Last active
May 5, 2021 11:26
-
-
Save tamakiii/dd0bde433084ee509411b0e073ceb5d6 to your computer and use it in GitHub Desktop.
ami-0d14de74618b313e2...amazonlinux:2.0.20210126.0 (docker.io)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- /dev/fd/11 2021-05-05 18:13:16.000000000 +0900 | |
+++ /dev/fd/13 2021-05-05 18:13:16.000000000 +0900 | |
@@ -3,267 +3,57 @@ | |
: | |
[ | |
[[ | |
-[ec2-user@ip-10-0-0-0 ~]$ compgen -c | |
]] | |
-__expand_tilde_by_ref | |
-__get_cword_at_cursor_by_ref | |
-__ltrim_colon_completions | |
-__parse_options | |
-__reassemble_comp_words_by_ref | |
-_allowed_groups | |
-_allowed_users | |
-_available_interfaces | |
-_cd | |
-_cd_devices | |
-_command | |
-_command_offset | |
-_complete_as_root | |
-_completion_loader | |
-_configured_interfaces | |
-_count_args | |
-_dvd_devices | |
-_expand | |
-_filedir | |
-_filedir_xspec | |
-_fstypes | |
-_get_comp_words_by_ref | |
-_get_cword | |
-_get_first_arg | |
-_get_pword | |
-_gids | |
-_have | |
-_init_completion | |
-_installed_modules | |
-_ip_addresses | |
-_kernel_versions | |
-_known_hosts | |
-_known_hosts_real | |
-_longopt | |
-_mac_addresses | |
-_minimal | |
-_modules | |
-_ncpus | |
-_parse_help | |
-_parse_usage | |
-_pci_ids | |
-_pgids | |
-_pids | |
-_pnames | |
-_quote_readline_by_ref | |
-_realcommand | |
-_rl_enabled | |
-_root_command | |
-_scl | |
-_service | |
-_services | |
-_shells | |
-_signals | |
-_split_longopt | |
-_sysvdirs | |
-_terms | |
-_tilde | |
-_uids | |
-_upvar | |
-_upvars | |
-_usb_ids | |
-_user_at_host | |
-_usergroup | |
-_userland | |
-_variables | |
-_xfunc | |
-_xinetd_services | |
-_yu_builddep | |
-_yu_debug_dump | |
-_yu_debuginfo_install | |
-_yu_init_completion | |
-_yu_package_cleanup | |
-_yu_repo_graph | |
-_yu_repo_rss | |
-_yu_repoclosure | |
-_yu_repodiff | |
-_yu_repomanage | |
-_yu_repoquery | |
-_yu_verifytree | |
-_yu_yumdb | |
-_yu_yumdownloader | |
-_yum | |
-_yum_atgroups | |
-_yum_baseopts | |
-_yum_binrpmfiles | |
-_yum_complete_baseopts | |
-_yum_helper | |
-_yum_list | |
-_yum_plugins | |
-_yum_transactions | |
-a2p | |
-ac | |
-accessdb | |
-accton | |
addgnupghome | |
-addpart | |
-addr2line | |
-agetty | |
alias | |
alternatives | |
amazon-linux-extras | |
amazon-linux-https | |
-amazon-ssm-agent | |
-anacron | |
applygnupgdefaults | |
-apropos | |
-ar | |
arch | |
-arp | |
-arpd | |
-arping | |
-as | |
-at | |
-atd | |
-atq | |
-atrm | |
-atrun | |
-attr | |
-audispd | |
-auditctl | |
-auditd | |
-augenrules | |
-aulast | |
-aulastlog | |
-aureport | |
-ausearch | |
-ausyscall | |
-authconfig | |
-authconfig-tui | |
-auvirt | |
-avcstat | |
awk | |
-aws | |
-aws_completer | |
-badblocks | |
base64 | |
basename | |
bash | |
bashbug | |
bashbug-64 | |
-batch | |
-bc | |
bg | |
bind | |
-blkdeactivate | |
-blkdiscard | |
-blkid | |
-blkiomon | |
-blkmapd | |
-blkparse | |
-blkrawverify | |
-blktrace | |
-blkzone | |
-blockdev | |
-bno_plot.py | |
-bond2team | |
-bootctl | |
-brctl | |
break | |
-bridge | |
-btrace | |
-btrecord | |
-btreplay | |
-btt | |
+build-locale-archive | |
builtin | |
-bunzip2 | |
-busctl | |
-bzcat | |
-bzcmp | |
-bzdiff | |
-bzgrep | |
-bzip2 | |
-bzip2recover | |
-bzless | |
-bzmore | |
-c++filt | |
-c2ph | |
ca-legacy | |
-cacertdir_rehash | |
-cache_check | |
-cache_dump | |
-cache_metadata_size | |
-cache_repair | |
-cache_restore | |
-cache_writeback | |
-cal | |
caller | |
capsh | |
captoinfo | |
case | |
cat | |
catchsegv | |
-catman | |
cd | |
certutil | |
-cfdisk | |
-cgdisk | |
-chacl | |
-chage | |
-chardetect | |
-chattr | |
chcon | |
-chcpu | |
chgrp | |
chkconfig | |
-chmem | |
chmod | |
chown | |
-chpasswd | |
-chronyc | |
-chronyd | |
chroot | |
-chrt | |
-chvt | |
-cifsiostat | |
cksum | |
clear | |
-clock | |
-clockdiff | |
-cloud-id | |
-cloud-init | |
-cloud-init-per | |
cmp | |
cmsutil | |
-col | |
-colcrt | |
-colrm | |
-column | |
comm | |
command | |
compgen | |
complete | |
compopt | |
-consolehelper | |
-consoletype | |
continue | |
-convertquota | |
coproc | |
-coredumpctl | |
cp | |
cpio | |
-cpupower | |
-cracklib-check | |
-cracklib-format | |
-cracklib-packer | |
-cracklib-unpacker | |
-create-cracklib-dict | |
crlutil | |
-crond | |
-crontab | |
-cryptsetup | |
-csh | |
csplit | |
-csslint-0.6 | |
-ctrlaltdel | |
-ctstat | |
curl | |
cut | |
-cvtsudoers | |
date | |
db_archive | |
db_checkpoint | |
@@ -280,186 +70,65 @@ | |
db_tuner | |
db_upgrade | |
db_verify | |
-dbus-cleanup-sockets | |
-dbus-daemon | |
-dbus-monitor | |
-dbus-run-session | |
-dbus-send | |
-dbus-test-tool | |
-dbus-update-activation-environment | |
-dbus-uuidgen | |
-dc | |
dd | |
-deallocvt | |
-debugfs | |
-debuginfo-install | |
declare | |
-delpart | |
-delv | |
-depmod | |
-dequote | |
-devlink | |
df | |
dgawk | |
-dhclient | |
-dhclient-script | |
diff | |
diff3 | |
-dig | |
dir | |
dircolors | |
dirname | |
dirs | |
disown | |
-dm_dso_reg_tool | |
-dmesg | |
-dmevent_tool | |
-dmeventd | |
-dmfilemapd | |
-dmidecode | |
-dmraid | |
-dmraid.static | |
-dmsetup | |
-dmstats | |
-dnsdomainname | |
do | |
-domainname | |
done | |
-dosfsck | |
-dosfslabel | |
-dracut | |
du | |
-dump-acct | |
-dump-utmp | |
-dumpe2fs | |
-dumpkeys | |
-dwp | |
-e2freefrag | |
-e2fsck | |
-e2image | |
-e2label | |
-e2undo | |
-e4defrag | |
-easy_install | |
-easy_install-2.7 | |
-easy_install-3.7 | |
-ebsnvme-id | |
-ec2-metadata | |
-ec2ifdown | |
-ec2ifscan | |
-ec2ifup | |
-ec2udev-vbd | |
-ec2udev-vcpu | |
echo | |
-ed | |
-edquota | |
-efibootmgr | |
egrep | |
-eject | |
-elfedit | |
elif | |
else | |
enable | |
-enable-ec2-spot-hibernation | |
env | |
-envsubst | |
eqn | |
-era_check | |
-era_dump | |
-era_invalidate | |
-era_restore | |
esac | |
-ether-wake | |
-ethtool | |
eval | |
ex | |
exec | |
exit | |
expand | |
export | |
-exportfs | |
expr | |
factor | |
-faillock | |
-fallocate | |
false | |
-fatlabel | |
fc | |
-fdformat | |
-fdisk | |
fg | |
-fgconsole | |
fgrep | |
fi | |
-file | |
-filefrag | |
-fincore | |
find | |
-find-repos-of-install | |
-find2perl | |
-findfs | |
-findmnt | |
-fipscheck | |
-fipshmac | |
-fixfiles | |
-fixparts | |
-flock | |
fmt | |
fold | |
for | |
-free | |
-fsadm | |
-fsck | |
-fsck.cramfs | |
-fsck.ext2 | |
-fsck.ext3 | |
-fsck.ext4 | |
-fsck.fat | |
-fsck.minix | |
-fsck.msdos | |
-fsck.vfat | |
-fsck.xfs | |
-fsfreeze | |
-fstrim | |
function | |
-funzip | |
-fuser | |
gapplication | |
gawk | |
gdbm_dump | |
gdbm_load | |
gdbmtool | |
gdbus | |
-gdisk | |
gencat | |
-genhomedircon | |
-genhostid | |
-genl | |
-genl-ctrl-list | |
-geoiplookup | |
-geoiplookup6 | |
-geoipupdate | |
geqn | |
getcap | |
getconf | |
-getenforce | |
getent | |
-getfacl | |
-getfattr | |
-getkeycodes | |
-getopt | |
getopts | |
getpcaps | |
-getsebool | |
-gettext | |
-gettext.sh | |
gio | |
gio-querymodules-64 | |
glib-compile-schemas | |
-gmake | |
+glibc_post_upgrade.x86_64 | |
gneqn | |
gnroff | |
-gpasswd | |
gpg | |
gpg-agent | |
gpg-connect-agent | |
@@ -472,150 +141,36 @@ | |
gpgv | |
gpgv2 | |
gpic | |
-gprof | |
grep | |
groff | |
grops | |
grotty | |
groups | |
-growpart | |
-grpck | |
-grpconv | |
-grpunconv | |
-grub2-editenv | |
-grub2-file | |
-grub2-fstest | |
-grub2-get-kernel-settings | |
-grub2-glue-efi | |
-grub2-install | |
-grub2-kbdcomp | |
-grub2-menulst2cfg | |
-grub2-mkconfig | |
-grub2-mkfont | |
-grub2-mkimage | |
-grub2-mklayout | |
-grub2-mknetdir | |
-grub2-mkpasswd-pbkdf2 | |
-grub2-mkrelpath | |
-grub2-mkrescue | |
-grub2-mkstandalone | |
-grub2-ofpathname | |
-grub2-probe | |
-grub2-reboot | |
-grub2-rpm-sort | |
-grub2-script-check | |
-grub2-set-default | |
-grub2-setpassword | |
-grub2-sparc64-setup | |
-grub2-syslinux2cfg | |
-grubby | |
gsettings | |
gsoelim | |
-gssproxy | |
-gtar | |
gtbl | |
gtroff | |
-gunzip | |
-gzexe | |
-gzip | |
-h2ph | |
-halt | |
-hardlink | |
hash | |
head | |
help | |
-hexdump | |
-hibagent | |
history | |
-host | |
hostid | |
-hostname | |
-hostnamectl | |
-hunspell | |
-hwclock | |
iconv | |
iconvconfig | |
-iconvconfig.aarch64 | |
+iconvconfig.x86_64 | |
id | |
-idiag-socket-details | |
-idn | |
if | |
-ifcfg | |
-ifconfig | |
-ifdown | |
-ifenslave | |
-ifstat | |
-ifup | |
igawk | |
in | |
info | |
infocmp | |
infokey | |
infotocap | |
-init | |
-insmod | |
install | |
install-info | |
-installkernel | |
-ionice | |
-iostat | |
-ip | |
-ip6tables | |
-ip6tables-legacy | |
-ip6tables-legacy-restore | |
-ip6tables-legacy-save | |
-ip6tables-restore | |
-ip6tables-save | |
-ipcalc | |
-ipcmk | |
-ipcrm | |
-ipcs | |
-ipmaddr | |
-iptables | |
-iptables-apply | |
-iptables-legacy | |
-iptables-legacy-restore | |
-iptables-legacy-save | |
-iptables-restore | |
-iptables-save | |
-iptables-xml | |
-iptunnel | |
-irqbalance | |
-isosize | |
jobs | |
join | |
-journalctl | |
-jp.py | |
-jp.py-2 | |
-jp.py-2.7 | |
-json_reformat | |
-json_verify | |
-jsonpointer | |
-jsonschema | |
-kbd_mode | |
-kbdinfo | |
-kbdrate | |
-kernel-install | |
-key.dns_resolver | |
-keyctl | |
kill | |
-killall | |
-killall5 | |
-kmod | |
-kpartx | |
-kpatch | |
-l. | |
-last | |
-lastb | |
-lastcomm | |
-lastlog | |
-lchage | |
-lchfn | |
-lchsh | |
-ld | |
-ld.bfd | |
-ld.gold | |
-ldattach | |
ldconfig | |
ldd | |
less | |
@@ -623,558 +178,89 @@ | |
lesskey | |
lesspipe.sh | |
let | |
-lexgrog | |
-lgroupadd | |
-lgroupdel | |
-lgroupmod | |
-lid | |
link | |
-linux-boot-prober | |
-linux32 | |
-linux64 | |
-ll | |
ln | |
-lnewusers | |
-lnstat | |
-load_policy | |
-loadkeys | |
-loadunimap | |
local | |
locale | |
-localectl | |
localedef | |
-locate | |
-logger | |
-login | |
-loginctl | |
logname | |
logout | |
-logrotate | |
-logsave | |
-look | |
-losetup | |
-lpasswd | |
ls | |
-lsattr | |
-lsblk | |
-lscpu | |
-lsinitrd | |
-lsipc | |
-lslocks | |
-lslogins | |
-lsmcli | |
-lsmd | |
-lsmem | |
-lsmod | |
-lsns | |
-lsof | |
-lspci | |
lua | |
luac | |
-luseradd | |
-luserdel | |
-lusermod | |
-lvchange | |
-lvconvert | |
-lvcreate | |
-lvdisplay | |
-lvextend | |
-lvm | |
-lvmconf | |
-lvmconfig | |
-lvmdiskscan | |
-lvmdump | |
-lvmetad | |
-lvmpolld | |
-lvmsadc | |
-lvmsar | |
-lvreduce | |
-lvremove | |
-lvrename | |
-lvresize | |
-lvs | |
-lvscan | |
-lz4 | |
-lz4c | |
-lz4cat | |
-machinectl | |
-mailq | |
-mailq.postfix | |
-make | |
makedb | |
-man | |
-mandb | |
-manpath | |
mapfile | |
-mapscrn | |
-matchpathcon | |
-mcookie | |
md5sum | |
-mdadm | |
-mdig | |
-mdmon | |
-mesg | |
-mii-diag | |
-mii-tool | |
-mkdict | |
mkdir | |
-mkdosfs | |
-mke2fs | |
mkfifo | |
-mkfs | |
-mkfs.cramfs | |
-mkfs.ext2 | |
-mkfs.ext3 | |
-mkfs.ext4 | |
-mkfs.fat | |
-mkfs.minix | |
-mkfs.msdos | |
-mkfs.vfat | |
-mkfs.xfs | |
-mkhomedir_helper | |
-mkinitrd | |
-mklost+found | |
mknod | |
-mkswap | |
mktemp | |
-modinfo | |
-modprobe | |
modutil | |
-more | |
-mount | |
-mount.nfs | |
-mount.nfs4 | |
-mountpoint | |
-mountstats | |
-mpstat | |
-msgattrib | |
-msgcat | |
-msgcmp | |
-msgcomm | |
-msgconv | |
-msgen | |
-msgexec | |
-msgfilter | |
-msgfmt | |
-msggrep | |
-msghack | |
-msginit | |
-msgmerge | |
-msgunfmt | |
-msguniq | |
-mtr | |
-mtr-packet | |
mv | |
-namei | |
-nameif | |
-nano | |
-needs-restarting | |
neqn | |
-netreport | |
-netstat | |
-nettle-hash | |
-nettle-lfib-stream | |
-new-kernel-pkg | |
-newaliases | |
-newaliases.postfix | |
-newgrp | |
-newusers | |
-nf-ct-add | |
-nf-ct-list | |
-nf-exp-add | |
-nf-exp-delete | |
-nf-exp-list | |
-nf-log | |
-nf-monitor | |
-nf-queue | |
-nfsdcltrack | |
-nfsidmap | |
-nfsiostat | |
-nfsiostat-sysstat | |
-nfsstat | |
-ngettext | |
nice | |
-nisdomainname | |
nl | |
-nl-addr-add | |
-nl-addr-delete | |
-nl-addr-list | |
-nl-class-add | |
-nl-class-delete | |
-nl-class-list | |
-nl-classid-lookup | |
-nl-cls-add | |
-nl-cls-delete | |
-nl-cls-list | |
-nl-fib-lookup | |
-nl-link-enslave | |
-nl-link-ifindex2name | |
-nl-link-list | |
-nl-link-name2ifindex | |
-nl-link-release | |
-nl-link-set | |
-nl-link-stats | |
-nl-list-caches | |
-nl-list-sockets | |
-nl-monitor | |
-nl-neigh-add | |
-nl-neigh-delete | |
-nl-neigh-list | |
-nl-neightbl-list | |
-nl-pktloc-lookup | |
-nl-qdisc-add | |
-nl-qdisc-delete | |
-nl-qdisc-list | |
-nl-route-add | |
-nl-route-delete | |
-nl-route-get | |
-nl-route-list | |
-nl-rule-list | |
-nl-tctree-list | |
-nl-util-addr | |
-nm | |
nohup | |
-nologin | |
nproc | |
nroff | |
-nsenter | |
-nslookup | |
nss-policy-check | |
-nstat | |
-nsupdate | |
-ntsysv | |
numfmt | |
-objcopy | |
-objdump | |
od | |
oldfind | |
-on_ac_power | |
-open | |
-openssl | |
-openvt | |
-os-prober | |
-osd_login | |
p11-kit | |
-package-cleanup | |
-packer | |
-pam_console_apply | |
-pam_tally2 | |
-pam_timestamp_check | |
-parted | |
-partprobe | |
-partx | |
-passwd | |
paste | |
pathchk | |
-pdata_tools | |
-perl | |
-perl5.16.3 | |
-perlbug | |
-perldoc | |
-perlthanks | |
pgawk | |
-pgrep | |
pic | |
-piconv | |
-pidof | |
-pidstat | |
pinentry | |
pinentry-curses | |
-ping | |
-ping6 | |
pinky | |
-pip-3 | |
-pip-3.7 | |
-pip3 | |
-pip3.7 | |
-pivot_root | |
pk12util | |
-pkcs1-conv | |
-pkg-config | |
-pkill | |
-pl2pm | |
pldd | |
-plipconfig | |
-plymouth | |
-plymouth-set-default-theme | |
-plymouthd | |
-pm-hibernate | |
-pm-is-supported | |
-pm-powersave | |
-pm-suspend | |
-pm-suspend-hybrid | |
-pm-utils-bugreport-info.sh | |
-pmap | |
-pod2html | |
-pod2man | |
-pod2text | |
-pod2usage | |
popd | |
post-grohtml | |
-postalias | |
-postcat | |
-postconf | |
-postdrop | |
-postfix | |
-postkick | |
-postlock | |
-postlog | |
-postmap | |
-postmulti | |
-postqueue | |
-postsuper | |
-poweroff | |
-ppp-watch | |
pr | |
pre-grohtml | |
preconv | |
printenv | |
printf | |
-prlimit | |
-prtstat | |
-ps | |
-psed | |
-psfaddtable | |
-psfgettable | |
-psfstriptable | |
-psfxtable | |
-pstree | |
-pstree.x11 | |
-pstruct | |
ptx | |
pushd | |
-pvchange | |
-pvck | |
-pvcreate | |
-pvdisplay | |
-pvmove | |
-pvremove | |
-pvresize | |
-pvs | |
-pvscan | |
-pwck | |
-pwconv | |
pwd | |
-pwdx | |
-pwhistory_helper | |
-pwmake | |
-pwscore | |
-pwunconv | |
pydoc | |
-pydoc3 | |
-pydoc3.7 | |
-pyrsa-decrypt | |
-pyrsa-decrypt-2 | |
-pyrsa-decrypt-bigfile | |
-pyrsa-decrypt-bigfile-2 | |
-pyrsa-encrypt | |
-pyrsa-encrypt-2 | |
-pyrsa-encrypt-bigfile | |
-pyrsa-encrypt-bigfile-2 | |
-pyrsa-keygen | |
-pyrsa-keygen-2 | |
-pyrsa-priv2pub | |
-pyrsa-priv2pub-2 | |
-pyrsa-sign | |
-pyrsa-sign-2 | |
-pyrsa-verify | |
-pyrsa-verify-2 | |
-pystache | |
-pystache-3 | |
-pystache-test | |
-pystache-test-3 | |
python | |
-python-config | |
python2 | |
-python2-config | |
python2.7 | |
-python2.7-config | |
-python3 | |
-python3.7 | |
-python3.7m | |
-pyvenv | |
-pyvenv-3.7 | |
-quot | |
-quota | |
-quotacheck | |
-quotaoff | |
-quotaon | |
-quotastats | |
-quotasync | |
-quote | |
-quote_readline | |
-raid-check | |
-ranlib | |
-raw | |
-rdate | |
-rdisc | |
-rdma | |
read | |
readarray | |
-readelf | |
readlink | |
readonly | |
-readprofile | |
realpath | |
-reboot | |
-recode-sr-latin | |
-red | |
-rename | |
-renice | |
-repo-graph | |
-repo-rss | |
-repoclosure | |
-repodiff | |
-repomanage | |
-repoquery | |
-reposync | |
-repotrack | |
-repquota | |
-request-key | |
reset | |
-resize2fs | |
-resizepart | |
-restorecon | |
return | |
-rev | |
rm | |
-rmail | |
-rmail.postfix | |
rmdir | |
-rmmod | |
-rnano | |
-rngd | |
-rngtest | |
-route | |
-routef | |
-routel | |
-rpc.gssd | |
-rpc.idmapd | |
-rpc.mountd | |
-rpc.nfsd | |
-rpc.rquotad | |
-rpc.statd | |
-rpcbind | |
-rpcdebug | |
rpcgen | |
-rpcinfo | |
rpm | |
rpm2cpio | |
rpmdb | |
rpmkeys | |
rpmquery | |
rpmverify | |
-rst2html | |
-rst2html-3 | |
-rst2html-3.7 | |
-rst2html4-3 | |
-rst2html4-3.7 | |
-rst2html5-3 | |
-rst2html5-3.7 | |
-rst2latex | |
-rst2latex-3 | |
-rst2latex-3.7 | |
-rst2man | |
-rst2man-3 | |
-rst2man-3.7 | |
-rst2odt | |
-rst2odt-3 | |
-rst2odt-3.7 | |
-rst2odt_prepstyles | |
-rst2odt_prepstyles-3 | |
-rst2odt_prepstyles-3.7 | |
-rst2pseudoxml | |
-rst2pseudoxml-3 | |
-rst2pseudoxml-3.7 | |
-rst2s5 | |
-rst2s5-3 | |
-rst2s5-3.7 | |
-rst2xetex | |
-rst2xetex-3 | |
-rst2xetex-3.7 | |
-rst2xml | |
-rst2xml-3 | |
-rst2xml-3.7 | |
-rstpep2html | |
-rstpep2html-3 | |
-rstpep2html-3.7 | |
-rsync | |
-rsyslog-recover-qi.pl | |
-rsyslogd | |
-rtacct | |
-rtcwake | |
-rtmon | |
-rtpr | |
-rtstat | |
-run-parts | |
runcon | |
-runlevel | |
-runuser | |
rvi | |
rview | |
-rvim | |
-s2p | |
-sa | |
-sadf | |
-safe_finger | |
-sar | |
sasldblistusers2 | |
saslpasswd2 | |
-scl | |
-scl_enabled | |
-scl_source | |
-scp | |
-screen | |
-script | |
-scriptreplay | |
sdiff | |
-secon | |
sed | |
sefcontext_compile | |
-selabel_digest | |
-selabel_lookup | |
-selabel_lookup_best_match | |
-selabel_partial_match | |
select | |
-selinux_restorecon | |
-selinuxconlist | |
-selinuxdefcon | |
-selinuxenabled | |
-selinuxexeccon | |
-semodule | |
-sendmail | |
-sendmail.postfix | |
seq | |
-service | |
-sestatus | |
set | |
-setarch | |
setcap | |
-setenforce | |
-setfacl | |
-setfattr | |
-setfiles | |
-setfont | |
-setkeycodes | |
-setleds | |
-setmetamode | |
-setpci | |
