mdoc(7) police:
Avoid using parenthesis enclosure macros (.Pq and .Po/.Pc) with plain text. Not only this slows down the mdoc(7) processing significantly, but it also has an undesired (in this case) effect of disabling hyphenation within the entire enclosed block.
This commit is contained in:
parent
5de15c0508
commit
c4d9468ea0
@ -160,13 +160,11 @@ The date can be adjusted as many times as required using these flags.
|
||||
Flags are processed in the order given.
|
||||
.Pp
|
||||
When setting values
|
||||
.Pq rather than adjusting them ,
|
||||
(rather than adjusting them),
|
||||
seconds are in the range 0-59, minutes are in the range 0-59, hours are
|
||||
in the range 1-12, month days are in the range 1-31, week days are in the
|
||||
range 0-6
|
||||
.Pq Sun-Sat ,
|
||||
months are in the range 1-12
|
||||
.Pq Jan-Dec
|
||||
range 0-6 (Sun-Sat),
|
||||
months are in the range 1-12 (Jan-Dec)
|
||||
and years are in the range 80-38 or 1980-2038.
|
||||
.Pp
|
||||
If
|
||||
@ -185,11 +183,11 @@ must be used to specify which part of the date is to be adjusted.
|
||||
The week day or month may be specified using a name rather than a
|
||||
number.
|
||||
If a name is used with the plus
|
||||
.Pq or minus
|
||||
(or minus)
|
||||
sign, the date will be put forwards
|
||||
.Pq or backwards
|
||||
(or backwards)
|
||||
to the next
|
||||
.Pq previous
|
||||
(previous)
|
||||
date that matches the given week day or month.
|
||||
This will not adjust the date,
|
||||
if the given week day or month is the same as the current one.
|
||||
@ -207,13 +205,11 @@ the clock goes back at 02:00 to 01:00, using
|
||||
will be necessary to reach October 29, 2:30.
|
||||
.Pp
|
||||
When the date is adjusted to a specific value that doesn't actually exist
|
||||
.Po
|
||||
for example March 26, 1:30 BST 2000 in the Europe/London timezone
|
||||
.Pc ,
|
||||
(for example March 26, 1:30 BST 2000 in the Europe/London timezone),
|
||||
the date will be silently adjusted forwards in units of one hour until it
|
||||
reaches a valid time.
|
||||
When the date is adjusted to a specific value that occurs twice
|
||||
.Pq for example October 29, 1:30 2000 ,
|
||||
(for example October 29, 1:30 2000),
|
||||
the resulting timezone will be set so that the date matches the earlier of
|
||||
the two times.
|
||||
.Pp
|
||||
@ -242,11 +238,11 @@ The canonical representation for setting the date and time is:
|
||||
.Bl -tag -width Ds -compact -offset indent
|
||||
.It Ar cc
|
||||
Century
|
||||
.Pq either 19 or 20
|
||||
(either 19 or 20)
|
||||
prepended to the abbreviated year.
|
||||
.It Ar yy
|
||||
Year in abbreviated form
|
||||
.Pq e.g. 89 for 1989, 06 for 2006 .
|
||||
(e.g. 89 for 1989, 06 for 2006).
|
||||
.It Ar mm
|
||||
Numeric month, a number from 1 to 12.
|
||||
.It Ar dd
|
||||
@ -257,7 +253,7 @@ Hour, a number from 0 to 23.
|
||||
Minutes, a number from 0 to 59.
|
||||
.It Ar ss
|
||||
Seconds, a number from 0 to 61
|
||||
.Pq 59 plus a maximum of two leap seconds .
|
||||
(59 plus a maximum of two leap seconds).
|
||||
.El
|
||||
.Pp
|
||||
Everything but the minutes is optional.
|
||||
|
@ -191,11 +191,11 @@ Flag variables for export when assignments are made to them.
|
||||
.It Fl b Li notify
|
||||
Enable asynchronous notification of background job
|
||||
completion.
|
||||
.Pq UNIMPLEMENTED
|
||||
(UNIMPLEMENTED)
|
||||
.It Fl C Li noclobber
|
||||
Do not overwrite existing files with
|
||||
.Dq Li > .
|
||||
.Pq UNIMPLEMENTED
|
||||
(UNIMPLEMENTED)
|
||||
.It Fl E Li emacs
|
||||
Enable the builtin
|
||||
.Xr emacs 1
|
||||
@ -265,7 +265,7 @@ sh -T -c "trap 'exit 1' 2 ; some-blocking-program"
|
||||
Write a message to standard error when attempting
|
||||
to expand a variable that is not set, and if the
|
||||
shell is not interactive, exit immediately.
|
||||
.Pq UNIMPLEMENTED
|
||||
(UNIMPLEMENTED)
|
||||
.It Fl V Li vi
|
||||
Enable the builtin
|
||||
.Xr vi 1
|
||||
@ -364,8 +364,7 @@ meaning of all characters except dollarsign
|
||||
backquote
|
||||
.Pq Li ` ,
|
||||
and backslash
|
||||
.Po Li \e\"
|
||||
.Pc .
|
||||
.Pq Li \e .
|
||||
The backslash inside double quotes is historically weird.
|
||||
It remains literal unless it precedes the following characters,
|
||||
which it serves to quote:
|
||||
|
@ -62,11 +62,9 @@ signal is not handled specially by this implementation.
|
||||
The
|
||||
.Nm
|
||||
command will accept and honor a non-integer number of specified seconds
|
||||
.Po
|
||||
with a
|
||||
(with a
|
||||
.Ql .\&
|
||||
character as a decimal point
|
||||
.Pc .
|
||||
character as a decimal point).
|
||||
.Bf Sy
|
||||
This is a non-portable extension, and its use will nearly guarantee that
|
||||
a shell script will not execute properly on another system.
|
||||
|
@ -110,7 +110,7 @@ is nonzero.
|
||||
True if
|
||||
.Ar file
|
||||
is a named pipe
|
||||
.Po Tn FIFO Pc .
|
||||
.Pq Tn FIFO .
|
||||
.It Fl r Ar file
|
||||
True if
|
||||
.Ar file
|
||||
|
@ -270,7 +270,7 @@ process as needed. This tends to improve
|
||||
performance, at the cost of reserving the memory used by the
|
||||
.Nm amd
|
||||
process
|
||||
.Pq making it unavailable for other processes .
|
||||
(making it unavailable for other processes).
|
||||
If this behavior is not desired, use the
|
||||
.Fl S
|
||||
option.
|
||||
|
@ -132,7 +132,7 @@ will re-verify the validity of the user's home directory, and
|
||||
reset the cache time-counter. The default value for
|
||||
.Ar cache-interval
|
||||
is 300 seconds
|
||||
.Pq 5 minutes .
|
||||
(5 minutes).
|
||||
.It Fl f
|
||||
Force fast startup. This option tells
|
||||
.Nm
|
||||
@ -146,7 +146,7 @@ to
|
||||
.Ar group .
|
||||
Programs such as
|
||||
.Ic comsat ,
|
||||
.Pq which access the mailboxes of other users
|
||||
(which access the mailboxes of other users)
|
||||
must be setgid
|
||||
.Va HLFS_GID
|
||||
to work properly. The default group is
|
||||
@ -174,7 +174,7 @@ sent to
|
||||
will force it to reload the maps immediately. The default value for
|
||||
.Ar reload-interval
|
||||
is 900 seconds
|
||||
.Pq 15 minutes .
|
||||
(15 minutes).
|
||||
.It Fl l Ar logfile
|
||||
Specify a log file to which
|
||||
.Nm
|
||||
|
@ -112,7 +112,7 @@ specified only in the global section, it is applicable to all regular map
|
||||
sections that follow.
|
||||
.Bl -tag -width 4n
|
||||
.It Ic browsable_dirs Xo
|
||||
.Pq "string, default=no"
|
||||
(string, default=no)
|
||||
.Xc
|
||||
If
|
||||
.Qq yes ,
|
||||
@ -143,14 +143,14 @@ will attempt to mount
|
||||
entry in that map. This is often called a
|
||||
.Em mount storm .
|
||||
.It Ic map_options Xo
|
||||
.Pq "string, default no options"
|
||||
(string, default no options)
|
||||
.Xc
|
||||
This option is the same as specifying map options on the command line to
|
||||
.Nm amd ,
|
||||
such as
|
||||
.Ql cache\&:\&=all .
|
||||
.It Ic map_type Xo
|
||||
.Pq "string, default search all map types"
|
||||
(string, default search all map types)
|
||||
.Xc
|
||||
If specified, amd will initialize the map only for the type given.
|
||||
This is useful to avoid the default map search type used by amd which
|
||||
@ -176,7 +176,7 @@ local password files
|
||||
union maps
|
||||
.El
|
||||
.It Ic mount_type Xo
|
||||
.Pq "string, default=nfs"
|
||||
(string, default=nfs)
|
||||
.Xc
|
||||
All amd mount types default to
|
||||
.Tn NFS .
|
||||
@ -188,10 +188,10 @@ server on the map mount points, for the local host it is running on. If
|
||||
.Qq autofs
|
||||
is specified, amd will be an autofs server for those mount points.
|
||||
.It Ic search_path Xo
|
||||
.Pq "string, default no search path"
|
||||
(string, default no search path)
|
||||
.Xc
|
||||
This provides a
|
||||
.Pq colon-delimited
|
||||
(colon-delimited)
|
||||
search path for file maps. Using a search path, sites can allow for
|
||||
local map customizations and overrides, and can distributed maps in
|
||||
several locations as needed.
|
||||
@ -199,14 +199,14 @@ several locations as needed.
|
||||
.Ss "Parameters applicable to the global section only"
|
||||
.Bl -tag -width 4n
|
||||
.It Ic arch Xo
|
||||
.Pq "string, default to compiled in value"
|
||||
(string, default to compiled in value)
|
||||
.Xc
|
||||
Allows you to override the value of the
|
||||
.Va arch
|
||||
.Nm amd
|
||||
variable.
|
||||
.It Ic auto_dir Xo
|
||||
.Pq "string, default=/a"
|
||||
(string, default=/a)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl a
|
||||
@ -215,7 +215,7 @@ option to
|
||||
This sets the private directory where amd will create sub-directories for its
|
||||
real mount points.
|
||||
.It Ic cache_duration Xo
|
||||
.Pq "numeric, default=300"
|
||||
(numeric, default=300)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl c
|
||||
@ -223,7 +223,7 @@ option to
|
||||
.Nm amd .
|
||||
Sets the duration in seconds that looked up map entries remain in the cache.
|
||||
.It Ic cluster Xo
|
||||
.Pq "string, default no cluster"
|
||||
(string, default no cluster)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl C
|
||||
@ -233,7 +233,7 @@ Specifies the alternate
|
||||
.Tn HP-UX
|
||||
cluster to use.
|
||||
.It Ic debug_options Xo
|
||||
.Pq "string, default no debug options"
|
||||
(string, default no debug options)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl D
|
||||
@ -270,7 +270,7 @@ fork server
|
||||
program trace
|
||||
.It Ic info
|
||||
info service specific debugging
|
||||
.Pq hesiod, nis, etc.
|
||||
(hesiod, nis, etc.)
|
||||
.It mem
|
||||
trace memory allocations
|
||||
.It Ic mtab
|
||||
@ -285,7 +285,7 @@ full debug but no daemon
|
||||
protocol trace
|
||||
.El
|
||||
.It Ic dismount_interval Xo
|
||||
.Pq "numeric, default=120"
|
||||
(numeric, default=120)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl w
|
||||
@ -294,7 +294,7 @@ option to
|
||||
Specify, in seconds, the time between attempts to dismount file systems that
|
||||
have exceeded their cached times.
|
||||
.It Ic fully_qualified_hosts Xo
|
||||
.Pq "string, default=no"
|
||||
(string, default=no)
|
||||
.Xc
|
||||
If
|
||||
.Qq yes ,
|
||||
@ -309,11 +309,11 @@ is used, requiring that
|
||||
.Va ${domain}
|
||||
not be null.
|
||||
.It Ic hesiod_base Xo
|
||||
.Pq "string, default=automount"
|
||||
(string, default=automount)
|
||||
.Xc
|
||||
Specify the base name for hesiod maps.
|
||||
.It Ic karch Xo
|
||||
.Pq "string, default to karch of the system"
|
||||
(string, default to karch of the system)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl k
|
||||
@ -321,14 +321,14 @@ option to
|
||||
.Nm amd .
|
||||
Allows you to override the kernel-architecture of your system. Useful for
|
||||
example on Sun
|
||||
.Pq Sparc
|
||||
(Sparc)
|
||||
machines, where you can build one
|
||||
.Nm amd
|
||||
binary and run it on multiple machines, yet you want each one to get the
|
||||
correct
|
||||
.Va karch
|
||||
variable set
|
||||
.Pq for example, sun4c, sun4m, sun4u, etc.
|
||||
(for example, sun4c, sun4m, sun4u, etc.)
|
||||
Note that if not
|
||||
specified,
|
||||
.Nm amd
|
||||
@ -336,23 +336,23 @@ will use
|
||||
.Xr uname 3
|
||||
to figure out the kernel architecture of the machine.
|
||||
.It Ic ldap_base Xo
|
||||
.Pq "string, default not set"
|
||||
(string, default not set)
|
||||
.Xc
|
||||
Specify the base name for LDAP.
|
||||
.It Ic ldap_cache_maxmem Xo
|
||||
.Pq "numeric, default=131072"
|
||||
(numeric, default=131072)
|
||||
.Xc
|
||||
Specify the maximum memory amd should use to cache LDAP entries.
|
||||
.It Ic ldap_cache_seconds Xo
|
||||
.Pq "numeric, default=0"
|
||||
(numeric, default=0)
|
||||
.Xc
|
||||
Specify the number of seconds to keep entries in the cache.
|
||||
.It Ic ldap_hostports Xo
|
||||
.Pq "string, default not set"
|
||||
(string, default not set)
|
||||
.Xc
|
||||
Specify LDAP-specific values such as country and organization.
|
||||
.It Ic local_domain Xo
|
||||
.Pq "string, default no sub-domain"
|
||||
(string, default no sub-domain)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl d
|
||||
@ -362,7 +362,7 @@ Specify the local domain name. If this option is not given the domain name is
|
||||
determined from the hostname by removing the first component of the
|
||||
fully-qualified host name.
|
||||
.It Ic log_file Xo
|
||||
.Pq "string, default=/dev/stderr"
|
||||
(string, default=/dev/stderr)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl l
|
||||
@ -394,9 +394,9 @@ will log messages via
|
||||
using the
|
||||
.Ev LOG_LOCAL7
|
||||
facility
|
||||
.Pq if it exists on the system .
|
||||
(if it exists on the system).
|
||||
.It Ic log_options Xo
|
||||
.Pq "string, default no logging options"
|
||||
(string, default no logging options)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl x
|
||||
@ -437,7 +437,7 @@ warnings
|
||||
warnings
|
||||
.El
|
||||
.It Ic nfs_retransmit_counter Xo
|
||||
.Pq "numeric, default=110"
|
||||
(numeric, default=110)
|
||||
.Xc
|
||||
Same as the
|
||||
.Ic counter
|
||||
@ -447,7 +447,7 @@ option to
|
||||
.Nm amd .
|
||||
Specifies the retransmit counter's value in tenths of seconds.
|
||||
.It Ic nfs_retry_interval Xo
|
||||
.Pq "numeric, default=8"
|
||||
(numeric, default=8)
|
||||
.Xc
|
||||
Same as the
|
||||
.Ic interval
|
||||
@ -457,7 +457,7 @@ option to
|
||||
.Nm amd .
|
||||
Specifies the interval in tenths of seconds, between NFS/RPC/UDP retries.
|
||||
.It Ic nis_domain Xo
|
||||
.Pq "string, default to local NIS domain name"
|
||||
(string, default to local NIS domain name)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl y
|
||||
@ -471,7 +471,7 @@ maps. The default is the system domain name. This option is ignored if
|
||||
.Tn NIS
|
||||
support is not available.
|
||||
.It Ic normalize_hostnames Xo
|
||||
.Pq "boolean, default=no"
|
||||
(boolean, default=no)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl n
|
||||
@ -486,7 +486,7 @@ to translate aliases into
|
||||
.Qq official
|
||||
names.
|
||||
.It Ic os Xo
|
||||
.Pq "string, default to compiled in value"
|
||||
(string, default to compiled in value)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl O
|
||||
@ -500,7 +500,7 @@ you can override it to
|
||||
.Dq sos5 ,
|
||||
and use older maps which were written with the latter in mind.
|
||||
.It Ic osver Xo
|
||||
.Pq "string, default to compiled in value"
|
||||
(string, default to compiled in value)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl o
|
||||
@ -514,7 +514,7 @@ you can override it to
|
||||
.Dq 5.5.1 ,
|
||||
and use older maps that were written with the latter in mind.
|
||||
.It Ic pid_file Xo
|
||||
.Pq "string, default=/dev/stdout"
|
||||
(string, default=/dev/stdout)
|
||||
.Xc
|
||||
Specify a file to store the process ID of the running daemon into. If not
|
||||
specified,
|
||||
@ -529,7 +529,7 @@ This file is used only if the
|
||||
.Ar print_pid
|
||||
option is on.
|
||||
.It Ic plock Xo
|
||||
.Pq "boolean, default=yes"
|
||||
(boolean, default=yes)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl S
|
||||
@ -553,9 +553,9 @@ process as needed. This improves
|
||||
performance, at the cost of reserving the memory used by the
|
||||
.Nm amd
|
||||
process
|
||||
.Pq making it unavailable for other processes .
|
||||
(making it unavailable for other processes).
