Markup fixes.
This commit is contained in:
parent
b3e2f7a6d8
commit
bc84aa4ba3
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=162806
@ -66,8 +66,8 @@ The user name is restricted to whatever
|
|||||||
.Xr pw 8
|
.Xr pw 8
|
||||||
will accept.
|
will accept.
|
||||||
Generally this means it
|
Generally this means it
|
||||||
may contain only lowercase characters or digits but cannot begin with
|
may contain only lowercase characters or digits but cannot begin with the
|
||||||
.Sq Fl
|
.Ql -
|
||||||
character.
|
character.
|
||||||
Maximum length
|
Maximum length
|
||||||
is 16 characters.
|
is 16 characters.
|
||||||
|
@ -133,18 +133,17 @@ the loopback interface.
|
|||||||
Enables ARP proxying for all hosts on net.
|
Enables ARP proxying for all hosts on net.
|
||||||
.El
|
.El
|
||||||
.Sh DIAGNOSTICS
|
.Sh DIAGNOSTICS
|
||||||
.Em "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!" :
|
.Bl -diag
|
||||||
|
.It "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!"
|
||||||
ARP has discovered another host on the local network which responds to
|
ARP has discovered another host on the local network which responds to
|
||||||
mapping requests for its own Internet address with a different Ethernet
|
mapping requests for its own Internet address with a different Ethernet
|
||||||
address, generally indicating that two hosts are attempting to use the
|
address, generally indicating that two hosts are attempting to use the
|
||||||
same Internet address.
|
same Internet address.
|
||||||
.Pp
|
.It "arp: link address is broadcast for IP address %d.%d.%d.%d!"
|
||||||
.Em "arp: link address is broadcast for IP address %d.%d.%d.%d!" :
|
|
||||||
ARP requested information for a host, and received an answer indicating
|
ARP requested information for a host, and received an answer indicating
|
||||||
that the host's ethernet address is the ethernet broadcast address.
|
that the host's ethernet address is the ethernet broadcast address.
|
||||||
This indicates a misconfigured or broken device.
|
This indicates a misconfigured or broken device.
|
||||||
.Pp
|
.It "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s"
|
||||||
.Em "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s" :
|
|
||||||
ARP had a cached value for the ethernet address of the referenced host,
|
ARP had a cached value for the ethernet address of the referenced host,
|
||||||
but received a reply indicating that the host is at a new address.
|
but received a reply indicating that the host is at a new address.
|
||||||
This can happen normally when host hardware addresses change,
|
This can happen normally when host hardware addresses change,
|
||||||
@ -153,15 +152,13 @@ It can also indicate a problem with proxy ARP.
|
|||||||
This message can only be issued if the sysctl
|
This message can only be issued if the sysctl
|
||||||
.Va net.link.ether.inet.log_arp_movements
|
.Va net.link.ether.inet.log_arp_movements
|
||||||
is set to 1, which is the system's default behaviour.
|
is set to 1, which is the system's default behaviour.
|
||||||
.Pp
|
.It "arpresolve: can't allocate llinfo for %d.%d.%d.%d"
|
||||||
.Em "arpresolve: can't allocate llinfo for %d.%d.%d.%d" :
|
|
||||||
The route for the referenced host points to a device upon which ARP is
|
The route for the referenced host points to a device upon which ARP is
|
||||||
required, but ARP was unable to allocate a routing table entry in which
|
required, but ARP was unable to allocate a routing table entry in which
|
||||||
to store the host's MAC address.
|
to store the host's MAC address.
|
||||||
This usually points to a misconfigured routing table.
|
This usually points to a misconfigured routing table.
|
||||||
It can also occur if the kernel cannot allocate memory.
|
It can also occur if the kernel cannot allocate memory.
|
||||||
.Pp
|
.It "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1"
|
||||||
.Em "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1" :
|
|
||||||
Physical connections exist to the same logical IP network on both if0 and if1.
|
Physical connections exist to the same logical IP network on both if0 and if1.
|
||||||
It can also occur if an entry already exists in the ARP cache for the IP
|
It can also occur if an entry already exists in the ARP cache for the IP
|
||||||
address above, and the cable has been disconnected from if0, then reconnected
|
address above, and the cable has been disconnected from if0, then reconnected
|
||||||
@ -169,13 +166,13 @@ to if1.
|
|||||||
This message can only be issued if the sysctl
|
This message can only be issued if the sysctl
|
||||||
.Va net.link.ether.inet.log_arp_wrong_iface
|
.Va net.link.ether.inet.log_arp_wrong_iface
|
||||||
is set to 1, which is the system's default behaviour.
|
is set to 1, which is the system's default behaviour.
|
||||||
.Pp
|
.It "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s"
|
||||||
.Em "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s" :
|
|
||||||
ARP has received an ARP reply that attempts to overwrite a permanent
|
ARP has received an ARP reply that attempts to overwrite a permanent
|
||||||
antry in the local ARP table.
|
entry in the local ARP table.
|
||||||
This error will be only logged, if the sysctl
|
This error will only be logged if the sysctl
|
||||||
.Va net.link.ether.inet.log_arp_permanent_modify
|
.Va net.link.ether.inet.log_arp_permanent_modify
|
||||||
is set to 1, which is the system's default behaviour.
|
is set to 1, which is the system's default behaviour.
|
||||||
|
.El
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
.Xr inet 4 ,
|
.Xr inet 4 ,
|
||||||
.Xr route 4 ,
|
.Xr route 4 ,
|
||||||
|
@ -43,7 +43,7 @@ By default,
|
|||||||
reads
|
reads
|
||||||
.Xr kldstat 8
|
.Xr kldstat 8
|
||||||
output from standard input and writes to the
|
output from standard input and writes to the
|
||||||
.Pa \&.asf
|
.Pa .asf
|
||||||
file a list of
|
file a list of
|
||||||
.Xr gdb 1
|
.Xr gdb 1
|
||||||
commands to add symbol files from KLDs in subdirectories of the subdirectory
|
commands to add symbol files from KLDs in subdirectories of the subdirectory
|
||||||
@ -73,7 +73,7 @@ writes to it instead of
|
|||||||
If
|
If
|
||||||
.Ar outfile
|
.Ar outfile
|
||||||
is a single dash
|
is a single dash
|
||||||
.Pq Sq \&- ,
|
.Pq Sq Fl ,
|
||||||
the standard output is used.
|
the standard output is used.
|
||||||
.Sh OPTIONS
|
.Sh OPTIONS
|
||||||
The following options modify the function of
|
The following options modify the function of
|
||||||
@ -114,7 +114,7 @@ to write or append its output to.
|
|||||||
If
|
If
|
||||||
.Ar outfile
|
.Ar outfile
|
||||||
is a single dash
|
is a single dash
|
||||||
.Pq Sq \&- ,
|
.Pq Sq Fl ,
|
||||||
the standard output is used.
|
the standard output is used.
|
||||||
.It Fl s
|
.It Fl s
|
||||||
Do not prepend a (guessed) subdirectory of the module path.
|
Do not prepend a (guessed) subdirectory of the module path.
|
||||||
|
@ -433,7 +433,7 @@ At this point the binary
|
|||||||
can be copied onto an install floppy
|
can be copied onto an install floppy
|
||||||
and hard-linked to the names of the component programs.
|
and hard-linked to the names of the component programs.
|
||||||
.Pp
|
.Pp
|
||||||
Note that if the
|
Note that if the
|
||||||
.Ic libs_so
|
.Ic libs_so
|
||||||
command had been used, copies of the libraries so named
|
command had been used, copies of the libraries so named
|
||||||
would also need to be copied to the install floppy.
