]>
Commit | Line | Data |
---|---|---|
9bccf70c A |
1 | .\" $NetBSD: intro.2,v 1.6 1995/02/27 12:33:41 cgd Exp $ |
2 | .\" | |
3 | .\" Copyright (c) 1980, 1983, 1986, 1991, 1993 | |
4 | .\" The Regents of the University of California. All rights reserved. | |
5 | .\" | |
6 | .\" Redistribution and use in source and binary forms, with or without | |
7 | .\" modification, are permitted provided that the following conditions | |
8 | .\" are met: | |
9 | .\" 1. Redistributions of source code must retain the above copyright | |
10 | .\" notice, this list of conditions and the following disclaimer. | |
11 | .\" 2. Redistributions in binary form must reproduce the above copyright | |
12 | .\" notice, this list of conditions and the following disclaimer in the | |
13 | .\" documentation and/or other materials provided with the distribution. | |
14 | .\" 3. All advertising materials mentioning features or use of this software | |
15 | .\" must display the following acknowledgement: | |
16 | .\" This product includes software developed by the University of | |
17 | .\" California, Berkeley and its contributors. | |
18 | .\" 4. Neither the name of the University nor the names of its contributors | |
19 | .\" may be used to endorse or promote products derived from this software | |
20 | .\" without specific prior written permission. | |
21 | .\" | |
22 | .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
23 | .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
24 | .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
25 | .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
26 | .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
27 | .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
28 | .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
29 | .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
30 | .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
31 | .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
32 | .\" SUCH DAMAGE. | |
33 | .\" | |
34 | .\" @(#)intro.2 8.3 (Berkeley) 12/11/93 | |
35 | .\" | |
36 | .Dd December 11, 1993 | |
37 | .Dt INTRO 2 | |
38 | .Os BSD 4 | |
39 | .Sh NAME | |
40 | .Nm intro | |
41 | .Nd introduction to system calls and error numbers | |
42 | .Sh SYNOPSIS | |
43 | .Fd #include <sys/errno.h> | |
44 | .Sh DESCRIPTION | |
45 | This section provides an overview of the system calls, | |
46 | their error returns, and other common definitions and concepts. | |
47 | .\".Pp | |
48 | .\".Sy System call restart | |
49 | .\".Pp | |
50 | .\"<more later...> | |
51 | .Sh DIAGNOSTICS | |
52 | Nearly all of the system calls provide an error number in the external | |
53 | variable | |
54 | .Va errno , | |
55 | which is defined as: | |
56 | .Pp | |
57 | .Dl extern int errno | |
58 | .Pp | |
59 | When a system call detects an error, | |
60 | it returns an integer value | |
61 | indicating failure (usually -1) | |
62 | and sets the variable | |
63 | .Va errno | |
64 | accordingly. | |
65 | <This allows interpretation of the failure on receiving | |
66 | a -1 and to take action accordingly.> | |
67 | Successful calls never set | |
68 | .Va errno ; | |
69 | once set, it remains until another error occurs. | |
70 | It should only be examined after an error. | |
71 | Note that a number of system calls overload the meanings of these | |
72 | error numbers, and that the meanings must be interpreted according | |
73 | to the type and circumstances of the call. | |
74 | .Pp | |
75 | The following is a complete list of the errors and their | |
76 | names as given in | |
77 | .Aq Pa sys/errno.h . | |
78 | .Bl -hang -width Ds | |
79 | .It Er 0 Em "Error 0" . | |
80 | Not used. | |
81 | .It Er 1 EPERM Em "Operation not permitted" . | |
82 | An attempt was made to perform an operation limited to processes | |
83 | with appropriate privileges or to the owner of a file or other | |
84 | resources. | |
85 | .It Er 2 ENOENT Em "No such file or directory" . | |
86 | A component of a specified pathname did not exist, or the | |
87 | pathname was an empty string. | |
88 | .It Er 3 ESRCH Em "No such process" . | |
89 | No process could be found corresponding to that specified by the given | |
90 | process ID. | |
91 | .It Er 4 EINTR Em "Interrupted function call" . | |
92 | An asynchronous signal (such as | |
93 | .Dv SIGINT | |
