ\f3:\fP User defined keyword " text S \f3:\fPM\f3:\fP Module name " text S \f3:\fPFB\f3:\fP Floor boundary " \f3:\fPR\f3:\fP S \f3:\fPCB\f3:\fP Ceiling boundary " \f3:\fPR\f3:\fP S \f3:\fPDs\f3:\fP Default SID " \f3:\fPI\f3:\fP S \f3:\fPND\f3:\fP Null delta flag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPFD\f3:\fP T{ File descriptive text T} Comments text M \f3:\fPBD\f3:\fP Bome. .PP The meanings of the options are: .TP .B "\-d" Replace the .I tab\^ character by one or more alternate characters specified in .IR list . Without this option, the new-line characters of each but the last file (or last line in case of the .B \-s option) are replaced by a .I tab\^ character. .TP .I "list\^" One or more characters immediately following .B \-d replace the default .I tab\^ as the line concatenation character. The list is used circularly; i.e., when exhausted, it is reused. In parallel merging (i.e., no .B \-s option), the lines from the last file are always terminated with a new-line character, not from the .IR list . The list may contain the special escape sequences: .B \e\|n (new line), .B \e\|t (tab), .B \e\e (backslash), and .B \e\|0 (empty string, not a null character). Quoting may be necessary if characters have special meaning to the shell (e.g., to get one backslash, use .B \-d\|``\e\e\e\e'' ). .TP .B "\-s" Merge subsequent lines rather than one from each input file. Use .I tab\^ fo.\" @(#)manprog.1 1.2 .so /usr/man/u_man/man1/man.1 3 dy Body text M \f3:\fPGB\f3:\fP Gotten body " text M \f3:\fPW\f3:\fP T{ A form of \f2what\^\fP(1) string T} N/A \f3:\fPZ\f3:\fP\f3:\fPM\f3:\fP\e\|t\f3:\fPI\f3:\fP S \f3:\fPA\f3:\fP T{ A form of \f2what\^\fP(1) string T} N/A \f3:\fPZ\f3:\fP\f3:\fPY\f3:\fP~\f3:\fPM\f3:\fP~\f3:\fPI\f3:\fP\f3:\fPZ\f3:\fP S \f3:\fPZ\f3:\fP T{ \f2what\^\fP(1) string delimiter T} N/A @\&(#) S \f3:\fPF\f3:\fP SCCS filename N/A text S \f3:\fPPN\f3:\fP SCCS file pathname N/A text S .TE .sp .5v * \f3:\fPDt\f3:\fP~=~\f3:\fPDT\f3:\fP~\f3:\fPI\f3:\fP~\f3:\fPD\f3:\fP~\f3:\fPT\f3:\fP~\f3:\fPP\f3:\fP~\f3:\fPDS\f3:\fP~\f3:\fPDP\f3:\fP .DE .if t .ps +1 .if t .vs +1p .SH EXAMPLES The command .IP \f3prs \-d``Users and/or user \s-1ID\s+1s for :F: are:\e\|n:\s-1UN\s+1:'' s.file .PP may produce on the standard output: .PP .RS .nf \f3Users and/or user \s-1ID\s+1s for s.file are:\f1 \f3xyz\f1 \f3131\f1 \f3abc\f1 .fi .RE .PP The command .IP \f3prs \-d``Newest delta for pgm :M:: :I: Created :D: By :P:'' \-r s.file\f1 .PP may produce on the standard outpr concatenation, unless a .I list\^ is specified with the .B \-d option. Regardless of the .IR list , the last character of the file is forced to be a new line. .TP .B "\-" May be used in place of any filename, to read a line from the standard input. (There is no prompting). .SH EXAMPLES .TP 15m \f3ls \|\(bv\| paste \|\-d``\|'' \|\-\f1 list directory in one column .TP \f3ls \|\(bv\| paste \|\- \|\- \|\- \|\-\f1 list directory in four columns .TP \f3paste \|\-s \|\-d``\e\|t\e\|n'' \|file\f1 combine pairs of lines into lines .SH "SEE ALSO" grep(1), cut(1), .br pr(1): .BR "pr \-t \-m" .\|.\|. works similarly, but creates extra blanks, tabs and new lines for a nice page layout. .SH DIAGNOSTICS .TP 17 .B "line too long\^" Output lines are restricted to 511 characters. .TP 17 .B "too many files\^" Except for the .B \-s option, no more than 12 input files may be specified. .\" @(#)paste.1 1.6 .TH MESG 1 .SH NAME mesg \- permit or deny messages .SH SYNOPSIS .B mesg [ .B n ] [ .B y ] .SH DESCRIPTION .I Mesg\^ with argument .B n forbids messages via .IR write (1) by revoking non-user write permission on the user's terminal. .I Mesg\^ with argument .B y reinstates permission. All by itself, .I mesg\^ reports the current state without changing it. .SH FILES /dev/tty\(** .SH SEE ALSO write(1). .SH DIAGNOSTICS Exit status is 0 if messages are receivable, 1 if not, 2 on error. .\" @(#)mesg.1 1.2 ut: .IP \f3Newest delta for pgm main.c: 3.7 Created 77/12/1 By cas\f1 .PP As a \f2special case:\^\fP .IP \f3prs s.file\f1 .PP may produce on the standard output: .PP .RS .nf \f3D 1.1 77/12/1 00:00:00 cas 1 000000/00000/00000\f1 \f3\s-1MR\s+1s:\f1 \f3bl78-12345\f1 \f3bl79-54321\f1 \f3\s-1COMMENTS\s+1:\f1 \f2this is the comment line for s.file initial delta\f1 .fi .RE .PP for each delta table entry of the ``D'' type. Only the .B \-a keyletter argument can be used with the .IR "special case" . .PP .SH FILES .RE .TP 10 /tmp/pr????? .i0 .SH "SEE ALSO" admin(1), delta(1), get(1), help(1), rmdel(1), sccsfile(4). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .tr ~~ .\" @(#)prs.1 1.12 3 .\" @(#)pcat.1 1.2 .so /usr/man/u_man/man1/pack.1 .TH MKDIR 1 .SH NAME mkdir \- make a directory .SH SYNOPSIS .B mkdir dirname ... .SH DESCRIPTION .I Mkdir\^ creates specified directories in mode 777 (possibly altered by .IR umask (1)). Standard entries, .BR . , for the directory itself, and .BR .. , for its parent, are made automatically. .PP .I Mkdir\^ requires write permission in the parent directory. .SH "SEE ALSO" sh(1), rm(1), umask(1). .SH DIAGNOSTICS .I Mkdir\^ returns exit code 0 if all directories were successfully made; otherwise, it prints a diagnostic and returns non-zero. .\" @(#)mkdir.1 1.2 .TH PS 1 .SH NAME ps \- report process status .SH SYNOPSIS .B ps [ options ] .SH DESCRIPTION .I Ps\^ prints information about active processes. Without .IR options , information is printed about processes associated with the current terminal. Otherwise, the displayed information is controlled by the following .IR options : .PP .PD 0 .TP 15 .B \-e Print information about all processes. .TP .B \-d Print information about all processes, except process group leaders. .TP .B \-a Print information about all processes, except process group leaders and processes not associated with a terminal. .TP .B \-f Generate a .I full\^ listing. Normally, a short listing containing only process .SM ID\*S, terminal (``tty'') identifier, cumulative execution time, and the command name is printed. See below for meaning of columns in a full listing. .TP .B \-l Generate a .I long\^ listing. See below. .TP .BI \-c " corefile\^" Use the file .I corefile\^ in place of .BR /dev/mem . .TP .BI \-s " swapdev\^" Use the file .I swapdev\^ in.\" @(#)pcc.1 1.2 .so /usr/man/u_man/man1/cc.1 4 .TH MM 1 .SH NAME mm, osdd, checkmm \- print/check documents formatted with the \s-1MM\s+1 macros .SH SYNOPSIS .B mm [ options ] [ files ] .PP .B osdd [ options ] [ files ] .PP .B checkmm [ files ] .SH DESCRIPTION .I Mm\^ can be used to type out documents using .IR nroff (1) and the .SM MM text-formatting macro package. It has options to specify preprocessing by .IR tbl (1) and/or .I neqn (see .IR eqn (1)) and postprocessing by various terminal-oriented output filters. The proper pipelines and the required arguments and flags for .IR nroff (1) and .SM MM are generated, depending on the options selected. .PP .I Osdd is equivalent to the command .BR "mm \-mosd" . For more information about the .SM OSDD adapter macro package, see .IR mosd (5). .PP .I Options\^ for .I mm\^ are given below. Any other arguments or flags (e.g., .BR \-rC3 ) are passed to .IR nroff (1) or to .SM MM\*S, as appropriate. Such options can occur in any order, but they must appear before the .I files\^ arguments. If no arguments are given,  place of .BR /dev/swap . This is useful when examining a .IR corefile ; a .I swapdev\^ of .B /dev/null\^ causes the user block to be zeroed out. .TP .BI \-n " namelist\^" The argument is taken as the name of an alternate .I namelist\^ .RB ( /unix is the default). .TP .BI \-t " tlist\^" Restrict listing to data about the processes associated with the terminals given in .IR tlist , where .I tlist\^ can be in one of two forms: a list of terminal identifiers separated by commas, or a list of terminal identifiers enclosed in double quotes and separated by a comma and/or one or more spaces. .TP .BI \-p " plist\^" Restrict listing to data about processes whose process .SM ID numbers are given in .IR plist , where .I plist\^ is in the same format as .IR tlist . .TP .BI \-u " ulist\^" Restrict listing to data about processes whose user .SM ID numbers or login names are given in .IR ulist , where .I ulist\^ is in the same format as .IR tlist . In the listing, the numerical user .SM ID is printed unless the .B \-f opt2630-*'$!  .I mm\^ prints a list of its options. .PP .PD 0 .TP 9 .BI \-T term Specifies the type of output terminal; for a list of recognized values for .IR term , type .BR "help term2" . If this option is .I not\^ used, .I mm\^ uses the value of the shell variable .SM .B $TERM from the environment (see .IR profile (4) and .IR environ (5)) as the value of .IR term , if .SM .B $TERM is set; otherwise, .I mm\^ uses .B 450 as the value of .IR term . If several terminal types are specified, the last one takes precedence. .TP .B \-12 Indicates that the document is to be produced in 12-pitch. May be used when .SM .B $TERM is set to one of .BR 300 , .BR 300s , .BR 450 , and .BR 1620 . (The pitch switch on the .SM DASI 300 and 300s terminals must be manually set to .B 12 if this option is used.) .TP .B \-c Causes .I mm\^ to invoke .IR col (1); note that .IR col (1) is invoked automatically by .I mm\^ unless .I term\^ is one of .BR 300 , .BR 300s , .BR 450 , .BR 37 , .BR 4000a , .BR 382 , .BR 4014 , .BR tek , .BR 1620 , and .BR 4 ion is used, in which case the login name is printed. .TP .BI \-g " glist\^" Restrict listing to data about processes whose process groups are given in .IR glist , where .I glist\^ is a list of process group leaders and is in the same format as .IR tlist . .PD .PP The column headings and the meaning of the columns in a .I ps\^ listing are given below; the letters .B f and .B l indicate the option .RI ( full\^ or .IR long ) that causes the corresponding heading to appear; .B all means that the heading always appears. Note that these two options only determine what information is provided for a process; they do .I not\^ determine which processes are to be listed. .ta .65i .ne 7 .PP .PD 0 .TP 16 .SM .BR F\*S " (l)" Flags (octal and additive) associated with the process: .RS 20 .TP 6 01 in core .TP 6 02 system process .TP 6 04 locked in core (e.g., for physical .SM I/O\*S) .TP 6 10 being swapped .TP 6 20 being traced by another process .TP 6 40 another tracing flag .RE .TP .SM .BR S\*S " (l)" The state of the pro.TH PR 1 .SH NAME pr \- print files .SH SYNOPSIS .B pr [ options ] [ files ] .SH DESCRIPTION .I Pr\^ prints the named files on the standard output. If .I file\^ is .BR \- , or if no files are specified, the standard input is assumed. By default, the listing is separated into pages, each headed by the page number, a date and time, and the name of the file. .PP By default, columns are of equal width, separated by at least one space; lines which do not fit are truncated. If the .B \-s option is used, lines are not truncated and columns are separated by the separation character. .PP If the standard output is associated with a terminal, error messages are withheld until .I pr\^ has completed printing. .PP The \fIoptions\fP below may appear singly or be combined in any order: .TP .BI + k\^ Begin printing with page .I k\^ (default is 1). .TP .BI \- k\^ Produce .IR k -column output (default is 1). The options .B \-e and .B \-i are assumed for multi-column output. .TP .B \-a Print multi-column output across the page. X . .TP .B \-e Causes .I mm\^ to invoke .IR neqn ; also causes .I neqn to read the .B /usr/pub/eqnchar file (see .IR eqnchar (5)). .TP .B \-t Causes .I mm\^ to invoke .IR tbl (1). .TP .B \-E Invokes the .B \-e option of .IR nroff (1). .TP .B \-y Causes .I mm\^ to use the non-compacted version of the macros (see .IR mm (5)). .PD .PP As an example (assuming that the shell variable .SM .B $TERM is set in the environment to .BR 450 ), the two command lines below are equivalent: .RS .PP .B "mm \|\-t \|\-rC3 \|\-12 \|ghh\(**" .br .B "tbl \|ghh\(** \|\(bv \|nroff \|\-cm \|\-T450\-12 \|\-h \|\-rC3" .RE .PP .I Mm\^ reads the standard input when .B \- is specified instead of any filenames. (Mentioning other files together with .B \- leads to disaster.)\ This option allows .I mm\^ to be used as a filter, e.g.: .RS .PP .B "cat \|dws \|\(bv \|mm \|\-" .RE .PP .I Checkmm\^ is a program for checking the contents of the named .I files\^ for errors in the use of the Memorandum Macros, missing or unbalanced .I neqn delimiterscess: .RS 20 .TP 6 0 non-existent .TP 6 S sleeping .TP 6 W waiting .TP 6 R running .TP 6 I intermediate .TP 6 Z terminated .TP 6 T stopped .TP 6 X growing .RE .br .ne 2 .TP .SM .BR UID\*S " (f,l)" The user .SM ID number of the process owner; the login name is printed under the .B \-f option. .TP .SM .BR PID\*S " (all)" The process .SM ID of the process; it is possible to kill a process if you know the \fBPID\fR. .TP .SM .BR PPID\*S " (f,l)" The process .SM ID of the parent process. .TP .SM .BR C\*S " (f,l)" Processor utilization for scheduling. .TP .SM .BR STIME\*S " (f)" Starting time of the process. .TP .SM .BR PRI\*S " (l)" The priority of the process; higher numbers mean lower priority. .TP .SM .BR NI\*S " (l)" Nice value; used in priority computation. .TP .SM .BR ADDR\*S " (l)" The memory address of the process (a pointer to the segment table array on the 3B20S), if resident; otherwise, the disk address. .TP .SM .BR SZ\*S " (l)" The size in blocks of the core image of the process. .TP .SM .BR WCHAN\*S " 5 .TP .B \-m Merge and print all files simultaneously, one per column (overrides the \f3\-\fP\fIk\fP, and .B \-a options). .TP .B \-d Double-space the output. .TP .BI \-e ck\^ Expand .I input\^ tabs to character positions .IR k "+1, 2\(**" k "+1, 3\(**" k +1, etc. If .I k\^ is 0 or is omitted, default tab settings at every eighth position are assumed. Tab characters in the input are expanded into the appropriate number of spaces. If .I c\^ (any non-digit character) is given, it is treated as the input tab character (default for .I c\^ is the tab character). .TP .BI \-i ck\^ In .IR output , replace white space wherever possible by inserting tabs to character positions .IR k "+1, 2\(**" k "+1, 3\(**" k +1, etc. If .I k\^ is 0 or is omitted, default tab settings at every eighth position are assumed. If .I c\^ (any non-digit character) is given, it is treated as the output tab character (default for .I c\^ is the tab character). .TP .BI \-n ck\^ Provide .IR k -digit line numbering (default for .I k\^ is 5). The num, and .BR \&.EQ / .EN pairs. Note: The user need not use the .I checkeq\^ program (see .IR eqn (1)). Appropriate messages are produced. The program skips all directories, and if no filename is given, standard input is read. .SH HINTS .PD 0 .TP 1. .I Mm\^ invokes .IR nroff (1) with the .B \-h flag. With this flag, .IR nroff (1) assumes that the terminal has tabs set every 8 character positions. .TP 2. Use the .BI \-o list\^ option of .IR nroff (1) to specify ranges of pages to be output. Note, however, that .IR mm , if invoked with one or more of the .BR \-e , .BR \-t , and .B \- options, .I together\^ with the .BI \-o list\^ option of .IR nroff (1) may cause a harmless ``broken pipe'' diagnostic if the last page of the document is not specified in .IR list . .TP 3. If you use the .B \-s option of .IR nroff (1) (to stop between pages of output), use line-feed (rather than return or new-line) to restart the output. The .B \-s option of .IR nroff (1) does not work with the .B \-c option of .IR mm , or if .I mm\^(l)" The event for which the process is waiting or sleeping; if blank, the process is running. .TP .SM .BR TTY\*S " (all)" The controlling terminal for the process. .TP .SM .BR TIME\*S " (all)" The cumulative execution time for the process. .TP .SM .BR CMD\*S " (all)" The command name; the full command name and its arguments are printed under the .B \-f option. .DT .PD .PP A process that has exited and has a parent, but has not yet been waited for by the parent, is marked .BR . .PP Under the .B \-f option, .I ps\^ tries to determine the command name and arguments given when the process was created by examining memory or the swap area. Failing this, the command name, as it would appear without the .B \-f option, is printed in square brackets. .SH FILES .PD 0 .TP "\w'/etc/ps_data\ \ \ 'u" /unix system namelist. .TP /dev/mem memory. .TP /dev/swap the default swap device. .TP /etc/passwd supplies \s-1UID\s+1 information. .TP /etc/ps_data internal data structure. .TP /dev searched to find terminal (``ttber occupies the first .IR k +1 character positions of each column of normal output or each line of .B \-m output. If .I c\^ (any non-digit character) is given, it is appended to the line number to separate it from whatever follows (default for .I c\^ is a tab). .TP .BI \-w k\^ Set the width of a line to .I k\^ character positions (default is 72 for equal-width multi-column output, no limit otherwise). .TP .BI \-o k\^ Offset each line by .I k\^ character positions (default is 0). The number of character positions per line is the sum of the width and offset. .TP .BI \-l k\^ Set the length of a page to .I k\^ lines (default is 66). .TP .B \-h Use the next argument as the header to be printed instead of the filename. .TP .B \-p Pause before beginning each page if the output is directed to a terminal .RI ( pr\^ will ring the bell at the terminal and wait for a carriage return). .TP .B \-f Use form-feed character for new pages (default is to use a sequence of line feeds). Pause before beginning the first page if t5  automatically invokes .IR col (1) (see .B \-c option above). .TP 4. If you lie to .I mm\^ about the kind of terminal its output is to be printed on, you get (often subtle) garbage; however, if you are redirecting output into a file, use the .B \-T37 option, and then use the appropriate terminal filter when you actually print that file. .PD .br .ne 4 .SH SEE ALSO col(1), cw(1), env(1), eqn(1), greek(1), mmt(1), nroff(1), tbl(1), profile(4), mm(5), mosd(5), term(5). .br .IR "\*(6) Document Processing Guide" . .SH DIAGNOSTICS .tr ~~ .PD 0 .TP 9 .I mm\^ .B "mm: no input file" means none of the arguments is a readable file and .I mm\^ is not used as a filter. .TP .I checkmm\^ .B "Cannot open" .I "filename" means \fIfile\fR is unreadable. The remaining output of the program is diagnostic of the source file. .PD .\" @(#)mm.1 1.5 y'') names. .DT .PD .SH SEE ALSO kill(1), nice(1). .SH BUGS Things can change while .I ps\^ is running; the picture it gives is only a close approximation to reality. Some data printed for defunct processes are irrelevant. .\" @(#)ps.1 1.4 he standard output is associated with a terminal. .TP .B \-r Print no diagnostic reports on failure to open files. .TP .B \-t Print neither the 5-line identifying header nor the 5-line trailer normally supplied for each page. Quit printing after the last line of each file without spacing to the end of the page. .TP .BI \-s c\^ Separate columns by the single character .I c\^ instead of by the appropriate number of spaces (default for .I c\^ is a tab). .SH EXAMPLES Print .B file1 and .B file2 as a double-spaced, three-column listing headed by ``file list'': .PP .RS .B "pr \|\-3dh \|"file \|list" \|file1 \|file2" .RE .PP Write .B file1 on .BR file2 , expanding tabs to columns 10, 19, 28, 37, .\|.\|. : .PP .RS .B "pr \|\-e9 \|\-t \|file2" .RE .SH FILES /dev/tty\(** to suspend messages .SH SEE ALSO cat(1). .\" @(#)pr.1 1.5 .TH MMT 1 .SH NAME mmt, mvt \- typeset documents, viewgraphs, and slides .SH SYNOPSIS .B mmt [ options ] [ files ] .PP .B mvt [ options ] [ files ] .SH DESCRIPTION These two commands are very similar to .IR mm (1), except that they both typeset their input via .IR troff (1), as opposed to formatting it via .IR nroff (1); .I mmt\^ uses the .SM MM macro package, while .I mvt\^ uses the Macro Package for Viewgraphs and Slides. These two commands have options to specify preprocessing by .IR tbl (1) and/or .IR eqn (1). The proper pipelines and the required arguments and flags for .IR troff (1) and for the macro packages are generated, depending on the options selected. .PP .I Options\^ are given below. Any other arguments or flags (e.g., .BR \-rC3 ) are passed to .IR troff (1) or to the macro package, as appropriate. Such options can occur in any order, but they must appear before the .I files\^ arguments. If no arguments are given, these commands print a list of their options. .PP .PD 0 .TP 10 .B \-e Causes these6 .TH PTX 1 .SH NAME ptx \- permuted index .SH SYNOPSIS .B ptx [ options ] [ input [ output ] ] .SH DESCRIPTION .I Ptx\^ generates the file .I output\^ that can be processed with a text formatter to produce a permuted index of file .I input\^ (standard input and output default). It has three phases: the first does the permutation, generating one line for each keyword in an input line. The keyword is rotated to the front. The permuted file is then sorted. Finally, the sorted lines are rotated so the keyword comes at the middle of each line. .I Ptx\^ output is in the form: .br .IP \&\f3.xx\fP ``tail'' ``before keyword'' ``keyword and after'' ``head'' .PP where .B \&.xx is assumed to be an .I nroff\^ or .IR troff (1) macro provided by the user, or provided by the .IR mptx (5) macro package. The .I "before keyword\^" and .I "keyword and after\^" fields incorporate as much of the line as will fit around the keyword when it is printed. .I Tail\^ and .IR head , at least one of which is always the empty string, are wra.TH PROF 1 .SH NAME prof \- display profile data .SH SYNOPSIS .B prof .RB [ \-tcan ] .RB [ \-ox ] .RB [ \-g ] .RB [ \-z ] .RB [ \-h ] .RB [ \-s ] .RB [ \-m "\ mdata]" [prog] .SH DESCRIPTION .I Prof\^ interprets the profile file produced by the .IR monitor (3C) function. The symbol table in the object file .I prog\^ .RB ( a.out by default) is read and correlated with the profile file .RB ( mon.out by default). For each external text symbol the percentage of time spent executing between the address of that symbol and the address of the next is printed, together with the number of times that function was called and the average number of milliseconds per call. .PP The mutually exclusive options .B t, c, a,\^ and .B n\^ determine the type of sorting of the output lines: .TP .B \-t Sort by decreasing percentage of total time (default). .TP .B \-c Sort by decreasing number of calls. .TP .B \-a Sort by increasing symbol address. .TP .B \-n Sort lexically by symbol name. .PP The mutually exclusive options .B o\^ and . commands to invoke .IR eqn (1); also causes .I eqn to read the .B /usr/pub/eqnchar file (see .IR eqnchar (5)). .TP .B \-t Causes these commands to invoke .IR tbl (1). .TP .B \-Tst Directs the output to the .SM MH STARE facility. .TP .B \-Tvp Directs the output to a Versatec printer; this option is not available at all sites. .TP .B \-T4014 Directs the output to a Tektronix 4014 terminal via the .IR tc (1) filter. .TP .B \-Ttek Same as .BR \-T4014 . .TP .B \-a Invokes the .B \-a option of .IR troff (1). .TP .B \-y Causes .I mmt\^ to use the non-compacted version of the macros (see .IR mm (5)). No effect for .IR mvt . .PD .PP These commands read the standard input when .B \- is specified instead of any filenames. .PP .I Mvt\^ is just a link to .I mmt\^. .SH HINT Use the .BI \-o list\^ option of .IR troff (1) to specify ranges of pages to be output. Note, however, that these commands, if invoked with one or more of the .BR \-e , .BR \-t , and .B \- options, .I together\^ with the .BI \-o list\^ option of .IR trpped-around pieces small enough to fit in the unused space at the opposite end of the line. .PP The following \fIoptions\fP can be applied: .TP 11 .BR \-f Fold upper and lower case letters for sorting. .TP .BR \-t Prepare the output for the phototypesetter. .TP .BI \-w " n\^" Use the next argument, .IR n , as the length of the output line. The default line length is 72 characters for .I nroff\^ and 100 for .IR troff . .TP .BI \-g " n\^" Use the next argument, .IR n , as the number of characters that .I ptx\^ reserves in its calculations for each gap among the four parts of the line as finally printed. The default gap is 3. .TP .BI \-o " only\^" Use as keywords only the words given in the \fIonly\fR file. .TP .BI \-i " ignore\^" Do not use as keywords any words given in the .I ignore file. If the .B \-i and .B \-o options are missing, use .B /usr/lib/eign as the .I ignore file. .TP .BI \-b " break\^" Use the characters in the .I break file to separate words. Tab, new-line, and space characters are always used 6 B x\^ specify the printing of the address of each symbol monitored: .TP .B \-o Print each symbol address (in octal) along with the symbol name. .TP .B \-x Print each symbol address (in hexadecimal) along with the symbol name. .PP The following options may be used in any combination: .TP .B \-g Include non-global symbols (static functions). .TP .B \-z Include all symbols in the profile range (see .IR monitor (3C)), even if associated with zero number of calls and zero time. .TP .B \-h Suppress the heading normally printed on the report. (This is useful if the report is to be processed further.) .TP .B \-s Print a summary of several of the monitoring parameters and statistics on the standard error output. .TP .BR \-m " mdata\^" Use file .I mdata\^ instead of .B mon.out for profiling data. .PP For the number of calls to a function to be tallied, the .B \-p option of .IR cc (1) must have been given when the file containing the function was compiled. This option to the .I cc\^ command also arranges for the object off (1) may cause a harmless ``broken pipe'' diagnostic if the last page of the document is not specified in .IR list . .SH SEE ALSO env(1), eqn(1), mm(1), tbl(1), tc(1), troff(1), profile(4), environ(5), mm(5), mv(5). .br .IR "\*(6) Document Processing Guide" . .SH DIAGNOSTICS .B "m[mv]t: no input file" means none of the arguments is a readable file and the command is not used as a filter. .