|
would also need to be copied to the install floppy.
|
||||||
@ -460,6 +460,7 @@ The
|
|||||||
must then be used to get those object files built, or
|
must then be used to get those object files built, or
|
||||||
some other arrangements made.
|
some other arrangements made.
|
||||||
.Sh AUTHORS
|
.Sh AUTHORS
|
||||||
|
.An -nosplit
|
||||||
The
|
The
|
||||||
.Nm
|
.Nm
|
||||||
utility was written by
|
utility was written by
|
||||||
@ -468,7 +469,7 @@ utility was written by
|
|||||||
Copyright (c) 1994 University of Maryland.
|
Copyright (c) 1994 University of Maryland.
|
||||||
All Rights Reserved.
|
All Rights Reserved.
|
||||||
.Pp
|
.Pp
|
||||||
The
|
The
|
||||||
.Ic libs_so
|
.Ic libs_so
|
||||||
keyword was added in 2005 by
|
keyword was added in 2005 by
|
||||||
.An Adrian Steinmann Aq ast@marabu.ch
|
.An Adrian Steinmann Aq ast@marabu.ch
|
||||||
|
@ -70,7 +70,7 @@
|
|||||||
statistics
|
statistics
|
||||||
.Sh SYNOPSIS
|
.Sh SYNOPSIS
|
||||||
.Nm
|
.Nm
|
||||||
.Op Fl CdhKIoTxz?\&
|
.Op Fl CdhIKoTxz?\&
|
||||||
.Op Fl c Ar count
|
.Op Fl c Ar count
|
||||||
.Op Fl M Ar core
|
.Op Fl M Ar core
|
||||||
.Op Fl n Ar devs
|
.Op Fl n Ar devs
|
||||||
|
@ -56,7 +56,9 @@ The options are as follows:
|
|||||||
.It Fl i
|
.It Fl i
|
||||||
Output the jail identifier of the newly created jail.
|
Output the jail identifier of the newly created jail.
|
||||||
.It Fl J Ar jid_file
|
.It Fl J Ar jid_file
|
||||||
Write a JidFile, like a PidFile, containing jailid, path, hostname, ip and
|
Write a
|
||||||
|
.Ar jid_file
|
||||||
|
file, containing jail identifier, path, hostname, IP and
|
||||||
command used to start the jail.
|
command used to start the jail.
|
||||||
.It Fl l
|
.It Fl l
|
||||||
Run program in the clean environment.
|
Run program in the clean environment.
|
||||||
@ -75,9 +77,9 @@ is imported from the current environment.
|
|||||||
The environment variables from the login class capability database for the
|
The environment variables from the login class capability database for the
|
||||||
target login are also set.
|
target login are also set.
|
||||||
.It Fl s Ar securelevel
|
.It Fl s Ar securelevel
|
||||||
Sets
|
Sets the
|
||||||
.Va kern.securelevel
|
.Va kern.securelevel
|
||||||
to the specified value inside the newly created jail.
|
sysctl variable to the specified value inside the newly created jail.
|
||||||
.It Fl u Ar username
|
.It Fl u Ar username
|
||||||
The user name from host environment as whom the
|
The user name from host environment as whom the
|
||||||
.Ar command
|
.Ar command
|
||||||
@ -141,7 +143,7 @@ See
|
|||||||
.Xr devfs 8
|
.Xr devfs 8
|
||||||
for information on how to use devfs rules to limit access to entries
|
for information on how to use devfs rules to limit access to entries
|
||||||
in the per-jail devfs.
|
in the per-jail devfs.
|
||||||
A simple devfs ruleset for jails is available as ruleset #4 in
|
A simple devfs ruleset for jails is available as ruleset #4 in
|
||||||
.Pa /etc/defaults/devfs.rules .
|
.Pa /etc/defaults/devfs.rules .
|
||||||
.Pp
|
.Pp
|
||||||
In many cases this example would put far more in the jail than needed.
|
In many cases this example would put far more in the jail than needed.
|
||||||
@ -546,14 +548,14 @@ constraints on
|
|||||||
.Va kern.securelevel .
|
.Va kern.securelevel .
|
||||||
.El
|
.El
|
||||||
.Pp
|
.Pp
|
||||||
The read-only
|
The read-only sysctl variable
|
||||||
.Va security.jail.jailed
|
.Va security.jail.jailed
|
||||||
variable can be used to determine if a process is running inside a jail (value
|
can be used to determine if a process is running inside a jail (value
|
||||||
is one) or not (value is zero).
|
is one) or not (value is zero).
|
||||||
.Pp
|
.Pp
|
||||||
The
|
The
|
||||||
.Va security.jail.list
|
.Va security.jail.list
|
||||||
MIB entry is read-only and it returns an array of
|
MIB entry is read-only and it returns an array of
|
||||||
.Vt "struct xprison"
|
.Vt "struct xprison"
|
||||||
defined in
|
defined in
|
||||||
.In sys/jail.h .
|
.In sys/jail.h .
|
||||||
|
@ -53,6 +53,7 @@ should run.
|
|||||||
The user name from jailed environment as whom the
|
The user name from jailed environment as whom the
|
||||||
.Ar command
|
.Ar command
|
||||||
should run.
|
should run.
|
||||||
|
.El
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
.Xr jail_attach 2 ,
|
.Xr jail_attach 2 ,
|
||||||
.Xr jail 8 ,
|
.Xr jail 8 ,
|
||||||
|
@ -243,18 +243,15 @@ To switch back to the default keyboard, use this command.
|
|||||||
.Dl kbdcontrol -k /dev/kbd0
|
.Dl kbdcontrol -k /dev/kbd0
|
||||||
.Pp
|
.Pp
|
||||||
To allow using both the second USB keyboard and the first AT keyboard
|
To allow using both the second USB keyboard and the first AT keyboard
|
||||||
at the same time on console via
|
at the same time on console via the
|
||||||
.Xr kbdmux 4
|
.Xr kbdmux 4
|
||||||
driver use the following sequence of commands.
|
driver, use the following sequence of commands.
|
||||||
.Pp
|
.Bd -literal -offset indent
|
||||||
.Dl kbdcontrol -K < /dev/console
|
kbdcontrol -K < /dev/console
|
||||||
.Pp
|
kbdcontrol -a atkbd0 < /dev/kbdmux0
|
||||||
.Dl kbdcontrol -a atkbd0 < /dev/kbdmux0
|
kbdcontrol -a ukbd1 < /dev/kbdmux0
|
||||||
.Pp
|
kbdcontrol -k /dev/kbdmux0 < /dev/console
|
||||||
.Dl kbdcontrol -a ukbd1 < /dev/kbdmux0
|
.Ed
|
||||||
.Pp
|
|
||||||
.Dl kbdcontrol -k /dev/kbdmux0 < /dev/console
|
|
||||||
.Pp
|
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
.Xr kbdmap 1 ,
|
.Xr kbdmap 1 ,
|
||||||
.Xr vidcontrol 1 ,
|
.Xr vidcontrol 1 ,
|
||||||
|
@ -133,9 +133,7 @@ is typically set up as a symbolic link to
|
|||||||
.Nm
|
.Nm
|
||||||
which is not usually invoked on its own.
|
which is not usually invoked on its own.
|
||||||
.Sh EXIT STATUS
|
.Sh EXIT STATUS
|
||||||
The
|
.Ex -std
|
||||||
.Nm
|
|
||||||
exits 0 on success, and \*[Gt]0 if an error occurs.