|
||||
.It Ic portmap_program Xo
|
||||
.Pq "numeric, default=300019"
|
||||
(numeric, default=300019)
|
||||
.Xc
|
||||
Specify an alternate Port-mapper RPC program number, other than the official
|
||||
number. This is useful when running multiple
|
||||
@ -579,7 +579,7 @@ can fully control any number of
|
||||
.Nm amd
|
||||
processes running on the same host.
|
||||
.It Ic print_pid Xo
|
||||
.Pq "boolean, default=no"
|
||||
(boolean, default=no)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl p
|
||||
@ -590,7 +590,7 @@ If
|
||||
.Nm amd
|
||||
will print its process ID upon starting.
|
||||
.It Ic print_version Xo
|
||||
.Pq "boolean, default=no"
|
||||
(boolean, default=no)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl v
|
||||
@ -604,7 +604,7 @@ continues to run. If
|
||||
will print its version information string, which includes some configuration
|
||||
and compilation values.
|
||||
.It Ic restart_mounts Xo
|
||||
.Pq "boolean, default=no"
|
||||
(boolean, default=no)
|
||||
.Xc
|
||||
Same as the
|
||||
.Fl r
|
||||
@ -618,7 +618,7 @@ mounted. Whenever one of these would have been auto-mounted,
|
||||
.Nm amd
|
||||
inherits it.
|
||||
.It Ic selectors_on_default Xo
|
||||
.Pq "boolean, default=no"
|
||||
(boolean, default=no)
|
||||
.Xc
|
||||
If
|
||||
.Dq yes ,
|
||||
@ -638,12 +638,12 @@ follows:
|
||||
wire!=slip-net;opts:=intr,rsize=8192,wsize=8192
|
||||
.Ed
|
||||
.It Ic show_statfs_entries Xo
|
||||
.Pq "boolean, default=no"
|
||||
(boolean, default=no)
|
||||
.Xc
|
||||
If
|
||||
.Dq yes ,
|
||||
then all maps which are browsable will also show the number of entries
|
||||
.Pq keys
|
||||
(keys)
|
||||
they have when
|
||||
.Qq df
|
||||
runs.
|
||||
@ -651,7 +651,7 @@ runs.
|
||||
.Xr statfs 2
|
||||
system call.)
|
||||
.It Ic unmount_on_exit Xo
|
||||
.Pq "boolean, default=no"
|
||||
(boolean, default=no)
|
||||
.Xc
|
||||
If
|
||||
.Dq yes ,
|
||||
@ -660,7 +660,7 @@ then
|
||||
will attempt to unmount all file systems which it knows about. Normally
|
||||
.Nm amd
|
||||
leaves all
|
||||
.Pq esp.\&
|
||||
(esp.\&)
|
||||
.Tn NFS
|
||||
mounted filesystems intact. Note that
|
||||
.Nm amd
|
||||
@ -673,11 +673,11 @@ flag are used.
|
||||
.Ss "Parameters applicable to regular map sections"
|
||||
.Bl -tag -width 4n
|
||||
.It Ic map_name Xo
|
||||
.Pq "string, must be specified"
|
||||
(string, must be specified)
|
||||
.Xc
|
||||
Name of the map where the keys are located.
|
||||
.It Ic tag Xo
|
||||
.Pq "string, default no tag"
|
||||
(string, default no tag)
|
||||
.Xc
|
||||
Each map entry in the configuration file can be tagged. If no tag is
|
||||
specified, that map section will always be processed by
|
||||
|
@ -74,7 +74,7 @@ Similar to
|
||||
.Fl p ,
|
||||
but use the RTS line of
|
||||
.Ar device
|
||||
.Pq which must by a tty device
|
||||
(which must by a tty device)
|
||||
in order to emit the morse code.
|
||||
.It Fl e
|
||||
echo each character before it is sent, used together with either
|
||||
|
@ -174,7 +174,7 @@ the library search path.
|
||||
.It Fl M
|
||||
Produce output about the mapping of segments of the input files and the
|
||||
values assigned to
|
||||
.Pq global
|
||||
(global)
|
||||
symbols in the output file.
|
||||
.It Fl N
|
||||
Produce a
|
||||
@ -227,7 +227,7 @@ to be marked as undefined. Useful to force loading of an archive member
|
||||
in the absence of any other references to that member.
|
||||
.It Fl V Ar version
|
||||
Put the given version number into the output shared library
|
||||
.Pq if one is created .
|
||||
(if one is created).
|
||||
Useful to make shared libraries compatible with other operating
|
||||
systems. E.g., SunOS 4.x libraries use version number 3. Defaults to 8.
|
||||
.It Fl X
|
||||
|
@ -174,7 +174,7 @@ the library search path.
|
||||
.It Fl M
|
||||
Produce output about the mapping of segments of the input files and the
|
||||
values assigned to
|
||||
.Pq global
|
||||
(global)
|
||||
symbols in the output file.
|
||||
.It Fl N
|
||||
Produce a
|
||||
@ -226,7 +226,7 @@ to be marked as undefined. Useful to force loading of an archive member
|
||||
in the absence of any other references to that member.
|
||||
.It Fl V Ar version
|
||||
Put the given version number into the output shared library
|
||||
.Pq if one is created .
|
||||
(if one is created).
|
||||
Useful to make shared libraries compatible with other operating
|
||||
systems. E.g., SunOS 4.x libraries use version number 3. Defaults to 8.
|
||||
.It Fl X
|
||||
|
@ -49,7 +49,8 @@ database.
|
||||
can read gzip'ed manpages.
|
||||
.Ar Directory
|
||||
names a directory containing manpage subdirectories
|
||||
.Pq named Pa man.+ .
|
||||
(named
|
||||
.Pa man.+ ) .
|
||||
Colons are treated as spaces, hence
|
||||
.Ic makewhatis $MANPATH
|
||||
or
|
||||
@ -66,7 +67,8 @@ does not check if old entries are valid.
|
||||
Print options and exit.
|
||||
.It Fl i , Fl indent Ar column
|
||||
Justify description strings to
|
||||
.Ar column Pq default 24 .
|
||||
.Ar column
|
||||
(default 24).
|
||||
.It Fl L , Fl locale
|
||||
Sense locale environment variables for possible localized man subdirectories
|
||||
and process this entries only.
|
||||
@ -82,7 +84,7 @@ instead of
|
||||
.Pa dirname/whatis Ns .
|
||||
.It Fl v , Fl verbose
|
||||
Issue more warnings
|
||||
.Pq to stderr .
|
||||
(to stderr).
|
||||
For every parsed man page write a single char:
|
||||
.Ql .\&
|
||||
for an uncompressed page,
|
||||
|
@ -170,12 +170,10 @@ Mainly useful for debugging when the log file is viewed continuously with
|
||||
.It Dv PKT_ALIAS_DENY_INCOMING
|
||||
If this mode bit is set, all incoming packets associated with new TCP
|
||||
connections or new UDP transactions will be marked for being ignored
|
||||
.Po
|
||||
.Fn PacketAliasIn
|
||||
.Fn ( PacketAliasIn
|
||||
returns
|
||||
.Dv PKT_ALIAS_IGNORED
|
||||
code
|
||||
.Pc
|
||||
code)
|
||||
by the calling program.
|
||||
Response packets to connections or transactions initiated from the packet
|
||||
aliasing host or local network will be unaffected.
|
||||
|
@ -544,7 +544,7 @@ The fifth and sixth level names are as follows:
|
||||
.El
|
||||
.It Li PF_INET
|
||||
Get or set various global information about the IPv4
|
||||
.Pq Internet Protocol version 4 .
|
||||
(Internet Protocol version 4).
|
||||
The third level name is the protocol.
|
||||
The fourth level name is the variable name.
|
||||
The currently defined protocols and names are:
|
||||
@ -585,7 +585,7 @@ For variables net.inet.*.ipsec, please refer to
|
||||
.El
|
||||
.It Li PF_INET6
|
||||
Get or set various global information about the IPv6
|
||||
.Pq Internet Protocol version 6 .
|
||||
(Internet Protocol version 6).
|
||||
The third level name is the protocol.
|
||||
The fourth level name is the variable name.
|
||||
.Pp
|
||||
|
@ -66,9 +66,7 @@ Upon successful completion,
|
||||
.Fn time
|
||||
returns the value of time.
|
||||
Otherwise a value of
|
||||
.Po
|
||||
.Po Fa time_t Pc \-1
|
||||
.Pc
|
||||
.Pq Po Vt time_t Pc \-1
|
||||
is returned and the global variable
|
||||
.Va errno
|
||||
is set to indicate the error.
|
||||
|
@ -77,7 +77,8 @@ Multibyte characters are used for input and output
|
||||
and code each basic element as a sequence of C
|
||||
.Va char Ns s .
|
||||
Individual basic elements may map into one or more
|
||||
.Pq up to Dv MB_CHAR_MAX
|
||||
(up to
|
||||
.Dv MB_CHAR_MAX )
|
||||
bytes in a multibyte character.
|
||||
.Pp
|
||||
The current locale
|
||||
@ -128,10 +129,10 @@ categories.
|
||||
.Pp
|
||||
For convenience in processing,
|
||||
the wide character with value 0
|
||||
.Pq the null wide character
|
||||
(the null wide character)
|
||||
is recognized as the wide character string terminator,
|
||||
and the character with value 0
|
||||
.Pq the null byte
|
||||
(the null byte)
|
||||
is recognized as the multibyte character string terminator.
|
||||
Null bytes are not permitted within multibyte characters.
|
||||
.Pp
|
||||
|
@ -105,13 +105,16 @@ addresses in the specified family:
|
||||
.Bl -tag -width AF_INETxxxx -compact
|
||||
.It Dv AF_INET
|
||||
.Li struct in_addr
|
||||
.Pq in Aq Pa netinet/in.h
|
||||
(in
|
||||
.Aq Pa netinet/in.h )
|
||||
.It Dv AF_LINK
|
||||
.Li struct sockaddr_dl
|
||||
.Pq in Aq Pa net/if_dl.h
|
||||
(in
|
||||
.Aq Pa net/if_dl.h )
|
||||
.\" .It Dv AF_INET6
|
||||
.\" .Li struct in6_addr
|
||||
.\" .Pq in Aq Pa netinet6/in6.h
|
||||
.\" (in
|
||||
.\" .Aq Pa netinet6/in6.h )
|
||||
.El
|
||||
.Sh RETURN VALUES
|
||||
The
|
||||
|
@ -107,9 +107,7 @@ A
|
||||
.Pf non Dv -NULL
|
||||
.Fa nodename
|
||||
string can be either a node name or a numeric host address string
|
||||
.Po
|
||||
i.e., a dotted-decimal IPv4 address or an IPv6 hex address
|
||||
.Pc .
|
||||
(i.e., a dotted-decimal IPv4 address or an IPv6 hex address).
|
||||
A
|
||||
.Pf non Dv -NULL
|
||||
.Fa servname
|
||||
@ -226,13 +224,13 @@ member of the
|
||||
structure, then the returned socket address structure will be ready for a
|
||||
call to
|
||||
.Fn connect
|
||||
.Pq for a connection-oriented protocol
|
||||
(for a connection-oriented protocol)
|
||||
or either
|
||||
.Fn connect ,
|
||||
.Fn sendto ,
|
||||
or
|
||||
.Fn sendmsg
|
||||
.Pq for a connectionless protocol .
|
||||
(for a connectionless protocol).
|
||||
In this case, if the
|
||||
.Fa nodename
|
||||
argument is a
|
||||
@ -379,10 +377,8 @@ and allows cut-and-paste input of scoped addresses.
|
||||
At the moment the code supports only link-local addresses in this format.
|
||||
The scope identifier is hardcoded to name of hardware interface associated
|
||||
with the link,
|
||||
.Po
|
||||
such as
|
||||
.Li ne0
|
||||
.Pc .
|
||||
(such as
|
||||
.Li ne0 ) .
|
||||
For example,
|
||||
.Dq Li fe80::1%ne0 ,
|
||||
which means
|
||||
@ -615,7 +611,7 @@ function is defined in
|
||||
.St -p1003.1g-2000 ,
|
||||
and documented in
|
||||
.Dq Basic Socket Interface Extensions for IPv6
|
||||
.Pq RFC2553 .
|
||||
(RFC2553).
|
||||
.\"
|
||||
.Sh BUGS
|
||||
The current implementation is not thread-safe.
|
||||
|
@ -114,11 +114,13 @@ field references address family specific data. For
|
||||
.Dv AF_LINK
|
||||
addresses it contains a pointer to the
|
||||
.Fa struct if_data
|
||||
.Pq as defined in include file Aq Pa net/if.h
|
||||
(as defined in include file
|
||||
.Aq Pa net/if.h )
|
||||
which contains various interface attributes and statistics.
|
||||
For all other address families, it contains a pointer to the
|
||||
.Fa struct ifa_data
|
||||
.Pq as defined in include file Aq Pa net/if.h
|
||||
(as defined in include file
|
||||
.Aq Pa net/if.h )
|
||||
which contains per-address interface statistics.
|
||||
.Pp
|
||||
The data returned by
|
||||
|
@ -75,12 +75,10 @@ and
|
||||
for specifying address family and operation mode.
|
||||
The additional arguments allow programmer to get address for a nodename,
|
||||
for specific address family
|
||||
.Po
|
||||
such as
|
||||
(such as
|
||||
.Dv AF_INET
|
||||
or
|
||||
.Dv AF_INET6
|
||||
.Pc .
|
||||
.Dv AF_INET6 ) .
|
||||
The functions also require an additional pointer argument,
|
||||
.Ar error_num
|
||||
to return the appropriate error code,
|
||||
@ -97,9 +95,7 @@ the
|
||||
.Ar name
|
||||
argument can be either a node name or a numeric address
|
||||
string
|
||||
.Po
|
||||
i.e., a dotted-decimal IPv4 address or an IPv6 hex address
|
||||
.Pc .
|
||||
(i.e., a dotted-decimal IPv4 address or an IPv6 hex address).
|
||||
The
|
||||
.Ar af
|
||||
argument specifies the address family, either
|
||||
@ -112,7 +108,7 @@ argument specifies the types of addresses that are searched for,
|
||||
and the types of addresses that are returned.
|
||||
We note that a special flags value of
|
||||
.Dv AI_DEFAULT
|
||||
.Pq defined below
|
||||
(defined below)
|
||||
should handle most applications.
|
||||
That is, porting simple applications to use IPv6 replaces the call
|
||||
.Bd -literal -offset
|
||||
@ -192,10 +188,8 @@ That is, if no
|
||||
records are found then a query is made for
|
||||
.Li A
|
||||
records and any found are returned as IPv4-mapped IPv6 addresses
|
||||
.Po
|
||||
.Li h_length
|
||||
will be 16
|
||||
.Pc .
|
||||
.Li ( h_length
|
||||
will be 16).
|
||||
The
|
||||
.Dv AI_V4MAPPED
|
||||
flag is ignored unless
|
||||
@ -284,9 +278,7 @@ We noted that the
|
||||
function must allow the
|
||||
.Ar name
|
||||
argument to be either a node name or a literal address string
|
||||
.Po
|
||||
i.e., a dotted-decimal IPv4 address or an IPv6 hex address
|
||||
.Pc .
|
||||
(i.e., a dotted-decimal IPv4 address or an IPv6 hex address).
|
||||
This saves applications from having to call
|
||||
.Xr inet_pton 3
|
||||
to handle literal address strings.
|
||||
@ -329,15 +321,11 @@ is a copy of the
|
||||
argument,
|
||||
.Li h_length
|
||||
is either 4
|
||||
.Po
|
||||
for
|
||||
.Dv AF_INET
|
||||
.Pc
|
||||
(for
|
||||
.Dv AF_INET )
|
||||
or 16
|
||||
.Po
|
||||
for
|
||||
.Dv AF_INET6
|
||||
.Pc ,
|
||||
(for
|
||||
.Dv AF_INET6 ) ,
|
||||
.Li h_addr_list[0]
|
||||
is a pointer to the 4-byte or 16-byte binary address,
|
||||
and
|
||||
@ -453,7 +441,7 @@ and
|
||||
.Fn getipnodebyaddr
|
||||
are documented in
|
||||
.Dq Basic Socket Interface Extensions for IPv6
|
||||
.Pq RFC2553 .
|
||||
(RFC2553).
|
||||
.\"
|
||||
.Sh BUGS
|
||||
.Fn getipnodebyname
|
||||
|
@ -122,9 +122,7 @@ The first value is actually defined as the constant
|
||||
in recent versions of BIND's
|
||||
.Aq Pa arpa/nameser.h
|
||||
header
|
||||
.Po
|
||||
older versions of BIND define this constant to be 256
|
||||
.Pc
|
||||
(older versions of BIND define this constant to be 256)
|
||||
and the second is a guess based on the services listed in the current
|
||||
Assigned Numbers RFC.
|
||||
.Pp
|
||||
@ -143,12 +141,10 @@ bit
|
||||
.Dv NI_NUMERICHOST
|
||||
is set, or if the host's name cannot be located in the DNS,
|
||||
the numeric form of the host's address is returned instead of its name
|
||||
.Po
|
||||
e.g., by calling
|
||||
(e.g., by calling
|
||||
.Fn inet_ntop
|
||||
instead of
|
||||
.Fn getnodebyaddr
|
||||
.Pc .
|
||||
.Fn getnodebyaddr ) .
|
||||
If the
|
||||
.Fa flag
|
||||
bit
|
||||
@ -158,7 +154,7 @@ is set, an error is returned if the host's name cannot be located in the DNS.
|
||||
If the flag bit
|
||||
.Dv NI_NUMERICSERV
|
||||
is set, the numeric form of the service address is returned
|
||||
.Pq e.g., its port number
|
||||
(e.g., its port number)
|
||||
instead of its name.
