Markup fixes.

This commit is contained in:
Ruslan Ermilov 2006-09-29 17:57:04 +00:00
parent b3e2f7a6d8
commit bc84aa4ba3
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=162806
24 changed files with 531 additions and 313 deletions

View File

@ -66,8 +66,8 @@ The user name is restricted to whatever
.Xr pw 8 .Xr pw 8
will accept. will accept.
Generally this means it Generally this means it
may contain only lowercase characters or digits but cannot begin with may contain only lowercase characters or digits but cannot begin with the
.Sq Fl .Ql -
character. character.
Maximum length Maximum length
is 16 characters. is 16 characters.

View File

@ -133,18 +133,17 @@ the loopback interface.
Enables ARP proxying for all hosts on net. Enables ARP proxying for all hosts on net.
.El .El
.Sh DIAGNOSTICS .Sh DIAGNOSTICS
.Em "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!" : .Bl -diag
.It "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!"
ARP has discovered another host on the local network which responds to ARP has discovered another host on the local network which responds to
mapping requests for its own Internet address with a different Ethernet mapping requests for its own Internet address with a different Ethernet
address, generally indicating that two hosts are attempting to use the address, generally indicating that two hosts are attempting to use the
same Internet address. same Internet address.
.Pp .It "arp: link address is broadcast for IP address %d.%d.%d.%d!"
.Em "arp: link address is broadcast for IP address %d.%d.%d.%d!" :
ARP requested information for a host, and received an answer indicating ARP requested information for a host, and received an answer indicating
that the host's ethernet address is the ethernet broadcast address. that the host's ethernet address is the ethernet broadcast address.
This indicates a misconfigured or broken device. This indicates a misconfigured or broken device.
.Pp .It "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s"
.Em "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s" :
ARP had a cached value for the ethernet address of the referenced host, ARP had a cached value for the ethernet address of the referenced host,
but received a reply indicating that the host is at a new address. but received a reply indicating that the host is at a new address.
This can happen normally when host hardware addresses change, This can happen normally when host hardware addresses change,
@ -153,15 +152,13 @@ It can also indicate a problem with proxy ARP.
This message can only be issued if the sysctl This message can only be issued if the sysctl
.Va net.link.ether.inet.log_arp_movements .Va net.link.ether.inet.log_arp_movements
is set to 1, which is the system's default behaviour. is set to 1, which is the system's default behaviour.
.Pp .It "arpresolve: can't allocate llinfo for %d.%d.%d.%d"
.Em "arpresolve: can't allocate llinfo for %d.%d.%d.%d" :
The route for the referenced host points to a device upon which ARP is The route for the referenced host points to a device upon which ARP is
required, but ARP was unable to allocate a routing table entry in which required, but ARP was unable to allocate a routing table entry in which
to store the host's MAC address. to store the host's MAC address.
This usually points to a misconfigured routing table. This usually points to a misconfigured routing table.
It can also occur if the kernel cannot allocate memory. It can also occur if the kernel cannot allocate memory.
.Pp .It "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1"
.Em "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1" :
Physical connections exist to the same logical IP network on both if0 and if1. Physical connections exist to the same logical IP network on both if0 and if1.
It can also occur if an entry already exists in the ARP cache for the IP It can also occur if an entry already exists in the ARP cache for the IP
address above, and the cable has been disconnected from if0, then reconnected address above, and the cable has been disconnected from if0, then reconnected
@ -169,13 +166,13 @@ to if1.
This message can only be issued if the sysctl This message can only be issued if the sysctl
.Va net.link.ether.inet.log_arp_wrong_iface .Va net.link.ether.inet.log_arp_wrong_iface
is set to 1, which is the system's default behaviour. is set to 1, which is the system's default behaviour.
.Pp .It "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s"
.Em "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s" :
ARP has received an ARP reply that attempts to overwrite a permanent ARP has received an ARP reply that attempts to overwrite a permanent
antry in the local ARP table. entry in the local ARP table.
This error will be only logged, if the sysctl This error will only be logged if the sysctl
.Va net.link.ether.inet.log_arp_permanent_modify .Va net.link.ether.inet.log_arp_permanent_modify
is set to 1, which is the system's default behaviour. is set to 1, which is the system's default behaviour.
.El
.Sh SEE ALSO .Sh SEE ALSO
.Xr inet 4 , .Xr inet 4 ,
.Xr route 4 , .Xr route 4 ,

View File

@ -43,7 +43,7 @@ By default,
reads reads
.Xr kldstat 8 .Xr kldstat 8
output from standard input and writes to the output from standard input and writes to the
.Pa \&.asf .Pa .asf
file a list of file a list of
.Xr gdb 1 .Xr gdb 1
commands to add symbol files from KLDs in subdirectories of the subdirectory commands to add symbol files from KLDs in subdirectories of the subdirectory
@ -73,7 +73,7 @@ writes to it instead of
If If
.Ar outfile .Ar outfile
is a single dash is a single dash
.Pq Sq \&- , .Pq Sq Fl ,
the standard output is used. the standard output is used.
.Sh OPTIONS .Sh OPTIONS
The following options modify the function of The following options modify the function of
@ -114,7 +114,7 @@ to write or append its output to.
If If
.Ar outfile .Ar outfile
is a single dash is a single dash
.Pq Sq \&- , .Pq Sq Fl ,
the standard output is used. the standard output is used.
.It Fl s .It Fl s
Do not prepend a (guessed) subdirectory of the module path. Do not prepend a (guessed) subdirectory of the module path.

