Markup fixes.

This commit is contained in:
ru 2006-09-29 17:57:04 +00:00
parent 006fe97736
commit 081fcce9b9
24 changed files with 531 additions and 313 deletions

View File

@ -66,8 +66,8 @@ The user name is restricted to whatever
.Xr pw 8
will accept.
Generally this means it
may contain only lowercase characters or digits but cannot begin with
.Sq Fl
may contain only lowercase characters or digits but cannot begin with the
.Ql -
character.
Maximum length
is 16 characters.

View File

@ -133,18 +133,17 @@ the loopback interface.
Enables ARP proxying for all hosts on net.
.El
.Sh DIAGNOSTICS
.Em "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!" :
.Bl -diag
.It "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!"
ARP has discovered another host on the local network which responds to
mapping requests for its own Internet address with a different Ethernet
address, generally indicating that two hosts are attempting to use the
same Internet address.
.Pp
.Em "arp: link address is broadcast for IP address %d.%d.%d.%d!" :
.It "arp: link address is broadcast for IP address %d.%d.%d.%d!"
ARP requested information for a host, and received an answer indicating
that the host's ethernet address is the ethernet broadcast address.
This indicates a misconfigured or broken device.
.Pp
.Em "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s" :
.It "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s"
ARP had a cached value for the ethernet address of the referenced host,
but received a reply indicating that the host is at a new address.
This can happen normally when host hardware addresses change,
@ -153,15 +152,13 @@ It can also indicate a problem with proxy ARP.
This message can only be issued if the sysctl
.Va net.link.ether.inet.log_arp_movements
is set to 1, which is the system's default behaviour.
.Pp
.Em "arpresolve: can't allocate llinfo for %d.%d.%d.%d" :
.It "arpresolve: can't allocate llinfo for %d.%d.%d.%d"
The route for the referenced host points to a device upon which ARP is
required, but ARP was unable to allocate a routing table entry in which
to store the host's MAC address.
This usually points to a misconfigured routing table.
It can also occur if the kernel cannot allocate memory.
.Pp
.Em "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1" :
.It "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1"
Physical connections exist to the same logical IP network on both if0 and if1.
It can also occur if an entry already exists in the ARP cache for the IP
address above, and the cable has been disconnected from if0, then reconnected
@ -169,13 +166,13 @@ to if1.
This message can only be issued if the sysctl
.Va net.link.ether.inet.log_arp_wrong_iface
is set to 1, which is the system's default behaviour.
.Pp
.Em "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s" :
.It "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s"
ARP has received an ARP reply that attempts to overwrite a permanent
antry in the local ARP table.
This error will be only logged, if the sysctl
entry in the local ARP table.
This error will only be logged if the sysctl
.Va net.link.ether.inet.log_arp_permanent_modify
is set to 1, which is the system's default behaviour.
.El
.Sh SEE ALSO
.Xr inet 4 ,
.Xr route 4 ,

View File

@ -43,7 +43,7 @@ By default,
reads
.Xr kldstat 8
output from standard input and writes to the
.Pa \&.asf
.Pa .asf
file a list of
.Xr gdb 1
commands to add symbol files from KLDs in subdirectories of the subdirectory
@ -73,7 +73,7 @@ writes to it instead of
If
.Ar outfile
is a single dash
.Pq Sq \&- ,
.Pq Sq Fl ,
the standard output is used.
.Sh OPTIONS
The following options modify the function of
@ -114,7 +114,7 @@ to write or append its output to.
If
.Ar outfile
is a single dash
.Pq Sq \&- ,
.Pq Sq Fl ,
the standard output is used.
.It Fl s
Do not prepend a (guessed) subdirectory of the module path.

