summaryrefslogtreecommitdiff
path: root/share/man/man7
Commit message (Collapse)AuthorAgeFilesLines
* security(7): fix copy/paste error and correct aslr oidsYuri Pankov2020-11-291-3/+3
| | | | | | | | Submitted by: Mina Galić <me_igalic.co> Differential Revision: https://reviews.freebsd.org/D27408 Notes: svn path=/head/; revision=368157
* Assorted tweaks to hier(7): punctuation, some .Xr's, clarify wording.Edward Tomasz Napierala2020-11-231-13/+11
| | | | | | | | | | Reviewed by: 0mp, bcr, imp MFC after: 2 weeks Sponsored by: EPSRC Differential Revision: https://reviews.freebsd.org/D27248 Notes: svn path=/head/; revision=367954
* Add lists for customizing legacy and bootstrap-tools.Bryan Drewery2020-11-201-1/+11
| | | | | | | | | Reviewed by: arichardson Sponsored by: Dell EMC Differential Revision: https://reviews.freebsd.org/D27200 Notes: svn path=/head/; revision=367910
* intro.7: Add missing manual pageDaniel Ebdrup Jensen2020-11-191-1/+25
| | | | | | | | | | | | | Section 7 of the manual pages contain lots of very useful information, but finding the pages is not always obvious - to assist people in finding the information, add missing cross-references. Reviewed by: 0mp (mentor), mhorne, yuripv Approved by: 0mp (mentor Differential Revision: https://reviews.freebsd.org/D27284 Notes: svn path=/head/; revision=367846
* Do not document MOTIFLIB in ports(7)Mateusz Piotrowski2020-11-101-4/+1
| | | | | | | | | | | Perhaps it made sense in 1998 (r32836), but now it feels a bit out of place. We tend to avoid documenting non-essential ports variables in the manual page (we try to document them in the Porter's Handbook instead). MFC after: 1 week Notes: svn path=/head/; revision=367552
* build.7: Mention etcupdate(8) alongside mergemaster(8)Mateusz Piotrowski2020-11-031-1/+2
| | | | | | | MFC after: 3 days Notes: svn path=/head/; revision=367300
* Fix a typo in the description of WITH_DEBUG_PORTSMateusz Piotrowski2020-11-031-1/+1
| | | | | | | | | | For each origin listed in WITH_DEBUG_PORTS, the ports framework sets WITH_DEBUG instead of WITH_DEBUG_PORTS. MFC after: 3 days Notes: svn path=/head/; revision=367299
* Document how to set ports options via make.conf(5)Mateusz Piotrowski2020-11-031-1/+20
| | | | | | | | | | | | | This patch is based on: - https://lists.freebsd.org/pipermail/freebsd-ports-announce/2013-June/000062.html - current content of /usr/ports/Mk/bsd.options.mk PR: 194306 Reported by: Daan K. <daanknip__hotmail_com> MFC after: 2 weeks Notes: svn path=/head/; revision=367295
* Do not document default locations of the OpenBSD and NetBSD ports treesMateusz Piotrowski2020-11-011-8/+1
| | | | | | | | | | | Our own Ports Collection is not targeting those systems at the moment, so let's stop documenting bits specific to OpenBSD and NetBSD in the ports documentation. Especially, that it might bit rot one day. MFC after: 1 week Notes: svn path=/head/; revision=367256
* Document how to use sudo for SU_CMDMateusz Piotrowski2020-11-011-2/+5
| | | | | | | | | | | It is rather common for the ports users to replace su(1) with sudo(8) within the SU_CMD variable. Let's document it in the manual page (so far it's been hidden in a comment within bsd.commands.mk). MFC after: 2 weeks Notes: svn path=/head/; revision=367253
* Drop "All rights reserved" from all my stuff. This includesEdward Tomasz Napierala2020-10-281-1/+0
| | | | | | | | | | | | Foundation copyrights, approved by emaste@. It does not include files which carry other people's copyrights; if you're one of those people, feel free to make similar change. Reviewed by: emaste, imp, gbe (manpages) Differential Revision: https://reviews.freebsd.org/D26980 Notes: svn path=/head/; revision=367105
* arch(7): PowerPC64LE architecture definitionBrandon Bergren2020-09-231-2/+8
| | | | | | | | | | | | | | Document the new powerpc64le arch's initial specifications. Certain things are subject to change while this is experimental. The most likely change is that long double may switch to quad, dependent on POWER8 emulation assistance for __float128 being set up in the compiler (as POWER8 does not have IEEE-compatible 128-bit hardware float, unlike POWER9.) Sponsored by: Tag1 Consulting, Inc. Notes: svn path=/head/; revision=366061
