HP-UX Reference (11i v3 07/02) - 5 Miscellaneous Topics (vol 9)
Table of Contents
Volume Nine
Entry Name(Section): name Description
dld.so(5): dld.so ..................................................................................................................... dynamic loader
dlpi_max_clones(5): dlpi_max_clones .... maximum number of cloned DLPI streams allowed on the system
dma32_pool_size(5): dma32_pool_size ................ the amount of memory to reserve for the 32-bit DMA pool
dnlc_hash_locks(5): dnlc_hash_locks ........ number of locks for the Directory Name Lookup Cache (DNLC)
dontdump(5): dontdump
...................... defines which classes of kernel memory pages are not dumped when a kernel panic occurs
dst: difference between Universal (Greenwich mean) and local time ....................................... see timezone(5)
dump_compress_on(5): dump_compress_on
selects whether the system dumps memory pages compressed or uncompressed when a kernel panic occurs
dump_concurrent_on(5): dump_concurrent_on ......... enable or disable option for system to dump memory
using multiple dump units when a kernel panic occurs on Integrity systems
enable_idds(5): enable_idds .............................................................. enable intrusion detection data source
environ(5): environ ............................................................................................................ user environment
eqmem_limit(5): eqmem_limit
determines the maximum amount (in MB) of equivalently mapped memory which can be allocated after boot
eqmemsize(5) . determines the minimum size (in pages) of the equivalently mapped reserve pool (OBSOLETE)
EVM(5): EVM ....................................................................................................................... event management
EvmCallback(5): EvmCallback ................................................... event management (EVM) callback function
EvmConnection(5): EvmConnection ............................ connection to the EVM (Event Management) daemon
EvmEvent(5): EvmEvent ........................................................................................ structure of an EVM event
EvmFilter(5): EvmFilter .................................................................... EVM (Event Management) event filter
executable_stack(5) .............................................. controls whether program stacks are executable by default
expanded_node_host_names(5): expanded_node_host_names
.................................................... enable maximum length expansion of the system node and host names
fadvise(5): fadvise.h ..................................................... structures needed when using the fadvise() function
fadvise.h: structures needed when using the fadvise() function ............................................... see fadvise(5)
fcache_fb_policy(5): fcache_fb_policy .................... policy for flush behind requests from VxFS file system
fcache_seqlimit_file(5): fcache_seqlimit_file
....................................... percent of file cache that can be consumed by sequential accesses, per-file limit
fcache_seqlimit_system(5): fcache_seqlimit_system
................... percentage of file cache that can be consumed by sequential accesses, per system-wide limit
fcntl(5) ................................................................................................................................... file control options
fenv(5): fenv ......................................................................... floating-point environment macros and functions
filecache_max(5): filecache_max, filecache_min
................................... maximum or minimum amount of physical memory used for caching file I/O data
filecache_min: minimum amount of physical memory used for caching file I/O data ... see filecache_max(5)
fs_async(5): fs_async .................................... enables write calls to return before write operation is complete
fs_symlinks(5) ............................................... maximum number of symbolic links used to resolve a path name
fs_wrapper(5) ................................ configuration and binary files used by file system administration commands
gssapi(5): gssapi ............................................... Generic Security Service Application Programming Interface
gvid_no_claim_dev(5): gvid_no_claim_dev
........................................................... PCI Vendor/Device ID that the gvid graphics driver will not claim
hdlpreg_hash_locks(5) ............................................... determines size of pregion spinlock pool (OBSOLETED)
hfs_revra_per_disk(5): hfs_revra_per_disk
maximum HFS file system blocks to be read in one read-ahead operation when sequentially reading backwards
hier(5): hier .................................................................................................................... file system hierarchy
hires_timeout_enable(5): hires_timeout_enable ............................ enable high resolution timers support
hostname(5): hostname ................................................................................ host name resolution description
hosts_access(5): hosts_access ................................................................... format of host access control files
hosts_options(5): hosts_options ..................................................... host access control language extensions
intr_strobe_ics_pct(5): intr_strobe_ics_pct
..................................... limit for the percent of time a processor is allowed to spend in interrupt context
inttypes(5): inttypes ................................................................................................. basic integer data types
inttypes(5): inttypes .......................................................................................... fixed-size integer data types
ioctl(5): ioctl ............................................................................................... generic device control commands
ipmi_watchdog_action(5): ipmi_watchdog_action ......... sets action taken if IPMI watchdog timer expires
kconfig(5): kconfig ................................................................ introduction to kernel configuration commands
Kerberos(5): Kerberos ............................................................................ introduction to the Kerberos system
krs(5): krs .......................................................................................................... kernel registry services, KRS
ksi_alloc_max(5) ....................................................... system-wide limit of queued signals that can be allocated
ksi_send_max(5) ........................................................................ limit on number of queued signals per process
14 Hewlett-Packard Company HP-UX 11i Version 3: February 2007