From owner-man-jp-reviewer@jp.FreeBSD.org Fri Jan 30 14:46:54 2004
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) id i0U5ksq55112;
	Fri, 30 Jan 2004 14:46:54 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from dns02.mail.yahoo.co.jp (dns02.mail.yahoo.co.jp [211.14.15.205])
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) with SMTP/inet id i0U5krC55107
	for <man-jp-reviewer@jp.FreeBSD.org>; Fri, 30 Jan 2004 14:46:53 +0900 (JST)
	(envelope-from rieuxjp@yahoo.co.jp)
Received: from unknown (HELO yahoo.co.jp) (rieuxjp@61.198.188.146 with plain)
  by dns02.mail.yahoo.co.jp with SMTP; 30 Jan 2004 05:46:47 -0000
X-Apparently-From: <rieuxjp@yahoo.co.jp>
Message-ID: <4019EFC6.20303@yahoo.co.jp>
From: Yoshihito Ryuzaki <rieuxjp@yahoo.co.jp>
User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.3.1) Gecko/20030524
X-Accept-Language: ja, en-us, en
MIME-Version: 1.0
To: man-jp-reviewer@jp.FreeBSD.org
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
Date: Fri, 30 Jan 2004 14:46:46 +0900
X-Sequence: man-jp-reviewer 4541
Subject: [man-jp-reviewer 4541] first draft: devfs.8
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: rieuxjp@yahoo.co.jp
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+040130

$BN6:j$G$9!#(B
devfs.8$B$N=iLu$G$-$^$7$?!#(B
$B%l%S%e!<$*4j$$$7$^$9!#(B

-- $B$3$3$+$i(B
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
--- man8/devfs.8        Thu Dec 25 14:25:17 2003
+++ ja_JP.eucJP/man8/devfs.8    Fri Jan 30 13:30:57 2004
@@ -17,330 +17,331 @@
 .\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL
 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT
 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY
 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 .\" SUCH DAMAGE.
 .\"
-.\" $FreeBSD: src/sbin/devfs/devfs.8,v 1.8 2003/09/14 13:41:57 ru Exp $
+.\" %FreeBSD: src/sbin/devfs/devfs.8,v 1.8 2003/09/14 13:41:57 ru Exp %
 .\"
 .Dd July 1, 2002
 .Dt DEVFS 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm devfs
-.Nd "DEVFS control"
-.Sh SYNOPSIS
+.Nd DEVFS $B@)8f%3%^%s%I(B
+.Sh $B=q<0(B
 .Nm
 .Op Fl m Ar mount-point
 .Ar keyword
 .Ar argument ...
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility provides an interface to manipulate properties of
+$B%f!<%F%#%j%F%#$O!"%^%&%s%H$5$l$?(B
 .Xr devfs 5
-mounts.
+$B$N%W%m%Q%F%#$rA`:n$9$k$?$a$N%$%s%?!<%U%'%$%9$G$9!#(B
 .Pp
-The
 .Ar keyword
-argument determines the context for
-the rest of the arguments.
-For example,
-most of the commands related to the rule subsystem must be preceded by the
+$B0z?t$G;D$j$N0z?t$N%3%s%F%-%9%H$r;XDj$7$^$9!#(B
+$BNc$($P!"(B
+$B$[$H$s$I$N%k!<%k%5%V%7%9%F%`4XO"$N%3%^%s%I$NA0$K$O(B
 .Cm rule
-keyword.
-The following flags are common to all keywords:
+$B%-!<%o!<%I$r$D$1$J$1$l$P$J$i$J$$$3$H$K$J$C$F$$$^$9!#(B
+$B<!$N%U%i%0$O$9$Y$F$N%-!<%o!<%I$K6&DL$N$b$N$G$9(B:
 .Bl -tag -offset indent
 .It Fl m Ar mount-point
-Operate on
-.Ar mount-point ,
-which is expected to be a
+$BA`:n$9$k(B
+.Ar mount-point
+$B$r;XDj$7$^$9!#(B
+$B$3$3$K$O!"(B
 .Xr devfs 5
-mount.
-If this option is not specified,
+$B$,%^%&%s%H$5$l$F$$$J$1$l$P$J$j$^$;$s!#(B
+$B$3$N%*%W%7%g%s$,$J$$;~$K$O!"(B
 .Nm
-operates on
-.Pa /dev .