|
|
||||||
.Sh DIAGNOSTICS
|
.Sh DIAGNOSTICS
|
||||||
The
|
The
|
||||||
.Nm
|
.Nm
|
||||||
|
@ -89,14 +89,17 @@ data to the device so that the user program will see it.
|
|||||||
.Pp
|
.Pp
|
||||||
If the mouse daemon receives the signal
|
If the mouse daemon receives the signal
|
||||||
.Dv SIGHUP ,
|
.Dv SIGHUP ,
|
||||||
it will reopen the mouse port and reinitialize itself. Useful if
|
it will reopen the mouse port and reinitialize itself.
|
||||||
|
Useful if
|
||||||
the mouse is attached/detached while the system is suspended.
|
the mouse is attached/detached while the system is suspended.
|
||||||
.Pp
|
.Pp
|
||||||
If the mouse daemon receives the signal
|
If the mouse daemon receives the signal
|
||||||
.Dv SIGUSR1 ,
|
.Dv SIGUSR1 ,
|
||||||
it will stop passing mouse events. Sending the signal
|
it will stop passing mouse events.
|
||||||
.Dv SIGUSR1
|
Sending the signal
|
||||||
again will resume passing mouse events. Useful if your typing on a laptop is
|
.Dv SIGUSR1
|
||||||
|
again will resume passing mouse events.
|
||||||
|
Useful if your typing on a laptop is
|
||||||
interrupted by accidentally touching the mouse pad.
|
interrupted by accidentally touching the mouse pad.
|
||||||
.Pp
|
.Pp
|
||||||
The following options are available:
|
The following options are available:
|
||||||
@ -613,11 +616,11 @@ protocol.
|
|||||||
To test if the selected protocol type is correct for the given mouse,
|
To test if the selected protocol type is correct for the given mouse,
|
||||||
enable the mouse pointer in the current virtual console,
|
enable the mouse pointer in the current virtual console,
|
||||||
.Pp
|
.Pp
|
||||||
.Dl vidcontrol -m on
|
.Dl "vidcontrol -m on"
|
||||||
.Pp
|
.Pp
|
||||||
start the mouse daemon in the foreground mode,
|
start the mouse daemon in the foreground mode,
|
||||||
.Pp
|
.Pp
|
||||||
.Dl moused -f -p Ar _selected_port_ -t Ar _selected_protocol_
|
.Dl "moused -f -p <selected_port> -t <selected_protocol>"
|
||||||
.Pp
|
.Pp
|
||||||
and see if the mouse pointer travels correctly
|
and see if the mouse pointer travels correctly
|
||||||
according to the mouse movement.
|
according to the mouse movement.
|
||||||
@ -668,7 +671,7 @@ utility
|
|||||||
UNIX-domain stream socket for X10 MouseRemote events
|
UNIX-domain stream socket for X10 MouseRemote events
|
||||||
.El
|
.El
|
||||||
.Sh EXAMPLES
|
.Sh EXAMPLES
|
||||||
.Dl moused -p /dev/cuad0 -i type
|
.Dl "moused -p /dev/cuad0 -i type"
|
||||||
.Pp
|
.Pp
|
||||||
Let the
|
Let the
|
||||||
.Nm
|
.Nm
|
||||||
@ -676,9 +679,10 @@ utility determine the protocol type of the mouse at the serial port
|
|||||||
.Pa /dev/cuad0 .
|
.Pa /dev/cuad0 .
|
||||||
If successful, the command will print the type, otherwise it will say
|
If successful, the command will print the type, otherwise it will say
|
||||||
.Dq Li unknown .
|
.Dq Li unknown .
|
||||||
.Pp
|
.Bd -literal -offset indent
|
||||||
.Dl moused -p /dev/cuad0
|
moused -p /dev/cuad0
|
||||||
.Dl vidcontrol -m on
|
vidcontrol -m on
|
||||||
|
.Ed
|
||||||
.Pp
|
.Pp
|
||||||
If the
|
If the
|
||||||
.Nm
|
.Nm
|
||||||
@ -686,9 +690,10 @@ utility is able to identify the protocol type of the mouse at the specified
|
|||||||
port automatically, you can start the daemon without the
|
port automatically, you can start the daemon without the
|
||||||
.Fl t
|
.Fl t
|
||||||
option and enable the mouse pointer in the text console as above.
|
option and enable the mouse pointer in the text console as above.
|
||||||
.Pp
|
.Bd -literal -offset indent
|
||||||
.Dl moused -p /dev/mouse -t microsoft
|
moused -p /dev/mouse -t microsoft
|
||||||
.Dl vidcontrol -m on
|
vidcontrol -m on
|
||||||
|
.Ed
|
||||||
.Pp
|
.Pp
|
||||||
Start the mouse daemon on the serial port
|
Start the mouse daemon on the serial port
|
||||||
.Pa /dev/mouse .
|
.Pa /dev/mouse .
|
||||||
@ -698,27 +703,27 @@ is explicitly specified by the
|
|||||||
.Fl t
|
.Fl t
|
||||||
option.
|
option.
|
||||||
.Pp
|
.Pp
|
||||||
.Dl moused -p /dev/mouse -m 1=3 -m 3=1
|
.Dl "moused -p /dev/mouse -m 1=3 -m 3=1"
|
||||||
.Pp
|
.Pp
|
||||||
Assign the physical button 3 (right button) to the logical button 1
|
Assign the physical button 3 (right button) to the logical button 1
|
||||||
(logical left) and the physical button 1 (left) to the logical
|
(logical left) and the physical button 1 (left) to the logical
|
||||||
button 3 (logical right).
|
button 3 (logical right).
|
||||||
This will effectively swap the left and right buttons.
|
This will effectively swap the left and right buttons.
|
||||||
.Pp
|
.Pp
|
||||||
.Dl moused -p /dev/mouse -t intellimouse -z 4
|
.Dl "moused -p /dev/mouse -t intellimouse -z 4"
|
||||||
.Pp
|
.Pp
|
||||||
Report negative Z axis movement (i.e., mouse wheel) as the button 4 pressed
|
Report negative Z axis movement (i.e., mouse wheel) as the button 4 pressed
|
||||||
and positive Z axis movement (i.e., mouse wheel) as the button 5 pressed.
|
and positive Z axis movement (i.e., mouse wheel) as the button 5 pressed.
|
||||||
.Pp
|
.Pp
|
||||||
If you add
|
If you add
|
||||||
.Pp
|
.Pp
|
||||||
.Dl ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused
|
.Dl "ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused"
|
||||||
.Pp
|
.Pp
|
||||||
to your
|
to your
|
||||||
.Pa /usr/local/etc/sudoers
|
.Pa /usr/local/etc/sudoers
|
||||||
file, and bind
|
file, and bind
|
||||||
.Pp
|
.Pp
|
||||||
.Dl killall -USR1 moused
|
.Dl "killall -USR1 moused"
|
||||||
.Pp
|
.Pp
|
||||||
to a key in your window manager, you can suspend mouse events on your laptop if
|
to a key in your window manager, you can suspend mouse events on your laptop if
|
||||||
you keep brushing over the mouse pad while typing.
|
you keep brushing over the mouse pad while typing.
|
||||||
|
@ -28,7 +28,7 @@
|
|||||||
.\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
|
.\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
|
||||||
.\" $FreeBSD$
|
.\" $FreeBSD$
|
||||||
.\"
|
.\"
|
||||||
.Dd July 03, 2006
|
.Dd July 3, 2006
|
||||||
.Dt MTREE 8
|
.Dt MTREE 8
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
.\" the suitability of this software for any purpose. It is
|
.\" the suitability of this software for any purpose. It is
|
||||||
.\" provided "as is" without express or implied warranty.
