xref: /386bsd/usr/src/games/dm/dm.conf.5 (revision a2142627)
1.\" Copyright (c) 1988, 1991 Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"     @(#)dm.conf.5	5.8 (Berkeley) 5/10/91
33.\"
34.Dd May 10, 1991
35.Dt DM.CONF 5
36.Os BSD 4.2
37.Sh NAME
38.Nm dm.conf
39.Nd \&dm configuration file
40.Sh DESCRIPTION
41The
42.Xr dm.conf
43file
44is the configuration file for the
45.Xr \&dm 8
46program.
47It consists of lines beginning with one of three keywords, ``badtty'',
48``game'', and ``time''.  All other lines are ignored.
49.Pp
50Any tty listed after the keyword ``badtty'' may not have games played on
51it.
52Entries consist of two white-space separated fields: the string
53``badtty'' and the ttyname as returned by
54.Xr ttyname 3 .
55For example,
56to keep the uucp dialout, ``tty19'', from being used for games, the
57entry would be:
58.Bd -literal -offset indent
59badtty	/dev/tty19
60.Ed
61.Pp
62Any day/hour combination listed after the keyword ``time'' will disallow
63games during those hours.  Entries consist of four white-space separated
64fields: the string ``time'', the unabbreviated day of the week and the
65beginning and ending time of a period of the day when games may not be
66played.  The time fields are in a 0 based, 24-hour clock.  For example,
67the following entry allows games playing before 8AM and after 5PM on
68Mondays.
69.Bd -literal -offset indent
70time		Monday	8	17
71.Ed
72.Pp
73Any game listed after the keyword ``game'' will set parameters for a specific
74game.  Entries consist of five white-space separated fields: the keyword
75``game'', the name of a game, the highest system load average at which the
76game may be played, the maximum users allowed if the game is to be played,
77and the priority at which the game is to be run.  Any of these fields may
78start with a non-numeric character, resulting in no game limitation or
79priority based on that field.  The game "default" controls the settings for
80any game not otherwise listed, and must be the last ``game'' entry in the
81file.  Priorities may not be negative.  For example, the following entries
82limits the game ``hack'' to running only when the system has 10 or less
83users and a load average of 5 or less; all other games may be run any time
84the system has 15 or less users.
85.Bd -literal -offset indent
86game		hack		5	10	*
87game		default	*	15	*
88.Ed
89.Sh FILES
90.Bl -tag -width /etc/dm.conf -compact
91.It Pa /etc/dm.conf
92The
93.Xr \&dm 8
94configuration file.
95.El
96.Sh SEE ALSO
97.Xr setpriority 2 ,
98.Xr ttyname 3 ,
99.Xr dm 8
100