View | Details | Raw Unified | Return to bug 168016
Collapse All | Expand All

(-)src/sbin/atacontrol/atacontrol.8 (-2 / +2 lines)
Lines 367-374 Link Here
367
or syslog logging on it as the disk will be worn out spinning down and
367
or syslog logging on it as the disk will be worn out spinning down and
368
up all the time.
368
up all the time.
369
.Sh SEE ALSO
369
.Sh SEE ALSO
370
.Xr ata 4
370
.Xr ata 4 ,
371
.Xr cam 4
371
.Xr cam 4 ,
372
.Xr camcontrol 8
372
.Xr camcontrol 8
373
.Sh HISTORY
373
.Sh HISTORY
374
The
374
The
(-)src/sys/boot/forth/beastie.4th.8 (-1 / +1 lines)
Lines 29-35 Link Here
29
.Os
29
.Os
30
.Sh NAME
30
.Sh NAME
31
.Nm beastie.4th
31
.Nm beastie.4th
32
.Nd FreeBSD ASCII art boot module.
32
.Nd FreeBSD ASCII art boot module
33
.Sh DESCRIPTION
33
.Sh DESCRIPTION
34
The file that goes by the name of
34
The file that goes by the name of
35
.Nm
35
.Nm
(-)src/sys/boot/forth/brand.4th.8 (-1 / +1 lines)
Lines 29-35 Link Here
29
.Os
29
.Os
30
.Sh NAME
30
.Sh NAME
31
.Nm brand.4th
31
.Nm brand.4th
32
.Nd FreeBSD ASCII art boot module.
32
.Nd FreeBSD ASCII art boot module
33
.Sh DESCRIPTION
33
.Sh DESCRIPTION
34
The file that goes by the name of
34
The file that goes by the name of
35
.Nm
35
.Nm
(-)src/usr.sbin/burncd/burncd.8 (-1 / +1 lines)
Lines 240-246 Link Here
240
is compiled into the kernel, then
240
is compiled into the kernel, then
241
.Xr cdrecord 1 ,
241
.Xr cdrecord 1 ,
242
available in the
242
available in the
243
.Fx
243
.Fx .
244
Ports Collection as part of the
244
Ports Collection as part of the
245
.Pa sysutils/cdrtools
245
.Pa sysutils/cdrtools
246
port, must be used instead.
246
port, must be used instead.
(-)src/sbin/camcontrol/camcontrol.8 (-3 / +3 lines)
Lines 568-574 Link Here
568
.Bl -tag -width 17n
568
.Bl -tag -width 17n
569
.It Fl a Ar cmd Op args
569
.It Fl a Ar cmd Op args
570
This specifies the content of 12 ATA Command Block registers (command,
570
This specifies the content of 12 ATA Command Block registers (command,
571
features, lba_low, lba_mid, lba_high, device, lba_low_exp, lba_mid_exp.
571
features, lba_low, lba_mid, lba_high, device, lba_low_exp, lba_mid_exp,
572
lba_high_exp, features_exp, sector_count, sector_count_exp).
572
lba_high_exp, features_exp, sector_count, sector_count_exp).
573
.It Fl c Ar cmd Op args
573
.It Fl c Ar cmd Op args
574
This specifies the SCSI CDB.
574
This specifies the SCSI CDB.
Lines 1059-1065 Link Here
1059
.It Ic idle
1059
.It Ic idle
1060
Put ATA device into IDLE state. Optional parameter
1060
Put ATA device into IDLE state. Optional parameter
1061
.Pq Fl t
1061
.Pq Fl t
1062
specifies automatic standby timer value in seconds. Value 0 disables timer.
1062
specifies automatic idle timer value in seconds. Value 0 disables timer.
1063
.It Ic standby
1063
.It Ic standby
1064
Put ATA device into STANDBY state. Optional parameter
1064
Put ATA device into STANDBY state. Optional parameter
1065
.Pq Fl t
1065
.Pq Fl t
Lines 1106-1112 Link Here
1106
Run in simulation mode.
1106
Run in simulation mode.
1107
Packet sizes that will be sent are shown, but no actual packet is sent to the
1107
Packet sizes that will be sent are shown, but no actual packet is sent to the
1108
device.
1108
device.
1109
No confimation is asked in simulation mode.
1109
No confirmation is asked in simulation mode.
1110
.It Fl v
1110
.It Fl v
1111
Besides showing sense information in case of a failure, the verbose option
1111
Besides showing sense information in case of a failure, the verbose option
1112
causes
1112
causes
(-)src/sys/boot/forth/check-password.4th.8 (-1 / +1 lines)
Lines 29-35 Link Here
29
.Os
29
.Os
30
.Sh NAME
30
.Sh NAME
31
.Nm check-password.4th
31
.Nm check-password.4th
32
.Nd FreeBSD password-checking boot module.
32
.Nd FreeBSD password-checking boot module
33
.Sh DESCRIPTION
33
.Sh DESCRIPTION
34
The file that goes by the name of
34
The file that goes by the name of
35
.Nm
35
.Nm
(-)src/sys/boot/forth/color.4th.8 (-1 / +1 lines)
Lines 29-35 Link Here
29
.Os
29
.Os
30
.Sh NAME
30
.Sh NAME
31
.Nm color.4th
31
.Nm color.4th
32
.Nd FreeBSD color-detection boot module.
32
.Nd FreeBSD color-detection boot module
33
.Sh DESCRIPTION
33
.Sh DESCRIPTION
34
The file that goes by the name of
34
The file that goes by the name of
35
.Nm
35
.Nm
(-)src/usr.sbin/cpucontrol/cpucontrol.8 (-1 / +1 lines)
Lines 31-37 Link Here
31
.Nm cpucontrol
31
.Nm cpucontrol
32
.Nd control utility for the
32
.Nd control utility for the
33
.Xr cpuctl 4
33
.Xr cpuctl 4
34
device.
34
device
35
.Sh SYNOPSIS
35
.Sh SYNOPSIS
36
.Nm
36
.Nm
37
.Op Fl vh
37
.Op Fl vh
(-)src/usr.sbin/ctladm/ctladm.8 (-6 / +6 lines)
Lines 542-548 Link Here
542
Because this command uses the ioctl port, it will only work when the FETDs
542
Because this command uses the ioctl port, it will only work when the FETDs
543
(Front End Target Drivers) are enabled.
543
(Front End Target Drivers) are enabled.
544
This command is the equivalent of doing a REPORT LUNS on one LUN and then
544
This command is the equivalent of doing a REPORT LUNS on one LUN and then
545
and then an INQUIRY on each LUN in the system.
545
an INQUIRY on each LUN in the system.
546
.It Ic delay
546
.It Ic delay
547
Delay commands at the given location.  There are two places where commands
547
Delay commands at the given location.  There are two places where commands
548
may be delayed currently: before data is transferred
548
may be delayed currently: before data is transferred
Lines 749-755 Link Here
749
As a general rule, the WWNN should be the same across all ports on the
749
As a general rule, the WWNN should be the same across all ports on the
750
system.