94 | or | |
95 | .Dv SIGQUIT ) | |
96 | was caught by the process during the execution of an interruptible | |
97 | function. If the signal handler performs a normal return, the | |
98 | interrupted function call will seem to have returned the error condition. | |
99 | .It Er 5 EIO Em "Input/output error" . | |
100 | Some physical input or output error occurred. | |
101 | This error will not be reported until a subsequent operation on the same file | |
102 | descriptor and may be lost (over written) by any subsequent errors. | |
103 | .It Er 6 ENXIO Em "\&No such device or address" . | |
104 | Input or output on a special file referred to a device that did not | |
105 | exist, or | |
106 | made a request beyond the limits of the device. | |
107 | This error may also occur when, for example, | |
108 | a tape drive is not online or no disk pack is | |
109 | loaded on a drive. | |
110 | .It Er 7 E2BIG Em "Arg list too long" . | |
111 | The number of bytes used for the argument and environment | |
112 | list of the new process exceeded the limit | |
113 | .Dv NCARGS | |
114 | (specified in | |
115 | .Aq Pa sys/param.h ) . | |
116 | .It Er 8 ENOEXEC Em "Exec format error" . | |
117 | A request was made to execute a file | |
118 | that, although it has the appropriate permissions, | |
119 | was not in the format required for an | |
120 | executable file. | |
121 | .It Er 9 EBADF Em "Bad file descriptor" . | |
122 | A file descriptor argument was out of range, referred to no open file, | |
123 | or a read (write) request was made to a file that was only open for | |
124 | writing (reading). | |
125 | .It Er 10 ECHILD Em "\&No child processes" . | |
126 | A | |
127 | .Xr wait | |
128 | or | |
129 | .Xr waitpid | |
130 | function was executed by a process that had no existing or unwaited-for | |
131 | child processes. | |
132 | .It Er 11 EDEADLK Em "Resource deadlock avoided" . | |
133 | An attempt was made to lock a system resource that | |
134 | would have resulted in a deadlock situation. | |
135 | .It Er 12 ENOMEM Em "Cannot allocate memory" . | |
136 | The new process image required more memory than was allowed by the hardware | |
137 | or by system-imposed memory management constraints. | |
138 | A lack of swap space is normally temporary; however, | |
139 | a lack of core is not. | |
140 | Soft limits may be increased to their corresponding hard limits. | |
141 | .It Er 13 EACCES Em "Permission denied" . | |
142 | An attempt was made to access a file in a way forbidden | |
143 | by its file access permissions. | |
144 | .It Er 14 EFAULT Em "Bad address" . | |
145 | The system detected an invalid address in attempting to | |
146 | use an argument of a call. | |
147 | .It Er 15 ENOTBLK Em "Not a block device" . | |
148 | A block device operation was attempted on a non-block device or file. | |
149 | .It Er 16 EBUSY Em "Resource busy" . | |
150 | An attempt to use a system resource which was in use at the time | |
151 | in a manner which would have conflicted with the request. | |
152 | .It Er 17 EEXIST Em "File exists" . | |
153 | An existing file was mentioned in an inappropriate context, | |
154 | for instance, as the new link name in a | |
155 | .Xr link | |
156 | function. | |
157 | .It Er 18 EXDEV Em "Improper link" . | |
158 | A hard link to a file on another file system | |
159 | was attempted. | |
160 | .It Er 19 ENODEV Em "Operation not supported by device" . | |
161 | An attempt was made to apply an inappropriate | |
162 | function to a device, | |
163 | for example, | |
164 | trying to read a write-only device such as a printer. | |
165 | .It Er 20 ENOTDIR Em "Not a directory" . | |
166 | A component of the specified pathname existed, but it was | |
167 | not a directory, when a directory was expected. | |
168 | .It Er 21 EISDIR Em "Is a directory" . | |
169 | An attempt was made to open a directory with write mode specified. | |
170 | .It Er 22 EINVAL Em "Invalid argument" . | |
171 | Some invalid argument was supplied. (For example, | |
172 | specifying an undefined signal to a | |
173 | .Xr signal | |
174 | or | |
175 | .Xr kill | |
176 | function). | |
177 | .It Er 23 ENFILE Em "Too many open files in system" . | |
178 | Maximum number of file descriptors allowable on the system | |