View File

@ -433,7 +433,7 @@ At this point the binary
can be copied onto an install floppy can be copied onto an install floppy
and hard-linked to the names of the component programs. and hard-linked to the names of the component programs.
.Pp .Pp
Note that if the Note that if the
.Ic libs_so .Ic libs_so
command had been used, copies of the libraries so named command had been used, copies of the libraries so named
would also need to be copied to the install floppy. would also need to be copied to the install floppy.
@ -460,6 +460,7 @@ The
must then be used to get those object files built, or must then be used to get those object files built, or
some other arrangements made. some other arrangements made.
.Sh AUTHORS .Sh AUTHORS
.An -nosplit
The The
.Nm .Nm
utility was written by utility was written by
@ -468,7 +469,7 @@ utility was written by
Copyright (c) 1994 University of Maryland. Copyright (c) 1994 University of Maryland.
All Rights Reserved. All Rights Reserved.
.Pp .Pp
The The
.Ic libs_so .Ic libs_so
keyword was added in 2005 by keyword was added in 2005 by
.An Adrian Steinmann Aq ast@marabu.ch .An Adrian Steinmann Aq ast@marabu.ch

View File

@ -70,7 +70,7 @@
statistics statistics
.Sh SYNOPSIS .Sh SYNOPSIS
.Nm .Nm
.Op Fl CdhKIoTxz?\& .Op Fl CdhIKoTxz?\&
.Op Fl c Ar count .Op Fl c Ar count
.Op Fl M Ar core .Op Fl M Ar core
.Op Fl n Ar devs .Op Fl n Ar devs

View File

@ -56,7 +56,9 @@ The options are as follows:
.It Fl i .It Fl i
Output the jail identifier of the newly created jail. Output the jail identifier of the newly created jail.
.It Fl J Ar jid_file .It Fl J Ar jid_file
Write a JidFile, like a PidFile, containing jailid, path, hostname, ip and Write a
.Ar jid_file
file, containing jail identifier, path, hostname, IP and
command used to start the jail. command used to start the jail.
.It Fl l .It Fl l
Run program in the clean environment. Run program in the clean environment.
@ -75,9 +77,9 @@ is imported from the current environment.
The environment variables from the login class capability database for the The environment variables from the login class capability database for the
target login are also set. target login are also set.
.It Fl s Ar securelevel .It Fl s Ar securelevel
Sets Sets the
.Va kern.securelevel .Va kern.securelevel
to the specified value inside the newly created jail. sysctl variable to the specified value inside the newly created jail.
.It Fl u Ar username .It Fl u Ar username
The user name from host environment as whom the The user name from host environment as whom the
.Ar command .Ar command
@ -141,7 +143,7 @@ See
.Xr devfs 8 .Xr devfs 8
for information on how to use devfs rules to limit access to entries for information on how to use devfs rules to limit access to entries
in the per-jail devfs. in the per-jail devfs.
A simple devfs ruleset for jails is available as ruleset #4 in A simple devfs ruleset for jails is available as ruleset #4 in
.Pa /etc/defaults/devfs.rules . .Pa /etc/defaults/devfs.rules .
.Pp .Pp
In many cases this example would put far more in the jail than needed. In many cases this example would put far more in the jail than needed.
@ -546,14 +548,14 @@ constraints on
.Va kern.securelevel . .Va kern.securelevel .
.El .El
.Pp .Pp
The read-only The read-only sysctl variable
.Va security.jail.jailed .Va security.jail.jailed
variable can be used to determine if a process is running inside a jail (value can be used to determine if a process is running inside a jail (value
is one) or not (value is zero). is one) or not (value is zero).
.Pp .Pp
The The
.Va security.jail.list .Va security.jail.list
MIB entry is read-only and it returns an array of MIB entry is read-only and it returns an array of
.Vt "struct xprison" .Vt "struct xprison"
defined in defined in
.In sys/jail.h . .In sys/jail.h .

View File

@ -53,6 +53,7 @@ should run.
The user name from jailed environment as whom the The user name from jailed environment as whom the
.Ar command .Ar command
should run. should run.
.El
.Sh SEE ALSO .Sh SEE ALSO
.Xr jail_attach 2 , .Xr jail_attach 2 ,
.Xr jail 8 , .Xr jail 8 ,

View File

@ -243,18 +243,15 @@ To switch back to the default keyboard, use this command.
.Dl kbdcontrol -k /dev/kbd0 .Dl kbdcontrol -k /dev/kbd0
.Pp .Pp
To allow using both the second USB keyboard and the first AT keyboard To allow using both the second USB keyboard and the first AT keyboard
at the same time on console via at the same time on console via the
.Xr kbdmux 4 .Xr kbdmux 4
driver use the following sequence of commands. driver, use the following sequence of commands.
.Pp .Bd -literal -offset indent
.Dl kbdcontrol -K < /dev/console kbdcontrol -K < /dev/console
.Pp kbdcontrol -a atkbd0 < /dev/kbdmux0
.Dl kbdcontrol -a atkbd0 < /dev/kbdmux0 kbdcontrol -a ukbd1 < /dev/kbdmux0
.Pp kbdcontrol -k /dev/kbdmux0 < /dev/console
.Dl kbdcontrol -a ukbd1 < /dev/kbdmux0 .Ed
.Pp
.Dl kbdcontrol -k /dev/kbdmux0 < /dev/console
.Pp
.Sh SEE ALSO .Sh SEE ALSO
.Xr kbdmap 1 , .Xr kbdmap 1 ,
.Xr vidcontrol 1 , .Xr vidcontrol 1 ,