750
system.
751
.It Fl W Ar wwpn
751
.It Fl W Ar wwpn
752
Set the World Wide Node Name for the given port.
752
Set the World Wide Port Name for the given port.
753
The
753
The
754
.Fl n
754
.Fl n
755
argument must be specified, since this is only possible to implement on a
755
argument must be specified, since this is only possible to implement on a
Lines 939-948 Link Here
939
.Pa src/usr.sbin/ctladm/src/usr.sbin/ctladm/ctladm.8
939
.Pa src/usr.sbin/ctladm/src/usr.sbin/ctladm/ctladm.8
940
as the backing store, and specify the
940
as the backing store, and specify the
941
.Tn SCSI
941
.Tn SCSI
942
VPD page 0x80 and 0x83 serial number (
942
VPD page 0x80 and 0x83 serial number
943
.Fl S)
943
.Fl ( S )
944
and device ID (
944
and device ID
945
.Fl d).
945
.Fl ( d ) .
946
.Pp
946
.Pp
947
.Dl ctladm remove -b block -l 12
947
.Dl ctladm remove -b block -l 12
948
.Pp
948
.Pp
(-)src/usr.bin/ctlstat/ctlstat.8 (-2 / +2 lines)
Lines 86-93 Link Here
86
No statistics are computed in this mode, only raw numbers are displayed.
86
No statistics are computed in this mode, only raw numbers are displayed.
87
.It Fl l Ar lun
87
.It Fl l Ar lun
88
Request statistics for the specified LUN.
88
Request statistics for the specified LUN.
89
This option is incompatible with total (
89
This option is incompatible with total
90
.Fl t )
90
.Fl ( t )
91
mode.
91
mode.
92
.It Fl n Ar numdevs
92
.It Fl n Ar numdevs
93
Display statistics for this many devices.
93
Display statistics for this many devices.
(-)src/sys/boot/forth/delay.4th.8 (-1 / +1 lines)
Lines 29-35 Link Here
29
.Os
29
.Os
30
.Sh NAME
30
.Sh NAME
31
.Nm delay.4th
31
.Nm delay.4th
32
.Nd FreeBSD debugging boot module.
32
.Nd FreeBSD debugging boot module
33
.Sh DESCRIPTION
33
.Sh DESCRIPTION
34
The file that goes by the name of
34
The file that goes by the name of
35
.Nm
35
.Nm
(-)src/sbin/etherswitchcfg/etherswitchcfg.8 (-1 / +2 lines)
Lines 71-77 Link Here
71
Specifies a list of media options for a port. See
71
Specifies a list of media options for a port. See
72
.Xr ifconfig 8
72
.Xr ifconfig 8
73
for details on
73
for details on
74
.Ar media and
74
.Ar media
75
and
75
.Ar mediaopt .
76
.Ar mediaopt .
76
.El
77
.El
77
.Ss reg
78
.Ss reg
(-)src/usr.sbin/flowctl/flowctl.8 (-1 / +1 lines)
Lines 60-66 Link Here
60
.Dq "show ip cache flow"
60
.Dq "show ip cache flow"
61
command of a Cisco router.
61
command of a Cisco router.
62
It dumps the contents of the flow cache in Cisco-like format.
62
It dumps the contents of the flow cache in Cisco-like format.
63
Specifing either
63
Specifying either
64
.Cm ipv4
64
.Cm ipv4
65
or
65
or
66
.Cm ipv6
66
.Cm ipv6
(-)src/usr.sbin/freebsd-update/freebsd-update.8 (-1 / +1 lines)
Lines 62-68 Link Here
62
.Fx
62
.Fx
63
9.0-CURRENT.
63
9.0-CURRENT.
64
.Sh OPTIONS
64
.Sh OPTIONS
65
The following options are supported
65
The following options are supported:
66
.Bl -tag -width "-f conffile"
66
.Bl -tag -width "-f conffile"
67
.It Fl b Ar basedir
67
.It Fl b Ar basedir
68
Operate on a system mounted at
68
Operate on a system mounted at
(-)src/sbin/geom/class/eli/geli.8 (-1 / +1 lines)
Lines 333-339 Link Here
333
Consult the
333
Consult the
334
.Sx HISTORY
334
.Sx HISTORY
335
section to find which metadata version is supported by which FreeBSD version.
335
section to find which metadata version is supported by which FreeBSD version.
336
Note that using older metadata version may limit numer of features available.
336
Note that using older metadata version may limit number of features available.
337
.El
337
.El
338
.It Cm attach
338
.It Cm attach
339
Attach the given provider.
339
Attach the given provider.
(-)src/sbin/geom/class/multipath/gmultipath.8 (-1 / +1 lines)
Lines 135-141 Link Here
135
method.
135
method.
136
Label the first given provider with on-disk metadata using the specified
136
Label the first given provider with on-disk metadata using the specified
137
.Ar name .
137
.Ar name .
138
The rest of given providers will be retasted to detect these metadata.
138
The rest of given providers will be retested to detect these metadata.
139
It reliably protects against specifying unrelated providers.
139
It reliably protects against specifying unrelated providers.
140
Providers with no matching metadata detected will not be added to the device.
140
Providers with no matching metadata detected will not be added to the device.
141
.Pp
141
.Pp
(-)src/sbin/geom/class/part/gpart.8 (-2 / +2 lines)
Lines 650-656 Link Here
650
for GPT.
650
for GPT.
651
.It Cm ms-ldm-metadata
651
.It Cm ms-ldm-metadata
652
A partition that contains Logical Disk Manager (LDM) database.
652
A partition that contains Logical Disk Manager (LDM) database.
653
The scheme-specifig type is
653
The scheme-specific type is
654
.Qq Li "!5808c8aa-7e8f-42e0-85d2-e1e90434cfb3"
654
.Qq Li "!5808c8aa-7e8f-42e0-85d2-e1e90434cfb3"
655
for GPT.
655
for GPT.
656
.El
656
.El
Lines 971-977 Link Here
971
.Sx "PARTITION TYPES"
971
.Sx "PARTITION TYPES"
972
section).
972
section).
973
If this variable set to 1 each component of the mirrored volume will be
973
If this variable set to 1 each component of the mirrored volume will be
974
present as independet partition.
974
present as independent partition.
975
.Em NOTE :
975
.Em NOTE :
976
This may break a mirrored volume and lead to data damage.
976
This may break a mirrored volume and lead to data damage.
977
.El
977
.El
(-)src/sbin/geom/class/raid/graid.8 (-1 / +1 lines)
Lines 294-300 Link Here
294
.Nm RAID
294
.Nm RAID
295
GEOM class.
295
GEOM class.
296
.It Va kern.geom.raid.idle_threshold : No 1000000
296
.It Va kern.geom.raid.idle_threshold : No 1000000
297
Time in microseconds to consider a volume idle for rebuild puroses.
297
Time in microseconds to consider a volume idle for rebuild purpose.