|
||||
The two
|
||||
.Dv NI_NUMERICxxx
|
||||
@ -302,7 +298,7 @@ function is defined in
|
||||
.St -p1003.1g-2000 ,
|
||||
and documented in
|
||||
.Dq Basic Socket Interface Extensions for IPv6
|
||||
.Pq RFC2553 .
|
||||
(RFC2553).
|
||||
.\"
|
||||
.Sh BUGS
|
||||
The current implementation is not thread-safe.
|
||||
|
@ -139,4 +139,4 @@ R. Gilligan, S. Thomson, J. Bound, and W. Stevens,
|
||||
The implementation first appeared in WIDE Hydrangea IPv6 protocol stack kit.
|
||||
.Sh STANDARDS
|
||||
These functions are defined in ``Basic Socket Interface Extensions for IPv6''
|
||||
.Pq RFC2533 .
|
||||
(RFC2533).
|
||||
|
@ -102,7 +102,7 @@ is the number of options to be stored in the object.
|
||||
This is of little consequence, since it is assumed that most
|
||||
Hop-by-Hop option headers and Destination option headers carry only
|
||||
one option
|
||||
.Pq appendix B of [RFC-2460] .
|
||||
(appendix B of [RFC-2460]).
|
||||
.\"
|
||||
.Ss inet6_option_init
|
||||
.Fn inet6_option_init
|
||||
@ -171,7 +171,7 @@ field is immediately followed by the 8-bit option data length field,
|
||||
which is then followed immediately by the option data.
|
||||
The caller
|
||||
initializes these three fields
|
||||
.Pq the type-length-value, or TLV
|
||||
(the type-length-value, or TLV)
|
||||
before calling this function.
|
||||
.Pp
|
||||
The option type must have a value from
|
||||
@ -439,7 +439,7 @@ The implementation first appeared in KAME advanced networking kit.
|
||||
The functions
|
||||
are documented in
|
||||
.Dq Advanced Sockets API for IPv6
|
||||
.Pq RFC2292 .
|
||||
(RFC2292).
|
||||
.\"
|
||||
.Sh BUGS
|
||||
The text was shamelessly copied from RFC2292.
|
||||
|
@ -106,7 +106,7 @@ header of the specified
|
||||
.Fa type
|
||||
containing the specified number of
|
||||
.Fa segments
|
||||
.Pq addresses .
|
||||
(addresses).
|
||||
For an IPv6 Type 0 Routing header, the number
|
||||
of segments must be between 1 and 23, inclusive. The return value
|
||||
includes the size of the cmsghdr structure that precedes the Routing
|
||||
@ -218,14 +218,14 @@ and writes a new Routing
|
||||
header that sends datagrams along the reverse of that route.
|
||||
Both
|
||||
arguments are allowed to point to the same buffer
|
||||
.Pq that is, the reversal can occur in place .
|
||||
(that is, the reversal can occur in place).
|
||||
.Pp
|
||||
The return value of the function is 0 on success, or -1 upon an
|
||||
error.
|
||||
.\"
|
||||
.Ss inet6_rthdr_segments
|
||||
This function returns the number of segments
|
||||
.Pq addresses
|
||||
(addresses)
|
||||
contained in
|
||||
the Routing header described by
|
||||
.Fa cmsg .
|
||||
@ -314,7 +314,7 @@ The implementation first appeared in KAME advanced networking kit.
|
||||
The functions
|
||||
are documented in
|
||||
.Dq Advanced Sockets API for IPv6
|
||||
.Pq RFC2292 .
|
||||
(RFC2292).
|
||||
.\"
|
||||
.Sh BUGS
|
||||
The text was shamelessly copied from RFC2292.
|
||||
|
@ -533,12 +533,10 @@ The endpoint of one range cannot begin another.
|
||||
the limit on repetition counts in bounded repetitions, is 255.
|
||||
.Pp
|
||||
A repetition operator
|
||||
.Po
|
||||
.Ql ?\& ,
|
||||
.Ql ( ?\& ,
|
||||
.Ql *\& ,
|
||||
.Ql +\& ,
|
||||
or bounds
|
||||
.Pc
|
||||
or bounds)
|
||||
cannot follow another
|
||||
repetition operator.
|
||||
A repetition operator cannot begin an expression or subexpression
|
||||
|
@ -61,12 +61,10 @@ stream (in reverse order).
|
||||
A successful intervening call,
|
||||
using the same stream,
|
||||
to one of the file positioning functions
|
||||
.Po
|
||||
.Xr fseek 3 ,
|
||||
.Xr ( fseek 3 ,
|
||||
.Xr fsetpos 3 ,
|
||||
or
|
||||
.Xr rewind 3
|
||||
.Pc
|
||||
.Xr rewind 3 )
|
||||
will discard the pushed back characters.
|
||||
.Pp
|
||||
One character of push-back is guaranteed,
|
||||
|
@ -115,10 +115,10 @@ without
|
||||
.Fa %p
|
||||
will produce undefined results.
|
||||
Note that 12AM
|
||||
.Pq ante meridiem
|
||||
(ante meridiem)
|
||||
is taken as midnight
|
||||
and 12PM
|
||||
.Pq post meridiem
|
||||
(post meridiem)
|
||||
is taken as noon.
|
||||
.Pp
|
||||
The
|
||||
|
@ -87,9 +87,12 @@ this is a variant of
|
||||
If the user has super-user privileges,
|
||||
the signal is sent to all processes excluding
|
||||
system processes
|
||||
.Pq with Dv P_SYSTEM flag set ,
|
||||
(with
|
||||
.Dv P_SYSTEM
|
||||
flag set),
|
||||
process with ID 1
|
||||
.Pq usually Xr init 8 ,
|
||||
(usually
|
||||
.Xr init 8 ) ,
|
||||
and the process sending the signal.
|
||||
If the user is not the super user, the signal is sent to all processes
|
||||
with the same uid as the user excluding the process sending the signal.
|
||||
|
@ -23,10 +23,8 @@ process) to control another (the
|
||||
.Em traced
|
||||
process). Most of the time, the traced process runs normally, but when
|
||||
it receives a signal
|
||||
.Po
|
||||
see
|
||||
.Xr sigaction 2
|
||||
.Pc ,
|
||||
(see
|
||||
.Xr sigaction 2 ) ,
|
||||
it stops. The tracing process is expected to notice this via
|
||||
.Xr wait 2
|
||||
or the delivery of a
|
||||
@ -58,10 +56,8 @@ traced process stops, it cannot be made to continue except via
|
||||
When a process has used this request and calls
|
||||
.Xr execve 2
|
||||
or any of the routines built on it
|
||||
.Po
|
||||
such as
|
||||
.Xr execv 3
|
||||
.Pc ,
|
||||
(such as
|
||||
.Xr execv 3 ) ,
|
||||
it will stop before executing the first instruction of the new image.
|
||||
Also, any setuid or setgid bits on the executable being executed will
|
||||
be ignored.
|
||||
@ -136,9 +132,7 @@ The traced process continues execution.
|
||||
.Fa addr
|
||||
is an address specifying the place where execution is to be resumed (a
|
||||
new value for the program counter), or
|
||||
.Po
|
||||
.Vt caddr_t
|
||||
.Pc Ns 1
|
||||
.Po Vt caddr_t Pc Ns 1
|
||||
to indicate that execution is to pick up where it left off.
|
||||
.Fa data
|
||||
provides a signal number to be delivered to the traced process as it
|
||||
|
@ -186,7 +186,8 @@ doesn't necessarily block until the data has been transferred, it
|
||||
is possible to transfer an open file descriptor across an
|
||||
.Dv AF_UNIX
|
||||
domain socket
|
||||
.Pq see Xr recv 2 ,
|
||||
(see
|
||||
.Xr recv 2 ) ,
|
||||
then
|
||||
.Fn close
|
||||
it before it has actually been sent, the result being that the receiver
|
||||
|
@ -73,11 +73,9 @@ returns the address of an array in which the name has been stored.
|
||||
.Pp
|
||||
If the name associated with the effective UID of the current process
|
||||
could not be found, either a null pointer will be returned, or
|
||||
.Po
|
||||
if
|
||||
(if
|
||||
.Fa s
|
||||
is non-NULL
|
||||
.Pc
|
||||
is non-NULL)
|
||||
the buffer
|
||||
.Fa s
|
||||
will be filled with a null string.
|
||||
|
@ -207,9 +207,7 @@ The colon between
|
||||
and the command,
|
||||
.Ar command ,
|
||||
will be replaced with a NUL
|
||||
.Po
|
||||
.Dq \e0
|
||||
.Pc .
|
||||
.Pq Dq \e0 .
|
||||
.It Fn el_set
|
||||
Set
|
||||
.Nm
|
||||
|
@ -156,10 +156,8 @@ can contain control characters of the form
|
||||
.Sm off
|
||||
.Sq No ^ Ar character
|
||||
.Sm on
|
||||
.Po
|
||||
e.g.
|
||||
.Sq ^A
|
||||
.Pc ,
|
||||
(e.g.
|
||||
.Sq ^A ) ,
|
||||
and the following backslashed escape sequences:
|
||||
.Pp
|
||||
.Bl -tag -compact -offset indent -width 4n
|
||||
@ -261,13 +259,9 @@ set of tty modes respectively; defaulting to
|
||||
Without other arguments,
|
||||
.Ic setty
|
||||
lists the modes in the chosen set which are fixed on
|
||||
.Po
|
||||
.Sq +mode
|
||||
.Pc
|
||||
.Pq Sq +mode
|
||||
or off
|
||||
.Po
|
||||
.Sq -mode
|
||||
.Pc .
|
||||
.Pq Sq -mode .
|
||||
.Fl a
|
||||
lists all tty modes in the chosen set regardless of the setting.
|
||||
With
|
||||
|
@ -110,7 +110,7 @@ means to consult to SPD defined by
|
||||
.It Ar direction Li bypass
|
||||
.Li bypass
|
||||
means to be bypassed the IPsec processing.
|
||||
.Pq packet will be transmitted in clear .
|
||||
(packet will be transmitted in clear).
|
||||
This is for privileged socket.
|
||||
.It Xo
|
||||
.Ar direction
|
||||
@ -167,7 +167,7 @@ is this node
|
||||
and
|
||||
.Ar src
|
||||
is the other node
|
||||
.Pq peer .
|
||||
(peer).
|
||||
If
|
||||
.Ar mode
|
||||
is
|
||||
@ -196,9 +196,9 @@ regarding the system default.
|
||||
means that a relevant SA can be used when available,
|
||||
since the kernel may perform IPsec operation against packets when possible.
|
||||
In this case, packets can be transmitted in clear
|
||||
.Pq when SA is not available ,
|
||||
(when SA is not available),
|
||||
or encrypted
|
||||
.Pq when SA is available .
|
||||
(when SA is available).
|
||||
.Li require
|
||||
means that a relevant SA is required,
|
||||
since the kernel must perform IPsec operation against packets.
|
||||
@ -241,7 +241,7 @@ Refer to
|
||||
for detail.
|
||||
.Pp
|
||||
Here are several examples
|
||||
.Pq long lines are wrapped for readability :
|
||||
(long lines are wrapped for readability):
|
||||
.Bd -literal -offset indent
|
||||
in discard
|
||||
out ipsec esp/transport//require
|
||||
@ -255,7 +255,7 @@ in ipsec ipcomp/transport//use
|
||||
returns a pointer to the allocated buffer of policy specification if successful; otherwise a NULL pointer is returned.
|
||||
.Fn ipsec_get_policylen
|
||||
returns with positive value
|
||||
.Pq meaning the buffer size
|
||||
(meaning the buffer size)
|
||||
on success, and negative value on errors.
|
||||
.Fn ipsec_dump_policy
|
||||
returns a pointer to dynamically allocated region on success,
|
||||
|
@ -74,7 +74,8 @@ a ``fingerprint'' of the input-data, which doesn't disclose the actual
|
||||
input.
|
||||
.Pp
|
||||
.Tn SHA
|
||||
.Pq \&or Tn SHA-0
|
||||
(or
|
||||
.Tn SHA-0 )
|
||||
is the original Secure Hash Algorithm specified in
|
||||
.Tn FIPS
|
||||
160. It was quickly proven insecure, and has been superseded by
|
||||
|
@ -133,7 +133,7 @@ will be split into words and executed using
|
||||
.Xr execve 2 .
|
||||
Words are separated by any combinations of tabs and spaces.
|
||||
Arguments containing whitespace should be enclosed in single quotes
|
||||
.Pq ' .
|
||||
.Pq Li ' .
|
||||
Note that no shell-style globbing or other variable substitution occurs.
|
||||
.Sh EXAMPLES
|
||||
.Bd -literal
|
||||
|
@ -36,7 +36,7 @@
|
||||
.Op Fl Fd\&
|
||||
.Op Fl P Ar pidfile
|
||||
.Op Fl a Ar name
|
||||
.Op Fl e Ar exec No \&| Fl l Ar label
|
||||
.Op Fl e Ar exec | Fl l Ar label
|
||||
.Op Fl n Ar ngdebug
|
||||
.Op Fl p Ar provider
|
||||
.Ar interface
|
||||
@ -76,7 +76,8 @@ After receiving a request (PADI) from the PPPoE netgraph node,
|
||||
.Xr fork 2 Ns No s
|
||||
a child process and returns to service further requests.
|
||||
The child process offers service
|
||||
.Pq using Ar name
|
||||
(using
|
||||
.Ar name )
|
||||
and waits for a
|
||||
.Dv SUCCESS
|
||||
indication from the PPPoE node.
|
||||
@ -103,7 +104,8 @@ The child process will have standard input and standard output
|
||||
attached to the same
|
||||
.Xr netgraph 4
|
||||
data socket
|
||||
.Pq see Xr ng_socket 4
|
||||
(see
|
||||
.Xr ng_socket 4 )
|
||||
when started.
|
||||
.Pp
|
||||
Upon invocation,
|
||||
|
@ -113,10 +113,8 @@ The following conversions can be used:
|
||||
.Bl -tag -width "xxxx"
|
||||
.It \&%a
|
||||
The main program's name
|
||||
.Po
|
||||
also known as
|
||||
.Dq __progname
|
||||
.Pc .
|
||||
(also known as
|
||||
.Dq __progname ) .
|
||||
.It \&%A
|
||||
The value of the environment variable
|
||||
.Ev LD_TRACE_LOADED_OBJECTS_PROGNAME
|
||||
|
@ -738,7 +738,7 @@ call in
|
||||
.Nm
|
||||
bails out when it sees the second argument to
|
||||
.Fl c
|
||||
.Pq 0x00 ,
|
||||
(0x00),
|
||||
above. Fixing this behavior would take some gross code, or changes to the
|
||||
.Xr getopt 3
|
||||
interface. The best way to circumvent this problem is to always make sure
|
||||
|
@ -317,7 +317,7 @@ behavior, i.e. super-user can specify the desired
|
||||
on a command line, and
|
||||
.Nm
|
||||
will signal the original
|
||||
.Pq PID 1
|
||||
(PID 1)
|
||||
.Nm
|
||||
as follows:
|
||||
.Bl -column Run-level SIGTERM
|
||||
|
@ -173,17 +173,13 @@ While
|
||||
or
|
||||
.Cm flush Ns ing ,
|
||||
be quiet about actions
|
||||
.Po
|
||||
implies
|
||||
.Fl f
|
||||
.Pc .
|
||||
(implies
|
||||
.Fl f ) .
|
||||
This is useful for adjusting rules by executing multiple
|
||||
.Nm
|
||||
commands in a script
|
||||
.Po
|
||||
e.g.,
|
||||
.Ql sh\ /etc/rc.firewall
|
||||
.Pc ,
|
||||
(e.g.,
|
||||
.Ql sh\ /etc/rc.firewall ) ,
|
||||
or by processing a file of many
|
||||
.Nm
|
||||
rules,
|
||||
@ -312,10 +308,8 @@ A match is only declared with the specified probability
|
||||
(floating point number between 0 and 1).
|
||||
This can be useful for a number of applications such as
|
||||
random packet drop or
|
||||
.Po
|
||||
in conjunction with
|
||||
.Xr dummynet 4
|
||||
.Pc
|
||||
(in conjunction with
|
||||
.Xr dummynet 4 )
|
||||
to simulate the effect of multiple paths leading to out-of-order
|
||||
packet delivery.
|
||||
.It Ar action :
|
||||
@ -335,7 +329,7 @@ The search terminates.
|
||||
is an alias for
|
||||
.Cm deny .
|
||||
.It Cm reject
|
||||
.Pq Deprecated .
|
||||
(Deprecated).
|
||||
Discard packets that match this rule, and try to send an ICMP
|
||||
host unreachable notice.
|
||||
The search terminates.
|
||||
@ -382,11 +376,9 @@ Send a copy of packets matching this rule to the
|
||||
socket bound to port
|
||||
.Ar port .
|
||||
The search terminates and the original packet is accepted
|
||||
.Po
|
||||
but see section
|
||||
(but see section
|
||||
.Sx BUGS
|
||||
below
|
||||
.Pc .
|
||||
below).
|
||||
.It Cm fwd Ar ipaddr Ns Xo
|
||||
.Op , Ns Ar port
|
||||
.Xc
|
||||
@ -1110,11 +1102,9 @@ The
|
||||
.Nm
|
||||
filter list may not be modified if the system security level
|
||||
is set to 3 or higher
|
||||
.Po
|
||||
see
|
||||
(see
|
||||
.Xr init 8
|
||||
for information on system security levels
|
||||
.Pc .
|
||||
for information on system security levels).