|
.\" provided "as is" without express or implied warranty.
|
||||||
.\"
|
.\"
|
||||||
.Dd June 3, 2004
|
.Dd July 21, 2006
|
||||||
.Dt NEWSYSLOG.CONF 5
|
.Dt NEWSYSLOG.CONF 5
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -109,7 +109,8 @@ Enable the client to synchronize to broadcast servers.
|
|||||||
Specify the name and path of the configuration file, default
|
Specify the name and path of the configuration file, default
|
||||||
.Pa /etc/ntp.conf .
|
.Pa /etc/ntp.conf .
|
||||||
.It Fl d
|
.It Fl d
|
||||||
Specify debugging mode. This option may occur more than once,
|
Specify debugging mode.
|
||||||
|
This option may occur more than once,
|
||||||
with each occurrence indicating greater detail of display.
|
with each occurrence indicating greater detail of display.
|
||||||
.It Fl D Ar level
|
.It Fl D Ar level
|
||||||
Specify debugging level directly.
|
Specify debugging level directly.
|
||||||
@ -133,7 +134,8 @@ This option can be used with the
|
|||||||
.Fl q
|
.Fl q
|
||||||
and
|
and
|
||||||
.Fl x
|
.Fl x
|
||||||
options. See the
|
options.
|
||||||
|
See the
|
||||||
.Ic tinker
|
.Ic tinker
|
||||||
command for other options.
|
command for other options.
|
||||||
.It Fl k Ar keyfile
|
.It Fl k Ar keyfile
|
||||||
@ -149,7 +151,8 @@ This is the same operation as the
|
|||||||
.Ic logfile Ar logfile
|
.Ic logfile Ar logfile
|
||||||
configuration command.
|
configuration command.
|
||||||
.It Fl L
|
.It Fl L
|
||||||
Do not listen to virtual IPs. The default is to listen.
|
Do not listen to virtual IPs.
|
||||||
|
The default is to listen.
|
||||||
.It Fl m
|
.It Fl m
|
||||||
Enable the client to synchronize to multicast servers at the IPv4 multicast
|
Enable the client to synchronize to multicast servers at the IPv4 multicast
|
||||||
group address 224.0.1.1.
|
group address 224.0.1.1.
|
||||||
|
@ -162,12 +162,12 @@ following.
|
|||||||
.It Ic \&? Ar command_keyword
|
.It Ic \&? Ar command_keyword
|
||||||
.It Ic help Ar command_keyword
|
.It Ic help Ar command_keyword
|
||||||
A
|
A
|
||||||
.Ic Ql \&?
|
.Sq Ic \&?
|
||||||
will print a list of all the command
|
will print a list of all the command
|
||||||
keywords known to this incarnation of
|
keywords known to this incarnation of
|
||||||
.Nm .
|
.Nm .
|
||||||
A
|
A
|
||||||
.Ic Ql \&?
|
.Sq Ic \&?
|
||||||
followed by a command keyword will print function and usage
|
followed by a command keyword will print function and usage
|
||||||
information about the command.
|
information about the command.
|
||||||
This command is probably a better
|
This command is probably a better
|
||||||
@ -592,11 +592,13 @@ configuration file commands of
|
|||||||
.It Cm auth
|
.It Cm auth
|
||||||
Enables the server to synchronize with unconfigured peers only
|
Enables the server to synchronize with unconfigured peers only
|
||||||
if the peer has been correctly authenticated using either public key
|
if the peer has been correctly authenticated using either public key
|
||||||
or private key cryptography. The default for this flag is enable.
|
or private key cryptography.
|
||||||
|
The default for this flag is enable.
|
||||||
.It Cm bclient
|
.It Cm bclient
|
||||||
Enables the server to listen for a message from a broadcast or
|
Enables the server to listen for a message from a broadcast or
|
||||||
multicast server, as in the multicastclient command with
|
multicast server, as in the multicastclient command with
|
||||||
default address. The default for this flag is disable.
|
default address.
|
||||||
|
The default for this flag is disable.
|
||||||
.It Cm calibrate
|
.It Cm calibrate
|
||||||
Enables the calibrate feature for reference clocks.
|
Enables the calibrate feature for reference clocks.
|
||||||
The default for this flag is disable.
|
The default for this flag is disable.
|
||||||
@ -604,14 +606,16 @@ The default for this flag is disable.
|
|||||||
Enables the kernel time discipline, if available.
|
Enables the kernel time discipline, if available.
|
||||||
The default for this flag is enable if support is available, otherwise disable.
|
The default for this flag is enable if support is available, otherwise disable.
|
||||||
.It Cm monitor
|
.It Cm monitor
|
||||||
Enables the monitoring facility. See the
|
Enables the monitoring facility.
|
||||||
|
See the
|
||||||
.Xr ntpdc 8 .
|
.Xr ntpdc 8 .
|
||||||
program and the monlist command or further information.
|
program and the monlist command or further information.
|
||||||
The default for this flag is enable.
|
The default for this flag is enable.
|
||||||
.It Cm ntp
|
.It Cm ntp
|
||||||
Enables time and frequency discipline.
|
Enables time and frequency discipline.
|
||||||
In effect, this switch opens and closes the feedback loop,
|
In effect, this switch opens and closes the feedback loop,
|
||||||
which is useful for testing. The default for this flag is enable.
|
which is useful for testing.
|
||||||
|
The default for this flag is enable.
|
||||||
.It Cm pps
|
.It Cm pps
|
||||||
Enables the pulse-per-second (PPS) signal when frequency
|
Enables the pulse-per-second (PPS) signal when frequency
|
||||||
and time is disciplined by the precision time kernel modifications.
|
and time is disciplined by the precision time kernel modifications.
|
||||||
@ -620,7 +624,8 @@ See the
|
|||||||
(available as part of the HTML documentation
|
(available as part of the HTML documentation
|
||||||
provided in
|
provided in
|
||||||
.Pa /usr/share/doc/ntp )
|
.Pa /usr/share/doc/ntp )
|
||||||
page for further information. The default for this flag is disable.
|
page for further information.
|
||||||
|
The default for this flag is disable.
|
||||||
.It Cm stats
|
.It Cm stats
|
||||||
Enables the statistics facility.
|
Enables the statistics facility.
|
||||||
See the
|
See the
|
||||||
|
@ -148,12 +148,12 @@ These are described following.
|
|||||||
.It Ic \&? Op Ar command_keyword
|
.It Ic \&? Op Ar command_keyword
|
||||||
.It Ic help Op Ar command_keyword
|
.It Ic help Op Ar command_keyword
|
||||||
A
|
A
|
||||||
.Ic Ql \&?
|
.Sq Ic \&?
|
||||||
by itself will print a list of all the command
|
by itself will print a list of all the command
|
||||||
keywords known to this incarnation of
|
keywords known to this incarnation of
|
||||||
.Nm .
|
.Nm .
|
||||||
A
|
A
|
||||||
.Ic Ql \&?
|
.Sq Ic \&?
|
||||||
followed by a command keyword will print function and usage
|
followed by a command keyword will print function and usage
|
||||||
information about the command.
|
information about the command.
|
||||||
This command is probably a better
|
This command is probably a better
|
||||||
@ -241,7 +241,8 @@ modified using the command line
|
|||||||
switch.
|
switch.
|
||||||
.It Ic keyid Ar keyid
|
.It Ic keyid Ar keyid
|
||||||
This command specifies the key number to be used to authenticate
|
This command specifies the key number to be used to authenticate
|
||||||
configuration requests. This must correspond to a key number the server has
|
configuration requests.
