sysctl.8 (244106) | sysctl.8 (244198) |
---|---|
1.\" Copyright (c) 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 12 unchanged lines hidden (view full) --- 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" From: @(#)sysctl.8 8.1 (Berkeley) 6/6/93 | 1.\" Copyright (c) 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 12 unchanged lines hidden (view full) --- 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" From: @(#)sysctl.8 8.1 (Berkeley) 6/6/93 |
29.\" $FreeBSD: head/sbin/sysctl/sysctl.8 244106 2012-12-11 01:28:06Z alfred $ | 29.\" $FreeBSD: head/sbin/sysctl/sysctl.8 244198 2012-12-13 23:32:47Z delphij $ |
30.\" | 30.\" |
31.Dd January 17, 2011 | 31.Dd December 13, 2012 |
32.Dt SYSCTL 8 33.Os 34.Sh NAME 35.Nm sysctl 36.Nd get or set kernel state 37.Sh SYNOPSIS 38.Nm 39.Op Fl bdehiNnoRTqx | 32.Dt SYSCTL 8 33.Os 34.Sh NAME 35.Nm sysctl 36.Nd get or set kernel state 37.Sh SYNOPSIS 38.Nm 39.Op Fl bdehiNnoRTqx |
40.Op Fl f Ar filename |
|
40.Ar name Ns Op = Ns Ar value 41.Ar ... 42.Nm 43.Op Fl bdehNnoRTqx 44.Fl a 45.Sh DESCRIPTION 46The 47.Nm --- 27 unchanged lines hidden (view full) --- 75This is useful for producing output which can be fed back to the 76.Nm 77utility. 78This option is ignored if either 79.Fl N 80or 81.Fl n 82is specified, or a variable is being set. | 41.Ar name Ns Op = Ns Ar value 42.Ar ... 43.Nm 44.Op Fl bdehNnoRTqx 45.Fl a 46.Sh DESCRIPTION 47The 48.Nm --- 27 unchanged lines hidden (view full) --- 76This is useful for producing output which can be fed back to the 77.Nm 78utility. 79This option is ignored if either 80.Fl N 81or 82.Fl n 83is specified, or a variable is being set. |
84.It Fl f Ar filename 85Specify a file which contains a pair of name and value in each line. 86.Nm 87reads and processes the specified file first and then processes the name 88and value pairs in the command line argument. |
|
83.It Fl h 84Format output for human, rather than machine, readability. 85.It Fl i 86Ignore unknown OIDs. 87The purpose is to make use of 88.Nm 89for collecting data from a variety of machines (not all of which 90are necessarily running exactly the same software) easier. --- 217 unchanged lines hidden --- | 89.It Fl h 90Format output for human, rather than machine, readability. 91.It Fl i 92Ignore unknown OIDs. 93The purpose is to make use of 94.Nm 95for collecting data from a variety of machines (not all of which 96are necessarily running exactly the same software) easier. --- 217 unchanged lines hidden --- |