checkpoint of hacking for mail.cs.berkeley.edu
[unix-history] / usr / src / sbin / ncheck / ncheck.8
CommitLineData
29e896d2
KB
1.\" Copyright (c) 1986 The Regents of the University of California.
2.\" All rights reserved.
5bd84e21 3.\"
29e896d2
KB
4.\" %sccs.include.proprietary.roff%
5.\"
6.\" @(#)ncheck.8 6.4 (Berkeley) %G%
5bd84e21 7.\"
2651fe1f 8.TH NCHECK 8 ""
5bd84e21
KM
9.UC 4
10.SH NAME
227c64e4 11ncheck \- generate names from i-numbers
5bd84e21 12.SH SYNOPSIS
015a76ec 13.B ncheck
5bd84e21
KM
14[
15.B \-i
227c64e4 16numbers ] [
5bd84e21
KM
17.B \-a
18] [
19.B \-s
227c64e4 20] filesystems ...
5bd84e21
KM
21.SH DESCRIPTION
22.B N.B.:
23For most normal file system maintenance, the function of
24.I ncheck
25is subsumed by
26.IR fsck (8).
27.PP
28.I Ncheck
227c64e4 29with no options
5bd84e21
KM
30generates a pathname vs. i-number
31list of all files
227c64e4 32on every specified filesystem.
5bd84e21
KM
33Names of directory files are followed by `/\fB.\fR'.
34The
35.B \-i
36option reduces the report to only those files whose i-numbers follow.
37The
38.B \-a
39option
40allows printing of the names
41.RB ` . '
42and
43.RB ` .. ',
44which are ordinarily suppressed.
5bd84e21
KM
45The
46.B \-s
47option reduces the report to special files
48and files with set-user-ID mode;
49it is intended to discover concealed violations
50of security policy.
51.PP
5bd84e21
KM
52The report is in no useful
53order, and probably should be sorted.
54.SH "SEE ALSO"
55sort(1), dcheck(8), fsck(8), icheck(8)
56.SH DIAGNOSTICS
57When the filesystem structure is improper,
58`??' denotes the `parent' of
59a parentless file and
60a pathname beginning with `...' denotes a loop.