View File

@ -133,9 +133,7 @@ is typically set up as a symbolic link to
.Nm .Nm
which is not usually invoked on its own. which is not usually invoked on its own.
.Sh EXIT STATUS .Sh EXIT STATUS
The .Ex -std
.Nm
exits 0 on success, and \*[Gt]0 if an error occurs.
.Sh DIAGNOSTICS .Sh DIAGNOSTICS
The The
.Nm .Nm

View File

@ -89,14 +89,17 @@ data to the device so that the user program will see it.
.Pp .Pp
If the mouse daemon receives the signal If the mouse daemon receives the signal
.Dv SIGHUP , .Dv SIGHUP ,
it will reopen the mouse port and reinitialize itself. Useful if it will reopen the mouse port and reinitialize itself.
Useful if
the mouse is attached/detached while the system is suspended. the mouse is attached/detached while the system is suspended.
.Pp .Pp
If the mouse daemon receives the signal If the mouse daemon receives the signal
.Dv SIGUSR1 , .Dv SIGUSR1 ,
it will stop passing mouse events. Sending the signal it will stop passing mouse events.
.Dv SIGUSR1 Sending the signal
again will resume passing mouse events. Useful if your typing on a laptop is .Dv SIGUSR1
again will resume passing mouse events.
Useful if your typing on a laptop is
interrupted by accidentally touching the mouse pad. interrupted by accidentally touching the mouse pad.
.Pp .Pp
The following options are available: The following options are available:
@ -613,11 +616,11 @@ protocol.
To test if the selected protocol type is correct for the given mouse, To test if the selected protocol type is correct for the given mouse,
enable the mouse pointer in the current virtual console, enable the mouse pointer in the current virtual console,
.Pp .Pp
.Dl vidcontrol -m on .Dl "vidcontrol -m on"
.Pp .Pp
start the mouse daemon in the foreground mode, start the mouse daemon in the foreground mode,
.Pp .Pp
.Dl moused -f -p Ar _selected_port_ -t Ar _selected_protocol_ .Dl "moused -f -p <selected_port> -t <selected_protocol>"
.Pp .Pp
and see if the mouse pointer travels correctly and see if the mouse pointer travels correctly
according to the mouse movement. according to the mouse movement.
@ -668,7 +671,7 @@ utility
UNIX-domain stream socket for X10 MouseRemote events UNIX-domain stream socket for X10 MouseRemote events
.El .El
.Sh EXAMPLES .Sh EXAMPLES
.Dl moused -p /dev/cuad0 -i type .Dl "moused -p /dev/cuad0 -i type"
.Pp .Pp
Let the Let the
.Nm .Nm
@ -676,9 +679,10 @@ utility determine the protocol type of the mouse at the serial port
.Pa /dev/cuad0 . .Pa /dev/cuad0 .
If successful, the command will print the type, otherwise it will say If successful, the command will print the type, otherwise it will say
.Dq Li unknown . .Dq Li unknown .
.Pp .Bd -literal -offset indent
.Dl moused -p /dev/cuad0 moused -p /dev/cuad0
.Dl vidcontrol -m on vidcontrol -m on
.Ed
.Pp .Pp
If the If the
.Nm .Nm
@ -686,9 +690,10 @@ utility is able to identify the protocol type of the mouse at the specified
port automatically, you can start the daemon without the port automatically, you can start the daemon without the
.Fl t .Fl t
option and enable the mouse pointer in the text console as above. option and enable the mouse pointer in the text console as above.
.Pp .Bd -literal -offset indent
.Dl moused -p /dev/mouse -t microsoft moused -p /dev/mouse -t microsoft
.Dl vidcontrol -m on vidcontrol -m on
.Ed
.Pp .Pp
Start the mouse daemon on the serial port Start the mouse daemon on the serial port
.Pa /dev/mouse . .Pa /dev/mouse .
@ -698,27 +703,27 @@ is explicitly specified by the
.Fl t .Fl t
option. option.
.Pp .Pp
.Dl moused -p /dev/mouse -m 1=3 -m 3=1 .Dl "moused -p /dev/mouse -m 1=3 -m 3=1"
.Pp .Pp
Assign the physical button 3 (right button) to the logical button 1 Assign the physical button 3 (right button) to the logical button 1
(logical left) and the physical button 1 (left) to the logical (logical left) and the physical button 1 (left) to the logical
button 3 (logical right). button 3 (logical right).
This will effectively swap the left and right buttons. This will effectively swap the left and right buttons.
.Pp .Pp
.Dl moused -p /dev/mouse -t intellimouse -z 4 .Dl "moused -p /dev/mouse -t intellimouse -z 4"
.Pp .Pp
Report negative Z axis movement (i.e., mouse wheel) as the button 4 pressed Report negative Z axis movement (i.e., mouse wheel) as the button 4 pressed
and positive Z axis movement (i.e., mouse wheel) as the button 5 pressed. and positive Z axis movement (i.e., mouse wheel) as the button 5 pressed.
.Pp .Pp
If you add If you add
.Pp .Pp
.Dl ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused .Dl "ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused"
.Pp .Pp
to your to your
.Pa /usr/local/etc/sudoers .Pa /usr/local/etc/sudoers
file, and bind file, and bind
.Pp .Pp
.Dl killall -USR1 moused .Dl "killall -USR1 moused"
.Pp .Pp
to a key in your window manager, you can suspend mouse events on your laptop if to a key in your window manager, you can suspend mouse events on your laptop if
you keep brushing over the mouse pad while typing. you keep brushing over the mouse pad while typing.