View File

@ -433,7 +433,7 @@ At this point the binary
can be copied onto an install floppy
and hard-linked to the names of the component programs.
.Pp
Note that if the
Note that if the
.Ic libs_so
command had been used, copies of the libraries so named
would also need to be copied to the install floppy.
@ -460,6 +460,7 @@ The
must then be used to get those object files built, or
some other arrangements made.
.Sh AUTHORS
.An -nosplit
The
.Nm
utility was written by
@ -468,7 +469,7 @@ utility was written by
Copyright (c) 1994 University of Maryland.
All Rights Reserved.
.Pp
The
The
.Ic libs_so
keyword was added in 2005 by
.An Adrian Steinmann Aq ast@marabu.ch

View File

@ -70,7 +70,7 @@
statistics
.Sh SYNOPSIS
.Nm
.Op Fl CdhKIoTxz?\&
.Op Fl CdhIKoTxz?\&
.Op Fl c Ar count
.Op Fl M Ar core
.Op Fl n Ar devs

View File

@ -56,7 +56,9 @@ The options are as follows:
.It Fl i
Output the jail identifier of the newly created jail.
.It Fl J Ar jid_file
Write a JidFile, like a PidFile, containing jailid, path, hostname, ip and
Write a
.Ar jid_file
file, containing jail identifier, path, hostname, IP and
command used to start the jail.
.It Fl l
Run program in the clean environment.
@ -75,9 +77,9 @@ is imported from the current environment.
The environment variables from the login class capability database for the
target login are also set.
.It Fl s Ar securelevel
Sets
.Va kern.securelevel
to the specified value inside the newly created jail.
Sets the
.Va kern.securelevel
sysctl variable to the specified value inside the newly created jail.
.It Fl u Ar username
The user name from host environment as whom the
.Ar command
@ -141,7 +143,7 @@ See
.Xr devfs 8
for information on how to use devfs rules to limit access to entries
in the per-jail devfs.
A simple devfs ruleset for jails is available as ruleset #4 in
A simple devfs ruleset for jails is available as ruleset #4 in
.Pa /etc/defaults/devfs.rules .
.Pp
In many cases this example would put far more in the jail than needed.
@ -546,14 +548,14 @@ constraints on
.Va kern.securelevel .
.El
.Pp
The read-only
The read-only sysctl variable
.Va security.jail.jailed
variable can be used to determine if a process is running inside a jail (value
can be used to determine if a process is running inside a jail (value
is one) or not (value is zero).
.Pp
The
.Va security.jail.list
MIB entry is read-only and it returns an array of
.Va security.jail.list
MIB entry is read-only and it returns an array of
.Vt "struct xprison"
defined in
.In sys/jail.h .

View File

@ -53,6 +53,7 @@ should run.
The user name from jailed environment as whom the
.Ar command
should run.
.El
.Sh SEE ALSO
.Xr jail_attach 2 ,
.Xr jail 8 ,

View File

@ -243,18 +243,15 @@ To switch back to the default keyboard, use this command.
.Dl kbdcontrol -k /dev/kbd0
.Pp
To allow using both the second USB keyboard and the first AT keyboard
at the same time on console via
at the same time on console via the
.Xr kbdmux 4
driver use the following sequence of commands.
.Pp
.Dl kbdcontrol -K < /dev/console
.Pp
.Dl kbdcontrol -a atkbd0 < /dev/kbdmux0
.Pp
.Dl kbdcontrol -a ukbd1 < /dev/kbdmux0
.Pp
.Dl kbdcontrol -k /dev/kbdmux0 < /dev/console
.Pp
driver, use the following sequence of commands.
.Bd -literal -offset indent
kbdcontrol -K < /dev/console
kbdcontrol -a atkbd0 < /dev/kbdmux0
kbdcontrol -a ukbd1 < /dev/kbdmux0
kbdcontrol -k /dev/kbdmux0 < /dev/console
.Ed
.Sh SEE ALSO
.Xr kbdmap 1 ,
.Xr vidcontrol 1 ,