\" @(#)mmt.1 1.5 as break characters. .TP .BR \-r Take any leading non-blank characters of each input line to be a reference identifier (e.g., a page or chapter reference), separate from the text of the line. Attach the reference identifier as a 5th field on each output line. .PP The index for this manual was generated using .IR ptx . .SH FILES /bin/sort .br /usr/lib/eign .br /usr/lib/tmac/tmac.ptx .PD .SH SEE ALSO .PD 0 nroff(1), troff(1), mm(5), mptx(5). .PD .SH BUGS Line length counts do not account for overstriking or proportional spacing. .br Lines that contain tildes (\f3~\fP) are botched, because . I ptx uses that character internally. .\" @(#)ptx.1 1.4 file to include a special profiling start-up function that calls .IR monitor (3C) at the beginning and end of execution. It is the call to .I monitor\^ at the end of execution that causes the .B mon.out file to be written. Thus, only programs that call .IR exit (2) or return from .I main\^ cause the .B mon.out file to be produced. .SH FILES .ta \w'mon.out 'u mon.out for profile .br a.out for namelist .SH "SEE ALSO" cc(1), nm(1), exit(2), profil(2), monitor(3C). .br .ne 6v .SH BUGS There is a limit of 600 functions that may have call counters established during program execution. If this limit is exceeded, other data is overwritten and the .B mon.out file is corrupted. The number of call counters used is reported automatically by the .I prof\^ command whenever the number exceeds 250. .\" @(#)prof.1 1.4 7 .\" @(#)mv.1 1.2 .so /usr/man/u_man/man1/cp.1 .TH PWD 1 .SH NAME pwd \- working directory name .SH SYNOPSIS .B pwd .SH DESCRIPTION .I Pwd\^ prints the pathname of the working (current) directory. .SH "SEE ALSO" cd(1). .SH DIAGNOSTICS .B "Cannot open .." and .B "Read error in .." indicate possible file system trouble. These messages should be referred to a system programming counselor. .\" @(#)pwd.1 1.3 '\" t .tr ~ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\f3\-\\$1\fP\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\f3\-\\$1\fP] .if n .ul 0 .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \f3\-\\$1\\fP \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \f3\-\\$1\fP[\f2\\$2\^\fP] \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .TH PRS 1 .SH NAME prs \- print an \s-1SCCS\s+1 file .SH SYNOPSIS .B prs .SP d [dataspec]] .SP r [\s-1SID\s+1]] .SF e .SF l .SF a files .SH DESCRIPTION .I Prs\^ prints, on the standard output, parts or all of an \*(S) file (see .IR sccsfile (4)) in a user supplied format. If a directory is named, .I prs\^ behaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of the pathname does not begin with \f3s.\fP), and unreadable files are silently ignored. If a name of \f3\-\fP is given, the standard input is read; each l.\" @(#)mvt.1 1.2 .so /usr/man/u_man/man1/mmt.1 7 .TH RATFOR 1 .SH NAME ratfor \- rational FORTRAN dialect .SH SYNOPSIS .B ratfor [ options ] [ files ] .SH DESCRIPTION .I Ratfor\^ converts a rational dialect of \s-1FORTRAN\s+1 into ordinary irrational \s-1FORTRAN\s+1. .I Ratfor\^ provides control flow constructs essentially identical to those in C: .RS .TP \(bu\|\|\|statement grouping: \f3{\f2 statement\f3;\f2 statement\f3;\f2 statement\f3 }\f1 .TP \(bu\|\|\|decision-making: .nf \f3if\fP (\f2condition\f1)\f2 statement\f1 [ \f3else\f2 statement\f1 ] \f3switch\fP (\f2integer value\f1)\f3 { \f3case\f2 integer\f3:\f2 statement\f1 ... [ \f3default\fP: ] \f2statement\f1 \f3}\f1 .fi .TP \(bu\|\|\|loops: .br .nf \f3while\fP (\f2condition\f1) \f2statement\f1 \f3for\fP (\f2expression\f3;\f2 condition\f3;\f2 expression\f1)\f2 statement\f1 \f3do\f2 limits statement\f1 \f3repeat\f2 statement\f1 [ \f3until\fP (\f2condition\f1) ] \f3break\fP \f3next\fP .fi .RE .PP and some syntactic sugar to make programs easier to read and write: .RS .TP \(bu\|\|\|free form input: multine of the standard input is taken to be the name of an \*(S) file or directory to be processed; non-\*(S) files and unreadable files are silently ignored. .PP Arguments to .IR prs , which may appear in any order, consist of .I keyletter\^ arguments, and filenames. .PP All the described .I keyletter\^ arguments apply independently to each named file: .A1 d dataspec Used to specify the output data specification. The .I dataspec\^ is a string consisting of \*(S) file .I "data keywords\^" (see .IR "\s-1DATA KEYWORDS\s+1" ) interspersed with optional user supplied text. .A1 r \s-1SID\s+1 Used to specify the .IR S "\s-1CCS\s+1 " ID entification (\*(I)) string of a delta for which information is desired. If no \*(I) is specified, the \*(I) of the most recently created delta is assumed. .AR e Requests information for all deltas created .I earlier\^ than and including the delta designated via the .B \-r keyletter. .AR l Requests information for all deltas created .I later\^ than and including the delta designated via.\" @(#)neqn.1 1.2 .so /usr/man/u_man/man1/eqn.1 iple statements/line; automatic continuation .TP \(bu\|\|\|comments: .B # \f2This is a comment.\f1 .TP \(bu\|\|\|translation of relationals: for example, .BR > , .BR >= , become .BR .\s-1GT\s+1. , .BR .\s-1GE\s+1. . .TP \(bu\|\|\|return expression to caller from function: \f3return\fP (\f2expression\f1) .TP \(bu\|\|\|define: .br .B define .I name replacement\^ .TP \(bu\|\|\|include: .br .B include .I file\^ .RE .PP The option .B \-h causes quoted strings to be turned into .B 27H constructs. The .B \-C option copies comments to the output and attempts to format it neatly. Normally, continuation lines are marked with a .B & in column 1; the option .B \-6x makes the continuation character .B x and places it in column 6. .PP .I Ratfor\^ is best used with .IR f77 (1). .SH SEE ALSO ef\&l(1), f77(1). .br B. W. Kernighan and P. J. Plauger, ``Software Tools'', Addison-Wesley, 1976. .br ``\s-1FORTRAN\s+1'' in the .IR "\*(6) Programming Guide" . .\" @(#)ratfor.1 1.6 8  the .B \-r keyletter. .AR a Requests printing of information for both removed (i.e., delta type = .IR R ; (see .IR rmdel (1)) and existing (i.e., delta type = .IR D) deltas. If the .B \-a keyletter is not specified, information for existing deltas only is provided. .PP .i0 .SH "DATA KEYWORDS" Data keywords specify which parts of an \*(S) file are to be retrieved and output. All parts of an \*(S) file (see .IR sccsfile (4)) have an associated data keyword. There is no limit on the number of times a data keyword may appear in a .IR dataspec . .PP The information printed by .I prs\^ consists of: (1) the user supplied text; and (2) appropriate values (extracted from the \*(S) file) substituted for the recognized data keywords in the order of appearance in the \f2dataspec\^\fP. The format of a data keyword value is either .I Simple\^ (S), in which keyword substitution is direct, or .I "Multi-line\^" (M), in which keyword substitution is followed by a carriage return. .PP User supplied text is any text other tha.TH NEWFORM 1 .SH NAME newform \- change the format of a text file .SH SYNOPSIS .B newform .RB [ \-s ] .RB [ \-i \^tabspec] .RB [ \-o \^tabspec] .RB [ \-b \^n] .RB [ \-e \^n] .RB [ \-p \^n] .RB [ \-a \^n] .RB [ \-f ] .RB [ \-c \^char] .RB [ \-l \^n] [\|files\|] .SH DESCRIPTION \fINewform\fR reads lines from the named .IR files , or the standard input if no input file is named, and reproduces the lines on the standard output. Lines are reformatted in accordance with command line options in effect. .P Except for .BR \-s , command line options may appear in any order, may be repeated, and may be intermingled with the optional .IR files . Command line options are processed in the order specified. This means that option sequences like .RB `` \-e 15 .BR \-l 60'' yield results different from .RB `` \-l 60 .BR \-e 15''. Options are applied to all .I files on the command line. .TP 10 .BI \-i tabspec Input tab specification: expands tabs to spaces, according to the tab specifications given. .I Tabspec recognizes all ta.\" @(#)red.1 1.2 .so /usr/man/u_man/man1/ed.1 n recognized data keywords. A tab is specified by \f3\e\|t\fP and carriage return/new line is specified by \f3\e\|n\fP. .bp .ce SCCS FILES DATA KEYWORDS .DS .PD 0 .if t .vs -1p .if n .ll 66 .if t .ll 6.5i .TS center ; c c c c c c l c c c . .sp KEYWORD DATA ITEM FILE SECTION VALUE FORMAT _ \f3:\fPDt\f3:\fP Delta information Delta Table See below* S \f3:\fPDL\f3:\fP T{ Delta line statistics T} " \f3:\fPLi\f3:\fP/\f3:\fPLd\f3:\fP/\f3:\fPLu\f3:\fP S \f3:\fPLi\f3:\fP T{ .nf Lines inserted by Delta .fi T} " nnnnn S \f3:\fPLd\f3:\fP T{ Lines deleted by Delta T} " nnnnn S \f3:\fPLu\f3:\fP T{ .nf Lines unchanged by Delta .fi T} " nnnnn S \f3:\fPDT\f3:\fP Delta type " \f2D\^\fP~or~\f2R\^\fP S \f3:\fPI\f3:\fP T{ SCCS ID string (SID) T} " \f3:\fPR\f3:.:\fPL\f3:.:\fPB\f3:.:\fPS\f3:\fP S \f3:\fPR\f3:\fP Release number " nnnn S \f3:\fPL\f3:\fP Level number " nnnn S \f3:\fPB\f3:\fP Branch number " nnnn S \f3:\fPS\f3:\fP Sequence number " nnnn S \f3:\fPD\f3:\fP T{ Date Delta created T} " \f3:\fPDy\f3:\fP/\f3:\fPDm\f3:\fP/\f3:8 b specification forms described in .IR tabs (1). If .I tabspec is .BR \-\- , .I newform assumes that the tab specification is to be found in the first line read from the standard input (see .IR fspec (4)). If no .I tabspec is given, .I tabspec defaults to .BR \-8 . A .I tabspec of .B \-0 expects no tabs; if any are found, they are treated as .BR \-1 . .TP 10 .BI \-o tabspec Output tab specification: replaces spaces by tabs, according to the tab specifications given. The tab specifications are the same as for .BI \-i tabspec\fR.\fP If no .I tabspec is given, .I tabspec defaults to .BR \-8 . A .I tabspec of .B \-0 means that no spaces will be converted to tabs on output. .TP 10 .BI \-l n Set the effective line length to .I n characters. If .I n is not entered, .B \-l defaults to 72. The default line length without the .B \-l option is 80 characters. Note that tabs and backspaces are considered to be one character (use .B \-i to expand tabs to spaces). .TP 10 .BI \-b n Truncate .I n characters from the beginnin.TH REGCMP 1 .SH NAME regcmp \- regular expression compile .SH SYNOPSIS .B regcmp [ .B \- ] files .SH DESCRIPTION .IR Regcmp , in most cases, precludes the need for calling .IR regcmp (3X) from C programs. This saves both execution time and program size. The command .I regcmp\^ compiles the regular expressions in .I file\^ and places the output in .IB file .i\fR.\fP If the \fB\-\fP option is used, the output is placed in .IB file .c\fR.\fP The format of entries in .I file\^ is a name (C variable), followed by one or more blanks, followed by a regular expression enclosed in double quotes. The output of .I regcmp\^ is C source code. Compiled regular expressions are represented as .B "extern char" vectors. .IB File .i files may thus be .I included\^ into C programs, or .IB file .c files may be compiled and later loaded. In the C program which uses the .I regcmp\^ output, .IR regex ( abc , line ) applies the regular expression named .I abc\^ to .IR line . Diagnostics are self-explanatory. .SH EXAMPLES .TP "\w'tel\fPDd\f3:\fP S \f3:\fPDy\f3:\fP T{ Year Delta created T} " nn S \f3:\fPDm\f3:\fP T{ Month Delta created T} " nn S \f3:\fPDd\f3:\fP T{ Day Delta created T} " nn S \f3:\fPT\f3:\fP T{ Time Delta created T} " \f3:\fPTh\f3:\fP\f3:\fP:Tm\f3:\fP\f3:\fP:Ts\f3:\fP S \f3:\fPTh\f3:\fP T{ Hour Delta created T} " nn S \f3:\fPTm\f3:\fP T{ Minutes Delta created T} " nn S \f3:\fPTs\f3:\fP T{ Seconds Delta created T} " nn S \f3:\fPP\f3:\fP T{ .nf Programmer who created Delta .fi T} " logname S \f3:\fPDS\f3:\fP T{ Delta seq. # T} " nnnn S \f3:\fPDP\f3:\fP T{ .nf Predecessor Delta seq. # .fi T} " nnnn S \f3:\fPDI\f3:\fP T{ Seq. # of deltas incl., excl., ignored T} " \f3:\fPDn\f3:\fP/\f3:\fPDx\f3:\fP/\f3:\fPDg\f3:\fP S \f3:\fPDn\f3:\fP T{ .nf Deltas included (seq. #) .fi T} " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPDx\f3:\fP T{ .nf Deltas excluded (seq. #) .fi T} " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPDg\f3:\fP T{ .nf Deltas ignored (seq. #) .fi T} " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\g of the line when the line length is greater than the effective line length (see .BI \-l n\fR).\fP Default is to truncate the number of characters necessary to obtain the effective line length. The default value is used when .B \-b with no .I n is used. This option can be used to delete the sequence numbers from a .SM COBOL program as follows: .br .RS 15 newform\ \|\-l1\ \|\-b7\ \|filename .RE .TP \& The .B \-l1 must be used to set the effective line length shorter than any existing line in the file so that the .B \-b option is activated. .TP 10 .BI \-e n Same as .BI \-b n except that characters are truncated from the end of the line. .TP 10 .BI \-c k Change the prefix/append character to .IR k . Default character for .I k is a space. .TP 10 .BI \-p n Prefix .I n characters (see .BI \-c k\fR)\fP to the beginning of a line when the line length is less than the effective line length. Default is to prefix the number of characters necessary to obtain the effective line length. .TP 10 .BI \-a n Same as .BI \-p n9 no\ \ \ \ 'u" name ``([A\-Za\-z][A\-Za\-z0\-9\_]\(**)$0'' .TP telno ``\\({0,1}([2\-9][01][1\-9])$0\\){0,1} \(**'' .br ``([2\-9][0\-9]{2})$1[ \-]{0,1}'' .br ``([0\-9]{4})$2'' .TP In the C program that uses the \fIregcmp\fP output, .PP .RS \f3regex(telno, line, area, exch, rest)\f1 .RE .PP applies the regular expression named \f3telno\f1 to \f3line\f1. .SH SEE ALSO regcmp(3X). .\" @(#)regcmp.1 1.4 ^.\^.\fP S \f3:\fPMR\f3:\fP MR numbers for delta " text M \f3:\fPC\f3:\fP Comments for delta " text M \f3:\fPUN\f3:\fP User names User Names text M \f3:\fPFL\f3:\fP Flag list Flags text M \f3:\fPY\f3:\fP Module type flag " text S \f3:\fPMF\f3:\fP T{ MR validation flag T} " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPMP\f3:\fP T{ .nf MR validation pgm name .fi T} " text S \f3:\fPKF\f3:\fP T{ .nf Keyword error/ warning flag .fi T} " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPBF\f3:\fP Branch flag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPJ\f3:\fP Joint edit flag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPLK\f3:\fP Locked releases " \f3:\fPR\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPQ\f3:\fP User defined keyword " text S \f3:\fPM\f3:\fP Module name " text S \f3:\fPFB\f3:\fP Floor boundary " \f3:\fPR\f3:\fP S \f3:\fPCB\f3:\fP Ceiling boundary " \f3:\fPR\f3:\fP S \f3:\fPDs\f3:\fP Default SID " \f3:\fPI\f3:\fP S \f3:\fPND\f3:\fP Null delta flag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPFD\f3:\fP T{ File descriptive text T} Comments text M \f3:\fPBD\f3:\fP Bo except characters are appended to the end of a line. .TP 10 .B \-f Write the tab specification format line on the standard output before any other lines are output. The printed tab specification format line corresponds to the format specified in the last .B \-o option. If no .B \-o option is specified, the printed line contains the default specification of .BR \-8 . .TP 10 .B \-s Shears off leading characters on each line up to the first tab and places up to 8 of the sheared characters at the end of the line. If more than 8 characters (not counting the first tab) are sheared, the eighth character is replaced by a .B \(** and any characters to the right of it are discarded. The first tab is always discarded. .TP \& An error message and program exit occur if this option is used on a file without a tab on each line. The characters sheared off are saved internally until all other options specified are applied to that line. The characters are then added at the end of the processed line. .TP \& For example, to co.TH RM 1 .SH NAME rm, rmdir \- remove files or directories .SH SYNOPSIS .B rm [ .B \-fri ] file ... .PP .B rmdir dir ... .PP .SH DESCRIPTION .I Rm\^ removes the entries for one or more files from a directory. If an entry is the last link to the file, the file is destroyed. Removal of a file requires write permission in its directory, but neither read nor write permission on the file itself. .PP If a file has no write permission and the standard input is a terminal, its permissions are printed and a line is read from the standard input. If that line begins with \f3y\fP the file is deleted; otherwise, the file remains. No questions are asked when the .B \-f option is given or if the standard input is not a terminal. .PP If a designated file is a directory, an error comment is printed unless the optional argument .B \-r has been used. When \f3\-r\f1 is used, .I rm\^ recursively deletes the entire contents of the specified directory, and the directory itself. To remove a directory, you must be located at the ne9 dy Body text M \f3:\fPGB\f3:\fP Gotten body " text M \f3:\fPW\f3:\fP T{ A form of \f2what\^\fP(1) string T} N/A \f3:\fPZ\f3:\fP\f3:\fPM\f3:\fP\e\|t\f3:\fPI\f3:\fP S \f3:\fPA\f3:\fP T{ A form of \f2what\^\fP(1) string T} N/A \f3:\fPZ\f3:\fP\f3:\fPY\f3:\fP~\f3:\fPM\f3:\fP~\f3:\fPI\f3:\fP\f3:\fPZ\f3:\fP S \f3:\fPZ\f3:\fP T{ \f2what\^\fP(1) string delimiter T} N/A @\&(#) S \f3:\fPF\f3:\fP SCCS filename N/A text S \f3:\fPPN\f3:\fP SCCS file pathname N/A text S .TE .sp .5v * \f3:\fPDt\f3:\fP~=~\f3:\fPDT\f3:\fP~\f3:\fPI\f3:\fP~\f3:\fPD\f3:\fP~\f3:\fPT\f3:\fP~\f3:\fPP\f3:\fP~\f3:\fPDS\f3:\fP~\f3:\fPDP\f3:\fP .DE .if t .ps +1 .if t .vs +1p .SH EXAMPLES The command .IP \f3prs \-d``Users and/or user \s-1ID\s+1s for :F: are:\e\|n:\s-1UN\s+1:'' s.file .PP may produce on the standard output: .PP .RS .nf \f3Users and/or user \s-1ID\s+1s for s.file are:\f1 \f3xyz\f1 \f3131\f1 \f3abc\f1 .fi .RE .PP The command .IP \f3prs \-d``Newest delta for pgm :M:: :I: Created :D: By :P:'' \-r s.file\f1 .PP may produce on the standard outpnvert a file with leading digits, one or more tabs, and text on each line, to a file beginning with the text, all tabs after the first expanded to spaces, padded with spaces out to column 72 (or truncated to column 72), and the leading digits placed starting at column 73, use the command: .br .PP .RS 15 \f3newform\ \|\-s\ \|\-i\ \|\-l\ \|\-a\ \|\-e\ \|\f2filename\f1 .RE .SH DIAGNOSTICS .PD 0 All diagnostics are fatal. .TP "\w'\fItabspec indirection illegal\ \ \fP'u" .BR usage: \ \|.\|.\|. .I Newform was called with a bad option. .TP .B "not \-s format" There was no tab on one line. .TP .B "can't open file" Self-explanatory. .TP .B "internal line too long" A line exceeds 512 characters after being expanded in the internal work buffer. .TP .B "tabspec in error" A tab specification is incorrectly formatted or specified tab stops are not ascending. .TP .B "tabspec indirection illegal" A .I tabspec read from a file (or standard input) may not contain a .I tabspec referencing another file (or standard input)xt higher level (parent directory) in the directory hierarchy. You cannot be located in the directory you are trying to remove. For example, if the full pathname of a directory is \f3/top/next\f1, you must be in \f3/top\f1 to remove the directory \f3next\f1. .PP If the .B \-i (interactive) option is in effect, .I rm\^ asks whether to delete each file. The name of the file is printed on the terminal followed by a colon. If you do not want to delete the file, press the carriage return. If you do want to delete the file, type input that begins with the letter ``\f3y\f1''. The \f3\-i\f1 option can be used in combination with the \f3\-r\f1 option to interactively delete directories. When the command \f3rm \-ir\f2 directory name\f1 is given, the message \f3directory\f2 directory name\f3:\f1 is printed on the terminal. As with interactive file deletion, type either input beginning with the letter \f3y\f1 or a carriage return alone to delete or not delete a directory. .PP .I Rmdir\^ removes entries for the nameut: .IP \f3Newest delta for pgm main.c: 3.7 Created 77/12/1 By cas\f1 .PP As a \f2special case:\^\fP .IP \f3prs s.file\f1 .PP may produce on the standard output: .PP .RS .nf \f3D 1.1 77/12/1 00:00:00 cas 1 000000/00000/00000\f1 \f3\s-1MR\s+1s:\f1 \f3bl78-12345\f1 \f3bl79-54321\f1 \f3\s-1COMMENTS\s+1:\f1 \f2this is the comment line for s.file initial delta\f1 .fi .RE .PP for each delta table entry of the ``D'' type. Only the .B \-a keyletter argument can be used with the .IR "special case" . .PP .SH FILES .RE .TP 10 /tmp/pr????? .i0 .SH "SEE ALSO" admin(1), delta(1), get(1), help(1), rmdel(1), sccsfile(4). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .tr ~~ .\" @(#)prs.1 1.12 : . .PD .SH "EXIT CODES" 0 \- normal execution .br 1 \- for any error .SH "SEE ALSO" csplit(1), tabs(1), fspec(4). .SH BUGS .I Newform normally only keeps track of physical characters; however, for the .B \-i and .B \-o options, .I newform keeps track of backspaces in order to line up tabs in the appropriate logical columns. .PP .I Newform does not prompt the user if a .I tabspec is to be read from the standard input (by use of .B \-i\-\^\- or .BR \-o\-\^\- ). .PP If the .B \-f option is used, and the last .B \-o option specified was .BR \-o\-\^\- , and was preceded by either .B \-o\-\^\- or .BR \-i\-\^\- , the tab specification format line will be incorrect. .\" @(#)newform.1 1.4 d directories, which must be empty. .SH SEE ALSO unlink(2). .SH DIAGNOSTICS Generally self-explanatory. It is forbidden to remove the file \f3..\fP merely to avoid the consequences of inadvertently doing something like: .PP .RS .B "rm \-r .\(**" .RE .