-setpriv | |
-setquota | |
-setsebool | |
-setserial | |
-setsid | |
-setterm | |
-setup | |
setup-nsssysinit | |
setup-nsssysinit.sh | |
-setvtrgb | |
-sexp-conv | |
-sfdisk | |
-sftp | |
-sg | |
-sgdisk | |
-sgpio | |
sh | |
sha1sum | |
sha224sum | |
@@ -1183,316 +269,83 @@ | |
sha512sum | |
shift | |
shopt | |
-show-changed-rco | |
-show-installed | |
-showconsolefont | |
-showkey | |
-showmount | |
shred | |
shuf | |
-shutdown | |
signver | |
-sim_lsmplugin | |
-simc_lsmplugin | |
-size | |
-skill | |
-slabtop | |
-slattach | |
sleep | |
sln | |
-slogin | |
-sm-notify | |
-smtp-sink | |
-smtp-source | |
-snice | |
soelim | |
sort | |
sotruss | |
source | |
-splain | |
split | |
sprof | |
sqlite3 | |
-ss | |
-ssh | |
-ssh-add | |
-ssh-agent | |
-ssh-copy-id | |
-ssh-keygen | |
-ssh-keyscan | |
-sshd | |
-sshd-keygen | |
ssltap | |
-ssm-agent-worker | |
-ssm-cli | |
-ssm-document-worker | |
-ssm-session-logger | |
-ssm-session-worker | |
-stap-merge | |
-stap-report | |
-stapbpf | |
-stapsh | |
-start-statd | |
stat | |
stdbuf | |
-strace | |
-strace-log-merge | |
-strings | |
-strip | |
stty | |
-su | |
-sudo | |
-sudoedit | |
-sudoreplay | |
-sulogin | |
sum | |
-sushell | |
suspend | |
-swaplabel | |
-swapoff | |
-swapon | |
-switch_root | |
sync | |
-sys-unconfig | |
-sysctl | |
-systemctl | |
-systemd-analyze | |
-systemd-ask-password | |
-systemd-cat | |
-systemd-cgls | |
-systemd-cgtop | |
-systemd-coredumpctl | |
-systemd-delta | |
-systemd-detect-virt | |
-systemd-escape | |
-systemd-firstboot | |
-systemd-hwdb | |
-systemd-inhibit | |
-systemd-loginctl | |
-systemd-machine-id-setup | |
-systemd-notify | |
-systemd-nspawn | |
-systemd-path | |
-systemd-run | |
-systemd-stdio-bridge | |
-systemd-sysv-convert | |
-systemd-tmpfiles | |
-systemd-tty-ask-password-agent | |
tabs | |
tac | |
tail | |
-tapestat | |
-tar | |
-taskset | |
tbl | |
-tcpd | |
-tcpdmatch | |
-tcpdump | |
-tcpslice | |
-tcptraceroute | |
-tcsh | |
-teamd | |
-teamdctl | |
-teamnl | |
tee | |
-telinit | |
test | |
then | |
-thin_check | |
-thin_delta | |
-thin_dump | |
-thin_ls | |
-thin_metadata_size | |
-thin_repair | |
-thin_restore | |
-thin_rmap | |
-thin_trim | |
tic | |
time | |
-timedatectl | |
timeout | |
times | |
-tipc | |
-tload | |
toe | |
-top | |
touch | |
tput | |
tr | |
-tracepath | |
-tracepath6 | |
-traceroute | |
-traceroute6 | |
trap | |
troff | |
true | |
truncate | |
trust | |
-try-from | |
tset | |
tsort | |
tty | |
-tune2fs | |
type | |
typeset | |
tzselect | |
-udevadm | |
-ul | |
ulimit | |
umask | |
-umount | |
-umount.nfs | |
-umount.nfs4 | |
unalias | |
uname | |
-uname26 | |
unexpand | |
-unicode_start | |
-unicode_stop | |
uniq | |
-unix_chkpwd | |
unlink | |
-unlz4 | |
unset | |
-unshare | |
until | |
-unxz | |
-unzip | |
-unzipsfx | |
update-alternatives | |
update-ca-trust | |
update-mime-database | |
-update-motd | |
-update-pciids | |
-updatedb | |
-uptime | |
urlgrabber | |
-userhelper | |
-usernetctl | |
users | |
-usleep | |
-utmpdump | |
-uuidgen | |
vdir | |
-verify_blkparse | |
-verifytree | |
-vgcfgbackup | |
-vgcfgrestore | |
-vgchange | |
-vgck | |
-vgconvert | |
-vgcreate | |
-vgdisplay | |
-vgexport | |
-vgextend | |
-vgimport | |
-vgimportclone | |
-vgmerge | |
-vgmknodes | |
-vgreduce | |
-vgremove | |
-vgrename | |
-vgs | |
-vgscan | |
-vgsplit | |
vi | |
view | |
-vigr | |
-vim | |
-vimdiff | |
-vimtutor | |
-vipw | |
-virt-what | |
-visudo | |
-vlock | |
-vmstat | |
-w | |
wait | |
-wall | |
-watch | |
watchgnupg | |
wc | |
-wdctl | |
-weak-modules | |
-wget | |
-whatis | |
-whereis | |
which | |
while | |
-whiptail | |
who | |
whoami | |
-wipefs | |
-write | |
xargs | |
-xfs_admin | |
-xfs_bmap | |
-xfs_copy | |
-xfs_db | |
-xfs_estimate | |
-xfs_freeze | |
-xfs_fsr | |
-xfs_growfs | |
-xfs_info | |
-xfs_io | |
-xfs_logprint | |
-xfs_mdrestore | |
-xfs_metadump | |
-xfs_mkfile | |
-xfs_ncheck | |
-xfs_quota | |
-xfs_repair | |
-xfs_rtcp | |
-xfsdump | |
-xfsinvutil | |
-xfsrestore | |
-xgettext | |
xmlcatalog | |
xmllint | |
xmlwf | |
-xqmstats | |
-xtables-legacy-multi | |
-xxd | |
-xz | |
-xzcat | |
-xzcmp | |
-xzdec | |
-xzdiff | |
-xzegrep | |
-xzfgrep | |
-xzgrep | |
-xzless | |
-xzmore | |
yes | |
-ypdomainname | |
yum | |
-yum-builddep | |
-yum-complete-transaction | |
-yum-config-manager | |
-yum-debug-dump | |
-yum-debug-restore | |
-yum-groups-manager | |
-yumdb | |
-yumdownloader | |
-zcat | |
-zcmp | |
-zdiff | |
zdump | |
-zegrep | |
-zfgrep | |
-zforce | |
-zgrep | |
zic | |
-zip | |
-zipcloak | |
-zipgrep | |
-zipinfo | |
-zipnote | |
-zipsplit | |
-zless | |
-zmore | |
-znew | |
-zramctl | |
zsoelim | |
{ | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ diff -u /tmp/aa.txt /tmp/bb.txt | |
--- /tmp/aa.txt 2021-05-05 18:23:03.000000000 +0900 | |
+++ /tmp/bb.txt 2021-05-05 18:24:44.000000000 +0900 | |
@@ -1,4 +1,3 @@ | |
-[ec2-user@ip-10-0-4-176 ~]$ cat /etc/yum.repos.d/* | |
[amzn2-core] | |
name=Amazon Linux 2 core repository | |
mirrorlist=$awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/$product/$target/$basearch/mirror.list | |
@@ -31,57 +30,3 @@ | |
metadata_expire=300 | |
mirrorlist_expire=300 | |
report_instanceid=yes | |
- | |
- | |
- | |
- | |
-### This file is managed with amazon-linux-extras. Please manage with that tool. | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
-[amzn2extra-docker-source] | |
-enabled = 0 | |
-name = Amazon Extras source repo for docker | |
-mirrorlist = $awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/extras/docker/latest/SRPMS/mirror.list | |
-gpgcheck = 1 | |
-gpgkey = file:///etc/pki/rpm-gpg/RPM-GPG-KEY-amazon-linux-2 | |
-priority = 10 | |
-skip_if_unavailable = 1 | |
-report_instanceid = yes | |
- | |
-[amzn2extra-docker-debuginfo] | |
-enabled = 0 | |
-name = Amazon Extras debuginfo repo for docker | |
-mirrorlist = $awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/extras/docker/latest/debuginfo/$basearch/mirror.list | |
-gpgcheck = 1 | |
-gpgkey = file:///etc/pki/rpm-gpg/RPM-GPG-KEY-amazon-linux-2 | |
-priority = 10 | |
-skip_if_unavailable = 1 | |
-report_instanceid = yes | |
- | |
-[amzn2extra-docker] | |
-enabled = 1 | |
-name = Amazon Extras repo for docker | |
-mirrorlist = $awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/extras/docker/latest/$basearch/mirror.list | |
-gpgcheck = 1 | |
-gpgkey = file:///etc/pki/rpm-gpg/RPM-GPG-KEY-amazon-linux-2 | |
-priority = 10 | |
-skip_if_unavailable = 1 | |
-report_instanceid = yes |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ec2-user@ip-10-0-0-0 ~]$ set +x; for c in a2p ac accessdb accton addpart addr2line agetty amazon-ssm-agent anacron apropos ar arp arpd arping as at atd atq atrm atrun attr audispd auditctl auditd augenrules aulast aulastlog aureport ausearch ausyscall authconfig authconfig-tui auvirt avcstat aws aws_completer badblocks batch bc blkdeactivate blkdiscard blkid blkiomon blkmapd blkparse blkrawverify blktrace blkzone blockdev bno_plot.py bond2team bootctl brctl bridge btrace btrecord btreplay btt bunzip2 busctl bzcat bzcmp bzdiff bzgrep bzip2 bzip2recover bzless bzmore c++filt c2ph cacertdir_rehash cache_check cache_dump cache_metadata_size cache_repair cache_restore cache_writeback cal catman cfdisk cgdisk chacl chage chardetect chattr chcpu chmem chpasswd chronyc chronyd chrt chvt cifsiostat clock clockdiff cloud-id cloud-init cloud-init-per col colcrt colrm column consolehelper consoletype convertquota coredumpctl cpupower cracklib-check cracklib-format cracklib-packer cracklib-unpacker create-cracklib-dict crond crontab cryptsetup csh csslint-0.6 ctrlaltdel ctstat cvtsudoers dbus-cleanup-sockets dbus-daemon dbus-monitor dbus-run-session dbus-send dbus-test-tool dbus-update-activation-environment dbus-uuidgen dc deallocvt debugfs debuginfo-install delpart delv depmod dequote devlink dhclient dhclient-script dig dm_dso_reg_tool dmesg dmevent_tool dmeventd dmfilemapd dmidecode dmraid dmraid.static dmsetup dmstats dnsdomainname domainname dosfsck dosfslabel dracut dump-acct dump-utmp dumpe2fs dumpkeys dwp e2freefrag e2fsck e2image e2label e2undo e4defrag easy_install easy_install-2.7 easy_install-3.7 ebsnvme-id ec2-metadata ec2ifdown ec2ifscan ec2ifup ec2udev-vbd ec2udev-vcpu ed edquota efibootmgr eject elfedit enable-ec2-spot-hibernation envsubst era_check era_dump era_invalidate era_restore ether-wake ethtool exportfs faillock fallocate fatlabel fdformat fdisk fgconsole file filefrag fincore find-repos-of-install find2perl findfs findmnt fipscheck fipshmac fixfiles fixparts flock free fsadm fsck fsck.cramfs fsck.ext2 fsck.ext3 fsck.ext4 fsck.fat fsck.minix fsck.msdos fsck.vfat fsck.xfs fsfreeze fstrim funzip fuser gdisk genhomedircon genhostid genl genl-ctrl-list geoiplookup geoiplookup6 geoipupdate getenforce getfacl getfattr getkeycodes getopt getsebool gettext gettext.sh gmake gpasswd gprof growpart grpck grpconv grpunconv grub2-editenv grub2-file grub2-fstest grub2-get-kernel-settings grub2-glue-efi grub2-install grub2-kbdcomp grub2-menulst2cfg grub2-mkconfig grub2-mkfont grub2-mkimage grub2-mklayout grub2-mknetdir grub2-mkpasswd-pbkdf2 grub2-mkrelpath grub2-mkrescue grub2-mkstandalone grub2-ofpathname grub2-probe grub2-reboot grub2-rpm-sort grub2-script-check grub2-set-default grub2-setpassword grub2-sparc64-setup grub2-syslinux2cfg grubby gssproxy gtar gunzip gzexe gzip h2ph halt hardlink hexdump hibagent host hostname hostnamectl hunspell hwclock iconvconfig.aarch64 idiag-socket-details idn ifcfg ifconfig ifdown ifenslave ifstat ifup init insmod installkernel ionice iostat ip ip6tables ip6tables-legacy ip6tables-legacy-restore ip6tables-legacy-save ip6tables-restore ip6tables-save ipcalc ipcmk ipcrm ipcs ipmaddr iptables iptables-apply iptables-legacy iptables-legacy-restore iptables-legacy-save iptables-restore iptables-save iptables-xml iptunnel irqbalance isosize journalctl jp.py jp.py-2 jp.py-2.7 json_reformat json_verify jsonpointer jsonschema kbd_mode kbdinfo kbdrate kernel-install key.dns_resolver keyctl killall killall5 kmod kpartx kpatch l. last lastb lastcomm lastlog lchage lchfn lchsh ld ld.bfd ld.gold ldattach lexgrog lgroupadd lgroupdel lgroupmod lid linux-boot-prober linux32 linux64 ll lnewusers lnstat load_policy loadkeys loadunimap localectl locate logger login loginctl logrotate logsave look losetup lpasswd lsattr lsblk lscpu lsinitrd lsipc lslocks lslogins lsmcli lsmd lsmem lsmod lsns lsof lspci luseradd luserdel lusermod lvchange lvconvert lvcreate lvdisplay lvextend lvm lvmconf lvmconfig lvmdiskscan lvmdump lvmetad lvmpolld lvmsadc lvmsar lvreduce lvremove lvrename lvresize lvs lvscan lz4 lz4c lz4cat machinectl mailq mailq.postfix make man mandb manpath mapscrn matchpathcon mcookie mdadm mdig mdmon mesg mii-diag mii-tool mkdict mkdosfs mke2fs mkfs mkfs.cramfs mkfs.ext2 mkfs.ext3 mkfs.ext4 mkfs.fat mkfs.minix mkfs.msdos mkfs.vfat mkfs.xfs mkhomedir_helper mkinitrd mklost+found mkswap modinfo modprobe more mount mount.nfs mount.nfs4 mountpoint mountstats mpstat msgattrib msgcat msgcmp msgcomm msgconv msgen msgexec msgfilter msgfmt msggrep msghack msginit msgmerge msgunfmt msguniq mtr mtr-packet namei nameif nano needs-restarting netreport netstat nettle-hash nettle-lfib-stream new-kernel-pkg newaliases newaliases.postfix newgrp newusers nf-ct-add nf-ct-list nf-exp-add nf-exp-delete nf-exp-list nf-log nf-monitor nf-queue nfsdcltrack nfsidmap nfsiostat nfsiostat-sysstat nfsstat ngettext nisdomainname nl-addr-add nl-addr-delete nl-addr-list nl-class-add nl-class-delete nl-class-list nl-classid-lookup nl-cls-add nl-cls-delete nl-cls-list nl-fib-lookup nl-link-enslave nl-link-ifindex2name nl-link-list nl-link-name2ifindex nl-link-release nl-link-set nl-link-stats nl-list-caches nl-list-sockets nl-monitor nl-neigh-add nl-neigh-delete nl-neigh-list nl-neightbl-list nl-pktloc-lookup nl-qdisc-add nl-qdisc-delete nl-qdisc-list nl-route-add nl-route-delete nl-route-get nl-route-list nl-rule-list nl-tctree-list nl-util-addr nm nologin nsenter nslookup nstat nsupdate ntsysv objcopy objdump on_ac_power open openssl openvt os-prober osd_login package-cleanup packer pam_console_apply pam_tally2 pam_timestamp_check parted partprobe partx passwd pdata_tools perl perl5.16.3 perlbug perldoc perlthanks pgrep piconv pidof pidstat ping ping6 pip-3 pip-3.7 pip3 pip3.7 pivot_root pkcs1-conv pkg-config pkill pl2pm plipconfig plymouth plymouth-set-default-theme plymouthd pm-hibernate pm-is-supported pm-powersave pm-suspend pm-suspend-hybrid pm-utils-bugreport-info.sh pmap pod2html pod2man pod2text pod2usage postalias postcat postconf postdrop postfix postkick postlock postlog postmap postmulti postqueue postsuper poweroff ppp-watch prlimit prtstat ps psed psfaddtable psfgettable psfstriptable psfxtable pstree pstree.x11 pstruct pvchange pvck pvcreate pvdisplay pvmove pvremove pvresize pvs pvscan pwck pwconv pwdx pwhistory_helper pwmake pwscore pwunconv pydoc3 pydoc3.7 pyrsa-decrypt pyrsa-decrypt-2 pyrsa-decrypt-bigfile pyrsa-decrypt-bigfile-2 pyrsa-encrypt pyrsa-encrypt-2 pyrsa-encrypt-bigfile pyrsa-encrypt-bigfile-2 pyrsa-keygen pyrsa-keygen-2 pyrsa-priv2pub pyrsa-priv2pub-2 pyrsa-sign pyrsa-sign-2 pyrsa-verify pyrsa-verify-2 pystache pystache-3 pystache-test pystache-test-3 python-config python2-config python2.7-config python3 python3.7 python3.7m pyvenv pyvenv-3.7 quot quota quotacheck quotaoff quotaon quotastats quotasync quote quote_readline raid-check ranlib raw rdate rdisc rdma readelf readprofile reboot recode-sr-latin red rename renice repo-graph repo-rss repoclosure repodiff repomanage repoquery reposync repotrack repquota request-key resize2fs resizepart restorecon rev rmail rmail.postfix rmmod rnano rngd rngtest route routef routel rpc.gssd rpc.idmapd rpc.mountd rpc.nfsd rpc.rquotad rpc.statd rpcbind rpcdebug rpcinfo rst2html rst2html-3 rst2html-3.7 rst2html4-3 rst2html4-3.7 rst2html5-3 rst2html5-3.7 rst2latex rst2latex-3 rst2latex-3.7 rst2man rst2man-3 rst2man-3.7 rst2odt rst2odt-3 rst2odt-3.7 rst2odt_prepstyles rst2odt_prepstyles-3 rst2odt_prepstyles-3.7 rst2pseudoxml rst2pseudoxml-3 rst2pseudoxml-3.7 rst2s5 rst2s5-3 rst2s5-3.7 rst2xetex rst2xetex-3 rst2xetex-3.7 rst2xml rst2xml-3 rst2xml-3.7 rstpep2html rstpep2html-3 rstpep2html-3.7 rsync rsyslog-recover-qi.pl rsyslogd rtacct rtcwake rtmon rtpr rtstat run-parts runlevel runuser rvim s2p sa sadf safe_finger sar scl scl_enabled scl_source scp screen script scriptreplay secon selabel_digest selabel_lookup selabel_lookup_best_match selabel_partial_match selinux_restorecon selinuxconlist selinuxdefcon selinuxenabled selinuxexeccon semodule sendmail sendmail.postfix service sestatus setarch setenforce setfacl setfattr setfiles setfont setkeycodes setleds setmetamode setpci setpriv setquota setsebool setserial setsid setterm setup setvtrgb sexp-conv sfdisk sftp sg sgdisk sgpio show-changed-rco show-installed showconsolefont showkey showmount shutdown sim_lsmplugin simc_lsmplugin size skill slabtop slattach slogin sm-notify smtp-sink smtp-source snice splain ss ssh ssh-add ssh-agent ssh-copy-id ssh-keygen ssh-keyscan sshd sshd-keygen ssm-agent-worker ssm-cli ssm-document-worker ssm-session-logger ssm-session-worker stap-merge stap-report stapbpf stapsh start-statd strace strace-log-merge strings strip su sudo sudoedit sudoreplay sulogin sushell swaplabel swapoff swapon switch_root sys-unconfig sysctl systemctl systemd-analyze systemd-ask-password systemd-cat systemd-cgls systemd-cgtop systemd-coredumpctl systemd-delta systemd-detect-virt systemd-escape systemd-firstboot systemd-hwdb systemd-inhibit systemd-loginctl systemd-machine-id-setup systemd-notify systemd-nspawn systemd-path systemd-run systemd-stdio-bridge systemd-sysv-convert systemd-tmpfiles systemd-tty-ask-password-agent tapestat tar taskset tcpd tcpdmatch tcpdump tcpslice tcptraceroute tcsh teamd teamdctl teamnl telinit thin_check thin_delta thin_dump thin_ls thin_metadata_size thin_repair thin_restore thin_rmap thin_trim timedatectl tipc tload top tracepath tracepath6 traceroute traceroute6 try-from tune2fs udevadm ul umount umount.nfs umount.nfs4 uname26 unicode_start unicode_stop unix_chkpwd unlz4 unshare unxz unzip unzipsfx update-motd update-pciids updatedb uptime userhelper usernetctl usleep utmpdump uuidgen verify_blkparse verifytree vgcfgbackup vgcfgrestore vgchange vgck vgconvert vgcreate vgdisplay vgexport vgextend vgimport vgimportclone vgmerge vgmknodes vgreduce vgremove vgrename vgs vgscan vgsplit vigr vim vimdiff vimtutor vipw virt-what visudo vlock vmstat w wall watch wdctl weak-modules wget whatis whereis whiptail wipefs write xfs_admin xfs_bmap xfs_copy xfs_db xfs_estimate xfs_freeze xfs_fsr xfs_growfs xfs_info xfs_io xfs_logprint xfs_mdrestore xfs_metadump xfs_mkfile xfs_ncheck xfs_quota xfs_repair xfs_rtcp xfsdump xfsinvutil xfsrestore xgettext xqmstats xtables-legacy-multi xxd xz xzcat xzcmp xzdec xzdiff xzegrep xzfgrep xzgrep xzless xzmore ypdomainname yum-builddep yum-complete-transaction yum-config-manager yum-debug-dump yum-debug-restore yum-groups-manager yumdb yumdownloader zcat zcmp zdiff zegrep zfgrep zforce zgrep zip zipcloak zipgrep zipinfo zipnote zipsplit zless zmore znew zramctl; do ( set -x && man $c | head -n 20 ); done | |