|
||||
.El
|
||||
.Sh PACKET DIVERSION
|
||||
A
|
||||
@ -1159,7 +1149,7 @@ resize it on the fly you will probably have to
|
||||
and reload the ruleset.
|
||||
.It Em net.inet.ip.fw.dyn_count : No 3
|
||||
Current number of dynamic rules
|
||||
.Pq read-only .
|
||||
(read-only).
|
||||
.It Em net.inet.ip.fw.dyn_max : No 1000
|
||||
Maximum number of dynamic rules.
|
||||
When you hit this limit, no more dynamic rules can be
|
||||
|
@ -24,7 +24,7 @@ The MD5 algorithm is intended for digital signature applications, where a
|
||||
large file must be
|
||||
.Dq compressed
|
||||
in a secure manner before being encrypted with a private
|
||||
.Pq secret
|
||||
(secret)
|
||||
key under a public-key cryptosystem such as
|
||||
.Em RSA .
|
||||
.Pp
|
||||
|
@ -81,10 +81,8 @@ below, and the entry will be made in the internal translation table.
|
||||
.It Fl log_denied
|
||||
Log denied incoming packets via
|
||||
.Xr syslog 3
|
||||
.Po
|
||||
see also
|
||||
.Fl log_facility
|
||||
.Pc .
|
||||
(see also
|
||||
.Fl log_facility ) .
|
||||
.It Fl log_facility Ar facility_name
|
||||
Use specified log facility when logging information via
|
||||
.Xr syslog 3 .
|
||||
@ -177,8 +175,8 @@ The mapping is 1:1 meaning port 3300 maps to 2300, 3301 maps to 2301, etc.
|
||||
.Oc
|
||||
Redirect incoming IP packets of protocol
|
||||
.Ar proto
|
||||
.Po see Xr protocols 5
|
||||
.Pc
|
||||
(see
|
||||
.Xr protocols 5 )
|
||||
destined for
|
||||
.Ar publicIP
|
||||
address to a
|
||||
|
@ -82,19 +82,21 @@ bytes used to fill out the packet. The options are as follows:
|
||||
.It Fl A
|
||||
Audible.
|
||||
Include a bell
|
||||
.Pq ASCII 0x07
|
||||
.Tn ( ASCII
|
||||
0x07)
|
||||
character in the output when no packet is received before the next packet
|
||||
is transmitted.
|
||||
.It Fl a
|
||||
Audible.
|
||||
Include a bell
|
||||
.Pq ASCII 0x07
|
||||
.Tn ( ASCII
|
||||
0x07)
|
||||
character in the output when any packet is received.
|
||||
This option is ignored
|
||||
if other format options are present.
|
||||
.It Fl c Ar count
|
||||
Stop after sending
|
||||
.Pq and receiving
|
||||
(and receiving)
|
||||
.Ar count
|
||||
.Tn ECHO_RESPONSE
|
||||
packets.
|
||||
@ -214,10 +216,8 @@ network.
|
||||
If the host is not on a directly-attached network, an error is returned.
|
||||
This option can be used to ping a local host through an interface
|
||||
that has no route through it
|
||||
.Po
|
||||
e.g., after the interface was dropped by
|
||||
.Xr routed 8
|
||||
.Pc .
|
||||
(e.g., after the interface was dropped by
|
||||
.Xr routed 8 ) .
|
||||
.It Fl s Ar packetsize
|
||||
Specify the number of data bytes to be sent.
|
||||
The default is 56, which translates into 64
|
||||
@ -259,7 +259,7 @@ If duplicate packets are received, they are not included in the packet
|
||||
loss calculation, although the round trip time of these packets is used
|
||||
in calculating the round-trip time statistics.
|
||||
When the specified number of packets have been sent
|
||||
.Pq and received
|
||||
(and received)
|
||||
or if the program is terminated with a
|
||||
.Dv SIGINT ,
|
||||
a brief summary is displayed, showing the number of packets sent and
|
||||
@ -282,12 +282,14 @@ header followed by an arbitrary amount of data.
|
||||
When a
|
||||
.Ar packetsize
|
||||
is given, this indicated the size of this extra piece of data
|
||||
.Pq the default is 56 .
|
||||
(the default is 56).
|
||||
Thus the amount of data received inside of an IP packet of type
|
||||
.Tn ICMP
|
||||
.Tn ECHO_REPLY
|
||||
will always be 8 bytes more than the requested data space
|
||||
.Pq the Tn ICMP header .
|
||||
(the
|
||||
.Tn ICMP
|
||||
header).
|
||||
.Pp
|
||||
If the data space is at least eight bytes large,
|
||||
.Nm
|
||||
@ -302,7 +304,7 @@ Duplicate packets should never occur when pinging a unicast address,
|
||||
and seem to be caused by
|
||||
inappropriate link-level retransmissions.
|
||||
Duplicates may occur in many situations and are rarely
|
||||
.Pq if ever
|
||||
(if ever)
|
||||
a good sign, although the presence of low levels of duplicates may not
|
||||
always be cause for alarm.
|
||||
Duplicates are expected when pinging a broadcast or multicast address,
|
||||
@ -359,12 +361,10 @@ specification states that the
|
||||
field for
|
||||
.Tn TCP
|
||||
packets should be set to 60, but many systems use smaller values
|
||||
.Po
|
||||
.Bx 4.3
|
||||
.No ( Bx 4.3
|
||||
uses 30,
|
||||
.Bx 4.2
|
||||
used 15
|
||||
.Pc .
|
||||
used 15).
|
||||
.Pp
|
||||
The maximum possible value of this field is 255, and most
|
||||
.Ux
|
||||
@ -430,7 +430,8 @@ heard from the specified
|
||||
.Ar host ;
|
||||
a status of two if the transmission was successful but no responses
|
||||
were received; or another value
|
||||
.Pq from Aq Pa sysexits.h
|
||||
(from
|
||||
.Aq Pa sysexits.h )
|
||||
if an error occurred.
|
||||
.Sh SEE ALSO
|
||||
.Xr netstat 1 ,
|
||||
|
@ -102,7 +102,7 @@ The options are as follows:
|
||||
.\" old ipsec
|
||||
.\" .It Fl A
|
||||
.\" Enables transport-mode IPsec authentication header
|
||||
.\" .Pq experimental .
|
||||
.\" (experimental).
|
||||
.It Fl a Ar addrtype
|
||||
Generate ICMPv6 Node Information Node Addresses query, rather than echo-request.
|
||||
.Ar addrtype
|
||||
@ -133,7 +133,7 @@ This is an experimental option.
|
||||
Set socket buffer size.
|
||||
.It Fl c Ar count
|
||||
Stop after sending
|
||||
.Pq and receiving
|
||||
(and receiving)
|
||||
.Ar count
|
||||
.Tn ECHO_RESPONSE
|
||||
packets.
|
||||
@ -143,7 +143,7 @@ Set the
|
||||
option on the socket being used.
|
||||
.\" .It Fl E
|
||||
.\" Enables transport-mode IPsec encapsulated security payload
|
||||
.\" .Pq experimental .
|
||||
.\" (experimental).
|
||||
.It Fl f
|
||||
Flood ping.
|
||||
Outputs packets as fast as they come back or one hundred times per second,
|
||||
@ -196,7 +196,7 @@ Probe node information multicast group
|
||||
.Pq Li ff02::2:xxxx:xxxx .
|
||||
.Ar host
|
||||
must be string hostname of the target
|
||||
.Pq must not be a numeric IPv6 address .
|
||||
(must not be a numeric IPv6 address).
|
||||
Node information multicast group will be computed based on given
|
||||
.Ar host ,
|
||||
and will be used as the final destination.
|
||||
@ -224,16 +224,14 @@ when finished.
|
||||
.It Fl R
|
||||
Make the kernel believe that the target
|
||||
.Ar host
|
||||
.Po
|
||||
or the first
|
||||
(or the first
|
||||
.Ar hop
|
||||
if you specify
|
||||
.Ar hops
|
||||
.Pc
|
||||
.Ar hops )
|
||||
is reachable, by injecting upper-layer reachability confirmation hint.
|
||||
The option is meaningful only if the target
|
||||
.Ar host
|
||||
.Pq or the first hop
|
||||
(or the first hop)
|
||||
is a neighbor.
|
||||
.It Fl S Ar sourceaddr
|
||||
Specifies the source address of request packets.
|
||||
@ -300,7 +298,7 @@ If duplicate packets are received, they are not included in the packet
|
||||
loss calculation, although the round trip time of these packets is used
|
||||
in calculating the round-trip time statistics.
|
||||
When the specified number of packets have been sent
|
||||
.Pq and received
|
||||
(and received)
|
||||
or if the program is terminated with a
|
||||
.Dv SIGINT ,
|
||||
a brief summary is displayed, showing the number of packets sent and
|
||||
@ -323,12 +321,14 @@ during normal operations or from automated scripts.
|
||||
.\" When a
|
||||
.\" .Ar packetsize
|
||||
.\" is given, this indicated the size of this extra piece of data
|
||||
.\" .Pq the default is 56 .
|
||||
.\" (the default is 56).
|
||||
.\" Thus the amount of data received inside of an IP packet of type
|
||||
.\" .Tn ICMP
|
||||
.\" .Tn ECHO_REPLY
|
||||
.\" will always be 8 bytes more than the requested data space
|
||||
.\" .Pq the Tn ICMP header .
|
||||
.\" (the
|
||||
.\" .Tn ICMP
|
||||
.\" header).
|
||||
.\" .Pp
|
||||
.\" If the data space is at least eight bytes large,
|
||||
.\" .Nm
|
||||
@ -343,7 +343,7 @@ Duplicate packets should never occur when pinging a unicast address,
|
||||
and seem to be caused by
|
||||
inappropriate link-level retransmissions.
|
||||
Duplicates may occur in many situations and are rarely
|
||||
.Pq if ever
|
||||
(if ever)
|
||||
a good sign, although the presence of low levels of duplicates may not
|
||||
always be cause for alarm.
|
||||
Duplicates are expected when pinging a broadcast or multicast address,
|
||||
@ -354,7 +354,7 @@ Damaged packets are obviously serious cause for alarm and often
|
||||
indicate broken hardware somewhere in the
|
||||
.Nm
|
||||
packet's path
|
||||
.Pq in the network or in the hosts .
|
||||
(in the network or in the hosts).
|
||||
.Sh TRYING DIFFERENT DATA PATTERNS
|
||||
The
|
||||
(inter)network
|
||||
|
@ -192,7 +192,8 @@ by the
|
||||
option becomes the only console.
|
||||
.It Fl d
|
||||
enter the DDB kernel debugger
|
||||
.Pq see Xr ddb 4
|
||||
(see
|
||||
.Xr ddb 4 )
|
||||
as early as possible in kernel initialization.
|
||||
.It Fl g
|
||||
use the GDB remote debugging protocol.
|
||||
@ -223,13 +224,15 @@ options are automatically set.
|
||||
.It Fl r
|
||||
use the statically configured default for the device containing the
|
||||
root file system
|
||||
.Pq see Xr config 8 .
|
||||
(see
|
||||
.Xr config 8 ) .
|
||||
Normally, the root file system is on the device
|
||||
that the kernel was loaded from.
|
||||
.It Fl s
|
||||
boot into single-user mode; if the console is marked as
|
||||
.Dq insecure
|
||||
.Pq see Xr ttys 5 ,
|
||||
(see
|
||||
.Xr ttys 5 ) ,
|
||||
the root password must be entered.
|
||||
.It Fl v
|
||||
be verbose during device probing (and later).
|
||||
|
@ -318,7 +318,7 @@ The optional
|
||||
modifier specifies that the
|
||||
.Dv RTF_LLINFO
|
||||
routing table entry is the
|
||||
.Dq published Pq proxy-only
|
||||
.Dq published (proxy-only)
|
||||
.Tn ARP
|
||||
entry, as reported by
|
||||
.Xr arp 8 .
|
||||
|
@ -61,16 +61,12 @@ as well as Security Policy Database (SPD) entries in the kernel.
|
||||
.Pp
|
||||
.Nm
|
||||
takes a series of operations from the standard input
|
||||
.Po
|
||||
if invoked with
|
||||
.Fl c
|
||||
.Pc
|
||||
(if invoked with
|
||||
.Fl c )
|
||||
or the file named
|
||||
.Ar filename
|
||||
.Po
|
||||
if invoked with
|
||||
.Fl f Ar filename
|
||||
.Pc .
|
||||
(if invoked with
|
||||
.Fl f Ar filename ) .
|
||||
.Bl -tag -width Ds
|
||||
.It Fl D
|
||||
Dump the SAD entries.
|
||||
@ -228,11 +224,9 @@ IPCOMP
|
||||
Security Parameter Index (SPI) for the SAD and the SPD.
|
||||
It must be decimal number or hexadecimal number
|
||||
You can not use the set of SPI values in the range 0 through 255.
|
||||
.Po
|
||||
with
|
||||
(with
|
||||
.Li 0x
|
||||
attached
|
||||
.Pc .
|
||||
attached).
|
||||
.\"
|
||||
.Pp
|
||||
.It Ar extensions
|
||||
@ -302,7 +296,7 @@ If
|
||||
is not specified with
|
||||
.Li ipcomp
|
||||
line, the kernel will use well-known IPComp CPI
|
||||
.Pq compression parameter index
|
||||
(compression parameter index)
|
||||
on IPComp CPI field on packets, and
|
||||
.Ar spi
|
||||
field will be ignored.
|
||||
@ -403,7 +397,7 @@ NOTE:
|
||||
.Ar upperspec
|
||||
does not work against forwarding case at this moment,
|
||||
as it requires extra reassembly at forwarding node
|
||||
.Pq not implemented at this moment .
|
||||
(not implemented at this moment).
|
||||
We have many protocols in
|
||||
.Pa /etc/protocols ,
|
||||
but protocols except of TCP, UDP and ICMP may not be suitable to use with IPSec.
|
||||
|
@ -65,7 +65,7 @@ The system is halted at the specified
|
||||
.Ar time .
|
||||
.It Fl p
|
||||
The system is halted and the power is turned off
|
||||
.Pq hardware support required
|
||||
(hardware support required)
|
||||
at the specified
|
||||
.Ar time .
|
||||
.It Fl r
|
||||
|
@ -81,10 +81,7 @@ string operators,
|
||||
character tests and character operators,
|
||||
des encryption routines,
|
||||
storage allocation, time functions, signal handling and more.
|
||||
.It Xr libcurses Po
|
||||
.Fl l Ns Ar curses
|
||||
.Fl l Ns Ar termcap
|
||||
.Pc
|
||||
.It Xr libcurses Pq Fl l Ns Ar curses Fl l Ns Ar termcap
|
||||
Terminal independent screen management routines
|
||||
for two dimensional non-bitmap display terminals.
|
||||
(See
|
||||
@ -102,7 +99,8 @@ indicates the proper interface to use.
|
||||
.It Xr libkvm Pq Fl l Ns Ar kvm
|
||||
Functions used to access kernel memory are in this library. They can be used
|
||||
against both a running system and a crash dump.
|
||||
.Pq See Xr kvm 3 . )
|
||||
(See
|
||||
.Xr kvm 3 . )
|
||||
.It Xr libl Pq Fl l Ns Ar l
|
||||
The library for
|
||||
.Xr lex 1 .
|
||||
|
@ -51,7 +51,7 @@ AdvanSys products incorporating these chips include the
|
||||
and
|
||||
.Tn ABP3950U2W .
|
||||
Both chips support, synchronous transfers
|
||||
.Pq 20MHz and 40MHz max respectively ,
|
||||
(20MHz and 40MHz max respectively),
|
||||
16bit transfers, tagged queueing,
|
||||
and up to 253 concurrent SCSI transactions.
|
||||
.Pp
|
||||
|
@ -140,9 +140,11 @@ The
|
||||
.Nm
|
||||
driver accepts the following driver flags. They can be set either in the
|
||||
kernel configuration file
|
||||
.Pq see Xr config 8 ,
|
||||
(see
|
||||
.Xr config 8 ) ,
|
||||
or else in the User Configuration Menu at boot time
|
||||
.Pq see Xr boot 8 .
|
||||
(see
|
||||
.Xr boot 8 ) .
|
||||
.Bl -tag -width FAIL
|
||||
.It bit 0 (FAIL_IF_NO_KBD)
|
||||
By default the
|
||||
|
@ -56,7 +56,8 @@ The following kernel configuration options can be used to control the
|
||||
.Nm
|
||||
driver.
|
||||
They may be set in the kernel configuration file
|
||||
.Pq see Xr config 8 .
|
||||
(see
|
||||
.Xr config 8 ) .
|
||||
.Bl -tag -width MOUSE
|
||||
.It Em KBD_RESETDELAY=X , KBD_MAXWAIT=Y
|
||||
The keyboard driver
|
||||
|
@ -522,11 +522,9 @@ M[k] <- X
|
||||
The alu instructions perform operations between the accumulator and
|
||||
index register or constant, and store the result back in the accumulator.
|
||||
For binary operations, a source mode is required
|
||||
.Po
|
||||
.Dv BPF_K
|
||||
.Dv ( BPF_K
|
||||
or
|
||||
.Dv BPF_X
|
||||
.Pc .
|
||||
.Dv BPF_X ) .
|
||||
.Pp
|
||||
.Bl -tag -width "BPF_ALU+BPF_MUL+BPF_K" -compact
|
||||
.It Li BPF_ALU+BPF_ADD+BPF_K
|
||||
|
@ -100,10 +100,8 @@ the tag is interpreted as the rule number
|
||||
rule processing should restart.