+$B$O(B
+.Pa /dev
+$B$rA`:n$7$^$9!#(B
 .El
-.Ss Rule Subsystem
-The
+.Ss $B%k!<%k%5%V%7%9%F%`(B
 .Xr devfs 5
-rule subsystem provides a way for the administrator of a system to control
-the attributes of DEVFS nodes.
+$B$N%k!<%k%5%V%7%9%F%`$O!"%7%9%F%`4IM}<T$,(B DEVFS $B$N3F%N!<%I$NB0@-$rJQ99$G$-$k(B
+$B$h$&$K$9$k$?$a$N$b$N$G$9!#(B
 .\" XXX devfs node?  entry?  what?
-Each DEVFS mount-point has a
-.Dq ruleset ,
-or a list of rules,
-associated with it.
-When a device driver creates a new node,
-all the rules in the ruleset associated with each mount-point are applied
-(see below) before the node becomes visible to the userland.
-This permits the administrator to change the properties,
-including the visibility,
-of certain nodes.
-For example, one might want to hide all disk nodes in a
-.Xr jail 2 Ns 's
-.Pa /dev .
-.Ss Rule Manipulation
-Rule manipulation commands follow the
+DEVFS $B%^%&%s%H%]%$%s%H$K$O$=$l$>$l$K(B
+.Dq ruleset
+($B%k!<%k%;%C%H(B) $B$H$$$&%k!<%k$N%j%9%H$,4XO"$E$1$i$l$F$$$^$9!#(B
+$B%G%P%$%9%I%i%$%P$,?7$7$$%N!<%I$r:n@.$9$k;~$K$O!"(B
+$B$=$N%N!<%I$,%f!<%6%i%s%I$+$i8+$($k$h$&$K$J$kA0$K(B
+$B$=$l$>$l$N%^%&%s%H%]%$%s%H$K4XO"$E$1$i$l$F$$$k%k!<%k%;%C%H$N(B
+$B$9$Y$F$N%k!<%k$,E,MQ$5$l$^$9(B ($B2<5-;2>H(B) $B!#(B
+$B$3$l$K$h$C$F!"4IM}<T$,%N!<%I$N2D;k@-$r4^$a$?B0@-$rJQ99$9$k$3$H$,(B
+$B$G$-$k$h$&$K$J$C$F$$$^$9!#(B
+$BNc$($P!"(B
+.Xr jail 2 Ns
+$B$N(B
+.Pa /dev
+$B$K$"$k$9$Y$F$N%G%#%9%/%N!<%I$r1#$9$H$$$&$h$&$J$3$H$b$G$-$^$9!#(B
+.Ss $B%k!<%k$NA`:n(B
+$B%k!<%kA`:n%3%^%s%I$O(B
 .Cm rule
-keyword.
-The following flags are common to all of the rule manipulation commands:
+$B%-!<%o!<%I$KB3$1$F;HMQ$7$^$9!#(B
+$B<!$N%U%i%0$O!"$9$Y$F$N%k!<%kA`:n%3%^%s%I$K6&DL$N$b$N$G$9(B :
 .Bl -tag -offset indent
 .It Fl s Ar ruleset
-Operate on the ruleset with the number
-.Ar ruleset .
-If this is not specified,
-the commands operate on the ruleset currently associated with the
-specified mount-point.
+.Ar ruleset
+$B$G;XDj$7$?%k!<%k%;%C%H$rA`:n$7$^$9!#(B
+$B$3$N%U%i%0$,;XDj$5$l$F$$$J$$;~$O!"(B
+$B;XDj$7$?%^%&%s%H%]%$%s%H$K8=:_4XO"$E$1$i$l$F$$$k%k!<%k%;%C%H$r(B
+$BA`:n$7$^$9!#(B
 .El
 .Pp
-The following commands are recognized:
+$B<!$N%3%^%s%I$,;HMQ$G$-$^$9(B :
 .Bl -tag -offset indent
 .It Cm rule add Oo Ar rulenum Oc Ar rulespec
-Add the rule described by
 .Ar rulespec
-(defined below)
-to the ruleset.