View File

@ -133,9 +133,7 @@ is typically set up as a symbolic link to
.Nm
which is not usually invoked on its own.
.Sh EXIT STATUS
The
.Nm
exits 0 on success, and \*[Gt]0 if an error occurs.
.Ex -std
.Sh DIAGNOSTICS
The
.Nm

View File

@ -89,14 +89,17 @@ data to the device so that the user program will see it.
.Pp
If the mouse daemon receives the signal
.Dv SIGHUP ,
it will reopen the mouse port and reinitialize itself. Useful if
it will reopen the mouse port and reinitialize itself.
Useful if
the mouse is attached/detached while the system is suspended.
.Pp
If the mouse daemon receives the signal
.Dv SIGUSR1 ,
it will stop passing mouse events. Sending the signal
.Dv SIGUSR1
again will resume passing mouse events. Useful if your typing on a laptop is
it will stop passing mouse events.
Sending the signal
.Dv SIGUSR1
again will resume passing mouse events.
Useful if your typing on a laptop is
interrupted by accidentally touching the mouse pad.
.Pp
The following options are available:
@ -613,11 +616,11 @@ protocol.
To test if the selected protocol type is correct for the given mouse,
enable the mouse pointer in the current virtual console,
.Pp
.Dl vidcontrol -m on
.Dl "vidcontrol -m on"
.Pp
start the mouse daemon in the foreground mode,
.Pp
.Dl moused -f -p Ar _selected_port_ -t Ar _selected_protocol_
.Dl "moused -f -p <selected_port> -t <selected_protocol>"
.Pp
and see if the mouse pointer travels correctly
according to the mouse movement.
@ -668,7 +671,7 @@ utility
UNIX-domain stream socket for X10 MouseRemote events
.El
.Sh EXAMPLES
.Dl moused -p /dev/cuad0 -i type
.Dl "moused -p /dev/cuad0 -i type"
.Pp
Let the
.Nm
@ -676,9 +679,10 @@ utility determine the protocol type of the mouse at the serial port
.Pa /dev/cuad0 .
If successful, the command will print the type, otherwise it will say
.Dq Li unknown .
.Pp
.Dl moused -p /dev/cuad0
.Dl vidcontrol -m on
.Bd -literal -offset indent
moused -p /dev/cuad0
vidcontrol -m on
.Ed
.Pp
If the
.Nm
@ -686,9 +690,10 @@ utility is able to identify the protocol type of the mouse at the specified
port automatically, you can start the daemon without the
.Fl t
option and enable the mouse pointer in the text console as above.
.Pp
.Dl moused -p /dev/mouse -t microsoft
.Dl vidcontrol -m on
.Bd -literal -offset indent
moused -p /dev/mouse -t microsoft
vidcontrol -m on
.Ed
.Pp
Start the mouse daemon on the serial port
.Pa /dev/mouse .
@ -698,27 +703,27 @@ is explicitly specified by the
.Fl t
option.
.Pp
.Dl moused -p /dev/mouse -m 1=3 -m 3=1
.Dl "moused -p /dev/mouse -m 1=3 -m 3=1"
.Pp
Assign the physical button 3 (right button) to the logical button 1
(logical left) and the physical button 1 (left) to the logical
button 3 (logical right).
This will effectively swap the left and right buttons.
.Pp
.Dl moused -p /dev/mouse -t intellimouse -z 4
.Dl "moused -p /dev/mouse -t intellimouse -z 4"
.Pp
Report negative Z axis movement (i.e., mouse wheel) as the button 4 pressed
and positive Z axis movement (i.e., mouse wheel) as the button 5 pressed.
.Pp
If you add
.Pp
.Dl ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused
.Dl "ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused"
.Pp
to your
.Pa /usr/local/etc/sudoers
file, and bind
.Pp
.Dl killall -USR1 moused
.Dl "killall -USR1 moused"
.Pp
to a key in your window manager, you can suspend mouse events on your laptop if
you keep brushing over the mouse pad while typing.