179 | has been reached and a requests for an open cannot be satisfied | |
180 | until at least one has been closed. | |
181 | .It Er 24 EMFILE Em "Too many open files" . | |
182 | <As released, the limit on the number of | |
183 | open files per process is 64.> | |
184 | .Xr Getdtablesize 2 | |
185 | will obtain the current limit. | |
186 | .It Er 25 ENOTTY Em "Inappropriate ioctl for device" . | |
187 | A control function (see | |
188 | .Xr ioctl 2 ) | |
189 | was attempted for a file or | |
190 | special device for which the operation was inappropriate. | |
191 | .It Er 26 ETXTBSY Em "Text file busy" . | |
192 | The new process was a pure procedure (shared text) file | |
193 | which was open for writing by another process, or | |
194 | while the pure procedure file was being executed an | |
195 | .Xr open | |
196 | call requested write access. | |
197 | .It Er 27 EFBIG Em "File too large" . | |
198 | The size of a file exceeded the maximum (about | |
199 | .if t 2\u\s-231\s+2\d | |
200 | .if n 2.1E9 | |
201 | bytes). | |
202 | .It Er 28 ENOSPC Em "Device out of space" . | |
203 | A | |
204 | .Xr write | |
205 | to an ordinary file, the creation of a | |
206 | directory or symbolic link, or the creation of a directory | |
207 | entry failed because no more disk blocks were available | |
208 | on the file system, or the allocation of an inode for a newly | |
209 | created file failed because no more inodes were available | |
210 | on the file system. | |
211 | .It Er 29 ESPIPE Em "Illegal seek" . | |
212 | An | |
213 | .Xr lseek | |
214 | function was issued on a socket, pipe or | |
215 | .Tn FIFO . | |
216 | .It Er 30 EROFS Em "Read-only file system" . | |
217 | An attempt was made to modify a file or directory | |
218 | was made | |
219 | on a file system that was read-only at the time. | |
220 | .It Er 31 EMLINK Em "Too many links" . | |
221 | Maximum allowable hard links to a single file has been exceeded (limit | |
222 | of 32767 hard links per file). | |
223 | .It Er 32 EPIPE Em "Broken pipe" . | |
224 | A write on a pipe, socket or | |
225 | .Tn FIFO | |
226 | for which there is no process | |
227 | to read the data. | |
228 | .It Er 33 EDOM Em "Numerical argument out of domain" . | |
229 | A numerical input argument was outside the defined domain of the mathematical | |
230 | function. | |
231 | .It Er 34 ERANGE Em "Numerical result out of range" . | |
232 | A numerical result of the function was too large to fit in the | |
233 | available space (perhaps exceeded precision). | |
234 | .It Er 35 EAGAIN Em "Resource temporarily unavailable" . | |
235 | This is a temporary condition and later calls to the | |
236 | same routine may complete normally. | |
237 | .It Er 36 EINPROGRESS Em "Operation now in progress" . | |
238 | An operation that takes a long time to complete (such as | |
239 | a | |
240 | .Xr connect 2 ) | |
241 | was attempted on a non-blocking object (see | |
242 | .Xr fcntl 2 ) . | |
243 | .It Er 37 EALREADY Em "Operation already in progress" . | |
244 | An operation was attempted on a non-blocking object that already | |
245 | had an operation in progress. | |
246 | .It Er 38 ENOTSOCK Em "Socket operation on non-socket" . | |
247 | Self-explanatory. | |
248 | .It Er 39 EDESTADDRREQ Em "Destination address required" . | |
249 | A required address was omitted from an operation on a socket. | |
250 | .It Er 40 EMSGSIZE Em "Message too long" . | |
251 | A message sent on a socket was larger than the internal message buffer | |
252 | or some other network limit. | |
253 | .It Er 41 EPROTOTYPE Em "Protocol wrong type for socket" . | |
254 | A protocol was specified that does not support the semantics of the | |
255 | socket type requested. For example, you cannot use the | |
256 | .Tn ARPA | |
257 | Internet | |
258 | .Tn UDP | |
259 | protocol with type | |
260 | .Dv SOCK_STREAM . | |
261 | .It Er 42 ENOPROTOOPT Em "Protocol not available" . | |
262 | A bad option or level was specified in a | |
263 | .Xr getsockopt 2 | |
264 | or | |
265 | .Xr setsockopt 2 | |
266 | call. | |
267 | .It Er 43 EPROTONOSUPPORT Em "Protocol not supported" . | |
268 | The protocol has not been configured into the | |
269 | system or no implementation for it exists. | |
270 | .It Er 44 ESOCKTNOSUPPORT Em "Socket type not supported" . | |
271 | The support for the socket type has not been configured into the | |