|
||||||
|
This must correspond to a key number the server has
|
||||||
been configured to use for this purpose.
|
been configured to use for this purpose.
|
||||||
.It Xo Ic ntpversion
|
.It Xo Ic ntpversion
|
||||||
.Cm 1 |
|
.Cm 1 |
|
||||||
@ -259,7 +260,8 @@ There appear
|
|||||||
to be no servers left which demand version 1.
|
to be no servers left which demand version 1.
|
||||||
.It Ic passwd
|
.It Ic passwd
|
||||||
This command prompts for a password (which will not be echoed) which will
|
This command prompts for a password (which will not be echoed) which will
|
||||||
be used to authenticate configuration requests. The password must
|
be used to authenticate configuration requests.
|
||||||
|
The password must
|
||||||
correspond to the key configured for NTP server for this purpose.
|
correspond to the key configured for NTP server for this purpose.
|
||||||
.It Ic quit
|
.It Ic quit
|
||||||
Exit
|
Exit
|
||||||
@ -281,8 +283,10 @@ a timeout will be twice the timeout value set.
|
|||||||
.El
|
.El
|
||||||
.Ss Control Message Commands
|
.Ss Control Message Commands
|
||||||
Each association known to an NTP server has a 16 bit integer association
|
Each association known to an NTP server has a 16 bit integer association
|
||||||
identifier. NTP control messages which carry peer variables must identify the
|
identifier.
|
||||||
peer the values correspond to by including its association ID. An association
|
NTP control messages which carry peer variables must identify the
|
||||||
|
peer the values correspond to by including its association ID.
|
||||||
|
An association
|
||||||
ID of 0 is special, and indicates the variables are system variables, whose
|
ID of 0 is special, and indicates the variables are system variables, whose
|
||||||
names are drawn from a separate name space.
|
names are drawn from a separate name space.
|
||||||
.Pp
|
.Pp
|
||||||
@ -430,7 +434,8 @@ register, in octal, and the current estimated delay,
|
|||||||
offset and dispersion of the peer, all in milliseconds.
|
offset and dispersion of the peer, all in milliseconds.
|
||||||
The character at the left margin of each line shows the
|
The character at the left margin of each line shows the
|
||||||
synchronization status of the association and is a valuable
|
synchronization status of the association and is a valuable
|
||||||
diagnostic tool. The encoding and meaning of this character,
|
diagnostic tool.
|
||||||
|
The encoding and meaning of this character,
|
||||||
called the tally code, is given later in this page.
|
called the tally code, is given later in this page.
|
||||||
.It Ic pstatus Ar assocID
|
.It Ic pstatus Ar assocID
|
||||||
Sends a read status request to the server for the given
|
Sends a read status request to the server for the given
|
||||||
@ -466,7 +471,8 @@ system variables, otherwise they are peer variables and the values
|
|||||||
returned will be those of the corresponding peer.
|
returned will be those of the corresponding peer.
|
||||||
Omitting the
|
Omitting the
|
||||||
variable list will send a request with no data which should induce
|
variable list will send a request with no data which should induce
|
||||||
the server to return a default display. The
|
the server to return a default display.
|
||||||
|
The
|
||||||
encoding and meaning of the variables derived from NTPv3 is given in
|
encoding and meaning of the variables derived from NTPv3 is given in
|
||||||
RFC-1305; the encoding and meaning of the additional NTPv4 variables are
|
RFC-1305; the encoding and meaning of the additional NTPv4 variables are
|
||||||
given later in this page.
|
given later in this page.
|
||||||
@ -512,7 +518,8 @@ The peer is a survivor and a candidate for the combining algorithm.
|
|||||||
.It \&#
|
.It \&#
|
||||||
.Pq selected
|
.Pq selected
|
||||||
The peer is a survivor, but not among the first six peers sorted by
|
The peer is a survivor, but not among the first six peers sorted by
|
||||||
synchronization distance. If the association is ephemeral, it may be
|
synchronization distance.
|
||||||
|
If the association is ephemeral, it may be
|
||||||
demobilized to conserve resources.
|
demobilized to conserve resources.
|
||||||
.It \&*
|
.It \&*
|
||||||
.Pq sys.peer
|
.Pq sys.peer
|
||||||
@ -521,7 +528,8 @@ system variables.
|
|||||||
.It o
|
.It o
|
||||||
.Pq pps.peer
|
.Pq pps.peer
|
||||||
The peer has been declared the system peer and lends its variables to
|
The peer has been declared the system peer and lends its variables to
|
||||||
the system variables. However, the actual system synchronization is derived
|
the system variables.
|
||||||
|
However, the actual system synchronization is derived
|
||||||
from a pulse-per-second (PPS) signal, either indirectly via the PPS
|
from a pulse-per-second (PPS) signal, either indirectly via the PPS
|
||||||
reference clock driver or directly via kernel interface.
|
reference clock driver or directly via kernel interface.
|
||||||
.El
|
.El
|
||||||
@ -540,7 +548,8 @@ The
|
|||||||
and
|
and
|
||||||
.Cm frequency
|
.Cm frequency
|
||||||
variables are described in RFC-1305
|
variables are described in RFC-1305
|
||||||
specification. Additional NTPv4 system variables include the following.
|
specification.
|
||||||
|
Additional NTPv4 system variables include the following.
|
||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It version
|
.It version
|
||||||
Everything you might need to know about the software version and generation
|
Everything you might need to know about the software version and generation
|
||||||
@ -550,7 +559,8 @@ The processor and kernel identification string.
|
|||||||
.It system
|
.It system
|
||||||
The operating system version and release identifier.
|
The operating system version and release identifier.
|
||||||
.It state
|
.It state
|
||||||
The state of the clock discipline state machine. The values are described
|
The state of the clock discipline state machine.
|
||||||
|
The values are described
|
||||||
in the architecture briefing on the NTP Project page linked from
|
in the architecture briefing on the NTP Project page linked from
|
||||||
www.ntp.org.
|
www.ntp.org.
|
||||||
.It peer
|
.It peer
|
||||||
@ -570,7 +580,8 @@ depending on the particular dance:
|
|||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It flags
|
.It flags
|
||||||
The current flags word bits and message digest algorithm identifier (NID)
|
The current flags word bits and message digest algorithm identifier (NID)
|
||||||
in hex format. The high order 16 bits of the four-byte word contain the NID
|
in hex format.
|
||||||
|
The high order 16 bits of the four-byte word contain the NID
|
||||||
from the OpenSSL ligrary, while the low-order bits are interpreted as
|
from the OpenSSL ligrary, while the low-order bits are interpreted as
|
||||||
follows:
|
follows:
|
||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
@ -593,8 +604,10 @@ function.
|
|||||||
.It hostkey
|
.It hostkey
|
||||||
The NTP filestamp of the host key file.
|
The NTP filestamp of the host key file.
|
||||||
.It cert
|
.It cert
|
||||||
A list of certificates held by the host. Each entry includes the subject,
|
A list of certificates held by the host.
|
||||||
issuer, flags and NTP filestamp in order. The bits are interpreted as
|
Each entry includes the subject,
|
||||||
|
issuer, flags and NTP filestamp in order.
|
||||||
|
The bits are interpreted as
|
||||||
follows:
|
follows:
|
||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It 0x01
|
.It 0x01
|
||||||
@ -647,7 +660,8 @@ Additional NTPv4 system variables include
|
|||||||
the following.
|
the following.