View File

@ -28,7 +28,7 @@
.\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
.\" $FreeBSD$
.\"
.Dd July 03, 2006
.Dd July 3, 2006
.Dt MTREE 8
.Os
.Sh NAME

View File

@ -21,7 +21,7 @@
.\" the suitability of this software for any purpose. It is
.\" provided "as is" without express or implied warranty.
.\"
.Dd June 3, 2004
.Dd July 21, 2006
.Dt NEWSYSLOG.CONF 5
.Os
.Sh NAME

File diff suppressed because it is too large Load Diff

View File

@ -109,7 +109,8 @@ Enable the client to synchronize to broadcast servers.
Specify the name and path of the configuration file, default
.Pa /etc/ntp.conf .
.It Fl d
Specify debugging mode. This option may occur more than once,
Specify debugging mode.
This option may occur more than once,
with each occurrence indicating greater detail of display.
.It Fl D Ar level
Specify debugging level directly.
@ -133,7 +134,8 @@ This option can be used with the
.Fl q
and
.Fl x
options. See the
options.
See the
.Ic tinker
command for other options.
.It Fl k Ar keyfile
@ -149,7 +151,8 @@ This is the same operation as the
.Ic logfile Ar logfile
configuration command.
.It Fl L
Do not listen to virtual IPs. The default is to listen.
Do not listen to virtual IPs.
The default is to listen.
.It Fl m
Enable the client to synchronize to multicast servers at the IPv4 multicast
group address 224.0.1.1.

View File

@ -162,12 +162,12 @@ following.
.It Ic \&? Ar command_keyword
.It Ic help Ar command_keyword
A
.Ic Ql \&?
.Sq Ic \&?
will print a list of all the command
keywords known to this incarnation of
.Nm .
A
.Ic Ql \&?
.Sq Ic \&?
followed by a command keyword will print function and usage
information about the command.
This command is probably a better
@ -592,11 +592,13 @@ configuration file commands of
.It Cm auth
Enables the server to synchronize with unconfigured peers only
if the peer has been correctly authenticated using either public key
or private key cryptography. The default for this flag is enable.
or private key cryptography.
The default for this flag is enable.
.It Cm bclient
Enables the server to listen for a message from a broadcast or
multicast server, as in the multicastclient command with
default address. The default for this flag is disable.
default address.
The default for this flag is disable.
.It Cm calibrate
Enables the calibrate feature for reference clocks.
The default for this flag is disable.
@ -604,14 +606,16 @@ The default for this flag is disable.
Enables the kernel time discipline, if available.
The default for this flag is enable if support is available, otherwise disable.
.It Cm monitor
Enables the monitoring facility. See the
Enables the monitoring facility.
See the
.Xr ntpdc 8 .
program and the monlist command or further information.
The default for this flag is enable.
.It Cm ntp
Enables time and frequency discipline.
In effect, this switch opens and closes the feedback loop,
which is useful for testing. The default for this flag is enable.
which is useful for testing.
The default for this flag is enable.
.It Cm pps
Enables the pulse-per-second (PPS) signal when frequency
and time is disciplined by the precision time kernel modifications.
@ -620,7 +624,8 @@ See the
(available as part of the HTML documentation
provided in
.Pa /usr/share/doc/ntp )
page for further information. The default for this flag is disable.
page for further information.
The default for this flag is disable.
.It Cm stats
Enables the statistics facility.
See the

