projects
/
unix-history
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
tags
|
clone url
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
checkpoint of hacking for mail.cs.berkeley.edu
[unix-history]
/
usr
/
src
/
sbin
/
ncheck
/
ncheck.8
diff --git
a/usr/src/sbin/ncheck/ncheck.8
b/usr/src/sbin/ncheck/ncheck.8
index
9bbea71
..
9c5fe78
100644
(file)
--- a/
usr/src/sbin/ncheck/ncheck.8
+++ b/
usr/src/sbin/ncheck/ncheck.8
@@
-1,22
+1,23
@@
-.\" Copyright (c) 1980 Regents of the University of California.
-.\" All rights reserved. The Berkeley software License Agreement
-.\" specifies the terms and conditions for redistribution.
+.\" Copyright (c) 1986 The Regents of the University of California.
+.\" All rights reserved.
.\"
.\"
-.\"
@(#)ncheck.8 4.1 (Berkeley) %G
%
+.\"
%sccs.include.proprietary.roff
%
.\"
.\"
-.TH NCHECK 8 "4/1/81"
+.\" @(#)ncheck.8 6.4 (Berkeley) %G%
+.\"
+.TH NCHECK 8 ""
.UC 4
.SH NAME
.UC 4
.SH NAME
-ncheck
\-
generate names from i-numbers
+ncheck
\-
generate names from i-numbers
.SH SYNOPSIS
.SH SYNOPSIS
-.B
/etc/
ncheck
+.B ncheck
[
.B \-i
[
.B \-i
-numbers ]
[
+numbers ] [
.B \-a
] [
.B \-s
.B \-a
] [
.B \-s
-]
[ filesystem ]
+]
filesystems ...
.SH DESCRIPTION
.B N.B.:
For most normal file system maintenance, the function of
.SH DESCRIPTION
.B N.B.:
For most normal file system maintenance, the function of
@@
-25,10
+26,10
@@
is subsumed by
.IR fsck (8).
.PP
.I Ncheck
.IR fsck (8).
.PP
.I Ncheck
-with no
argument
+with no
options
generates a pathname vs. i-number
list of all files
generates a pathname vs. i-number
list of all files
-on
a set of default file systems
.
+on
every specified filesystem
.
Names of directory files are followed by `/\fB.\fR'.
The
.B \-i
Names of directory files are followed by `/\fB.\fR'.
The
.B \-i
@@
-41,7
+42,6
@@
allows printing of the names
and
.RB ` .. ',
which are ordinarily suppressed.
and
.RB ` .. ',
which are ordinarily suppressed.
-suppressed.
The
.B \-s
option reduces the report to special files
The
.B \-s
option reduces the report to special files
@@
-49,8
+49,6
@@
and files with set-user-ID mode;
it is intended to discover concealed violations
of security policy.
.PP
it is intended to discover concealed violations
of security policy.
.PP
-A file system may be specified.
-.PP
The report is in no useful
order, and probably should be sorted.
.SH "SEE ALSO"
The report is in no useful
order, and probably should be sorted.
.SH "SEE ALSO"