\" @(#)rm.1 1.4 .TH PS 1 .SH NAME ps \- report process status .SH SYNOPSIS .B ps [ options ] .SH DESCRIPTION .I Ps\^ prints information about active processes. Without .IR options , information is printed about processes associated with the current terminal. Otherwise, the displayed information is controlled by the following .IR options : .PP .PD 0 .TP 15 .B \-e Print information about all processes. .TP .B \-d Print information about all processes, except process group leaders. .TP .B \-a Print information about all processes, except process group leaders and processes not associated with a terminal. .TP .B \-f Generate a .I full\^ listing. Normally, a short listing containing only process .SM ID\*S, terminal (``tty'') identifier, cumulative execution time, and the command name is printed. See below for meaning of columns in a full listing. .TP .B \-l Generate a .I long\^ listing. See below. .TP .BI \-c " corefile\^" Use the file .I corefile\^ in place of .BR /dev/mem . .TP .BI \-s " swapdev\^" Use the file .I swapdev\^ in.TH NEWGRP 1 .SH NAME newgrp \- log in to a new group .SH SYNOPSIS .B newgrp .RB [ \|\-\| ] [ group ] .SH DESCRIPTION .I Newgrp\^ changes the group identification of its caller, analogously to .IR login (1). The same person remains logged in, and the current directory is unchanged, but calculations of access permissions to files are performed with respect to the new group .SM ID\*S. .PP .I Newgrp\^ without an argument changes the group identification to the group in the password file; in effect it changes the group identification back to the caller's original group. .PP An initial .B \- flag causes the environment to be changed to the one that would be expected if the user actually logged in again. .PP A password is demanded if the group has a password and the user himself does not, or if the group has a password and the user is not listed in .B /etc/group as being a member of that group. .PP When most users log in, they are members of the group named .BR other . .SH FILES /etc/group .br /etc/passwd .SH SEE A: .\" @(#)rmail.1 1.2 .so /usr/man/u_man/man1/mail.1  place of .BR /dev/swap . This is useful when examining a .IR corefile ; a .I swapdev\^ of .B /dev/null\^ causes the user block to be zeroed out. .TP .BI \-n " namelist\^" The argument is taken as the name of an alternate .I namelist\^ .RB ( /unix is the default). .TP .BI \-t " tlist\^" Restrict listing to data about the processes associated with the terminals given in .IR tlist , where .I tlist\^ can be in one of two forms: a list of terminal identifiers separated by commas, or a list of terminal identifiers enclosed in double quotes and separated by a comma and/or one or more spaces. .TP .BI \-p " plist\^" Restrict listing to data about processes whose process .SM ID numbers are given in .IR plist , where .I plist\^ is in the same format as .IR tlist . .TP .BI \-u " ulist\^" Restrict listing to data about processes whose user .SM ID numbers or login names are given in .IR ulist , where .I ulist\^ is in the same format as .IR tlist . In the listing, the numerical user .SM ID is printed unless the .B \-f optLSO login(1), group(4). .SH BUGS There is no convenient way to enter a password into .BR /etc/group . Use of group passwords is not encouraged, because, by their very nature, they encourage poor security practices. Group passwords may disappear in the future. .\" @(#)newgrp.1 1.2 .TH RMDEL 1 .SH NAME rmdel \- remove a delta from an \s-1SCCS\s+1 file .SH SYNOPSIS .B rmdel .if n .ul \fB\-r\fR\c .if n .ul 0 \s-1SID\s0 files .SH DESCRIPTION .I Rmdel\^ removes the delta specified by the .SM \fISID\fP from each named \s-1SCCS\s+1 file. The delta to be removed must be the newest (most recent) delta in its branch in the delta chain of each named \s-1SCCS\s+1 file. In addition, the specified .SM \fISID\fR must not be that of a version being edited for the purpose of making a delta (i. e., if a .I p-file\^ (see .IR get (1)) exists for the named \s-1SCCS\s+1 file, the specified .SM \fISID\fR must .I not\^ appear in any entry of the .I p-file\c\^ ). .PP If a directory is named, .I rmdel\^ behaves as though each file in the directory were specified as a named file, except that non-\s-1SCCS\s+1 files (last component of the pathname does not begin with \fBs.\fR) and unreadable files are silently ignored. If a name of \fB\-\fR is given, the standard input is read; each line of the standard input is t; ion is used, in which case the login name is printed. .TP .BI \-g " glist\^" Restrict listing to data about processes whose process groups are given in .IR glist , where .I glist\^ is a list of process group leaders and is in the same format as .IR tlist . .PD .PP The column headings and the meaning of the columns in a .I ps\^ listing are given below; the letters .B f and .B l indicate the option .RI ( full\^ or .IR long ) that causes the corresponding heading to appear; .B all means that the heading always appears. Note that these two options only determine what information is provided for a process; they do .I not\^ determine which processes are to be listed. .ta .65i .ne 7 .PP .PD 0 .TP 16 .SM .BR F\*S " (l)" Flags (octal and additive) associated with the process: .RS 20 .TP 6 01 in core .TP 6 02 system process .TP 6 04 locked in core (e.g., for physical .SM I/O\*S) .TP 6 10 being swapped .TP 6 20 being traced by another process .TP 6 40 another tracing flag .RE .TP .SM .BR S\*S " (l)" The state of the pro.TH NEWS 1 .SH NAME news \- print news items .SH SYNOPSIS .B news [ .B \-a ] [ .B \-n ] [ .B \-s ] [ items ] .SH DESCRIPTION .I News\^ is used to keep the user informed of current events. By convention, these events are described by files in the directory .BR /usr/news . .PP When invoked without arguments, .I news\^ prints the contents of all current files in .BR /usr/news , most recent first, with each preceded by an appropriate header. .I News\^ stores the ``currency'' time as the modification date of a file named .B .news_time in the user's home directory (the identity of this directory is determined by the environment variable .SM .BR $HOME\*S ); only files more recent than this currency time are considered ``current.'' .PP The .B \-a option causes .I news\^ to print all items, regardless of currency. In this case, the stored time is not changed. .PP The .B \-n option causes .I news\^ to report the names of the current items without printing their contents, and without changing the stored time. .PP The .Baken to be the name of an \s-1SCCS\s+1 file to be processed; non-\s-1SCCS\s+1 files and unreadable files are silently ignored. .PP The exact permissions necessary to remove a delta are documented in the ``Source Code Control System User's Guide''. Simply stated, if you make a delta you can remove it; if you own the file and directory you can remove a delta. .SH FILES .PD 0 .TP 10 x-file (see .IR delta (1)) .TP 10 z-file (see .IR delta (1)) .PD .SH "SEE ALSO" delta(1), get(1), help(1), prs(1), sccsfile(4). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .br .SH DIAGNOSTICS Use .IR help (1) for explanations. .\" @(#)rmdel.1 1.5 cess: .RS 20 .TP 6 0 non-existent .TP 6 S sleeping .TP 6 W waiting .TP 6 R running .TP 6 I intermediate .TP 6 Z terminated .TP 6 T stopped .TP 6 X growing .RE .br .ne 2 .TP .SM .BR UID\*S " (f,l)" The user .SM ID number of the process owner; the login name is printed under the .B \-f option. .TP .SM .BR PID\*S " (all)" The process .SM ID of the process; it is possible to kill a process if you know the \fBPID\fR. .TP .SM .BR PPID\*S " (f,l)" The process .SM ID of the parent process. .TP .SM .BR C\*S " (f,l)" Processor utilization for scheduling. .TP .SM .BR STIME\*S " (f)" Starting time of the process. .TP .SM .BR PRI\*S " (l)" The priority of the process; higher numbers mean lower priority. .TP .SM .BR NI\*S " (l)" Nice value; used in priority computation. .TP .SM .BR ADDR\*S " (l)" The memory address of the process (a pointer to the segment table array on the 3B20S), if resident; otherwise, the disk address. .TP .SM .BR SZ\*S " (l)" The size in blocks of the core image of the process. .TP .SM .BR WCHAN\*S " ;  \-s option causes .I news\^ to report how many current items exist, without printing their names or contents, and without changing the stored time. It is useful to include such an invocation of .I news\^ in one's .B .profile file, or in the system's .BR /etc/profile . .PP All other arguments are assumed to be specific news items that are to be printed. .PP If a .I delete\^ is typed during the printing of a news item, printing stops and the next item is started. Another .I delete\^ within one second of the first causes the program to terminate. .SH FILES /etc/profile .br /usr/news/\(** .br \&\s-1$HOME\s+1/\f3.\fPnews_time .SH SEE ALSO profile(4), environ(5). .\" @(#)news.1 1.2 .\" @(#)rmdir.1 1.2 .so /usr/man/u_man/man1/rm.1 (l)" The event for which the process is waiting or sleeping; if blank, the process is running. .TP .SM .BR TTY\*S " (all)" The controlling terminal for the process. .TP .SM .BR TIME\*S " (all)" The cumulative execution time for the process. .TP .SM .BR CMD\*S " (all)" The command name; the full command name and its arguments are printed under the .B \-f option. .DT .PD .PP A process that has exited and has a parent, but has not yet been waited for by the parent, is marked .BR . .PP Under the .B \-f option, .I ps\^ tries to determine the command name and arguments given when the process was created by examining memory or the swap area. Failing this, the command name, as it would appear without the .B \-f option, is printed in square brackets. .SH FILES .PD 0 .TP "\w'/etc/ps_data\ \ \ 'u" /unix system namelist. .TP /dev/mem memory. .TP /dev/swap the default swap device. .TP /etc/passwd supplies \s-1UID\s+1 information. .TP /etc/ps_data internal data structure. .TP /dev searched to find terminal (``tt.TH NICE 1 .SH NAME nice \- run a command at low priority .SH SYNOPSIS .B nice [ .BR \- increment ] command [ arguments ] .SH DESCRIPTION .I Nice\^ executes .I command\^ with a lower .SM CPU scheduling priority. If the .I increment\^ argument (in the range 1-19) is given, it is used; if not, an increment of 10 is assumed. .PP The superuser may run commands with priority higher than normal by using a negative increment, e.g., .BR \-\^\-10 . .SH SEE ALSO nohup(1), nice(2). .SH DIAGNOSTICS .I Nice\^ returns the exit status of the subject command. .SH BUGS An .I increment\^ larger than 19 is equivalent to 19. .\" @(#)nice.1 1.4 < .\" @(#)rsh.1 1.2 .so /usr/man/u_man/man1/sh.1 y'') names. .DT .PD .SH SEE ALSO kill(1), nice(1). .SH BUGS Things can change while .I ps\^ is running; the picture it gives is only a close approximation to reality. Some data printed for defunct processes are irrelevant. .\" @(#)ps.1 1.4 .TH NL 1 .SH NAME nl \- line numbering filter .SH SYNOPSIS .B nl .RB [ \-h type] .RB [ \-b type] .RB [ \-f type] .RB [ \-v start#] .RB [ \-i incr] .RB [ \-p ] .RB [ \-l num] .RB [ \-s sep] .RB [ \-w width] .RB [ \-n format] .RB [ \-d delim] file .SH DESCRIPTION .I Nl\^ reads lines from the named \fIfile\fP or the standard input if no \fIfile\fP is named and reproduces the lines on the standard output. Lines are numbered on the left in accordance with the command options in effect. .P .I Nl\^ views the text it reads in terms of logical pages. Line numbering is reset at the start of each logical page. A logical page consists of a header, a body, and a footer section. Empty sections are valid. Different line numbering options are independently available for header, body, and footer (e.g. no numbering of header and footer lines while numbering blank lines only in the body). .P The start of logical page sections are signaled by input lines containing nothing but the following delimiter character(s): .br .RS 10 .TP.TH SACT 1 .SH NAME sact \- print current \s-1SCCS\s+1 file editing activity .SH SYNOPSIS .B sact files .SH DESCRIPTION .I Sact\^ informs the user of any impending deltas to a named .SM SCCS file. This situation occurs when .IR get (1) with the .B \-e option has been previously executed without a subsequent execution of .IR delta (1). If a directory is named on the command line, .I sact\^ behaves as though each file in the directory were specified as a named file, except that non-\s-1SCCS\s+1 files and unreadable files are silently ignored. If a name of .B \- is given, the standard input is read with each line being taken as the name of an .SM SCCS file to be processed. .P The output for each named file consists of five fields separated by spaces. .RS 5 .TP 12 Field 1 specifies the .SM SID of a delta that currently exists in the .SM SCCS file to which changes will be made to make the new delta. .TP 12 Field 2 specifies the .SM SID for the new delta to be created. .TP 12 Field 3 contains the login id of the us< .TH PTX 1 .SH NAME ptx \- permuted index .SH SYNOPSIS .B ptx [ options ] [ input [ output ] ] .SH DESCRIPTION .I Ptx\^ generates the file .I output\^ that can be processed with a text formatter to produce a permuted index of file .I input\^ (standard input and output default). It has three phases: the first does the permutation, generating one line for each keyword in an input line. The keyword is rotated to the front. The permuted file is then sorted. Finally, the sorted lines are rotated so the keyword comes at the middle of each line. .I Ptx\^ output is in the form: .br .IP \&\f3.xx\fP ``tail'' ``before keyword'' ``keyword and after'' ``head'' .PP where .B \&.xx is assumed to be an .I nroff\^ or .IR troff (1) macro provided by the user, or provided by the .IR mptx (5) macro package. The .I "before keyword\^" and .I "keyword and after\^" fields incorporate as much of the line as will fit around the keyword when it is printed. .I Tail\^ and .IR head , at least one of which is always the empty string, are wra 15 .I Line contents\^ .I Start of\^ .TP \f3\e:\e:\e:\f1 header .TP \f3\e:\e:\f1 body .TP \f3\e:\f1 footer .sp .RE Unless optioned otherwise, .I nl\^ assumes the text being read is in a single logical page body. .P Command options may appear in any order and may be intermingled with an optional filename. Only one file may be named. The options are: .TP 15 .BI \-b type\^ Specifies which logical page body lines are to be numbered. Recognized \fItypes\fP and their meaning are: .BR a , number all lines; .BR t , number lines with printable text only; .BR n , no line numbering; .BI p string\^\fR,\fP number only lines that contain the regular expression specified in .IR string . Default \fItype\fP for logical page body is .B t (text lines numbered). .TP 15 .BI \-h type\^ Same as .BI \-b type\^ except for header. Default \fItype\fP for logical page header is \fBn\fP (no lines numbered). .TP 15 .BI \-f type\^ Same as .BI \-b type\^ except for footer. Default for logical page footer is \fBn\fP (no lines numbered). .TP er who will make the delta (i.e., executed a .I get\^ for editing). .TP 12 Field 4 contains the date that .B "get \-e" was executed. .TP 12 Field 5 contains the time that .B "get \-e" was executed. .SH "SEE ALSO" delta(1), get(1), unget(1). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .\" @(#)sact.1 1.6 pped-around pieces small enough to fit in the unused space at the opposite end of the line. .PP The following \fIoptions\fP can be applied: .TP 11 .BR \-f Fold upper and lower case letters for sorting. .TP .BR \-t Prepare the output for the phototypesetter. .TP .BI \-w " n\^" Use the next argument, .IR n , as the length of the output line. The default line length is 72 characters for .I nroff\^ and 100 for .IR troff . .TP .BI \-g " n\^" Use the next argument, .IR n , as the number of characters that .I ptx\^ reserves in its calculations for each gap among the four parts of the line as finally printed. The default gap is 3. .TP .BI \-o " only\^" Use as keywords only the words given in the \fIonly\fR file. .TP .BI \-i " ignore\^" Do not use as keywords any words given in the .I ignore file. If the .B \-i and .B \-o options are missing, use .B /usr/lib/eign as the .I ignore file. .TP .BI \-b " break\^" Use the characters in the .I break file to separate words. Tab, new-line, and space characters are always used = 15 .B \-p Do not restart numbering at logical page delimiters. .TP 15 .BI \-v start#\^ .I Start#\^ is the initial value used to number logical page lines. Default is .BR 1 . .TP 15 .BI \-i incr\^ .I Incr\^ is the increment value used to number logical page lines. Default is .BR 1 . .TP 15 .BI \-s sep\^ .I Sep\^ is the character(s) used in separating the line number and the corresponding text line. Default \fIsep\fP is a tab. .TP 15 .BI \-w width\^ .I Width\^ is the number of characters to be used for the line number. Default \fIwidth\fP is .BR 6 . .TP 15 .BI \-n format\^ .I Format\^ is the line numbering format. Recognized values are: .BR ln , left-justified, leading zeroes suppressed; .BR rn , right-justified, leading zeroes suppressed; .BR rz , right-justified, leading zeroes kept. Default \fIformat\fP is \fBrn\fR (right-justified). .TP 15 .BI \-l num\^ .I Num\^ is the number of blank lines to be considered as one. For example, .B \-l2 results in only the second adjacent blank being numbered (if the approp.TH SADP 1 .SH NAME sadp \- disk access profiler .SH SYNOPSIS .B sadp [ .B \-th ] [ .B \-d device[\|\-drive] ] s [ n ] .SH DESCRIPTION .I Sadp reports disk access location and seek distance, in tabular or histogram form. It samples disk activity once every second during an interval of .I s seconds. This is done repeatedly if .I n is specified. Cylinder usage and disk distance are recorded in units of eight cylinders. .PP The only valid value of .I device is .BR disk. .I Drive specifies the disk drives and it may be: a drive number in the range supported by .IR device , two numbers separated by a minus (indicating an inclusive range), or a list of drive numbers separated by commas. .PP Up to eight disk drives may be reported. The .B \-d option may be omitted, if only one .I device is present. .PP The .B \-t flag causes the data to be reported in tabular form. The .B \-h flag produces a histogram of the data on the printer. Default is .BR \-t . .SH EXAMPLE The command: .PP .RS \f3sadp \|\-d disk\|\-0 900 4 \f1as break characters. .TP .BR \-r Take any leading non-blank characters of each input line to be a reference identifier (e.g., a page or chapter reference), separate from the text of the line. Attach the reference identifier as a 5th field on each output line. .PP The index for this manual was generated using .IR ptx . .SH FILES /bin/sort .br /usr/lib/eign .br /usr/lib/tmac/tmac.ptx .PD .SH SEE ALSO .PD 0 nroff(1), troff(1), mm(5), mptx(5). .PD .SH BUGS Line length counts do not account for overstriking or proportional spacing. .br Lines that contain tildes (\f3~\fP) are botched, because . I ptx uses that character internally. .\" @(#)ptx.1 1.4 riate .BR \-ha , .BR \-ba , and/or .B \-fa option is set). Default is .BR 1 . .TP 15 .BI \-d xx\^ The delimiter characters specifying the start of a logical page section may be changed from the default characters (\f3\\:\f1) to two user specified characters. If only one character is entered, the second character remains the default character (\f3:\f1). No space should appear between the .B \-d and the delimiter characters. To enter a backslash, use two backslashes. .SH EXAMPLE The command .RS 10 .PP .B "nl \-v10 \-i10 \-d!+ file1 file2" .RE .PP numbers files 1 and 2 starting at line number 10 with an increment of ten. .hy 0 The logical page delimiters are !+. .SH SEE ALSO pr(1). .\" @(#)nl.1 1.6 =  .RE .PP generates 4 tabular reports, each describing cylinder usage and seek distance of disk drive 0 during a 15-minute interval. .SH FILES /dev/kmem .\" @(#)sadp.1 1.5 .TH PWD 1 .SH NAME pwd \- working directory name .SH SYNOPSIS .B pwd .SH DESCRIPTION .I Pwd\^ prints the pathname of the working (current) directory. .SH "SEE ALSO" cd(1). .SH DIAGNOSTICS .B "Cannot open .." and .B "Read error in .." indicate possible file system trouble. These messages should be referred to a system programming counselor. .\" @(#)pwd.1 1.3 .TH NM 1 .SH NAME nm \- print name list of common object file .SH SYNOPSIS .BR nm .BR [ \-a ] .BR [ \-d ] .BR [ \-o ] .BR [ \-x ] .BR [ \-h ] .BR [ \-v ] .BR [ \-n ] .BR [ \-e ] .BR [ \-f ] .BR [ \-u ] .BR [ \-V ] .BR [ \-T ] filename(s) .SH DESCRIPTION The .I nm command displays the symbol table of each common object file .IR filename . .IR Filename may be a relocatable or absolute common object file, or it may be an archive of relocatable or absolute common object files. \fINm\fP prints the following information for each symbol. Note that the object file must have been compiled with the \f3\-g\f1 option of the \f2cc\f1(1) command for there to be \f3Type\f1, \f3Size\f1, or \f3Line\f1 information. .PP .TP 9 .I Name The name of the symbol. .TP 9 .I Value Its value expressed as an offset or an address depending on its storage class. .TP 9 .I Class Its storage class. .TP 9 .I Tv If the symbol is accessed through a transfer vector, this field contains \fBtv\fP. .TP 9 .I Type Its type and derived type. If the sy.if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH SAG 1G .SH NAME sag \- system activity graph .SH SYNOPSIS .B "sag " [ options ] .SH DESCRIPTION .I Sag graphically displays the system activity data stored in a binary data file by a previous .IR sar (1) run. Any of the .I sar data items may be plotted singly, or in combination; as cross plots, or versus time. Simple arithmetic combinations of data may be specified. .I Sag invokes .I sar and finds the desired data by string-matching the data column header (run .I sar to see what's available). The following \fIoptions\fP may be passed to .IR sar : .TP 9 \fB\-s \fItime\fR Select data later than .I time in the form hh\|[\^:mm\^]\^. Default is 08:00. .TP 9 \fB\-e \fItime\fR Select data up to .IR time . Default is 18:00. .TP 9 \fB\-i \fIsec\fR Select data at intervals as close as possible to \fIsec \fRseconds. .TP 9 \fB\-f \fIfile\fR Use \fIfile \fRas the data sourc> .TH RATFOR 1 .SH NAME ratfor \- rational FORTRAN dialect .SH SYNOPSIS .B ratfor [ options ] [ files ] .SH DESCRIPTION .I Ratfor\^ converts a rational dialect of \s-1FORTRAN\s+1 into ordinary irrational \s-1FORTRAN\s+1. .I Ratfor\^ provides control flow constructs essentially identical to those in C: .RS .TP \(bu\|\|\|statement grouping: \f3{\f2 statement\f3;\f2 statement\f3;\f2 statement\f3 }\f1 .TP \(bu\|\|\|decision-making: .nf \f3if\fP (\f2condition\f1)\f2 statement\f1 [ \f3else\f2 statement\f1 ] \f3switch\fP (\f2integer value\f1)\f3 { \f3case\f2 integer\f3:\f2 statement\f1 ... [ \f3default\fP: ] \f2statement\f1 \f3}\f1 .fi .TP \(bu\|\|\|loops: .br .nf \f3while\fP (\f2condition\f1) \f2statement\f1 \f3for\fP (\f2expression\f3;\f2 condition\f3;\f2 expression\f1)\f2 statement\f1 \f3do\f2 limits statement\f1 \f3repeat\f2 statement\f1 [ \f3until\fP (\f2condition\f1) ] \f3break\fP \f3next\fP .fi .RE .PP and some syntactic sugar to make programs easier to read and write: .RS .TP \(bu\|\|\|free form input: multmbol is an instance of a structure or a union, the structure or union tag is given following the type (e.g., \fBstruct-tag\fP). If the symbol is an array, the array dimensions are given following the type (e.g., \f3char\f1[\f3n\f1] [\f3m\f1]). .TP 9 .I Size Its size in bytes, if available. .TP 9 .I Line The source line number at which it is defined, if available. .TP 9 .I Section For storage classes static and external, the object file section containing the symbol (e.g., text, data, or bss). .DT .br .PP The output of .I nm may be controlled using the following options: .PP .TP 9 .BR \-d Print the value and size of a symbol in decimal instead of hexadecimal. .PP .TP 9 .B \-o Print the value and size of a symbol in octal instead of hexadecimal. .PP .TP 9 .B \-x Print the value and size of a symbol in hexadecimal (the default). .PP .TP 9 .B \-h Do not display the output header data. .PP .TP 9 .B \-v Sort external symbols by value before they are printed. .PP .TP 9 .B \-n Sort external symbols by name before the for \fIsar\fR. Default is the current daily data file \fB/usr/adm/sa/sa\fIdd\fR. .P Other \fIoptions\fP: .TP 9 \fB\-T \fIterm\fR Produce output suitable for terminal \fIterm\fR. See \fItplot\fR(1G) for known terminals. If .I term is .BR vpr , output is processed by .B vpr \-p and queued to a Versatec printer. Default for .I term is .BR \s-1$TERM\s+1 . .TP 9 .BI "\-x\0" spec x axis specification with .I spec in the form: .RS "name\|[op \|name]\|.