View File

@ -148,12 +148,12 @@ These are described following.
.It Ic \&? Op Ar command_keyword
.It Ic help Op Ar command_keyword
A
.Ic Ql \&?
.Sq Ic \&?
by itself will print a list of all the command
keywords known to this incarnation of
.Nm .
A
.Ic Ql \&?
.Sq Ic \&?
followed by a command keyword will print function and usage
information about the command.
This command is probably a better
@ -241,7 +241,8 @@ modified using the command line
switch.
.It Ic keyid Ar keyid
This command specifies the key number to be used to authenticate
configuration requests. This must correspond to a key number the server has
configuration requests.
This must correspond to a key number the server has
been configured to use for this purpose.
.It Xo Ic ntpversion
.Cm 1 |
@ -259,7 +260,8 @@ There appear
to be no servers left which demand version 1.
.It Ic passwd
This command prompts for a password (which will not be echoed) which will
be used to authenticate configuration requests. The password must
be used to authenticate configuration requests.
The password must
correspond to the key configured for NTP server for this purpose.
.It Ic quit
Exit
@ -281,8 +283,10 @@ a timeout will be twice the timeout value set.
.El
.Ss Control Message Commands
Each association known to an NTP server has a 16 bit integer association
identifier. NTP control messages which carry peer variables must identify the
peer the values correspond to by including its association ID. An association
identifier.
NTP control messages which carry peer variables must identify the
peer the values correspond to by including its association ID.
An association
ID of 0 is special, and indicates the variables are system variables, whose
names are drawn from a separate name space.
.Pp
@ -430,7 +434,8 @@ register, in octal, and the current estimated delay,
offset and dispersion of the peer, all in milliseconds.
The character at the left margin of each line shows the
synchronization status of the association and is a valuable
diagnostic tool. The encoding and meaning of this character,
diagnostic tool.
The encoding and meaning of this character,
called the tally code, is given later in this page.
.It Ic pstatus Ar assocID
Sends a read status request to the server for the given
@ -466,7 +471,8 @@ system variables, otherwise they are peer variables and the values
returned will be those of the corresponding peer.
Omitting the
variable list will send a request with no data which should induce
the server to return a default display. The
the server to return a default display.
The
encoding and meaning of the variables derived from NTPv3 is given in
RFC-1305; the encoding and meaning of the additional NTPv4 variables are
given later in this page.
@ -512,7 +518,8 @@ The peer is a survivor and a candidate for the combining algorithm.
.It \&#
.Pq selected
The peer is a survivor, but not among the first six peers sorted by
synchronization distance. If the association is ephemeral, it may be
synchronization distance.
If the association is ephemeral, it may be
demobilized to conserve resources.
.It \&*
.Pq sys.peer
@ -521,7 +528,8 @@ system variables.
.It o
.Pq pps.peer
The peer has been declared the system peer and lends its variables to
the system variables. However, the actual system synchronization is derived
the system variables.
However, the actual system synchronization is derived
from a pulse-per-second (PPS) signal, either indirectly via the PPS
reference clock driver or directly via kernel interface.
.El
@ -540,7 +548,8 @@ The
and
.Cm frequency
variables are described in RFC-1305
specification. Additional NTPv4 system variables include the following.
specification.
Additional NTPv4 system variables include the following.
.Bl -tag -width indent
.It version
Everything you might need to know about the software version and generation
@ -550,7 +559,8 @@ The processor and kernel identification string.
.It system
The operating system version and release identifier.
.It state
The state of the clock discipline state machine. The values are described
The state of the clock discipline state machine.
The values are described
in the architecture briefing on the NTP Project page linked from
www.ntp.org.
.It peer
@ -570,7 +580,8 @@ depending on the particular dance:
.Bl -tag -width indent
.It flags
The current flags word bits and message digest algorithm identifier (NID)
in hex format. The high order 16 bits of the four-byte word contain the NID
in hex format.
The high order 16 bits of the four-byte word contain the NID
from the OpenSSL ligrary, while the low-order bits are interpreted as
follows:
.Bl -tag -width indent
@ -593,8 +604,10 @@ function.
.It hostkey
The NTP filestamp of the host key file.
.It cert
A list of certificates held by the host. Each entry includes the subject,
issuer, flags and NTP filestamp in order. The bits are interpreted as
A list of certificates held by the host.
Each entry includes the subject,
issuer, flags and NTP filestamp in order.
The bits are interpreted as
follows:
.Bl -tag -width indent
.It 0x01
@ -647,7 +660,8 @@ Additional NTPv4 system variables include