+ set +x | |
+ man a2p | |
+ head -n 20 | |
A2P(1) Perl Programmers Reference Guide A2P(1) | |
NAME | |
a2p - Awk to Perl translator | |
SYNOPSIS | |
a2p [options] [filename] | |
DESCRIPTION | |
A2p takes an awk script specified on the command line (or from standard input) and produces a comparable perl script on the standard output. | |
OPTIONS | |
Options include: | |
-D<number> | |
sets debugging flags. | |
-F<character> | |
+ man ac | |
+ head -n 20 | |
AC(1) General Commands Manual AC(1) | |
NAME | |
ac - print statistics about users' connect time | |
SYNOPSIS | |
ac [ -d | --daily-totals ] [ -y | --print-year ] | |
[ -p | --individual-totals ] [ people ] | |
[ -f | --file filename ] [ -a | --all-days ] | |
[ --complain ] [ --reboots ] [ --supplants ] | |
[ --timewarps ] [ --compatibility ] | |
[ --tw-leniency num ] [ --tw-suspicious num ] | |
[ -z | --print-zeros ] [ --debug ] | |
[ -V | --version ] [ -h | --help ] | |
DESCRIPTION | |
ac prints out a report of connect time (in hours) based on the logins/logouts in the current wtmp file. A total is also printed out. | |
+ man accessdb | |
+ head -n 20 | |
ACCESSDB(8) Manual pager utils ACCESSDB(8) | |
NAME | |
accessdb - dumps the content of a man-db database in a human readable format | |
SYNOPSIS | |
/usr/sbin/accessdb [-d?V] [<index-file>] | |
DESCRIPTION | |
accessdb will output the data contained within a man-db database in a human readable form. By default, it will dump the data from /var/cache/man/index.<db-type>, where <db-type> is dependent on the database library in use. | |
Supplying an argument to accessdb will override this default. | |
$mtime$ -> "795987034" | |
$version$ -> "2.3.1" | |
apropos -> "1 1 795981542 A - - search the manual page names and descriptions" | |
catman -> "8 8 795981544 A - - create or update the pre-formatted manual pages" | |
man -> "1 1 795981542 A - - an interface to the on-line reference manuals" | |
+ man accton | |
+ head -n 20 | |
ACCTON(8) System Manager's Manual ACCTON(8) | |
NAME | |
accton - turns process accounting on or off | |
SYNOPSIS | |
accton [OPTION] on|off|filename | |
accton [ -V | --version ] [ -h | --help ] | |
DESCRIPTION | |
accton filename turns on process accounting. | |
OPTIONS | |
-V, --version | |
Print the version number of ac to standard output and quit. | |
-h, --help | |
Prints the usage string and default locations of system files to standard output and exits. | |
+ man addpart | |
+ head -n 20 | |
ADDPART(8) System Administration ADDPART(8) | |
NAME | |
addpart - tell the kernel about the existence of a partition | |
SYNOPSIS | |
addpart device partition start length | |
DESCRIPTION | |
addpart tells the Linux kernel about the existence of the specified partition. The command is a simple wrapper around the "add partition" ioctl. | |
This command doesn't manipulate partitions on a block device. | |
PARAMETERS | |
device The disk device. | |
partition | |
+ man addr2line | |
+ head -n 20 | |
ADDR2LINE(1) GNU Development Tools ADDR2LINE(1) | |
NAME | |
addr2line - convert addresses into file names and line numbers. | |
SYNOPSIS | |
addr2line [-a|--addresses] | |
[-b bfdname|--target=bfdname] | |
[-C|--demangle[=style]] | |
[-e filename|--exe=filename] | |
[-f|--functions] [-s|--basename] | |
[-i|--inlines] | |
[-p|--pretty-print] | |
[-j|--section=name] | |
[-H|--help] [-V|--version] | |
[addr addr ...] | |
DESCRIPTION | |
+ man agetty | |
+ head -n 20 | |
AGETTY(8) System Administration AGETTY(8) | |
NAME | |
agetty - alternative Linux getty | |
SYNOPSIS | |
agetty [options] port [baud_rate...] [term] | |
DESCRIPTION | |
agetty opens a tty port, prompts for a login name and invokes the /bin/login command. It is normally invoked by init(8). | |
agetty has several non-standard features that are useful for hardwired and for dial-in lines: | |
· Adapts the tty settings to parity bits and to erase, kill, end-of-line and uppercase characters when it reads a login name. The program can handle 7-bit characters with even, odd, none or space parity, and 8-bit characters with no parity. The following special characters are recognized: Control-U (kill); DEL and backspace (erase); carriage return and line feed (end of line). See also the | |
--erase-chars and --kill-chars options. | |
+ man amazon-ssm-agent | |
+ head -n 20 | |
No manual entry for amazon-ssm-agent | |
+ man anacron | |
+ head -n 20 | |
ANACRON(8) System Administration ANACRON(8) | |
NAME | |
anacron - runs commands periodically | |
SYNOPSIS | |
anacron [-s] [-f] [-n] [-d] [-q] [-t anacrontab] [-S spooldir] [job] | |
anacron [-S spooldir] -u [-t anacrontab] [job] | |
anacron [-V|-h] | |
anacron -T [-t anacrontab] | |
DESCRIPTION | |
Anacron is used to execute commands periodically, with a frequency specified in days. Unlike cron(8), it does not assume that the machine is running continuously. Hence, it can be used on machines that are not running 24 hours a day to control regular jobs as daily, weekly, and monthly jobs. | |
Anacron reads a list of jobs from the /etc/anacrontab configuration file (see anacrontab(5)). This file contains the list of jobs that Anacron controls. Each job entry specifies a period in days, a delay in minutes, a unique job identifier, and a shell command. | |
For each job, Anacron checks whether this job has been executed in the last n days, where n is the time period specified for that job. If a job has not been executed in n days or more, Anacron runs the job's shell command, after waiting for the number of minutes specified as the delay parameter. | |
+ man apropos | |
+ head -n 20 | |
APROPOS(1) Manual pager utils APROPOS(1) | |
NAME | |
apropos - search the manual page names and descriptions | |
SYNOPSIS | |
apropos [-dalv?V] [-e|-w|-r] [-s list] [-m system[,...]] [-M path] [-L locale] [-C file] keyword ... | |
DESCRIPTION | |
Each manual page has a short description available within it. apropos searches the descriptions for instances of keyword. | |
keyword is usually a regular expression, as if (-r) was used, or may contain wildcards (-w), or match the exact keyword (-e). Using these options, it may be necessary to quote the keyword or escape (\) the special characters to stop the shell from interpreting them. | |
The standard matching rules allow matches to be made against the page name and word boundaries in the description. | |
The database searched by apropos is updated by the mandb program. Depending on your installation, this may be run by a periodic cron job, or may need to be run manually after new manual pages have been installed. | |
OPTIONS | |
+ man ar | |
+ head -n 20 | |
AR(1) GNU Development Tools AR(1) | |
NAME | |
ar - create, modify, and extract from archives | |
SYNOPSIS | |
ar [-X32_64] [-]p[mod] [--plugin name] [--target bfdname] [relpos] [count] archive [member...] | |
DESCRIPTION | |
The GNU ar program creates, modifies, and extracts from archives. An archive is a single file holding a collection of other files in a structure that makes it possible to retrieve the original individual files (called members of the archive). | |
The original files' contents, mode (permissions), timestamp, owner, and group are preserved in the archive, and can be restored on extraction. | |
GNU ar can maintain archives whose members have names of any length; however, depending on how ar is configured on your system, a limit on member-name length may be imposed for compatibility with archive formats maintained with other tools. If it exists, the limit is often 15 characters (typical of formats related to a.out) or 16 characters (typical of formats related to coff). | |
ar is considered a binary utility because archives of this sort are most often used as libraries holding commonly needed subroutines. | |
ar creates an index to the symbols defined in relocatable object modules in the archive when you specify the modifier s. Once created, this index is updated in the archive whenever ar makes a change to its contents (save for the q update operation). An archive with such an index speeds up linking to the library, and allows routines in the library to call each other without regard to their placement | |
+ man arp | |
+ head -n 20 | |
ARP(8) Linux System Administrator's Manual ARP(8) | |
NAME | |
arp - manipulate the system ARP cache | |
SYNOPSIS | |
arp [-vn] [-H type] [-i if] [-ae] [hostname] | |
arp [-v] [-i if] -d hostname [pub] | |
arp [-v] [-H type] [-i if] -s hostname hw_addr [temp] | |
arp [-v] [-H type] [-i if] -s hostname hw_addr [netmask nm] pub | |
arp [-v] [-H type] [-i if] -Ds hostname ifname [netmask nm] pub | |
arp [-vnD] [-H type] [-i if] -f [filename] | |
+ man arpd | |
+ head -n 20 | |
ARPD(8) System Manager's Manual ARPD(8) | |
NAME | |
arpd - userspace arp daemon. | |
SYNOPSIS | |
Usage: arpd [ -lkh? ] [ -a N ] [ -b dbase ] [ -B number ] [ -f file ] [-p interval ] [ -n time ] [ -R rate ] [ <INTERFACES> ] | |
DESCRIPTION | |
The arpd daemon collects gratuitous ARP information, saving it on local disk and feeding it to the kernel on demand to avoid redundant broadcasting due to limited size of the kernel ARP cache. | |
OPTIONS | |
-h -? Print help | |
-l Dump the arpd database to stdout and exit. The output consists of three columns: the interface index, the IP address of the interface, and the MAC address of the interface. Negative entries for dead hosts are also shown, in this case the MAC address is replaced by the word FAILED followed by a colon and the most recent time when the fact that the host is dead was proven. | |
+ man arping | |
+ head -n 20 | |
ARPING(8) System Manager's Manual: iputils ARPING(8) | |
NAME | |
arping - send ARP REQUEST to a neighbour host | |
SYNOPSIS | |
arping [-AbDfhqUV] [-c count] [-w deadline] [-s source] [-I interface] destination | |
DESCRIPTION | |
Ping destination on device interface by ARP packets, using source address source. | |
OPTIONS | |
-A The same as -U, but ARP REPLY packets used instead of ARP REQUEST. | |
-b Send only MAC level broadcasts. Normally arping starts from sending broadcast, and switch to unicast after reply received. | |
-c count | |
+ man as | |
+ head -n 20 | |
AS(1) GNU Development Tools AS(1) | |
NAME | |
AS - the portable GNU assembler. | |
SYNOPSIS | |
as [-a[cdghlns][=file]] [--alternate] [-D] | |
[--compress-debug-sections] [--nocompress-debug-sections] | |
[--debug-prefix-map old=new] | |
[--defsym sym=val] [-f] [-g] [--gstabs] | |
[--gstabs+] [--gdwarf-2] [--gdwarf-sections] | |
[--help] [-I dir] [-J] | |
[-K] [-L] [--listing-lhs-width=NUM] | |
[--listing-lhs-width2=NUM] [--listing-rhs-width=NUM] | |
[--listing-cont-lines=NUM] [--keep-locals] | |
[--no-pad-sections] | |
[-o objfile] [-R] | |
[--hash-size=NUM] [--reduce-memory-overheads] | |
+ man at | |
+ head -n 20 | |
AT(1) General Commands Manual AT(1) | |
NAME | |
at, batch, atq, atrm - queue, examine or delete jobs for later execution | |
SYNOPSIS | |
at [-V] [-q queue] [-f file] [-mMlv] timespec... | |
at [-V] [-q queue] [-f file] [-mMkv] [-t time] | |
at -c job [job...] | |
atq [-V] [-q queue] | |
at [-rd] job [job...] | |
atrm [-V] job [job...] | |
batch | |
at -b | |
DESCRIPTION | |
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh. | |
+ man atd | |
+ head -n 20 | |
ATD(8) System Manager's Manual ATD(8) | |
NAME | |
atd - run jobs queued for later execution | |
SYNOPSIS | |
atd [-l load_avg] [-b batch_interval] [-d] [-f] [-n] [-s] | |
DESCRIPTION | |
atd runs jobs queued by at(1). | |
OPTIONS | |
-l Specifies a limiting load factor, over which batch jobs should not be run, instead of the compile-time choice of 0.8. For an SMP system with n CPUs, you will probably want to set this higher than n-1. | |
-b Specify the minimum interval in seconds between the start of two batch jobs (60 default). | |
-d Debug; print error messages to standard error instead of using syslog(3). This option also implies -f. | |
+ man atq | |
+ head -n 20 | |
AT(1) General Commands Manual AT(1) | |
NAME | |
at, batch, atq, atrm - queue, examine or delete jobs for later execution | |
SYNOPSIS | |
at [-V] [-q queue] [-f file] [-mMlv] timespec... | |
at [-V] [-q queue] [-f file] [-mMkv] [-t time] | |
at -c job [job...] | |
atq [-V] [-q queue] | |
at [-rd] job [job...] | |
atrm [-V] job [job...] | |
batch | |
at -b | |
DESCRIPTION | |
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh. | |
+ man atrm | |
+ head -n 20 | |
AT(1) General Commands Manual AT(1) | |
NAME | |
at, batch, atq, atrm - queue, examine or delete jobs for later execution | |
SYNOPSIS | |
at [-V] [-q queue] [-f file] [-mMlv] timespec... | |
at [-V] [-q queue] [-f file] [-mMkv] [-t time] | |
at -c job [job...] | |
atq [-V] [-q queue] | |
at [-rd] job [job...] | |
atrm [-V] job [job...] | |
batch | |
at -b | |
DESCRIPTION | |
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh. | |
+ man atrun | |
+ head -n 20 | |
ATRUN(8) Linux Programmer's Manual ATRUN(8) | |
NAME | |
atrun - run jobs queued for later execution | |
SYNOPSIS | |
atrun [-l load_avg] [-d] | |
DESCRIPTION | |
atrun runs jobs queued by at(1). It is a shell script invoking /usr/sbin/atd with the -s option, and is provided for backward compatibility with older installations. | |
SEE ALSO | |
at(1), atd(8). | |
AUTHOR | |
At was mostly written by Thomas Koenig, [email protected]. | |
+ man attr | |
+ head -n 20 | |
ATTR(1) XFS Compatibility API ATTR(1) | |
NAME | |
attr - extended attributes on XFS filesystem objects | |
SYNOPSIS | |
attr [ -LRSq ] -s attrname [ -V attrvalue ] pathname | |
attr [ -LRSq ] -g attrname pathname | |
attr [ -LRSq ] -r attrname pathname | |
attr [ -LRSq ] -l pathname | |
OVERVIEW | |
Extended attributes implement the ability for a user to attach name:value pairs to objects within the XFS filesystem. | |
+ man audispd | |
+ head -n 20 | |
AUDISPD:(8) System Administration Utilities AUDISPD:(8) | |
NAME | |
audispd - an event multiplexor | |
SYNOPSIS | |
audispd [-c <config_dir>].SHDESCRIPTION audispd is an audit event multiplexor. It has to be started by the audit daemon in order to get events. It takes audit events and distributes them to child programs that want to analyze events in realtime. When the audit daemon receives a SIGTERM or SIGHUP, it passes that signal to the dispatcher, too. The dispatcher in turn passes those signals to its child pro‐ | |
cesses. | |
The child programs install a configuration file in a plugins directory, /etc/audisp/plugins.d. Filenames are not allowed to have more than one '.' in the name or it will be treated as a backup copy and skipped. Options are given one per line with an equal sign between the keyword and its value. The available options are as follows: | |
active The options for this are yes or no. | |
direction | |
The option is dictated by the plugin. In or out are the only choices. You cannot make a plugin operate in a way it wasn't designed just by changing this option.This option is to give a clue to the event dispatcher about which direction events flow. NOTE: inbound events are not supported yet. | |
path This is the absolute path to the plugin executable. In the case of internal plugins, it would be the name of the plugin. | |
+ man auditctl | |
+ head -n 20 | |
AUDITCTL:(8) System Administration Utilities AUDITCTL:(8) | |
NAME | |
auditctl - a utility to assist controlling the kernel's audit system | |
SYNOPSIS | |
auditctl [options] | |
DESCRIPTION | |
The auditctl program is used to configure kernel options related to auditing, to see status of the configuration, and to load discretionary audit rules. | |
CONFIGURATION OPTIONS | |
-b backlog | |
Set max number of outstanding audit buffers allowed (Kernel Default=64) If all buffers are full, the failure flag is consulted by the kernel for action. | |
-c Continue loading rules in spite of an error. This summarizes the results of loading the rules. The exit code will not be success if any rule fails to load. | |
-D Delete all rules and watches. This can take a key option (-k), too. | |
+ man auditd | |
+ head -n 20 | |
AUDITD(8) System Administration Utilities AUDITD(8) | |
NAME | |
auditd - The Linux Audit daemon | |
SYNOPSIS | |
auditd [-f] [-l] [-n] [-s disable|enable|nochange] [-c <config_dir>] | |
DESCRIPTION | |
auditd is the userspace component to the Linux Auditing System. It's responsible for writing audit records to the disk. Viewing the logs is done with the ausearch or aureport utilities. Configuring the audit system or loading rules is done with the auditctl utility. During startup, the rules in /etc/audit/audit.rules are read by auditctl and loaded into the kernel. Alternately, there is also an augen‐ | |
rules program that reads rules located in /etc/audit/rules.d/ and compiles them into an audit.rules file. The audit daemon itself has some configuration options that the admin may wish to customize. They are found in the auditd.conf file. | |
OPTIONS | |