* crypto(7): Correct Sections out of conventional order errorGordon Bergling2020-09-191-4/+4
| | | | | | | | Event: September 2020 Bugathon MFC after: 1 week Notes: svn path=/head/; revision=365904
* arch(7): Some markup fixesGordon Bergling2020-09-171-17/+16
| | | | | | | | | - no blank before trailing delimiter MFC after: 3 days Notes: svn path=/head/; revision=365859
* Improvements for the src.conf(5) and build(7) man pagesGordon Bergling2020-09-111-6/+21
| | | | | | | | | | | | PR: 203863 (based on) Submitted by: Russell Haley <russ dot haley at gmail dot com> Reviewed by: bcr, imp Approved by: imp MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D26343 Notes: svn path=/head/; revision=365640
* release.7: update for current contextEd Maste2020-09-011-4/+4
| | | | | | | | | | | | | | It's no longer unusual to be able to build a release with a single command, so drop "actually" that hints at a surprise. Also just use "network install directory" instead of referencing FTP; it's more likely to be HTTP now. Reviewed by: gjb Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D26260 Notes: svn path=/head/; revision=365049
* Cross-reference development.7 and tests.7Mateusz Piotrowski2020-08-192-3/+5
| | | | | | | MFC after: 7 days Notes: svn path=/head/; revision=364387
* environ(7): Update the description and include some more environment variablesGordon Bergling2020-08-051-12/+62
| | | | | | | | | | | | | | | | - Add a better introduction to the DESCRIPTION section - Add a description for MANPATH and POSIXLY_CORRECT - Asorted improvements for the usage of some macros PR: 43823 Submitted by: Lyndon Nerenberg <lyndon at orthanc dot ab dot ca> Reviewed by: 0mp, bcr Approved by: 0mp, bcr MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D25912 Notes: svn path=/head/; revision=363907
* Do not describe portsnap(8) as a way to manage /usr/portsMateusz Piotrowski2020-08-051-6/+3
| | | | Notes: svn path=/head/; revision=363903
* Do not mention portsnap(8) in ports.7Mateusz Piotrowski2020-08-031-6/+3
| | | | | | | | | | | As we are moving away from portsnap, let's not recommend it in the manual page. Reviewed by: bcr (manpages), mat (portmgr) Differential Revision: https://reviews.freebsd.org/D25847 Notes: svn path=/head/; revision=363798
* Promote use of unprivileged users for building ports by documenting SU_CMD.Piotr Pawel Stefaniak2020-07-171-1/+9
| | | | | | | | | | | Phrasing by Daniel O'Connor. Reviewed by: 0mp MFC after: 14 days Differential Revision: https://reviews.freebsd.org/D25433 Notes: svn path=/head/; revision=363268
* Add orders man pageSergio Carlavilla Delgado2020-07-112-0/+112
| | | | | | | | | | | | PR: 239020 Submitted by: gbe@ Approved by: imp@ Obtained from: NetBSD MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D24293 Notes: svn path=/head/; revision=363106
* Update tests(7) as kyua(1) was imported to base in r359260Li-Wen Hsu2020-06-251-14/+15
| | | | | | | | | | | | PR: 247151 Reported by: 0mp Reviewed by: 0mp, asomers, bcr, emaste, markj Suggested from: brooks, ngie Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D25339 Notes: svn path=/head/; revision=362610
* arch(7): small corrections for RISC-VMitchell Horne2020-06-231-6/+6
| | | | | | | | | | | | | | Document that RISC-V supports multiple page sizes: 4K, 2M, and 1G. RISC-V's long double is always 128-bits wide, therefore quad precision. Mention __riscv_float_abi_soft, which can be used to differentiate between riscv64 and riscv64sf in userland code. MFC after: 3 days Notes: svn path=/head/; revision=362546
* Mention CI system information in development(7)Li-Wen Hsu2020-06-231-1/+9
| | | | | | | | | | Approved by: 0mp, bcr MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D25340 Notes: svn path=/head/; revision=362539
* Control for Special Register Buffer Data Sampling mitigation.Konstantin Belousov2020-06-121-1/+8
| | | | | | | | | | | | | | | | | | | | New microcode update for Intel enables mitigation for SRBDS, which slows down RDSEED and related instructions. The update also provides a control to limit the mitigation to SGX enclaves, which should restore the speed of random generator by the cost of potential cross-core bufer sampling. See https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling GIve the user control over it. Reviewed by: markj Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D25221 Notes: svn path=/head/; revision=362130