298
.It Va kern.geom.raid.name_format : No 0
298
.It Va kern.geom.raid.name_format : No 0
299
Providers name format: 0 -- raid/r{num}, 1 -- raid/{label}.
299
Providers name format: 0 -- raid/r{num}, 1 -- raid/{label}.
300
.It Va kern.geom.raid.read_err_thresh : No 10
300
.It Va kern.geom.raid.read_err_thresh : No 10
(-)src/sbin/inum/gvinum.8,v (-4 / +6 lines)
Lines 149-155 Link Here
149
.It Ic raid5 Oo Fl fv Oc Oo Fl s Ar stripesize Oc Oo Fl n Ar name Oc Ar drives
149
.It Ic raid5 Oo Fl fv Oc Oo Fl s Ar stripesize Oc Oo Fl n Ar name Oc Ar drives
150
Create a RAID-5 volume from the specified drives.
150
Create a RAID-5 volume from the specified drives.
151
If no name is specified,a unique name will be set by
151
If no name is specified,a unique name will be set by
152
.Ic gvinum.
152
.Ic gvinum .
153
This organization requires at least three drives.
153
This organization requires at least three drives.
154
.It Ic rename Oo Fl r Oc Ar drive | subdisk | plex | volume newname
154
.It Ic rename Oo Fl r Oc Ar drive | subdisk | plex | volume newname
155
Change the name of the specified object.
155
Change the name of the specified object.
Lines 202-209 Link Here
202
if no parameters are specified.
202
if no parameters are specified.
203
.It Ic stripe Oo Fl fv Oc Oo Fl n Ar name Oc Ar drives
203
.It Ic stripe Oo Fl fv Oc Oo Fl n Ar name Oc Ar drives
204
Create a striped volume from the specified drives. If no name is specified,
204
Create a striped volume from the specified drives. If no name is specified,
205
a unique name will be set by Ic gvinum. This organization requires at least two
205
a unique name will be set by
206
drives.
206
.Ic gvinum .
207
This organization requires at least two drives.
207
.El
208
.El
208
.Sh DESCRIPTION
209
.Sh DESCRIPTION
209
The
210
The
Lines 278-284 Link Here
278
.El
279
.El
279
.Sh EXAMPLES
280
.Sh EXAMPLES
280
To create a mirror on disks /dev/ad1 and /dev/ad2, create a filesystem, mount,
281
To create a mirror on disks /dev/ad1 and /dev/ad2, create a filesystem, mount,
281
unmount and then stop Ic gvinum:
282
unmount and then stop
283
.Ic gvinum :
282
.Pp
284
.Pp
283
.Dl "gvinum mirror /dev/ad1 /dev/ad2"
285
.Dl "gvinum mirror /dev/ad1 /dev/ad2"
284
.Dl "newfs /dev/gvinum/gvinumvolume0"
286
.Dl "newfs /dev/gvinum/gvinumvolume0"
(-)src/sbin/geom/classirstor/gvirstor.8,v (-2 / +3 lines)
Lines 113-119 Link Here
113
The specified virstor device must exist and be active
113
The specified virstor device must exist and be active
114
.Pq i.e. module loaded, device present in Pa /dev .
114
.Pq i.e. module loaded, device present in Pa /dev .
115
This action can be safely performed while the virstor device is in use
115
This action can be safely performed while the virstor device is in use
116
.Pq Qo hot Qc operation
116
.Pq Qo hot Qc operation .
117
.It Cm remove
117
.It Cm remove
118
Removes components from existing virtual device with the given
118
Removes components from existing virtual device with the given
119
.Ar name .
119
.Ar name .
Lines 268-274 Link Here
268
components will always remain constant during their existence.
268
components will always remain constant during their existence.
269
For alternative ways to implement virtual or resizable file systems see
269
For alternative ways to implement virtual or resizable file systems see
270
.Xr zfs 1M ,
270
.Xr zfs 1M ,
271
.Xr gconcat 8 and
271
.Xr gconcat 8
272
and
272
.Xr growfs 8 .
273
.Xr growfs 8 .
273
.Pp
274
.Pp
274
Note that
275
Note that
(-)src/sbin/hastctl/hastctl.8 (-1 / +1 lines)
Lines 211-217 Link Here
211
.Xr ggatel 8 ,
211
.Xr ggatel 8 ,
212
.Xr hastd 8 ,
212
.Xr hastd 8 ,
213
.Xr mount 8 ,
213
.Xr mount 8 ,
214
.Xr newfs 8 .
214
.Xr newfs 8
215
.Sh AUTHORS
215
.Sh AUTHORS
216
The
216
The
217
.Nm
217
.Nm
(-)src/sbin/hastd/hastd.8 (-1 / +1 lines)
Lines 223-229 Link Here
223
.Xr hastctl 8 ,
223
.Xr hastctl 8 ,
224
.Xr mount 8 ,
224
.Xr mount 8 ,
225
.Xr newfs 8 ,
225
.Xr newfs 8 ,
226
.Xr g_bio 9 .
226
.Xr g_bio 9
227
.Sh AUTHORS
227
.Sh AUTHORS
228
The
228
The
229
.Nm
229
.Nm
(-)src/contrib/amd/hlfsd/hlfsd.8 (-1 / +1 lines)
Lines 267-273 Link Here
267
or mis-delivery of mail.
267
or mis-delivery of mail.
268
The option is ignored on systems that can turn
268
The option is ignored on systems that can turn
269
off the attribute-cache.
269
off the attribute-cache.
270
.It Fl D Ar log-options
270
.It Fl D Ar debug-options
271
Select from a variety of debugging options.
271
Select from a variety of debugging options.
272
Prefixing an
272
Prefixing an
273
option with the string
273
option with the string
(-)src/usr.sbin/i2c/i2c.8 (-1 / +1 lines)
Lines 88-94 Link Here
88
.It Fl s
88
.It Fl s
89
scan the bus for devices.
89
scan the bus for devices.
90
.It Fl v
90
.It Fl v
91
be verbose
91
be verbose.
92
.It Fl w Ar 0|8|16
92
.It Fl w Ar 0|8|16
93
device addressing width (in bits).
93
device addressing width (in bits).
94
.El
94
.El
(-)src/sbin/ifconfig/ifconfig.8 (-6 / +7 lines)
Lines 708-720 Link Here
708
.Cm sta ,
708
.Cm sta ,
709
.Cm ahdemo
709
.Cm ahdemo
710
(or
710
(or
711
.Cm adhoc-demo ),
711
.Cm adhoc-demo ) ,
712
.Cm ibss ,
712
.Cm ibss ,
713
(or
713
(or
714
.Cm adhoc ),
714
.Cm adhoc ) ,
715
.Cm ap ,
715
.Cm ap ,
716
(or
716
(or
717
.Cm hostap ),
717
.Cm hostap ) ,
718
.Cm wds ,
718
.Cm wds ,
719
.Cm tdma ,
719
.Cm tdma ,
720
.Cm mesh ,
720
.Cm mesh ,
Lines 2020-2026 Link Here
2020
discover a path to us.