\|.\|.\|[lo \|hi]" .RE .TP 9 .BI "\-y\0" spec y axis specification with .I spec in the same form as above. .P \fIName\fR is either a string that matches a column header in the \fIsar \fR report, with an optional device name in square brackets, e.g., \fBr+w/s[dsk\-1]\fR, or an integer value. \fIOp \fR is \fB + \- \(**\fR or \fB/ \fRsurrounded by blanks. Up to five names may be specified. Parentheses are not recognized. Contrary to custom, .BR "\0+\0" "and" "\0\-\0" have precedence over .BR "\0\(**\0" "and" "\0/" "." Evaluation is left to right. Thus A\0/\0A\0+\0B\0\(*iple statements/line; automatic continuation .TP \(bu\|\|\|comments: .B # \f2This is a comment.\f1 .TP \(bu\|\|\|translation of relationals: for example, .BR > , .BR >= , become .BR .\s-1GT\s+1. , .BR .\s-1GE\s+1. . .TP \(bu\|\|\|return expression to caller from function: \f3return\fP (\f2expression\f1) .TP \(bu\|\|\|define: .br .B define .I name replacement\^ .TP \(bu\|\|\|include: .br .B include .I file\^ .RE .PP The option .B \-h causes quoted strings to be turned into .B 27H constructs. The .B \-C option copies comments to the output and attempts to format it neatly. Normally, continuation lines are marked with a .B & in column 1; the option .B \-6x makes the continuation character .B x and places it in column 6. .PP .I Ratfor\^ is best used with .IR f77 (1). .SH SEE ALSO ef\&l(1), f77(1). .br B. W. Kernighan and P. J. Plauger, ``Software Tools'', Addison-Wesley, 1976. .br ``\s-1FORTRAN\s+1'' in the .IR "\*(6) Programming Guide" . .\" @(#)ratfor.1 1.6 > ey are printed. .PP .TP 9 .B \-e Print only static and external symbols. .PP .TP 9 .BR \-f Produce full output. Redundant symbols (.test, .data, .bss), normally suppressed, are printed. .PP .TP 9 .BR \-u Print undefined symbols only. .PP .TP 9 .BR \-V Print the version of the \fInm\fP command executing on the standard error output. .PP .TP 9 .BR \-T Truncate long names. By default, \fInm\fP prints the entire name of the symbols listed. Since object files can have symbol names with an arbitrary number of characters, a name that is longer than the width of the column set aside for names will overflow, forcing every column after the name to be misaligned. The \fB-T\fP option causes \fInm\fP to truncate every name which would otherwise overflow its column and place an asterisk as the last character in the displayed name to mark it as truncated. .DT .br .PP Options may be used in any order, either singly or in combination, and may appear anywhere in the command line. Therefore, both .B "nm name \-e \-v" and *\0100 is evaluated (A/(A+B))\(**100, and A\0+\0B\0/\0C\0+\0D is (A+B)/(C+D). .IR "Lo " "and " "hi " are optional numeric scale limits. If unspecified, they are deduced from the data. .P A single .I spec is permitted for the x axis. If unspecified, \fItime\fP is used. Up to 5 \fIspec\fR's separated by .B \|;\| may be given for .BR \-y . Enclose the .BR "\-x " "and " "\-y" arguments in double quotes (\fB"\|"\fR) if blanks or \fB\\\fR<\s-1CR\s+1> are included. The .B \-y default is: .PP .RS 0 \fB\-y\0"%usr\00\0100;\0%usr\0+\0%sys\00\0100;\0%usr\0+\0%sys\0+\0%wio\00\0100"\fR .RE .SH EXAMPLES To see today's .SM CPU utilization: .RS \f3sag\f1 .RE .P To see activity over 15 minutes of all disk drives: .RS \f3TS=\*`date\0+%H:%M\*`\f1 .br \f3sar\0\-o\0tempfile\060\015\f1 .br \f3TE=\*`date\0+%H:%M\*`\f1 .br \f3sag\0\-f\0tempfile\0\-s\0$TS\0\-e\0$TE\0\-y\0"r+w/s[dsk]"\f1 .RE .SH FILES .TP 22 /usr/adm/sa/sa\fIdd\fR daily data file for day \fIdd\fR. .SH SEE ALSO sar(1), tplot(1G). .\" @(#)sag.1g 1.4 .\" @(#)red.1 1.2 .so /usr/man/u_man/man1/ed.1 .B "nm \-ve name" print the static and external symbols in .IR name , with external symbols sorted by value. .SH "FILES" /usr/tmp/nm?????? .SH WARNINGS .PP When all the symbols are printed, they must be printed in the order they appear in the symbol table in order to preserve scoping information. Therefore, the .BR \-v and .BR \-n options should be used only in conjunction with the .BR \-e option. .SH "SEE ALSO" as(1), cc(1), ld(1), a.out(4), ar(4). .SH "DIAGNOSTICS" .PD 0 .PP .TP 28 .B "nm: name: cannot open" .I Name cannot be read. .PP .TP 28 .B "nm: name: bad magic" .I Name is not an appropriate common object file. .PP .TP 28 .B "nm: name: no symbols" The symbols have been stripped from .IR name . '\" \%W\% .\" @(#)nm.1 1.7 ? .TH SAR 1 .SH NAME sar \- system activity reporter .SH SYNOPSIS .B sar .RB [\| \-ubdycwaqvmA\| ] .RB [\| \-o\0 file\|] t [ n ] .PP .B sar .RB [\| \-ubdycwaqvmA\| ] .RB [\| \-s\0 time\|] .RB [\| \-e\0 time\|] .RB [\| \-i\0 sec\|] .RB [\| \-f\0 file\|] .SH DESCRIPTION .IR Sar, in the first instance, samples cumulative activity counters in the operating system at .I n intervals of .I t seconds. If the .B \-o option is specified, .I sar saves the samples in .I file in binary format. The default value of .I n is 1. In the second instance, with no sampling interval specified, .I sar extracts data from a previously recorded .IR file, either the one specified by the .B \-f option or, by default, the standard system activity daily data file .BI /usr/adm/sa/sa dd\^ for the current day .IR dd. The starting and ending times of the report can be bounded via the .B \-s and .B \-e .I time arguments of the form .IR hh [: mm [: ss ]].\^ The .B \-i option selects records at .I sec second intervals; otherwise, all intervals fo.TH REGCMP 1 .SH NAME regcmp \- regular expression compile .SH SYNOPSIS .B regcmp [ .B \- ] files .SH DESCRIPTION .IR Regcmp , in most cases, precludes the need for calling .IR regcmp (3X) from C programs. This saves both execution time and program size. The command .I regcmp\^ compiles the regular expressions in .I file\^ and places the output in .IB file .i\fR.\fP If the \fB\-\fP option is used, the output is placed in .IB file .c\fR.\fP The format of entries in .I file\^ is a name (C variable), followed by one or more blanks, followed by a regular expression enclosed in double quotes. The output of .I regcmp\^ is C source code. Compiled regular expressions are represented as .B "extern char" vectors. .IB File .i files may thus be .I included\^ into C programs, or .IB file .c files may be compiled and later loaded. In the C program which uses the .I regcmp\^ output, .IR regex ( abc , line ) applies the regular expression named .I abc\^ to .IR line . Diagnostics are self-explanatory. .SH EXAMPLES .TP "\w'tel.TH NOHUP 1 .SH NAME nohup \- run a command immune to hangups and quits .SH SYNOPSIS .B nohup command [ arguments ] .SH DESCRIPTION .I Nohup\^ executes .I command\^ with hangups and quits ignored. If output is not redirected by the user, it is sent to .BR nohup.out . If .B nohup.out is not writable in the current directory, output is redirected to .BR \s-1$HOME\s+1/nohup.out . .SH "SEE ALSO" nice(1), signal(2). .\" @(#)nohup.1 1.3 und in the data file are reported. .PP In either case, subsets of data to be printed are specified by the following options: .PP .PD 0 .TP 5 .B \-u Report .SM CPU utilization (the default): .br %usr, %sys, %wio, %idle \- portion of time running in user mode, running in system mode, idle with some process waiting for block .SM I/O, and otherwise idle. .sp .TP .B \-b Report buffer activity: .br bread/s, bwrit/s \- transfers per second of data between system buffers and disk or other block devices; .br lread/s, lwrit/s \- accesses of system buffers; .br %rcache, %wcache \- cache hit ratios, e. g., 1 \- bread/lread; .br pread/s, pwrit/s \- transfers via raw (physical) device mechanism. .sp .TP .B \-d Report activity for each block device, e. g., disk or tape drive: .br %busy, avque \- portion of time device was busy servicing a transfer request, average number of requests outstanding during that time; .br r+w/s, blks/s \- number of data transfers from or to device, number of bytes transferred in 512-byte units; ? no\ \ \ \ 'u" name ``([A\-Za\-z][A\-Za\-z0\-9\_]\(**)$0'' .TP telno ``\\({0,1}([2\-9][01][1\-9])$0\\){0,1} \(**'' .br ``([2\-9][0\-9]{2})$1[ \-]{0,1}'' .br ``([0\-9]{4})$2'' .TP In the C program that uses the \fIregcmp\fP output, .PP .RS \f3regex(telno, line, area, exch, rest)\f1 .RE .PP applies the regular expression named \f3telno\f1 to \f3line\f1. .SH SEE ALSO regcmp(3X). .\" @(#)regcmp.1 1.4 .TH NROFF 1 .SH NAME nroff \- format text .SH SYNOPSIS .B nroff [ options ] [ files ] .SH DESCRIPTION .I Nroff\^ formats text contained in .I files\^ (standard input by default) for printing on typewriter-like devices and line printers. Its capabilities are described in the ``NROFF/TROFF User's Manual'' in the .IR "\*(6) Document Processing Guide" . .PP An argument consisting of a minus .RB ( \- ) is taken to be a filename corresponding to the standard input. The .IR options , which may appear in any order, but must appear before the .IR files , are: .PP .PD 0 .TP "\w'\f3\-m\fP\f2name\fP\^\ \ 'u" .BI \-o list\^ Print only pages whose page numbers appear in the .I list\^ of numbers and ranges, separated by commas. A range .IB N \- M\^ means pages .I N\^ through .IR M ; an initial .BI \- N\^ means from the beginning to page .IR N ; and a final .IB N \- means from .I N\^ to the end. (See .SM .I BUGS\^ below.) .SP .TP .BI \-n N\^ Number first generated page .IR N . .SP .TP .BI \-s N\^ Stop every .I N\^ pages. .I .br avwait, avserv \- average time in ms. that transfer requests wait idly on queue, and average time to be serviced (which for disks includes seek, rotational latency and data transfer times). .sp .TP .B \-y Report TTY device activity: .br rawch/s, canch/s, outch/s \- input character rate, input character rate processed by canon, output character rate; .br rcvin/s, xmtin/s, mdmin/s \- receive, transmit and modem interrupt rates. .sp .TP .B \-c Report system calls: .br scall/s \- system calls of all types; .br sread/s, swrit/s, fork/s, exec/s \- specific system calls; .br rchar/s, wchar/s \- characters transferred by read and write system calls. .sp .TP .B \-w Report system swapping and switching activity: .br swpin/s, swpot/s, bswin/s, bswot/s \- number of transfers and number of 512-byte units transferred for swapins (including initial loading of some programs) and swapouts; .br pswch/s \- process switches. .sp .TP .B \-a Report use of file access system routines: .br iget/s, namei/s, dirblk/s. .sp .TP ..TH RM 1 .SH NAME rm, rmdir \- remove files or directories .SH SYNOPSIS .B rm [ .B \-fri ] file ... .PP .B rmdir dir ... .PP .SH DESCRIPTION .I Rm\^ removes the entries for one or more files from a directory. If an entry is the last link to the file, the file is destroyed. Removal of a file requires write permission in its directory, but neither read nor write permission on the file itself. .PP If a file has no write permission and the standard input is a terminal, its permissions are printed and a line is read from the standard input. If that line begins with \f3y\fP the file is deleted; otherwise, the file remains. No questions are asked when the .B \-f option is given or if the standard input is not a terminal. .PP If a designated file is a directory, an error comment is printed unless the optional argument .B \-r has been used. When \f3\-r\f1 is used, .I rm\^ recursively deletes the entire contents of the specified directory, and the directory itself. To remove a directory, you must be located at the ne@ Nroff\^ halts .I after\^ every .I N\^ pages (default .IR N =1) to allow paper loading or changing, and will resume upon receipt of a line feed or new line (new lines do not work in pipelines, e.g., with .IR mm (1)). This option does not work if the output of .I nroff\^ is piped through .IR col (1). When .I nroff\^ halts between pages, an .SM ASCII .SM .B BEL is sent to the terminal. .SP .TP .BI \-r aN\^ Set register .I a\^ (which must have a one-character name) to .IR N . .SP .TP .B \-i Read standard input after .I files\^ are exhausted. .SP .TP .B \-q Invoke the simultaneous input-output mode of the .B \&.rd request. .SP .TP .B \-z Print only messages generated by .B \&.tm (terminal message) requests. .SP .TP .BI \-m name\^ Prepend to the input .I files\^ the non-compacted (\s-1ASCII\s+1 text) macro file .BI /usr/lib/tmac/tmac. name\^\f1.\fP .SP .TP .BI \-c name\^ Prepend to the input .na .I files\^ the compacted macro files .BR /usr/lib/macros/cmp. [ nt ] .\c .RB [ dt ] .\f2name\fP\^ and .BR /usr/lib/macrosB \-q Report average queue length while occupied, and % of time occupied: .br runq-sz, %runocc \- run queue of processes in memory and runnable; .br swpq-sz, %swpocc \- swap queue of processes swapped out but ready to run. .sp .TP .B \-v Report status of text, process, inode and file tables: .br text-sz, proc-sz, inod-sz, file-sz \- entries/size for each table, evaluated once at sampling point; .br text-ov, proc-ov, inod-ov, file-ov \- overflows occurring between sampling points. .sp .TP .B \-m Report message and semaphore activities: .br msg/s, sema/s \- primitives per second. .sp .TP .B \-A Report all data. Equivalent to .BR \-udqbwcayvm . .SH EXAMPLES To see today's .SM CPU activity so far: .PP .RS .B sar .RE .PP To watch .SM CPU activity evolve for 10 minutes and save data: .PP .RS .B "sar \|\-o temp 60 10" .RE .PP To later review disk and tape activity from that period: .PP .RS .B "sar \|\-d \|\-f temp" .RE .SH FILES .TP 18 .RI /usr/adm/sa/sa dd\^ daily data file, where .I dd\^ are digits representing txt higher level (parent directory) in the directory hierarchy. You cannot be located in the directory you are trying to remove. For example, if the full pathname of a directory is \f3/top/next\f1, you must be in \f3/top\f1 to remove the directory \f3next\f1. .PP If the .B \-i (interactive) option is in effect, .I rm\^ asks whether to delete each file. The name of the file is printed on the terminal followed by a colon. If you do not want to delete the file, press the carriage return. If you do want to delete the file, type input that begins with the letter ``\f3y\f1''. The \f3\-i\f1 option can be used in combination with the \f3\-r\f1 option to interactively delete directories. When the command \f3rm \-ir\f2 directory name\f1 is given, the message \f3directory\f2 directory name\f3:\f1 is printed on the terminal. As with interactive file deletion, type either input beginning with the letter \f3y\f1 or a carriage return alone to delete or not delete a directory. .PP .I Rmdir\^ removes entries for the name/ucmp. [ nt ] .\f2name\fP\^ . .SP .ad .TP .BI \-k name\^ Compact the macros used in this invocation of .IR nroff , placing the output in files .RB [ dt ] .\f2name\fP\^ in the current directory (see the ``NROFF/TROFF User's Manual'' in the .I "\*(6) Document Processing Guide" for details of compacting macro files). .SP .TP .BI \-T name\^ Prepare output for specified terminal. Known .IR name s are .B 37 for the (default) .SM TELETYPE\*S\*R Model 37 terminal, .B tn300 for the .SM GE TermiNet\ 300 (or any terminal without half-line capability), .B 300s for the .SM DASI 300s, .B 300 for the .SM DASI 300, .B 450 for the .SM DASI 450, .B lp for a (generic) .SM ASCII line printer, .B 382 for the .SM DTC\*S-382, .B 4000A for the Trendata 4000A, .B 832 for the Anderson Jacobson 832, .B X for a (generic) .SM EBCDIC printer, and .B 2631 for the Hewlett Packard 2631 line printer. .SP .TP .B \-e Produce equally-spaced words in adjusted lines, using the full resolution of the particular terminal. .TP .B \-h Use output tabs @ he day of the month. .SH SEE ALSO sag(1G). .br sar(1M) in the .IR "\*(6) Administrator's Manual" . .\" @(#)sar.1 1.6 d directories, which must be empty. .SH SEE ALSO unlink(2). .SH DIAGNOSTICS Generally self-explanatory. It is forbidden to remove the file \f3..\fP merely to avoid the consequences of inadvertently doing something like: .PP .RS .B "rm \-r .\(**" .RE .\" @(#)rm.1 1.4 during horizontal spacing to speed output and reduce output character count. Tab settings are assumed to be every 8 nominal character widths. .SP .TP .BI \-u n\^ Set the emboldening factor (number of character overstrikes) for the third font position (bold) to .IR n , or to zero if .I n\^ is missing. .br .ne 6v .SH FILES .ta \w'/usr/lib/tmac/tmac\f3.\fP\(**\ \ 'u .PD 0 /usr/lib/suftab suffix hyphenation tables .PP /tmp/ta$# temporary file .PP /usr/lib/tmac/tmac\f3.\fP\(** standard macro files and pointers .PP /usr/lib/macros/\(** standard macro files .PP /usr/lib/term/\(** terminal driving tables for .I nroff\^ .PD .DT .SH SEE ALSO .PD 0 ``NROFF/TROFF User's Manual'' in the .I "\*(6) Document Processing Guide" .PP col(1), cw(1), eqn(1), greek(1), mm(1), tbl(1), troff(1), mm(5). .PD .SH BUGS .I Nroff believes in Eastern Standard Time; as a result, depending on the time of year and your local time zone, the date that .I nroff generates may be off by one day from your idea of what the date is. .PP When .I nroff .TH SCAT 1 .SH NAME scat \- concatenate and print files on synchronous printer .SH SYNOPSIS .B scat [ .B \-u ] [ .B \-s ] file .\|.\|. .SH DESCRIPTION .I Scat\^ reads each .I file\^ in sequence and writes it on the standard output, which is assumed to be a synchronous printer device. Thus: .PP .RS .B "scat file > /dev/sp0" .RE .PP prints the file, and: .PP .RS .B "scat file1 file2 > /dev/sp0" .RE .PP concatenates .I file1\^ and .I file2\^ and places the result on the printer. .PP If no input file is given, or if the argument .B \- is encountered, .I scat\^ reads from the standard input file. Output is buffered in 512-byte blocks unless the .B \-u option is specified. The .B \-s option makes .I scat\^ silent about non-existent files. .SH SEE ALSO cp(1), pr(1), stty(1). .SH WARNINGS .I Scat\^ uses synchronous printers in line mode with the wrap around option enabled. This means that the maximum line length is 79 characters; longer lines are wrapped back to the beginning of the next line each time the end of a pA .\" @(#)rmail.1 1.2 .so /usr/man/u_man/man1/mail.1 is used with the .BI \-o list\^ option inside a pipeline (e.g., with one or more of .IR cw (1), .IR eqn (1), and .IR tbl (1)), it may cause a harmless ``broken pipe'' diagnostic if the last page of the document is not specified in .IR list . .\" @(#)nroff.1 1.6 rinter line is reached. .\" @(#)scat.1 1.3 .TH RMDEL 1 .SH NAME rmdel \- remove a delta from an \s-1SCCS\s+1 file .SH SYNOPSIS .B rmdel .if n .ul \fB\-r\fR\c .if n .ul 0 \s-1SID\s0 files .SH DESCRIPTION .I Rmdel\^ removes the delta specified by the .SM \fISID\fP from each named \s-1SCCS\s+1 file. The delta to be removed must be the newest (most recent) delta in its branch in the delta chain of each named \s-1SCCS\s+1 file. In addition, the specified .SM \fISID\fR must not be that of a version being edited for the purpose of making a delta (i. e., if a .I p-file\^ (see .IR get (1)) exists for the named \s-1SCCS\s+1 file, the specified .SM \fISID\fR must .I not\^ appear in any entry of the .I p-file\c\^ ). .PP If a directory is named, .I rmdel\^ behaves as though each file in the directory were specified as a named file, except that non-\s-1SCCS\s+1 files (last component of the pathname does not begin with \fBs.\fR) and unreadable files are silently ignored. If a name of \fB\-\fR is given, the standard input is read; each line of the standard input is tA .TH OD 1 .SH NAME od \- octal dump .SH SYNOPSIS .B od [ .B \-bcdosx ] [ file ] [ [ .B + ]offset[ .BR ". " "][" \fBb\fR ] ] .SH DESCRIPTION .I Od\^ dumps .I file\^ in one or more formats as selected by the first argument. If the first argument is missing, .B \-o is default. The meanings of the format options are: .TP 6 .B \-b Interpret bytes in octal. .TP .B \-c Interpret bytes in \s-1ASCII\s0. Certain non-graphic characters appear as C escapes: null=\f3\e\|0\fP, backspace=\f3\e\|b\fP, form feed=\f3\e\|f\fP, new line=\f3\e\|n\fP, return=\f3\e\|r\fP, tab=\f3\e\|t\fP; others appear as 3-digit octal numbers. .TP .B \-d Interpret words in unsigned decimal. .TP .B \-o Interpret words in octal. .TP .B \-s Interpret 16-bit words in signed decimal. .TP .B \-x Interpret words in hex. .PP The .I file\^ argument specifies which file is to be dumped. If no file argument is specified, the standard input is used. .PP The offset argument specifies the offset in the file where dumping is to commence. This argument is n.TH SCC 1 .SH NAME scc \- C compiler for stand-alone programs .SH SYNOPSIS .B scc [ .B +\c [ lib ] ] [ option ] ... [ file ] ... .SH DESCRIPTION .I Scc\^ prepares the named files for stand-alone execution. The .I option\^ and .I file\^ arguments may be anything that can legally be used with the .I cc\^ command; it should be noted, though, that the .B \-p (profiling) option, as well as any object module that contains system calls, causes the executable not to run. .PP .I Scc\^ defines the compiler constant, .BR \s-1STANDALONE\s+1 , so that sections of C programs may be compiled conditionally when the executable is run stand-alone. .PP The first argument specifies an auxiliary library that defines the device configuration of the computer for which the stand-alone executable is being prepared. .I Lib\^ may be one of the following: .TP 8 .B A .SM RP\*S04/05/06 disk and .SM TU\*S16 magnetic tape, or equivalent on the \s-1PDP\s+1-11 plus \s-1RM\s+105 and \s-1RM\s+180 disks, and \s-1TU\s+178 and \s-1TS\s+111 tapes, aken to be the name of an \s-1SCCS\s+1 file to be processed; non-\s-1SCCS\s+1 files and unreadable files are silently ignored. .PP The exact permissions necessary to remove a delta are documented in the ``Source Code Control System User's Guide''. Simply stated, if you make a delta you can remove it; if you own the file and directory you can remove a delta. .SH FILES .PD 0 .TP 10 x-file (see .IR delta (1)) .TP 10 z-file (see .IR delta (1)) .PD .SH "SEE ALSO" delta(1), get(1), help(1), prs(1), sccsfile(4). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .br .SH DIAGNOSTICS Use .IR help (1) for explanations. .\" @(#)rmdel.1 1.5 ormally interpreted as octal bytes. If \fB.\fR is appended, the offset is interpreted in decimal. If \fBb\fR is appended, the offset is interpreted in blocks of 512 bytes. If the file argument is omitted, the offset argument must be preceded by .BR + . .PP Dumping continues until end-of-file. .PP An asterisk (*) appearing on a line by itself in the output indicates that the previous line is repeated until the next full line. This output commonly occurs when \fIod\fR is used on a file that contains multiple nulls. .SH "SEE ALSO" dump(1). .\" @(#)od.1 1.5 B or equivalent .TP .B B \s-1RK\s+111/\s-1RK\s+105 disk, \s-1RP\s+111/\s-1RP\s+103 disk, and \s-1TM\s+111/\s-1TU\s+116 magnetic tape, or equivalent .PP If no .BI + lib\^ argument is specified, .B +A is assumed. If the .B + argument is specified alone, no configuration library is loaded unless the user supplies his own. .SH FILES .nr t1 \w'/usr/lib/lib2A.a ' .nr t2 \n(t1+\w'+A configuration library ' .ta \n(t1u \n(t2u /lib/crt2.o execution start-off .br /usr/lib/lib2.a stand-alone library .br /usr/lib/lib2A.a +A configuration library (\s-1PDP\s+1-11 only) .br /usr/lib/lib2B.a +B configuration library (\s-1PDP\s+1-11 only) .SH SEE ALSO cc(1), ld(1), a.out(4). .\" @(#)scc.1 1.4 .\" @(#)rmdir.1 1.2 .so /usr/man/u_man/man1/rm.1 .\" @(#)osdd.1 1.2 .so /usr/man/u_man/man1/mm.1 .TH SCCSDIFF 1 .SH NAME sccsdiff \- compare two versions of an \s-1SCCS\s+1 file .SH SYNOPSIS .B sccsdiff .BR \-r \s-1SID\s+1\&1 .BR \-r \s-1SID\s+1\&2 .RB [ \-p ] .RB [ \-s n] files .SH DESCRIPTION .I Sccsdiff\^ compares two versions of an .SM SCCS file and generates the differences between the two versions. Any number of .SM SCCS files may be specified, but arguments apply to all files. .RS 5 .TP 12 .BI \-r \s-1SID\s+1?