* stats(7): fix bad Xr references and lint noiseYuri Pankov2020-06-061-12/+13
| | | | | | | | Reviewed by: bjk, debdrup Differential Revision: https://reviews.freebsd.org/D25166 Notes: svn path=/head/; revision=361871
* Update crypto(7) to list current ciphers.John Baldwin2020-06-041-6/+60
| | | | | | | | | | | Add descriptions of AES-CCM, Camellia-CBC, and Chacha20. Reviewed by: cem (previous version) Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D24963 Notes: svn path=/head/; revision=361809
* Improve support for stream ciphers in the software encryption interface.John Baldwin2020-05-221-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add a 'native_blocksize' member to 'struct enc_xform' that ciphers can use if they support a partial final block. This is particular useful for stream ciphers, but can also apply to other ciphers. cryptosoft will only pass in native blocks to the encrypt and decrypt hooks. For the final partial block, 'struct enc_xform' now has new encrypt_last/decrypt_last hooks which accept the length of the final block. The multi_block methods are also retired. Mark AES-ICM (AES-CTR) as a stream cipher. This has some interesting effects on IPsec in that FreeBSD can now properly receive all packets sent by Linux when using AES-CTR, but FreeBSD can no longer interoperate with OpenBSD and older verisons of FreeBSD which assume AES-CTR packets have a payload padded to a 16-byte boundary. Kornel has offered to work on a patch to add a compatiblity sysctl to enforce additional padding for AES-CTR in esp_output to permit compatibility with OpenBSD and older versions of FreeBSD. AES-XTS continues to use a block size of a single AES block length. It is possible to adjust it to support partial final blocks by implementing cipher text stealing via encrypt_last/decrypt_last hooks, but I have not done so. Reviewed by: cem (earlier version) Tested by: Kornel Dulęba <mindal@semihalf.com> (AES-CTR with IPsec) Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D24906 Notes: svn path=/head/; revision=361390
* amd64: Add a knob to flush RSB on context switches if machine has SMEP.Konstantin Belousov2020-05-201-1/+8
| | | | | | | | | | | | | | | | The flush is needed to prevent cross-process ret2spec, which is not handled on kernel entry if IBPB is enabled but SMEP is present. While there, add i386 RSB flush. Reported by: Anthony Steinhauser <asteinhauser@google.com> Reviewed by: markj, Anthony Steinhauser Discussed with: philip admbugs: 961 Sponsored by: The FreeBSD Foundation MFC after: 1 week Notes: svn path=/head/; revision=361302
* Add new stats(7) man page and hook it up to the build.Benedict Reuschling2020-05-142-0/+121
| | | | | | | | | | | | | | | | | | | This man page contains stat utilities that are available in the base system. This is a better approach than looking them up via "apropos stat" or similar commands. Thanks to Daniel Ebdrup Jensen for writing the original page and incorporating the feedback given. Submitted by: Daniel Ebdrup Jensen Reviewed by: 0mp, allanjude, brueffer, bcr Approved by: bcr MFC after: 3 days Relnotes: yes (new stats(7) man page) Differential Revision: https://reviews.freebsd.org/D24417 Notes: svn path=/head/; revision=361028
* Add references for the most important man7Benedict Reuschling2020-05-031-1/+39
| | | | | | | | | | | pages worth reading to intro(7). Submitted by: Gordon Bergling gbergling_gmail.com Approved by: bcr Differential Revision: https://reviews.freebsd.org/D24649 Notes: svn path=/head/; revision=360604
* Fix various, mostly minor errors in man pages like:Benedict Reuschling2020-05-031-1/+3
| | | | | | | | | | | | | | | | | | | | - Abbreviated month name in .Dd - position of HISTORY section - alphabetical ordering within SEE ALSO section - adding .Ed before .Sh DESCRIPTION - remove trailing whitespaces - Line break after a sentence stop - Use BSD OS macros instead of hardcoded strings No .Dd bumps as there was no actual content change made in any of these pages. Submitted by: Gordon Bergling gbergling_gmail.com Approved by: bcr Differential Revision: https://reviews.freebsd.org/D24591 Notes: svn path=/head/; revision=360603