-f leave the audit daemon in the foreground for debugging. Messages also go to stderr rather than the audit log. | |
-l allow the audit daemon to follow symlinks for config files. | |
-n no fork. This is useful for running off of inittab or systemd. | |
+ man augenrules | |
+ head -n 20 | |
AUGENRULES:(8) System Administration Utilities AUGENRULES:(8) | |
NAME | |
augenrules - a script that merges component audit rule files | |
SYNOPSIS | |
augenrules [--check] [--load] | |
DESCRIPTION | |
augenrules is a script that merges all component audit rules files, found in the audit rules directory, /etc/audit/rules.d, placing the merged file in /etc/audit/audit.rules. Component audit rule files, must end in .rules in order to be processed. All other files in /etc/audit/rules.d are ignored. | |
The files are concatenated in order, based on their natural sort (see -v option of ls(1)) and stripped of empty and comment (#) lines. | |
The last processed -D directive without an option, if present, is always emitted as the first line in the resultant file. Those with an option are replicated in place. The last processed -b directive, if present, is always emitted as the second line in the resultant file. The last processed -f directive, if present, is always emitted as the third line in the resultant file. The last processed -e | |
directive, if present, is always emitted as the last line in the resultant file. | |
The generated file is only copied to /etc/audit/audit.rules, if it differs. | |
+ man aulast | |
+ head -n 20 | |
AULAST:(8) System Administration Utilities AULAST:(8) | |
NAME | |
aulast - a program similar to last | |
SYNOPSIS | |
aulast [ options ] | |
DESCRIPTION | |
aulast is a program that prints out a listing of the last logged in users similarly to the program last and lastb. Aulast searches back through the audit logs or the given audit log file and displays a list of all users logged in (and out) based on the range of time in the audit logs. Names of users and tty’s can be given, in which case aulast will show only those entries matching the arguments. | |
The pseudo user reboot logs in each time the system is rebooted. Thus last reboot will show a log of all reboots since the log file was created. | |
The main difference that a user will notice is that aulast print events from oldest to newest, while last prints records from newest to oldest. Also, the audit system is not notified each time a tty or pty is allocated, so you may not see quite as many records indicating users and their tty's. | |
OPTIONS | |
+ man aulastlog | |
+ head -n 20 | |
AULASTLOG:(8) System Administration Utilities AULASTLOG:(8) | |
NAME | |
aulastlog - a program similar to lastlog | |
SYNOPSIS | |
aulastlog [ options ] | |
DESCRIPTION | |
aulastlog is a program that prints out the last login for all users of the local machine similar to the way lastlog does. The login-name, port, and last login time will be printed. | |
If the user has never logged in, the message ** Never logged in** will be displayed instead of the port and time. | |
OPTIONS | |
-u, --user | |
Print the lastlog record for user with specified LOGIN only. | |
+ man aureport | |
+ head -n 20 | |
AUREPORT:(8) System Administration Utilities AUREPORT:(8) | |
NAME | |
aureport - a tool that produces summary reports of audit daemon logs | |
SYNOPSIS | |
aureport [options] | |
DESCRIPTION | |
aureport is a tool that produces summary reports of the audit system logs. The aureport utility can also take input from stdin as long as the input is the raw log data. The reports have a column label at the top to help with interpretation of the various fields. Except for the main summary report, all reports have the audit event number. You can subsequently lookup the full event with ausearch -a event | |
number. You may need to specify start & stop times if you get multiple hits. The reports produced by aureport can be used as building blocks for more complicated analysis. | |
OPTIONS | |
-au, --auth | |
Report about authentication attempts | |
-a, --avc | |
+ man ausearch | |
+ head -n 20 | |
AUSEARCH:(8) System Administration Utilities AUSEARCH:(8) | |
NAME | |
ausearch - a tool to query audit daemon logs | |
SYNOPSIS | |
ausearch [options] | |
DESCRIPTION | |
ausearch is a tool that can query the audit daemon logs based for events based on different search criteria. The ausearch utility can also take input from stdin as long as the input is the raw log data. Each commandline option given forms an "and" statement. For example, searching with -m and -ui means return events that have both the requested type and match the user id given. An exception is the -m | |
and -n options; multiple record types and nodes are allowed in a search which will return any matching node and record. | |
It should also be noted that each syscall excursion from user space into the kernel and back into user space has one event ID that is unique. Any auditable event that is triggered during this trip share this ID so that they may be correlated. | |
Different parts of the kernel may add supplemental records. For example, an audit event on the syscall "open" will also cause the kernel to emit a PATH record with the file name. The ausearch utility will present all records that make up one event together. This could mean that even though you search for a specific kind of record, the resulting events may contain SYSCALL records. | |
Also be aware that not all record types have the requested information. For example, a PATH record does not have a hostname or a loginuid. | |
+ man ausyscall | |
+ head -n 20 | |
AUSYSCALL:(8) System Administration Utilities AUSYSCALL:(8) | |
NAME | |
ausyscall - a program that allows mapping syscall names and numbers | |
SYNOPSIS | |
ausyscall [arch] name | number | --dump | --exact | |
DESCRIPTION | |
ausyscall is a program that prints out the mapping from syscall name to number and reverse for the given arch. The arch can be anything returned by `uname -m`. If arch is not given, the program will take a guess based on the running image. You may give the syscall name or number and it will find the opposite. You can also dump the whole table with the --dump option. By default a syscall name lookup | |
will be a substring match meaning that it will try to match all occurrences of the given name with syscalls. So giving a name of chown will match both fchown and chown as any other syscall with chown in its name. If this behavior is not desired, pass the --exact flag and it will do an exact string match. | |
This program can be used to verify syscall numbers on a biarch platform for rule optimization. For example, suppose you had an auditctl rule: | |
-a always, exit -S open -F exit=-EPERM -k fail-open | |
If you wanted to verify that both 32 and 64 bit programs would be audited, run "ausyscall i386 open" and then "ausyscall x86_64 open". Look at the returned numbers. If they are different, you will have to write two auditctl rules to get complete coverage. | |
+ man authconfig | |
+ head -n 20 | |
AUTHCONFIG(8) System Manager's Manual AUTHCONFIG(8) | |
NAME | |
authconfig, authconfig-tui - an interface for configuring system authentication resources | |
SYNOPSIS | |
authconfig | |
[options] {--update|--updateall|--test|--probe|--restorebackup <name>|--savebackup <name>|--restorelastbackup} | |
DESCRIPTION | |
authconfig provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as /etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and Winbind client configuration is also provided. | |
If --test action is specified, the authconfig just reads the current settings from the various configuration files and prints their values. If --update action is specified, authconfig must be run by root (or through console helper), and configuration changes are saved. Only the files affected by the configuration changes are overwritten. If --updateall action is specified, authconfig must be run by | |
root (or through console helper), and all configuration files are written. The --probe action instructs authconfig to use DNS and other means to guess at configuration information for the current host, print its guesses if it finds them, to standard output, and exit. | |
The --restorebackup, --savebackup, and --restorelastbackup actions provide a possibility to save and later restore a backup of configuration files which authconfig modifies. Authconfig also saves an automatic backup of configuration files before every configuration change. This special backup can be restored by the --restorelastbackup action. | |
If --nostart is specified (which is what the install program does), ypbind or other daemons will not be started or stopped immediately following program execution, but only enabled to start or stop at boot time. | |
+ man authconfig-tui | |
+ head -n 20 | |
AUTHCONFIG(8) System Manager's Manual AUTHCONFIG(8) | |
NAME | |
authconfig, authconfig-tui - an interface for configuring system authentication resources | |
SYNOPSIS | |
authconfig | |
[options] {--update|--updateall|--test|--probe|--restorebackup <name>|--savebackup <name>|--restorelastbackup} | |
DESCRIPTION | |
authconfig provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as /etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and Winbind client configuration is also provided. | |
If --test action is specified, the authconfig just reads the current settings from the various configuration files and prints their values. If --update action is specified, authconfig must be run by root (or through console helper), and configuration changes are saved. Only the files affected by the configuration changes are overwritten. If --updateall action is specified, authconfig must be run by | |
root (or through console helper), and all configuration files are written. The --probe action instructs authconfig to use DNS and other means to guess at configuration information for the current host, print its guesses if it finds them, to standard output, and exit. | |
The --restorebackup, --savebackup, and --restorelastbackup actions provide a possibility to save and later restore a backup of configuration files which authconfig modifies. Authconfig also saves an automatic backup of configuration files before every configuration change. This special backup can be restored by the --restorelastbackup action. | |
If --nostart is specified (which is what the install program does), ypbind or other daemons will not be started or stopped immediately following program execution, but only enabled to start or stop at boot time. | |
+ man auvirt | |
+ head -n 20 | |
AUVIRT(8) System Administration Utilities AUVIRT(8) | |
NAME | |
auvirt - a program that shows data related to virtual machines | |
SYNOPSIS | |
auvirt [ OPTIONS ] | |
DESCRIPTION | |
auvirt shows a list of guest sessions found in the audit logs. If a guest is specified, only the events related to that guest is considered. To specify a guest, both UUID or VM name can be given. | |
For each guest session the tool prints a record with the domain name, the user that started the guest, the time when the guest was started and the time when the guest was stopped. | |
If the option "--all-events" is given a more detailed output is shown. In this mode other records are shown for guest's stops, resource assignments, AVC and anomaly events. The first field indicates the event type and can have the following values: start, stop, res, avc, and anom. | |
Resource assignments have the additional fields: resource type, reason and resource. And AVC records have the following additional fields: operation, result, command and target. | |
+ man avcstat | |
+ head -n 20 | |
avcstat(8) SELinux Command Line documentation avcstat(8) | |
NAME | |
avcstat - Display SELinux AVC statistics | |
SYNOPSIS | |
avcstat [-c] [-f status_file] [interval] | |
DESCRIPTION | |
Display SELinux AVC statistics. If the interval parameter is specified, the program will loop, displaying updated statistics every interval seconds. Relative values are displayed by default. | |
OPTIONS | |
-c Display the cumulative values. | |
-f Specifies the location of the AVC statistics file, defaulting to /sys/fs/selinux/avc/cache_stats. | |
AUTHOR | |
This manual page was written by Dan Walsh <[email protected]>. The program was written by James Morris <[email protected]>. | |
+ man aws | |
+ head -n 20 | |
No manual entry for aws | |
+ man aws_completer | |
+ head -n 20 | |
No manual entry for aws_completer | |
+ man badblocks | |
+ head -n 20 | |
BADBLOCKS(8) System Manager's Manual BADBLOCKS(8) | |
NAME | |
badblocks - search a device for bad blocks | |
SYNOPSIS | |
badblocks [ -svwnfBX ] [ -b block-size ] [ -c blocks_at_once ] [ -e max_bad_blocks ] [ -d read_delay_factor ] [ -i input_file ] [ -o output_file ] [ -p num_passes ] [ -t test_pattern ] device [ last-block ] [ first-block ] | |
DESCRIPTION | |
badblocks is used to search for bad blocks on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdc1). last-block is the last block to be checked; if it is not specified, the last block on the device is used as a default. first-block is an optional parameter specifying the starting block number for the test, which allows the testing to start in the | |
middle of the disk. If it is not specified the first block on the disk is used as a default. | |
Important note: If the output of badblocks is going to be fed to the e2fsck or mke2fs programs, it is important that the block size is properly specified, since the block numbers which are generated are very dependent on the block size in use by the filesystem. For this reason, it is strongly recommended that users not run badblocks directly, but rather use the -c option of the e2fsck and mke2fs pro‐ | |
grams. | |
OPTIONS | |
-b block-size | |
Specify the size of blocks in bytes. The default is 1024. | |
+ man batch | |
+ head -n 20 | |
AT(1) General Commands Manual AT(1) | |
NAME | |
at, batch, atq, atrm - queue, examine or delete jobs for later execution | |
SYNOPSIS | |
at [-V] [-q queue] [-f file] [-mMlv] timespec... | |
at [-V] [-q queue] [-f file] [-mMkv] [-t time] | |
at -c job [job...] | |
atq [-V] [-q queue] | |
at [-rd] job [job...] | |
atrm [-V] job [job...] | |
batch | |
at -b | |
DESCRIPTION | |
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh. | |
+ man bc | |
+ head -n 20 | |
bc(1) General Commands Manual bc(1) | |
NAME | |
bc - An arbitrary precision calculator language | |
SYNTAX | |
bc [ -hlwsqv ] [long-options] [ file ... ] | |
DESCRIPTION | |
bc is a language that supports arbitrary precision numbers with interactive execution of statements. There are some similarities in the syntax to the C programming language. A standard math library is available by command line option. If requested, the math library is defined before processing any files. bc starts by processing code from all the files listed on the command line in the order listed. | |
After all files have been processed, bc reads from the standard input. All code is executed as it is read. (If a file contains a command to halt the processor, bc will never read from the standard input.) | |
This version of bc contains several extensions beyond traditional bc implementations and the POSIX draft standard. Command line options can cause these extensions to print a warning or to be rejected. This document describes the language accepted by this processor. Extensions will be identified as such. | |
OPTIONS | |
-h, --help | |
Print the usage and exit. | |
+ man blkdeactivate | |
+ head -n 20 | |
BLKDEACTIVATE(8) BLKDEACTIVATE(8) | |
NAME | |
blkdeactivate — utility to deactivate block devices | |
SYNOPSIS | |
blkdeactivate [-d dm_options] [-e] [-h] [-l lvm_options] [-m mpath_options] [-r mdraid_options] [-u] [-v] [device] | |
DESCRIPTION | |
The blkdeactivate utility deactivates block devices. For mounted block devices, it attempts to unmount it automatically before trying to deactivate. The utility currently supports device-mapper devices (DM), including LVM volumes and software RAID MD devices. LVM volumes are handled directly using the lvm(8) command, the rest of device-mapper based devices are handled using the dmsetup(8) command. MD | |
devices are handled using the mdadm(8) command. | |
OPTIONS | |
-d, --dmoptions dm_options | |
Comma separated list of device-mapper specific options. Accepted dmsetup(8) options are: | |
retry Retry removal several times in case of failure. | |
+ man blkdiscard | |
+ head -n 20 | |
BLKDISCARD(8) System Administration BLKDISCARD(8) | |
NAME | |
blkdiscard - discard sectors on a device | |
SYNOPSIS | |
blkdiscard [options] [-o offset] [-l length] device | |
DESCRIPTION | |
blkdiscard is used to discard device sectors. This is useful for solid-state drivers (SSDs) and thinly-provisioned storage. Unlike fstrim(8), this command is used directly on the block device. | |
By default, blkdiscard will discard all blocks on the device. Options may be used to modify this behavior based on range or size, as explained below. | |
The device argument is the pathname of the block device. | |