the following.
.Bl -tag -width indent
.It flash
The flash code for the most recent packet received. The encoding and
The flash code for the most recent packet received.
The encoding and
meaning of these codes is given later in this page.
.It jitter
The estimated time error of the peer clock measured as an exponential
@ -661,8 +675,10 @@ When the NTPv4 daemon is compiled with the OpenSSL software library, additional
peer variables are displayed, including the following:
.Bl -tag -width indent
.It flags
The current flag bits. This word is the server host status word with
additional bits used by the Autokey state machine. See the source code for
The current flag bits.
This word is the server host status word with
additional bits used by the Autokey state machine.
See the source code for
the bit encoding.
.It hostname
The server host name.
@ -680,18 +696,22 @@ The NTP timestamp when the last Autokey key list was generated and signed.
The
.Cm flash
code is a valuable debugging aid displayed in the peer variables
list. It shows the results of the original sanity checks defined in the NTP
specification RFC-1305 and additional ones added in NTPv4. There are 12 tests
list.
It shows the results of the original sanity checks defined in the NTP
specification RFC-1305 and additional ones added in NTPv4.
There are 12 tests
designated
.Sy TEST1
through
.Sy TEST12 .
The tests are performed in a certain order
designed to gain maximum diagnostic information while protecting against
accidental or malicious errors. The
accidental or malicious errors.
The
.Sy flash
variable is initialized to zero as
each packet is received. If after each set of tests one or more bits are set,
each packet is received.
If after each set of tests one or more bits are set,
the packet is discarded.
.Pp
Tests
@ -699,22 +719,27 @@ Tests
through
.Sy TEST3
check the packet timestamps from which the offset and
delay are calculated. If any bits are set, the packet is discarded; otherwise,
delay are calculated.
If any bits are set, the packet is discarded; otherwise,
the packet header variables are saved.
.Sy TEST4
and
.Sy TEST5
are associated with
access control and cryptographic authentication. If any bits are set, the
access control and cryptographic authentication.
If any bits are set, the
packet is discarded immediately with nothing changed.
.Pp
Tests
.Sy TEST6
through
.Sy TEST8
check the health of the server. If any bits are set,
check the health of the server.
If any bits are set,
the packet is discarded; otherwise, the offset and delay relative to the server
are calculated and saved. TEST9 checks the health of the association itself. If
are calculated and saved.
TEST9 checks the health of the association itself.
If
any bits are set, the packet is discarded; otherwise, the saved variables are
passed to the clock filter and mitigation algorithms.
.Pp
@ -738,35 +763,44 @@ bits for each test are defined as follows.
.Bl -tag -width indent
.It 0x001
.Pq TEST1
Duplicate packet. The packet is at best a casual retransmission and at
Duplicate packet.
The packet is at best a casual retransmission and at
worst a malicious replay.
.It 0x002
.Pq TEST2
Bogus packet. The packet is not a reply to a message previously sent. This
Bogus packet.
The packet is not a reply to a message previously sent.
This
can happen when the NTP daemon is restarted and before somebody else
notices.
.It 0x004
.Pq TEST3
Unsynchronized. One or more timestamp fields are invalid. This normally
Unsynchronized.
One or more timestamp fields are invalid.
This normally
happens when the first packet from a peer is received.
.It 0x008
.Pq TEST4
Access is denied. See the
Access is denied.
See the
.Sx Access Control Support
section of
.Xr ntp.conf 5 .
.It 0x010
.Pq TEST5
Cryptographic authentication fails. See the
Cryptographic authentication fails.
See the
.Sx Authentication Options
section of
.Xr ntp.conf 5 .
.It 0x020
.Pq TEST6
The server is unsynchronized. Wind up its clock first.
The server is unsynchronized.
Wind up its clock first.
.It 0x040
.Pq TEST7
The server stratum is at the maximum than 15. It is probably unsynchronized
The server stratum is at the maximum than 15.
It is probably unsynchronized
and its clock needs to be wound up.
.It 0x080
.Pq TEST8
@ -778,21 +812,24 @@ Either the peer delay or dispersion is greater than one second, which is
higly unlikely unless the peer is on Mars.
.It 0x200
.Pq TEST10
The autokey protocol has detected an authentication failure. See the
The autokey protocol has detected an authentication failure.
See the
.Sx Authentication Options
section of
.Xr ntp.conf 5 .
.It 0x400
.Pq TEST11
The autokey protocol has not verified the server or peer is proventic and
has valid public key credentials. See the
has valid public key credentials.
See the
.Sx Authentication Options
section of
.Xr ntp.conf 5 .
.It 0x800
.Pq TEST12
A protocol or configuration error has occurred in the public key algorithms
or a possible intrusion event has been detected. See the
or a possible intrusion event has been detected.
See the
.Sx Authentication Options
section of
.Xr ntp.conf 5 .