272 | system or no implementation for it exists. | |
273 | .It Er 45 EOPNOTSUPP Em "Operation not supported" . | |
274 | The attempted operation is not supported for the type of object referenced. | |
275 | Usually this occurs when a file descriptor refers to a file or socket | |
276 | that cannot support this operation, | |
277 | for example, trying to | |
278 | .Em accept | |
279 | a connection on a datagram socket. | |
280 | .It Er 46 EPFNOSUPPORT Em "Protocol family not supported" . | |
281 | The protocol family has not been configured into the | |
282 | system or no implementation for it exists. | |
283 | .It Er 47 EAFNOSUPPORT Em "Address family not supported by protocol family" . | |
284 | An address incompatible with the requested protocol was used. | |
285 | For example, you shouldn't necessarily expect to be able to use | |
286 | .Tn NS | |
287 | addresses with | |
288 | .Tn ARPA | |
289 | Internet protocols. | |
290 | .It Er 48 EADDRINUSE Em "Address already in use" . | |
291 | Only one usage of each address is normally permitted. | |
292 | .It Er 49 EADDRNOTAVAIL Em "Cannot assign requested address" . | |
293 | Normally results from an attempt to create a socket with an | |
294 | address not on this machine. | |
295 | .It Er 50 ENETDOWN Em "Network is down" . | |
296 | A socket operation encountered a dead network. | |
297 | .It Er 51 ENETUNREACH Em "Network is unreachable" . | |
298 | A socket operation was attempted to an unreachable network. | |
299 | .It Er 52 ENETRESET Em "Network dropped connection on reset" . | |
300 | The host you were connected to crashed and rebooted. | |
301 | .It Er 53 ECONNABORTED Em "Software caused connection abort" . | |
302 | A connection abort was caused internal to your host machine. | |
303 | .It Er 54 ECONNRESET Em "Connection reset by peer" . | |
304 | A connection was forcibly closed by a peer. This normally | |
305 | results from a loss of the connection on the remote socket | |
306 | due to a timeout or a reboot. | |
307 | .It Er 55 ENOBUFS Em "\&No buffer space available" . | |
308 | An operation on a socket or pipe was not performed because | |
309 | the system lacked sufficient buffer space or because a queue was full. | |
310 | .It Er 56 EISCONN Em "Socket is already connected" . | |
311 | A | |
312 | .Xr connect | |
313 | request was made on an already connected socket; or, | |
314 | a | |
315 | .Xr sendto | |
316 | or | |
317 | .Xr sendmsg | |
318 | request on a connected socket specified a destination | |
319 | when already connected. | |
320 | .It Er 57 ENOTCONN Em "Socket is not connected" . | |
321 | An request to send or receive data was disallowed because | |
322 | the socket was not connected and (when sending on a datagram socket) | |
323 | no address was supplied. | |
324 | .It Er 58 ESHUTDOWN Em "Cannot send after socket shutdown" . | |
325 | A request to send data was disallowed because the socket | |
326 | had already been shut down with a previous | |
327 | .Xr shutdown 2 | |
328 | call. | |
329 | .It Er 60 ETIMEDOUT Em "Operation timed out" . | |
330 | A | |
331 | .Xr connect | |
332 | or | |
333 | .Xr send | |
334 | request failed because the connected party did not | |
335 | properly respond after a period of time. (The timeout | |
336 | period is dependent on the communication protocol.) | |
337 | .It Er 61 ECONNREFUSED Em "Connection refused" . | |
338 | No connection could be made because the target machine actively | |
339 | refused it. This usually results from trying to connect | |
340 | to a service that is inactive on the foreign host. | |
341 | .It Er 62 ELOOP Em "Too many levels of symbolic links" . | |
342 | A path name lookup involved more than 8 symbolic links. | |
343 | .It Er 63 ENAMETOOLONG Em "File name too long" . | |
344 | A component of a path name exceeded 255 | |
345 | .Pq Dv MAXNAMELEN | |
346 | characters, or an entire | |
347 | path name exceeded 1023 | |
348 | .Pq Dv MAXPATHLEN Ns -1 | |
349 | characters. | |
350 | .It Er 64 EHOSTDOWN Em "Host is down" . | |
351 | A socket operation failed because the destination host was down. | |
352 | .It Er 65 EHOSTUNREACH Em "No route to host" . | |
353 | A socket operation was attempted to an unreachable host. | |
354 | .It Er 66 ENOTEMPTY Em "Directory not empty" . | |