* Add HISTORY sections to build(7), crypto(7),Benedict Reuschling2020-05-034-4/+24
| | | | | | | | | | | ffs(7), growfs(7), and diskless(8). Submitted by: Gordon Bergling gbergling_gmail.com Approved by: bcr Differential Revision: https://reviews.freebsd.org/D24271 Notes: svn path=/head/; revision=360602
* Reduce default TCP delayed ACK timeout to 40ms.Richard Scheffenegger2020-04-161-2/+2
| | | | | | | | | | | Reviewed by: kbowling, tuexen Approved by: tuexen (mentor) MFC after: 2 weeks Sponsored by: NetApp, Inc. Differential Revision: https://reviews.freebsd.org/D23281 Notes: svn path=/head/; revision=360010
* Document universe betterWarner Losh2020-03-311-1/+22
| | | | | | | | | | | | Document the kernels and worlds targets. Document the TARGETS and EXTRA_TARGETS variables. Reviewed by: brooks, bdrewery, emaste (LGTM) MFC After: 3 days Differential Revision: https://reviews.freebsd.org/D24212 Notes: svn path=/head/; revision=359496
* Make universe configuration more consistent with rest of systemWarner Losh2020-03-311-1/+7
| | | | | | | | | | | | | | | Add 'WITHOUT_WORLDS' and 'WITHOUT_KERNELS' as aliases for the inconsistently named MAKE_JUST_KERNELS and MAKE_JUST_WORLDS respectively. I always forget the MAKE_ part (or is it BUILD_), and it's inconsistent with everything else. Document the new things, but leave speculation of any eventual MAKE_JUST_* deprecation out of the manuals and comments. Reviewed by: brooks, bdrewery, emaste (LGTM) MFC After: 3 days Differential Revision: https://reviews.freebsd.org/D24212 Notes: svn path=/head/; revision=359494
* arch.7: update Default Tool Chain sectionEd Maste2020-03-281-28/+5
| | | | | | | All architectures use Clang, lld, and ELF Tool Chain now. Notes: svn path=/head/; revision=359395
* Refactor driver and consumer interfaces for OCF (in-kernel crypto).John Baldwin2020-03-271-27/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - The linked list of cryptoini structures used in session initialization is replaced with a new flat structure: struct crypto_session_params. This session includes a new mode to define how the other fields should be interpreted. Available modes include: - COMPRESS (for compression/decompression) - CIPHER (for simply encryption/decryption) - DIGEST (computing and verifying digests) - AEAD (combined auth and encryption such as AES-GCM and AES-CCM) - ETA (combined auth and encryption using encrypt-then-authenticate) Additional modes could be added in the future (e.g. if we wanted to support TLS MtE for AES-CBC in the kernel we could add a new mode for that. TLS modes might also affect how AAD is interpreted, etc.) The flat structure also includes the key lengths and algorithms as before. However, code doesn't have to walk the linked list and switch on the algorithm to determine which key is the auth key vs encryption key. The 'csp_auth_*' fields are always used for auth keys and settings and 'csp_cipher_*' for cipher. (Compression algorithms are stored in csp_cipher_alg.) - Drivers no longer register a list of supported algorithms. This doesn't quite work when you factor in modes (e.g. a driver might support both AES-CBC and SHA2-256-HMAC separately but not combined for ETA). Instead, a new 'crypto_probesession' method has been added to the kobj interface for symmteric crypto drivers. This method returns a negative value on success (similar to how device_probe works) and the crypto framework uses this value to pick the "best" driver. There are three constants for hardware (e.g. ccr), accelerated software (e.g. aesni), and plain software (cryptosoft) that give preference in that order. One effect of this is that if you request only hardware when creating a new session, you will no longer get a session using accelerated software. Another effect is that the default setting to disallow software crypto via /dev/crypto now disables accelerated software. Once a driver is chosen, 'crypto_newsession' is invoked as before. - Crypto operations are now solely described by the flat 'cryptop' structure. The linked list of descriptors has been removed. A separate enum has been added to describe the type of data buffer in use instead of using CRYPTO_F_* flags to make it easier to add more types in