|
||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It flash
|
.It flash
|
||||||
The flash code for the most recent packet received. The encoding and
|
The flash code for the most recent packet received.
|
||||||
|
The encoding and
|
||||||
meaning of these codes is given later in this page.
|
meaning of these codes is given later in this page.
|
||||||
.It jitter
|
.It jitter
|
||||||
The estimated time error of the peer clock measured as an exponential
|
The estimated time error of the peer clock measured as an exponential
|
||||||
@ -661,8 +675,10 @@ When the NTPv4 daemon is compiled with the OpenSSL software library, additional
|
|||||||
peer variables are displayed, including the following:
|
peer variables are displayed, including the following:
|
||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It flags
|
.It flags
|
||||||
The current flag bits. This word is the server host status word with
|
The current flag bits.
|
||||||
additional bits used by the Autokey state machine. See the source code for
|
This word is the server host status word with
|
||||||
|
additional bits used by the Autokey state machine.
|
||||||
|
See the source code for
|
||||||
the bit encoding.
|
the bit encoding.
|
||||||
.It hostname
|
.It hostname
|
||||||
The server host name.
|
The server host name.
|
||||||
@ -680,18 +696,22 @@ The NTP timestamp when the last Autokey key list was generated and signed.
|
|||||||
The
|
The
|
||||||
.Cm flash
|
.Cm flash
|
||||||
code is a valuable debugging aid displayed in the peer variables
|
code is a valuable debugging aid displayed in the peer variables
|
||||||
list. It shows the results of the original sanity checks defined in the NTP
|
list.
|
||||||
specification RFC-1305 and additional ones added in NTPv4. There are 12 tests
|
It shows the results of the original sanity checks defined in the NTP
|
||||||
|
specification RFC-1305 and additional ones added in NTPv4.
|
||||||
|
There are 12 tests
|
||||||
designated
|
designated
|
||||||
.Sy TEST1
|
.Sy TEST1
|
||||||
through
|
through
|
||||||
.Sy TEST12 .
|
.Sy TEST12 .
|
||||||
The tests are performed in a certain order
|
The tests are performed in a certain order
|
||||||
designed to gain maximum diagnostic information while protecting against
|
designed to gain maximum diagnostic information while protecting against
|
||||||
accidental or malicious errors. The
|
accidental or malicious errors.
|
||||||
|
The
|
||||||
.Sy flash
|
.Sy flash
|
||||||
variable is initialized to zero as
|
variable is initialized to zero as
|
||||||
each packet is received. If after each set of tests one or more bits are set,
|
each packet is received.
|
||||||
|
If after each set of tests one or more bits are set,
|
||||||
the packet is discarded.
|
the packet is discarded.
|
||||||
.Pp
|
.Pp
|
||||||
Tests
|
Tests
|
||||||
@ -699,22 +719,27 @@ Tests
|
|||||||
through
|
through
|
||||||
.Sy TEST3
|
.Sy TEST3
|
||||||
check the packet timestamps from which the offset and
|
check the packet timestamps from which the offset and
|
||||||
delay are calculated. If any bits are set, the packet is discarded; otherwise,
|
delay are calculated.
|
||||||
|
If any bits are set, the packet is discarded; otherwise,
|
||||||
the packet header variables are saved.
|
the packet header variables are saved.
|
||||||
.Sy TEST4
|
.Sy TEST4
|
||||||
and
|
and
|
||||||
.Sy TEST5
|
.Sy TEST5
|
||||||
are associated with
|
are associated with
|
||||||
access control and cryptographic authentication. If any bits are set, the
|
access control and cryptographic authentication.
|
||||||
|
If any bits are set, the
|
||||||
packet is discarded immediately with nothing changed.
|
packet is discarded immediately with nothing changed.
|
||||||
.Pp
|
.Pp
|
||||||
Tests
|
Tests
|
||||||
.Sy TEST6
|
.Sy TEST6
|
||||||
through
|
through
|
||||||
.Sy TEST8
|
.Sy TEST8
|
||||||
check the health of the server. If any bits are set,
|
check the health of the server.
|
||||||
|
If any bits are set,
|
||||||
the packet is discarded; otherwise, the offset and delay relative to the server
|
the packet is discarded; otherwise, the offset and delay relative to the server
|
||||||
are calculated and saved. TEST9 checks the health of the association itself. If
|
are calculated and saved.
|
||||||
|
TEST9 checks the health of the association itself.
|
||||||
|
If
|
||||||
any bits are set, the packet is discarded; otherwise, the saved variables are
|
any bits are set, the packet is discarded; otherwise, the saved variables are
|
||||||
passed to the clock filter and mitigation algorithms.
|
passed to the clock filter and mitigation algorithms.
|
||||||
.Pp
|
.Pp
|
||||||
@ -738,35 +763,44 @@ bits for each test are defined as follows.
|
|||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It 0x001
|
.It 0x001
|
||||||
.Pq TEST1
|
.Pq TEST1
|
||||||
Duplicate packet. The packet is at best a casual retransmission and at
|
Duplicate packet.
|
||||||
|
The packet is at best a casual retransmission and at
|
||||||
worst a malicious replay.
|
worst a malicious replay.
|
||||||
.It 0x002
|
.It 0x002
|
||||||
.Pq TEST2
|
.Pq TEST2
|
||||||
Bogus packet. The packet is not a reply to a message previously sent. This
|
Bogus packet.
|
||||||
|
The packet is not a reply to a message previously sent.
|
||||||
|
This
|
||||||
can happen when the NTP daemon is restarted and before somebody else
|
can happen when the NTP daemon is restarted and before somebody else
|
||||||
notices.
|
notices.
|
||||||
.It 0x004
|
.It 0x004
|
||||||
.Pq TEST3
|
.Pq TEST3
|
||||||
Unsynchronized. One or more timestamp fields are invalid. This normally
|
Unsynchronized.
|
||||||
|
One or more timestamp fields are invalid.
|
||||||
|
This normally
|
||||||
happens when the first packet from a peer is received.
|
happens when the first packet from a peer is received.
|
||||||
.It 0x008
|
.It 0x008
|
||||||
.Pq TEST4
|
.Pq TEST4
|
||||||
Access is denied. See the
|
Access is denied.
|
||||||
|
See the
|
||||||
.Sx Access Control Support
|
.Sx Access Control Support
|
||||||
section of
|
section of
|
||||||
.Xr ntp.conf 5 .
|
.Xr ntp.conf 5 .
|
||||||
.It 0x010
|
.It 0x010
|
||||||
.Pq TEST5
|
.Pq TEST5
|
||||||
Cryptographic authentication fails. See the
|
Cryptographic authentication fails.
|
||||||
|
See the
|
||||||
.Sx Authentication Options
|
.Sx Authentication Options
|
||||||
section of
|
section of
|
||||||
.Xr ntp.conf 5 .
|
.Xr ntp.conf 5 .
|
||||||
.It 0x020
|
.It 0x020
|
||||||
.Pq TEST6
|
.Pq TEST6
|
||||||
The server is unsynchronized. Wind up its clock first.
|
The server is unsynchronized.
|
||||||
|
Wind up its clock first.
|
||||||
.It 0x040
|
.It 0x040
|
||||||
.Pq TEST7
|
.Pq TEST7
|
||||||
The server stratum is at the maximum than 15. It is probably unsynchronized
|
The server stratum is at the maximum than 15.
|
||||||
|
It is probably unsynchronized
|
||||||
and its clock needs to be wound up.
|
and its clock needs to be wound up.