355 | A directory with entries other than | |
356 | .Ql \&. | |
357 | and | |
358 | .Ql \&.. | |
359 | was supplied to a remove directory or rename call. | |
360 | .It Er 67 EPROCLIM Em "Too many processes" . | |
361 | .It Er 68 EUSERS Em "Too many users" . | |
362 | The quota system ran out of table entries. | |
363 | .It Er 69 EDQUOT Em "Disc quota exceeded" . | |
364 | A | |
365 | .Xr write | |
366 | to an ordinary file, the creation of a | |
367 | directory or symbolic link, or the creation of a directory | |
368 | entry failed because the user's quota of disk blocks was | |
369 | exhausted, or the allocation of an inode for a newly | |
370 | created file failed because the user's quota of inodes | |
371 | was exhausted. | |
372 | .It Er 70 ESTALE Em "Stale NFS file handle" . | |
373 | An attempt was made to access an open file (on an | |
374 | .Tn NFS | |
375 | filesystem) | |
376 | which is now unavailable as referenced by the file descriptor. | |
377 | This may indicate the file was deleted on the | |
378 | .Tn NFS | |
379 | server or some | |
380 | other catastrophic event occurred. | |
381 | .It Er 72 EBADRPC Em "RPC struct is bad" . | |
382 | Exchange of | |
383 | .Tn RPC | |
384 | information was unsuccessful. | |
385 | .It Er 73 ERPCMISMATCH Em "RPC version wrong" . | |
386 | The version of | |
387 | .Tn RPC | |
388 | on the remote peer is not compatible with | |
389 | the local version. | |
390 | .It Er 74 EPROGUNAVAIL Em "RPC prog. not avail" . | |
391 | The requested program is not registered on the remote host. | |
392 | .It Er 75 EPROGMISMATCH Em "Program version wrong" . | |
393 | The requested version of the program is not available | |
394 | on the remote host | |
395 | .Pq Tn RPC . | |
396 | .It Er 76 EPROCUNAVAIL Em "Bad procedure for program" . | |
397 | An | |
398 | .Tn RPC | |
399 | call was attempted for a procedure which doesn't exist | |
400 | in the remote program. | |
401 | .It Er 77 ENOLCK Em "No locks available" . | |
402 | A system-imposed limit on the number of simultaneous file | |
403 | locks was reached. | |
404 | .It Er 78 ENOSYS Em "Function not implemented" . | |
405 | Attempted a system call that is not available on this | |
406 | system. | |
55e303ae A |
407 | .It Er 79 EFTYPE Em "Inappropriate file type or format" . |
408 | The file was the wrong type for the operation, or a data | |
409 | file had the wrong format. | |
410 | .It Er 80 EAUTH Em "Authentication error" . | |
411 | Attempted to use an invalid authentication ticket to | |
412 | mount an NFS file system. | |
413 | .It Er 81 ENEEDAUTH Em "Need authenticator" . | |
414 | An authentication ticket must be obtained before the | |
415 | given NFS file system may be mounted. | |
416 | .It Er 82 EPWROFF Em "Device power is off" . | |
417 | The device power is off. | |
418 | .It Er 83 EDEVERR Em "Device error" . | |
419 | A device error has occurred, e.g. a printer running out of paper. | |
420 | .It Er 84 EOVERFLOW Em "Value too large to be stored in data type" . | |
421 | A numerical result of the function was too large to be | |
422 | stored in the caller provided space. | |
423 | .It Er 85 EBADEXEC Em "Bad executable (or shared library)" . | |
424 | The executable or shared library being referenced was malformed. | |
425 | .It Er 86 EBADARCH Em "Bad CPU type in executable" . | |
426 | The executable in question does not support the current CPU. | |
427 | .It Er 87 ESHLIBVERS Em "Shared library version mismatch" . | |
428 | The version of the shared library on the system does not match | |
429 | the version which was expected. | |
430 | .It Er 88 EBADMACHO Em "Malformed Mach-o file" . | |
431 | The Mach object file is malformed. | |
432 | .It Er 89 ECANCELED Em "Operation canceled" . | |
433 | The scheduled operation was canceled. | |
434 | .It Er 90 EIDRM Em "Identifier removed" . | |
435 | An IPC identifier was removed while the current process | |
436 | was waiting on it. | |
437 | .It Er 91 ENOMSG Em "No message of desired type" . | |
438 | An IPC message queue does not contain a message of the | |
439 | desired type, or a message catalog does not contain the | |
440 | requested message. | |
441 | .It Er 92 EILSEQ Em "Illegal byte sequence" . | |
442 | While decoding a multibyte character the function came | |