-The rule has the number
+($B2<5-;2>H(B)
+$B$G!"5-=R$5$l$?%k!<%k$r%k!<%k%;%C%H$KDI2C$7$^$9!#(B
+$B%k!<%kHV9f$O!"(B
 .Ar rulenum
-if it is explicitly specified;
-otherwise, the rule number is automatically determined by the kernel.
+$B$,L@<(E*$K;XDj$5$l$F$$$k>l9g$K$O$=$NHV9f$K!"(B
+$B;XDj$5$l$F$$$J$$>l9g$K$O<+F0E*$K%+!<%M%k$K$h$C$F7h$a$i$l$^$9!#(B
 .It Cm rule apply Ar rulenum | rulespec
-Apply rule number
+$B%k!<%kHV9f(B
 .Ar rulenum
-or the rule described by
+$B$^$?$O(B
 .Ar rulespec
-to the mount-point.
-Rules that are
-.Dq applied
-have their conditions checked against all nodes
-in the mount-point, and the actions taken if they match.
+$B$G!";XDj$5$l$?%k!<%k$r%^%&%s%H%]%$%s%H$KE,MQ$7$^$9!#(B
+.Dq $BE,MQ$5$l$k(B
+$B%k!<%k$K$O>r7o$,$"$C$F!"%^%&%s%H%]%$%s%H$N$9$Y$F$N%N!<%I$KBP$7$F(B
+$B%A%'%C%/$r9T$$!">r7o$,0lCW$9$l$P;XDj$N%"%/%7%g%s$r5/$3$7$^$9!#(B
 .It Cm rule applyset
-Apply all the rules in the ruleset to the mount-point
-(see above for the definition of
-.Dq apply ) .
+$B%k!<%k%;%C%H$N$9$Y$F$N%k!<%k$r%^%&%s%H%]%$%s%H$KE,MQ$7$^$9(B
+($B>e5-(B
+.Dq apply
+$B$N@bL@$r;2>H(B) $B!#(B
 .It Cm rule del Ar rulenum
-Delete rule number
+$B%k!<%k%;%C%H$+$i%k!<%kHV9f(B
 .Ar rulenum
-from the ruleset.
+$B$N%k!<%k$r:o=|$7$^$9!#(B
 .It Cm rule delset
-Delete all rules from the ruleset.
+$B;XDj$7$?%k!<%k%;%C%H$N$9$Y$F$N%k!<%k$r:o=|$7$^$9!#(B
 .It Cm rule show Op Ar rulenum
-Display the rule number
-.Ar rulenum ,
-or all the rules in the ruleset.
-The output lines (one line per rule) are expected to be valid
-.Ar rulespec Ns s .
+.Ar rulenum
+$B$G;XDj$7$?%k!<%kHV9f$N%k!<%k!"(B
+$B$^$?$O%k!<%k%;%C%H$N$9$Y$F$N%k!<%k$rI=<($7$^$9!#(B
+$B=PNO9T$O(B ($B%k!<%kKh$K(B 1 $B9T$:$D(B) $B@5$7$$(B
+.Ar rulespec Ns
+$B$K$J$C$F$$$^$9!#(B
 .It Cm rule showsets
-Report the numbers of existing rulesets.
+$B@_Dj$5$l$F$$$k%k!<%k%;%C%H$NHV9f$rI=<($7$^$9!#(B
 .It Cm ruleset Ar ruleset
-Set ruleset number
 .Ar ruleset
-as the current ruleset for the mount-point.
+$B$G;XDj$7$?HV9f$N%k!<%k%;%C%H$r%^%&%s%H%]%$%s%H$N%+%l%s%H%k!<%k%;%C%H$K(B
$B$7$^$9!#(B
 .El
-.Ss Rule Specification
-Rules have two parts: the conditions and the actions.
-The conditions determine which DEVFS nodes the rule matches,
-and the actions determine what should be done when a rule matches a node.
-For example, a rule can be written that sets the GID to
+.Ss $B%k!<%k;EMM(B
+$B%k!<%k$K$O(B 2 $B$D$N%Q!<%H$,$"$j$^$9(B: $B>r7oIt$H%"%/%7%g%sIt$G$9!#(B
+$B>r7oIt$G%k!<%k$rE,MQ$9$k(B DEVFS $B%N!<%I$r;XDj$7!"(B
+$B%"%/%7%g%sIt$G%k!<%k$,Ev$F$O$^$k%N!<%I$K2?$r$9$k$+$r;XDj$7$^$9!#(B
+$BNc$($P!"%a%8%c!<HV9f$,(B 53 $B$N$9$Y$F$N%G%P%$%9$N(B GID $B$r(B
 .Dq Li games
-for all devices with major number 53.