View File

@ -28,7 +28,7 @@
.\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93 .\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
.\" $FreeBSD$ .\" $FreeBSD$
.\" .\"
.Dd July 03, 2006 .Dd July 3, 2006
.Dt MTREE 8 .Dt MTREE 8
.Os .Os
.Sh NAME .Sh NAME

View File

@ -21,7 +21,7 @@
.\" the suitability of this software for any purpose. It is .\" the suitability of this software for any purpose. It is
.\" provided "as is" without express or implied warranty. .\" provided "as is" without express or implied warranty.
.\" .\"
.Dd June 3, 2004 .Dd July 21, 2006
.Dt NEWSYSLOG.CONF 5 .Dt NEWSYSLOG.CONF 5
.Os .Os
.Sh NAME .Sh NAME

File diff suppressed because it is too large Load Diff

View File

@ -109,7 +109,8 @@ Enable the client to synchronize to broadcast servers.
Specify the name and path of the configuration file, default Specify the name and path of the configuration file, default
.Pa /etc/ntp.conf . .Pa /etc/ntp.conf .
.It Fl d .It Fl d
Specify debugging mode. This option may occur more than once, Specify debugging mode.
This option may occur more than once,
with each occurrence indicating greater detail of display. with each occurrence indicating greater detail of display.
.It Fl D Ar level .It Fl D Ar level
Specify debugging level directly. Specify debugging level directly.
@ -133,7 +134,8 @@ This option can be used with the
.Fl q .Fl q
and and
.Fl x .Fl x
options. See the options.
See the
.Ic tinker .Ic tinker
command for other options. command for other options.
.It Fl k Ar keyfile .It Fl k Ar keyfile
@ -149,7 +151,8 @@ This is the same operation as the
.Ic logfile Ar logfile .Ic logfile Ar logfile
configuration command. configuration command.
.It Fl L .It Fl L
Do not listen to virtual IPs. The default is to listen. Do not listen to virtual IPs.
The default is to listen.
.It Fl m .It Fl m
Enable the client to synchronize to multicast servers at the IPv4 multicast Enable the client to synchronize to multicast servers at the IPv4 multicast
group address 224.0.1.1. group address 224.0.1.1.

View File

@ -162,12 +162,12 @@ following.
.It Ic \&? Ar command_keyword .It Ic \&? Ar command_keyword
.It Ic help Ar command_keyword .It Ic help Ar command_keyword
A A
.Ic Ql \&? .Sq Ic \&?
will print a list of all the command will print a list of all the command
keywords known to this incarnation of keywords known to this incarnation of
.Nm . .Nm .
A A
.Ic Ql \&? .Sq Ic \&?
followed by a command keyword will print function and usage followed by a command keyword will print function and usage
information about the command. information about the command.
This command is probably a better This command is probably a better
@ -592,11 +592,13 @@ configuration file commands of
.It Cm auth .It Cm auth
Enables the server to synchronize with unconfigured peers only Enables the server to synchronize with unconfigured peers only
if the peer has been correctly authenticated using either public key if the peer has been correctly authenticated using either public key
or private key cryptography. The default for this flag is enable. or private key cryptography.
The default for this flag is enable.
.It Cm bclient .It Cm bclient
Enables the server to listen for a message from a broadcast or Enables the server to listen for a message from a broadcast or
multicast server, as in the multicastclient command with multicast server, as in the multicastclient command with
default address. The default for this flag is disable. default address.
The default for this flag is disable.
.It Cm calibrate .It Cm calibrate
Enables the calibrate feature for reference clocks. Enables the calibrate feature for reference clocks.
The default for this flag is disable. The default for this flag is disable.
@ -604,14 +606,16 @@ The default for this flag is disable.
Enables the kernel time discipline, if available. Enables the kernel time discipline, if available.
The default for this flag is enable if support is available, otherwise disable. The default for this flag is enable if support is available, otherwise disable.
.It Cm monitor .It Cm monitor
Enables the monitoring facility. See the Enables the monitoring facility.
See the
.Xr ntpdc 8 . .Xr ntpdc 8 .
program and the monlist command or further information. program and the monlist command or further information.
The default for this flag is enable. The default for this flag is enable.
.It Cm ntp .It Cm ntp
Enables time and frequency discipline. Enables time and frequency discipline.
In effect, this switch opens and closes the feedback loop, In effect, this switch opens and closes the feedback loop,
which is useful for testing. The default for this flag is enable. which is useful for testing.
The default for this flag is enable.
.It Cm pps .It Cm pps
Enables the pulse-per-second (PPS) signal when frequency Enables the pulse-per-second (PPS) signal when frequency
and time is disciplined by the precision time kernel modifications. and time is disciplined by the precision time kernel modifications.
@ -620,7 +624,8 @@ See the
(available as part of the HTML documentation (available as part of the HTML documentation
provided in provided in
.Pa /usr/share/doc/ntp ) .Pa /usr/share/doc/ntp )
page for further information. The default for this flag is disable. page for further information.
The default for this flag is disable.
.It Cm stats .It Cm stats
Enables the statistics facility. Enables the statistics facility.
See the See the