2020
discover a path to us.
2021
.It Cm PROACTIVE
2021
.It Cm PROACTIVE
2022
Send broadcast path requests every two seconds and every node must reply with
2022
Send broadcast path requests every two seconds and every node must reply with
2023
with a path reply even if it already has a path to this root mesh station.
2023
a path reply even if it already has a path to this root mesh station.
2024
.It Cm RANN
2024
.It Cm RANN
2025
Send broadcast root announcement (RANN) frames.
2025
Send broadcast root announcement (RANN) frames.
2026
Nodes on the mesh without a path to this root mesh station with try to
2026
Nodes on the mesh without a path to this root mesh station with try to
Lines 2378-2384 Link Here
2378
.It Cm grekey Ar key
2378
.It Cm grekey Ar key
2379
Configure the GRE key to be used for outgoing packets.
2379
Configure the GRE key to be used for outgoing packets.
2380
Note that
2380
Note that
2381
.Xr gre 4 will always accept GRE packets with invalid or absent keys.
2381
.Xr gre 4
2382
will always accept GRE packets with invalid or absent keys.
2382
This command will result in a four byte MTU reduction on the interface.
2383
This command will result in a four byte MTU reduction on the interface.
2383
.El
2384
.El
2384
.Pp
2385
.Pp
Lines 2590-2596 Link Here
2590
printed.
2591
printed.
2591
For example, the values of 802.11 WEP keys and
2592
For example, the values of 802.11 WEP keys and
2592
.Xr carp 4
2593
.Xr carp 4
2593
passphrases will be printed, if accessible to the current user.
2594
passphrase will be printed, if accessible to the current user.
2594
This information is not printed by default, as it may be considered
2595
This information is not printed by default, as it may be considered
2595
sensitive.
2596
sensitive.
2596
.Pp
2597
.Pp
(-)src/contrib/ipfilter/man/ipf.8 (-3 / +3 lines)
Lines 42-52 Link Here
42
.TP
42
.TP
43
.B \-c <language>
43
.B \-c <language>
44
This option causes \fBipf\fP to generate output files for a compiler that
44
This option causes \fBipf\fP to generate output files for a compiler that
45
supports \fBlanguage\fI.  At present, the only target language supported is
45
supports \fBlanguage\fP.  At present, the only target language supported is
46
\fBC\fB (-cc) for which two files - \fBip_rules.c\fP
46
\fBC\fP (-cc) for which two files - \fBip_rules.c\fP
47
and \fBip_rules.h\fP are generated in the \fBCURRENT DIRECTORY\fP when
47
and \fBip_rules.h\fP are generated in the \fBCURRENT DIRECTORY\fP when
48
\fBipf\fP is being run.  These files can be used with the
48
\fBipf\fP is being run.  These files can be used with the
49
\fBIPFILTER_COMPILED\fP kernel option to build filter rules staticlly into
49
\fBIPFILTER_COMPILED\fP kernel option to build filter rules statically into
50
the kernel.
50
the kernel.
51
.TP
51
.TP
52
.B \-d
52
.B \-d
(-)src/sbin/ipfw/ipfw.8 (-11 / +12 lines)
Lines 7-13 Link Here
7
.Sh NAME
7
.Sh NAME
8
.Nm ipfw
8
.Nm ipfw
9
.Nd User interface for firewall, traffic shaper, packet scheduler,
9
.Nd User interface for firewall, traffic shaper, packet scheduler,
10
in-kernel NAT.
10
in-kernel NAT
11
.Sh SYNOPSIS
11
.Sh SYNOPSIS
12
.Ss FIREWALL CONFIGURATION
12
.Ss FIREWALL CONFIGURATION
13
.Nm
13
.Nm
Lines 387-393 Link Here
387
for the place of invocation (e.g.\& trying to match a MAC header within
387
for the place of invocation (e.g.\& trying to match a MAC header within
388
.Cm ip_input
388
.Cm ip_input
389
or
389
or
390
.Cm ip6_input ),
390
.Cm ip6_input ) ,
391
the match pattern will not match, but a
391
the match pattern will not match, but a
392
.Cm not
392
.Cm not
393
operator in front of such patterns
393
operator in front of such patterns
Lines 843-849 Link Here
843
and
843
and
844
.Cm return
844
.Cm return
845
actions don't do any jumps and simply go to the next rule if memory
845
actions don't do any jumps and simply go to the next rule if memory
846
can't be allocated or stack overflowed/undeflowed.
846
can't be allocated or stack overflowed/underflowed.
847
.Pp
847
.Pp
848
Internally stack for rule numbers is implemented using
848
Internally stack for rule numbers is implemented using
849
.Xr mbuf_tags 9
849
.Xr mbuf_tags 9
Lines 914-920 Link Here
914
where
914
where
915
.Ar code
915
.Ar code
916
is a number from 0, 1, 3 or 4, or one of these aliases:
916
is a number from 0, 1, 3 or 4, or one of these aliases:
917
.Cm no-route, admin-prohib, address
917
.Cm no-route , admin-prohib , address
918
or
918
or
919
.Cm port .
919
.Cm port .
920
The search terminates.
920
The search terminates.
Lines 1525-1531 Link Here
1525
.Cm port numbers
1525
.Cm port numbers
1526
(i.e., one or more comma-separated single values or ranges).
1526
(i.e., one or more comma-separated single values or ranges).
1527
You can use symbolic names for known values such as
1527
You can use symbolic names for known values such as
1528
.Em vlan , ipv4, ipv6 .
1528
.Em vlan , ipv4 , ipv6 .
1529
Values can be entered as decimal or hexadecimal (if prefixed by 0x),
1529
Values can be entered as decimal or hexadecimal (if prefixed by 0x),
1530
and they are always printed as hexadecimal (unless the
1530
and they are always printed as hexadecimal (unless the
1531
.Cm -N
1531
.Cm -N
Lines 1781-1791 Link Here
1781
The
1781
The
1782
.Cm tablearg
1782
.Cm tablearg
1783
argument can be used with the following actions:
1783
argument can be used with the following actions:
1784
.Cm nat, pipe , queue, divert, tee, netgraph, ngtee, fwd, skipto, setfib,
1784
.Cm nat, pipe , queue , divert , tee , netgraph , ngtee , fwd , skipto , setfib ,
1785
action parameters:
1785
action parameters:
1786
.Cm tag, untag,
1786
.Cm tag , untag ,
1787
rule options:
1787
rule options:
1788
.Cm limit, tagged.
1788
.Cm limit , tagged .
1789
.Pp
1789
.Pp
1790
When used with
1790
When used with
1791
.Cm fwd
1791
.Cm fwd
Lines 1883-1889 Link Here
1883
are used here only to denote the initial match addresses, but they
1883
are used here only to denote the initial match addresses, but they
1884
are completely equivalent afterwards).
1884
are completely equivalent afterwards).