-If the first token of a rule specification is a single dash
-.Pq Sq Fl ,
-rules are read from the standard input and the rest of the specification
-is ignored.
-.Pp
-The following conditions are recognized.
-Conditions are ANDed together when matching a device;
-if OR is desired, multiple rules can be written.
+$B$K@_Dj$9$k%k!<%k$r=q$/$3$H$b$G$-$^$9!#(B
+$B%k!<%k;XDj$N:G=i$N%H!<%/%s$,%@%C%7%eJ8;z(B 1 $B$D(B
+.Pq Sq Fl
+$B$N>l9g!"%k!<%k$OI8=`F~NO$+$iFI$_9~$^$l$F;D$j$N;XDj$OL5;k$5$l$^$9!#(B
+.Pp
+$B<!$N$h$&$J>r7o$,;HMQ$G$-$^$9!#(B
+$B%G%P%$%9$r%A%'%C%/$9$k;~$K$O!">r7o$O(B AND $B$5$l$^$9!#(B
+OR $B>r7o$r;H$$$?$$;~$K$O!"J#?t$N%k!<%k$r=q$$$F$/$@$5$$!#(B
 .Bl -tag -offset indent
 .It Cm major Ar majdev
-Matches any node with a major number equal to
-.Ar majdev .
+$B%a%8%c!<HV9f$,(B
+.Ar majdev
+$B$N$9$Y$F$N%N!<%I$KE,9g$7$^$9!#(B
 .It Cm path Ar pattern
-Matches any node with a path that matches
-.Ar pattern .
-The latter is interpreted as a
-.Xr glob 3 Ns -style
-pattern.
+$B%Q%9L>$,(B
+.Ar pattern
+$B$K9g$&%N!<%I$9$Y$F$KE,9g$7$^$9!#(B
+$B$3$N%Q%?!<%s$O(B
+.Xr glob 3 Ns $B$HF1$8%Q%?!<%s$G(B
+$B2r@O$5$l$^$9!#(B
 .It Cm type Ar devtype
-Matches any node that is of type
-.Ar devtype .
-Valid types are
+$B%?%$%W$,(B
+.Ar devtype
+$B$N$9$Y$F$N%N!<%I$KE,9g$7$^$9!#(B
+$B;HMQ$G$-$k%?%$%W$O(B
 .Cm disk , mem , tape
-and
-.Cm tty .
+$B$*$h$S(B
+.Cm tty
+$B$G$9!#(B
 .El
 .Pp
-The following actions are recognized.
-Although there is no explicit delimiter between conditions and actions,
-they may not be intermixed.
+$B<!$N$h$&$J%"%/%7%g%s$,;HMQ$G$-$^$9!#(B
+$B>r7oIt$H%"%/%7%g%sIt$N4V$K$OFC$K%G%j%_%?$O$"$j$^$;$s$,!"(B
+$B:.Mp$9$k$3$H$O$J$$$G$7$g$&!#(B
 .Bl -tag -offset indent
 .It Cm group Ar gid
-Set the GID of the node to
-.Ar gid ,
-which may be a group name
-(looked up in
-.Pa /etc/group )
-or number.
+$B%N!<%I$N%0%k!<%W(B ID $B$r(B
+.Ar gid
+$B$K@_Dj$7$^$9!#%0%k!<%WL>(B
+(
+.Pa /etc/group
+$B$G>H2q$5$l$^$9(B)
+$B$^$?$O!"?tCM$G;XDj$7$^$9!#(B
 .It Cm hide
-Hide the node.
-Nodes may later be revived manually with
-.Xr mknod 8 ,
-or with the
+$B%N!<%I$r1#$7$^$9!#(B
+$B1#$5$l$?%N!<%I$O!"%^%K%e%"%k$G(B
+.Xr mknod 8
+$B$r;HMQ$9$k$+!"(B
 .Cm unhide
-action.