\^ .IR \s-1SID\s+11 \ and \ \s-1SID\s+12 \ specify the deltas of an .SM SCCS file that are to be compared. Versions are passed to .IR bdiff (1) in the order given. .TP 12 .B \-p pipe output for each file through .IR pr (1). .TP 12 .BI \-s n\^ \fIn\fP is the file segment size that .I bdiff\^ will pass to .IR diff (1). This is useful when .I diff\^ fails due to a high system load. .SH FILES .TP "\w'/tmp/get?????\ \ 'u" /tmp/get????? Temporary files .SH "SEE ALSO" bdiff(1), get(1), help(1), pr(1). .br ``Source Code Control System'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS .I file: .B "NB .\" @(#)rsh.1 1.2 .so /usr/man/u_man/man1/sh.1 .TH PACK 1 .SH NAME pack, pcat, unpack \- compress and expand files .SH SYNOPSIS .B pack [ .B \- ] name .\|.\|. .PP .B pcat name .\|.\|. .PP .B unpack name .\|.\|. .SH DESCRIPTION .I Pack\^ attempts to store the specified files in a compressed form. Wherever possible (and useful), each input .RI file name\^ is replaced by a packed file ( .IB name .z ) with the same access modes, access and modified dates, and owner as those of .IR name . If .I pack\^ is successful, .I name\^ is removed. Packed files can be restored to their original form using .I unpack\^ or .IR pcat . .PP .I Pack\^ uses Huffman (minimum redundancy) codes on a byte-by-byte basis. If the .B \- argument is used, an internal flag is set that causes the number of times each byte is used, its relative frequency, and the code for the byte to be printed on the standard output. Additional occurrences of .B \- in place of .I name\^ cause the internal flag to be set and reset. .PP The amount of compression obtained depends on the size of the input filo differences" means the two versions are the same. .sp Use .IR help (1) for explanations. .PD .\" @(#)sccsdiff.1 1.6 .TH SACT 1 .SH NAME sact \- print current \s-1SCCS\s+1 file editing activity .SH SYNOPSIS .B sact files .SH DESCRIPTION .I Sact\^ informs the user of any impending deltas to a named .SM SCCS file. This situation occurs when .IR get (1) with the .B \-e option has been previously executed without a subsequent execution of .IR delta (1). If a directory is named on the command line, .I sact\^ behaves as though each file in the directory were specified as a named file, except that non-\s-1SCCS\s+1 files and unreadable files are silently ignored. If a name of .B \- is given, the standard input is read with each line being taken as the name of an .SM SCCS file to be processed. .P The output for each named file consists of five fields separated by spaces. .RS 5 .TP 12 Field 1 specifies the .SM SID of a delta that currently exists in the .SM SCCS file to which changes will be made to make the new delta. .TP 12 Field 2 specifies the .SM SID for the new delta to be created. .TP 12 Field 3 contains the login id of the usC e and the character frequency distribution. Because a decoding tree forms the first part of each .B .z file, it is usually not worthwhile to pack files smaller than three blocks, unless the character frequency distribution is very skewed, which may occur with printer plots or pictures. .PP Typically, text files are reduced to 60-75% of their original size. Load modules, which use a larger character set and have a more uniform distribution of characters, show little compression, the packed versions being about 90% of the original size. .PP .I Pack\^ returns a value that is the number of files that it failed to compress. .PP No packing occurs if: .PP .RS a. the file appears to be already packed; .br b. the filename has more than 12 characters; .br c. the file has links; .br d. the file is a directory; .br e. the file cannot be opened; .br f. no disk storage blocks will be saved by packing; .br g. a file called .IB name .z already exists; .br h. the .B .z file cannot be created; or .br i. an I/O error o.TH SDB 1 .SH NAME sdb \- symbolic debugger .SH SYNOPSIS .B sdb [\fB\-w\fR] [\fB\-W\fR] [ objfil [ corfil [ directory ] ] ] .SH DESCRIPTION .I Sdb\^ is a symbolic debugger which can be used with C and F77 programs. It may be used to examine their object files and core files and to provide a controlled environment for their execution. .PP .I Objfil\^ is normally an executable program file which has been compiled with the .B \-g (debug) option; if it has not been compiled with the .B \-g option, or if it is not an executable file, the symbolic capabilities of .I sdb\^ are limited, but the file can still be examined and the program debugged. The default for .I objfil\^ is .BR a.out . .I Corfil\^ is assumed to be a core image file produced after executing .IR objfil ; the default for .I corfil\^ is .BR core . The core file need not be present. A .B \- in place of .I corfil\^ forces .I sdb\^ to ignore any core image file. Source files used in constructing .I objfil\^ must be in .I directory to be located. .PP It ier who will make the delta (i.e., executed a .I get\^ for editing). .TP 12 Field 4 contains the date that .B "get \-e" was executed. .TP 12 Field 5 contains the time that .B "get \-e" was executed. .SH "SEE ALSO" delta(1), get(1), unget(1). .br ``Source Code Control System User's Guide'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS Use .IR help (1) for explanations. .\" @(#)sact.1 1.6 ccurred during processing. .PP .RE The last segment of the filename must contain no more than 12 characters to allow space for the appended .B .z extension. Directories cannot be compressed. .PP .I Pcat\^ does for packed files what .IR cat (1) does for ordinary files. The specified files are unpacked and written to the standard output. Thus to view a packed file named .IB name .z use: .PP .RS \f3pcat name.z\f1 .RE or just: .RS \f3pcat name\f1 .PP .RE To make an unpacked copy, .IR nnn , of a packed file named .IB name .z (without destroying \f2name\^\fP\f3.z\fP), use the command: .PP .RS \f3pcat name >\f2nnn\f1 .PP .RE .I Pcat\^ returns the number of files it was unable to unpack. Failure may occur if: .PP .RS a. the filename (exclusive of the .BR .z ) has more than 12 characters; .br b. the file cannot be opened; or .br c. the file does not appear to be the output of .IR pack . .RE .PP .I Unpack\^ expands files created by .IR pack . For each .RI file name specified in the command, a search is made for aC s useful to know that at any time there is a .I "current line\^" and .IR "current file" . If .I corfil\^ exists then they are initially set to the line and file containing the source statement at which the process terminated. Otherwise, they are set to the first line in .BR main (). The current line and file may be changed with the source file examination commands. .PP By default, warnings are provided if the source files used in producing .I objfil cannot be found or are newer than .IR objfil . This checking feature and the accompanying warnings may be disabled by the use of the .B \-W flag. .PP Names of variables are written just as they are in C or F77. Variables local to a procedure may be accessed using the form .IB procedure : variable\fR. If no procedure name is given, the procedure containing the current line is used by default. .P It is also possible to refer to structure members as .IB variable . member\fR, pointers to structure members as .IB variable \(mi> member , and array elements as .IB variab.TH SADP 1 .SH NAME sadp \- disk access profiler .SH SYNOPSIS .B sadp [ .B \-th ] [ .B \-d device[\|\-drive] ] s [ n ] .SH DESCRIPTION .I Sadp reports disk access location and seek distance, in tabular or histogram form. It samples disk activity once every second during an interval of .I s seconds. This is done repeatedly if .I n is specified. Cylinder usage and disk distance are recorded in units of eight cylinders. .PP The only valid value of .I device is .BR disk. .I Drive specifies the disk drives and it may be: a drive number in the range supported by .IR device , two numbers separated by a minus (indicating an inclusive range), or a list of drive numbers separated by commas. .PP Up to eight disk drives may be reported. The .B \-d option may be omitted, if only one .I device is present. .PP The .B \-t flag causes the data to be reported in tabular form. The .B \-h flag produces a histogram of the data on the printer. Default is .BR \-t . .SH EXAMPLE The command: .PP .RS \f3sadp \|\-d disk\|\-0 900 4 \f1 file called .IB name .z (or just .IR name , if .I name\^ ends in .BR .z ). If this file appears to be a packed file, it is replaced by its expanded version. The new file has the .B .z suffix stripped from its name, and has the same access modes, access and modification dates, and owner as those of the packed file. .PP .I Unpack\^ returns a value that is the number of files it was unable to unpack. Failure may occur for the same reasons that it may in .IR pcat , as well as for the following: .PP .RS a. a file with the ``unpacked'' name already exists; or .br b. the unpacked file cannot be created. .PP .RE .SH "SEE ALSO" cat(1) .\" @(#)pack.1 1.4 le [ number ]\fR. Pointers may be dereferenced by using the form \fIpointer\fB[\fR0\fB]\fR. Combinations of these forms may also be used. F77 common variables may be referenced by using the name of the common block instead of the structure name. Blank common variables may be named by the form .BI . variable\fR. A number may be used in place of a structure variable name, in which case the number is viewed as the address of the structure, and the template used for the structure is that of the last structure referenced by .I sdb\fR. An unqualified structure variable may also be used with various commands. Generally, .I sdb interprets a structure as a set of variables; thus, it displays the values of all the elements of a structure when it is requested to display a structure. An exception to this interpretation occurs when displaying variable addresses. An entire structure does have an address, and it is this value .I sdb displays, not the addresses of individual elements. .P Elements of a multidimensional arrayD  .RE .PP generates 4 tabular reports, each describing cylinder usage and seek distance of disk drive 0 during a 15-minute interval. .SH FILES /dev/kmem .\" @(#)sadp.1 1.5 .TH PASSWD 1 .SH NAME passwd \- change login password .SH SYNOPSIS .B passwd name .SH DESCRIPTION This command changes (or installs) a password associated with the login .IR name . .PP The program prompts for the old password (if any) and then for the new one (twice). The caller must supply these. New passwords should be at least four characters long if they use a sufficiently rich alphabet and at least six characters long if monocase. Only the first eight characters of the password are significant. .PP Only the owner of the name or the superuser may change a password; the owner must prove he knows the old password. Only the superuser can create a null password. .PP The password file is not changed if the new password is the same as the old password, or if the password has not ``aged'' sufficiently; see .IR passwd (4). .SH FILES /etc/passwd .SH "SEE ALSO" login(1), crypt(3C), passwd(4). .\" @(#)passwd.1 1.3  may be referenced as .IB variable [ number ][ number ]...\fR, or as .IB variable [ number,number,... ]\fR. In place of .I number\fR, the form .IB number ; number may be used to indicate a range of values, .B \(** may be used to indicate all legitimate values for that subscript, or subscripts may be omitted entirely if they are the last subscripts and the full range of values is desired. As with structures, .I sdb displays all the values of an array or of the section of an array if trailing subscripts are omitted. It displays only the address of the array itself or of the section specified by the user if subscripts are omitted. A multidimensional parameter in an F77 program cannot be displayed as an array, but it is actually a pointer, whose value is the location of the array. The array itself can be accessed symbolically from the calling function. .P A particular instance of a variable on the stack may be referenced by using the form .IB procedure : variable , number\fR. All the variations mentioned in namin.if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .TH SAG 1G .SH NAME sag \- system activity graph .SH SYNOPSIS .B "sag " [ options ] .SH DESCRIPTION .I Sag graphically displays the system activity data stored in a binary data file by a previous .IR sar (1) run. Any of the .I sar data items may be plotted singly, or in combination; as cross plots, or versus time. Simple arithmetic combinations of data may be specified. .I Sag invokes .I sar and finds the desired data by string-matching the data column header (run .I sar to see what's available). The following \fIoptions\fP may be passed to .IR sar : .TP 9 \fB\-s \fItime\fR Select data later than .I time in the form hh\|[\^:mm\^]\^. Default is 08:00. .TP 9 \fB\-e \fItime\fR Select data up to .IR time . Default is 18:00. .TP 9 \fB\-i \fIsec\fR Select data at intervals as close as possible to \fIsec \fRseconds. .TP 9 \fB\-f \fIfile\fR Use \fIfile \fRas the data sourcD paste.1pcat.1pcc.1pdp11.1pr.1prof.1prs.1ps.1ptx.1pwd.1ratfor.1red.1regcmp.1rm.1rmail.1rmdel.1rmdir.1rsh.1sact.1sadp.1sag.1gsar.1scat.1scc.1sccsdiff.1sdb.1sdiff.1g variables may be used. .IB Number\^ is the occurrence of the specified procedure on the stack, counting the top, or most current, as the first. If no procedure is specified, the procedure currently executing is used by default. .PP It is also possible to specify a variable by its address. All forms of integer constants which are valid in C may be used, so that addresses may be input in decimal, octal, or hexadecimal. .PP Line numbers in the source program are referred to as .IB file-name : number or .IB procedure : number\fR. In either case the number is relative to the beginning of the file. If no procedure or filename is given, the current file is used by default. If no number is given, the first line of the named procedure or file is used. .PP While a process is running under .IR sdb all addresses refer to the executing program; otherwise they refer to .I objfil\^ or .I corfil\^. An initial argument of .B \-w permits overwriting locations in .I objfil\^. .SS Addresses. The address in a file associated we for \fIsar\fR. Default is the current daily data file \fB/usr/adm/sa/sa\fIdd\fR. .P Other \fIoptions\fP: .TP 9 \fB\-T \fIterm\fR Produce output suitable for terminal \fIterm\fR. See \fItplot\fR(1G) for known terminals. If .I term is .BR vpr , output is processed by .B vpr \-p and queued to a Versatec printer. Default for .I term is .BR \s-1$TERM\s+1 . .TP 9 .BI "\-x\0" spec x axis specification with .I spec in the form: .RS "name\|[op \|name]\|.\|.\|.\|[lo \|hi]" .RE .TP 9 .BI "\-y\0" spec y axis specification with .I spec in the same form as above. .P \fIName\fR is either a string that matches a column header in the \fIsar \fR report, with an optional device name in square brackets, e.g., \fBr+w/s[dsk\-1]\fR, or an integer value. \fIOp \fR is \fB + \- \(**\fR or \fB/ \fRsurrounded by blanks. Up to five names may be specified. Parentheses are not recognized. Contrary to custom, .BR "\0+\0" "and" "\0\-\0" have precedence over .BR "\0\(**\0" "and" "\0/" "." Evaluation is left to right. Thus A\0/\0A\0+\0B\0\(*.TH PASTE 1 .SH NAME paste \- merge same lines of several files or subsequent lines of one file .SH SYNOPSIS \f3paste \fPfile1 file2 .\|.\|. .br \f3paste \-d\fP\|list file1 file2 .\|.\|. .br \f3paste \-s [\-d\fP\|list\|\f3] \fPfile1 file2 .\|.\|. .SH DESCRIPTION In the first two forms, .I paste\^ concatenates corresponding lines of the given input files .IR file1 , .IR file2 , etc. It treats each file as a column or columns of a table and pastes them together horizontally (parallel merging). .I Paste is the counterpart of .IR cat (1) which concatenates vertically, i.e., one file after the other. In the last form above, .I paste\^ subsumes the function of an older command with the same name by combining subsequent lines of the input file (serial merging). In all cases, lines are glued together with the .I tab\^ character, or with characters from an optionally specified .IR list . Output is to the standard output, so it can be used as the start of a pipe, or as a filter, if \f3\-\fP is used in place of a filenaE ith a written address is determined by a mapping associated with that file. Each mapping is represented by two triples .RI ( "b1, e1, f1" ) and .RI ( "b2, e2, f2" ). The .I file address\^ corresponding to a written .I address\^ is calculated as follows: .PP .RS .IR b1 \*(LE address < e1 \*(IM .IR "file address" = address + f1\-b1 .RE otherwise .PP .RS .IR b2 \*(LE address < e2 \*(IM .IR "file address" = address + f2\-b2, .RE .PP otherwise, the requested .I address\^ is not legal. In some cases (e.g., for programs with separated I and D space) the two segments for a file may overlap. .PP The initial setting of both mappings is suitable for normal .B a.out and .B core files. If either file is not of the kind expected then, for that file, .I b1\^ is set to 0, .I e1\^ is set to the maximum file size, and .I f1\^ is set to 0; in this way the whole file can be examined with no address translation. .PP In order for .I sdb\^ to be used on large files, all appropriate values are kept as signed 32-bit integers. .SS C*\0100 is evaluated (A/(A+B))\(**100, and A\0+\0B\0/\0C\0+\0D is (A+B)/(C+D). .IR "Lo " "and " "hi " are optional numeric scale limits. If unspecified, they are deduced from the data. .P A single .I spec is permitted for the x axis. If unspecified, \fItime\fP is used. Up to 5 \fIspec\fR's separated by .B \|;\| may be given for .BR \-y . Enclose the .BR "\-x " "and " "\-y" arguments in double quotes (\fB"\|"\fR) if blanks or \fB\\\fR<\s-1CR\s+1> are included. The .B \-y default is: .PP .RS 0 \fB\-y\0"%usr\00\0100;\0%usr\0+\0%sys\00\0100;\0%usr\0+\0%sys\0+\0%wio\00\0100"\fR .RE .SH EXAMPLES To see today's .SM CPU utilization: .RS \f3sag\f1 .RE .P To see activity over 15 minutes of all disk drives: .RS \f3TS=\*`date\0+%H:%M\*`\f1 .br \f3sar\0\-o\0tempfile\060\015\f1 .br \f3TE=\*`date\0+%H:%M\*`\f1 .br \f3sag\0\-f\0tempfile\0\-s\0$TS\0\-e\0$TE\0\-y\0"r+w/s[dsk]"\f1 .RE .SH FILES .TP 22 /usr/adm/sa/sa\fIdd\fR daily data file for day \fIdd\fR. .SH SEE ALSO sar(1), tplot(1G). .\" @(#)sag.1g 1.4 me. .PP The meanings of the options are: .TP .B "\-d" Replace the .I tab\^ character by one or more alternate characters specified in .IR list . Without this option, the new-line characters of each but the last file (or last line in case of the .B \-s option) are replaced by a .I tab\^ character. .TP .I "list\^" One or more characters immediately following .B \-d replace the default .I tab\^ as the line concatenation character. The list is used circularly; i.e., when exhausted, it is reused. In parallel merging (i.e., no .B \-s option), the lines from the last file are always terminated with a new-line character, not from the .IR list . The list may contain the special escape sequences: .B \e\|n (new line), .B \e\|t (tab), .B \e\e (backslash), and .B \e\|0 (empty string, not a null character). Quoting may be necessary if characters have special meaning to the shell (e.g., to get one backslash, use .B \-d\|``\e\e\e\e'' ). .TP .B "\-s" Merge subsequent lines rather than one from each input file. Use .I tab\^ foommands. .PP The commands for examining data in the program are: .TP 5 .B t Print a stack trace of the terminated or halted program. .TP 5 .B T Print the top line of the stack trace. .TP 5 .IB variable / clm Print the value of .I variable\^ according to length .I l\^ and format .IR m . A numeric count .I c indicates that a region of memory, beginning at the address implied by .IR variable , is to be displayed. The length specifiers are: .RS .RS .PD 0 .TP .BI b\^ one byte .TP .BI h\^ two bytes (half word) .TP .BI l\^ four bytes (long word) .RE .PD .br .ne 5 .PP Legal values for .I m\^ are: .RS .PD 0 .TP .BI c\^ character .TP .BI d\^ decimal .TP .BI u\^ decimal, unsigned .TP .BI o\^ octal .TP .BI x\^ hexadecimal .TP .BI f\^ 32-bit single precision floating point .TP .BI g\^ 64-bit double precision floating point .TP .BI s\^ Assume .I variable\^ is a string pointer and print characters starting at the address pointed to by the variable. .TP .BI a\^ Print characters starting at the variable's address. This formaE .TH SAR 1 .SH NAME sar \- system activity reporter .SH SYNOPSIS .B sar .RB [\| \-ubdycwaqvmA\| ] .RB [\| \-o\0 file\|] t [ n ] .PP .B sar .RB [\| \-ubdycwaqvmA\| ] .RB [\| \-s\0 time\|] .RB [\| \-e\0 time\|] .RB [\| \-i\0 sec\|] .RB [\| \-f\0 file\|] .SH DESCRIPTION .IR Sar, in the first instance, samples cumulative activity counters in the operating system at .I n intervals of .I t seconds. If the .B \-o option is specified, .I sar saves the samples in .I file in binary format. The default value of .I n is 1. In the second instance, with no sampling interval specified, .I sar extracts data from a previously recorded .IR file, either the one specified by the .B \-f option or, by default, the standard system activity daily data file .BI /usr/adm/sa/sa dd\^ for the current day .IR dd. The starting and ending times of the report can be bounded via the .B \-s and .B \-e .I time arguments of the form .IR hh [: mm [: ss ]].\^ The .B \-i option selects records at .I sec second intervals; otherwise, all intervals for concatenation, unless a .I list\^ is specified with the .B \-d option. Regardless of the .IR list , the last character of the file is forced to be a new line. .TP .B "\-" May be used in place of any filename, to read a line from the standard input. (There is no prompting). .SH EXAMPLES .TP 15m \f3ls \|\(bv\| paste \|\-d``\|'' \|\-\f1 list directory in one column .TP \f3ls \|\(bv\| paste \|\- \|\- \|\- \|\-\f1 list directory in four columns .TP \f3paste \|\-s \|\-d``\e\|t\e\|n'' \|file\f1 combine pairs of lines into lines .SH "SEE ALSO" grep(1), cut(1), .br pr(1): .BR "pr \-t \-m" .\|.\|. works similarly, but creates extra blanks, tabs and new lines for a nice page layout. .SH DIAGNOSTICS .TP 17 .B "line too long\^" Output lines are restricted to 511 characters. .TP 17 .B "too many files\^" Except for the .B \-s option, no more than 12 input files may be specified. .\" @(#)paste.1 1.6 t may not be used with register variables. .TP .BI p\^ pointer to procedure .TP .BI i\^ Disassemble machine-language instruction with addresses printed numerically and symbolically. .TP .BI I\^ Disassemble machine-language instruction with addresses printed numerically only. .RE .PD The length specifiers are only effective with the formats \fBc\fP, \fBd\fP, \fBu\fP, \fBo\fP and \fBx\fP. Any of the specifiers, \fIc\fP, \fIl\fP, and \fIm\fP, may be omitted. If all are omitted, .I sdb chooses a length and a format suitable for the variable's type, as declared in the program. If .I m is specified, then this format is used for displaying the variable. A length specifier determines the output length of the value to be displayed, sometimes resulting in truncation. A count specifier .I c tells .I sdb to display that many units of memory, beginning at the address of .IR variable . The number of bytes in one such unit of memory is determined by the length specifier .IR l , or, if no length is given, by the size associaund in the data file are reported. .PP In either case, subsets of data to be printed are specified by the following options: .PP .PD 0 .TP 5 .B \-u Report .SM CPU utilization (the default): .br %usr, %sys, %wio, %idle \- portion of time running in user mode, running in system mode, idle with some process waiting for block .SM I/O, and otherwise idle. .sp .TP .B \-b Report buffer activity: .br bread/s, bwrit/s \- transfers per second of data between system buffers and disk or other block devices; .br lread/s, lwrit/s \- accesses of system buffers; .br %rcache, %wcache \- cache hit ratios, e. g., 1 \- bread/lread; .br pread/s, pwrit/s \- transfers via raw (physical) device mechanism. .sp .TP .B \-d Report activity for each block device, e. g., disk or tape drive: .br %busy, avque \- portion of time device was busy servicing a transfer request, average number of requests outstanding during that time; .br r+w/s, blks/s \- number of data transfers from or to device, number of bytes transferred in 512-byte units; F .