View File

@ -148,12 +148,12 @@ These are described following.
.It Ic \&? Op Ar command_keyword .It Ic \&? Op Ar command_keyword
.It Ic help Op Ar command_keyword .It Ic help Op Ar command_keyword
A A
.Ic Ql \&? .Sq Ic \&?
by itself will print a list of all the command by itself will print a list of all the command
keywords known to this incarnation of keywords known to this incarnation of
.Nm . .Nm .
A A
.Ic Ql \&? .Sq Ic \&?
followed by a command keyword will print function and usage followed by a command keyword will print function and usage
information about the command. information about the command.
This command is probably a better This command is probably a better
@ -241,7 +241,8 @@ modified using the command line
switch. switch.
.It Ic keyid Ar keyid .It Ic keyid Ar keyid
This command specifies the key number to be used to authenticate This command specifies the key number to be used to authenticate
configuration requests. This must correspond to a key number the server has configuration requests.
This must correspond to a key number the server has
been configured to use for this purpose. been configured to use for this purpose.
.It Xo Ic ntpversion .It Xo Ic ntpversion
.Cm 1 | .Cm 1 |
@ -259,7 +260,8 @@ There appear
to be no servers left which demand version 1. to be no servers left which demand version 1.
.It Ic passwd .It Ic passwd
This command prompts for a password (which will not be echoed) which will This command prompts for a password (which will not be echoed) which will
be used to authenticate configuration requests. The password must be used to authenticate configuration requests.
The password must
correspond to the key configured for NTP server for this purpose. correspond to the key configured for NTP server for this purpose.
.It Ic quit .It Ic quit
Exit Exit
@ -281,8 +283,10 @@ a timeout will be twice the timeout value set.
.El .El
.Ss Control Message Commands .Ss Control Message Commands
Each association known to an NTP server has a 16 bit integer association Each association known to an NTP server has a 16 bit integer association
identifier. NTP control messages which carry peer variables must identify the identifier.
peer the values correspond to by including its association ID. An association NTP control messages which carry peer variables must identify the
peer the values correspond to by including its association ID.
An association
ID of 0 is special, and indicates the variables are system variables, whose ID of 0 is special, and indicates the variables are system variables, whose
names are drawn from a separate name space. names are drawn from a separate name space.
.Pp .Pp
@ -430,7 +434,8 @@ register, in octal, and the current estimated delay,
offset and dispersion of the peer, all in milliseconds. offset and dispersion of the peer, all in milliseconds.
The character at the left margin of each line shows the The character at the left margin of each line shows the
synchronization status of the association and is a valuable synchronization status of the association and is a valuable
diagnostic tool. The encoding and meaning of this character, diagnostic tool.
The encoding and meaning of this character,
called the tally code, is given later in this page. called the tally code, is given later in this page.
.It Ic pstatus Ar assocID .It Ic pstatus Ar assocID
Sends a read status request to the server for the given Sends a read status request to the server for the given
@ -466,7 +471,8 @@ system variables, otherwise they are peer variables and the values
returned will be those of the corresponding peer. returned will be those of the corresponding peer.
Omitting the Omitting the
variable list will send a request with no data which should induce variable list will send a request with no data which should induce
the server to return a default display. The the server to return a default display.
The
encoding and meaning of the variables derived from NTPv3 is given in encoding and meaning of the variables derived from NTPv3 is given in
RFC-1305; the encoding and meaning of the additional NTPv4 variables are RFC-1305; the encoding and meaning of the additional NTPv4 variables are
given later in this page. given later in this page.
@ -512,7 +518,8 @@ The peer is a survivor and a candidate for the combining algorithm.
.It \&# .It \&#
.Pq selected .Pq selected
The peer is a survivor, but not among the first six peers sorted by The peer is a survivor, but not among the first six peers sorted by
synchronization distance. If the association is ephemeral, it may be synchronization distance.
If the association is ephemeral, it may be
demobilized to conserve resources. demobilized to conserve resources.
.It \&* .It \&*
.Pq sys.peer .Pq sys.peer
@ -521,7 +528,8 @@ system variables.
.It o .It o
.Pq pps.peer .Pq pps.peer
The peer has been declared the system peer and lends its variables to The peer has been declared the system peer and lends its variables to
the system variables. However, the actual system synchronization is derived the system variables.
However, the actual system synchronization is derived
from a pulse-per-second (PPS) signal, either indirectly via the PPS from a pulse-per-second (PPS) signal, either indirectly via the PPS
reference clock driver or directly via kernel interface. reference clock driver or directly via kernel interface.
.El .El
@ -540,7 +548,8 @@ The
and and
.Cm frequency .Cm frequency
variables are described in RFC-1305 variables are described in RFC-1305
specification. Additional NTPv4 system variables include the following. specification.
Additional NTPv4 system variables include the following.
.Bl -tag -width indent .Bl -tag -width indent
.It version .It version
Everything you might need to know about the software version and generation Everything you might need to know about the software version and generation
@ -550,7 +559,8 @@ The processor and kernel identification string.
.It system .It system
The operating system version and release identifier. The operating system version and release identifier.
.It state .It state
The state of the clock discipline state machine. The values are described The state of the clock discipline state machine.
The values are described
in the architecture briefing on the NTP Project page linked from in the architecture briefing on the NTP Project page linked from
www.ntp.org. www.ntp.org.
.It peer .It peer
@ -570,7 +580,8 @@ depending on the particular dance:
.Bl -tag -width indent .Bl -tag -width indent
.It flags .It flags
The current flags word bits and message digest algorithm identifier (NID) The current flags word bits and message digest algorithm identifier (NID)
in hex format. The high order 16 bits of the four-byte word contain the NID in hex format.
The high order 16 bits of the four-byte word contain the NID
from the OpenSSL ligrary, while the low-order bits are interpreted as from the OpenSSL ligrary, while the low-order bits are interpreted as
follows: follows:
.Bl -tag -width indent .Bl -tag -width indent
@ -593,8 +604,10 @@ function.
.It hostkey .It hostkey
The NTP filestamp of the host key file. The NTP filestamp of the host key file.
.It cert .It cert
A list of certificates held by the host. Each entry includes the subject, A list of certificates held by the host.
issuer, flags and NTP filestamp in order. The bits are interpreted as Each entry includes the subject,