the future if needed (e.g. wired userspace buffers for zero-copy). It will also make it easier to re-introduce separate input and output buffers (in-kernel TLS would benefit from this). Try to make the flags related to IV handling less insane: - CRYPTO_F_IV_SEPARATE means that the IV is stored in the 'crp_iv' member of the operation structure. If this flag is not set, the IV is stored in the data buffer at the 'crp_iv_start' offset. - CRYPTO_F_IV_GENERATE means that a random IV should be generated and stored into the data buffer. This cannot be used with CRYPTO_F_IV_SEPARATE. If a consumer wants to deal with explicit vs implicit IVs, etc. it can always generate the IV however it needs and store partial IVs in the buffer and the full IV/nonce in crp_iv and set CRYPTO_F_IV_SEPARATE. The layout of the buffer is now described via fields in cryptop. crp_aad_start and crp_aad_length define the boundaries of any AAD. Previously with GCM and CCM you defined an auth crd with this range, but for ETA your auth crd had to span both the AAD and plaintext (and they had to be adjacent). crp_payload_start and crp_payload_length define the boundaries of the plaintext/ciphertext. Modes that only do a single operation (COMPRESS, CIPHER, DIGEST) should only use this region and leave the AAD region empty. If a digest is present (or should be generated), it's starting location is marked by crp_digest_start. Instead of using the CRD_F_ENCRYPT flag to determine the direction of the operation, cryptop now includes an 'op' field defining the operation to perform. For digests I've added a new VERIFY digest mode which assumes a digest is present in the input and fails the request with EBADMSG if it doesn't match the internally-computed digest. GCM and CCM already assumed this, and the new AEAD mode requires this for decryption. The new ETA mode now also requires this for decryption, so IPsec and GELI no longer do their own authentication verification. Simple DIGEST operations can also do this, though there are no in-tree consumers. To eventually support some refcounting to close races, the session cookie is now passed to crypto_getop() and clients should no longer set crp_sesssion directly. - Assymteric crypto operation structures should be allocated via crypto_getkreq() and freed via crypto_freekreq(). This permits the crypto layer to track open asym requests and close races with a driver trying to unregister while asym requests are in flight. - crypto_copyback, crypto_copydata, crypto_apply, and crypto_contiguous_subsegment now accept the 'crp' object as the first parameter instead of individual members. This makes it easier to deal with different buffer types in the future as well as separate input and output buffers. It's also simpler for driver writers to use. - bus_dmamap_load_crp() loads a DMA mapping for a crypto buffer. This understands the various types of buffers so that drivers that use DMA do not have to be aware of different buffer types. - Helper routines now exist to build an auth context for HMAC IPAD and OPAD. This reduces some duplicated work among drivers. - Key buffers are now treated as const throughout the framework and in device drivers. However, session key buffers provided when a session is created are expected to remain alive for the duration of the session. - GCM and CCM sessions now only specify a cipher algorithm and a cipher key. The redundant auth information is not needed or used. - For cryptosoft, split up the code a bit such that the 'process' callback now invokes a function pointer in the session. This function pointer is set based on the mode (in effect) though it simplifies a few edge cases that would otherwise be in the switch in 'process'. It does split up GCM vs CCM which I think is more readable even if there is some duplication. - I changed /dev/crypto to support GMAC requests using CRYPTO_AES_NIST_GMAC as an auth algorithm and updated cryptocheck to work with it. - Combined cipher and auth sessions via /dev/crypto now always use ETA mode. The COP_F_CIPHER_FIRST flag is now a no-op that is ignored. This was actually documented as being true in crypto(4) before, but the code had not implemented this before I added the CIPHER_FIRST flag. - I have not yet updated /dev/crypto to