\" @(#)pcat.1 1.2 .so /usr/man/u_man/man1/pack.1 ted with the .IR variable. If a count specifier is used for the .B s or .B a command, then that many characters are printed. Otherwise successive characters are printed until either a null byte is reached or 128 characters are printed. The last variable may be redisplayed with the command .BR ./ . .PP The .IR sh (1) metacharacters .B \(** and .B ? may be used within procedure and variable names, providing a limited form of pattern matching. If no procedure name is given, variables local to the current procedure and global variables are matched; if a procedure name is specified, only variables local to that procedure are matched. To match only global variables, the form .BI : pattern\^ is used. .RE .TP 5 .PD 0 .IB linenumber ? lm .TP 5 \fIvariable:\fB?\fIlm\fR .PD Print the value at the address from .BR a.out or I space given by .I linenumber\^ or .IR variable (procedure name), according to the format .IR lm . The default format is `i'. .TP 5 .PD 0 .IB variable = lm .TP 5 .IB linenumber = lm .TP 5 .IB number .br avwait, avserv \- average time in ms. that transfer requests wait idly on queue, and average time to be serviced (which for disks includes seek, rotational latency and data transfer times). .sp .TP .B \-y Report TTY device activity: .br rawch/s, canch/s, outch/s \- input character rate, input character rate processed by canon, output character rate; .br rcvin/s, xmtin/s, mdmin/s \- receive, transmit and modem interrupt rates. .sp .TP .B \-c Report system calls: .br scall/s \- system calls of all types; .br sread/s, swrit/s, fork/s, exec/s \- specific system calls; .br rchar/s, wchar/s \- characters transferred by read and write system calls. .sp .TP .B \-w Report system swapping and switching activity: .br swpin/s, swpot/s, bswin/s, bswot/s \- number of transfers and number of 512-byte units transferred for swapins (including initial loading of some programs) and swapouts; .br pswch/s \- process switches. .sp .TP .B \-a Report use of file access system routines: .br iget/s, namei/s, dirblk/s. .sp .TP ..\" @(#)pcc.1 1.2 .so /usr/man/u_man/man1/cc.1 F = lm .PD Print the address of .I variable\^ or .IR linenumber , or the value of .IR number , in the format specified by .IR lm . If no format is given, then .B lx is used. The last variant of this command provides a convenient way to convert between decimal, octal and hexadecimal. .TP 5 .IB variable ! value Set .I variable\^ to the given .IR value . The value may be a number, a character constant or a variable. The value must be well defined; expressions that produce more than one value, such as structures, are not allowed. Character constants are denoted .BI ' character\fR. Numbers are viewed as integers unless a decimal point or exponent is used. In this case, they are treated as having the type double. Registers are viewed as integers. The .I variable may be an expression that indicates more than one variable, such as an array or structure name. If the address of a variable is given, it is regarded as the address of a variable of type .IR int . C conventions are used in any type conversions necessary to peB \-q Report average queue length while occupied, and % of time occupied: .br runq-sz, %runocc \- run queue of processes in memory and runnable; .br swpq-sz, %swpocc \- swap queue of processes swapped out but ready to run. .sp .TP .B \-v Report status of text, process, inode and file tables: .br text-sz, proc-sz, inod-sz, file-sz \- entries/size for each table, evaluated once at sampling point; .br text-ov, proc-ov, inod-ov, file-ov \- overflows occurring between sampling points. .sp .TP .B \-m Report message and semaphore activities: .br msg/s, sema/s \- primitives per second. .sp .TP .B \-A Report all data. Equivalent to .BR \-udqbwcayvm . .SH EXAMPLES To see today's .SM CPU activity so far: .PP .RS .B sar .RE .PP To watch .SM CPU activity evolve for 10 minutes and save data: .PP .RS .B "sar \|\-o temp 60 10" .RE .PP To later review disk and tape activity from that period: .PP .RS .B "sar \|\-d \|\-f temp" .RE .SH FILES .TP 18 .RI /usr/adm/sa/sa dd\^ daily data file, where .I dd\^ are digits representing t.\" @(#)pdp11.1 1.2 .so /usr/man/u_man/man1/machid.1 8;>ADGJMPG 2}zwtqnkheb_\Y|yvspmjgda^[X{xurolifc`]ZWTQNKHEB?<9.TH PR 1 .SH NAME pr \- print files .SH SYNOPSIS .B pr [ options ] [ files ] .SH DESCRIPTION .I Pr\^ prints the named files on the standard output. If .I file\^ is .BR \- , or if no files are specified, the standard input is assumed. By default, the listing is separated into pages, each headed by the page number, a date and time, and the name of the file. .PP By default, columns are of equal width, separated by at least one space; lines which do not fit are truncated. If the .B \-s option is used, lines are not truncated and columns are separated by the separation character. .PP If the standard output is associated with a terminal, error messages are withheld until .I pr\^ has completed printing. .PP The \fIoptions\fP below may appear singly or be combined in any order: .TP .BI + k\^ Begin printing with page .I k\^ (default is 1). .TP .BI \- k\^ Produce .IR k -column output (default is 1). The options .B \-e and .B \-i are assumed for multi-column output. .TP .B \-a Print multi-column output across the page. rform the indicated assignment. .TP 5 .B x Print the machine registers and the current machine-language instruction. .TP 5 .B X Print the current machine-language instruction. .PP The commands for examining source files are: .PP .PD 0 .TP 5 .BI "e " procedure\^ .TP 5 .BI "e " file-name\^ .TP 5 .BI "e " directory/\^ .TP 5 .BI "e " "directory file-name"\^ .PD The first two forms set the current file to the file containing .I procedure\^ or to .IR file-name . The current line is set to the first line in the named procedure or file. Source files are assumed to be in .IR directory . The default is the current working directory. The latter two forms change the value of .IR directory . If no procedure, filename, or directory is given, the current procedure name and filename are reported. .TP 5 .BI / "regular expression" / Search forward from the current line for a line containing a string matching .I regular expression\^ as in .IR ed (1). The trailing .B / may be elided. .TP 5 .BI ? "regular expression" ? Search ba.TH SCAT 1 .SH NAME scat \- concatenate and print files on synchronous printer .SH SYNOPSIS .B scat [ .B \-u ] [ .B \-s ] file .\|.\|. .SH DESCRIPTION .I Scat\^ reads each .I file\^ in sequence and writes it on the standard output, which is assumed to be a synchronous printer device. Thus: .PP .RS .B "scat file > /dev/sp0" .RE .PP prints the file, and: .PP .RS .B "scat file1 file2 > /dev/sp0" .RE .PP concatenates .I file1\^ and .I file2\^ and places the result on the printer. .PP If no input file is given, or if the argument .B \- is encountered, .I scat\^ reads from the standard input file. Output is buffered in 512-byte blocks unless the .B \-u option is specified. The .B \-s option makes .I scat\^ silent about non-existent files. .SH SEE ALSO cp(1), pr(1), stty(1). .SH WARNINGS .I Scat\^ uses synchronous printers in line mode with the wrap around option enabled. This means that the maximum line length is 79 characters; longer lines are wrapped back to the beginning of the next line each time the end of a pG .TP .B \-m Merge and print all files simultaneously, one per column (overrides the \f3\-\fP\fIk\fP, and .B \-a options). .TP .B \-d Double-space the output. .TP .BI \-e ck\^ Expand .I input\^ tabs to character positions .IR k "+1, 2\(**" k "+1, 3\(**" k +1, etc. If .I k\^ is 0 or is omitted, default tab settings at every eighth position are assumed. Tab characters in the input are expanded into the appropriate number of spaces. If .I c\^ (any non-digit character) is given, it is treated as the input tab character (default for .I c\^ is the tab character). .TP .BI \-i ck\^ In .IR output , replace white space wherever possible by inserting tabs to character positions .IR k "+1, 2\(**" k "+1, 3\(**" k +1, etc. If .I k\^ is 0 or is omitted, default tab settings at every eighth position are assumed. If .I c\^ (any non-digit character) is given, it is treated as the output tab character (default for .I c\^ is the tab character). .TP .BI \-n ck\^ Provide .IR k -digit line numbering (default for .I k\^ is 5). The numckward from the current line for a line containing a string matching .I regular expression\^ as in .IR ed (1). The trailing .B ? may be elided. .TP 5 .B p Print the current line. .TP 5 .B z Print the current line followed by the next 9 lines. Set the current line to the last line printed. .TP 5 .B w Window. Print the 10 lines around the current line. .TP 5 .I number\^ Set the current line to the given line number. Print the new current line. .TP 5 .IB count + Advance the current line by .I count\^ lines. Print the new current line. .TP 5 .IB count \(mi Retreat the current line by .I count\^ lines. Print the new current line. .PP The commands for controlling the execution of the source program are: .PP .TP 5 \fIcount\fB r \fIargs\fR .br .ns .TP 5 \fIcount\fB R Run the program with the given arguments. The \fBr\fP command with no arguments reuses the previous arguments to the program while the \fBR\fP command runs the program with no arguments. An argument beginning with .B < or .B > causes redirection for the rinter line is reached. .\" @(#)scat.1 1.3 ber occupies the first .IR k +1 character positions of each column of normal output or each line of .B \-m output. If .I c\^ (any non-digit character) is given, it is appended to the line number to separate it from whatever follows (default for .I c\^ is a tab). .TP .BI \-w k\^ Set the width of a line to .I k\^ character positions (default is 72 for equal-width multi-column output, no limit otherwise). .TP .BI \-o k\^ Offset each line by .I k\^ character positions (default is 0). The number of character positions per line is the sum of the width and offset. .TP .BI \-l k\^ Set the length of a page to .I k\^ lines (default is 66). .TP .B \-h Use the next argument as the header to be printed instead of the filename. .TP .B \-p Pause before beginning each page if the output is directed to a terminal .RI ( pr\^ will ring the bell at the terminal and wait for a carriage return). .TP .B \-f Use form-feed character for new pages (default is to use a sequence of line feeds). Pause before beginning the first page if tH standard input or output respectively. If \fIcount\fP is given, it specifies the number of breakpoints to be ignored. .TP 5 \fIlinenumber\fB c\fI count\fR .br .ns .TP 5 \fIlinenumber\fB C\fI count\fR Continue after a breakpoint or interrupt. If \fIcount\fP is given, it specifies the number of breakpoints to be ignored. \fBC\fP continues with the signal that caused the program to stop reactivated and \fBc\fP ignores it. If a linenumber is specified then a temporary breakpoint is placed at the line and execution is continued. The breakpoint is deleted when the command finishes. .TP 5 \fIlinenumber\fB g\fI count\fR Continue after a breakpoint with execution resumed at the given line. If \fIcount\fP is given, it specifies the number of breakpoints to be ignored. .TP 5 \fBs \fIcount\fR .br .ns .TP 5 \fBS \fIcount\fR Single step the program through \fIcount\fP lines. If no count is given then the program is run for one line. .B S is equivalent to .B s except it steps through procedure calls. .TP 5 \fBi\fR .br .ns ..TH SCC 1 .SH NAME scc \- C compiler for stand-alone programs .SH SYNOPSIS .B scc [ .B +\c [ lib ] ] [ option ] ... [ file ] ... .SH DESCRIPTION .I Scc\^ prepares the named files for stand-alone execution. The .I option\^ and .I file\^ arguments may be anything that can legally be used with the .I cc\^ command; it should be noted, though, that the .B \-p (profiling) option, as well as any object module that contains system calls, causes the executable not to run. .PP .I Scc\^ defines the compiler constant, .BR \s-1STANDALONE\s+1 , so that sections of C programs may be compiled conditionally when the executable is run stand-alone. .PP The first argument specifies an auxiliary library that defines the device configuration of the computer for which the stand-alone executable is being prepared. .I Lib\^ may be one of the following: .TP 8 .B A .SM RP\*S04/05/06 disk and .SM TU\*S16 magnetic tape, or equivalent on the \s-1PDP\s+1-11 plus \s-1RM\s+105 and \s-1RM\s+180 disks, and \s-1TU\s+178 and \s-1TS\s+111 tapes, he standard output is associated with a terminal. .TP .B \-r Print no diagnostic reports on failure to open files. .TP .B \-t Print neither the 5-line identifying header nor the 5-line trailer normally supplied for each page. Quit printing after the last line of each file without spacing to the end of the page. .TP .BI \-s c\^ Separate columns by the single character .I c\^ instead of by the appropriate number of spaces (default for .I c\^ is a tab). .SH EXAMPLES Print .B file1 and .B file2 as a double-spaced, three-column listing headed by ``file list'': .PP .RS .B "pr \|\-3dh \|"file \|list" \|file1 \|file2" .RE .PP Write .B file1 on .BR file2 , expanding tabs to columns 10, 19, 28, 37, .\|.\|. : .PP .RS .B "pr \|\-e9 \|\-t \|file2" .RE .SH FILES /dev/tty\(** to suspend messages .SH SEE ALSO cat(1). .\" @(#)pr.1 1.5 TP 5 \fBI\fR Single step by one machine-language instruction. \fBI\fP steps with the signal that caused the program to stop reactivated and \fBi\fP ignores it. .TP 5 \fIvariable$\fBm \fIcount\fR .br .ns .TP 5 \fIaddress:\fBm \fIcount\fR Single step (as with \fBs\fP) until the specified location is modified with a new value. If \fIcount\fP is omitted, it is effectively infinity. \fIVariable\fR must be accessible from the current procedure. Since this command is done by software, it can be very slow. .TP 5 \fIlevel\fB v \fR Toggle verbose mode, for use when single stepping with \fBS\fP, \fBs\fP or \fBm\fP. If \fIlevel\fP is omitted, then just the current source file and/or subroutine name is printed when either changes. If \fIlevel\fP is 1 or greater, each C source line is printed before it is executed; if \fIlevel\fP is 2 or greater, each assembler statement is also printed. A \fBv\fP turns verbose mode off if it is on for any level. .TP 5 .B k Kill the program being debugged. .TP 5 procedure\fB(\fParg1,arg2,.H or equivalent .TP .B B \s-1RK\s+111/\s-1RK\s+105 disk, \s-1RP\s+111/\s-1RP\s+103 disk, and \s-1TM\s+111/\s-1TU\s+116 magnetic tape, or equivalent .PP If no .BI + lib\^ argument is specified, .B +A is assumed. If the .B + argument is specified alone, no configuration library is loaded unless the user supplies his own. .SH FILES .nr t1 \w'/usr/lib/lib2A.a ' .nr t2 \n(t1+\w'+A configuration library ' .ta \n(t1u \n(t2u /lib/crt2.o execution start-off .br /usr/lib/lib2.a stand-alone library .br /usr/lib/lib2A.a +A configuration library (\s-1PDP\s+1-11 only) .br /usr/lib/lib2B.a +B configuration library (\s-1PDP\s+1-11 only) .SH SEE ALSO cc(1), ld(1), a.out(4). .\" @(#)scc.1 1.4 .TH PROF 1 .SH NAME prof \- display profile data .SH SYNOPSIS .B prof .RB [ \-tcan ] .RB [ \-ox ] .RB [ \-g ] .RB [ \-z ] .RB [ \-h ] .RB [ \-s ] .RB [ \-m "\ mdata]" [prog] .SH DESCRIPTION .I Prof\^ interprets the profile file produced by the .IR monitor (3C) function. The symbol table in the object file .I prog\^ .RB ( a.out by default) is read and correlated with the profile file .RB ( mon.out by default). For each external text symbol the percentage of time spent executing between the address of that symbol and the address of the next is printed, together with the number of times that function was called and the average number of milliseconds per call. .PP The mutually exclusive options .B t, c, a,\^ and .B n\^ determine the type of sorting of the output lines: .TP .B \-t Sort by decreasing percentage of total time (default). .TP .B \-c Sort by decreasing number of calls. .TP .B \-a Sort by increasing symbol address. .TP .B \-n Sort lexically by symbol name. .PP The mutually exclusive options .B o\^ and ...\fB)\fP .br .ns .TP 5 procedure\fB(\fParg1,arg2,...\fB)/\fP\fIm\fP Execute the named procedure with the given arguments. Arguments can be integer, character or string constants or names of variables accessible from the current procedure. The second form causes the value returned by the procedure to be printed according to format \fIm\fP. If no format is given, it defaults to .BR d . .TP 5 \fIlinenumber\fB b\fR \fIcommands\fR Set a breakpoint at the given line. If a procedure name without a line number is given (e.g., \fBproc:\fR), a breakpoint is placed at the first line in the procedure even if it was not compiled with the .B \-g option. If no \fIlinenumber\fP is given, a breakpoint is placed at the current line. If no .I commands\^ are given, execution stops just before the breakpoint and control is returned to .IR sdb . Otherwise the .I commands\^ are executed when the breakpoint is encountered and execution continues. Multiple commands are specified by separating them with semicolons. If \fBk\fP is use.TH SCCSDIFF 1 .SH NAME sccsdiff \- compare two versions of an \s-1SCCS\s+1 file .SH SYNOPSIS .B sccsdiff .BR \-r \s-1SID\s+1\&1 .BR \-r \s-1SID\s+1\&2 .RB [ \-p ] .RB [ \-s n] files .SH DESCRIPTION .I Sccsdiff\^ compares two versions of an .SM SCCS file and generates the differences between the two versions. Any number of .SM SCCS files may be specified, but arguments apply to all files. .RS 5 .TP 12 .BI \-r \s-1SID\s+1?\^ .IR \s-1SID\s+11 \ and \ \s-1SID\s+12 \ specify the deltas of an .SM SCCS file that are to be compared. Versions are passed to .IR bdiff (1) in the order given. .TP 12 .B \-p pipe output for each file through .IR pr (1). .TP 12 .BI \-s n\^ \fIn\fP is the file segment size that .I bdiff\^ will pass to .IR diff (1). This is useful when .I diff\^ fails due to a high system load. .SH FILES .TP "\w'/tmp/get?????\ \ 'u" /tmp/get????? Temporary files .SH "SEE ALSO" bdiff(1), get(1), help(1), pr(1). .br ``Source Code Control System'' in the .IR "\*(6) User's Guide" . .SH DIAGNOSTICS .I file: .B "NI B x\^ specify the printing of the address of each symbol monitored: .TP .B \-o Print each symbol address (in octal) along with the symbol name. .TP .B \-x Print each symbol address (in hexadecimal) along with the symbol name. .PP The following options may be used in any combination: .TP .B \-g Include non-global symbols (static functions). .TP .B \-z Include all symbols in the profile range (see .IR monitor (3C)), even if associated with zero number of calls and zero time. .TP .B \-h Suppress the heading normally printed on the report. (This is useful if the report is to be processed further.) .TP .B \-s Print a summary of several of the monitoring parameters and statistics on the standard error output. .TP .BR \-m " mdata\^" Use file .I mdata\^ instead of .B mon.out for profiling data. .PP For the number of calls to a function to be tallied, the .B \-p option of .IR cc (1) must have been given when the file containing the function was compiled. This option to the .I cc\^ command also arranges for the object d as a command to execute at a breakpoint, control returns to .IR sdb , instead of continuing execution. .TP 5 .B B Print a list of the currently active breakpoints. .TP 5 \fIlinenumber\fB d\fR Delete a breakpoint at the given line. If no \fIlinenumber\fP is given, the breakpoints are deleted interactively. Each breakpoint location is printed and a line is read from the standard input. If the line begins with a .B y or .B d , the breakpoint is deleted. .TP 5 .B D Delete all breakpoints. .TP 5 .B l Print the last executed line. .TP 5 \fIlinenumber\fB a\fR Announce. If \fIlinenumber\fR is of the form .IB proc : number\fR, the command effectively does a .IB "linenumber " "b l\fR. If \fIlinenumber\fR is of the form .IB proc :\fR, the command effectively does a .IB proc ": b T"\fR. .PP Miscellaneous commands: .TP 5 .BI ! command\^ The command is interpreted by .IR sh (1). .TP 5 .B new-line If the previous command printed a source line, advance the current line by one line and print the new current line. If the preo differences" means the two versions are the same. .sp Use .IR help (1) for explanations. .PD .\" @(#)sccsdiff.1 1.6 file to include a special profiling start-up function that calls .IR monitor (3C) at the beginning and end of execution. It is the call to .I monitor\^ at the end of execution that causes the .B mon.out file to be written. Thus, only programs that call .IR exit (2) or return from .I main\^ cause the .B mon.out file to be produced. .SH FILES .ta \w'mon.out 'u mon.out for profile .br a.out for namelist .SH "SEE ALSO" cc(1), nm(1), exit(2), profil(2), monitor(3C). .br .ne 6v .SH BUGS There is a limit of 600 functions that may have call counters established during program execution. If this limit is exceeded, other data is overwritten and the .B mon.out file is corrupted. The number of call counters used is reported automatically by the .I prof\^ command whenever the number exceeds 250. .\" @(#)prof.1 1.4 I vious command displayed a memory location, display the next memory location. .TP 5 .B control-D Scroll. Print the next 10 lines of instructions, source, or data, depending on which was printed last. .TP 5 .BI "< " filename Read commands from .I filename until the end of file is reached, then continue to accept commands from standard input. When .I sdb is told to display a variable by a command in such a file, the variable name is displayed along with the value. This command may not be nested; .B < may not appear as a command in a file. .TP 5 .B M Print the address maps. .TP 5 .BR M\ [ ?/ ][ \(** "] \fIb \|e \|f\fP" Record new values for the address map. The arguments \fB?\fP and \fB/\fP specify the text and data maps, respectively. The first segment, .RI ( "b1, e1, f1" ), is changed unless \fB\(**\fP is specified, in which case the second segment, .RI ( "b1, e1, f1" ), of the mapping is changed. If fewer than three values are given, the remaining map parameters are left unchanged. .TP 5 \fB"\fI string\fR Prin.TH SDB 1 .SH NAME sdb \- symbolic debugger .SH SYNOPSIS .B sdb [\fB\-w\fR] [\fB\-W\fR] [ objfil [ corfil [ directory ] ] ] .SH DESCRIPTION .I Sdb\^ is a symbolic debugger which can be used with C and F77 programs. It may be used to examine their object files and core files and to provide a controlled environment for their execution. .PP .I Objfil\^ is normally an executable program file which has been compiled with the .B \-g (debug) option; if it has not been compiled with the .B \-g option, or if it is not an executable file, the symbolic capabilities of .I sdb\^ are limited, but the file can still be examined and the program debugged. The default for .I objfil\^ is .BR a.out . .I Corfil\^ is assumed to be a core image file produced after executing .IR objfil ; the default for .I corfil\^ is .BR core . The core file need not be present. A .B \- in place of .I corfil\^ forces .I sdb\^ to ignore any core image file. Source files used in constructing .I objfil\^ must be in .I directory to be located. .PP It i'\" t .tr ~ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\f3\-\\$1\fP\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\f3\-\\$1\fP] .if n .ul 0 .