issuer, flags and NTP filestamp in order.
The bits are interpreted as
follows: follows:
.Bl -tag -width indent .Bl -tag -width indent
.It 0x01 .It 0x01
@ -647,7 +660,8 @@ Additional NTPv4 system variables include
the following. the following.
.Bl -tag -width indent .Bl -tag -width indent
.It flash .It flash
The flash code for the most recent packet received. The encoding and The flash code for the most recent packet received.
The encoding and
meaning of these codes is given later in this page. meaning of these codes is given later in this page.
.It jitter .It jitter
The estimated time error of the peer clock measured as an exponential The estimated time error of the peer clock measured as an exponential
@ -661,8 +675,10 @@ When the NTPv4 daemon is compiled with the OpenSSL software library, additional
peer variables are displayed, including the following: peer variables are displayed, including the following:
.Bl -tag -width indent .Bl -tag -width indent
.It flags .It flags
The current flag bits. This word is the server host status word with The current flag bits.
additional bits used by the Autokey state machine. See the source code for This word is the server host status word with
additional bits used by the Autokey state machine.
See the source code for
the bit encoding. the bit encoding.
.It hostname .It hostname
The server host name. The server host name.
@ -680,18 +696,22 @@ The NTP timestamp when the last Autokey key list was generated and signed.
The The
.Cm flash .Cm flash
code is a valuable debugging aid displayed in the peer variables code is a valuable debugging aid displayed in the peer variables
list. It shows the results of the original sanity checks defined in the NTP list.
specification RFC-1305 and additional ones added in NTPv4. There are 12 tests It shows the results of the original sanity checks defined in the NTP
specification RFC-1305 and additional ones added in NTPv4.
There are 12 tests
designated designated
.Sy TEST1 .Sy TEST1
through through
.Sy TEST12 . .Sy TEST12 .
The tests are performed in a certain order The tests are performed in a certain order
designed to gain maximum diagnostic information while protecting against designed to gain maximum diagnostic information while protecting against
accidental or malicious errors. The accidental or malicious errors.
The
.Sy flash .Sy flash
variable is initialized to zero as variable is initialized to zero as
each packet is received. If after each set of tests one or more bits are set, each packet is received.
If after each set of tests one or more bits are set,
the packet is discarded. the packet is discarded.
.Pp .Pp
Tests Tests
@ -699,22 +719,27 @@ Tests
through through
.Sy TEST3 .Sy TEST3
check the packet timestamps from which the offset and check the packet timestamps from which the offset and
delay are calculated. If any bits are set, the packet is discarded; otherwise, delay are calculated.
If any bits are set, the packet is discarded; otherwise,
the packet header variables are saved. the packet header variables are saved.
.Sy TEST4 .Sy TEST4
and and
.Sy TEST5 .Sy TEST5
are associated with are associated with
access control and cryptographic authentication. If any bits are set, the access control and cryptographic authentication.
If any bits are set, the
packet is discarded immediately with nothing changed. packet is discarded immediately with nothing changed.
.Pp .Pp
Tests Tests
.Sy TEST6 .Sy TEST6
through through
.Sy TEST8 .Sy TEST8
check the health of the server. If any bits are set, check the health of the server.
If any bits are set,
the packet is discarded; otherwise, the offset and delay relative to the server the packet is discarded; otherwise, the offset and delay relative to the server
are calculated and saved. TEST9 checks the health of the association itself. If are calculated and saved.
TEST9 checks the health of the association itself.
If
any bits are set, the packet is discarded; otherwise, the saved variables are any bits are set, the packet is discarded; otherwise, the saved variables are
passed to the clock filter and mitigation algorithms. passed to the clock filter and mitigation algorithms.
.Pp .Pp
@ -738,35 +763,44 @@ bits for each test are defined as follows.
.Bl -tag -width indent .Bl -tag -width indent
.It 0x001 .It 0x001
.Pq TEST1 .Pq TEST1
Duplicate packet. The packet is at best a casual retransmission and at Duplicate packet.
The packet is at best a casual retransmission and at
worst a malicious replay. worst a malicious replay.
.It 0x002 .It 0x002
.Pq TEST2 .Pq TEST2
Bogus packet. The packet is not a reply to a message previously sent. This Bogus packet.
The packet is not a reply to a message previously sent.
This
can happen when the NTP daemon is restarted and before somebody else can happen when the NTP daemon is restarted and before somebody else
notices. notices.
.It 0x004 .It 0x004
.Pq TEST3 .Pq TEST3
Unsynchronized. One or more timestamp fields are invalid. This normally Unsynchronized.
One or more timestamp fields are invalid.
This normally
happens when the first packet from a peer is received. happens when the first packet from a peer is received.
.It 0x008 .It 0x008
.Pq TEST4 .Pq TEST4
Access is denied. See the Access is denied.
See the
.Sx Access Control Support .Sx Access Control Support
section of section of
.Xr ntp.conf 5 . .Xr ntp.conf 5 .
.It 0x010 .It 0x010
.Pq TEST5 .Pq TEST5
Cryptographic authentication fails. See the Cryptographic authentication fails.
See the
.Sx Authentication Options .Sx Authentication Options
section of section of
.Xr ntp.conf 5 . .Xr ntp.conf 5 .
.It 0x020 .It 0x020
.Pq TEST6 .Pq TEST6
The server is unsynchronized. Wind up its clock first. The server is unsynchronized.
Wind up its clock first.
.It 0x040 .It 0x040
.Pq TEST7 .Pq TEST7
The server stratum is at the maximum than 15. It is probably unsynchronized The server stratum is at the maximum than 15.
It is probably unsynchronized
and its clock needs to be wound up. and its clock needs to be wound up.
.It 0x080 .It 0x080
.Pq TEST8 .Pq TEST8
@ -778,21 +812,24 @@ Either the peer delay or dispersion is greater than one second, which is
higly unlikely unless the peer is on Mars. higly unlikely unless the peer is on Mars.
.It 0x200 .It 0x200
.Pq TEST10 .Pq TEST10
The autokey protocol has detected an authentication failure. See the The autokey protocol has detected an authentication failure.
See the
.Sx Authentication Options .Sx Authentication Options
section of section of
.Xr ntp.conf 5 . .Xr ntp.conf 5 .
.It 0x400 .It 0x400
.Pq TEST11 .Pq TEST11
The autokey protocol has not verified the server or peer is proventic and The autokey protocol has not verified the server or peer is proventic and
has valid public key credentials. See the has valid public key credentials.
See the
.Sx Authentication Options .Sx Authentication Options
section of section of
.Xr ntp.conf 5 . .Xr ntp.conf 5 .
.It 0x800 .It 0x800
.Pq TEST12 .Pq TEST12
A protocol or configuration error has occurred in the public key algorithms A protocol or configuration error has occurred in the public key algorithms
or a possible intrusion event has been detected. See the or a possible intrusion event has been detected.
See the
.Sx Authentication Options .Sx Authentication Options
section of section of
.Xr ntp.conf 5 . .Xr ntp.conf 5 .