View File

@ -25,7 +25,7 @@
.Nd a utility for displaying information on software packages
.Sh SYNOPSIS
.Nm
.Op Fl bcdDEfgGijIkKLmopPqQrRsvVxX
.Op Fl bcdDEfgGiIjkKLmopPqQrRsvVxX
.Op Fl e Ar package
.Op Fl l Ar prefix
.Op Fl t Ar template

View File

@ -145,13 +145,13 @@ is of the form
where
.Ar hostname
does not start with a
.Sq \&.
.Ql \&.
or a
.Sq / ,
.Ql / ,
then
.Nm
will open a network socket to host
.Ar hostname
.Ar hostname
on port
.Ar port .
.Pp
@ -303,7 +303,8 @@ It is
.Sh AUTHORS
.An Joseph Koshy Aq jkoshy@FreeBSD.org
.Sh BUGS
The
.Nm
cannot yet analyse
utility cannot yet analyse
.Xr hwpmc 4
logs generated by non-native architectures.

View File

@ -54,7 +54,7 @@ uncompressed ports tree.
The following options are supported:
.Bl -tag -width "-f conffile"
.It Fl d Ar workdir
Store working files (e.g. downloaded updates) in
Store working files (e.g.\& downloaded updates) in
.Ar workdir .
(default:
.Pa /var/db/portsnap ,
@ -72,7 +72,7 @@ command, update INDEX files, but not the rest of the ports tree.
Expect a public key with given SHA256 hash.
(default: read value from configuration file.)
.It Fl l Ar descfile
Merge the specified local describes file into the INDEX files being
Merge the specified local describes file into the INDEX files being
built.
The
.Ar descfile
@ -95,9 +95,9 @@ For
.Cm extract
command only, operate only on parts of the ports tree starting with
.Ar path .
(e.g.
(e.g.\&
.Nm
.cm extract
.Cm extract
.Ar sysutils/port
would extract sysutils/portsman, sysutils/portsnap,
sysutils/portupgrade, etc.)
@ -206,16 +206,16 @@ of files are not needed by any particular client.
.Sh PRIVACY NOTICE
As an unavoidable part of its operation, a machine running
.Nm
will make its public IP address and the list of files it fetches
will make its public IP address and the list of files it fetches
available to the server from which it fetches updates.
Using these it may be possible to recognize a machine over an extended
period of time, determine when it is updated, and identify which
portions of the FreeBSD ports tree, if any, are being ignored using
Using these it may be possible to recognize a machine over an extended
period of time, determine when it is updated, and identify which
portions of the FreeBSD ports tree, if any, are being ignored using
"REFUSE" directives in
.Pa portsnap.conf .
In addition, the FreeBSD release level is transmitted to the server.
.Pp
Statistical data generated from information collected in this manner
Statistical data generated from information collected in this manner
may be published, but only in aggregate and after anonymizing the
individual systems.
.Sh FILES
@ -228,9 +228,9 @@ Default location where compressed snapshots are stored.
Default location where the ports tree is extracted.
.El
.Sh SEE ALSO
.Xr fetch 1
.Xr fetch 3
.Xr fetch 1 ,
.Xr sha256 1 ,
.Xr fetch 3 ,
.Xr portsnap.conf 5
.Xr sha256 1
.Sh AUTHORS
.An Colin Percival Aq cperciva@FreeBSD.org