|
||||
.Sh LOOP AVOIDANCE
|
||||
Packets written into a divert socket
|
||||
.Po
|
||||
using
|
||||
.Xr sendto 2
|
||||
.Pc
|
||||
(using
|
||||
.Xr sendto 2 )
|
||||
re-enter the packet filter at the rule number
|
||||
following the tag given in the port part of the socket address, which
|
||||
is usually already set at the rule number that caused the diversion
|
||||
|
@ -63,12 +63,13 @@ Also, administrator needs to configure protocol and addresses used for the
|
||||
inner header, by using
|
||||
.Xr ifconfig 8 .
|
||||
Note that IPv6 link-local address
|
||||
.Pq those start with Li fe80::
|
||||
(those start with
|
||||
.Li fe80:: )
|
||||
will be automatically configured whenever possible.
|
||||
You may need to remove IPv6 link-local address manually using
|
||||
.Xr ifconfig 8 ,
|
||||
when you would like to disable the use of IPv6 as inner header
|
||||
.Pq like when you need pure IPv4-over-IPv6 tunnel .
|
||||
(like when you need pure IPv4-over-IPv6 tunnel).
|
||||
Finally, use routing table to route the packets toward
|
||||
.Nm
|
||||
interface.
|
||||
@ -103,20 +104,16 @@ With
|
||||
.Dv IFF_LINK1 ,
|
||||
.Nm
|
||||
will copy ECN bits
|
||||
.Po
|
||||
.Dv 0x02
|
||||
.Dv ( 0x02
|
||||
and
|
||||
.Dv 0x01
|
||||
on IPv4 TOS byte or IPv6 traffic class byte
|
||||
.Pc
|
||||
on IPv4 TOS byte or IPv6 traffic class byte)
|
||||
on egress and ingress, as follows:
|
||||
.Bl -tag -width "Ingress" -offset indent
|
||||
.It Ingress
|
||||
Copy TOS bits except for ECN CE
|
||||
.Po
|
||||
masked with
|
||||
.Dv 0xfe
|
||||
.Pc
|
||||
(masked with
|
||||
.Dv 0xfe )
|
||||
from
|
||||
inner to outer.
|
||||
set ECN CE bit to
|
||||
@ -181,7 +178,7 @@ For example, you cannot usually use
|
||||
to talk with IPsec devices that use IPsec tunnel mode.
|
||||
.Pp
|
||||
The current code does not check if the ingress address
|
||||
.Pq outer source address
|
||||
(outer source address)
|
||||
configured to
|
||||
.Nm
|
||||
makes sense.
|
||||
@ -192,7 +189,7 @@ and your node will generate packets with a spoofed source address.
|
||||
If the outer protocol is IPv4,
|
||||
.Nm
|
||||
does not try to perform path MTU discovery for the encapsulated packet
|
||||
.Pq DF bit is set to 0 .
|
||||
(DF bit is set to 0).
|
||||
.Pp
|
||||
If the outer protocol is IPv6, path MTU discovery for encapsulated packet
|
||||
may affect communication over the interface.
|
||||
|
@ -113,7 +113,7 @@ system calls may be used).
|
||||
Outgoing packets automatically have an
|
||||
.Tn IPv6
|
||||
header prepended to them
|
||||
.Pq based on the destination address .
|
||||
(based on the destination address).
|
||||
.Tn ICMPv6
|
||||
pseudo header checksum field
|
||||
.Pq Li icmp6_cksum
|
||||
@ -171,7 +171,7 @@ Six macros operate on an icmp6_filter structure:
|
||||
.El
|
||||
.Pp
|
||||
The first argument to the last four macros
|
||||
.Pq an integer
|
||||
(an integer)
|
||||
is an
|
||||
.Tn ICMPv6
|
||||
message type, between 0 and 255.
|
||||
@ -199,7 +199,7 @@ messages of a given
|
||||
.Tn ICMPv6
|
||||
type should be passed to the application
|
||||
or not passed to the application
|
||||
.Pq blocked .
|
||||
(blocked).
|
||||
.Pp
|
||||
The final two macros,
|
||||
.Dv WILLPASS
|
||||
@ -262,8 +262,6 @@ socket with a network address for which no network interface exists.
|
||||
.\"
|
||||
.Sh HISTORY
|
||||
The implementation is based on KAME stack
|
||||
.Po
|
||||
which is descendant of WIDE hydrangea IPv6 stack kit
|
||||
.Pc .
|
||||
(which is descendant of WIDE hydrangea IPv6 stack kit).
|
||||
.Pp
|
||||
Part of the document was shamelessly copied from RFC2292.
|
||||
|
@ -132,7 +132,8 @@ was full
|
||||
.Pq Li struct if_data
|
||||
more information from a structure defined in
|
||||
.Aq Pa net/if.h
|
||||
.Pq see Xr if_data 9
|
||||
(see
|
||||
.Xr if_data 9 )
|
||||
.El
|
||||
.Pp
|
||||
Class-specific information can be retrieved by examining the
|
||||
|
@ -88,10 +88,8 @@ struct sockaddr_in6 {
|
||||
.Pp
|
||||
Sockets may be created with the local address
|
||||
.Dq Dv ::
|
||||
.Po
|
||||
which is equal to IPv6 address
|
||||
.Dv 0:0:0:0:0:0:0:0
|
||||
.Pc
|
||||
(which is equal to IPv6 address
|
||||
.Dv 0:0:0:0:0:0:0:0 )
|
||||
to affect
|
||||
.Dq wildcard
|
||||
matching on incoming messages.
|
||||
@ -313,7 +311,7 @@ Boolean: enable/disable receiving of
|
||||
router advertisement packets,
|
||||
and autoconfiguration of address prefixes and default routers.
|
||||
The node must be a host
|
||||
.Pq not a router
|
||||
(not a router)
|
||||
for the option to be meaningful.
|
||||
Defaults to off.
|
||||
.It Dv IPV6CTL_KEEPFAITH
|
||||
@ -332,7 +330,7 @@ Defaults to off.
|
||||
Integer: default interval between
|
||||
.Tn IPv6
|
||||
packet forwarding engine log output
|
||||
.Pq in seconds .
|
||||
(in seconds).
|
||||
.It Dv IPV6CTL_HDRNESTLIMIT
|
||||
.Pq ip6.hdrnestlimit
|
||||
Integer: default number of the maximum
|
||||
@ -424,21 +422,17 @@ Basically, it says this:
|
||||
A specific bind on an
|
||||
.Dv AF_INET6
|
||||
socket
|
||||
.Po
|
||||
.Xr bind 2
|
||||
with an address specified
|
||||
.Pc
|
||||
.Xr ( bind 2
|
||||
with an address specified)
|
||||
should accept IPv6 traffic to that address only.
|
||||
.It
|
||||
If you perform a wildcard bind
|
||||
on an
|
||||
.Dv AF_INET6
|
||||
socket
|
||||
.Po
|
||||
.Xr bind 2
|
||||
.Xr ( bind 2
|
||||
to IPv6 address
|
||||
.Li ::
|
||||
.Pc ,
|
||||
.Li :: ) ,
|
||||
and there is no wildcard bind
|
||||
.Dv AF_INET
|
||||
socket on that TCP/UDP port, IPv6 traffic as well as IPv4 traffic
|
||||
@ -465,9 +459,7 @@ However, RFC2553 does not define the ordering constraint between calls to
|
||||
.Xr bind 2 ,
|
||||
nor how IPv4 TCP/UDP port numbers and IPv6 TCP/UDP port numbers
|
||||
relate to each other
|
||||
.Po
|
||||
should they be integrated or separated
|
||||
.Pc .
|
||||
(should they be integrated or separated).
|
||||
Implemented behavior is very different from kernel to kernel.
|
||||
Therefore, it is unwise to rely too much upon the behavior of
|
||||
.Dv AF_INET6
|
||||
|
@ -70,7 +70,8 @@ sometimes also called
|
||||
They are usually located under the directory
|
||||
.Pa /dev
|
||||
in the file system hierarchy
|
||||
.Pq see also Xr hier 7 .
|
||||
(see also
|
||||
.Xr hier 7 ) .
|
||||
.Pp
|
||||
Until
|
||||
.Xr devfs 5
|
||||
@ -95,7 +96,7 @@ Some devices come in two flavors:
|
||||
and
|
||||
.Em character
|
||||
devices, or by a better name, buffered and unbuffered
|
||||
.Pq raw
|
||||
(raw)
|
||||
devices. The traditional names are reflected by the letters
|
||||
.Ql b
|
||||
and
|
||||
@ -123,7 +124,7 @@ device. This includes making backups of entire disk partitions, or
|
||||
to
|
||||
.Em raw
|
||||
floppy disks
|
||||
.Pq i.e. those used like tapes .
|
||||
(i.e. those used like tapes).
|
||||
.Pp
|
||||
Access restrictions to device nodes are usually subject of the regular
|
||||
file permissions of the device node entry, instead of being implied
|
||||
@ -146,11 +147,9 @@ manual pages in this section provide a sample line for the
|
||||
configuration file in their synopsis portion. See also the sample
|
||||
config file
|
||||
.Pa /sys/i386/conf/LINT
|
||||
.Po
|
||||
for the
|
||||
(for the
|
||||
.Em i386
|
||||
architecture
|
||||
.Pc .
|
||||
architecture).
|
||||
.Sh SEE ALSO
|
||||
.Xr close 2 ,
|
||||
.Xr ioctl 2 ,
|
||||
|
@ -96,9 +96,9 @@ There are several
|
||||
.Xr setsockopt 2 Ns / Ns Xr getsockopt 2
|
||||
options.
|
||||
They are separated into the basic IPv6 sockets API
|
||||
.Pq defined in RFC2553 ,
|
||||
(defined in RFC2553),
|
||||
and the advanced API
|
||||
.Pq defined in RFC2292 .
|
||||
(defined in RFC2292).
|
||||
The basic API looks very similar to the API presented in
|
||||
.Xr ip 4 .
|
||||
Advanced API uses ancillary data and can handle more complex cases.
|
||||
@ -697,9 +697,7 @@ are not defined in the RFCs and should be considered implementation dependent.
|
||||
.\"
|
||||
.Sh HISTORY
|
||||
The implementation is based on KAME stack
|
||||
.Po
|
||||
which is descendant of WIDE hydrangea IPv6 stack kit
|
||||
.Pc .
|
||||
(which is descendant of WIDE hydrangea IPv6 stack kit).
|
||||
.Pp
|
||||
Part of the document was shamelessly copied from RFC2553 and RFC2292.
|
||||
.\"
|
||||
|
@ -43,17 +43,15 @@
|
||||
is a security protocol in Internet Protocol layer.
|
||||
.Nm
|
||||
is defined for both IPv4 and IPv6
|
||||
.Po
|
||||
.Xr inet 4
|
||||
.Xr ( inet 4
|
||||
and
|
||||
.Xr inet6 4
|
||||
.Pc .
|
||||
.Xr inet6 4 ) .
|
||||
.Nm
|
||||
consists of two sub-protocols, namely
|
||||
ESP
|
||||
.Pq encapsulated security payload
|
||||
(encapsulated security payload)
|
||||
and AH
|
||||
.Pq authentication header .
|
||||
(authentication header).
|
||||
ESP protects IP payload from wire-tapping by encrypting it by
|
||||
secret key cryptography algorithms.
|
||||
AH guarantees integrity of IP packet
|
||||
@ -95,9 +93,9 @@ interface is used to define host-wide default behavior.
|
||||
.Pp
|
||||
The kernel code does not implement dynamic encryption key exchange protocol
|
||||
like IKE
|
||||
.Pq Internet Key Exchange .
|
||||
(Internet Key Exchange).
|
||||
That should be implemented as userland programs
|
||||
.Pq usually as daemons ,
|
||||
(usually as daemons),
|
||||
by using the above described APIs.
|
||||
.\"
|
||||
.Ss Policy management
|
||||
@ -196,17 +194,17 @@ during AH authentication data computation.
|
||||
The variable is for tweaking AH behavior to interoperate with devices that
|
||||
implement RFC1826 AH.
|
||||
It should be set to non-zero
|
||||
.Pq clear the type-of-service field
|
||||
(clear the type-of-service field)
|
||||
for RFC2402 conformance.
|
||||
.It Li ipsec.ah_offsetmask
|
||||
During AH authentication data computation, the kernel will include
|
||||
16bit fragment offset field
|
||||
.Pq including flag bits
|
||||
(including flag bits)
|
||||
in IPv4 header, after computing logical AND with the variable.
|
||||
The variable is for tweaking AH behavior to interoperate with devices that
|
||||
implement RFC1826 AH.
|
||||
It should be set to zero
|
||||
.Pq clear the fragment offset field during computation
|
||||
(clear the fragment offset field during computation)
|
||||
for RFC2402 conformance.
|
||||
.It Li ipsec.dfbit
|
||||
The variable configures the kernel behavior on IPv4 IPsec tunnel encapsulation.
|
||||
@ -217,7 +215,7 @@ The variable is supplied to conform to RFC2401 chapter 6.1.
|
||||
.It Li ipsec.ecn
|
||||
If set to non-zero, IPv4 IPsec tunnel encapsulation/decapsulation behavior will
|
||||
be friendly to ECN
|
||||
.Pq explicit congestion notification ,
|
||||
(explicit congestion notification),
|
||||
as documented in
|
||||
.Li draft-ietf-ipsec-ecn-02.txt .
|
||||
.Xr gif 4
|
||||
@ -297,20 +295,16 @@ AH and tunnel mode encapsulation may not work as you might expect.
|
||||
If you configure inbound
|
||||
.Dq require
|
||||
policy against AH tunnel or any IPsec encapsulating policy with AH
|
||||
.Po
|
||||
like
|
||||
.Dq Li esp/tunnel/A-B/use ah/transport/A-B/require
|
||||
.Pc ,
|
||||
(like
|
||||
.Dq Li esp/tunnel/A-B/use ah/transport/A-B/require ) ,
|
||||
tunnelled packets will be rejected.
|
||||
This is because we enforce policy check on inner packet on reception,
|
||||
and AH authenticates encapsulating
|
||||
.Pq outer
|
||||
(outer)
|
||||
packet, not the encapsulated
|
||||
.Pq inner
|
||||
(inner)
|
||||
packet
|
||||
.Po
|
||||
so for the receiving kernel there's no sign of authenticity
|
||||
.Pc .
|
||||
(so for the receiving kernel there's no sign of authenticity).
|
||||
The issue will be solved when we revamp our policy engine to keep all the
|
||||
packet decapsulation history.
|
||||
.Pp
|
||||
|
@ -39,13 +39,14 @@
|
||||
software package is a result of joint work of several IPv6 researchers
|
||||
in Japan, to provide reference implementation of IPv6 to
|
||||
Berkeley Software Distribution
|
||||
.Pq BSD
|
||||
derived system such as BSD/OS,
|
||||
.Pq Bx
|
||||
derived system such as
|
||||
.Bsx ,
|
||||
.Fx ,
|
||||
.Nx
|
||||
and
|
||||
.Ox
|
||||
.Pq in alphabetical order .
|
||||
(in alphabetical order).
|
||||
.Pp
|
||||
.\" Package consists of set of patches and additions to kernel,
|
||||
.\" modification to application, daemons, header files and libraries.
|
||||
@ -148,11 +149,9 @@ You also can check out the IPv6 and IPsec chapters in the
|
||||
handbook.
|
||||
Also check latest status of project at web page:
|
||||
.Pa http://www.kame.net/ .
|
||||
.Po
|
||||
Hope you can see a
|
||||
(Hope you can see a
|
||||
.Dq Dancing Turtle
|
||||
.Li :-)
|
||||
.Pc
|
||||
.Li :-) )
|
||||
.\"
|
||||
.Ss APIs introduced or modified
|
||||
.Xr if_indextoname 3 ,
|
||||
|
@ -64,7 +64,7 @@ Control execution of HLT in the kernel context switch routine.
|
||||
Get per battery information.
|
||||
.Pp
|
||||
Some APM implementations execute the HLT
|
||||
.Pq Halt CPU until an interrupt occurs
|
||||
(Halt CPU until an interrupt occurs)
|
||||
instruction in the
|
||||
.Dq Em Idle CPU
|
||||
call, while others do not. Thus enabling this may result in
|
||||
|
@ -38,7 +38,7 @@ The special file
|
||||
.Pa /dev/io
|
||||
is a controlled security hole that allows a process to gain I/O
|
||||
privileges
|
||||
.Pq which are normally reserved for kernel-internal code .
|
||||
(which are normally reserved for kernel-internal code).
|
||||
Any process that holds a file descriptor on
|
||||
.Pa /dev/io
|
||||
open will get its
|
||||
|
@ -133,10 +133,12 @@ The
|
||||
driver accepts the following driver flag.
|
||||
Set it in the
|
||||
kernel configuration file
|
||||
.Pq see Xr config 8
|
||||
(see
|
||||
.Xr config 8 )
|
||||
or in the User Configuration Menu at
|
||||
the boot time
|
||||
.Pq see Xr boot 8 .
|
||||
(see
|
||||
.Xr boot 8 ) .
|
||||
.Pp
|
||||
.Bl -tag -width MOUSE
|
||||
.It bit 4..7 ACCELERATION
|
||||
@ -260,7 +262,8 @@ is always set to -1.
|
||||
The
|
||||
.Dv accelfactor
|
||||
field holds a value to control acceleration feature
|
||||
.Pq see Sx Acceleration .
|
||||
(see
|
||||
.Sx Acceleration ) .
|
||||
It is zero or greater.
|
||||
If it is zero, acceleration is disabled.
|
||||
.Pp
|
||||
|
@ -70,10 +70,8 @@ to be also configured in the kernel.