View File

@ -25,7 +25,7 @@
.Nd a utility for displaying information on software packages .Nd a utility for displaying information on software packages
.Sh SYNOPSIS .Sh SYNOPSIS
.Nm .Nm
.Op Fl bcdDEfgGijIkKLmopPqQrRsvVxX .Op Fl bcdDEfgGiIjkKLmopPqQrRsvVxX
.Op Fl e Ar package .Op Fl e Ar package
.Op Fl l Ar prefix .Op Fl l Ar prefix
.Op Fl t Ar template .Op Fl t Ar template

View File

@ -145,13 +145,13 @@ is of the form
where where
.Ar hostname .Ar hostname
does not start with a does not start with a
.Sq \&. .Ql \&.
or a or a
.Sq / , .Ql / ,
then then
.Nm .Nm
will open a network socket to host will open a network socket to host
.Ar hostname .Ar hostname
on port on port
.Ar port . .Ar port .
.Pp .Pp
@ -303,7 +303,8 @@ It is
.Sh AUTHORS .Sh AUTHORS
.An Joseph Koshy Aq jkoshy@FreeBSD.org .An Joseph Koshy Aq jkoshy@FreeBSD.org
.Sh BUGS .Sh BUGS
The
.Nm .Nm
cannot yet analyse utility cannot yet analyse
.Xr hwpmc 4 .Xr hwpmc 4
logs generated by non-native architectures. logs generated by non-native architectures.

View File

@ -54,7 +54,7 @@ uncompressed ports tree.
The following options are supported: The following options are supported:
.Bl -tag -width "-f conffile" .Bl -tag -width "-f conffile"
.It Fl d Ar workdir .It Fl d Ar workdir
Store working files (e.g. downloaded updates) in Store working files (e.g.\& downloaded updates) in
.Ar workdir . .Ar workdir .
(default: (default:
.Pa /var/db/portsnap , .Pa /var/db/portsnap ,
@ -72,7 +72,7 @@ command, update INDEX files, but not the rest of the ports tree.
Expect a public key with given SHA256 hash. Expect a public key with given SHA256 hash.
(default: read value from configuration file.) (default: read value from configuration file.)
.It Fl l Ar descfile .It Fl l Ar descfile
Merge the specified local describes file into the INDEX files being Merge the specified local describes file into the INDEX files being
built. built.
The The
.Ar descfile .Ar descfile
@ -95,9 +95,9 @@ For
.Cm extract .Cm extract
command only, operate only on parts of the ports tree starting with command only, operate only on parts of the ports tree starting with
.Ar path . .Ar path .
(e.g. (e.g.\&
.Nm .Nm
.cm extract .Cm extract
.Ar sysutils/port .Ar sysutils/port
would extract sysutils/portsman, sysutils/portsnap, would extract sysutils/portsman, sysutils/portsnap,
sysutils/portupgrade, etc.) sysutils/portupgrade, etc.)
@ -206,16 +206,16 @@ of files are not needed by any particular client.
.Sh PRIVACY NOTICE .Sh PRIVACY NOTICE
As an unavoidable part of its operation, a machine running As an unavoidable part of its operation, a machine running
.Nm .Nm
will make its public IP address and the list of files it fetches will make its public IP address and the list of files it fetches
available to the server from which it fetches updates. available to the server from which it fetches updates.
Using these it may be possible to recognize a machine over an extended Using these it may be possible to recognize a machine over an extended
period of time, determine when it is updated, and identify which period of time, determine when it is updated, and identify which
portions of the FreeBSD ports tree, if any, are being ignored using portions of the FreeBSD ports tree, if any, are being ignored using
"REFUSE" directives in "REFUSE" directives in
.Pa portsnap.conf . .Pa portsnap.conf .
In addition, the FreeBSD release level is transmitted to the server. In addition, the FreeBSD release level is transmitted to the server.
.Pp .Pp
Statistical data generated from information collected in this manner Statistical data generated from information collected in this manner
may be published, but only in aggregate and after anonymizing the may be published, but only in aggregate and after anonymizing the
individual systems. individual systems.
.Sh FILES .Sh FILES
@ -228,9 +228,9 @@ Default location where compressed snapshots are stored.
Default location where the ports tree is extracted. Default location where the ports tree is extracted.
.El .El
.Sh SEE ALSO .Sh SEE ALSO
.Xr fetch 1 .Xr fetch 1 ,
.Xr fetch 3 .Xr sha256 1 ,
.Xr fetch 3 ,
.Xr portsnap.conf 5 .Xr portsnap.conf 5
.Xr sha256 1
.Sh AUTHORS .Sh AUTHORS
.An Colin Percival Aq cperciva@FreeBSD.org .An Colin Percival Aq cperciva@FreeBSD.org