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \f3\-\\$1\\fP \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \f3\-\\$1\fP[\f2\\$2\^\fP] \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .TH PRS 1 .SH NAME prs \- print an \s-1SCCS\s+1 file .SH SYNOPSIS .B prs .SP d [dataspec]] .SP r [\s-1SID\s+1]] .SF e .SF l .SF a files .SH DESCRIPTION .I Prs\^ prints, on the standard output, parts or all of an \*(S) file (see .IR sccsfile (4)) in a user supplied format. If a directory is named, .I prs\^ behaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of the pathname does not begin with \f3s.\fP), and unreadable files are silently ignored. If a name of \f3\-\fP is given, the standard input is read; each lt the given string. The C escape sequences of the form .I "\\\\character" are recognized, where .I character is a nonnumeric character. .TP 5 .B q Exit the debugger. .PP The following commands also exist and are intended only for debugging the debugger: .PP .PD 0 .TP 5 .B V Print the version number. .TP 5 .B Q Print a list of procedures and files being debugged. .TP 5 .B Y Toggle debug output. .PD .SH FILES a.out .br core .SH SEE ALSO cc(1), f77(1), sh(1), a.out(4), core(4). .br .IR "\*(6) Programming Guide" . .SH WARNINGS On the .SM VAX\*S-11/780, C variables are identified internally with an underscore prepended. User variables which differ by only an initial underscore cannot be distinguished, as .I sdb recognizes both internal and external names. .PP Data stored in text sections are indistinguishable from functions. .PP Line number information in optimized functions is unreliable, and some information may be missing. .SH BUGS If a procedure is called when the program is .I not\^ stopped at a breakpoint (sJ s useful to know that at any time there is a .I "current line\^" and .IR "current file" . If .I corfil\^ exists then they are initially set to the line and file containing the source statement at which the process terminated. Otherwise, they are set to the first line in .BR main (). The current line and file may be changed with the source file examination commands. .PP By default, warnings are provided if the source files used in producing .I objfil cannot be found or are newer than .IR objfil . This checking feature and the accompanying warnings may be disabled by the use of the .B \-W flag. .PP Names of variables are written just as they are in C or F77. Variables local to a procedure may be accessed using the form .IB procedure : variable\fR. If no procedure name is given, the procedure containing the current line is used by default. .P It is also possible to refer to structure members as .IB variable . member\fR, pointers to structure members as .IB variable \(mi> member , and array elements as .IB variabine of the standard input is taken to be the name of an \*(S) file or directory to be processed; non-\*(S) files and unreadable files are silently ignored. .PP Arguments to .IR prs , which may appear in any order, consist of .I keyletter\^ arguments, and filenames. .PP All the described .I keyletter\^ arguments apply independently to each named file: .A1 d dataspec Used to specify the output data specification. The .I dataspec\^ is a string consisting of \*(S) file .I "data keywords\^" (see .IR "\s-1DATA KEYWORDS\s+1" ) interspersed with optional user supplied text. .A1 r \s-1SID\s+1 Used to specify the .IR S "\s-1CCS\s+1 " ID entification (\*(I)) string of a delta for which information is desired. If no \*(I) is specified, the \*(I) of the most recently created delta is assumed. .AR e Requests information for all deltas created .I earlier\^ than and including the delta designated via the .B \-r keyletter. .AR l Requests information for all deltas created .I later\^ than and including the delta designated viauch as when a core image is being debugged), all variables are initialized before the procedure is started. This makes it impossible to use a procedure which formats data from a core image. .PP The default type for printing F77 parameters is incorrect. Their address is printed instead of their value. .PP Tracebacks containing F77 subprograms with multiple entry points may print too many arguments in the wrong order, but their values are correct. .PP The range of an F77 array subscript is assumed to be .I 1 to .IR n , where .I n is the dimension corresponding to that subscript. This is only significant when the user omits a subscript, or uses .B \(** to indicate the full range. There is no problem in general with arrays having subscripts whose lower bounds are not 1. .\" @(#)sdb.1 1.6 le [ number ]\fR. Pointers may be dereferenced by using the form \fIpointer\fB[\fR0\fB]\fR. Combinations of these forms may also be used. F77 common variables may be referenced by using the name of the common block instead of the structure name. Blank common variables may be named by the form .BI . variable\fR. A number may be used in place of a structure variable name, in which case the number is viewed as the address of the structure, and the template used for the structure is that of the last structure referenced by .I sdb\fR. An unqualified structure variable may also be used with various commands. Generally, .I sdb interprets a structure as a set of variables; thus, it displays the values of all the elements of a structure when it is requested to display a structure. An exception to this interpretation occurs when displaying variable addresses. An entire structure does have an address, and it is this value .I sdb displays, not the addresses of individual elements. .P Elements of a multidimensional arrayJ  the .B \-r keyletter. .AR a Requests printing of information for both removed (i.e., delta type = .IR R ; (see .IR rmdel (1)) and existing (i.e., delta type = .IR D) deltas. If the .B \-a keyletter is not specified, information for existing deltas only is provided. .PP .i0 .SH "DATA KEYWORDS" Data keywords specify which parts of an \*(S) file are to be retrieved and output. All parts of an \*(S) file (see .IR sccsfile (4)) have an associated data keyword. There is no limit on the number of times a data keyword may appear in a .IR dataspec . .PP The information printed by .I prs\^ consists of: (1) the user supplied text; and (2) appropriate values (extracted from the \*(S) file) substituted for the recognized data keywords in the order of appearance in the \f2dataspec\^\fP. The format of a data keyword value is either .I Simple\^ (S), in which keyword substitution is direct, or .I "Multi-line\^" (M), in which keyword substitution is followed by a carriage return. .PP User supplied text is any text other tha.TH SDIFF 1 .SH NAME sdiff \- side-by-side difference program .SH SYNOPSIS .B sdiff [ options ... ] file1 file2 .SH DESCRIPTION .I Sdiff\^ uses the output of .IR diff (1) to produce a side-by-side listing of two files indicating those lines that are different. Each line of the two files is printed with a blank gutter between them if the lines are identical, a .B < in the gutter if the line only exists in .IR file1 , a .B > in the gutter if the line only exists in .IR file2 , and a .B | for lines that are different. .PP For example: .PP .RS 11 .nf x | y a a b < c < d d > c .fi .RE .PP The following options exist: .TP 11 .BI \-w " n\^" Use the next argument, .IR n , as the width of the output line. The default line length is 130 characters. .TP .BR \-l Only print the left side of any lines that are identical. .TP .BR \-s Do not print identical lines. .TP .BI \-o " output\^" Use the next argument, .IR output , as the name of a third file that is created as a user controlled merging of .I file1\^ and  may be referenced as .IB variable [ number ][ number ]...\fR, or as .IB variable [ number,number,... ]\fR. In place of .I number\fR, the form .IB number ; number may be used to indicate a range of values, .B \(** may be used to indicate all legitimate values for that subscript, or subscripts may be omitted entirely if they are the last subscripts and the full range of values is desired. As with structures, .I sdb displays all the values of an array or of the section of an array if trailing subscripts are omitted. It displays only the address of the array itself or of the section specified by the user if subscripts are omitted. A multidimensional parameter in an F77 program cannot be displayed as an array, but it is actually a pointer, whose value is the location of the array. The array itself can be accessed symbolically from the calling function. .P A particular instance of a variable on the stack may be referenced by using the form .IB procedure : variable , number\fR. All the variations mentioned in naminn recognized data keywords. A tab is specified by \f3\e\|t\fP and carriage return/new line is specified by \f3\e\|n\fP. .bp .ce SCCS FILES DATA KEYWORDS .DS .PD 0 .if t .vs -1p .if n .ll 66 .if t .ll 6.5i .TS center ; c c c c c c l c c c . .sp KEYWORD DATA ITEM FILE SECTION VALUE FORMAT _ \f3:\fPDt\f3:\fP Delta information Delta Table See below* S \f3:\fPDL\f3:\fP T{ Delta line statistics T} " \f3:\fPLi\f3:\fP/\f3:\fPLd\f3:\fP/\f3:\fPLu\f3:\fP S \f3:\fPLi\f3:\fP T{ .nf Lines inserted by Delta .fi T} " nnnnn S \f3:\fPLd\f3:\fP T{ Lines deleted by Delta T} " nnnnn S \f3:\fPLu\f3:\fP T{ .nf Lines unchanged by Delta .fi T} " nnnnn S \f3:\fPDT\f3:\fP Delta type " \f2D\^\fP~or~\f2R\^\fP S \f3:\fPI\f3:\fP T{ SCCS ID string (SID) T} " \f3:\fPR\f3:.:\fPL\f3:.:\fPB\f3:.:\fPS\f3:\fP S \f3:\fPR\f3:\fP Release number " nnnn S \f3:\fPL\f3:\fP Level number " nnnn S \f3:\fPB\f3:\fP Branch number " nnnn S \f3:\fPS\f3:\fP Sequence number " nnnn S \f3:\fPD\f3:\fP T{ Date Delta created T} " \f3:\fPDy\f3:\fP/\f3:\fPDm\f3:\fP/\f3:K .IR file2 . Identical lines of .I file1\^ and .I file2\^ are copied to .IR output . Sets of differences produced by .IR diff (1) are printed, where a set of differences share a common gutter character. After printing each set of differences, .I sdiff\^ prompts the user with a .B % and waits for one of the following user-typed commands: .PP .RS 19 .TP .B l append the left column to the output file .TP .B r append the right column to the output file .TP .B s turn on silent mode; do not print identical lines .TP .B v turn off silent mode .TP .B "e l" call the editor with the left column .TP .B "e r" call the editor with the right column .TP .B "e b" call the editor with the concatenation of left and right .TP .B e call the editor with a zero length file .TP .B q exit from the program .RE .sp .2i .RS 11 On exit from the editor, the resulting file is concatenated on the end of the .I output\^ file. .RE .SH SEE ALSO diff(1), ed(1). .\" @(#)sdiff.1 1.3 g variables may be used. .IB Number\^ is the occurrence of the specified procedure on the stack, counting the top, or most current, as the first. If no procedure is specified, the procedure currently executing is used by default. .PP It is also possible to specify a variable by its address. All forms of integer constants which are valid in C may be used, so that addresses may be input in decimal, octal, or hexadecimal. .PP Line numbers in the source program are referred to as .IB file-name : number or .IB procedure : number\fR. In either case the number is relative to the beginning of the file. If no procedure or filename is given, the current file is used by default. If no number is given, the first line of the named procedure or file is used. .PP While a process is running under .IR sdb all addresses refer to the executing program; otherwise they refer to .I objfil\^ or .I corfil\^. An initial argument of .B \-w permits overwriting locations in .I objfil\^. .SS Addresses. The address in a file associated wvious command displayed a memory location, display the next memory location. .TP 5 .B control-D Scroll. Print the next 10 lines of instructions, source, or data, depending on which was printed last. .TP 5 .BI "< " filename Read commands from .I filename until the end of file is reached, then continue to accept commands from standard input. When .I sdb is told to display a variable by a command in such a file, the variable name is displayed along with the value. This command may not be nested; .B < may not appear as a command in a file. .TP 5 .B M Print the address maps. .TP 5 .BR M\ [ ?/ ][ \(** "] \fIb \|e \|f\fP" Record new values for the address map. The arguments \fB?\fP and \fB/\fP specify the text and data maps, respectively. The first segment, .RI ( "b1, e1, f1" ), is changed unless \fB\(**\fP is specified, in which case the second segment, .RI ( "b1, e1, f1" ), of the mapping is changed. If fewer than three values are given, the remaining map parameters are left unchanged. .TP 5 \fB"\fI string\fR Princommand. The command name is passed as argument 0 (see .IR exec (2)). The .I value\^ of a simple-command is its exit status if it terminates normally, or (octal) 200+\f2status\^\fP if it terminates abnormally (see .IR signal (2) for a list of status values). .PP A .I pipeline\^ is a sequence of one or more .I commands\^ separated by .B \(bv (or, for historical compatibility, by ^). The standard output of each command except the last one is connected by a .IR pipe (2) to the standard input of the next command. Each command is run as a separate process; the shell waits for the last command to terminate. .PP A .I list\^ is a sequence of one or more pipelines separated by .BR ; , .BR & , .BR && , or .BR \(bv\|\(bv , and optionally terminated by .B ; or .BR & . Of these four symbols, .B ; and .B & have equal precedence, which is lower than that of .B && and .BR \(bv\|\(bv . The symbols .B && and .B \(bv\|\(bv also have equal precedence. A semicolon .RB ( ; ) causes sequential execution of the preceding pipeline; aK ith a written address is determined by a mapping associated with that file. Each mapping is represented by two triples .RI ( "b1, e1, f1" ) and .RI ( "b2, e2, f2" ). The .I file address\^ corresponding to a written .I address\^ is calculated as follows: .PP .RS .IR b1 \*(LE address < e1 \*(IM .IR "file address" = address + f1\-b1 .RE otherwise .PP .RS .IR b2 \*(LE address < e2 \*(IM .IR "file address" = address + f2\-b2, .RE .PP otherwise, the requested .I address\^ is not legal. In some cases (e.g., for programs with separated I and D space) the two segments for a file may overlap. .PP The initial setting of both mappings is suitable for normal .B a.out and .B core files. If either file is not of the kind expected then, for that file, .I b1\^ is set to 0, .I e1\^ is set to the maximum file size, and .I f1\^ is set to 0; in this way the whole file can be examined with no address translation. .PP In order for .I sdb\^ to be used on large files, all appropriate values are kept as signed 32-bit integers. .SS Ct the given string. The C escape sequences of the form .I "\\\\character" are recognized, where .I character is a nonnumeric character. .TP 5 .B q Exit the debugger. .PP The following commands also exist and are intended only for debugging the debugger: .PP .PD 0 .TP 5 .B V Print the version number. .TP 5 .B Q Print a list of procedures and files being debugged. .TP 5 .B Y Toggle debug output. .PD .SH FILES a.out .br core .SH SEE ALSO cc(1), f77(1), sh(1), a.out(4), core(4). .br .IR "\*(6) Programming Guide" . .SH WARNINGS On the .SM VAX\*S-11/780, C variables are identified internally with an underscore prepended. User variables which differ by only an initial underscore cannot be distinguished, as .I sdb recognizes both internal and external names. .PP Data stored in text sections are indistinguishable from functions. .PP Line number information in optimized functions is unreliable, and some information may be missing. .SH BUGS If a procedure is called when the program is .I not\^ stopped at a breakpoint (sn ampersand .RB ( & ) causes asynchronous execution of the preceding pipeline (i.e., the shell does .I not\^ wait for that pipeline to finish). The symbol .B && .RB (\| \(bv\|\(bv \^) causes the .I list\^ following it to be executed only if the preceding pipeline returns a zero (non-zero) exit status. An arbitrary number of new-line characters may appear in a .IR list , instead of semicolons, to delimit commands. .PP A .I command\^ is either a simple-command or one of the following. Unless otherwise stated, the value returned by a command is that of the last simple-command executed in the command. .PP .PD 0 .TP \f3for\fP \f2name\^\fP \*(OK \f3in\fP \f2word\^\fP .\|.\|. \*(CK \f3do\fP \f2list\^\fP \f3done\fP Each time a .B for command is executed, .I name\^ is set to the next .I word\^ taken from the .B in .I word\^ list. If .BI in " word\^" \&.\|.\|. is omitted, then the .B for command executes the \f3do\fP \f2list\^\fP once for each positional parameter that is set (see .I "Parameter Substitution\^" below). ommands. .PP The commands for examining data in the program are: .TP 5 .B t Print a stack trace of the terminated or halted program. .TP 5 .B T Print the top line of the stack trace. .TP 5 .IB variable / clm Print the value of .I variable\^ according to length .I l\^ and format .IR m . A numeric count .I c indicates that a region of memory, beginning at the address implied by .IR variable , is to be displayed. The length specifiers are: .RS .RS .PD 0 .TP .BI b\^ one byte .TP .BI h\^ two bytes (half word) .TP .BI l\^ four bytes (long word) .RE .PD .br .ne 5 .PP Legal values for .I m\^ are: .RS .PD 0 .TP .BI c\^ character .TP .BI d\^ decimal .TP .BI u\^ decimal, unsigned .TP .BI o\^ octal .TP .BI x\^ hexadecimal .TP .BI f\^ 32-bit single precision floating point .TP .BI g\^ 64-bit double precision floating point .TP .BI s\^ Assume .I variable\^ is a string pointer and print characters starting at the address pointed to by the variable. .TP .BI a\^ Print characters starting at the variable's address. This formaL uch as when a core image is being debugged), all variables are initialized before the procedure is started. This makes it impossible to use a procedure which formats data from a core image. .PP The default type for printing F77 parameters is incorrect. Their address is printed instead of their value. .PP Tracebacks containing F77 subprograms with multiple entry points may print too many arguments in the wrong order, but their values are correct. .PP The range of an F77 array subscript is assumed to be .I 1 to .IR n , where .I n is the dimension corresponding to that subscript. This is only significant when the user omits a subscript, or uses .B \(** to indicate the full range. There is no problem in general with arrays having subscripts whose lower bounds are not 1. .\" @(#)sdb.1 1.6 Execution ends when there are no more words in the list. .TP \f3case\fP \f2word\^\fP \f3in\fP \*(OK \f2pattern\^\fP \*(OK \(bv \ \f2pattern\^\fP \*(CK .\|.\|. \f3)\fP \f2list\^\fP \f3;;\fP \*(CK .\|.\|. \f3esac\fP A .B case command executes the .I list\^ associated with the first .I pattern\^ that matches .IR word . The form of the patterns is the same as that used for filename generation (see .I "Filename Generation\^" below). .TP \f3if\fP \f2list\^\fP \f3then\fP \f2list\^\fP \*(OK \ \f3elif\fP \f2list\^\fP \f3then\fP \f2list\^\fP \*(CK .\|.\|. \ \*(OK \f3else\fP \f2list\^\fP \*(CK \f3f\&i\fP The .I list\^ following \f3if\fP is executed and, if it returns a zero exit status, the .I list\^ following the first .B then is executed. Otherwise, the .I list\^ following \f3elif\fP is executed and, if its value is zero, the .I list\^ following the next .B then is executed. Failing that, the .B else .I list\^ is executed. If no .B else .I list\^ or .B then .I list\^ is executed, then the .B if command returns a zerot may not be used with register variables. .TP .BI p\^ pointer to procedure .TP .BI i\^ Disassemble machine-language instruction with addresses printed numerically and symbolically. .TP .BI I\^ Disassemble machine-language instruction with addresses printed numerically only. .RE .PD The length specifiers are only effective with the formats \fBc\fP, \fBd\fP, \fBu\fP, \fBo\fP and \fBx\fP. Any of the specifiers, \fIc\fP, \fIl\fP, and \fIm\fP, may be omitted. If all are omitted, .I sdb chooses a length and a format suitable for the variable's type, as declared in the program. If .I m is specified, then this format is used for displaying the variable. A length specifier determines the output length of the value to be displayed, sometimes resulting in truncation. A count specifier .I c tells .I sdb to display that many units of memory, beginning at the address of .IR variable . The number of bytes in one such unit of memory is determined by the length specifier .IR l , or, if no length is given, by the size associa.TH SDIFF 1 .SH NAME sdiff \- side-by-side difference program .SH SYNOPSIS .B sdiff [ options ... ] file1 file2 .SH DESCRIPTION .I Sdiff\^ uses the output of .IR diff (1) to produce a side-by-side listing of two files indicating those lines that are different. Each line of the two files is printed with a blank gutter between them if the lines are identical, a .B < in the gutter if the line only exists in .IR file1 , a .B > in the gutter if the line only exists in .IR file2 , and a .B | for lines that are different. .PP For example: .PP .RS 11 .nf x | y a a b < c < d d > c .fi .RE .PP The following options exist: .TP 11 .BI \-w " n\^" Use the next argument, .IR n , as the width of the output line. The default line length is 130 characters. .TP .BR \-l Only print the left side of any lines that are identical. .TP .BR \-s Do not print identical lines. .TP .BI \-o " output\^" Use the next argument, .IR output , as the name of a third file that is created as a user controlled merging of .I file1\^ and L  exit status. .TP \f3while\fP \f2list\^\fP \f3do\fP \f2list\^\fP \f3done\fP A .B while command repeatedly executes the .B while .I list\^ and, if the exit status of the last command in the list is zero, executes the .B do .IR list ; otherwise the loop terminates. If no commands in the .B do .I list\^ are executed, then the .B while command returns a zero exit status; .B until may be used in place of .B while to negate the loop termination test. .TP \f3(\fP\f2list\^\fP\f3)\fP .br Execute .I list\^ in a sub-shell. .TP \f3{\fP\f2list\^\fP\f3;}\fP .br .I list\^ is simply executed. .PD .PP The following words are only recognized as the first word of a command and when not quoted: .if t .RS .PP .B .if n if then else elif fi case esac for while until do done { } .if t if then else elif f\&i case esac for while until do done { } .if t .RE .SS Comments. A word beginning with .B # causes that word and all the following characters up to a new line to be ignored. .SS Command Substitution. The standard outputted with the .IR variable. If a count specifier is used for the .B s or .B a command, then that many characters are printed. Otherwise successive characters are printed until either a null byte is reached or 128 characters are printed. The last variable may be redisplayed with the command .BR ./ . .PP The .IR sh (1) metacharacters .B \(** and .B ? may be used within procedure and variable names, providing a limited form of pattern matching. If no procedure name is given, variables local to the current procedure and global variables are matched; if a procedure name is specified, only variables local to that procedure are matched. To match only global variables, the form .BI : pattern\^ is used. .RE .TP 5 .PD 0 .IB linenumber ? lm .TP 5 \fIvariable:\fB?\fIlm\fR .PD Print the value at the address from .BR a.out or I space given by .I linenumber\^ or .IR variable (procedure name), according to the format .IR lm . The default format is `i'. .TP 5 .PD 0 .IB variable = lm .TP 5 .IB linenumber = lm .TP 5 .IB number .IR file2 . Identical lines of .I file1\^ and .I file2\^ are copied to .IR output . Sets of differences produced by .IR diff (1) are printed, where a set of differences share a common gutter character. After printing each set of differences, .I sdiff\^ prompts the user with a .B % and waits for one of the following user-typed commands: .PP .RS 19 .TP .B l append the left column to the output file .TP .B r append the right column to the output file .TP .B s turn on silent mode; do not print identical lines .TP .B v turn off silent mode .TP .B "e l" call the editor with the left column .TP .B "e r" call the editor with the right column .TP .B "e b" call the editor with the concatenation of left and right .TP .B e call the editor with a zero length file .TP .B q exit from the program .RE .sp .2i .RS 11 On exit from the editor, the resulting file is concatenated on the end of the .I output\^ file. .RE .SH SEE ALSO diff(1), ed(1). .