443 | along an invalid or an incomplete sequence of bytes or | |
444 | the given wide character is invalid. | |
445 | .It Er 93 ENOATTR Em "Attribute not found" . | |
446 | The specified extended attribute does not exist. | |
447 | .El | |
9bccf70c A |
448 | .Sh DEFINITIONS |
449 | .Bl -tag -width Ds | |
450 | .It Process ID . | |
451 | Each active process in the system is uniquely identified by a non-negative | |
452 | integer called a process ID. The range of this ID is from 0 to 30000. | |
453 | .It Parent process ID | |
454 | A new process is created by a currently active process; (see | |
455 | .Xr fork 2 ) . | |
456 | The parent process ID of a process is initially the process ID of its creator. | |
457 | If the creating process exits, | |
458 | the parent process ID of each child is set to the ID of a system process, | |
459 | .Xr init . | |
460 | .It Process Group | |
461 | Each active process is a member of a process group that is identified by | |
462 | a non-negative integer called the process group ID. This is the process | |
463 | ID of the group leader. This grouping permits the signaling of related | |
464 | processes (see | |
465 | .Xr termios 4 ) | |
466 | and the job control mechanisms of | |
467 | .Xr csh 1 . | |
468 | .It Session | |
469 | A session is a set of one or more process groups. | |
470 | A session is created by a successful call to | |
471 | .Xr setsid 2 , | |
472 | which causes the caller to become the only member of the only process | |
473 | group in the new session. | |
474 | .It Session leader | |
475 | A process that has created a new session by a successful call to | |
476 | .Xr setsid 2 , | |
477 | is known as a session leader. | |
478 | Only a session leader may acquire a terminal as its controlling terminal (see | |
479 | .Xr termios 4 ) . | |
480 | .It Controlling process | |
481 | A session leader with a controlling terminal is a controlling process. | |
482 | .It Controlling terminal | |
483 | A terminal that is associated with a session is known as the controlling | |
484 | terminal for that session and its members. | |
485 | .It "Terminal Process Group ID" | |
486 | A terminal may be acquired by a session leader as its controlling terminal. | |
487 | Once a terminal is associated with a session, any of the process groups | |
488 | within the session may be placed into the foreground by setting | |
489 | the terminal process group ID to the ID of the process group. | |
490 | This facility is used | |
491 | to arbitrate between multiple jobs contending for the same terminal; | |
492 | (see | |
493 | .Xr csh 1 | |
494 | and | |
495 | .Xr tty 4 ) . | |
496 | .It "Orphaned Process Group" | |
497 | A process group is considered to be | |
498 | .Em orphaned | |
499 | if it is not under the control of a job control shell. | |
500 | More precisely, a process group is orphaned | |
501 | when none of its members has a parent process that is in the same session | |
502 | as the group, | |
503 | but is in a different process group. | |
504 | Note that when a process exits, the parent process for its children | |
505 | is changed to be | |
506 | .Xr init , | |
507 | which is in a separate session. | |
508 | Not all members of an orphaned process group are necessarily orphaned | |
509 | processes (those whose creating process has exited). | |
510 | The process group of a session leader is orphaned by definition. | |
511 | .It "Real User ID and Real Group ID" | |
512 | Each user on the system is identified by a positive integer | |
513 | termed the real user ID. | |
514 | .Pp | |
515 | Each user is also a member of one or more groups. | |
516 | One of these groups is distinguished from others and | |
517 | used in implementing accounting facilities. The positive | |
518 | integer corresponding to this distinguished group is termed | |
519 | the real group ID. | |
520 | .Pp | |
521 | All processes have a real user ID and real group ID. | |
522 | These are initialized from the equivalent attributes | |
523 | of the process that created it. | |
524 | .It "Effective User Id, Effective Group Id, and Group Access List" | |
525 | Access to system resources is governed by two values: | |
526 | the effective user ID, and the group access list. | |
527 | The first member of the group access list is also known as the | |