+$B%"%/%7%g%s$r;HMQ$9$k$H$^$?8+$($k$h$&$K$J$j$^$9!#(B
 .It Cm include Ar ruleset
-Apply all the rules in ruleset number
+$B%k!<%k%;%C%HHV9f$,(B
 .Ar ruleset
-to the node.
-This does not necessarily result in any changes to the node
-(e.g., if none of the rules in the included ruleset match).
+$B$N%k!<%k%;%C%H$N$9$Y$F$N%k!<%k$r%N!<%I$KE,MQ$7$^$9!#(B
+$B$3$l$K$h$C$F%N!<%I$,JQ99$5$l$k$H$O8B$j$^$;$s(B
+($BNc$($P!"%k!<%k%;%C%H$K0lCW$9$k%k!<%k$,$J$$>l9g$J$I(B) $B!#(B
 .It Cm mode Ar filemode
-Set the file mode to
-.Ar filemode ,
-which is interpreted in octal.
+$B%U%!%$%k$N%b!<%I$r(B
+.Ar filemode
+$B$K@_Dj$7$^$9!#(B8$B?J?t$H$7$F2r<a$5$l$^$9!#(B
 .It Cm user Ar uid
-Set the UID to
-.Ar uid ,
-which may be a user name
-(looked up in
-.Pa /etc/passwd )
-or number.
+$B%f!<%6(B ID $B$r(B
+.Ar uid
+$B$K@_Dj$7$^$9!#%f!<%6L>(B (
+.Pa /etc/passwd
+$B$G>H2q$5$l$^$9(B) $B$^$?$O?tCM$G;XDj$7$^$9!#(B
 .It Cm unhide
-Unhide the node.
+$B%N!<%I$r8+$($k$h$&$K$7$^$9!#(B
 .El
-.Sh IMPLEMENTATION NOTES
-Rulesets are created by the kernel at the first reference,
-and destroyed when the last reference disappears.
-E.g., a ruleset is created when a rule is added to it or when it is set
-as the current ruleset for a mount-point;
-a ruleset is destroyed when the last rule in it is deleted,
-and no other references to it exist
-(i.e., it is not included by any rules, and it is not the current ruleset
-for any mount-point).
-.Pp
-Ruleset number 0 is the default ruleset for all new mount-points.
-It is always empty, cannot be modified or deleted, and does not show up
-in the output of
-.Cm showsets .
-.Pp
-Rules and rulesets are unique to the entire system,
-not a particular mount-point.
-I.e., a
+.Sh $B<BAu$K4X$9$kCm(B
+$B%k!<%k%;%C%H$O!":G=i$K;2>H$5$l$k;~$K%+!<%M%k$K$h$C$F:n@.$5$l!"(B
+$B:G8e$N;2>H$,$J$/$J$k;~$K:o=|$5$l$^$9!#(B
+$B$9$J$o$A!"%k!<%k%;%C%H$O%k!<%k$,DI2C$5$l$k;~$+$I$3$+$N%^%&%s%H%]%$%s%H$N(B
+$B%+%l%s%H%k!<%k%;%C%H$K@_Dj$5$l$?;~$K:n@.$5$l$^$9!#(B
+$B$^$?!"%;%C%H$NCf$N:G8e$N%k!<%k$,:o=|$5$l$k;~$G$b$&B>$+$i$N;2>H$b$J$$(B
+($B$D$^$j!"B>$N%k!<%k$K%$%s%/%k!<%I$5$l$F$b$J$/!"$I$N%^%&%s%H%]%$%s%H$N%+(B
$B%l%s%H%k(B
$B!<%k%;%C%H$K$b$J$C$F$$$J$$(B) $B;~$K:o=|$5$l$^$9!#(B
+.Pp
+$B%k!<%k%;%C%H(B 0 $BHV$O$9$Y$F$N?7$7$$%^%&%s%H%]%$%s%H$N%G%U%)%k%H%k!<%k%;%C(B
$B%H$G$9!#(B
+$B$3$N%k!<%k%;%C%H$O>o$K6u$G!"JQ99$d:o=|$O$G$-$:!"(B
+.Cm showsets
+$B%3%^%s%I$N=PNO$K$bI=<($5$l$^$;$s!#(B
+.Pp
+$B%k!<%k$d%k!<%k%;%C%H$OFCDj$N%^%&%s%H%]%$%s%HKh$G$O$J$/!"(B
+$B%7%9%F%`A4BN$G0l0U$G$9!#(B
+$B$D$^$j!"(B
 .Cm showsets
-will return the same information regardless of the mount-point
specified with
-.Fl m .