1885
Dynamic rules will be checked at the first
1885
Dynamic rules will be checked at the first
1886
.Cm check-state, keep-state
1886
.Cm check-state , keep-state
1887
or
1887
or
1888
.Cm limit
1888
.Cm limit
1889
occurrence, and the action performed upon a match will be the same
1889
occurrence, and the action performed upon a match will be the same
Lines 2713-2719 Link Here
2713
Global tracking is disabled
2713
Global tracking is disabled
2714
.It Cm >1
2714
.It Cm >1
2715
Enables tracking, the maximum number of addresses tracked for each
2715
Enables tracking, the maximum number of addresses tracked for each
2716
association is limited to this value
2716
association is limited to this value.
2717
.El
2717
.El
2718
.Pp
2718
.Pp
2719
This variable is fully dynamic, the new value will be adopted for all newly
2719
This variable is fully dynamic, the new value will be adopted for all newly
Lines 2789-2795 Link Here
2789
.It Va net.inet.ip.fw.default_rule : No 65535
2789
.It Va net.inet.ip.fw.default_rule : No 65535
2790
The default rule number (read-only).
2790
The default rule number (read-only).
2791
By the design of
2791
By the design of
2792
.Nm , the default rule is the last one, so its number
2792
.Nm ,
2793
the default rule is the last one, so its number
2793
can also serve as the highest number allowed for a rule.
2794
can also serve as the highest number allowed for a rule.
2794
.It Va net.inet.ip.fw.dyn_buckets : No 256
2795
.It Va net.inet.ip.fw.dyn_buckets : No 256
2795
The number of buckets in the hash table for dynamic rules.
2796
The number of buckets in the hash table for dynamic rules.
(-)src/contrib/ipfilter/man/ipmon.8 (-2 / +2 lines)
Lines 49-55 Link Here
49
4. The group and rule number of the rule, e.g., \fB@0:17\fP. These can be
49
4. The group and rule number of the rule, e.g., \fB@0:17\fP. These can be
50
viewed with \fBipfstat -n\fP.
50
viewed with \fBipfstat -n\fP.
51
.LP
51
.LP
52
5. The action: \fBp\fP for passed, \fBb\fP for blocked, \fB\fP for a short
52
5. The action: \fBp\fP for passed, \fBb\fP for blocked, \fBS\fP for a short
53
packet, \fBn\fP did not match any rules or \fBL\fP for a log rule.
53
packet, \fBn\fP did not match any rules or \fBL\fP for a log rule.
54
.LP
54
.LP
55
6. The addresses.
55
6. The addresses.
Lines 131-137 Link Here
131
.TP
131
.TP
132
.B \-P <pidfile>
132
.B \-P <pidfile>
133
Write the pid of the ipmon process to a file.  By default this is
133
Write the pid of the ipmon process to a file.  By default this is
134
\fI//etc/opt/ipf/ipmon.pid\fP (Solaris), \fI/var/run/ipmon.pid\fP (44BSD
134
\fI/etc/opt/ipf/ipmon.pid\fP (Solaris), \fI/var/run/ipmon.pid\fP (44BSD
135
or later) or \fI/etc/ipmon.pid\fP for all others.
135
or later) or \fI/etc/ipmon.pid\fP for all others.
136
.TP
136
.TP
137
.B \-s
137
.B \-s
(-)src/contrib/ipfilter/man/ippool.8 (-1 / +1 lines)
Lines 108-114 Link Here
108
type pools.
108
type pools.
109
.TP
109
.TP
110
.B -t <type>
110
.B -t <type>
111
Sets the type of pool being defined.  Myst be one of
111
Sets the type of pool being defined.  Must be one of
112
.B tree,
112
.B tree,
113
.B hash,
113
.B hash,
114
.B group-map.
114
.B group-map.
(-)src/usr.sbin/jail/jail.8 (-4 / +5 lines)
Lines 255-261 Link Here
255
.Dq true
255
.Dq true
256
and
256
and
257
.Dq false .
257
.Dq false .
258
Other partameters may have more than one value, specified as a
258
Other parameters may have more than one value, specified as a
259
comma-separated list or with
259
comma-separated list or with
260
.Dq +=
260
.Dq +=
261
in the configuration file (see
261
in the configuration file (see
Lines 269-275 Link Here
269
can be seen with
269
can be seen with
270
.Xr jls 8 ,
270
.Xr jls 8 ,
271
and can (usually) be changed with
271
and can (usually) be changed with
272
.Dq Nm Fl m.
272
.Dq Nm Fl m .
273
Then there are pseudo-parameters that are only used by
273
Then there are pseudo-parameters that are only used by
274
.Nm
274
.Nm
275
itself.
275
itself.
Lines 580-586 Link Here
580
command lines that are run in either the system or prison environment.
580
command lines that are run in either the system or prison environment.
581
They may be given multiple values, which run would the specified
581
They may be given multiple values, which run would the specified
582
commands in sequence.
582
commands in sequence.
583
All commands must succed (return a zero exit status), or the jail will
583
All commands must succeed (return a zero exit status), or the jail will
584
not be created or removed.
584
not be created or removed.
585
.Pp
585
.Pp
586
The pseudo-parameters are:
586
The pseudo-parameters are:
Lines 657-663 Link Here
657
after sending them a
657
after sending them a
658
.Dv SIGTERM
658
.Dv SIGTERM
659
signal (which happens after the
659
signal (which happens after the
660
.Va exec.stop commands have completed).
660
.Va exec.stop
661
commands have completed).
661
After this many seconds have passed, the prison will be removed, which
662
After this many seconds have passed, the prison will be removed, which
662
will kill any remaining processes.
663
will kill any remaining processes.
663
If this is set to zero, no
664
If this is set to zero, no
(-)src/sys/boot/common/loader.8 (-1 / +1 lines)
Lines 423-429 Link Here
423
Defines the base i/o port used to access console UART
423
Defines the base i/o port used to access console UART
424
(i386 and amd64 only).
424
(i386 and amd64 only).
425
If the variable is not set, its assumed value is 0x3F8, which
425
If the variable is not set, its assumed value is 0x3F8, which
426
corresponds to PC port COM1, unless overriden by
426
corresponds to PC port COM1, unless overridden by
427
.Va BOOT_COMCONSOLE_PORT
427
.Va BOOT_COMCONSOLE_PORT
428
variable during the compilation of
428
variable during the compilation of
429
.Nm .
429
.Nm .
(-)src/sys/boot/forth/menu.4th.8 (-1 / +1 lines)
Lines 29-35 Link Here
29
.Os
29
.Os
30
.Sh NAME
30
.Sh NAME
31
.Nm menu.4th
31
.Nm menu.4th
32
.Nd FreeBSD dynamic menu boot module.
32
.Nd FreeBSD dynamic menu boot module
33
.Sh DESCRIPTION
33
.Sh DESCRIPTION
34
The file that goes by the name of
34
The file that goes by the name of
35
.Nm
35
.Nm
(-)src/sbin/mount/mount.8 (-1 / +1 lines)
Lines 448-454 Link Here
448
.Cm smbfs ,
448
.Cm smbfs ,
449
.Cm udf ,
449
.Cm udf ,
450
and
450
and
451
.Cm unionfs ,
451
.Cm unionfs .