528 | effective group ID. | |
529 | (In POSIX.1, the group access list is known as the set of supplementary | |
530 | group IDs, and it is unspecified whether the effective group ID is | |
531 | a member of the list.) | |
532 | .Pp | |
533 | The effective user ID and effective group ID are initially the | |
534 | process's real user ID and real group ID respectively. Either | |
535 | may be modified through execution of a set-user-ID or set-group-ID | |
536 | file (possibly by one its ancestors) (see | |
537 | .Xr execve 2 ) . | |
538 | By convention, the effective group ID (the first member of the group access | |
539 | list) is duplicated, so that the execution of a set-group-ID program | |
540 | does not result in the loss of the original (real) group ID. | |
541 | .Pp | |
542 | The group access list is a set of group IDs | |
543 | used only in determining resource accessibility. Access checks | |
544 | are performed as described below in ``File Access Permissions''. | |
545 | .It "Saved Set User ID and Saved Set Group ID" | |
546 | When a process executes a new file, the effective user ID is set | |
547 | to the owner of the file if the file is set-user-ID, and the effective | |
548 | group ID (first element of the group access list) is set to the group | |
549 | of the file if the file is set-group-ID. | |
550 | The effective user ID of the process is then recorded as the saved set-user-ID, | |
551 | and the effective group ID of the process is recorded as the saved set-group-ID. | |
552 | These values may be used to regain those values as the effective user | |
553 | or group ID after reverting to the real ID (see | |
554 | .Xr setuid 2 ) . | |
555 | (In POSIX.1, the saved set-user-ID and saved set-group-ID are optional, | |
556 | and are used in setuid and setgid, but this does not work as desired | |
557 | for the super-user.) | |
558 | .It Super-user | |
559 | A process is recognized as a | |
560 | .Em super-user | |
561 | process and is granted special privileges if its effective user ID is 0. | |
562 | .It Special Processes | |
563 | The processes with process IDs of 0, 1, and 2 are special. | |
564 | Process 0 is the scheduler. Process 1 is the initialization process | |
565 | .Xr init , | |
566 | and is the ancestor of every other process in the system. | |
567 | It is used to control the process structure. | |
568 | Process 2 is the paging daemon. | |
569 | .It Descriptor | |
570 | An integer assigned by the system when a file is referenced | |
571 | by | |
572 | .Xr open 2 | |
573 | or | |
574 | .Xr dup 2 , | |
575 | or when a socket is created by | |
576 | .Xr pipe 2 , | |
577 | .Xr socket 2 | |
578 | or | |
579 | .Xr socketpair 2 , | |
580 | which uniquely identifies an access path to that file or socket from | |
581 | a given process or any of its children. | |
582 | .It File Name | |
583 | Names consisting of up to 255 | |
584 | .Pq Dv MAXNAMELEN | |
585 | characters may be used to name | |
586 | an ordinary file, special file, or directory. | |
587 | .Pp | |
588 | These characters may be selected from the set of all | |
589 | .Tn ASCII | |
590 | character | |
591 | excluding 0 (NUL) and the | |
592 | .Tn ASCII | |
593 | code for | |
594 | .Ql \&/ | |
595 | (slash). | |
596 | .Pp | |
597 | Note that it is generally unwise to use | |
598 | .Ql \&* , | |
599 | .Ql \&? , | |
600 | .Ql \&[ | |
601 | or | |
602 | .Ql \&] | |
603 | as part of | |
604 | file names because of the special meaning attached to these characters | |
605 | by the shell. | |
606 | .It Path Name | |
607 | A path name is a | |
608 | .Tn NUL Ns -terminated | |
609 | character string starting with an | |
610 | optional slash | |
611 | .Ql \&/ , | |
612 | followed by zero or more directory names separated | |
613 | by slashes, optionally followed by a file name. | |
614 | The total length of a path name must be less than 1024 | |
615 | .Pq Dv MAXPATHLEN | |
616 | characters. | |
617 | .Pp | |
618 | If a path name begins with a slash, the path search begins at the | |
619 | .Em root | |
620 | directory. | |
621 | Otherwise, the search begins from the current working directory. | |
622 | A slash by itself names the root directory. An empty | |
623 | pathname refers to the current directory. | |
624 | .It Directory | |
625 | A directory is a special type of file that contains entries | |