WARNING: All data in the discarded region on the device will be lost! | |
OPTIONS | |
+ man blkid | |
+ head -n 20 | |
BLKID(8) System Administration BLKID(8) | |
NAME | |
blkid - locate/print block device attributes | |
SYNOPSIS | |
blkid --label label | --uuid uuid | |
blkid [--no-encoding --garbage-collect --list-one --cache-file file] [--output format] [--match-tag tag] [--match-token NAME=value] [device ...] | |
blkid --probe [--offset offset] [--output format] [--size size] [--match-tag tag] [--match-types list] [--usages list] device ... | |
blkid --info [--output format] [--match-tag tag] device ... | |
+ man blkiomon | |
+ head -n 20 | |
BLKIOMON(8) BLKIOMON(8) | |
NAME | |
blkiomon - monitor block device I/O based o blktrace data | |
SYNOPSIS | |
blkiomon -I interval [ -h file ] [ -b file ] [ -d file ] [ -D file ] [ -Q path_name -q msg_queue_id -m msg_id ] [ -V ] | |
DESCRIPTION | |
blkiomon is a block device I/O monitor. It periodically generates per-device request size and request latency statistics from blktrace data. It provides histograms as well as data that can be used to calculate min, max, average and variance. For this purpose, it consumes D and C traces read from stdin. Note, that this doesn't work for logical volumes, as high-level drivers don't see the completion of | |
the events (C). | |
There are options for binary output and human-readable output to files and stdout. Output to a message queue is supported as well. | |
+ man blkmapd | |
+ head -n 20 | |
blkmapd(8) System Manager's Manual blkmapd(8) | |
NAME | |
blkmapd - pNFS block layout mapping daemon | |
SYNOPSIS | |
blkmapd [-h] [-d] [-f] | |
DESCRIPTION | |
The blkmapd daemon performs device discovery and mapping for the parallel NFS (pNFS) block layout client [RFC5663]. | |
The pNFS block layout protocol builds a complex storage hierarchy from a set of simple volumes. These simple volumes are addressed by content, using a signature on the volume to uniquely name each one. The daemon locates a volume by examining each block device in the system for the given signature. | |
The topology typically consists of a hierarchy of volumes built by striping, slicing, and concatenating the simple volumes. The blkmapd daemon uses the device-mapper driver to construct logical devices that reflect the server topology, and passes these devices to the kernel for use by the pNFS block layout client. | |
OPTIONS | |
-h Display usage message. | |
+ man blkparse | |
+ head -n 20 | |
BLKPARSE(1) BLKPARSE(1) | |
NAME | |
blkparse - produce formatted output of event streams of block devices | |
SYNOPSIS | |
blkparse [ options ] | |
DESCRIPTION | |
The blkparse utility will attempt to combine streams of events for various devices on various CPUs, and produce a formatted output of the event information. Specifically, it will take the (machine-readable) output of the blktrace utility and convert it to a nicely formatted and human-readable form. | |
As with blktrace, some details concerning blkparse will help in understanding the command line options presented below. | |
+ man blkrawverify | |
+ head -n 20 | |
BLKRAWVERIFY(1) BLKRAWVERIFY(1) | |
NAME | |
blkrawverify - verifies an output file produced by blkparse | |
SYNOPSIS | |
blkrawverify <dev> [<dev>...] | |
DESCRIPTION | |
The blkrawverify utility can be used to verify data retrieved via blktrace. It will check for valid event formats, forward progressing sequence numbers and time stamps, also does reasonable checks for other potential issues within individual events. | |
Errors found will be tracked in <dev>.verify.out. | |
+ man blktrace | |
+ head -n 20 | |
BLKTRACE(8) BLKTRACE(8) | |
NAME | |
blktrace - generate traces of the i/o traffic on block devices | |
SYNOPSIS | |
blktrace -d dev [ -r debugfs_path ] [ -o output ] [ -w time ] [ -a action ] [ -A action_mask ] [ -v ] | |
DESCRIPTION | |
blktrace is a block layer IO tracing mechanism which provides detailed information about request queue operations up to user space. There are three major components: a kernel component, a utility to record the i/o trace information for the kernel to user space, and utilities to analyse and view the trace information. This man page describes blktrace, which records the i/o event trace information for a | |
specific block device to a file. | |
The blktrace utility extracts event traces from the kernel (via the relaying through the debug file system). Some background details concerning the run-time behaviour of blktrace will help to understand some of the more arcane command line options: | |
+ man blkzone | |
+ head -n 20 | |
BLKZONE(8) System Administration BLKZONE(8) | |
NAME | |
blkzone - run zone command on a device | |
SYNOPSIS | |
blkzone command [options] device | |
DESCRIPTION | |
blkzone is used to run zone command on device that support the Zoned Block Commands (ZBC) or Zoned-device ATA Commands (ZAC). The zones to operate on can be specified using the offset, count and length options. | |
The device argument is the pathname of the block device. | |
COMMANDS | |
report | |
The command blkzone report is used to report device zone information. | |
By default, the command will report all zones from the start of the block device. Options may be used to modify this behavior, changing the starting zone or the size of the report, as explained below. | |
+ man blockdev | |
+ head -n 20 | |
BLOCKDEV(8) System Administration BLOCKDEV(8) | |
NAME | |
blockdev - call block device ioctls from the command line | |
SYNOPSIS | |
blockdev [-q] [-v] command [command...] device [device...] | |
blockdev --report [device...] | |
DESCRIPTION | |
The utility blockdev allows one to call block device ioctls from the command line. | |
OPTIONS | |
-V Print version and exit. | |
-q Be quiet. | |
-v Be verbose. | |
+ man bno_plot.py | |
+ head -n 20 | |
No manual entry for bno_plot.py | |
+ man bond2team | |
+ head -n 20 | |
BOND2TEAM(1) Bonding to Team conversion tool BOND2TEAM(1) | |
NAME | |
bond2team — Converts bonding configuration to team | |
SYNOPSIS | |
bond2team [options] | |
DESCRIPTION | |
bond2team is a tool to convert bonding options to team trying as much as possible to keep the original functionality. | |
The resulting files are saved in a temporary directory using ifcfg style by default. In the case of converting an ifcfg file, it translates the bonding options to team, preserving all other options. In that case, it converts the respective slave ifcfg files to team port, preserving all their other options too. In case of converting from given bonding options in the command line, the tool can use the | |
specified ports as team ports. | |
OPTIONS | |
--master <interface> | |
Specify the interface name or ifcfg file to convert. If the interface name is specified, the tool will look at /etc/sysconfig/network-scripts/ for the respective ifcfg file. | |
+ man bootctl | |
+ head -n 20 | |
BOOTCTL(1) bootctl BOOTCTL(1) | |
NAME | |
bootctl - Control the firmware and boot manager settings | |
SYNOPSIS | |
bootctl [OPTIONS...] {COMMAND} | |
DESCRIPTION | |
bootctl may be used to query or (in the future) change the firmware and boot manager settings. | |
Firmware information is available only on EFI systems. | |
Currently, only the gummiboot(8) boot manager implements the required boot loader interface to provide complete boot manager information. | |
OPTIONS | |
The following options are understood: | |
+ man brctl | |
+ head -n 20 | |
BRCTL(8) BRCTL(8) | |
NAME | |
brctl - ethernet bridge administration | |
SYNOPSIS | |
brctl [command] | |
DESCRIPTION | |
brctl is used to set up, maintain, and inspect the ethernet bridge configuration in the linux kernel. | |
An ethernet bridge is a device commonly used to connect different networks of ethernets together, so that these ethernets will appear as one ethernet to the participants. | |
Each of the ethernets being connected corresponds to one physical interface in the bridge. These individual ethernets are bundled into one bigger ('logical') ethernet, this bigger ethernet corresponds to the bridge network interface. | |
INSTANCES | |
+ man bridge | |
+ head -n 20 | |
BRIDGE(8) Linux BRIDGE(8) | |
NAME | |
bridge - show / manipulate bridge addresses and devices | |
SYNOPSIS | |
bridge [ OPTIONS ] OBJECT { COMMAND | help } | |
OBJECT := { link | fdb | mdb | vlan | monitor } | |
OPTIONS := { -V[ersion] | -s[tatistics] | -n[etns] name | -b[atch] filename | -j[son] } | |
bridge link set dev DEV [ cost COST ] [ priority PRIO ] [ state STATE] [ guard { on | off } ] [ hairpin { on | off } ] [ fastleave { on | off } ] [ root_block { on | off } ] [ learning { on | off } ] [ learning_sync { on | off } ] [ flood { on | off } ] [ hwmode { vepa | veb } ] [ mcast_flood { on | off } ] [ neigh_suppress { on | off } ] [ vlan_tunnel { on | off } ] [ self ] [ master ] | |
bridge link [ show ] [ dev DEV ] | |
+ man btrace | |
+ head -n 20 | |
BTRACE(8) BTRACE(8) | |
NAME | |
btrace - perform live tracing for block devices | |
SYNOPSIS | |
btrace [-s] [-t] [-w N] [-n N] [-b N] [-r <dbg mnt>] [-a <trace>...] <dev>... | |
DESCRIPTION | |
The btrace script provides a quick and easy way to do live tracing of block devices. It calls blktrace on the specified devices and pipes the output through blkparse for formatting. See blktrace (8) for more in-depth information about how blktrace works. | |
OPTIONS | |
-s Displays data sorted by program (see blkparse (1)). | |
+ man btrecord | |
+ head -n 20 | |
BTRECORD(8) BTRECORD(8) | |
NAME | |
btrecord - recreate IO loads recorded by blktrace | |
SYNOPSIS | |
Usage: | |
btrecord [ options ] <dev...> | |
DESCRIPTION | |
The btrecord and btreplay tools provide the ability to record and replay IOs captured by the blktrace utility. Attempts are made to maintain ordering, CPU mappings and time-separation of IOs. | |
+ man btreplay | |
+ head -n 20 | |
BTREPLAY(8) BTREPLAY(8) | |
NAME | |
btreplay - recreate IO loads recorded by blktrace | |
SYNOPSIS | |
btreplay [ options ] <dev...> | |
DESCRIPTION | |
The btrecord and btreplay tools provide the ability to record and replay IOs captured by the blktrace utility. Attempts are made to maintain ordering, CPU mappings and time-separation of IOs. | |
The blktrace utility provides the ability to collect detailed traces from the kernel for each IO processed by the block IO layer. The traces provide a complete timeline for each IO processed, including detailed information concerning when an IO was first received by the block IO layer — indicating the device, CPU number, time stamp, IO direction, sector number and IO size (number of sectors). Using | |
+ man btt | |
+ head -n 20 | |
BTT(1) BTT(1) | |
NAME | |
btt - analyse block i/o traces produces by blktrace | |
SYNOPSIS | |
btt | |
[ -a | --seek-absolute ] | |
[ -A | --all-data ] | |
[ -B <output name> | --dump-blocknos=<output name> ] | |
[ -d <seconds> | --range-delta=<seconds> ] | |
[ -D <dev;...> | --devices=<dev;...> ] | |
[ -e <exe,...> | --exes=<exe,...> ] | |
[ -h | --help ] | |
[ -i <input name> | --input-file=<input name> ] | |
[ -I <output name> | --iostat=<output name> ] | |
+ man bunzip2 | |
+ head -n 20 | |
bzip2(1) General Commands Manual bzip2(1) | |
NAME | |
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6 | |
bzcat - decompresses files to stdout | |
bzip2recover - recovers data from damaged bzip2 files | |
SYNOPSIS | |
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ] | |
bunzip2 [ -fkvsVL ] [ filenames ... ] | |
bzcat [ -s ] [ filenames ... ] | |
bzip2recover filename | |
DESCRIPTION | |
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors. | |
+ man busctl | |
+ head -n 20 | |
BUSCTL(1) busctl BUSCTL(1) | |
NAME | |
busctl - Introspect the bus | |
SYNOPSIS | |
busctl [OPTIONS...] [COMMAND] [NAME...] | |
DESCRIPTION | |
busctl may be used to introspect and monitor the D-Bus bus. | |
OPTIONS | |
The following options are understood: | |
--address=ADDRESS | |
Connect to the bus specified by ADDRESS instead of using suitable defaults for the system bus (see --system option). | |
--show-machine | |
+ man bzcat | |
+ head -n 20 | |
bzip2(1) General Commands Manual bzip2(1) | |
NAME | |
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6 | |
bzcat - decompresses files to stdout | |
bzip2recover - recovers data from damaged bzip2 files | |
SYNOPSIS | |
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ] | |
bunzip2 [ -fkvsVL ] [ filenames ... ] | |
bzcat [ -s ] [ filenames ... ] | |
bzip2recover filename | |
DESCRIPTION | |
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors. | |
+ man bzcmp | |
+ head -n 20 | |
BZDIFF(1) General Commands Manual BZDIFF(1) | |
NAME | |
bzcmp, bzdiff - compare bzip2 compressed files | |
SYNOPSIS | |
bzcmp [ cmp_options ] file1 [ file2 ] | |
bzdiff [ diff_options ] file1 [ file2 ] | |
DESCRIPTION | |
Bzcmp and bzdiff are used to invoke the cmp or the diff program on bzip2 compressed files. All options specified are passed directly to cmp or diff. If only 1 file is specified, then the files compared are file1 and an uncompressed file1.bz2. If two files are specified, then they are uncompressed if necessary and fed to cmp or diff. The exit status from cmp or diff is preserved. | |
SEE ALSO | |
cmp(1), diff(1), bzmore(1), bzless(1), bzgrep(1), bzip2(1) | |
BUGS | |
+ man bzdiff | |
+ head -n 20 | |
BZDIFF(1) General Commands Manual BZDIFF(1) | |
NAME | |
bzcmp, bzdiff - compare bzip2 compressed files | |
SYNOPSIS | |
bzcmp [ cmp_options ] file1 [ file2 ] | |
bzdiff [ diff_options ] file1 [ file2 ] | |
DESCRIPTION | |
Bzcmp and bzdiff are used to invoke the cmp or the diff program on bzip2 compressed files. All options specified are passed directly to cmp or diff. If only 1 file is specified, then the files compared are file1 and an uncompressed file1.bz2. If two files are specified, then they are uncompressed if necessary and fed to cmp or diff. The exit status from cmp or diff is preserved. | |
SEE ALSO | |
cmp(1), diff(1), bzmore(1), bzless(1), bzgrep(1), bzip2(1) | |
BUGS | |
+ man bzgrep | |
+ head -n 20 | |
BZGREP(1) General Commands Manual BZGREP(1) | |
NAME | |
bzgrep, bzfgrep, bzegrep - search possibly bzip2 compressed files for a regular expression | |
SYNOPSIS | |
bzgrep [ grep_options ] [ -e ] pattern filename... | |
bzegrep [ egrep_options ] [ -e ] pattern filename... | |
bzfgrep [ fgrep_options ] [ -e ] pattern filename... | |
DESCRIPTION | |
Bzgrep is used to invoke the grep on bzip2-compressed files. All options specified are passed directly to grep. If no file is specified, then the standard input is decompressed if necessary and fed to grep. Otherwise the given files are uncompressed if necessary and fed to grep. | |
If bzgrep is invoked as bzegrep or bzfgrep then egrep or fgrep is used instead of grep. If the GREP environment variable is set, bzgrep uses it as the grep program to be invoked. For example: | |
for sh: GREP=fgrep bzgrep string files | |
+ man bzip2 | |
+ head -n 20 | |
bzip2(1) General Commands Manual bzip2(1) | |
NAME | |
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6 | |
bzcat - decompresses files to stdout | |
bzip2recover - recovers data from damaged bzip2 files | |
SYNOPSIS | |
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ] | |
bunzip2 [ -fkvsVL ] [ filenames ... ] | |
bzcat [ -s ] [ filenames ... ] | |
bzip2recover filename | |
DESCRIPTION | |
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors. | |
+ man bzip2recover | |
+ head -n 20 | |
bzip2(1) General Commands Manual bzip2(1) | |
NAME | |
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6 | |
bzcat - decompresses files to stdout | |
bzip2recover - recovers data from damaged bzip2 files | |
SYNOPSIS | |
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ] | |
bunzip2 [ -fkvsVL ] [ filenames ... ] | |
bzcat [ -s ] [ filenames ... ] | |
bzip2recover filename | |
DESCRIPTION | |
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors. | |
+ man bzless | |
+ head -n 20 | |
BZMORE(1) General Commands Manual BZMORE(1) | |
NAME | |
bzmore, bzless - file perusal filter for crt viewing of bzip2 compressed text | |
SYNOPSIS | |
bzmore [ name ... ] | |
bzless [ name ... ] | |
NOTE | |
In the following description, bzless and less can be used interchangeably with bzmore and more. | |
DESCRIPTION | |
Bzmore is a filter which allows examination of compressed or plain text files one screenful at a time on a soft-copy terminal. bzmore works on files compressed with bzip2 and also on uncompressed files. If a file does not exist, bzmore looks for a file of the same name with the addition of a .bz2 suffix. | |
Bzmore normally pauses after each screenful, printing --More-- at the bottom of the screen. If the user then types a carriage return, one more line is displayed. If the user hits a space, another screenful is displayed. Other possibilities are enumerated later. | |
