1 .\" Copyright (c) 1988, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)dm.conf.5 8.1 (Berkeley) 5/31/93
33 .\" $FreeBSD: src/games/dm/dm.conf.5,v 1.3.2.2 2001/08/16 10:08:22 ru Exp $
34 .\" $DragonFly: src/games/dm/dm.conf.5,v 1.2 2003/06/17 04:25:23 dillon Exp $
41 .Nd \&dm configuration file
46 is the configuration file for the
49 It consists of lines beginning with one of three keywords, ``badtty'',
50 ``game'', and ``time''. All other lines are ignored.
52 Any tty listed after the keyword ``badtty'' may not have games played on
54 Entries consist of two white-space separated fields: the string
55 ``badtty'' and the ttyname as returned by
58 to keep the uucp dialout, ``tty19'', from being used for games, the
60 .Bd -literal -offset indent
64 Any day/hour combination listed after the keyword ``time'' will disallow
65 games during those hours. Entries consist of four white-space separated
66 fields: the string ``time'', the unabbreviated day of the week and the
67 beginning and ending time of a period of the day when games may not be
68 played. The time fields are in a 0 based, 24-hour clock. For example,
69 the following entry allows games playing before 8AM and after 5PM on
71 .Bd -literal -offset indent
75 Any game listed after the keyword ``game'' will set parameters for a specific
76 game. Entries consist of five white-space separated fields: the keyword
77 ``game'', the name of a game, the highest system load average at which the
78 game may be played, the maximum users allowed if the game is to be played,
79 and the priority at which the game is to be run. Any of these fields may
80 start with a non-numeric character, resulting in no game limitation or
81 priority based on that field. The game "default" controls the settings for
82 any game not otherwise listed, and must be the last ``game'' entry in the
83 file. Priorities may not be negative. For example, the following entries
84 limits the game ``hack'' to running only when the system has 10 or less
85 users and a load average of 5 or less; all other games may be run any time
86 the system has 15 or less users.
87 .Bd -literal -offset indent
92 .Bl -tag -width /etc/dm.conf -compact