Commit | Line | Data |
---|---|---|
7bfb82ad KB |
1 | .\" Copyright (c) 1987 Regents of the University of California. |
2 | .\" All rights reserved. The Berkeley software License Agreement | |
3 | .\" specifies the terms and conditions for redistribution. | |
4 | .\" | |
b3b5a8a7 | 5 | .\" @(#)dm.conf.5 5.2 (Berkeley) %G% |
7bfb82ad KB |
6 | .\" |
7 | .TH DM.CONFIG 5 "" | |
8 | .UC 5 | |
9 | .SH NAME | |
10 | dm.config \- dm configuration file | |
11 | .SH DESCRIPTION | |
b3b5a8a7 KB |
12 | \fIDm.config\fP is the configuration file for the \fIdm\fP(8) program. |
13 | It consists of lines beginning with one of three keywords, ``badtty'', | |
14 | ``game'', and ``time''. All other lines are ignored. | |
7bfb82ad | 15 | .PP |
b3b5a8a7 KB |
16 | Any tty listed after the keyword ``badtty'' may not have games played on |
17 | it. Entries consist of two white-space separated fields: the string | |
18 | ``badtty'' and the ttyname as returned by \fIttyname\fP(3). For example, | |
19 | to keep the uucp dialout, ``tty19'', from being used for games, the | |
20 | entry would be: | |
7bfb82ad | 21 | .PP |
b3b5a8a7 KB |
22 | .RS |
23 | badtty /dev/tty19 | |
24 | .RE | |
7bfb82ad | 25 | .PP |
b3b5a8a7 KB |
26 | Any day/hour combination listed after the keyword ``time'' will disallow |
27 | games during those hours. Entries consist of four white-space separated | |
28 | fields: the string ``time'', the unabbreviated day of the week and the | |
29 | beginning and ending time of a period of the day when games may not be | |
30 | played. The time fields are in a 0 based, 24-hour clock. For example, | |
31 | the following entry allows games playing before 8AM and after 5PM on | |
32 | Mondays. | |
33 | .PP | |
34 | .RS | |
35 | time Monday 8 17 | |
36 | .RE | |
37 | .PP | |
38 | Any game listed after the keyword ``game'' will set parameters for a specific | |
39 | game. Entries consist of five white-space separated fields: the keyword | |
40 | ``game'', the name of a game, the highest system load average at which the | |
41 | game may be played, the maximum users allowed if the game is to be played, | |
42 | and the priority at which the game is to be run. Any of these fields may | |
43 | start with a non-numeric character, resulting in no game limitation or | |
44 | priority based on that field. The game "default" controls the settings for | |
45 | any game not otherwise listed, and must be the last ``game'' entry in the | |
46 | file. Priorities may not be negative. For example, the following entries | |
47 | limits the game ``hack'' to running only when the system has 10 or less | |
48 | users and a load average of 5 or less; all other games may be run any time | |
49 | the system has 15 or less users. | |
50 | .PP | |
51 | .RS | |
52 | game hack 5 10 * | |
53 | game default * 15 * | |
54 | .RE | |
7bfb82ad KB |
55 | .SH "SEE ALSO" |
56 | setpriority(2), ttyname(3), dm(8) |