|
||||
Almost full DEC
|
||||
.Tn VT220
|
||||
functionality
|
||||
.Po
|
||||
moving towards
|
||||
.Tn VT320
|
||||
.Pc
|
||||
(moving towards
|
||||
.Tn VT320 )
|
||||
.It
|
||||
Completely independent virtual terminals for MDA/HGC/CGA/EGA and VGA
|
||||
.It
|
||||
@ -97,11 +95,9 @@ Support for MDA, CGA, EGA and VGA display adaptors
|
||||
Support for 132 column operation on some VGA chipsets
|
||||
.It
|
||||
X Window Support for XFree86
|
||||
.Po
|
||||
requires
|
||||
(requires
|
||||
.Em XSERVER
|
||||
to be defined
|
||||
.Pc
|
||||
to be defined)
|
||||
.El
|
||||
.Pp
|
||||
What it cannot:
|
||||
@ -121,7 +117,7 @@ No VT52 support at all
|
||||
No 8-bit controls
|
||||
.It
|
||||
Only limited AT-keyboard
|
||||
.Pq 84 keys
|
||||
(84 keys)
|
||||
support
|
||||
.El
|
||||
.Ss Scrollback
|
||||
@ -156,7 +152,7 @@ in the kernel source tree for detailed documentation.
|
||||
.Pp
|
||||
Note: the following conventions apply to all the Boolean options.
|
||||
If an option is given with no value, a value of 1
|
||||
.Pq activated
|
||||
(activated)
|
||||
is substituted.
|
||||
If an option value is given as 0, this options is
|
||||
deactivated.
|
||||
@ -188,7 +184,7 @@ Default: on
|
||||
If enabled, a blinking-star screensaver is used.
|
||||
If disabled, the screen
|
||||
is simply blanked
|
||||
.Pq which might be useful for energy-saving monitors .
|
||||
(which might be useful for energy-saving monitors).
|
||||
.Pp
|
||||
Default: on
|
||||
.It Em PCVT_CTRL_ALT_DEL
|
||||
@ -205,9 +201,7 @@ Do NOT override a security lock for the keyboard.
|
||||
Default: on
|
||||
.It Em PCVT_24LINESDEF
|
||||
If enabled, the 25-line modi
|
||||
.Po
|
||||
VT emulation with 25 lines, and HP emulation with 28 lines
|
||||
.Pc
|
||||
(VT emulation with 25 lines, and HP emulation with 28 lines)
|
||||
default to 24 lines only to provide a better compatibility to the
|
||||
original DEV VT220 (TM). Thus it should be possible to use the
|
||||
terminal information for those terminals without further changes.
|
||||
@ -413,7 +407,7 @@ Since the
|
||||
.Sq native character set
|
||||
of any IBM-compatible PC video board does not allow the full interpretation
|
||||
of DEC multinational character set or ISO Latin-1
|
||||
.Pq ISO 8859-1 ,
|
||||
(ISO 8859-1),
|
||||
this might be very useful for a U**X environment.
|
||||
.Pp
|
||||
.Bl -tag -width 20n -offset indent -compact
|
||||
@ -466,7 +460,7 @@ CH_SET4, CH_SET5, CH_SET6, or CH_SET7, too.
|
||||
.Pp
|
||||
Note that there's a dependence between the font size
|
||||
and a possible screen height
|
||||
.Pq in character rows ,
|
||||
(in character rows),
|
||||
depending on the video adaptor used:
|
||||
.Bd -literal
|
||||
Screen size (rows) on: EGA VGA
|
||||
@ -561,7 +555,8 @@ Note that setting the number of columns to 132 is only supported on
|
||||
some VGA adaptors.
|
||||
Any unsupported numbers cause the ioctl to fail with
|
||||
.Va errno
|
||||
.Pq see Xr intro 2
|
||||
(see
|
||||
.Xr intro 2 )
|
||||
being set to
|
||||
.Er EINVAL .
|
||||
.Pp
|
||||
@ -689,7 +684,7 @@ Device nodes to access the
|
||||
.Nm
|
||||
driver
|
||||
.It Pa i386/isa/pcvt/pcvt_conf.h
|
||||
.Pq relative to the kernel source tree
|
||||
(relative to the kernel source tree)
|
||||
Documents the various compile-time options to tailor
|
||||
.Nm .
|
||||
.El
|
||||
|
@ -67,12 +67,14 @@ The
|
||||
.Nm
|
||||
driver allows the user to initially set the resolution
|
||||
via the driver flag
|
||||
.Pq see Sx DRIVER CONFIGURATION
|
||||
(see
|
||||
.Sx "DRIVER CONFIGURATION" )
|
||||
or change it later via the
|
||||
.Xr ioctl 2
|
||||
command
|
||||
.Dv MOUSE_SETMODE
|
||||
.Pq see Sx IOCTLS .
|
||||
(see
|
||||
.Sx IOCTLS ) .
|
||||
.Ss Report Rate
|
||||
Frequency, or report rate, at which the device sends movement
|
||||
and button state reports to the host system is also configurable.
|
||||
@ -92,7 +94,8 @@ At the level zero the basic support is provided; the device driver will report
|
||||
horizontal and vertical movement of the attached device
|
||||
and state of up to three buttons.
|
||||
The movement and status are encoded in a series of fixed-length data packets
|
||||
.Pq see Sx Data Packet Format .
|
||||
(see
|
||||
.Sx "Data Packet Format" ) .
|
||||
This is the default level of operation and the driver is initially
|
||||
at this level when opened by the user program.
|
||||
.Pp
|
||||
@ -191,7 +194,8 @@ There are following kernel configuration options to control the
|
||||
.Nm
|
||||
driver.
|
||||
They may be set in the kernel configuration file
|
||||
.Pq see Xr config 8 .
|
||||
(see
|
||||
.Xr config 8 ) .
|
||||
.Bl -tag -width MOUSE
|
||||
.It Em KBD_RESETDELAY=X , KBD_MAXWAIT=Y
|
||||
The
|
||||
@ -229,7 +233,8 @@ driver accepts the following driver flags.
|
||||
Set them in the
|
||||
kernel configuration file or in the User Configuration Menu at
|
||||
the boot time
|
||||
.Pq see Xr boot 8 .
|
||||
(see
|
||||
.Xr boot 8 ) .
|
||||
.Pp
|
||||
.Bl -tag -width MOUSE
|
||||
.It bit 0..3 RESOLUTION
|
||||
@ -484,7 +489,8 @@ Typical resolutions are:
|
||||
The
|
||||
.Dv accelfactor
|
||||
field holds a value to control acceleration feature
|
||||
.Pq see Sx Acceleration .
|
||||
(see
|
||||
.Sx Acceleration ) .
|
||||
It must be zero or greater. If it is zero, acceleration is disabled.
|
||||
.Pp
|
||||
The
|
||||
@ -648,7 +654,8 @@ for known IDs.
|
||||
At debug level 1 more information will be logged
|
||||
while the driver probes the auxiliary port (mouse port).
|
||||
Messages are logged with the LOG_KERN facility at the LOG_DEBUG level
|
||||
.Pq see Xr syslogd 8 .
|
||||
(see
|
||||
.Xr syslogd 8 ) .
|
||||
.Bd -literal -offset indent
|
||||
psm0: current command byte:xxxx
|
||||
kbdio: TEST_AUX_PORT status:0000
|
||||
|
@ -84,7 +84,8 @@ If the standard VGA video mode is used,
|
||||
the size of the bitmap must be 320x200 or less.
|
||||
If you enable the VESA mode support in the kernel,
|
||||
either by statically linking the VESA module or by loading the VESA module
|
||||
.Pq see Xr vga 4 ,
|
||||
(see
|
||||
.Xr vga 4 ) ,
|
||||
you can load bitmaps up to a resolution of 1024x768, depending on the VESA
|
||||
BIOS and the amount of video memory on the video card.
|
||||
.Ss Screen saver
|
||||
@ -145,7 +146,9 @@ on the AT 84 keyboard.
|
||||
You can change the
|
||||
.Ar saver
|
||||
key by modifying the keymap
|
||||
.Pq see Xr kbdcontrol 1 , Xr keymap 5 ,
|
||||
(see
|
||||
.Xr kbdcontrol 1 ,
|
||||
.Xr keymap 5 ) ,
|
||||
and assign the
|
||||
.Ar saver
|
||||
function to a key of your preference.
|
||||
@ -179,7 +182,8 @@ have the following line in the kernel configuration file.
|
||||
.Pp
|
||||
Next, edit
|
||||
.Pa /boot/loader.conf
|
||||
.Pq see Xr loader.conf 5
|
||||
(see
|
||||
.Xr loader.conf 5 )
|
||||
and include the following lines:
|
||||
.Bd -literal -offset indent
|
||||
splash_bmp_load="YES"
|
||||
|
@ -53,17 +53,15 @@ interface.
|
||||
The
|
||||
.Nm
|
||||
interface is necessary for site border router
|
||||
.Po
|
||||
called
|
||||
(called
|
||||
.Dq 6to4 router
|
||||
in the specification
|
||||
.Pc .
|
||||
in the specification).
|
||||
.Pp
|
||||
Due to the way 6to4 protocol is specified,
|
||||
.Nm
|
||||
interface requires certain configuration to work properly.
|
||||
Single
|
||||
.Pq no more than 1
|
||||
(no more than 1)
|
||||
valid 6to4 address needs to be configured to the interface.
|
||||
.Dq A valid 6to4 address
|
||||
is an address which has the following properties.
|
||||
@ -83,9 +81,9 @@ Since the specification forbids the use of IPv4 private address,
|
||||
the address needs to be a global IPv4 address.
|
||||
.It
|
||||
Subnet identifier portion
|
||||
.Pq 48th to 63rd bit
|
||||
(48th to 63rd bit)
|
||||
and interface identifier portion
|
||||
.Pq lower 64 bits
|
||||
(lower 64 bits)
|
||||
are properly filled to avoid address collisions.
|
||||
.El
|
||||
.Pp
|
||||
@ -182,7 +180,8 @@ The following configuration accepts packets from IPv4 source
|
||||
.Li 9.1.0.0/16
|
||||
only.
|
||||
It emits 6to4 packet only for IPv6 destination 2002:0901::/32
|
||||
.Pq IPv4 destination will match Li 9.1.0.0/16 .
|
||||
(IPv4 destination will match
|
||||
.Li 9.1.0.0/16 ) .
|
||||
.Bd -literal
|
||||
# ifconfig ne0 inet 9.1.2.3 netmask 0xffff0000
|
||||
# ifconfig stf0 inet6 2002:0901:0203:0000:a00:5aff:fe38:6f86 \\
|
||||
@ -193,12 +192,12 @@ The following configuration uses the
|
||||
.Nm
|
||||
interface as an output-only device.
|
||||
You need to have alternative IPv6 connectivity
|
||||
.Pq other than 6to4
|
||||
(other than 6to4)
|
||||
to use this configuration.
|
||||
For outbound traffic, you can reach other 6to4 networks efficiently via
|
||||
.Nm stf .
|
||||
For inbound traffic, you will not receive any 6to4-tunneled packets
|
||||
.Pq less security drawbacks .
|
||||
(less security drawbacks).
|
||||
Be careful not to advertise your 6to4 prefix to others
|
||||
.Pq Li 2002:8504:0506::/48 ,
|
||||
and not to use your 6to4 prefix as a source.
|
||||
|
@ -363,10 +363,12 @@ The following driver flags can be used to control the
|
||||
.Nm
|
||||
driver.
|
||||
They can be set either in the kernel configuration file
|
||||
.Pq see Xr config 8 ,
|
||||
(see
|
||||
.Xr config 8 ) ,
|
||||
or else in the User Configuration Menu at boot
|
||||
time
|
||||
.Pq see Xr boot 8 .
|
||||
(see
|
||||
.Xr boot 8 ) .
|
||||
.Bl -tag -width bit_0
|
||||
.\".It bit 0 (VISUAL_BELL)
|
||||
.\"Uses the ``visual'' bell.
|
||||
|
@ -44,7 +44,8 @@ supplies mouse data to the user process in the standardized way via the
|
||||
.Nm
|
||||
driver.
|
||||
This arrangement makes it possible for the console and the user process
|
||||
.Pq such as the Tn X\ Window System
|
||||
(such as the
|
||||
.Tn X\ Window System )
|
||||
to share the mouse.
|
||||
.Pp
|
||||
The user process which wants to utilize mouse operation simply opens
|
||||
|
@ -56,7 +56,7 @@ the control device
|
||||
there);
|
||||
writing an Ethernet frame to the control device generates an input frame on
|
||||
the network interface, as if the
|
||||
.Pq non-existent
|
||||
(non-existent)
|
||||
hardware had just received it.
|
||||
.Pp
|
||||
The Ethernet tunnel device, normally
|
||||
@ -91,14 +91,15 @@ amount of data provided to
|
||||
.Fn write .
|
||||
Writes will not block; if the frame cannot be accepted
|
||||
for a transient reason
|
||||
.Pq e.g., no buffer space available ,
|
||||
(e.g., no buffer space available),
|
||||
it is silently dropped; if the reason is not transient
|
||||
.Pq e.g., frame too large ,
|
||||
(e.g., frame too large),
|
||||
an error is returned.
|
||||
The following
|
||||
.Xr ioctl 2
|
||||
calls are supported
|
||||
.Pq defined in Aq Pa net/if_tap.h Ns :
|
||||
(defined in
|
||||
.Aq Pa net/if_tap.h ) :
|
||||
.Bl -tag -width VMIO_SIOCSETMACADDR
|
||||
.It Dv TAPSDEBUG
|
||||
The argument should be a pointer to an
|
||||
@ -114,7 +115,7 @@ this stores the internal debugging variable's value into it.
|
||||
Turn non-blocking I/O for reads off or on, according as the argument
|
||||
.Va int Ns 's
|
||||
value is or isn't zero
|
||||
.Pq Writes are always nonblocking .
|
||||
(Writes are always nonblocking).
|
||||
.It Dv FIOASYNC
|
||||
Turn asynchronous I/O for reads
|
||||
(i.e., generation of
|
||||
@ -171,7 +172,8 @@ address of the
|
||||
.Dq remote
|
||||
side. This command is used by VMware port and expected to be executed on
|
||||
a descriptor, associated with control device
|
||||
.Pq usually Pa /dev/vmnet Ns Sy N .
|
||||
(usually
|
||||
.Pa /dev/vmnet Ns Sy N ) .
|
||||
.El
|
||||
.Pp
|
||||
The control device also supports
|
||||
|
@ -76,7 +76,8 @@ module can be dynamically loaded into the kernel using
|
||||
.Sh DRIVER CONFIGURATION
|
||||
.Ss Kernel Configuration Options
|
||||
The following kernel configuration options
|
||||
.Pq see Xr config 8
|
||||
(see
|
||||
.Xr config 8 )
|
||||
can be used to control the
|
||||
.Nm
|
||||
driver.
|
||||
|
@ -402,11 +402,9 @@ field hold one of two values:
|
||||
.Dv AUX_FUNC
|
||||
and
|
||||
.Dv AUX_OBJECT
|
||||
.Po
|
||||
see
|
||||
(see
|
||||
.Aq Pa link.h
|
||||
for their definitions
|
||||
.Pc .
|
||||
for their definitions).
|
||||
.Dv AUX_FUNC
|
||||
associates the symbol with a callable function, while
|
||||
.Dv AUX_OBJECT
|
||||
|
@ -196,10 +196,8 @@ The location of the Procedure Linkage Table within this image.
|
||||
The location of an array of
|
||||
.Fa relocation_info
|
||||
structures
|
||||
.Po
|
||||
see
|
||||
.Xr a.out 5
|
||||
.Pc
|
||||
(see
|
||||
.Xr a.out 5 )
|
||||
specifying run-time relocations.
|
||||
.It Fa sdt_hash
|
||||
The location of the hash table for fast symbol lookup in this object's
|
||||
@ -227,10 +225,8 @@ A
|
||||
structure describes a shared object that is needed
|
||||
to complete the link edit process of the object containing it.
|
||||
A list of such objects
|
||||
.Po
|
||||
chained through
|
||||
.Fa sod_next
|
||||
.Pc
|
||||
(chained through
|
||||
.Fa sod_next )
|
||||
is pointed at
|
||||
by the
|
||||
.Fa sdt_sods
|
||||
@ -256,10 +252,8 @@ specifies a library that is to be searched for by
|
||||
.Nm ld.so .
|
||||
The path name
|
||||
is obtained by searching a set of directories
|
||||
.Po
|
||||
see also
|
||||
.Xr ldconfig 8
|
||||
.Pc
|
||||
(see also
|
||||
.Xr ldconfig 8 )
|
||||
for a shared object matching
|
||||
.Em lib\&<sod_name>\&.so.n.m .
|
||||
If not set,
|
||||
@ -340,10 +334,8 @@ struct nzlist {
|
||||
.Ed
|
||||
.Bl -tag -width nz_size
|
||||
.It Fa nlist
|
||||
.Po
|
||||
see
|
||||
.Xr nlist 3
|
||||
.Pc .
|
||||
(see
|
||||
.Xr nlist 3 ) .
|
||||
.It Fa nz_size
|
||||
The size of the data represented by this symbol.
|
||||
.El
|
||||
|
@ -346,10 +346,8 @@ Set to
|
||||
.Dq YES
|
||||
if you want to run
|
||||
.Xr df 1
|
||||
.Po
|
||||
with the arguments supplied in
|
||||
.Va daily_status_disks_df_flags
|
||||
.Pc
|
||||
(with the arguments supplied in
|
||||
.Va daily_status_disks_df_flags )
|
||||
and
|
||||
.Ic dump -W .
|
||||
.It Va daily_status_disks_df_flags
|
||||
|
@ -168,11 +168,9 @@ if you are not running NIS.