Bzmore looks in the file /etc/termcap to determine terminal characteristics, and to determine the default window size. On a terminal capable of displaying 24 lines, the default window size is 22 lines. Other sequences which may be typed when bzmore pauses, and their effects, are as follows (i is an optional integer argument, defaulting to 1) : | |
+ man bzmore | |
+ head -n 20 | |
BZMORE(1) General Commands Manual BZMORE(1) | |
NAME | |
bzmore, bzless - file perusal filter for crt viewing of bzip2 compressed text | |
SYNOPSIS | |
bzmore [ name ... ] | |
bzless [ name ... ] | |
NOTE | |
In the following description, bzless and less can be used interchangeably with bzmore and more. | |
DESCRIPTION | |
Bzmore is a filter which allows examination of compressed or plain text files one screenful at a time on a soft-copy terminal. bzmore works on files compressed with bzip2 and also on uncompressed files. If a file does not exist, bzmore looks for a file of the same name with the addition of a .bz2 suffix. | |
Bzmore normally pauses after each screenful, printing --More-- at the bottom of the screen. If the user then types a carriage return, one more line is displayed. If the user hits a space, another screenful is displayed. Other possibilities are enumerated later. | |
Bzmore looks in the file /etc/termcap to determine terminal characteristics, and to determine the default window size. On a terminal capable of displaying 24 lines, the default window size is 22 lines. Other sequences which may be typed when bzmore pauses, and their effects, are as follows (i is an optional integer argument, defaulting to 1) : | |
+ man c++filt | |
+ head -n 20 | |
C++FILT(1) GNU Development Tools C++FILT(1) | |
NAME | |
c++filt - Demangle C++ and Java symbols. | |
SYNOPSIS | |
c++filt [-_|--strip-underscore] | |
[-n|--no-strip-underscore] | |
[-p|--no-params] | |
[-t|--types] | |
[-i|--no-verbose] | |
[-s format|--format=format] | |
[--help] [--version] [symbol...] | |
DESCRIPTION | |
The C++ and Java languages provide function overloading, which means that you can write many functions with the same name, providing that each function takes parameters of different types. In order to be able to distinguish these similarly named functions C++ and Java encode them into a low-level assembler name which uniquely identifies each different version. This process is known as mangling. The | |
c++filt [1] program does the inverse mapping: it decodes (demangles) low-level names into user-level names so that they can be read. | |
+ man c2ph | |
+ head -n 20 | |
C2PH(1) Perl Programmers Reference Guide C2PH(1) | |
NAME | |
c2ph, pstruct - Dump C structures as generated from "cc -g -S" stabs | |
SYNOPSIS | |
c2ph [-dpnP] [var=val] [files ...] | |
OPTIONS | |
Options: | |
-w wide; short for: type_width=45 member_width=35 offset_width=8 | |
-x hex; short for: offset_fmt=x offset_width=08 size_fmt=x size_width=04 | |
-n do not generate perl code (default when invoked as pstruct) | |
-p generate perl code (default when invoked as c2ph) | |
-v generate perl code, with C decls as comments | |
+ man cacertdir_rehash | |
+ head -n 20 | |
CACERTDIR_REHASH(8) System Manager's Manual CACERTDIR_REHASH(8) | |
NAME | |
cacertdir_rehash - simple script to create or update hash links to certificate files in a directory | |
SYNOPSIS | |
cacertdir_rehash <directory> | |
DESCRIPTION | |
cacertdir_rehash is a simple shell script that is called by authconfig and authconfig-gtk. It uses openssl command line utility to create hash symbolic links of certificate files in the specified directory. | |
NOTES | |
The script is internal to authconfig and its functionality and command line options might be changed in future. | |
RETURN CODES | |
cacertdir_rehash returns 0 on success, non-zero on error. | |
+ man cache_check | |
+ head -n 20 | |
cache_check(8) System Manager's Manual cache_check(8) | |
NAME | |
cache_check - validates cache metadata on a device or file. | |
SYNOPSIS | |
cache_check [options] {device|file} | |
DESCRIPTION | |
cache_check checks cache metadata created by the device-mapper cache target on a device or file. | |
This tool cannot be run on live metadata. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man cache_dump | |
+ head -n 20 | |
cache_dump(8) System Manager's Manual cache_dump(8) | |
NAME | |
cache_dump - dump cache metadata from device or file to standard output. | |
SYNOPSIS | |
cache_dump [options] {device|file} | |
DESCRIPTION | |
cache_dump dumps binary cache metadata created by the device-mapper cache target on a device or file to standard output for analysis or postprocessing in XML format. XML formatted metadata can be fed into cache_restore in order to put it back onto a metadata device (to process by the device-mapper target), or file. | |
This tool cannot be run on live metadata. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man cache_metadata_size | |
+ head -n 20 | |
cache_metadata_size(8) System Manager's Manual cache_metadata_size(8) | |
NAME | |
cache_metadata_size - Estimate the size of the metadata device needed for a given configuration. | |
SYNOPSIS | |
cache_metadata_size [options] | |
DESCRIPTION | |
cache_metadata_size estimates the size of the metadata. | |
Either --nr-blocks, or --block-size and --device-size must be specified. | |
OPTIONS | |
--nr-blocks {natural} | |
Specify the number of cache blocks. | |
--block-size {sectors} | |
Specify the size of each cache block in 512 byte sectors. | |
+ man cache_repair | |
+ head -n 20 | |
cache_repair(8) System Manager's Manual cache_repair(8) | |
NAME | |
cache_repair - repair cache binary metadata from device/file to device/file. | |
SYNOPSIS | |
cache_repair [options] -i {device|file} -o {device|file} | |
DESCRIPTION | |
cache_repair reads binary cache metadata created by the respective device-mapper target from one device or file, repairs it and writes it to another device or file. If written to a metadata device, the metadata can be processed by the device-mapper target. | |
This tool cannot be run on live metadata. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man cache_restore | |
+ head -n 20 | |
cache_restore(8) System Manager's Manual cache_restore(8) | |
NAME | |
cache_restore - restore cache metadata file to device or file. | |
SYNOPSIS | |
cache_restore [options] -i {xml file} -o {device|file} | |
DESCRIPTION | |
cache_restore restores cache metadata created by the respective device-mapper target dumped into an XML formatted (see cache_dump(8)) file, which optionally can be preprocessed before the restore to another device or file. If restored to a metadata device, the metadata can be processed by the device-mapper target. | |
This tool cannot be run on live metadata. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man cache_writeback | |
+ head -n 20 | |
cache_writeback(8) System Manager's Manual cache_writeback(8) | |
NAME | |
cache_writeback - writeback dirty blocks to the origin device. | |
SYNOPSIS | |
cache_writeback [options] --metadata-device {device|file} --origin-device {device|file} --fast-device {device|file} | |
DESCRIPTION | |
cache_writeback is an offline tool that writes back dirty data to the data device (origin). Intended for use in recovery scenarios when the SSD is giving IO errors. | |
This tool cannot be run on a live cache. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man cal | |
+ head -n 20 | |
CAL(1) User Commands CAL(1) | |
NAME | |
cal - display a calendar | |
SYNOPSIS | |
cal [options] [[[day] month] year] | |
cal [options] <timestamp|monthname> | |
DESCRIPTION | |
cal displays a simple calendar. If no arguments are specified, the current month is displayed. | |
The month may be specified as a number (1-12), as a month name or as an abbreviated month name according to the current locales. | |
OPTIONS | |
-1, --one | |
Display single month output. (This is the default.) | |
+ man catman | |
+ head -n 20 | |
CATMAN(8) Manual pager utils CATMAN(8) | |
NAME | |
catman - create or update the pre-formatted manual pages | |
SYNOPSIS | |
catman [-d?V] [-M path] [-C file] [section] ... | |
DESCRIPTION | |
catman is used to create an up to date set of pre-formatted manual pages known as cat pages. Cat pages are generally much faster to display than the original manual pages, but require extra storage space. The decision to support cat pages is that of the local administrator, who must provide suitable directories to contain them. | |
The options available to catman are the manual page hierarchies and sections to pre-format. The default hierarchies are those specified as system hierarchies in the man-db configuration file, and the default sections are either the colon-delimited contents of the environment variable $MANSECT or the standard set compiled into man if $MANSECT is undefined. Supplying catman with a set of whitespace- | |
delimited section names will override both of the above. | |
catman makes use of the index database cache associated with each hierarchy to determine which files need to be formatted. | |
OPTIONS | |
-d, --debug | |
+ man cfdisk | |
+ head -n 20 | |
CFDISK(8) System Administration CFDISK(8) | |
NAME | |
cfdisk - display or manipulate a disk partition table | |
SYNOPSIS | |
cfdisk [options] [device] | |
DESCRIPTION | |
cfdisk is a curses-based program for partitioning any block device. The default device is /dev/sda. | |
Note that cfdisk provides basic partitioning functionality with a user-friendly interface. If you need advanced features, use fdisk(8) instead. | |
Since version 2.25 cfdisk supports MBR (DOS), GPT, SUN and SGI disk labels, but no longer provides any functionality for CHS (Cylinder-Head-Sector) addressing. CHS has never been important for Linux, and this addressing concept does not make any sense for new devices. | |
Since version 2.25 cfdisk also does not provide a 'print' command any more. This functionality is provided by the utilities partx(8) and lsblk(8) in a very comfortable and rich way. | |
If you want to remove an old partition table from a device, use wipefs(8). | |
+ man cgdisk | |
+ head -n 20 | |
CGDISK(8) GPT fdisk Manual CGDISK(8) | |
NAME | |
cgdisk - Curses-based GUID partition table (GPT) manipulator | |
SYNOPSIS | |
cgdisk [ -a ] device | |
DESCRIPTION | |
GPT fdisk is a text-mode family of programs for creation and manipulation of partition tables. The cgdisk member of this family employs a curses-based user interface for interaction using a text-mode menuing system. It will automatically convert an old-style Master Boot Record (MBR) partition table or BSD disklabel stored without an MBR carrier partition to the newer Globally Unique Identifier (GUID) | |
Partition Table (GPT) format, or will load a GUID partition table. Other members of this program family are gdisk (the most feature-rich program of the group, with a non-curses-based interactive user interface) and sgdisk (which is driven via command-line options for use by experts or in scripts). FixParts is a related program for fixing a limited set of problems with MBR disks. | |
For information on MBR vs. GPT, as well as GPT terminology and structure, see the extended GPT fdisk documentation at http://www.rodsbooks.com/gdisk/ or consult Wikipedia. | |
The cgdisk program employs a user interface similar to that of Linux's cfdisk, but cgdisk modifies GPT partitions. It also has the capability of transforming MBR partitions or BSD disklabels into GPT partitions. Like the original cfdisk program, cgdisk does not modify disk structures until you explicitly write them to disk, so if you make a mistake, you can exit from the program with the Quit option to | |
leave your partitions unmodified. | |
+ man chacl | |
+ head -n 20 | |
CHACL(1) Access Control Lists CHACL(1) | |
NAME | |
chacl - change the access control list of a file or directory | |
SYNOPSIS | |
chacl acl pathname... | |
chacl -b acl dacl pathname... | |
chacl -d dacl pathname... | |
chacl -R pathname... | |
chacl -D pathname... | |
chacl -B pathname... | |
chacl -l pathname... | |
chacl -r pathname... | |
DESCRIPTION | |
chacl is an IRIX-compatibility command, and is maintained for those users who are familiar with its use from either XFS or IRIX. Refer to the SEE ALSO section below for a description of tools which conform more closely to the (withdrawn draft) POSIX 1003.1e standard which describes Access Control Lists (ACLs). | |
+ man chage | |
+ head -n 20 | |
CHAGE(1) User Commands CHAGE(1) | |
NAME | |
chage - change user password expiry information | |
SYNOPSIS | |
chage [options] LOGIN | |
DESCRIPTION | |
The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change his/her password. | |
OPTIONS | |
The options which apply to the chage command are: | |
-d, --lastday LAST_DAY | |
Set the number of days since January 1st, 1970 when the password was last changed. The date may also be expressed in the format YYYY-MM-DD (or the format more commonly used in your area). If the LAST_DAY is set to 0 the user is forced to change his password on the next log on. | |
-E, --expiredate EXPIRE_DATE | |
+ man chardetect | |
+ head -n 20 | |
No manual entry for chardetect | |
+ man chattr | |
+ head -n 20 | |
CHATTR(1) General Commands Manual CHATTR(1) | |
NAME | |
chattr - change file attributes on a Linux file system | |
SYNOPSIS | |
chattr [ -RVf ] [ -v version ] [ mode ] files... | |
DESCRIPTION | |
chattr changes the file attributes on a Linux file system. | |
The format of a symbolic mode is +-=[aAcCdDeijsStTu]. | |
The operator '+' causes the selected attributes to be added to the existing attributes of the files; '-' causes them to be removed; and '=' causes them to be the only attributes that the files have. | |
The letters 'aAcCdDeijsStTu' select the new attributes for the files: append only (a), no atime updates (A), compressed (c), no copy on write (C), no dump (d), synchronous directory updates (D), extent format (e), immutable (i), data journalling (j), secure deletion (s), synchronous updates (S), no tail-merging (t), top of directory hierarchy (T), and undeletable (u). | |
The following attributes are read-only, and may be listed by lsattr(1) but not modified by chattr: compression error (E), huge file (h), indexed directory (I), inline data (N), compression raw access (X), and compressed dirty file (Z). | |
+ man chcpu | |
+ head -n 20 | |
CHCPU(8) System Administration CHCPU(8) | |
NAME | |
chcpu - configure CPUs | |
SYNOPSIS | |
chcpu -c|-d|-e|-g cpu-list | |
chcpu -p mode | |
chcpu -r|-h|-V | |
DESCRIPTION | |
chcpu can modify the state of CPUs. It can enable or disable CPUs, scan for new CPUs, change the CPU dispatching mode of the underlying hypervisor, and request CPUs from the hypervisor (configure) or return CPUs to the hypervisor (deconfigure). | |
Some options have a cpu-list argument. Use this argument to specify a comma-separated list of CPUs. The list can contain individual CPU addresses or ranges of addresses. For example, 0,5,7,9-11 makes the command applicable to the CPUs with the addresses 0, 5, 7, 9, 10, and 11. | |
OPTIONS | |
-c, --configure cpu-list | |
Configure the specified CPUs. Configuring a CPU means that the hypervisor takes a CPU from the CPU pool and assigns it to the virtual hardware on which your kernel runs. | |
+ man chmem | |
+ head -n 20 | |
CHMEM(8) System Administration CHMEM(8) | |
NAME | |
chmem - configure memory | |
SYNOPSIS | |
chmem [-h] [-V] [-v] [-e|-d] [SIZE|RANGE|-b BLOCKRANGE] | |
DESCRIPTION | |
The chmem command sets a particular size or range of memory online or offline. | |
‐ Specify SIZE as <size>[m|M|g|G]. With m or M, <size> specifies the memory size in MiB (1024 x 1024 bytes). With g or G, <size> specifies the memory size in GiB (1024 x 1024 x 1024 bytes). The default unit is MiB. | |
‐ Specify RANGE in the form 0x<start>-0x<end> as shown in the output of the lsmem command. <start> is the hexadecimal address of the first byte and <end> is the hexadecimal address of the last byte in the memory range. | |
‐ Specify BLOCKRANGE in the form <first>-<last> or <block> as shown in the output of the lsmem command. <first> is the number of the first memory block and <last> is the number of the last memory block in the memory range. Alternatively a single block can be specified. BLOCKRANGE requires the --blocks option. | |
SIZE and RANGE must be aligned to the Linux memory block size, as shown in the output of the lsmem command. | |
+ man chpasswd | |
+ head -n 20 | |
CHPASSWD(8) System Management Commands CHPASSWD(8) | |
NAME | |
chpasswd - update passwords in batch mode | |
SYNOPSIS | |
chpasswd [options] | |
DESCRIPTION | |
The chpasswd command reads a list of user name and password pairs from standard input and uses this information to update a group of existing users. Each line is of the format: | |
user_name:password | |
By default the passwords must be supplied in clear-text, and are encrypted by chpasswd. Also the password age will be updated, if present. | |
The default encryption algorithm can be defined for the system with the ENCRYPT_METHOD or MD5_CRYPT_ENAB variables of /etc/login.defs, and can be overwitten with the -e, -m, or -c options. | |