626 | that are references to other files. | |
627 | Directory entries are called links. By convention, a directory | |
628 | contains at least two links, | |
629 | .Ql \&. | |
630 | and | |
631 | .Ql \&.. , | |
632 | referred to as | |
633 | .Em dot | |
634 | and | |
635 | .Em dot-dot | |
636 | respectively. Dot refers to the directory itself and | |
637 | dot-dot refers to its parent directory. | |
638 | .It "Root Directory and Current Working Directory" | |
639 | Each process has associated with it a concept of a root directory | |
640 | and a current working directory for the purpose of resolving path | |
641 | name searches. A process's root directory need not be the root | |
642 | directory of the root file system. | |
643 | .It File Access Permissions | |
644 | Every file in the file system has a set of access permissions. | |
645 | These permissions are used in determining whether a process | |
646 | may perform a requested operation on the file (such as opening | |
647 | a file for writing). Access permissions are established at the | |
648 | time a file is created. They may be changed at some later time | |
649 | through the | |
650 | .Xr chmod 2 | |
651 | call. | |
652 | .Pp | |
653 | File access is broken down according to whether a file may be: read, | |
654 | written, or executed. Directory files use the execute | |
655 | permission to control if the directory may be searched. | |
656 | .Pp | |
657 | File access permissions are interpreted by the system as | |
658 | they apply to three different classes of users: the owner | |
659 | of the file, those users in the file's group, anyone else. | |
660 | Every file has an independent set of access permissions for | |
661 | each of these classes. When an access check is made, the system | |
662 | decides if permission should be granted by checking the access | |
663 | information applicable to the caller. | |
664 | .Pp | |
665 | Read, write, and execute/search permissions on | |
666 | a file are granted to a process if: | |
667 | .Pp | |
668 | The process's effective user ID is that of the super-user. (Note: | |
669 | even the super-user cannot execute a non-executable file.) | |
670 | .Pp | |
671 | The process's effective user ID matches the user ID of the owner | |
672 | of the file and the owner permissions allow the access. | |
673 | .Pp | |
674 | The process's effective user ID does not match the user ID of the | |
675 | owner of the file, and either the process's effective | |
676 | group ID matches the group ID | |
677 | of the file, or the group ID of the file is in | |
678 | the process's group access list, | |
679 | and the group permissions allow the access. | |
680 | .Pp | |
681 | Neither the effective user ID nor effective group ID | |
682 | and group access list of the process | |
683 | match the corresponding user ID and group ID of the file, | |
684 | but the permissions for ``other users'' allow access. | |
685 | .Pp | |
686 | Otherwise, permission is denied. | |
687 | .It Sockets and Address Families | |
688 | .Pp | |
689 | A socket is an endpoint for communication between processes. | |
690 | Each socket has queues for sending and receiving data. | |
691 | .Pp | |
692 | Sockets are typed according to their communications properties. | |
693 | These properties include whether messages sent and received | |
694 | at a socket require the name of the partner, whether communication | |
695 | is reliable, the format used in naming message recipients, etc. | |
696 | .Pp | |
697 | Each instance of the system supports some | |
698 | collection of socket types; consult | |
699 | .Xr socket 2 | |
700 | for more information about the types available and | |
701 | their properties. | |
702 | .Pp | |
703 | Each instance of the system supports some number of sets of | |
704 | communications protocols. Each protocol set supports addresses | |
705 | of a certain format. An Address Family is the set of addresses | |
706 | for a specific group of protocols. Each socket has an address | |
707 | chosen from the address family in which the socket was created. | |
55e303ae | 708 | .El |
9bccf70c | 709 | .Sh SEE ALSO |
9bccf70c A |
710 | .Xr perror 3 |
711 | .Sh HISTORY | |
712 | An | |
713 | .Nm intro | |
714 | manual page appeared in | |
715 | .At v6 . |