View File

@ -338,8 +338,9 @@ Selected messages are forwarded to the
.Xr syslogd 8
program on the named host.
If a port number is added after a colon
.Pq ':'
then that port will be used as the destination port rather than the usual syslog port.
.Pq Ql :\&
then that port will be used as the destination port
rather than the usual syslog port.
.It
A comma separated list of users.
Selected messages are written to those users

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.Dd February 28, 2004
.Dd September 2, 2006
.Dt WATCHDOG 8
.Os
.Sh NAME

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.Dd June 25, 2003
.Dd September 2, 2006
.Dt WATCHDOGD 8
.Os
.Sh NAME

View File

@ -72,7 +72,8 @@ mode.
Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 =
excessive.
.It Va dump_file
Dump file for state information (on SIGUSR1).
Dump file for state information (on
.Dv SIGUSR1 ) .
.It Va ctrl_interface
The pathname of the directory in which
.Xr hostapd 8
@ -185,8 +186,8 @@ seconds.
Rekey GTK when any STA that possesses the current GTK is leaving the
BSS.
.It Va wpa_gmk_rekey
Time interval for rekeying GMK (master key used internally to generate GTKs
(in seconds).
Time interval for rekeying GMK (master key used internally to generate GTKs),
in seconds.
.El
.Sh SEE ALSO
.Xr hostapd 8 ,

View File

@ -51,7 +51,8 @@ utility listens for events generated by an
.Xr ndis 4
wireless network driver and relays them to
.Xr wpa_supplicant 8
for possible processing. The three event types that can occur
for possible processing.
The three event types that can occur
are media connect and disconnect events, such as when a wireless
interface joins or leaves a network, and media-specific events.
In particular,
@ -64,12 +65,14 @@ needs in order to properly associate with WPA2-capable access points.
The
.Nm
daemon works by listening for interface information events via
a routing socket. When it detects an event that was generated by an
a routing socket.
When it detects an event that was generated by an
.Xr ndis 4
interface, it transmits it via UDP packet on the loopback interface,
where
.Xr wpa_supplicant 8
is presumeably listening. The standard
is presumeably listening.
The standard
.Xr wpa_supplicant 8
distribution includes its own version of this utility for use with
.Tn Windows\[rg] .
@ -92,31 +95,35 @@ The
daemon supports the following options:
.Bl -tag -width indent
.It Fl a
Process all events. By default,
Process all events.
By default,
.Nm
will only process and forward media-specific events, which contain
PMKID candidate information, and not bother forwarding connect and
disconnect events, since
.Xr wpa_supplicant 8
normally can determine the current link state on its own. In some
normally can determine the current link state on its own.
In some
cases, the additional connect and disconnect events only confuse it
and make the association and authentication process take longer.
.It Fl d
Run in debug mode. This causes
Run in debug mode.
This causes
.Nm
to run in the foreground and generate any output to the standard
error instead of using the
.Xr syslog 3
facility.
.It Fl v
Run in verbose mode. This causes
Run in verbose mode.
This causes
.Nm
to emit notifications when it receives events.
.El
.Sh SEE ALSO
.Xr ndis 4 ,
.Xr ndisapi 9 ,
.Xr wpa_supplicant 8
.Xr wpa_supplicant 8 ,
.Xr ndisapi 9
.Sh HISTORY
The
.Nm