452
.Nm
452
.Nm
453
will not call
453
will not call
454
.Xr nmount 2
454
.Xr nmount 2
(-)src/sbin/natd/natd.8 (-1 / +1 lines)
Lines 787-793 Link Here
787
.Pp
787
.Pp
788
Here the packet from internal network to Internet goes out via
788
Here the packet from internal network to Internet goes out via
789
.Ql sis0
789
.Ql sis0
790
(rule number 2000) and gets catched by the
790
(rule number 2000) and gets caught by the
791
.Ic globalport
791
.Ic globalport
792
socket (3000).
792
socket (3000).
793
After that, either a match is found in a translation table
793
After that, either a match is found in a translation table
(-)src/usr.sbin/wpa/ndis_ents/ndis_events.8,v (-1 / +1 lines)
Lines 71-77 Link Here
71
interface, it transmits it via UDP packet on the loopback interface,
71
interface, it transmits it via UDP packet on the loopback interface,
72
where
72
where
73
.Xr wpa_supplicant 8
73
.Xr wpa_supplicant 8
74
is presumeably listening.
74
is presumably listening.
75
The standard
75
The standard
76
.Xr wpa_supplicant 8
76
.Xr wpa_supplicant 8
77
distribution includes its own version of this utility for use with
77
distribution includes its own version of this utility for use with
(-)src/usr.sbin/nfsroke/nfsrevoke.8,v (-1 / +1 lines)
Lines 37-43 Link Here
37
.Ar ClientId
37
.Ar ClientId
38
.Sh DESCRIPTION
38
.Sh DESCRIPTION
39
.Nm
39
.Nm
40
This command is used by a system administrator to revoke a client's access
40
command is used by a system administrator to revoke a client's access
41
to the NFS Version 4 server. All Open/Lock state held by the client will
41
to the NFS Version 4 server. All Open/Lock state held by the client will
42
be released.
42
be released.
43
After revocation, the client will no longer be able to use state on the server
43
After revocation, the client will no longer be able to use state on the server
(-)src/usr.sbin/ntp/doc/ntp-keygen.8 (-5 / +5 lines)
Lines 201-207 Link Here
201
Each cryptographic configuration involves selection of a signature scheme
201
Each cryptographic configuration involves selection of a signature scheme
202
and identification scheme, called a cryptotype,
202
and identification scheme, called a cryptotype,
203
as explained in the
203
as explained in the
204
.Sx Authentication Options
204
.Sx Authentication Commands
205
section of
205
section of
206
.Xr ntp.conf 5 .
206
.Xr ntp.conf 5 .
207
The default cryptotype uses RSA encryption, MD5 message digest
207
The default cryptotype uses RSA encryption, MD5 message digest
Lines 290-296 Link Here
290
Trusted hosts prove identity using values provided by the TA,
290
Trusted hosts prove identity using values provided by the TA,
291
while the remaining hosts prove identity using values provided
291
while the remaining hosts prove identity using values provided
292
by a trusted host and certificate trails that end on that host.
292
by a trusted host and certificate trails that end on that host.
293
The name of a trusted host is also the name of its sugroup
293
The name of a trusted host is also the name of its su group
294
and also the subject and issuer name on its trusted certificate.
294
and also the subject and issuer name on its trusted certificate.
295
The TA is not necessarily a trusted host in this sense, but often is.
295
The TA is not necessarily a trusted host in this sense, but often is.
296
.Pp
296
.Pp
Lines 411-417 Link Here
411
to her clients.
411
to her clients.
412
It doesn't matter which client key file goes to alice,
412
It doesn't matter which client key file goes to alice,
413
since they all work the same way.
413
since they all work the same way.
414
Alice copies the client key file to all of her cliens.
414
Alice copies the client key file to all of her clients.
415
On client bob install a soft link from generic
415
On client bob install a soft link from generic
416
.Pa ntpkey_mvkey_ Ns Ar bob
416
.Pa ntpkey_mvkey_ Ns Ar bob
417
to the client key file.
417
to the client key file.
Lines 450-456 Link Here
450
Generate parameters for the IFF identification scheme,
450
Generate parameters for the IFF identification scheme,
451
obsoleting any that may exist.
451
obsoleting any that may exist.
452
.It Fl i Ar name
452
.It Fl i Ar name
453
Set the suject name to
453
Set the subject name to
454
.Ar name .
454
.Ar name .
455
This is used as the subject field in certificates
455
This is used as the subject field in certificates
456
and in the file name for host and sign keys.
456
and in the file name for host and sign keys.
Lines 594-600 Link Here
594
and
594
and
595
.Xr ntpdc 8
595
.Xr ntpdc 8
596
utilities.
596
utilities.
597
.Sh Bugs
597
.Sh BUGS
598
It can take quite a while to generate some cryptographic values,
598
It can take quite a while to generate some cryptographic values,
599
from one to several minutes with modern architectures
599
from one to several minutes with modern architectures
600
such as UltraSPARC and up to tens of minutes to an hour
600
such as UltraSPARC and up to tens of minutes to an hour
(-)src/usr.sbin/ntp/doc/ntpdc.8 (-2 / +2 lines)
Lines 608-614 Link Here
608
.It Cm monitor
608
.It Cm monitor
609
Enables the monitoring facility.
609
Enables the monitoring facility.
610
See the
610
See the
611
.Xr src/usr.sbin/ntp/doc/ntpdc.8 .
611
.Xr src/usr.sbin/ntp/doc/ntpdc.8
612
program and the monlist command or further information.
612
program and the monlist command or further information.
613
The default for this flag is enable.
613
The default for this flag is enable.
614
.It Cm ntp
614
.It Cm ntp
Lines 629-635 Link Here
629
.It Cm stats
629
.It Cm stats
630
Enables the statistics facility.
630
Enables the statistics facility.
631
See the
631
See the
632
.Sx Monitoring Options
632
.Sx Monitoring Support
633
section of
633
section of
634
.Xr ntp.conf 5
634
.Xr ntp.conf 5
635
for further information.
635
for further information.
(-)src/usr.sbin/ntp/doc/ntpq.8 (-8 / +8 lines)
Lines 32-38 Link Here
32
The
32
The
33
.Nm
33
.Nm
34
can also obtain and print a list of peers in a common format
34
can also obtain and print a list of peers in a common format
35
by sendingmultiple queries to the server.
35
by sending multiple queries to the server.
36
.Pp
36
.Pp
37
If one or more request options is included on the command line
37
If one or more request options is included on the command line
38
when
38
when
Lines 492-498 Link Here
492
billboard,
492
billboard,
493
called the tally code, shows the fate of each association
493
called the tally code, shows the fate of each association
494
in the clock selection process.
494
in the clock selection process.