-The mount-point is only relevant when changing what its current ruleset is,
-or when using one of the apply commands.
-.Sh EXAMPLES
-When the system boots,
-the only ruleset that exists is ruleset number 0;
-since the latter may not be modified, we have to create another ruleset
-before adding rules.
-Note that since most of the following examples do not specify
-.Fl m ,
-the operations are performed on
+$B$O!"(B
+.Fl m
+$B$G;XDj$7$?%^%&%s%H%]%$%s%H$K$+$+$o$i$:!"$D$M$KF1$8>pJs$rI=<($7$^$9!#(B
+$B%^%&%s%H%]%$%s%H$,M-8z$J$N$O!"%+%l%s%H%k!<%k%;%C%H$rJQ99$9$k;~$d(B apply
$B%3%^%s%I(B
$B$r;HMQ$9$k;~$@$1$G$9!#(B
+.Sh $B<B9TNc(B
+$B%7%9%F%`5/F0;~$K$O!"(B
+$B%k!<%k%;%C%H(B 0 $BHV$N$_$,B8:_$7$^$9$,!"(B
+$B$3$N%k!<%k%;%C%H$O8e$+$iJQ99$9$k$3$H$,$G$-$J$$$N$G!"(B
+$B%k!<%k$rDI2C$9$kA0$KJL$N%k!<%k%;%C%H$r:n@.$7$J$1$l$P$J$j$^$;$s!#(B
+$B0J2<$NNc$G$O$[$H$s$I(B
+.Fl m
+$B%*%W%7%g%s$r;XDj$7$F$$$^$;$s$N$G!"(B
+$BA`:n$O(B
 .Pa /dev
-(this only matters for things that might change the properties of nodes).
+$B$KBP$7$F<B9T$5$l$k$3$H$KCm0U$7$F$/$@$5$$(B
+($B$3$l$O!"%N!<%I$N%W%m%Q%F%#$rJQ99$9$k$b$N$@$1$,LdBj$@$+$i$G$9(B) $B!#(B
 .Pp
 .Dl "devfs ruleset 10"
 .Pp
-Specify that ruleset 10 should be the current ruleset for
+$B%k!<%k%;%C%H(B 10 $BHV$r(B
 .Pa /dev
-(if it does not already exist, it is created).
+$B$N%+%l%s%H%k!<%k%;%C%H$K;XDj$7$F$$$^$9(B
+($B$b$7!"B8:_$7$F$$$J$1$l$P:n@.$5$l$^$9(B) $B!#(B
 .Pp
 .Dl "devfs rule add path speaker mode 666"
 .Pp
-Add a rule that causes all nodes that have a path that matches
+$B%Q%9L>$,(B
 .Dq Li speaker
-(this is only
-.Pa /dev/speaker )
-to have the file mode 666 (read and write for all).
-Note that if any such nodes already exist, their mode will not be changed
-unless this rule (or ruleset) is explicitly applied (see below).
-The mode
-.Em will
-be changed if the node is created
-.Em after
-the rule is added
-(e.g., the
+$B$K%^%C%A$9$k$9$Y$F$N%N!<%I(B
+($B$3$l$O(B
+.Pa /dev/speaker
+$B$@$1$G$9$,(B)
+$B$r%U%!%$%k%b!<%I(B 666 ($B$9$Y$F$N%f!<%6$,FI$_=q$-2DG=(B) $B$K$9$k%k!<%k$rDI2C(B
$B$7$F$$$^(B\
$B$9!#(B
+$B5$$r$D$1$FM_$7$$$N$O!"$=$N$h$&$J%N!<%I$,4{$KB8:_$9$k>l9g$K$O!"(B
+$B$3$N%k!<%k(B ($B$d%k!<%k%;%C%H(B) $B$,L@<(E*$KE,MQ$5$l$k(B ($B2<5-;2>H(B) $B$^$G(B
+$B$=$N%N!<%I$OJQ99$5$l$J$$$H$$$&$3$H$G$9!#(B
+$B%b!<%I$,JQ99(B
+.Em $B$5$l$k(B
+$B$N$O%k!<%k$,DI2C$5$l$?(B
+.Em $B8e$K(B
+$B%N!<%I$,:n@.$5$l$?>l9g$G$9(B
+($B$D$^$j!">e5-$N%k!<%k$,DI2C$5$l$?8e$K(B
 .Pa atspeaker
-module is loaded after the above rule is added).
