Commit | Line | Data |
---|---|---|
5bd84e21 KM |
1 | .\" Copyright (c) 1980 Regents of the University of California. |
2 | .\" All rights reserved. The Berkeley software License Agreement | |
3 | .\" specifies the terms and conditions for redistribution. | |
4 | .\" | |
4ea25233 | 5 | .\" @(#)ncheck.8 5.1 (Berkeley) %G% |
5bd84e21 | 6 | .\" |
4ea25233 | 7 | .TH NCHECK 8 "4 February 1983" |
5bd84e21 KM |
8 | .UC 4 |
9 | .SH NAME | |
4ea25233 | 10 | ncheck \- generate names from i-numbers |
5bd84e21 KM |
11 | .SH SYNOPSIS |
12 | .B /etc/ncheck | |
13 | [ | |
14 | .B \-i | |
15 | numbers ] [ | |
16 | .B \-a | |
17 | ] [ | |
18 | .B \-s | |
19 | ] [ filesystem ] | |
20 | .SH DESCRIPTION | |
21 | .B N.B.: | |
22 | For most normal file system maintenance, the function of | |
23 | .I ncheck | |
24 | is subsumed by | |
25 | .IR fsck (8). | |
26 | .PP | |
27 | .I Ncheck | |
28 | with no argument | |
29 | generates a pathname vs. i-number | |
30 | list of all files | |
31 | on a set of default file systems. | |
32 | Names of directory files are followed by `/\fB.\fR'. | |
33 | The | |
34 | .B \-i | |
35 | option reduces the report to only those files whose i-numbers follow. | |
36 | The | |
37 | .B \-a | |
38 | option | |
39 | allows printing of the names | |
40 | .RB ` . ' | |
41 | and | |
42 | .RB ` .. ', | |
43 | which are ordinarily suppressed. | |
5bd84e21 KM |
44 | The |
45 | .B \-s | |
46 | option reduces the report to special files | |
47 | and files with set-user-ID mode; | |
48 | it is intended to discover concealed violations | |
49 | of security policy. | |
50 | .PP | |
51 | A file system may be specified. | |
52 | .PP | |
53 | The report is in no useful | |
54 | order, and probably should be sorted. | |
55 | .SH "SEE ALSO" | |
56 | sort(1), dcheck(8), fsck(8), icheck(8) | |
57 | .SH DIAGNOSTICS | |
58 | When the filesystem structure is improper, | |
59 | `??' denotes the `parent' of | |
60 | a parentless file and | |
61 | a pathname beginning with `...' denotes a loop. |