\" @(#)sdiff.1 1.3  from a command enclosed in a pair of grave accents (\^\f3\*`\^\*`\fP\^) may be used as part or all of a word; trailing new lines are removed. .SS Parameter Substitution. The character .B $ is used to introduce substitutable .IR parameters . Positional parameters may be assigned values by .BR set . Variables may be set by writing: .RS .PP .IB name = value\^ \*(OK .IB name = value\^ \*(CK .\|.\|. .RE .PP Pattern-matching is not performed on .IR value . .PP .PD 0 .TP \f3${\fP\f2parameter\^\fP\f3}\fP A .I parameter\^ is a sequence of letters, digits, or underscores (a .IR name ), a digit, or any of the characters .BR \(** , .BR @ , .BR # , .BR ? , .BR \- , .BR $ , and .BR !\\^ . The value, if any, of the parameter is substituted. The braces are required only when .I parameter\^ is followed by a letter, digit, or underscore that is not to be interpreted as part of its name. A .I name\^ must begin with a letter or underscore. If .I parameter\^ is a digit then it is a positional parameter. If .I parameter\^ is .B \M = lm .PD Print the address of .I variable\^ or .IR linenumber , or the value of .IR number , in the format specified by .IR lm . If no format is given, then .B lx is used. The last variant of this command provides a convenient way to convert between decimal, octal and hexadecimal. .TP 5 .IB variable ! value Set .I variable\^ to the given .IR value . The value may be a number, a character constant or a variable. The value must be well defined; expressions that produce more than one value, such as structures, are not allowed. Character constants are denoted .BI ' character\fR. Numbers are viewed as integers unless a decimal point or exponent is used. In this case, they are treated as having the type double. Registers are viewed as integers. The .I variable may be an expression that indicates more than one variable, such as an array or structure name. If the address of a variable is given, it is regarded as the address of a variable of type .IR int . C conventions are used in any type conversions necessary to pe.TH SED 1 .SH NAME sed \- stream editor .SH SYNOPSIS .B sed [ .B \-n ] [ .B \-e script ] [ .B \-f sfile ] [ files ] .SH DESCRIPTION .I Sed\^ copies the named .I files\^ (standard input default) to the standard output, edited according to a script of commands. The .B \-f option causes the script to be taken from file .IR sfile ; these options accumulate. If there is just one .B \-e option and no .B \-f option, the flag .B \-e may be omitted. The .B \-n option suppresses the default output. A script consists of editing commands, one per line, of the following form: .sp .RS [ \|address \|[ \|, \|address \|] \|] \|function \|[ \|arguments \|] .RE .sp In normal operation, .I sed\^ cyclically copies a line of input into a .I pattern space\^ (unless there is something left after a .B D command), applies in sequence all commands whose .I addresses\^ select that pattern space, and at the end of the script copies the pattern space to the standard output (except under .BR \-n ) and deletes the pattern space. .PP Some of(** or .BR @ , then all the positional parameters, starting with .BR $1 , are substituted (separated by spaces). Parameter .B $0 is set from argument zero when the shell is invoked. .TP \f3${\fP\f2parameter\^\fP\f3:\-\fP\f2word\^\fP\f3}\fP If .I parameter\^ is set and is non-null, substitute its value; otherwise substitute .IR word . .TP \f3${\fP\f2parameter\^\fP\f3:=\fP\f2word\^\fP\f3}\fP If .I parameter\^ is not set or is null, set it to .IR word ; the value of the parameter is then substituted. Positional parameters may not be assigned in this way. .TP \f3${\fP\f2parameter\^\fP\f3:?\fP\f2word\^\fP\f3}\fP If .I parameter\^ is set and is non-null, substitute its value; otherwise, print .I word\^ and exit from the shell. If .I word\^ is omitted, the message .B "parameter null or not set" is printed. .TP \f3${\fP\f2parameter\^\fP\f3:+\fP\f2word\^\fP\f3}\fP If .I parameter\^ is set and is non-null, substitute .IR word ; otherwise substitute nothing. .PD .PP In the above structures, .I word\^ is not evaluated ulorux{X[^M  the commands use a .I hold space\^ to save all or part of the .I pattern space\^ for subsequent retrieval. .PP An .I address\^ is either a decimal number that counts input lines cumulatively across files, a .B $ that addresses the last line of input, or a context address, i.e., a .BI / "regular expression" / in the style of .IR ed (1) modified thus: .PP .TP 5 \(bu In a context address, the construction \f3\e\fP\f2?regular expression?\^\fP, where .IR ? is any character, is identical to .BI / "regular expression" /\fR.\fP Note that in the context address .BR \exabc\exdefx , the second .B x stands for itself, so that the regular expression is .BR abcxdef . .TP 5 \(bu The escape sequence .B \en matches a new-line character .I embedded\^ in the pattern space. .TP 5 \(bu A period .B . matches any character except the .I terminal\^ new-line character of the pattern space. .TP 5 \(bu A command line with no addresses selects every pattern space. .TP 5 \(bu A command line with one address selects each pattern space thnless it is to be used as the substituted string; in the following example, .B pwd is executed only if .B d is not set or is null: .RS .PP \f3echo \|${d:\-\^\*`\^pwd\^\*`\^}\f1 .RE .PP If the colon .RB ( : ) is omitted from the above expressions, then the shell only checks whether .I parameter\^ is set or not. .PP The following parameters are automatically set by the shell: .RS .PD 0 .TP .B # The number of positional parameters in decimal. .TP .B \- Flags supplied to the shell on invocation or by the .B set command. .TP .B ? The decimal value returned by the last synchronously executed command. .TP .B $ The process number of this shell. .TP .B ! The process number of the last background command invoked. .PD .RE .PP The following parameters are used by the shell: .RS .PD 0 .TP .B .SM HOME The default argument (home directory) for the .I cd\^ command. .TP .B .SM PATH The search path for commands (see .I Execution\^ below). The user may not change .B \s-1PATH\s+1 if executing under .IR rsh . .TP .B .SM CDPATH Trform the indicated assignment. .TP 5 .B x Print the machine registers and the current machine-language instruction. .TP 5 .B X Print the current machine-language instruction. .PP The commands for examining source files are: .PP .PD 0 .TP 5 .BI "e " procedure\^ .TP 5 .BI "e " file-name\^ .TP 5 .BI "e " directory/\^ .TP 5 .BI "e " "directory file-name"\^ .PD The first two forms set the current file to the file containing .I procedure\^ or to .IR file-name . The current line is set to the first line in the named procedure or file. Source files are assumed to be in .IR directory . The default is the current working directory. The latter two forms change the value of .IR directory . If no procedure, filename, or directory is given, the current procedure name and filename are reported. .TP 5 .BI / "regular expression" / Search forward from the current line for a line containing a string matching .I regular expression\^ as in .IR ed (1). The trailing .B / may be elided. .TP 5 .BI ? "regular expression" ? Search baat matches the address. .TP 5 \(bu A command line with two addresses selects the inclusive range from the first pattern space that matches the first address through the next pattern space that matches the second. (If the second address is a number less than or equal to the line number first selected, only one line is selected.)\ Thereafter the process is repeated, looking again for the first address. .PP Editing commands can be applied only to non-selected pattern spaces by use of the negation function .B ! (below). .PP In the following list of functions the maximum number of permissible addresses for each function is indicated in parentheses. .PP The .I text\^ argument consists of one or more lines, all but the last of which end with .B \e to hide the new-line character. Backslashes in text are treated like backslashes in the replacement string of an .B s command, and may be used to protect initial blanks and tabs against the stripping that is done on every script line. The .I rfile\^ or .I wfile\^ argumentN he search path for the .I cd command. .TP .B .SM MAIL If this variable is set to the name of a mail file, then the shell informs the user of the arrival of mail in the specified file. .TP .SM .B PS1 Primary prompt string, by default .RB `` "$ \|" ''. .TP .SM .B PS2 Secondary prompt string, by default .RB `` "> \|" ''. .TP .SM .B IFS Internal field separators, normally .BR space , .BR tab , and .BR "new line" . .PD .RE .PP The shell gives default values to \f3\s-1PATH\s+1\fP, \f3\s-1PS1\s+1\fP, \f3\s-1PS2\s+1\fP, and \f3\s-1IFS\s+1\fP, while .SM .B HOME and .SM .B MAIL are not set at all by the shell (although .SM .B HOME is set by .IR login (1)). .SS Blank Interpretation. After parameter and command substitution, the results of substitution are scanned for internal field separator characters (those found in .BR \s-1IFS\s+1 ) and split into distinct arguments where such characters are found. Explicit null arguments (\^\f3"\^"\fP or \f3\*'\^\*'\fP\^) are retained. Implicit null arguments (those resulting from .ckward from the current line for a line containing a string matching .I regular expression\^ as in .IR ed (1). The trailing .B ? may be elided. .TP 5 .B p Print the current line. .TP 5 .B z Print the current line followed by the next 9 lines. Set the current line to the last line printed. .TP 5 .B w Window. Print the 10 lines around the current line. .TP 5 .I number\^ Set the current line to the given line number. Print the new current line. .TP 5 .IB count + Advance the current line by .I count\^ lines. Print the new current line. .TP 5 .IB count \(mi Retreat the current line by .I count\^ lines. Print the new current line. .PP The commands for controlling the execution of the source program are: .PP .TP 5 \fIcount\fB r \fIargs\fR .br .ns .TP 5 \fIcount\fB R Run the program with the given arguments. The \fBr\fP command with no arguments reuses the previous arguments to the program while the \fBR\fP command runs the program with no arguments. An argument beginning with .B < or .B > causes redirection for the  must terminate the command line and must be preceded by exactly one blank. Each .I wfile\^ is created before processing begins. There can be at most 10 distinct .I wfile\^ arguments. .PP .PD 0 .TP 10 (1)\|\f3a\e\fP .br .ns .TP .I text\^ Append. Place .I text\^ on the output before reading the next input line. .TP .RI (2)\|\f3b\fP " label\^" Branch to the .B : command bearing the .IR label . If .I label\^ is empty, branch to the end of the script. .br .ne 2.1v .TP (2)\|\f3c\e\fP .br .ns .TP .I text\^ Change. Delete the pattern space. With 0 or 1 address or at the end of a 2-address range, place .I text\^ on the output. Start the next cycle. .TP (2)\|\f3d\fP Delete the pattern space. Start the next cycle. .TP (2)\|\f3D\fP Delete the initial segment of the pattern space through the first new-line character. Start the next cycle. .TP (2)\|\f3g\fP Replace the contents of the pattern space by the contents of the hold space. .TP (2)\|\f3G\fP Append the contents of the hold space to the pattern space. .TP (2)\|\f3h\I parameters\^ that have no values) are removed. .SS Filename Generation. Following substitution, each command .I word\^ is scanned for the characters .BR \(** , .BR ? , and .BR \*(OK . If one of these characters appears then the word is regarded as a .IR pattern . The word is replaced with alphabetically sorted filenames that match the pattern. If no filename is found that matches the pattern, then the word is left unchanged. The character .B . at the start of a filename or immediately following a .BR / , as well as the character .B / itself, must be matched explicitly. .PP .PD 0 .RS .TP .B \(** Matches any string, including the null string. .TP .B ? Matches any single character. .TP .BR \*(OK .\|.\|.\^ \*(CK Matches any one of the enclosed characters. A pair of characters separated by .B \- matches any character lexically between the pair, inclusive. If the first character following the opening \`\`\*(OK\'\' is a .B "``!''" then any character not enclosed is matched. .PD .RE .SS Quoting. The following charN standard input or output respectively. If \fIcount\fP is given, it specifies the number of breakpoints to be ignored. .TP 5 \fIlinenumber\fB c\fI count\fR .br .ns .TP 5 \fIlinenumber\fB C\fI count\fR Continue after a breakpoint or interrupt. If \fIcount\fP is given, it specifies the number of breakpoints to be ignored. \fBC\fP continues with the signal that caused the program to stop reactivated and \fBc\fP ignores it. If a linenumber is specified then a temporary breakpoint is placed at the line and execution is continued. The breakpoint is deleted when the command finishes. .TP 5 \fIlinenumber\fB g\fI count\fR Continue after a breakpoint with execution resumed at the given line. If \fIcount\fP is given, it specifies the number of breakpoints to be ignored. .TP 5 \fBs \fIcount\fR .br .ns .TP 5 \fBS \fIcount\fR Single step the program through \fIcount\fP lines. If no count is given then the program is run for one line. .B S is equivalent to .B s except it steps through procedure calls. .TP 5 \fBi\fR .br .ns .fP Replace the contents of the hold space by the contents of the pattern space. .TP (2)\|\f3H\fP Append the contents of the pattern space to the hold space. .TP (1)\|\f3i\e\fP .br .ns .TP .I text\^ Insert. Place .I text\^ on the standard output. .TP (2)\|\f3l\fP List the pattern space on the standard output in an unambiguous form. Non-printing characters are spelled in two-digit .SM ASCII and long lines are folded. .TP (2)\|\f3n\fP Copy the pattern space to the standard output. Replace the pattern space with the next line of input. .TP (2)\|\f3N\fP Append the next line of input to the pattern space with an embedded new-line character. (The current line number changes.) .TP (2)\|\f3p\fP Print. Copy the pattern space to the standard output. .TP (2)\|\f3P\fP Copy the initial segment of the pattern space through the first new-line character to the standard output. .TP (1)\|\f3q\fP Quit. Branch to the end of the script. Do not start a new cycle. .TP .RI (2)\|\f3r\fP " rfile\^" Read the contents of .IR rfile . Placwz}TP 5 \fBI\fR Single step by one machine-language instruction. \fBI\fP steps with the signal that caused the program to stop reactivated and \fBi\fP ignores it. .TP 5 \fIvariable$\fBm \fIcount\fR .br .ns .TP 5 \fIaddress:\fBm \fIcount\fR Single step (as with \fBs\fP) until the specified location is modified with a new value. If \fIcount\fP is omitted, it is effectively infinity. \fIVariable\fR must be accessible from the current procedure. Since this command is done by software, it can be very slow. .TP 5 \fIlevel\fB v \fR Toggle verbose mode, for use when single stepping with \fBS\fP, \fBs\fP or \fBm\fP. If \fIlevel\fP is omitted, then just the current source file and/or subroutine name is printed when either changes. If \fIlevel\fP is 1 or greater, each C source line is printed before it is executed; if \fIlevel\fP is 2 or greater, each assembler statement is also printed. A \fBv\fP turns verbose mode off if it is on for any level. .TP 5 .B k Kill the program being debugged. .TP 5 procedure\fB(\fParg1,arg2,.O e them on the output before reading the next input line. .TP .RI (2)\|\f3s\fP/ "regular expression" / replacement / flags\^ Substitute the .I replacement\^ string for instances of the .I regular expression\^ in the pattern space. Any character may be used instead of .BR / . For a fuller description see .IR ed (1). .I Flags\^ is zero or more of: .RS .RS .TP .B g Global. Substitute for all nonoverlapping instances of the .I regular expression\^ rather than just the first one. .TP .B p Print the pattern space if a replacement was made. .TP .BI w " wfile\^" Write. Append the pattern space to .I wfile\^ if a replacement was made. .RE .RE .TP .RI (2)\|\f3t\fP " label\^" Test. Branch to the .B : command bearing the .I label\^ if any substitutions have been made since the most recent reading of an input line or execution of a .BR t . If .I label\^ is empty, branch to the end of the script. .TP .RI (2)\|\f3w\fP " wfile\^" Write. Append the pattern space to .IR wfile . .TP (2)\|\f3x\fP Exchange the contents of the pattacters have a special meaning to the shell and cause termination of a word unless quoted: .RS .PP \f3; & ( ) \(bv ^ < > new\^line space tab\fP .RE .PP A character may be .I quoted\^ (i.e., made to stand for itself) by preceding it with a .BR \e . The pair .B \enew line is ignored. All characters enclosed between a pair of single quote marks (\^\f3\*'\^\*'\fP\^), except a single quote, are quoted. Inside double quote marks (\f3"\^"\fP), parameter and command substitution occur and .B \e quotes the characters .BR \e , .BR \*` , \f3"\fP, and .BR $ . .B "$\(**" is equivalent to \f3"$1 \|$2\fP \|.\|.\|.\f3"\fP, whereas .B "$@" is equivalent to .B "$1"\| .B "$2"\| \&.\|.\|.\|. .SS Prompting. When used interactively, the shell prompts with the value of .SM .B PS1 before reading a command. If at any time a new-line character is typed and further input is needed to complete a command, then the secondary prompt (i.e., the value of .BR \s-1PS2\s+1 ) is issued. .SS Input/Output. Before a command is executed, it..\fB)\fP .br .ns .TP 5 procedure\fB(\fParg1,arg2,...\fB)/\fP\fIm\fP Execute the named procedure with the given arguments. Arguments can be integer, character or string constants or names of variables accessible from the current procedure. The second form causes the value returned by the procedure to be printed according to format \fIm\fP. If no format is given, it defaults to .BR d . .TP 5 \fIlinenumber\fB b\fR \fIcommands\fR Set a breakpoint at the given line. If a procedure name without a line number is given (e.g., \fBproc:\fR), a breakpoint is placed at the first line in the procedure even if it was not compiled with the .B \-g option. If no \fIlinenumber\fP is given, a breakpoint is placed at the current line. If no .I commands\^ are given, execution stops just before the breakpoint and control is returned to .IR sdb . Otherwise the .I commands\^ are executed when the breakpoint is encountered and execution continues. Multiple commands are specified by separating them with semicolons. If \fBk\fP is useern and hold spaces. .TP .RI (2)\|\f3y\fP/ string1 / string2 /\^ Transform. Replace all occurrences of characters in .I string1\^ with the corresponding character in .IR string2 . The lengths of .I string1 and .I string2\^ must be equal. .TP .RI (2)\f3!\fP " function\^" Don't. Apply the .I function\^ (or group, if .I function\^ is .BR {\| ) only to lines .I not\^ selected by the address(es). .TP .RI (0)\|\f3:\fP " label\^" This command does nothing; it bears a .I label\^ for .B b and .B t commands to branch to. .TP (1)\|\f3=\fP Place the current line number on the standard output as a line. .TP (2)\|\f3{\fP Execute the following commands through a matching .B } only when the pattern space is selected. .TP (0)\| An empty command is ignored. .PD .SH SEE ALSO awk(1), ed(1), grep(1). .br ``Stream Editor'' in the .IR "\*(6) Document Processing Guide" . .\" @(#)sed.1 1.7 O s input and output may be redirected using a special notation interpreted by the shell. The following may appear anywhere in a simple-command or may precede or follow a command and are not passed on to the invoked command; substitution occurs before .I word\^ or .I digit\^ is used: .PP .PD 0 .TP 14 .B word Use file .I word\^ as standard output (file descriptor 1). If the file does not exist, it is created; otherwise, it is truncated to zero length. .TP .B >\h@-.3m@>word Use file .I word\^ as standard output. If the file exists, output is appended to it (by first seeking to the end-of-file); otherwise, the file is created. .TP \f3<\h@-.3m@<\fP\*(OK\f3\-\fP\*(CK\f3word\fP The shell input is read up to a line that is the same as .IR word , or to an end-of-file. The resulting document becomes the standard input. If any character of .I word\^ is quoted, then no interpretation is placed upon the characters of the document; otherwise, parameter d as a command to execute at a breakpoint, control returns to .IR sdb , instead of continuing execution. .TP 5 .B B Print a list of the currently active breakpoints. .TP 5 \fIlinenumber\fB d\fR Delete a breakpoint at the given line. If no \fIlinenumber\fP is given, the breakpoints are deleted interactively. Each breakpoint location is printed and a line is read from the standard input. If the line begins with a .B y or .B d , the breakpoint is deleted. .TP 5 .B D Delete all breakpoints. .TP 5 .B l Print the last executed line. .TP 5 \fIlinenumber\fB a\fR Announce. If \fIlinenumber\fR is of the form .IB proc : number\fR, the command effectively does a .IB "linenumber " "b l\fR. If \fIlinenumber\fR is of the form .IB proc :\fR, the command effectively does a .IB proc ": b T"\fR. .PP Miscellaneous commands: .TP 5 .BI ! command\^ The command is interpreted by .IR sh (1). .TP 5 .B new-line If the previous command printed a source line, advance the current line by one line and print the new current line. If the pre.if t .ds ' \h@.05m@\s+4\v@.333m@\'\v@-.333m@\s-4\h@.05m@ .if n .ds ' ' .if t .ds ` \h@.05m@\s+4\v@.333m@\`\v@-.333m@\s-4\h@.05m@ .if n .ds ` ` .ds OK [\| .ds CK \|] .TH SH 1 .SH NAME sh, rsh \- shell, the standard/restricted command programming language .SH SYNOPSIS .B sh [ .B \-ceiknrstuvx ] [ args ] .br .B rsh [ .B \-ceiknrstuvx ] [ args ] .SH DESCRIPTION .I Sh\^ is a command programming language that executes commands read from a terminal or a file. .I Rsh\^ is a restricted version of the standard command interpreter .IR sh ; it is used to set up login names and execution environments whose capabilities are more controlled than those of the standard shell. See .I Invocation\^ below for the meaning of arguments to the shell. .SS Commands. A .I simple-command\^ is a sequence of non-blank .I words\^ separated by .I blanks\^ (a .I blank\^ is a tab or a space). The first word specifies the name of the command to be executed. Except as specified below, the remaining words are passed as arguments to the invoked substitution and command substitution occur, (unescaped) .B \enew line is ignored, and .B \e must be used to quote the characters .BR \e , .BR $ , .BR \*` , and the first character of .IR word . If .B \- is appended to .BR <\h@-.3m@< , all leading tabs are stripped from .I word\^ and from the document. .TP .B <&digit The standard input is duplicated from file descriptor .I digit\^ (see .IR dup (2)). The standard output can be duplicated similarly, using .B > in place of .BR < . .TP .B <&\- The standard input is closed. The standard output can be closed similarly, using .B > in place of .BR < . .PD .PP If one of the above is preceded by a digit, the file descriptor created is that specified by the digit (instead of the default 0 or 1). For example: .RS .PP \f3\&.\|.\|. \|2>&1\f1 .RE .PP creates file descriptor 2 that is a duplicate of file descriptor 1. .PP If a command is followed by .BR & , the default standard input for the command is the empty file .BR /dev/null . Otherwise, the environment for the execu