495
Following is a list of these characters, the pigeon used
495
Following is a list of these characters, the pidgeon used
496
in the
496
in the
497
.Ic rv
497
.Ic rv
498
command, and a short explanation of the condition revealed.
498
command, and a short explanation of the condition revealed.
Lines 749-755 Link Here
749
.Sy TEST12
749
.Sy TEST12
750
check the authentication state using Autokey
750
check the authentication state using Autokey
751
public-key cryptography, as described in the
751
public-key cryptography, as described in the
752
.Sx Authentication Options
752
.Sx Authentication Commands
753
section of
753
section of
754
.Xr ntp.conf 5 .
754
.Xr ntp.conf 5 .
755
If
755
If
Lines 790-796 Link Here
790
.Pq TEST5
790
.Pq TEST5
791
Cryptographic authentication fails.
791
Cryptographic authentication fails.
792
See the
792
See the
793
.Sx Authentication Options
793
.Sx Authentication Commands
794
section of
794
section of
795
.Xr ntp.conf 5 .
795
.Xr ntp.conf 5 .
796
.It 0x020
796
.It 0x020
Lines 809-820 Link Here
809
.It 0x100
809
.It 0x100
810
.Pq TEST9
810
.Pq TEST9
811
Either the peer delay or dispersion is greater than one second, which is
811
Either the peer delay or dispersion is greater than one second, which is
812
higly unlikely unless the peer is on Mars.
812
highly unlikely unless the peer is on Mars.
813
.It 0x200
813
.It 0x200
814
.Pq TEST10
814
.Pq TEST10
815
The autokey protocol has detected an authentication failure.
815
The autokey protocol has detected an authentication failure.
816
See the
816
See the
817
.Sx Authentication Options
817
.Sx Authentication Commands
818
section of
818
section of
819
.Xr ntp.conf 5 .
819
.Xr ntp.conf 5 .
820
.It 0x400
820
.It 0x400
Lines 822-828 Link Here
822
The autokey protocol has not verified the server or peer is proventic and
822
The autokey protocol has not verified the server or peer is proventic and
823
has valid public key credentials.
823
has valid public key credentials.
824
See the
824
See the
825
.Sx Authentication Options
825
.Sx Authentication Commands
826
section of
826
section of
827
.Xr ntp.conf 5 .
827
.Xr ntp.conf 5 .
828
.It 0x800
828
.It 0x800
Lines 830-836 Link Here
830
A protocol or configuration error has occurred in the public key algorithms
830
A protocol or configuration error has occurred in the public key algorithms
831
or a possible intrusion event has been detected.
831
or a possible intrusion event has been detected.
832
See the
832
See the
833
.Sx Authentication Options
833
.Sx Authentication Commands
834
section of
834
section of
835
.Xr ntp.conf 5 .
835
.Xr ntp.conf 5 .
836
.El
836
.El
(-)src/lib/libpam/modules/pam_exec/pam_exec.8 (-2 / +2 lines)
Lines 131-140 Link Here
131
.Xr pam 8 ,
131
.Xr pam 8 ,
132
.Xr pam_sm_acct_mgmt 8 ,
132
.Xr pam_sm_acct_mgmt 8 ,
133
.Xr pam_sm_authenticate 8 ,
133
.Xr pam_sm_authenticate 8 ,
134
.Xr pam_sm_chauthtok 8,
134
.Xr pam_sm_chauthtok 8 ,
135
.Xr pam_sm_close_session 8 ,
135
.Xr pam_sm_close_session 8 ,
136
.Xr pam_sm_open_session 8 ,
136
.Xr pam_sm_open_session 8 ,
137
.Xr pam_sm_setcred 8 .
137
.Xr pam_sm_setcred 8
138
.Sh AUTHORS
138
.Sh AUTHORS
139
The
139
The
140
.Nm
140
.Nm
(-)src/usr.sbin/pc-sysinstall/pc-sysinstall/pc-sysinstall.8 (-2 / +2 lines)
Lines 47-53 Link Here
47
.Bl -tag -width indent
47
.Bl -tag -width indent
48
.It Fl c Ar file
48
.It Fl c Ar file
49
Perform an installation as directed by
49
Perform an installation as directed by
50
.Ar file.
50
.Ar file .
51
.El
51
.El
52
.Sh COMMANDS
52
.Sh COMMANDS
53
The
53
The
Lines 69-75 Link Here
69
.It detect-laptop
69
.It detect-laptop
70
Tests to see if this system is a laptop or desktop.
70
Tests to see if this system is a laptop or desktop.
71
.It detect-emulation
71
.It detect-emulation
72
Tests to see if this system is running in an emulator
72
Tests to see if this system is running in an emulator.
73
.It detect-nics
73
.It detect-nics
74
Returns a listing of the detected network cards on this system.
74
Returns a listing of the detected network cards on this system.
75
.It list-components
75
.It list-components
(-)src/share/man/man8/picobsd.8 (-2 / +2 lines)
Lines 54-60 Link Here
54
.Fl src ,
54
.Fl src ,
55
.Fl init ,
55
.Fl init ,
56
.Fl n and
56
.Fl n and
57
.Fl v.
57
.Fl v .
58
.Bl -tag -width indent
58
.Bl -tag -width indent
59
.\"
59
.\"
60
.It Fl -all_in_mfs
60
.It Fl -all_in_mfs
Lines 94-100 Link Here
94
images.
94
images.
95
.\"
95
.\"
96
.It Fl -iso
96
.It Fl -iso
97
Generate an ISO image, picobsd.iso, in addition to the disk image picobsd.bin
97
Generate an ISO image, picobsd.iso, in addition to the disk image picobsd.bin.
98
.\"
98
.\"
99
.It Fl -modules
99
.It Fl -modules
100
Also build kernel modules.
100
Also build kernel modules.
(-)src/share/man/man8/rc.8 (-1 / +1 lines)
Lines 253-259 Link Here
253
but a script can stop the boot if necessary by invoking the
253
but a script can stop the boot if necessary by invoking the
254
.Fn stop_boot
254
.Fn stop_boot
255
function (from
255
function (from
256
.Xr rc.subr 8 ).
256
.Xr rc.subr 8 ) .
257
.El
257
.El
258
.Pp
258
.Pp
259
Each script should contain
259
Each script should contain
(-)src/usr.bin/rctl/rctl.8 (-1 / +1 lines)
Lines 156-162 Link Here
156
for a list of supported signals.
156
for a list of supported signals.
157
.Pp
157
.Pp
158
Not all actions are supported for all resources.
158
Not all actions are supported for all resources.
159
Attempt to add rule with action not supported by a given resouce will result
159
Attempt to add rule with action not supported by a given resource will result
160
in error.
160
in error.
161
.Pp
161
.Pp
162
Note that limiting RSS may kill the machine due to thrashing.
162
Note that limiting RSS may kill the machine due to thrashing.