|
||||||
.It 0x080
|
.It 0x080
|
||||||
.Pq TEST8
|
.Pq TEST8
|
||||||
@ -778,21 +812,24 @@ Either the peer delay or dispersion is greater than one second, which is
|
|||||||
higly unlikely unless the peer is on Mars.
|
higly unlikely unless the peer is on Mars.
|
||||||
.It 0x200
|
.It 0x200
|
||||||
.Pq TEST10
|
.Pq TEST10
|
||||||
The autokey protocol has detected an authentication failure. See the
|
The autokey protocol has detected an authentication failure.
|
||||||
|
See the
|
||||||
.Sx Authentication Options
|
.Sx Authentication Options
|
||||||
section of
|
section of
|
||||||
.Xr ntp.conf 5 .
|
.Xr ntp.conf 5 .
|
||||||
.It 0x400
|
.It 0x400
|
||||||
.Pq TEST11
|
.Pq TEST11
|
||||||
The autokey protocol has not verified the server or peer is proventic and
|
The autokey protocol has not verified the server or peer is proventic and
|
||||||
has valid public key credentials. See the
|
has valid public key credentials.
|
||||||
|
See the
|
||||||
.Sx Authentication Options
|
.Sx Authentication Options
|
||||||
section of
|
section of
|
||||||
.Xr ntp.conf 5 .
|
.Xr ntp.conf 5 .
|
||||||
.It 0x800
|
.It 0x800
|
||||||
.Pq TEST12
|
.Pq TEST12
|
||||||
A protocol or configuration error has occurred in the public key algorithms
|
A protocol or configuration error has occurred in the public key algorithms
|
||||||
or a possible intrusion event has been detected. See the
|
or a possible intrusion event has been detected.
|
||||||
|
See the
|
||||||
.Sx Authentication Options
|
.Sx Authentication Options
|
||||||
section of
|
section of
|
||||||
.Xr ntp.conf 5 .
|
.Xr ntp.conf 5 .
|
||||||
|
@ -25,7 +25,7 @@
|
|||||||
.Nd a utility for displaying information on software packages
|
.Nd a utility for displaying information on software packages
|
||||||
.Sh SYNOPSIS
|
.Sh SYNOPSIS
|
||||||
.Nm
|
.Nm
|
||||||
.Op Fl bcdDEfgGijIkKLmopPqQrRsvVxX
|
.Op Fl bcdDEfgGiIjkKLmopPqQrRsvVxX
|
||||||
.Op Fl e Ar package
|
.Op Fl e Ar package
|
||||||
.Op Fl l Ar prefix
|
.Op Fl l Ar prefix
|
||||||
.Op Fl t Ar template
|
.Op Fl t Ar template
|
||||||
|
@ -145,13 +145,13 @@ is of the form
|
|||||||
where
|
where
|
||||||
.Ar hostname
|
.Ar hostname
|
||||||
does not start with a
|
does not start with a
|
||||||
.Sq \&.
|
.Ql \&.
|
||||||
or a
|
or a
|
||||||
.Sq / ,
|
.Ql / ,
|
||||||
then
|
then
|
||||||
.Nm
|
.Nm
|
||||||
will open a network socket to host
|
will open a network socket to host
|
||||||
.Ar hostname
|
.Ar hostname
|
||||||
on port
|
on port
|
||||||
.Ar port .
|
.Ar port .
|
||||||
.Pp
|
.Pp
|
||||||
@ -303,7 +303,8 @@ It is
|
|||||||
.Sh AUTHORS
|
.Sh AUTHORS
|
||||||
.An Joseph Koshy Aq jkoshy@FreeBSD.org
|
.An Joseph Koshy Aq jkoshy@FreeBSD.org
|
||||||
.Sh BUGS
|
.Sh BUGS
|
||||||
|
The
|
||||||
.Nm
|
.Nm
|
||||||
cannot yet analyse
|
utility cannot yet analyse
|
||||||
.Xr hwpmc 4
|
.Xr hwpmc 4
|
||||||
logs generated by non-native architectures.
|
logs generated by non-native architectures.
|
||||||
|
@ -54,7 +54,7 @@ uncompressed ports tree.
|
|||||||
The following options are supported:
|
The following options are supported:
|
||||||
.Bl -tag -width "-f conffile"
|
.Bl -tag -width "-f conffile"
|
||||||
.It Fl d Ar workdir
|
.It Fl d Ar workdir
|
||||||
Store working files (e.g. downloaded updates) in
|
Store working files (e.g.\& downloaded updates) in
|
||||||
.Ar workdir .
|
.Ar workdir .
|
||||||
(default:
|
(default:
|
||||||
.Pa /var/db/portsnap ,
|
.Pa /var/db/portsnap ,
|
||||||
@ -72,7 +72,7 @@ command, update INDEX files, but not the rest of the ports tree.
|
|||||||
Expect a public key with given SHA256 hash.
|
Expect a public key with given SHA256 hash.
|
||||||
(default: read value from configuration file.)
|
(default: read value from configuration file.)
|
||||||
.It Fl l Ar descfile
|
.It Fl l Ar descfile
|
||||||
Merge the specified local describes file into the INDEX files being
|
Merge the specified local describes file into the INDEX files being
|
||||||
built.
|
built.
|
||||||
The
|
The
|
||||||
.Ar descfile
|
.Ar descfile
|
||||||
@ -95,9 +95,9 @@ For
|
|||||||
.Cm extract
|
.Cm extract
|
||||||
command only, operate only on parts of the ports tree starting with
|
command only, operate only on parts of the ports tree starting with
|
||||||
.Ar path .
|
.Ar path .
|
||||||
(e.g.
|
(e.g.\&
|
||||||
.Nm
|
.Nm
|
||||||
.cm extract
|
.Cm extract
|
||||||
.Ar sysutils/port
|
.Ar sysutils/port
|
||||||
would extract sysutils/portsman, sysutils/portsnap,
|
would extract sysutils/portsman, sysutils/portsnap,
|
||||||
sysutils/portupgrade, etc.)
|
sysutils/portupgrade, etc.)
|
||||||
@ -206,16 +206,16 @@ of files are not needed by any particular client.
|
|||||||
.Sh PRIVACY NOTICE
|
.Sh PRIVACY NOTICE
|
||||||
As an unavoidable part of its operation, a machine running
|
As an unavoidable part of its operation, a machine running
|
||||||
.Nm
|
.Nm
|
||||||
will make its public IP address and the list of files it fetches
|
will make its public IP address and the list of files it fetches
|
||||||
available to the server from which it fetches updates.
|
available to the server from which it fetches updates.
|
||||||
Using these it may be possible to recognize a machine over an extended
|
Using these it may be possible to recognize a machine over an extended
|
||||||
period of time, determine when it is updated, and identify which
|
period of time, determine when it is updated, and identify which
|
||||||
portions of the FreeBSD ports tree, if any, are being ignored using
|
portions of the FreeBSD ports tree, if any, are being ignored using
|
||||||
"REFUSE" directives in
|
"REFUSE" directives in
|
||||||
.Pa portsnap.conf .
|
.Pa portsnap.conf .
|
||||||
In addition, the FreeBSD release level is transmitted to the server.
|
In addition, the FreeBSD release level is transmitted to the server.
|
||||||
.Pp
|
.Pp
|
||||||
Statistical data generated from information collected in this manner
|
Statistical data generated from information collected in this manner
|
||||||
may be published, but only in aggregate and after anonymizing the
|
may be published, but only in aggregate and after anonymizing the
|
||||||
individual systems.
|
individual systems.
|
||||||
.Sh FILES
|
.Sh FILES
|
||||||
@ -228,9 +228,9 @@ Default location where compressed snapshots are stored.