+$B%b%8%e!<%k$,%m!<%I$5$l$?>l9g(B) $B!#(B
 .Pp
 .Dl "devfs rule applyset"
 .Pp
-Apply all the rules in the current ruleset to all the existing nodes.
-E.g., if the above rule was added after
+$B%+%l%s%H%k!<%k%;%C%H$N$9$Y$F$N%k!<%k$rB8:_$9$k$9$Y$F$N%N!<%I$KE,MQ$7$F(B
$B$$$^$9!#(B
+$B$D$^$j!">e5-$N%k!<%k$,(B
 .Pa /dev/speaker
-was created,
-this command will cause its file mode to be changed to 666,
-as rule prescribes.
+$B$r:n@.$7$?8e$KDI2C$5$l$?>l9g$K!"(B
+$B$3$N%3%^%s%I$r;HMQ$7$F%k!<%kDL$j$K%U%!%$%k%b!<%I$r(B 666 $B$K$9$k$3$H$,$G$-(B
$B$^$9!#(B
 .Pp
 .Dl devfs rule add path "snp*" mode 660 group snoopers
 .Pp
-(Quoting the argument to
-.Cm path
-is often necessary to disable the shell's globbing features.)
-For all devices with a path that matches
+($B0z?t$r0zMQId$G0O$&$N$O(B
+.Cm $B%Q%9L>(B
+$B$,%7%'%k$N%U%!%$%k%0%i%V5!G=$GE83+$5$l$k$N$rKI$0I,MW$,$"$k$+$i$G$9!#(B)
+$B%Q%9L>$,(B
 .Dq Li snp* ,
-set the file more to 660, and the GID to
-.Dq Li snoopers .
-This permits users in the
+$B$K%^%C%A$9$k$9$Y$F$N%G%P%$%9$N%U%!%$%k%b!<%I$r(B 660 $B$K!"(BGID $B$r(B
+.Dq Li snoopers
+$B$K@_Dj$7$^$9!#(B
+$B$3$N$h$&$K$9$k$H!"(B
 .Dq Li snoopers
-group to use the
+$B%0%k!<%W$N%f!<%6$,(B
 .Xr snp 4
-devices.
+$B%G%P%$%9$r;H$($k$h$&$K$J$j$^$9!#(B
 .Pp
 .Dl "devfs rule -s 20 add major 53 group games"
 .Pp
-Add a rule to ruleset number 20.
-Since this ruleset is not the current ruleset for any mount-points,
-this rule is never applied automatically (unless ruleset 20 becomes
-a current ruleset for some mount-point at a later time).
-However, it can be applied explicitly, as such:
+$B%k!<%k%;%C%H(B 20 $BHV$K%k!<%k$rDI2C$7$^$9!#(B
+$B$3$N%k!<%k%;%C%H$O$I$3$N%^%&%s%H%]%$%s%H$N%+%l%s%H%k!<%k%;%C%H$K$b$J$C(B
$B$F$$$J$$(B\
$B$N$G!"$3$N%k!<%k$,<+F0E*$KE,MQ$5$l$k$3$H$O$"$j$^$;$s(B
+($B8e$G%k!<%k%;%C%H(B 20 $BHV$,$I$3$+$N%^%&%s%H%]%$%s%H$N%+%l%s%H%k!<%k%;%C%H(B
$B$K$J$k$^(B
$B$G$O(B) $B!#(B
+$B$=$l$G$b0J2<$N$h$&$K$7$F!"L@<(E*$K%k!<%k$rE,MQ$9$k$3$H$,$G$-$^$9(B:
 .Pp
 .Dl "devfs -m /my/jail/dev rule -s 20 applyset"
 .Pp
-This will apply all rules in ruleset number 20 to the DEVFS mount on
-.Pa /my/jail/dev .
-It does not matter that ruleset 20 is not the current ruleset for that
-mount-point; the rules are applied regardless.