chpasswd first updates all the passwords in memory, and then commits all the changes to disk if no errors occured for any user. | |
+ man chronyc | |
+ head -n 20 | |
CHRONYC(1) User manual CHRONYC(1) | |
NAME | |
chronyc - command-line interface for chrony daemon | |
SYNOPSIS | |
chronyc [OPTION]... [COMMAND]... | |
DESCRIPTION | |
chronyc is a command-line interface program which can be used to monitor chronyd’s performance and to change various operating parameters whilst it is running. | |
If no commands are specified on the command line, chronyc will expect input from the user. The prompt chronyc> will be displayed when it is being run from a terminal. If chronyc’s input or output are redirected from or to a file, the prompt is not shown. | |
There are two ways chronyc can access chronyd. One is the Internet Protocol (IPv4 or IPv6) and the other is a Unix domain socket, which is accessible locally by the root or chrony user. By default, chronyc first tries to connect to the Unix domain socket. The compiled-in default path is /var/run/chrony/chronyd.sock. If that fails (e.g. because chronyc is running under a non-root user), it will try to | |
connect to 127.0.0.1 and then ::1. | |
Only the following monitoring commands, which do not affect the behaviour of chronyd, are allowed from the network: activity, manual list, rtcdata, smoothing, sources, sourcestats, tracking, waitsync. The set of hosts from which chronyd will accept these commands can be configured with the cmdallow directive in the chronyd’s configuration file or the cmdallow command in chronyc. By default, the | |
commands are accepted only from localhost (127.0.0.1 or ::1). | |
+ man chronyd | |
+ head -n 20 | |
CHRONYD(8) System Administration CHRONYD(8) | |
NAME | |
chronyd - chrony daemon | |
SYNOPSIS | |
chronyd [OPTION]... [DIRECTIVE]... | |
DESCRIPTION | |
chronyd is a daemon for synchronisation of the system clock. It can synchronise the clock with NTP servers, reference clocks (e.g. a GPS receiver), and manual input using wristwatch and keyboard via chronyc. It can also operate as an NTPv4 (RFC 5905) server and peer to provide a time service to other computers in the network. | |
If no configuration directives are specified on the command line, chronyd will read them from a configuration file. The compiled-in default location of the file is /etc/chrony.conf. | |
Information messages and warnings will be logged to syslog. | |
OPTIONS | |
-4 | |
With this option hostnames will be resolved only to IPv4 addresses and only IPv4 sockets will be created. | |
+ man chrt | |
+ head -n 20 | |
CHRT(1) User Commands CHRT(1) | |
NAME | |
chrt - manipulate the real-time attributes of a process | |
SYNOPSIS | |
chrt [options] priority command [argument...] | |
chrt [options] -p [priority] pid | |
DESCRIPTION | |
chrt sets or retrieves the real-time scheduling attributes of an existing pid, or runs command with the given attributes. | |
POLICIES | |
-o, --other | |
Set scheduling policy to SCHED_OTHER. This is the default Linux scheduling policy. | |
-f, --fifo | |
+ man chvt | |
+ head -n 20 | |
CHVT(1) General Commands Manual CHVT(1) | |
NAME | |
chvt - change foreground virtual terminal | |
SYNOPSIS | |
chvt N | |
DESCRIPTION | |
The command chvt N makes /dev/ttyN the foreground terminal. (The corresponding screen is created if it did not exist yet. To get rid of unused VTs, use deallocvt(1).) The key combination (Ctrl-)LeftAlt-FN (with N in the range 1-12) usually has a similar effect. | |
26 January 1997 CHVT(1) | |
+ man cifsiostat | |
+ head -n 20 | |
CIFSIOSTAT(1) Linux User's Manual CIFSIOSTAT(1) | |
NAME | |
cifsiostat - Report CIFS statistics. | |
SYNOPSIS | |
cifsiostat [ -h ] [ -k | -m ] [ -t ] [ -V ] [ interval [ count ] ] | |
DESCRIPTION | |
The cifsiostat command displays statistics about read and write operations on CIFS filesystems. | |
The interval parameter specifies the amount of time in seconds between each report. The first report contains statistics for the time since system startup (boot). Each subsequent report contains statistics collected during the interval since the previous report. A report consists of a CIFS header row followed by a line of statistics for each CIFS filesystem that is mounted. The count parameter can be | |
specified in conjunction with the interval parameter. If the count parameter is specified, the value of count determines the number of reports generated at interval seconds apart. If the interval parameter is specified without the count parameter, the cifsiostat command generates reports continuously. | |
REPORT | |
The CIFS report provides statistics for each mounted CIFS filesystem. The report shows the following fields: | |
+ man clock | |
+ head -n 20 | |
HWCLOCK(8) System Administration HWCLOCK(8) | |
NAME | |
hwclock - read or set the hardware clock (RTC) | |
SYNOPSIS | |
hwclock [function] [option...] | |
DESCRIPTION | |
hwclock is a tool for accessing the Hardware Clock. It can: display the Hardware Clock time; set the Hardware Clock to a specified time; set the Hardware Clock from the System Clock; set the System Clock from the Hardware Clock; compensate for Hardware Clock drift; correct the System Clock timescale; set the kernel's timezone, NTP timescale, and epoch (Alpha only); and predict future Hardware Clock | |
values based on its drift rate. | |
Since v2.26 important changes were made to the --hctosys function and the --directisa option, and a new option --update-drift was added. See their respective descriptions below. | |
FUNCTIONS | |
The following functions are mutually exclusive, only one can be given at a time. If none is given, the default is --show. | |
--adjust | |
+ man clockdiff | |
+ head -n 20 | |
CLOCKDIFF(8) System Manager's Manual: iputils CLOCKDIFF(8) | |
NAME | |
clockdiff - measure clock difference between hosts | |
SYNOPSIS | |
clockdiff [-o] [-o1] destination | |
DESCRIPTION | |
clockdiff Measures clock difference between us and destination with 1 msec resolution using ICMP TIMESTAMP [2] packets or, optionally, IP TIMESTAMP option [3] option added to ICMP ECHO. [1] | |
OPTIONS | |
-o Use IP TIMESTAMP with ICMP ECHO instead of ICMP TIMESTAMP messages. It is useful with some destinations, which do not support ICMP TIMESTAMP (f.e. Solaris <2.4). | |
-o1 Slightly different form of -o, namely it uses three-term IP TIMESTAMP with prespecified hop addresses instead of four term one. What flavor works better depends on target host. Particularly, -o is better for Linux. | |
WARNINGS | |
+ man cloud-id | |
+ head -n 20 | |
No manual entry for cloud-id | |
+ man cloud-init | |
+ head -n 20 | |
No manual entry for cloud-init | |
+ man cloud-init-per | |
+ head -n 20 | |
No manual entry for cloud-init-per | |
+ man col | |
+ head -n 20 | |
COL(1) User Commands COL(1) | |
NAME | |
col - filter reverse line feeds from input | |
SYNOPSIS | |
col [options] | |
DESCRIPTION | |
col filters out reverse (and half-reverse) line feeds so the output is in the correct order, with only forward and half-forward line feeds. It also replaces any whitespace characters with tabs where possible. This can be useful in processing the output of nroff(1) and tbl(1). | |
col reads from standard input and writes to standard output. | |
OPTIONS | |
-b, --no-backspaces | |
Do not output any backspaces, printing only the last character written to each column position. | |
-f, --fine | |
+ man colcrt | |
+ head -n 20 | |
COLCRT(1) User Commands COLCRT(1) | |
NAME | |
colcrt - filter nroff output for CRT previewing | |
SYNOPSIS | |
colcrt [options] [file...] | |
DESCRIPTION | |
colcrt provides virtual half-line and reverse line feed sequences for terminals without such capability, and on which overstriking is destructive. Half-line characters and underlining (changed to dashing `-') are placed on new lines in between the normal output lines. | |
OPTIONS | |
-, --no-underlining | |
Suppress all underlining. This option is especially useful for previewing allboxed tables from tbl(1). | |
-2, --half-lines | |
Causes all half-lines to be printed, effectively double spacing the output. Normally, a minimal space output format is used which will suppress empty lines. The program never suppresses two consecutive empty lines, however. The -2 option is useful for sending output to the line printer when the output contains superscripts and subscripts which would otherwise be invisible. | |
+ man colrm | |
+ head -n 20 | |
COLRM(1) User Commands COLRM(1) | |
NAME | |
colrm - remove columns from a file | |
SYNOPSIS | |
colrm [first [last]] | |
DESCRIPTION | |
colrm removes selected columns from a file. Input is taken from standard input. Output is sent to standard output. | |
If called with one parameter the columns of each line will be removed starting with the specified first column. If called with two parameters the columns from the first column to the last column will be removed. | |
Column numbering starts with column 1. | |
OPTIONS | |
-V, --version | |
Display version information and exit. | |
+ man column | |
+ head -n 20 | |
COLUMN(1) User Commands COLUMN(1) | |
NAME | |
column - columnate lists | |
SYNOPSIS | |
column [options] [file...] | |
DESCRIPTION | |
The column utility formats its input into multiple columns. The util support three modes: | |
columns are filled before rows | |
This is the default mode (required by backward compatibility). | |
rows are filed before columns | |
This mode is enabled by option -x, --fillrows | |
table Determine the number of columns the input contains and create a table. This mode is enabled by option -t, --table and columns formatting is possible to modify by --table-* options. Use this mode if not sure. | |
+ man consolehelper | |
+ head -n 20 | |
CONSOLEHELPER(8) System Manager's Manual CONSOLEHELPER(8) | |
NAME | |
consolehelper - A wrapper that helps console users run system programs | |
SYNOPSIS | |
progname [ options ] | |
DESCRIPTION | |
consolehelper is a tool that makes it easy for console users to run system programs, doing authentication via PAM (which can be set up to trust all console users or to ask for a password at the system administrator's discretion). When possible, the authentication is done graphically; otherwise, it is done within the text console from which consolehelper was started. | |
It is intended to be completely transparent. This means that the user will never run the consolehelper program directly. Instead, programs like /sbin/shutdown are paired with a link from /usr/bin/shutdown to /usr/bin/consolehelper. Then when non-root users (specifically, users without /sbin in their path, or /sbin after /usr/bin) call the "shutdown" program, consolehelper will be invoked to authen‐ | |
ticate the action and then invoke /sbin/shutdown. (consolehelper itself has no priviledges; it calls the userhelper(8) program do the real work.) | |
consolehelper requires that a PAM configuration for every managed program exist. So to make /sbin/foo or /usr/sbin/foo managed, you need to create a link from /usr/bin/foo to /usr/bin/consolehelper and create the file /etc/pam.d/foo, normally using the pam_console(8) PAM module. | |
OPTIONS | |
This program has no command line options of its own; it passes all command line options on to the program it is calling. | |
+ man consoletype | |
+ head -n 20 | |
CONSOLETYPE(1) General Commands Manual CONSOLETYPE(1) | |
NAME | |
consoletype - print type of the console connected to standard input | |
SYNOPSIS | |
consoletype [stdout] [fg] | |
DESCRIPTION | |
consoletype prints the type of console connected to standard input, and checks whether the console connected to standard input is the current foreground virtual console. With no arguments, it prints vt if console is a virtual terminal (/dev/tty* or /dev/console device if not on a serial console), serial if standard input is a serial console (/dev/console or /dev/ttyS*) and pty if standard input is a | |
pseudo terminal. | |
RETURN VALUE | |
consoletype when passed no arguments returns | |
0 if on virtual terminal | |
1 if on serial console | |
+ man convertquota | |
+ head -n 20 | |
CONVERTQUOTA(8) System Manager's Manual CONVERTQUOTA(8) | |
NAME | |
convertquota - convert quota from old file format to new one | |
SYNOPSIS | |
convertquota [ -ug ] -e filesystem | |
convertquota [ -ug ] -f oldformat,newformat filesystem | |
DESCRIPTION | |
convertquota converts old quota files quota.user and quota.group to files aquota.user and aquota.group in new format currently used by 2.4.0-ac? and newer or by SuSE or Red Hat Linux 2.4 kernels on filesystem. | |
New file format allows using quotas for 32-bit uids / gids, setting quotas for root, accounting used space in bytes (and so allowing use of quotas in ReiserFS) and it is also architecture independent. This format introduces Radix Tree (a simple form of tree structure) to quota file. | |
OPTIONS | |
-u, --user | |
convert user quota file. This is the default. | |
+ man coredumpctl | |
+ head -n 20 | |
COREDUMPCTL(1) coredumpctl COREDUMPCTL(1) | |
NAME | |
coredumpctl - Retrieve coredumps from the journal | |
SYNOPSIS | |
coredumpctl [OPTIONS...] {COMMAND} [PID|COMM|EXE|MATCH...] | |
DESCRIPTION | |
coredumpctl may be used to retrieve coredumps from systemd-journald(8). | |
OPTIONS | |
The following options are understood: | |
--no-legend | |
Do not print column headers. | |
-1 | |
+ man cpupower | |
+ head -n 20 | |
CPUPOWER(1) cpupower Manual CPUPOWER(1) | |
NAME | |
cpupower - Shows and sets processor power related values | |
SYNOPSIS | |
cpupower [ -c cpulist ] <command> [ARGS] | |
cpupower -v|--version | |
cpupower -h|--help | |
DESCRIPTION | |
cpupower is a collection of tools to examine and tune power saving related features of your processor. | |
The manpages of the commands (cpupower-<command>(1)) provide detailed descriptions of supported features. Run cpupower help to get an overview of supported commands. | |
+ man cracklib-check | |
+ head -n 20 | |
cracklib-check(8) System Manager's Manual cracklib-check(8) | |
NAME | |
cracklib-check - Check passwords using libcrack2 | |
SYNOPSIS | |
cracklib-check | |
DESCRIPTION | |
cracklib-check takes a list of passwords from stdin and checks them via libcrack2's FascistCheck(3) sub routine. | |
RESULT | |
cracklib-check prints each checked password and the corresponding result of FascistCheck(3) to stdout. The password and the result are separated by a colon. | |
SEE ALSO | |
+ man cracklib-format | |
+ head -n 20 | |
cracklib-format(8) Debian GNU/Linux manual cracklib-format(8) | |
NAME | |
cracklib-format, cracklib-packer, cracklib-unpacker - cracklib dictionary utilities | |
SYNOPSIS | |
cracklib-format file ... | |
cracklib-packer cracklib_dictpath | |
cracklib-unpacker cracklib_dictpath | |
DESCRIPTION | |
cracklib-format takes a list of text files each containing a list of words, one per line, It lowercases all words, removes control characters, and sorts the lists. It outputs the cleaned up list to standard output. The text files may be optionally compressed with gzip(1). | |
If you supply massive amounts of text to cracklib-format you must have enough free space available for use by the sort(1) command. If you do not have 20Mb free in /var/tmp (or whatever temporary area your sort(1) command uses), have a look at the /usr/sbin/cracklib-format program which is a sh(1) program. You can usually tweak the sort(1) command to use any large area of disk you desire, by use of | |
the -T option. cracklib-format has a hook for this. | |
+ man cracklib-packer | |
+ head -n 20 | |
cracklib-format(8) Debian GNU/Linux manual cracklib-format(8) | |
NAME | |
cracklib-format, cracklib-packer, cracklib-unpacker - cracklib dictionary utilities | |
SYNOPSIS | |
cracklib-format file ... | |
cracklib-packer cracklib_dictpath | |
cracklib-unpacker cracklib_dictpath | |
DESCRIPTION | |
cracklib-format takes a list of text files each containing a list of words, one per line, It lowercases all words, removes control characters, and sorts the lists. It outputs the cleaned up list to standard output. The text files may be optionally compressed with gzip(1). | |
If you supply massive amounts of text to cracklib-format you must have enough free space available for use by the sort(1) command. If you do not have 20Mb free in /var/tmp (or whatever temporary area your sort(1) command uses), have a look at the /usr/sbin/cracklib-format program which is a sh(1) program. You can usually tweak the sort(1) command to use any large area of disk you desire, by use of | |
the -T option. cracklib-format has a hook for this. | |
+ man cracklib-unpacker | |
+ head -n 20 | |
cracklib-format(8) Debian GNU/Linux manual cracklib-format(8) | |
NAME | |
cracklib-format, cracklib-packer, cracklib-unpacker - cracklib dictionary utilities | |
SYNOPSIS | |
cracklib-format file ... | |
cracklib-packer cracklib_dictpath | |
cracklib-unpacker cracklib_dictpath | |
DESCRIPTION | |