|
|||||||
Default location where the ports tree is extracted.
|
Default location where the ports tree is extracted.
|
||||||
.El
|
.El
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
.Xr fetch 1
|
.Xr fetch 1 ,
|
||||||
.Xr fetch 3
|
.Xr sha256 1 ,
|
||||||
|
.Xr fetch 3 ,
|
||||||
.Xr portsnap.conf 5
|
.Xr portsnap.conf 5
|
||||||
.Xr sha256 1
|
|
||||||
.Sh AUTHORS
|
.Sh AUTHORS
|
||||||
.An Colin Percival Aq cperciva@FreeBSD.org
|
.An Colin Percival Aq cperciva@FreeBSD.org
|
||||||
|
@ -338,8 +338,9 @@ Selected messages are forwarded to the
|
|||||||
.Xr syslogd 8
|
.Xr syslogd 8
|
||||||
program on the named host.
|
program on the named host.
|
||||||
If a port number is added after a colon
|
If a port number is added after a colon
|
||||||
.Pq ':'
|
.Pq Ql :\&
|
||||||
then that port will be used as the destination port rather than the usual syslog port.
|
then that port will be used as the destination port
|
||||||
|
rather than the usual syslog port.
|
||||||
.It
|
.It
|
||||||
A comma separated list of users.
|
A comma separated list of users.
|
||||||
Selected messages are written to those users
|
Selected messages are written to those users
|
||||||
|
@ -25,7 +25,7 @@
|
|||||||
.\"
|
.\"
|
||||||
.\" $FreeBSD$
|
.\" $FreeBSD$
|
||||||
.\"
|
.\"
|
||||||
.Dd February 28, 2004
|
.Dd September 2, 2006
|
||||||
.Dt WATCHDOG 8
|
.Dt WATCHDOG 8
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
|
@ -25,7 +25,7 @@
|
|||||||
.\"
|
.\"
|
||||||
.\" $FreeBSD$
|
.\" $FreeBSD$
|
||||||
.\"
|
.\"
|
||||||
.Dd June 25, 2003
|
.Dd September 2, 2006
|
||||||
.Dt WATCHDOGD 8
|
.Dt WATCHDOGD 8
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
|
@ -72,7 +72,8 @@ mode.
|
|||||||
Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 =
|
Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 =
|
||||||
excessive.
|
excessive.
|
||||||
.It Va dump_file
|
.It Va dump_file
|
||||||
Dump file for state information (on SIGUSR1).
|
Dump file for state information (on
|
||||||
|
.Dv SIGUSR1 ) .
|
||||||
.It Va ctrl_interface
|
.It Va ctrl_interface
|
||||||
The pathname of the directory in which
|
The pathname of the directory in which
|
||||||
.Xr hostapd 8
|
.Xr hostapd 8
|
||||||
@ -185,8 +186,8 @@ seconds.
|
|||||||
Rekey GTK when any STA that possesses the current GTK is leaving the
|
Rekey GTK when any STA that possesses the current GTK is leaving the
|
||||||
BSS.
|
BSS.
|
||||||
.It Va wpa_gmk_rekey
|
.It Va wpa_gmk_rekey
|
||||||
Time interval for rekeying GMK (master key used internally to generate GTKs
|
Time interval for rekeying GMK (master key used internally to generate GTKs),
|
||||||
(in seconds).
|
in seconds.
|
||||||
.El
|
.El
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
.Xr hostapd 8 ,
|
.Xr hostapd 8 ,
|
||||||
|
@ -51,7 +51,8 @@ utility listens for events generated by an
|
|||||||
.Xr ndis 4
|
.Xr ndis 4
|
||||||
wireless network driver and relays them to
|
wireless network driver and relays them to
|
||||||
.Xr wpa_supplicant 8
|
.Xr wpa_supplicant 8
|
||||||
for possible processing. The three event types that can occur
|
for possible processing.
|
||||||
|
The three event types that can occur
|
||||||
are media connect and disconnect events, such as when a wireless
|
are media connect and disconnect events, such as when a wireless
|
||||||
interface joins or leaves a network, and media-specific events.
|
interface joins or leaves a network, and media-specific events.
|
||||||
In particular,
|
In particular,
|
||||||
@ -64,12 +65,14 @@ needs in order to properly associate with WPA2-capable access points.
|
|||||||
The
|
The
|
||||||
.Nm
|
.Nm
|
||||||
daemon works by listening for interface information events via
|
daemon works by listening for interface information events via
|
||||||
a routing socket. When it detects an event that was generated by an
|
a routing socket.
|
||||||
|
When it detects an event that was generated by an
|
||||||
.Xr ndis 4
|
.Xr ndis 4
|
||||||
interface, it transmits it via UDP packet on the loopback interface,
|
interface, it transmits it via UDP packet on the loopback interface,
|
||||||
where
|
where
|
||||||
.Xr wpa_supplicant 8
|
.Xr wpa_supplicant 8
|
||||||
is presumeably listening. The standard
|
is presumeably listening.
|
||||||
|
The standard
|
||||||
.Xr wpa_supplicant 8
|
.Xr wpa_supplicant 8
|
||||||
distribution includes its own version of this utility for use with
|
distribution includes its own version of this utility for use with
|
||||||
.Tn Windows\[rg] .
|
.Tn Windows\[rg] .
|
||||||
@ -92,31 +95,35 @@ The
|
|||||||
daemon supports the following options:
|
daemon supports the following options:
|
||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It Fl a
|
.It Fl a
|
||||||
Process all events. By default,
|
Process all events.
|
||||||
|
By default,
|
||||||
.Nm
|
.Nm
|
||||||
will only process and forward media-specific events, which contain
|
will only process and forward media-specific events, which contain
|
||||||
PMKID candidate information, and not bother forwarding connect and
|
PMKID candidate information, and not bother forwarding connect and
|
||||||
disconnect events, since
|
disconnect events, since
|
||||||
.Xr wpa_supplicant 8
|
.Xr wpa_supplicant 8
|
||||||
normally can determine the current link state on its own. In some
|
normally can determine the current link state on its own.
|
||||||
|
In some
|
||||||
cases, the additional connect and disconnect events only confuse it
|
cases, the additional connect and disconnect events only confuse it
|
||||||
and make the association and authentication process take longer.
|
and make the association and authentication process take longer.
|
||||||
.It Fl d
|
.It Fl d
|
||||||
Run in debug mode. This causes
|
Run in debug mode.
|
||||||
|
This causes
|
||||||
.Nm
|
.Nm
|
||||||
to run in the foreground and generate any output to the standard
|
to run in the foreground and generate any output to the standard
|
||||||
error instead of using the
|
error instead of using the
|
||||||
.Xr syslog 3
|
.Xr syslog 3
|
||||||
facility.
|
facility.
|
||||||
.It Fl v
|
.It Fl v
|
||||||
Run in verbose mode. This causes
|
Run in verbose mode.
|
||||||
|
This causes
|
||||||
.Nm
|
.Nm
|
||||||
to emit notifications when it receives events.
|
to emit notifications when it receives events.
|
||||||
.El
|
.El
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
.Xr ndis 4 ,
|
.Xr ndis 4 ,
|
||||||
.Xr ndisapi 9 ,
|
.Xr wpa_supplicant 8 ,
|
||||||
.Xr wpa_supplicant 8
|
.Xr ndisapi 9
|
||||||
.Sh HISTORY
|
.Sh HISTORY
|
||||||
The
|
The
|
||||||
.Nm
|
.Nm
|
||||||
|
Loading…
Reference in New Issue
Block a user