|
||||
.It Va dhcp_program
|
||||
.Pq Vt str
|
||||
Path to the DHCP client program
|
||||
.Po
|
||||
.Pa /sbin/dhclient ,
|
||||
.Pa ( /sbin/dhclient ,
|
||||
the ISC DHCP client,
|
||||
is the default
|
||||
.Pc .
|
||||
is the default).
|
||||
.It Va dhcp_flags
|
||||
.Pq Vt str
|
||||
Additional flags to pass to the DHCP client program.
|
||||
@ -1681,10 +1679,8 @@ at system boot time.
|
||||
.It Va sshd_program
|
||||
.Pq Vt str
|
||||
Path to the SSH server program
|
||||
.Po
|
||||
.Pa /usr/sbin/sshd
|
||||
is the default
|
||||
.Pc .
|
||||
.Pa ( /usr/sbin/sshd
|
||||
is the default).
|
||||
.It Va sshd_enable
|
||||
.Pq Vt bool
|
||||
Set to
|
||||
|
@ -85,7 +85,7 @@ The following targets will be run automatically by each proceeding
|
||||
target in order. That is,
|
||||
.Ar build
|
||||
will be run
|
||||
.Pq if necessary
|
||||
(if necessary)
|
||||
by
|
||||
.Ar install ,
|
||||
and so on all the way to
|
||||
@ -108,7 +108,7 @@ Defining
|
||||
will skip this step.
|
||||
.It Ar depends
|
||||
Install
|
||||
.Pq or compile if only compilation is necessary
|
||||
(or compile if only compilation is necessary)
|
||||
any dependencies of the current port. When called by the
|
||||
.Ar extract
|
||||
or
|
||||
@ -160,7 +160,7 @@ portion recurses to dependencies unless
|
||||
is defined, but the
|
||||
.Sq distclean
|
||||
portion never recurses
|
||||
.Pq this is perhaps a bug .
|
||||
(this is perhaps a bug).
|
||||
.It Ar reinstall
|
||||
Use this to restore a port after using
|
||||
.Xr pkg_delete 1
|
||||
@ -258,12 +258,10 @@ The full path to the package.
|
||||
.El
|
||||
.It Ev PREFIX
|
||||
Where to install things in general
|
||||
.Po
|
||||
usually
|
||||
(usually
|
||||
.Pa /usr/local
|
||||
or
|
||||
.Pa /usr/X11R6
|
||||
.Pc
|
||||
.Pa /usr/X11R6 )
|
||||
.It Ev MASTER_SITES
|
||||
Primary sites for distribution files if not found locally.
|
||||
.It Ev PATCH_SITES
|
||||
@ -295,11 +293,9 @@ If defined, only operate on a port if it can be installed 100% automatically.
|
||||
.Bl -tag -width /usr/ports/xxxx -compact
|
||||
.It Pa /usr/ports
|
||||
The default ports directory
|
||||
.Po
|
||||
.Fx
|
||||
.No ( Fx
|
||||
and
|
||||
.Ox
|
||||
.Pc .
|
||||
.Ox ) .
|
||||
.It Pa /usr/pkgsrc
|
||||
The default ports directory (NetBSD).
|
||||
.It Pa /usr/ports/Mk/bsd.port.mk
|
||||
@ -324,7 +320,7 @@ The
|
||||
handbook
|
||||
.Pp
|
||||
http://www.FreeBSD.org/ports
|
||||
.Pq searchable index of all ports
|
||||
(searchable index of all ports)
|
||||
.Sh AUTHORS
|
||||
.An -nosplit
|
||||
This man page was originated by
|
||||
|
@ -37,10 +37,8 @@ detection is one of the single most important aspects of any security
|
||||
mechanism. For example, it makes little sense to set the
|
||||
.Pa schg
|
||||
flags
|
||||
.Po
|
||||
see
|
||||
.Xr chflags 1
|
||||
.Pc
|
||||
(see
|
||||
.Xr chflags 1 )
|
||||
on every system binary because while this may temporarily protect the
|
||||
binaries, it prevents a hacker who has broken in from making an
|
||||
easily detectable change that may result in your security mechanisms not
|
||||
@ -81,9 +79,7 @@ sysadmins still run standard telnetd, rlogind, rshd, and ftpd servers on their
|
||||
machines. These servers, by default, do not operate over encrypted
|
||||
connections. The result is that if you have any moderate-sized user base,
|
||||
one or more of your users logging into your system from a remote location
|
||||
.Po
|
||||
which is the most common and convenient way to login to a system
|
||||
.Pc
|
||||
(which is the most common and convenient way to login to a system)
|
||||
will
|
||||
have his or her password sniffed. The attentive system admin will analyze
|
||||
his remote access logs looking for suspicious source addresses
|
||||
@ -157,7 +153,8 @@ Of course, as a sysadmin you have to be able to get to root, so we open up
|
||||
a few holes. But we make sure these holes require additional password
|
||||
verification to operate. One way to make root accessible is to add appropriate
|
||||
staff accounts to the wheel group
|
||||
.Pq in Pa /etc/group .
|
||||
(in
|
||||
.Pa /etc/group ) .
|
||||
The staff members placed
|
||||
in the wheel group are allowed to
|
||||
.Sq su
|
||||
@ -194,7 +191,7 @@ key pair. When you use something like kerberos you generally must secure
|
||||
the machines which run the kerberos servers and your desktop workstation.
|
||||
When you use a public/private key pair with ssh, you must generally secure
|
||||
the machine you are logging in FROM
|
||||
.Pq typically your workstation ,
|
||||
(typically your workstation),
|
||||
but you can
|
||||
also add an additional layer of protection to the key pair by password
|
||||
protecting the keypair when you create it with
|
||||
@ -228,7 +225,7 @@ changing a password on N machines can be a mess. You can also impose
|
||||
re-passwording restrictions with kerberos: not only can a kerberos ticket
|
||||
be made to timeout after a while, but the kerberos system can require that
|
||||
the user choose a new password after a certain period of time
|
||||
.Pq say, once a month .
|
||||
(say, once a month).
|
||||
.Sh SECURING ROOT - ROOT-RUN SERVERS AND SUID/SGID BINARIES
|
||||
The prudent sysadmin only runs the servers he needs to, no more, no less. Be
|
||||
aware that third party servers are often the most bug-prone. For example,
|
||||
@ -260,7 +257,7 @@ There are a number of other servers that typically do not run in sandboxes:
|
||||
sendmail, popper, imapd, ftpd, and others. There are alternatives to
|
||||
some of these, but installing them may require more work then you are willing
|
||||
to put
|
||||
.Pq the convenience factor strikes again .
|
||||
(the convenience factor strikes again).
|
||||
You may have to run these
|
||||
servers as root and rely on other mechanisms to detect break-ins that might
|
||||
occur through them.
|
||||
@ -277,12 +274,12 @@ While nothing is 100% safe,
|
||||
the system-default suid and sgid binaries can be considered reasonably safe.
|
||||
Still, root holes are occasionally found in these binaries. A root hole
|
||||
was found in Xlib in 1998 that made xterm
|
||||
.Pq which is typically suid
|
||||
(which is typically suid)
|
||||
vulnerable.
|
||||
It is better to be safe then sorry and the prudent sysadmin will restrict suid
|
||||
binaries that only staff should run to a special group that only staff can
|
||||
access, and get rid of
|
||||
.Pq chmod 000
|
||||
.Pq Li "chmod 000"
|
||||
any suid binaries that nobody uses. A
|
||||
server with no display generally does not need an xterm binary. Sgid binaries
|
||||
can be almost as dangerous. If an intruder can break an sgid-kmem binary the
|
||||
@ -319,11 +316,9 @@ attacker cannot obtain root-write access.
|
||||
.Pp
|
||||
Your security scripts should always check for and report changes to
|
||||
the password file
|
||||
.Po
|
||||
see
|
||||
(see
|
||||
.Sq Checking file integrity
|
||||
below
|
||||
.Pc .
|
||||
below).
|
||||
.Sh SECURING THE KERNEL CORE, RAW DEVICES, AND FILESYSTEMS
|
||||
If an attacker breaks root he can do just about anything, but there
|
||||
are certain conveniences. For example, most modern kernels have a
|
||||
@ -442,19 +437,15 @@ idea. The
|
||||
and
|
||||
.Sq nosuid
|
||||
options
|
||||
.Po
|
||||
see
|
||||
.Xr mount 8
|
||||
.Pc
|
||||
(see
|
||||
.Xr mount 8 )
|
||||
are what you want to look into. I would scan them anyway at least once a
|
||||
week, since the object of this layer is to detect a break-in whether or
|
||||
not the breakin is effective.
|
||||
.Pp
|
||||
Process accounting
|
||||
.Po
|
||||
see
|
||||
.Xr accton 8
|
||||
.Pc
|
||||
(see
|
||||
.Xr accton 8 )
|
||||
is a relatively low-overhead feature of
|
||||
the operating system which I recommend using as a post-break-in evaluation
|
||||
mechanism. It is especially useful in tracking down how an intruder has
|
||||
@ -493,10 +484,8 @@ Kernel Route Cache
|
||||
A common DOS attack is against a forking server that attempts to cause the
|
||||
server to eat processes, file descriptors, and memory until the machine
|
||||
dies. Inetd
|
||||
.Po
|
||||
see
|
||||
.Xr inetd 8
|
||||
.Pc
|
||||
(see
|
||||
.Xr inetd 8 )
|
||||
has several options to limit this sort of attack.
|
||||
It should be noted that while it is possible to prevent a machine from going
|
||||
down it is not generally possible to prevent a service from being disrupted
|
||||
@ -557,7 +546,7 @@ firewall everything *except* ports A, B, C, D, and M-Z
|
||||
This
|
||||
way you can firewall off all of your low ports except for certain specific
|
||||
services such as named
|
||||
.Pq if you are primary for a zone ,
|
||||
(if you are primary for a zone),
|
||||
ntalkd, sendmail,
|
||||
and other internet-accessible services.
|
||||
If you try to configure the firewall the other
|
||||
@ -572,15 +561,13 @@ without compromising your low ports. Also take note that
|
||||
allows you to
|
||||
control the range of port numbers used for dynamic binding via the various
|
||||
net.inet.ip.portrange sysctl's
|
||||
.Pq sysctl -a \&| fgrep portrange ,
|
||||
.Pq Li "sysctl -a | fgrep portrange" ,
|
||||
which can also
|
||||
ease the complexity of your firewall's configuration. I usually use a normal
|
||||
first/last range of 4000 to 5000, and a hiport range of 49152 to 65535, then
|
||||
block everything under 4000 off in my firewall
|
||||
.Po
|
||||
except for certain specific
|
||||
internet-accessible ports, of course
|
||||
.Pc .
|
||||
(except for certain specific
|
||||
internet-accessible ports, of course).
|
||||
.Pp
|
||||
Another common DOS attack is called a springboard attack - to attack a server
|
||||
in a manner that causes the server to generate responses which then overload
|
||||
@ -628,7 +615,7 @@ If your servers are connected to the internet via a T3 or better it may be
|
||||
prudent to manually override both rtexpire and rtminexpire via
|
||||
.Xr sysctl 8 .
|
||||
Never set either parameter to zero
|
||||
.Pq unless you want to crash the machine :-) .
|
||||
(unless you want to crash the machine :-)).
|
||||
Setting both parameters to 2 seconds should be sufficient to protect the route
|
||||
table from attack.
|
||||
.Sh ACCESS ISSUES WITH KERBEROS AND SSH
|
||||
|
@ -64,7 +64,7 @@ driver.
|
||||
.It Dv CD_Q_BCD_TRACKS
|
||||
This flag is for broken drives that return the track numbers in packed BCD
|
||||
instead of straight decimal. If the drive seems to skip tracks
|
||||
.Pq tracks 10-15 are skipped
|
||||
(tracks 10-15 are skipped)
|
||||
then you have a drive that is in need of this flag.
|
||||
.It Dv CD_Q_NO_CHANGER
|
||||
This flag tells the driver that the device in question is not a changer.
|
||||
|
@ -628,11 +628,9 @@ The local address of the interface.
|
||||
.Pq Li "struct sockaddr *"
|
||||
The remote address of point-to-point interfaces, and the broadcast
|
||||
address of broadcast interfaces.
|
||||
.Po
|
||||
.Li ifa_broadaddr
|
||||
.Li ( ifa_broadaddr
|
||||
is a macro for
|
||||
.Li ifa_dstaddr .
|
||||
.Pc
|
||||
.Li ifa_dstaddr . )
|
||||
.It Li ifa_netmask
|
||||
.Pq Li "struct sockaddr *"
|
||||
The network mask for multi-access interfaces, and the confusion
|
||||
|
@ -114,7 +114,7 @@
|
||||
An mbuf is a basic unit of memory management in the kernel IPC subsystem.
|
||||
Network packets and socket buffers are stored in mbufs.
|
||||
A network packet may span multiple mbufs arranged into a chain
|
||||
.Pq linked list ,
|
||||
(linked list),
|
||||
which allows adding or trimming
|
||||
network headers with little overhead.
|
||||
.Pp
|
||||
@ -279,10 +279,8 @@ is set to
|
||||
a failed allocation will result in the caller being put
|
||||
to sleep for a designated
|
||||
kern.ipc.mbuf_wait
|
||||
.Po
|
||||
.Xr sysctl 8
|
||||
tunable
|
||||
.Pc
|
||||
.Xr ( sysctl 8
|
||||
tunable)
|
||||
number of ticks.
|
||||
A number of other mbuf-related
|
||||
functions and macros have the same argument because they may
|
||||
@ -303,7 +301,7 @@ This macro operates on an mbuf chain.
|
||||
It is an optimized wrapper for
|
||||
.Fn m_prepend
|
||||
that can make use of possible empty space before data
|
||||
.Pq "e.g. left after trimming of a link-layer header" .
|
||||
(e.g. left after trimming of a link-layer header).
|
||||
The new chain pointer or
|
||||
.Dv NULL
|
||||
is in
|
||||
@ -404,7 +402,7 @@ so they are accessible with
|
||||
Return the new chain on success,
|
||||
.Dv NULL
|
||||
on failure
|
||||
.Pq the chain is freed in this case .
|
||||
(the chain is freed in this case).
|
||||
.Sy Note :
|
||||
It doesn't allocate any clusters, so
|
||||
.Fa len
|
||||
|
@ -74,7 +74,7 @@ voluntarily relinquishes the CPU to wait for some resource to become
|
||||
available.
|
||||
.It
|
||||
after handling a trap
|
||||
.Pq e.g. a system call, device interrupt
|
||||
(e.g. a system call, device interrupt)
|
||||
when the kernel prepares a return to user-mode execution.
|
||||
This case is
|
||||
typically handled by machine dependent trap-handling code after detection
|
||||
@ -86,7 +86,8 @@ the machine defined
|
||||
.Fn need_resched .
|
||||
.It
|
||||
in the signal handling code
|
||||
.Pq see Xr issignal 9
|
||||
(see
|
||||
.Xr issignal 9 )
|
||||
if a signal is delivered that causes a process to stop.
|
||||
.El
|
||||
.Pp
|
||||
@ -94,7 +95,8 @@ if a signal is delivered that causes a process to stop.
|
||||
records the amount of time the current process has been running in the
|
||||
process structure and checks this value against the CPU time limits
|
||||
allocated to the process
|
||||
.Pq see Xr getrlimit 2 .
|
||||
(see
|
||||
.Xr getrlimit 2 ) .
|
||||
Exceeding the soft limit results in a
|
||||
.Dv SIGXCPU
|
||||
signal to be posted to the process, while exceeding the hard limit will
|
||||
|
@ -83,14 +83,15 @@ The target process is currently ignoring the signal.
|
||||
.It
|
||||
If a stop signal is sent to a sleeping process that takes the
|
||||
default action
|
||||
.Pq see Xr sigaction 2 ,
|
||||
(see
|
||||
.Xr sigaction 2 ) ,
|
||||
the process is stopped without awakening it.
|
||||
.It
|
||||
.Dv SIGCONT
|
||||
restarts a stopped process
|
||||
.Pq or puts them back to sleep
|
||||
(or puts them back to sleep)
|
||||
regardless of the signal action
|
||||
.Pq e.g., blocked or ignored .
|
||||
(e.g., blocked or ignored).
|
||||
.El
|
||||
.Pp
|
||||
If the target process is being traced
|
||||
|
@ -109,7 +109,8 @@ is returned if the current system call should be restarted if
|
||||
possible, and
|
||||
.Er EINTR
|
||||
is returned if the system call should be interrupted by the signal
|
||||
.Pq return Er EINTR .
|
||||
(return
|
||||
.Er EINTR ) .
|
||||
.Pp
|
||||
.Nm Msleep
|
||||
is a variation on tsleep. The parameter
|
||||
|
@ -133,11 +133,9 @@ all in lowercase and the macro has the same name all in uppercase.
|
||||
.\" functions are used.
|
||||
If a
|
||||
macro needs more than a single line, use braces
|
||||
.Po
|
||||
.Sq \&{
|
||||
.Sq ( \&{
|
||||
and
|
||||
.Sq \&}
|
||||
.Pc .
|
||||
.Sq \&} ) .
|
||||
Right-justify the
|
||||
backslashes; it makes it easier to read.
|
||||
If the macro encapsulates a compound statement, enclose it in a
|
||||
@ -528,11 +526,9 @@ The usage statement should be structured in the following order:
|
||||
Options without operands come first,
|
||||
in alphabetical order,
|
||||
inside a single set of brackets
|
||||
.Po
|
||||
.Sq \&[
|
||||
.Sq ( \&[
|
||||
and
|
||||
.Sq \&]
|
||||
.Pc .