View File

@ -338,8 +338,9 @@ Selected messages are forwarded to the
.Xr syslogd 8 .Xr syslogd 8
program on the named host. program on the named host.
If a port number is added after a colon If a port number is added after a colon
.Pq ':' .Pq Ql :\&
then that port will be used as the destination port rather than the usual syslog port. then that port will be used as the destination port
rather than the usual syslog port.
.It .It
A comma separated list of users. A comma separated list of users.
Selected messages are written to those users Selected messages are written to those users

View File

@ -25,7 +25,7 @@
.\" .\"
.\" $FreeBSD$ .\" $FreeBSD$
.\" .\"
.Dd February 28, 2004 .Dd September 2, 2006
.Dt WATCHDOG 8 .Dt WATCHDOG 8
.Os .Os
.Sh NAME .Sh NAME

View File

@ -25,7 +25,7 @@
.\" .\"
.\" $FreeBSD$ .\" $FreeBSD$
.\" .\"
.Dd June 25, 2003 .Dd September 2, 2006
.Dt WATCHDOGD 8 .Dt WATCHDOGD 8
.Os .Os
.Sh NAME .Sh NAME

View File

@ -72,7 +72,8 @@ mode.
Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 = Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 =
excessive. excessive.
.It Va dump_file .It Va dump_file
Dump file for state information (on SIGUSR1). Dump file for state information (on
.Dv SIGUSR1 ) .
.It Va ctrl_interface .It Va ctrl_interface
The pathname of the directory in which The pathname of the directory in which
.Xr hostapd 8 .Xr hostapd 8
@ -185,8 +186,8 @@ seconds.
Rekey GTK when any STA that possesses the current GTK is leaving the Rekey GTK when any STA that possesses the current GTK is leaving the
BSS. BSS.
.It Va wpa_gmk_rekey .It Va wpa_gmk_rekey
Time interval for rekeying GMK (master key used internally to generate GTKs Time interval for rekeying GMK (master key used internally to generate GTKs),
(in seconds). in seconds.
.El .El
.Sh SEE ALSO .Sh SEE ALSO
.Xr hostapd 8 , .Xr hostapd 8 ,

View File

@ -51,7 +51,8 @@ utility listens for events generated by an
.Xr ndis 4 .Xr ndis 4
wireless network driver and relays them to wireless network driver and relays them to
.Xr wpa_supplicant 8 .Xr wpa_supplicant 8
for possible processing. The three event types that can occur for possible processing.
The three event types that can occur
are media connect and disconnect events, such as when a wireless are media connect and disconnect events, such as when a wireless
interface joins or leaves a network, and media-specific events. interface joins or leaves a network, and media-specific events.
In particular, In particular,
@ -64,12 +65,14 @@ needs in order to properly associate with WPA2-capable access points.
The The
.Nm .Nm
daemon works by listening for interface information events via daemon works by listening for interface information events via
a routing socket. When it detects an event that was generated by an a routing socket.
When it detects an event that was generated by an
.Xr ndis 4 .Xr ndis 4
interface, it transmits it via UDP packet on the loopback interface, interface, it transmits it via UDP packet on the loopback interface,
where where
.Xr wpa_supplicant 8 .Xr wpa_supplicant 8
is presumeably listening. The standard is presumeably listening.
The standard
.Xr wpa_supplicant 8 .Xr wpa_supplicant 8
distribution includes its own version of this utility for use with distribution includes its own version of this utility for use with
.Tn Windows\[rg] . .Tn Windows\[rg] .
@ -92,31 +95,35 @@ The
daemon supports the following options: daemon supports the following options:
.Bl -tag -width indent .Bl -tag -width indent
.It Fl a .It Fl a
Process all events. By default, Process all events.
By default,
.Nm .Nm
will only process and forward media-specific events, which contain will only process and forward media-specific events, which contain
PMKID candidate information, and not bother forwarding connect and PMKID candidate information, and not bother forwarding connect and
disconnect events, since disconnect events, since
.Xr wpa_supplicant 8 .Xr wpa_supplicant 8
normally can determine the current link state on its own. In some normally can determine the current link state on its own.
In some
cases, the additional connect and disconnect events only confuse it cases, the additional connect and disconnect events only confuse it
and make the association and authentication process take longer. and make the association and authentication process take longer.
.It Fl d .It Fl d
Run in debug mode. This causes Run in debug mode.
This causes
.Nm .Nm
to run in the foreground and generate any output to the standard to run in the foreground and generate any output to the standard
error instead of using the error instead of using the
.Xr syslog 3 .Xr syslog 3
facility. facility.
.It Fl v .It Fl v
Run in verbose mode. This causes Run in verbose mode.
This causes
.Nm .Nm
to emit notifications when it receives events. to emit notifications when it receives events.
.El .El
.Sh SEE ALSO .Sh SEE ALSO
.Xr ndis 4 , .Xr ndis 4 ,
.Xr ndisapi 9 , .Xr wpa_supplicant 8 ,
.Xr wpa_supplicant 8 .Xr ndisapi 9
.Sh HISTORY .Sh HISTORY
The The
.Nm .Nm