diff options
author | uqs <uqs@FreeBSD.org> | 2010-06-08 16:48:49 +0000 |
---|---|---|
committer | uqs <uqs@FreeBSD.org> | 2010-06-08 16:48:49 +0000 |
commit | fe5d3992856952ef1adbcb057a08e30eb289cba4 (patch) | |
tree | a80cb9596b3d750e2ad37f9cea4427d6166c91ac /usr.sbin | |
parent | 72cdd6ef995d01b36fd6cd79ec1a88472ea5a5c0 (diff) | |
download | FreeBSD-src-fe5d3992856952ef1adbcb057a08e30eb289cba4.zip FreeBSD-src-fe5d3992856952ef1adbcb057a08e30eb289cba4.tar.gz |
mdoc: replace troff macros with -mdoc equivalents
Diffstat (limited to 'usr.sbin')
-rw-r--r-- | usr.sbin/nfsdumpstate/nfsdumpstate.8 | 19 | ||||
-rw-r--r-- | usr.sbin/timed/timed/timed.8 | 27 |
2 files changed, 21 insertions, 25 deletions
diff --git a/usr.sbin/nfsdumpstate/nfsdumpstate.8 b/usr.sbin/nfsdumpstate/nfsdumpstate.8 index ca48c02..1a9f110 100644 --- a/usr.sbin/nfsdumpstate/nfsdumpstate.8 +++ b/usr.sbin/nfsdumpstate/nfsdumpstate.8 @@ -47,15 +47,18 @@ The options are as follows: .It Fl o Displays a summary of Clients for NFSv4. Each line lists a Client with the ClientID being the last field of the line. -.sp -.nf +.Pp The following are the client flag values displayed: -NC - Needs Confirmation -CB - Callbacks are enabled -GSS - Using RPCSEC_GSS -REV - Administratively Revoked, via nfsrevoke(8) -.fi -.sp +.Bl -tag -compact -offset 2n -width MMMM +.It NC +Needs Confirmation +.It CB +Callbacks are enabled +.It GSS +Using RPCSEC_GSS +.It REV +Administratively Revoked, via nfsrevoke(8) +.El .It Fl l Ar filename Displays a list of all NFSv4 Opens and Locks on the file specified by the diff --git a/usr.sbin/timed/timed/timed.8 b/usr.sbin/timed/timed/timed.8 index f9fbd32..d289e46 100644 --- a/usr.sbin/timed/timed/timed.8 +++ b/usr.sbin/timed/timed/timed.8 @@ -77,44 +77,37 @@ are used by This option may be specified multiple times to add more than one network to the list. .It Fl F Ar host ... -.in +2 -.ti -2 -- +.Bl -dash -compact +.It Create a list of trusted hosts. -.ti -2 -- +.It Can take one or more parameters. -.ti -2 -- +.It .Nm will only accept trusted hosts as masters. If it finds an untrusted host claiming to be master, .Nm will suppress incoming messages from that host and call for a new election. -.ti -2 -- +.It Use real host names (resolvable by RDNS) not aliases (eg in .Xr named 8 parlance: use A names, not C names). -.ti -2 -- +.It Use full names eg time1.domain.com not time1. -.ti -2 -- +.It .Fl F automatically includes the functionality of .Fl M -( so +(so .Fl M does not need to asserted). -.ti -2 -- +.It If .Fl F is not specified, all hosts on connected networks are treated as trustworthy. -.in -2 +.El .It Fl M Allow this host to become a .Nm |