|
||||
.Sq \&] ) .
|
||||
.It
|
||||
Options with operands come next,
|
||||
also in alphabetical order,
|
||||
|
@ -1112,9 +1112,9 @@ Terminals that use
|
||||
.Dq %.\&
|
||||
need to be able to
|
||||
backspace the cursor
|
||||
.Po Sy \&le Pc
|
||||
.Pq Sy \&le
|
||||
and to move the cursor up one line on the screen
|
||||
.Po Sy \&up Pc .
|
||||
.Pq Sy \&up .
|
||||
This is necessary because it is not always safe to transmit
|
||||
.Sy \&\en ,
|
||||
.Sy \&^D ,
|
||||
|
@ -170,12 +170,10 @@ Mainly useful for debugging when the log file is viewed continuously with
|
||||
.It Dv PKT_ALIAS_DENY_INCOMING
|
||||
If this mode bit is set, all incoming packets associated with new TCP
|
||||
connections or new UDP transactions will be marked for being ignored
|
||||
.Po
|
||||
.Fn PacketAliasIn
|
||||
.Fn ( PacketAliasIn
|
||||
returns
|
||||
.Dv PKT_ALIAS_IGNORED
|
||||
code
|
||||
.Pc
|
||||
code)
|
||||
by the calling program.
|
||||
Response packets to connections or transactions initiated from the packet
|
||||
aliasing host or local network will be unaffected.
|
||||
|
@ -84,7 +84,8 @@ Show only what would be done, but do not send any signal.
|
||||
Send a different signal instead of the default
|
||||
.Dv TERM .
|
||||
The signal may be specified either as a name
|
||||
.Pq with \&or without a leading Dv SIG ,
|
||||
(with or without a leading
|
||||
.Dv SIG ) ,
|
||||
or numerically.
|
||||
.It Fl u Ar user
|
||||
Limit potentially matching processes to those belonging to
|
||||
|
@ -55,14 +55,12 @@ and contains the pathnames
|
||||
of all files which are publicly accessible.
|
||||
.Pp
|
||||
Shell globbing and quoting characters
|
||||
.Po
|
||||
.Dq * ,
|
||||
.Dq ( * ,
|
||||
.Dq \&? ,
|
||||
.Dq \e ,
|
||||
.Dq \&[
|
||||
and
|
||||
.Dq \&]
|
||||
.Pc
|
||||
.Dq \&] )
|
||||
may be used in
|
||||
.Ar pattern ,
|
||||
although they will have to be escaped from the shell.
|
||||
|
@ -134,9 +134,7 @@ to save all or part of the pattern space for subsequent retrieval.
|
||||
An address is not required, but if specified must be a number (that counts
|
||||
input lines
|
||||
cumulatively across input files), a dollar
|
||||
.Po
|
||||
.Dq $
|
||||
.Pc
|
||||
.Pq Dq $
|
||||
character that addresses the last line of input, or a context address
|
||||
(which consists of a regular expression preceded and followed by a
|
||||
delimiter).
|
||||
@ -161,9 +159,7 @@ starts looking again for the first address.
|
||||
.Pp
|
||||
Editing commands can be applied to non-selected pattern spaces by use
|
||||
of the exclamation character
|
||||
.Po
|
||||
.Dq \&!
|
||||
.Pc
|
||||
.Pq Dq \&!
|
||||
function.
|
||||
.Sh "Sed Regular Expressions"
|
||||
The regular expressions used in
|
||||
@ -182,9 +178,7 @@ has the following two additions to regular expressions:
|
||||
.Bl -enum -compact
|
||||
.It
|
||||
In a context address, any character other than a backslash
|
||||
.Po
|
||||
.Dq \e
|
||||
.Pc
|
||||
.Pq Dq \e
|
||||
or newline character may be used to delimit the regular expression.
|
||||
Also, putting a backslash character before the delimiting character
|
||||
causes the character to be treated literally.
|
||||
@ -400,9 +394,7 @@ Within the RE and the replacement, the RE delimiter itself can be used as
|
||||
a literal character if it is preceded by a backslash.
|
||||
.Pp
|
||||
An ampersand
|
||||
.Po
|
||||
.Dq &
|
||||
.Pc
|
||||
.Pq Dq &
|
||||
appearing in the replacement is replaced by the string matching the RE.
|
||||
The special meaning of
|
||||
.Dq &
|
||||
|
@ -632,10 +632,10 @@ with
|
||||
obvious meanings, or it can be a numeric expression,
|
||||
in which case a non-zero value is true.
|
||||
.Bl -tag -width Fl
|
||||
.It Xo
|
||||
.Ic alias Ns Po Bq Aq Ar string ,
|
||||
.Bq Aq Ar string\-list Pc
|
||||
.Xc
|
||||
.It Ic alias Ns Po
|
||||
.Bq Aq Ar string ,
|
||||
.Bq Aq Ar string\-list
|
||||
.Pc
|
||||
If no argument is given, all currently defined alias macros are
|
||||
listed. Otherwise,
|
||||
.Aq Ar string
|
||||
|
@ -48,12 +48,12 @@ command analyzes ACPI tables in physical memory and dumps them to standard outpu
|
||||
In addition,
|
||||
.Nm
|
||||
can disassemble some contents of the tables in AML
|
||||
.Pq ACPI Machine Language
|
||||
(ACPI Machine Language)
|
||||
and dump them in ASL
|
||||
.Pq ACPI Source Language .
|
||||
(ACPI Source Language).
|
||||
.Pp
|
||||
ACPI tables have an notably essential data block called DSDT
|
||||
.Pq Differentiated System Description Table ,
|
||||
(Differentiated System Description Table),
|
||||
that includes information used on the kernel side such as
|
||||
detail information about PnP hardware, procedures for controlling
|
||||
a power management support and so on.
|
||||
@ -71,12 +71,12 @@ and dump them. First, it searches Root System Description Pointer,
|
||||
that has a signature
|
||||
.Qq RSD PTR\ \& ,
|
||||
and then gets RSDT
|
||||
.Pq Root System Description Table ,
|
||||
(Root System Description Table),
|
||||
which includes a list of pointers to physical memory addresses
|
||||
for other tables.
|
||||
RSDT itself and all other tables linked from RSDT are generically
|
||||
called SDT
|
||||
.Pq System Description Table
|
||||
(System Description Table)
|
||||
and their header has the common format which consists of items
|
||||
such as Signature, Length, Revision, Checksum, OEMID, OEM Table ID,
|
||||
OEM Revision, Creator ID and Creator Revision.
|
||||
@ -88,13 +88,13 @@ see chapter 5: ACPI Software Programming Model,
|
||||
from Intel/Microsoft/Toshiba.
|
||||
.Pp
|
||||
There is always a pointer to a physical memory address in RSDT for FACP
|
||||
.Pq Fixed ACPI Description Table .
|
||||
(Fixed ACPI Description Table).
|
||||
FACP defines static system information about power management support
|
||||
.Pq ACPI Hardware Register Implementation
|
||||
(ACPI Hardware Register Implementation)
|
||||
such as interrupt mode
|
||||
.Pq INT_MODEL ,
|
||||
(INT_MODEL),
|
||||
SCI interrupt number, SMI command port
|
||||
.Pq SMI_CMD
|
||||
(SMI_CMD)
|
||||
and location of ACPI registers.
|
||||
FACP also has a pointer to a physical memory address for DSDT,
|
||||
which includes information used on the kernel side such as
|
||||
@ -131,7 +131,7 @@ simultaneously on a machine that supports ACPI BIOS.
|
||||
In the current implementation,
|
||||
.Nm
|
||||
doesn't dump any information of Firmware ACPI Control Structure
|
||||
.Pq FACS
|
||||
(FACS)
|
||||
specified by a pointer in FACP.
|
||||
Some parts of output in ASL are incomplete. To obtain a complete
|
||||
output, it would need to change the implementation into another one
|
||||
|
@ -34,7 +34,7 @@
|
||||
.Sh NAME
|
||||
.Nm amldb
|
||||
.Nd executing and debugging AML interpreter
|
||||
.Pq with DSDT files
|
||||
(with DSDT files)
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl dhst
|
||||
@ -42,10 +42,10 @@
|
||||
.Sh DESCRIPTION
|
||||
.Nm Amldb
|
||||
parses the DSDT
|
||||
.Pq Differentiated System Description Table
|
||||
(Differentiated System Description Table)
|
||||
files, which usually are acquired from ACPI BIOS, and executes
|
||||
the sequence of ACPI Control Methods described in AML
|
||||
.Pq ACPI Machine Language
|
||||
(ACPI Machine Language)
|
||||
with its AML interpreter.
|
||||
.Nm Amldb
|
||||
also has a simple ACPI virtual machine. During execution of the
|
||||
@ -62,7 +62,7 @@ with ACPI BIOS through
|
||||
.Xr acpidump 8 .
|
||||
The DSDT is a table, a part of the whole ACPI memory table
|
||||
located in somewhere in the BIOS area
|
||||
.Pq 0xa0000 \- 0x100000 .
|
||||
.Pq Li 0xa0000 \- 0x100000 .
|
||||
It includes such information as the detailed hardware information
|
||||
for PnP, and the set of procedures which perform power management from
|
||||
the OS. The information is stored in AML format.
|
||||
@ -71,7 +71,7 @@ The AML interpreter can execute any of the Control Methods specified
|
||||
by users. When executed, it interprets the byte sequence in the
|
||||
Control Method of DSDT, and disassembles the opecodes that it
|
||||
recognizes into ASL
|
||||
.Pq ACPI Source Language
|
||||
(ACPI Source Language)
|
||||
format to be displayed.
|
||||
.Pp
|
||||
If it encounters one of more accesses to the region such as
|
||||
@ -197,7 +197,7 @@ Lists the named objects that includes the specified string as the
|
||||
terminate elements searching from the ACPI namespace. For the
|
||||
namespace is expressed as the sequence of four-character elements,
|
||||
appropriate number of additional underscore
|
||||
.Pq Sq _
|
||||
.Pq Ql _
|
||||
characters are necessary for specifying objects which have less than four
|
||||
character string. Unless additional underscores specified, matching
|
||||
occurs as the beginning of word with the specified number of characters.
|
||||
@ -232,10 +232,10 @@ The following is an example including, invoking the
|
||||
.Nm ,
|
||||
searching
|
||||
.Li _PRS
|
||||
.Pq Possible Resource Settings
|
||||
(Possible Resource Settings)
|
||||
objects, and executing the
|
||||
.Li _PTS
|
||||
.Pq Prepare To Sleep
|
||||
(Prepare To Sleep)
|
||||
Control Method by the AML interpreter.
|
||||
.Bd -literal -offset indent
|
||||
% amldb p2b.dsdt.dat
|
||||
|
@ -42,7 +42,7 @@
|
||||
.Sh DESCRIPTION
|
||||
.Nm Apmd
|
||||
monitors the occurrence of the specified Advanced Power Management
|
||||
.Pq APM
|
||||
.Pq Tn APM
|
||||
events and, if one of the events occurs, it executes the sequence of
|
||||
commands corresponding to the event. Only the events specified in the
|
||||
configuration file are notified to
|
||||
@ -77,10 +77,8 @@ Verbose mode.
|
||||
When
|
||||
.Nm
|
||||
starts, it reads the configuration file
|
||||
.Po
|
||||
.Pa /etc/apmd.conf
|
||||
as default
|
||||
.Pc
|
||||
.Pa ( /etc/apmd.conf
|
||||
as default)
|
||||
and notifies the set of events to be monitored to the APM device driver.
|
||||
When it terminates, the APM device driver automatically cancels
|
||||
monitored events.
|
||||
|
@ -158,4 +158,4 @@ The
|
||||
command and this manpage was contributed by
|
||||
.An S\(/oren Schmidt ,
|
||||
Denmark
|
||||
.Pq sos@FreeBSD.org .
|
||||
.Aq sos@FreeBSD.org .
|
||||
|
@ -41,7 +41,7 @@ The CTM statements are as follows.
|
||||
This is the overall begin of a CTM delta file. The
|
||||
.Ar version
|
||||
field must match the program version
|
||||
.Pq currently 2.0 .
|
||||
(currently 2.0).
|
||||
.Ar Name
|
||||
is the name and
|
||||
.Ar number
|
||||
@ -51,11 +51,9 @@ to see if the delta has already been applied.
|
||||
.Ar Timestamp
|
||||
contains the year, month, day, hour, minute, and second of the
|
||||
time of delta creation for reference
|
||||
.Po
|
||||
followed by the letter
|
||||
(followed by the letter
|
||||
.Sq Z
|
||||
meaning this is a UTC timestamp
|
||||
.Pc .
|
||||
meaning this is a UTC timestamp).
|
||||
The
|
||||
.Ar prefix
|
||||
field is currently not implemented.
|
||||
@ -69,13 +67,13 @@ Make the file
|
||||
.Ar name ,
|
||||
the original file had the uid
|
||||
.Ar uid
|
||||
.Pq numerical, decimal ,
|
||||
(numerical, decimal),
|
||||
the gid
|
||||
.Ar gid
|
||||
.Pq numerical, decimal ,
|
||||
(numerical, decimal),
|
||||
mode
|
||||
.Ar mode
|
||||
.Pq numerical, octal ,
|
||||
(numerical, octal),
|
||||
and the MD5 checksum
|
||||
.Ar md5 .
|
||||
.Pp
|
||||
@ -87,13 +85,13 @@ Substitute the contents of file
|
||||
.Ar name ,
|
||||
the original file had the new uid
|
||||
.Ar uid
|
||||
.Pq numerical, decimal ,
|
||||
(numerical, decimal),
|
||||
the new gid
|
||||
.Ar gid
|
||||
.Pq numerical, decimal ,
|
||||
(numerical, decimal),
|
||||
new mode
|
||||
.Ar mode
|
||||
.Pq numerical, octal ,
|
||||
(numerical, octal),
|
||||
the old MD5 checksum
|
||||
.Ar md5before ,
|
||||
and the new MD5 checksum
|
||||
@ -142,7 +140,7 @@ is to be removed.
|
||||
.Sh EXAMPLES
|
||||
In the following example, long lines have been folded to make them
|
||||
printable
|
||||
.Pq marked by backslashes .
|
||||
(marked by backslashes).
|
||||
.Bd -literal
|
||||
CTM_BEGIN 2.0 cvs-cur 485 19950324214652Z .
|
||||
CTMFR src/sys/gnu/i386/isa/scd.c,v 5225f13aa3c7e458f9dd0d4bb637b18d
|
||||
|
@ -200,7 +200,7 @@ on client.
|
||||
Inactive sessions will be disconnected in 30 minutes,
|
||||
to avoid stale sessions from chewing up resources.
|
||||
This may be inappropriate for some of the services
|
||||
.Pq should this be configurable? .
|
||||
(should this be configurable?).
|
||||
.Ss inetd mode
|
||||
When
|
||||
.Nm
|
||||
@ -237,12 +237,10 @@ To prevent malicious accesses,
|
||||
implements a simple address-based access control.
|
||||
With
|
||||
.Pa /etc/faithd.conf
|
||||
.Po
|
||||
or
|
||||
(or
|
||||
.Ar configfile
|
||||
specified by
|
||||
.Fl f
|
||||
.Pc ,
|
||||
.Fl f ) ,
|
||||
.Nm
|
||||
will avoid relaying unwanted traffic.
|
||||
The
|
||||
@ -398,7 +396,7 @@ It is very insecure to use
|
||||
.Xr rhosts 5
|
||||
and other IP-address based authentication, for connections relayed by
|
||||
.Nm
|
||||
.Pq and any other TCP relaying services .
|
||||
(and any other TCP relaying services).
|
||||
.Pp
|
||||
Administrators are advised to limit accesses to
|
||||
.Nm
|
||||
|
@ -50,10 +50,8 @@ should be a character device.
|
||||
.Nm Fdcontrol
|
||||
currently supports the specification of device parameters for the
|
||||
floppy disk drive
|
||||
.Po
|
||||
.Fl s ,
|
||||
also default mode
|
||||
.Pc ,
|
||||
.Fl ( s ,
|
||||
also default mode),
|
||||
or it allows the modification of the driver debug level, in case the
|
||||
floppy driver has been compiled into the kernel with the
|
||||
.Em DEBUG
|
||||
@ -83,7 +81,7 @@ silly and likely to change in future, options should be provided to
|
||||
allow anything being modified from the command line.
|
||||
.Pp
|
||||
The driver does actually support only two debug levels
|
||||
.Pq 0 and 1 ,
|
||||
(0 and 1),
|
||||
where debug level 1 will generate huge amounts of output.
|
||||
It is likely
|
||||
to overflow the syslog if not used with extreme care.
|
||||
|
@ -54,9 +54,11 @@ formats a floppy disk at device
|
||||
.Ar Device_name
|
||||
may be given either with a full path
|
||||
name of a device node for a floppy disk drive
|
||||
.Pq e.g. Pa /dev/fd0 ,
|
||||
(e.g.\&
|
||||
.Pa /dev/fd0 ) ,
|
||||
or a default name in an abbreviated form
|
||||
.Pq e.g. Em fd0 .
|
||||
(e.g.\&
|
||||
.Em fd0 ) .
|
||||
In the latter case, the name is constructed by prepending
|
||||
.Pa /dev/
|
||||
and appending a
|
||||
@ -64,7 +66,7 @@ and appending a
|
||||
to the
|
||||
.Ar device_name .
|
||||
Note that any geometry constraints of the device node
|
||||
.Pq minor device number
|
||||
(minor device number)
|
||||
are meaningless, since they're overridden by
|
||||
.Nm .
|
||||
.Pp
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user