+$B$3$N%3%^%s%I$G$O%k!<%k%;%C%H(B 20 $BHV$N$9$Y$F$N%k!<%k$r(B
+.Pa /my/jail/dev
+$B$N(B DEVFS $B%^%&%s%H$KE,MQ$7$F$$$^$9!#(B
+$B$3$N$H$-$K$O!"%k!<%k%;%C%H(B 20 $BHV$,$=$N%^%&%s%H%]%$%s%H$N%+%l%s%H%k!<%k(B
$B%;%C%H$G(B\
$B$"$k$+$I$&$+$K$+$+$o$j$J$/%k!<%k$,E,MQ$5$l$^$9!#(B
 .Pp
 .Dl "devfs rule apply hide"
 .Pp
-Since this rule has no conditions, the action
+$B$3$N%k!<%k$K$O>r7oIt$,$"$j$^$;$s$N$G!"(B
 .Pq Cm hide
-will be applied to all nodes.
-Since hiding all nodes is not very useful, we can undo like so:
+$B%"%/%7%g%s$,$9$Y$F$N%N!<%I$KE,MQ$5$l$^$9!#(B
+$B$9$Y$F$N%N!<%I$rHsI=<($K$9$k$N$O$"$^$jJXMx$G$O$"$j$^$;$s$N$G!"2<$N$h$&(B
$B$K$7$F<h(B\
$B$j>C$9$3$H$,$G$-$^$9(B:
 .Pp
 .Dl "devfs rule apply unhide"
 .Pp
-which applies
+$B$3$N%3%^%s%I$O(B
 .Cm unhide
-to all the nodes,
-causing them to reappear.
+$B$r$9$Y$F$N%N!<%I$KE,MQ$7$F!"(B
+$B:F$SI=<($5$l$k$h$&$K$7$F$$$^$9!#(B
 .Pp
 .Dl "cat my_rules | devfs rule -s 10 add -"
 .Pp
-Add all the rules from the file
 .Pa my_rules
-to ruleset 10.
+$B%U%!%$%k$K=q$$$F$"$k%k!<%k$r$9$Y$F%k!<%k%;%C%H(B 10 $BHV$KDI2C$7$^$9!#(B
 .Pp
 .Dl "devfs rule -s 20 show | devfs rule -s 10 add -"
 .Pp
-Since
 .Cm show
-outputs valid rules,
-this feature can be used to copy rulesets.
-The above copies all the rules from ruleset 20 into ruleset 10.
-The rule numbers are preserved,
-but ruleset 10 may already have rules with non-conflicting numbers
-(these will be preserved).
-.Sh SEE ALSO
+$B%3%^%s%I$N=PNO$,M-8z$J%k!<%k$K$J$C$F$$$k$N$G!"(B
+$B$3$N5!G=$rMxMQ$7$F%k!<%k%;%C%H$r%3%T!<$9$k$3$H$,$G$-$^$9!#(B
+$B>e$N%3%^%s%I$G$O!"%k!<%k%;%C%H(B 20 $BHV$N%k!<%k$r$9$Y$F%k!<%k%;%C%H(B 10 $BHV(B
$B$K%3%T!<(B\
$B$7$F$$$^$9!#(B
+$B%k!<%kHV9f$OM=Ls$5$l$F$$$^$9$,!"(B
+$B%k!<%k%;%C%H(B 10 $BHV$K$O$9$G$K>WFM$7$J$$HV9f$N%k!<%k$,F~$C$F$$$^$9(B ($B$=$N(B
$BHV9f$bM=(B\
$BLs$5$l$^$9(B) $B!#(B
+.Sh $B4XO"9`L\(B
 .Xr chmod 1 ,
 .Xr jail 2 ,
 .Xr glob 3 ,
@@ -348,5 +349,5 @@
 .Xr chown 8 ,
 .Xr jail 8 ,
 .Xr mknod 8
-.Sh AUTHORS
+.Sh $B:n<T(B
 .An Dima Dorfman
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-- $B$3$3$^$G(B
--
Yoshihito Ryuzaki

Everythingness is nothingness
Nothingness is everythingness


__________________________________________________
Do You Yahoo!?
Yahoo! BB is Broadband by Yahoo!
http://bb.yahoo.co.jp/