(-)src/usr.sbin/rtactl/rtadvctl.8,v (-1 / +2 lines)
Lines 31-37 Link Here
31
.Sh NAME
31
.Sh NAME
32
.Nm rtadvctl
32
.Nm rtadvctl
33
.Nd control program for
33
.Nd control program for
34
.Xr rtadvd 8 daemon
34
.Xr rtadvd 8
35
daemon
35
.Sh SYNOPSIS
36
.Sh SYNOPSIS
36
.Nm
37
.Nm
37
.Op Fl v
38
.Op Fl v
(-)src/usr.sbin/rtad/rtadvd.8,v (-1 / +1 lines)
Lines 140-146 Link Here
140
.It Fl p
140
.It Fl p
141
Specify an alternative file in which to store the process ID.
141
Specify an alternative file in which to store the process ID.
142
The default is
142
The default is
143
.Pa /var/run/rtadvd.pid.
143
.Pa /var/run/rtadvd.pid .
144
.It Fl R
144
.It Fl R
145
Accept router renumbering requests.
145
Accept router renumbering requests.
146
If you enable it, certain IPsec setup is suggested for security reasons.
146
If you enable it, certain IPsec setup is suggested for security reasons.
(-)src/usr.sbin/smbmsg/smbmsg.8 (-1 / +1 lines)
Lines 70-76 Link Here
70
The only valid additional option for this modus of operation (besides
70
The only valid additional option for this modus of operation (besides
71
the
71
the
72
.Fl p
72
.Fl p
73
option that choses the modus) is
73
option that chooses the modus) is
74
.Fl f Ar dev .
74
.Fl f Ar dev .
75
See below for a description.
75
See below for a description.
76
.Pp
76
.Pp
(-)src/crypto/openssh/sshd.8 (-1 / +2 lines)
Lines 386-392 Link Here
386
If the login is on a tty, records login time.
386
If the login is on a tty, records login time.
387
.It
387
.It
388
Checks
388
Checks
389
.Pa /etc/nologin and
389
.Pa /etc/nologin
390
and
390
.Pa /var/run/nologin ;
391
.Pa /var/run/nologin ;
391
if one exists, it prints the contents and quits
392
if one exists, it prints the contents and quits
392
(unless root).
393
(unless root).
(-)src/libexec/tftpd/tftpd.8 (-2 / +2 lines)
Lines 165-171 Link Here
165
.Ar value .
165
.Ar value .
166
The debug level is a bitmask implemented in
166
The debug level is a bitmask implemented in
167
.Pa src/libexec/tftpd/tftp-utils.h .
167
.Pa src/libexec/tftpd/tftp-utils.h .
168
Valid values are 0 (DEBUG_NONE), 1 (DEBUG_PACKETS), 2, (DEBUG_SIMPLE),
168
Valid values are 0 (DEBUG_NONE), 1 (DEBUG_PACKETS), 2 (DEBUG_SIMPLE),
169
4 (DEBUG_OPTIONS), and 8 (DEBUG_ACCESS).  Multiple debug values can be combined
169
4 (DEBUG_OPTIONS), and 8 (DEBUG_ACCESS).  Multiple debug values can be combined
170
in the bitmask by logically OR'ing the values.  For example, specifying
170
in the bitmask by logically OR'ing the values.  For example, specifying
171
.Fl d
171
.Fl d
Lines 218-224 Link Here
218
Note that this only works in directories writable by the user
218
Note that this only works in directories writable by the user
219
specified with
219
specified with
220
.Fl u
220
.Fl u
221
option
221
option.
222
.It Fl W
222
.It Fl W
223
As
223
As
224
.Fl w
224
.Fl w
(-)src/usr.sbin/utx/utx.8 (-1 / +1 lines)
Lines 94-100 Link Here
94
.Sh SEE ALSO
94
.Sh SEE ALSO
95
.Xr getent 1 ,
95
.Xr getent 1 ,
96
.Xr w 1 ,
96
.Xr w 1 ,
97
.Xr pututxline 3 .
97
.Xr pututxline 3
98
.Sh HISTORY
98
.Sh HISTORY
99
The
99
The
100
.Nm
100
.Nm
(-)src/sys/boot/forthersion.4th.8,v (-1 / +1 lines)
Lines 29-35 Link Here
29
.Os
29
.Os
30
.Sh NAME
30
.Sh NAME
31
.Nm version.4th
31
.Nm version.4th
32
.Nd FreeBSD version string boot module.
32
.Nd FreeBSD version string boot module
33
.Sh DESCRIPTION
33
.Sh DESCRIPTION
34
The file that goes by the name of
34
The file that goes by the name of
35
.Nm
35
.Nm
(-)src/cddl/contrib/opensolaris/cmd/zpool/zpool.8 (-4 / +5 lines)
Lines 654-660 Link Here
654
.It Sy dedupditto Ns = Ns Ar number
654
.It Sy dedupditto Ns = Ns Ar number
655
Threshold for the number of block ditto copies. If the reference count for a
655
Threshold for the number of block ditto copies. If the reference count for a
656
deduplicated block increases above this number, a new ditto copy of this block
656
deduplicated block increases above this number, a new ditto copy of this block
657
is automatically stored. Deafult setting is
657
is automatically stored. Default setting is
658
.Cm 0 .
658
.Cm 0 .
659
.It Sy delegation Ns = Ns Cm on No | Cm off
659
.It Sy delegation Ns = Ns Cm on No | Cm off
660
Controls whether a non-privileged user is granted access based on the dataset
660
Controls whether a non-privileged user is granted access based on the dataset
Lines 832-838 Link Here
832
in use by another subsystem. There are some uses, such as being currently
832
in use by another subsystem. There are some uses, such as being currently
833
mounted, or specified as the dedicated dump device, that prevents a device from
833
mounted, or specified as the dedicated dump device, that prevents a device from
834
ever being used by
834
ever being used by
835
.Tn ZFS
835
.Tn ZFS .
836
Other uses, such as having a preexisting
836
Other uses, such as having a preexisting
837
.Sy UFS
837
.Sy UFS
838
file system, can be overridden with the
838
file system, can be overridden with the
Lines 882-888 Link Here
882
.Ar ...
882
.Ar ...
883
.Xc
883
.Xc
884
Sets the given file system properties in the root file system of the pool. See
884
Sets the given file system properties in the root file system of the pool. See
885
.Xr zfs 8 Properties
885
.Xr zfs 8
886
Properties
886
for a list of valid properties that
887
for a list of valid properties that
887
can be set.
888
can be set.
888
.It Fl R Ar root
889
.It Fl R Ar root
Lines 1110-1116 Link Here
1110
and the
1111
and the
1111
.Qq Sy altroot
1112
.Qq Sy altroot
1112
property to
1113
property to
1113
.Qq Ar root
1114
.Qq Ar root .
1114
.It Fl F
1115
.It Fl F
1115
Recovery mode for a non-importable pool. Attempt to return the pool to an
1116
Recovery mode for a non-importable pool. Attempt to return the pool to an
1116
importable state by discarding the last few transactions. Not all damaged pools
1117
importable state by discarding the last few transactions. Not all damaged pools

Return to bug 168016