be aware of explicit modes for sessions. I will probably do that at some point in the future as well as teach it about IV/nonce and tag lengths for AEAD so we can support all of the NIST KAT tests for GCM and CCM. - I've split up the exising crypto.9 manpage into several pages of which many are written from scratch. - I have converted all drivers and consumers in the tree and verified that they compile, but I have not tested all of them. I have tested the following drivers: - cryptosoft - aesni (AES only) - blake2 - ccr and the following consumers: - cryptodev - IPsec - ktls_ocf - GELI (lightly) I have not tested the following: - ccp - aesni with sha - hifn - kgssapi_krb5 - ubsec - padlock - safe - armv8_crypto (aarch64) - glxsb (i386) - sec (ppc) - cesa (armv7) - cryptocteon (mips64) - nlmsec (mips64) Discussed with: cem Relnotes: yes Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D23677 Notes: svn path=/head/; revision=359374
* [PowerPC] Switch powerpc and powerpcspe to lldBrandon Bergren2020-03-271-2/+2
| | | | | | | | | | | | | | | Now that LLD 10 is out, and required patches have landed, we are now ready to finally switch away from the ancient in-tree ld.bfd. Special thanks to Fangrui Song for many hours of work on getting the 32-bit powerpc lld ready for prime-time. Reviewed by: emaste (earlier revision), jhibbits Relnotes: yes Differential Revision: https://reviews.freebsd.org/D24111 Notes: svn path=/head/; revision=359347
* arch.7: remove Default Tool Chain footnote about xtoolchainEd Maste2020-03-231-2/+0
| | | | | | | | | MIPS was the last arch to use external toolchain by default but uses in-tree Clang and lld as of r359233, and now no table entries reference the footnote. Notes: svn path=/head/; revision=359254
* arch.7: update Default Tool Chain intro textEd Maste2020-03-231-8/+8
| | | | | | | | | | | All FreeBSD archs now use an in-tree toolchain - Clang and ELF Tool Chain everywhere, and lld everywhere but 32-bit PowerPC (which still uses ld.bfd). No archs use external toolchain by default. Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=359253
* Update arch.7 .Dd for r359233Alex Richardson2020-03-231-1/+1
| | | | | | | Suggested by: lwhsu Notes: svn path=/head/; revision=359251
* Use Clang and LLD as the default toolchain for MIPSAlex Richardson2020-03-231-9/+9
| | | | | | | | | | | | Now that we have updated the in-tree version of LLVM to 10.0, we have all the necessary LLVM changes to use Clang+LLD as the default toolchain for MIPS. Relnotes: yes Reviewed By: emaste, jhb, brooks, kevans Differential Revision: https://reviews.freebsd.org/D23204 Notes: svn path=/head/; revision=359233
* arch.7: remove extraneous markup from header table sizingEd Maste2020-03-111-9/+9
| | | | | | | Reported by: 0mp (in response to r358891) Notes: svn path=/head/; revision=358898
* arch.7: remove note about GCC 4.2.1 removal dateEd Maste2020-03-081-8/+0
| | | | | | | | | GCC 4.2.1 was removed in r358454. Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=358789
* arch.7: remove sparc64 referencesEd Maste2020-03-081-10/+2
| | | | | | | | | | sparc64 was removed from the tree, so remove references here (except for the supported release table). Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=358788
* Add extremely useful calendar(1) application to FreeBSDConrad Meyer2020-03-031-0/+4
| | | | | | | | | | | | It does extremely useful things like execute sendmail and spew dubiously accurate factoids. From the feedback, it seems like it is an essential utility in a modern unix and not at all a useless bikeshed. How do those Linux people live without it? Reverts r358561. Notes: svn path=/head/; revision=358562
* Fix typo in r278616Conrad Meyer2020-03-021-4/+0
| | | | | | | FreeBSD isn't an encyclopedia. Notes: svn path=/head/; revision=358561
* Add some HISTORY sections to manpagesSergio Carlavilla Delgado2020-02-191-2/+2
| | | | | | | | | | | | | | | | | environ(7) was in AT&T Version 7 ac(8): Add a HISTORY section sa(8): Add a HISTORY section sqrt(3): Add the actual sqrt function to the HISTORY section Obtained from: OpenBSD Submitted by: gbergling@gmail.com Approved by: bcr@(mentor) MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D23693 Notes: svn path=/head/; revision=358099