cracklib-format takes a list of text files each containing a list of words, one per line, It lowercases all words, removes control characters, and sorts the lists. It outputs the cleaned up list to standard output. The text files may be optionally compressed with gzip(1). | |
If you supply massive amounts of text to cracklib-format you must have enough free space available for use by the sort(1) command. If you do not have 20Mb free in /var/tmp (or whatever temporary area your sort(1) command uses), have a look at the /usr/sbin/cracklib-format program which is a sh(1) program. You can usually tweak the sort(1) command to use any large area of disk you desire, by use of | |
the -T option. cracklib-format has a hook for this. | |
+ man create-cracklib-dict | |
+ head -n 20 | |
create-cracklib-dict(8) System Manager's Manual create-cracklib-dict(8) | |
NAME | |
create-cracklib-dict - Check passwords using libcrack2 | |
SYNOPSIS | |
create-cracklib-dict wordlist ... | |
DESCRIPTION | |
create-cracklib-dict takes one or more word list files as arguments and converts them into cracklib dictionaries for use by password checking programs. The results are placed in the default compiled-in dictionary location. | |
If you wish to store the dictionary in a different location, use the cracklib-format and cracklib-packer commands directly. | |
SEE ALSO | |
cracklib-format(8), cracklib-packer(8), cracklib-check(8), | |
+ man crond | |
+ head -n 20 | |
CRON(8) System Administration CRON(8) | |
NAME | |
crond - daemon to execute scheduled commands | |
SYNOPSIS | |
crond [-c | -h | -i | -n | -p | -P | -s | -m<mailcommand>] | |
crond -x [ext,sch,proc,pars,load,misc,test,bit] | |
DESCRIPTION | |
Cron is started from /etc/rc.d/init.d or /etc/init.d when classical sysvinit scripts are used. In case systemd is enabled, then unit file is installed into /lib/systemd/system/crond.service and daemon is started by systemctl start crond.service command. It returns immediately, thus, there is no need to need to start it with the '&' parameter. | |
Cron searches /var/spool/cron for crontab files which are named after accounts in /etc/passwd; The found crontabs are loaded into the memory. Cron also searches for /etc/anacrontab and any files in the /etc/cron.d directory, which have a different format (see crontab(5)). Cron examines all stored crontabs and checks each job to see if it needs to be run in the current minute. When executing com‐ | |
mands, any output is mailed to the owner of the crontab (or to the user specified in the MAILTO environment variable in the crontab, if such exists). Any job output can also be sent to syslog by using the -s option. | |
There are two ways how changes in crontables are checked. The first method is checking the modtime of a file. The second method is using the inotify support. Using of inotify is logged in the /var/log/cron log after the daemon is started. The inotify support checks for changes in all crontables and accesses the hard disk only when a change is detected. | |
When using the modtime option, Cron checks its crontables' modtimes every minute to check for any changes and reloads the crontables which have changed. There is no need to restart Cron after some of the crontables were modified. The modtime option is also used when inotify can not be initialized. | |
+ man crontab | |
+ head -n 20 | |
CRONTAB(1) User Commands CRONTAB(1) | |
NAME | |
crontab - maintains crontab files for individual users | |
SYNOPSIS | |
crontab [-u user] file | |
crontab [-u user] [-l | -r | -e] [-i] [-s] | |
crontab -n [ hostname ] | |
crontab -c | |
DESCRIPTION | |
Crontab is the program used to install a crontab table file, remove or list the existing tables used to serve the cron(8) daemon. Each user can have their own crontab, and though these are files in /var/spool/, they are not intended to be edited directly. For SELinux in MLS mode, you can define more crontabs for each range. For more information, see selinux(8). | |
In this version of Cron it is possible to use a network-mounted shared /var/spool/cron across a cluster of hosts and specify that only one of the hosts should run the crontab jobs in the particular directory at any one time. You may also use crontab(1) from any of these hosts to edit the same shared set of crontab files, and to set and query which host should run the crontab jobs. | |
Running cron jobs can be allowed or disallowed for different users. For this purpose, use the cron.allow and cron.deny files. If the cron.allow file exists, a user must be listed in it to be allowed to use cron If the cron.allow file does not exist but the cron.deny file does exist, then a user must not be listed in the cron.deny file in order to use cron. If neither of these files exists, only the | |
super user is allowed to use cron. Another way to restrict access to cron is to use PAM authentication in /etc/security/access.conf to set up users, which are allowed or disallowed to use crontab or modify system cron jobs in the /etc/cron.d/ directory. | |
+ man cryptsetup | |
+ head -n 20 | |
CRYPTSETUP(8) Maintenance Commands CRYPTSETUP(8) | |
NAME | |
cryptsetup - manage plain dm-crypt and LUKS encrypted volumes | |
SYNOPSIS | |
cryptsetup <options> <action> <action args> | |
DESCRIPTION | |
cryptsetup is used to conveniently setup dm-crypt managed device-mapper mappings. These include plain dm-crypt volumes and LUKS volumes. The difference is that LUKS uses a metadata header and can hence offer more features than plain dm-crypt. On the other hand, the header is visible and vulnerable to damage. | |
In addition, cryptsetup provides limited support for the use of historic loopaes volumes and for TrueCrypt compatible volumes. | |
PLAIN DM-CRYPT OR LUKS? | |
Unless you understand the cryptographic background well, use LUKS. With plain dm-crypt there are a number of possible user errors that massively decrease security. While LUKS cannot fix them all, it can lessen the impact for many of them. | |
WARNINGS | |
+ man csh | |
+ head -n 20 | |
TCSH(1) General Commands Manual TCSH(1) | |
NAME | |
tcsh - C shell with file name completion and command line editing | |
SYNOPSIS | |
tcsh [-bcdefFimnqstvVxX] [-Dname[=value]] [arg ...] | |
tcsh -l | |
DESCRIPTION | |
tcsh is an enhanced but completely compatible version of the Berkeley UNIX C shell, csh(1). It is a command language interpreter usable both as an interactive login shell and a shell script command processor. It includes a command-line editor (see The command-line editor), programmable word completion (see Completion and listing), spelling correction (see Spelling correction), a history mechanism | |
(see History substitution), job control (see Jobs) and a C-like syntax. The NEW FEATURES section describes major enhancements of tcsh over csh(1). Throughout this manual, features of tcsh not found in most csh(1) implementations (specifically, the 4.4BSD csh) are labeled with `(+)', and features which are present in csh(1) but not usually documented are labeled with `(u)'. | |
Argument list processing | |
If the first argument (argument 0) to the shell is `-' then it is a login shell. A login shell can be also specified by invoking the shell with the -l flag as the only argument. | |
The rest of the flag arguments are interpreted as follows: | |
+ man csslint-0.6 | |
+ head -n 20 | |
No manual entry for csslint-0.6 | |
+ man ctrlaltdel | |
+ head -n 20 | |
CTRLALTDEL(8) System Administration CTRLALTDEL(8) | |
NAME | |
ctrlaltdel - set the function of the Ctrl-Alt-Del combination | |
SYNOPSIS | |
ctrlaltdel hard|soft | |
DESCRIPTION | |
Based on examination of the linux/kernel/reboot.c code, it is clear that there are two supported functions that the Ctrl-Alt-Del sequence can perform. | |
hard Immediately reboot the computer without calling sync(2) and without any other preparation. This is the default. | |
soft Make the kernel send the SIGINT (interrupt) signal to the init process (this is always the process with PID 1). If this option is used, the init(8) program must support this feature. Since there are now several init(8) programs in the Linux community, please consult the documentation for the version that you are currently using. | |
When the command is run without any argument, it will display the current setting. | |
The function of ctrlaltdel is usually set in the /etc/rc.local file. | |
+ man ctstat | |
+ head -n 20 | |
LNSTAT(8) System Manager's Manual LNSTAT(8) | |
NAME | |
lnstat - unified linux network statistics | |
SYNOPSIS | |
lnstat [options] | |
DESCRIPTION | |
This manual page documents briefly the lnstat command. | |
lnstat is a generalized and more feature-complete replacement for the old rtstat program. It is commonly used to periodically print a selection of statistical values exported by the kernel. In addition to routing cache statistics, it supports any kind of statistics the linux kernel exports via a file in /proc/net/stat/. | |
Each file in /proc/net/stat/ contains a header line listing the column names. These names are used by lnstat as keys for selecting which statistics to print. For every CPU present in the system, a line follows which lists the actual values for each column of the file. lnstat sums these values up (which in fact are counters) before printing them. After each interval, only the difference to the last | |
value is printed. | |
Files and columns may be selected by using the -f and -k parameters. By default, all columns of all files are printed. | |
+ man cvtsudoers | |
+ head -n 20 | |
CVTSUDOERS(1) BSD General Commands Manual CVTSUDOERS(1) | |
NAME | |
cvtsudoers — convert between sudoers file formats | |
SYNOPSIS | |
cvtsudoers [-ehMpV] [-b dn] [-c conf_file] [-d deftypes] [-f output_format] [-i input_format] [-I increment] [-m filter] [-o output_file] [-O start_point] [-s sections] [input_file] | |
DESCRIPTION | |
cvtsudoers can be used to convert between sudoers security policy file formats. The default input format is sudoers. The default output format is LDIF. It is only possible to convert a sudoers file that is syntactically correct. | |
If no input_file is specified, or if it is ‘-’, the policy is read from the standard input. By default, the result is written to the standard output. | |
The options are as follows: | |
-b dn, --base=dn | |
The base DN (distinguished name) that will be used when performing LDAP queries. Typically this is of the form ou=SUDOers,dc=-mydomain,dc=com for the domain my-domain.com. If this option is not specified, the value of the SUDOERS_BASE environment variable will be used instead. Only necessary when converting to LDIF format. | |
-c, --config | |
Specify the path to a configuration file. Defaults to /etc/cvtsudoers.conf. | |
+ man dbus-cleanup-sockets | |
+ head -n 20 | |
DBUS-CLEANUP-SOCKE(1) User Commands DBUS-CLEANUP-SOCKE(1) | |
NAME | |
dbus-cleanup-sockets - clean up leftover sockets in a directory | |
SYNOPSIS | |
dbus-cleanup-sockets [DIRECTORY] | |
DESCRIPTION | |
The dbus-cleanup-sockets command cleans up unused D-Bus connection sockets. See http://www.freedesktop.org/software/dbus/ for more information about the big picture. | |
If given no arguments, dbus-cleanup-sockets cleans up sockets in the standard default socket directory for the per-user-login-session message bus; this is usually /tmp. Optionally, you can pass a different directory on the command line. | |
On Linux, this program is essentially useless, because D-Bus defaults to using "abstract sockets" that exist only in memory and don't have a corresponding file in /tmp. | |
On most other flavors of UNIX, it's possible for the socket files to leak when programs using D-Bus exit abnormally or without closing their D-Bus connections. Thus, it might be interesting to run dbus-cleanup-sockets in a cron job to mop up any leaked sockets. Or you can just ignore the leaked sockets, they aren't really hurting anything, other than cluttering the output of "ls /tmp" | |
+ man dbus-daemon | |
+ head -n 20 | |
DBUS-DAEMON(1) User Commands DBUS-DAEMON(1) | |
NAME | |
dbus-daemon - Message bus daemon | |
SYNOPSIS | |
dbus-daemon | |
dbus-daemon [--version] [--session] [--system] [--config-file=FILE] [--print-address [=DESCRIPTOR]] [--print-pid [=DESCRIPTOR]] [--fork] | |
DESCRIPTION | |
dbus-daemon is the D-Bus message bus daemon. See http://www.freedesktop.org/software/dbus/ for more information about the big picture. D-Bus is first a library that provides one-to-one communication between any two applications; dbus-daemon is an application that uses this library to implement a message bus daemon. Multiple programs connect to the message bus daemon and can exchange messages with one | |
another. | |
There are two standard message bus instances: the systemwide message bus (installed on many systems as the "messagebus" init service) and the per-user-login-session message bus (started each time a user logs in). dbus-daemon is used for both of these instances, but with a different configuration file. | |
The --session option is equivalent to "--config-file=/usr/share/dbus-1/session.conf" and the --system option is equivalent to "--config-file=/usr/share/dbus-1/system.conf". By creating additional configuration files and using the --config-file option, additional special-purpose message bus daemons could be created. | |
+ man dbus-monitor | |
+ head -n 20 | |
DBUS-MONITOR(1) User Commands DBUS-MONITOR(1) | |
NAME | |
dbus-monitor - debug probe to print message bus messages | |
SYNOPSIS | |
dbus-monitor [--system | --session | --address ADDRESS] [--profile | --monitor | --pcap | --binary] [watch expressions] | |
DESCRIPTION | |
The dbus-monitor command is used to monitor messages going through a D-Bus message bus. See http://www.freedesktop.org/software/dbus/ for more information about the big picture. | |
There are two well-known message buses: the systemwide message bus (installed on many systems as the "messagebus" service) and the per-user-login-session message bus (started each time a user logs in). The --system and --session options direct dbus-monitor to monitor the system or session buses respectively. If neither is specified, dbus-monitor monitors the session bus. | |
dbus-monitor has two different text output modes: the 'classic'-style monitoring mode, and profiling mode. The profiling format is a compact format with a single line per message and microsecond-resolution timing information. The --profile and --monitor options select the profiling and monitoring output format respectively. | |
dbus-monitor also has two binary output modes. The binary mode, selected by --binary, outputs the entire binary message stream (without the initial authentication handshake). The PCAP mode, selected by --pcap, adds a PCAP file header to the beginning of the output, and prepends a PCAP message header to each message; this produces a binary file that can be read by, for instance, Wireshark. | |
+ man dbus-run-session | |
+ head -n 20 | |
DBUS-RUN-SESSION(1) User Commands DBUS-RUN-SESSION(1) | |
NAME | |
dbus-run-session - start a process as a new D-Bus session | |
SYNOPSIS | |
dbus-run-session [--config-file FILENAME] [--dbus-daemon BINARY] [--] PROGRAM [ARGUMENTS...] | |
dbus-run-session --help | |
dbus-run-session --version | |
DESCRIPTION | |
dbus-run-session is used to start a session bus instance of dbus-daemon from a shell script, and start a specified program in that session. The dbus-daemon will run for as long as the program does, after which it will terminate. | |
One use is to run a shell with its own dbus-daemon in a text‐mode or SSH session, and have the dbus-daemon terminate automatically on leaving the sub‐shell, like this: | |
dbus-run-session -- bash | |
+ man dbus-send | |
+ head -n 20 | |
DBUS-SEND(1) User Commands DBUS-SEND(1) | |
NAME | |
dbus-send - Send a message to a message bus | |
SYNOPSIS | |
dbus-send [--system | --session | --address=ADDRESS] [--dest=NAME] [--print-reply [=literal]] [--reply-timeout=MSEC] [--type=TYPE] OBJECT_PATH INTERFACE.MEMBER [CONTENTS...] | |
DESCRIPTION | |
The dbus-send command is used to send a message to a D-Bus message bus. See http://www.freedesktop.org/software/dbus/ for more information about the big picture. | |
There are two well-known message buses: the systemwide message bus (installed on many systems as the "messagebus" service) and the per-user-login-session message bus (started each time a user logs in). The --system and --session options direct dbus-send to send messages to the system or session buses respectively. If neither is specified, dbus-send sends to the session bus. | |
Nearly all uses of dbus-send must provide the --dest argument which is the name of a connection on the bus to send the message to. If --dest is omitted, no destination is set. | |
The object path and the name of the message to send must always be specified. Following arguments, if any, are the message contents (message arguments). These are given as type-specified values and may include containers (arrays, dicts, and variants) as described below. | |
+ man dbus-test-tool | |
+ head -n 20 | |
DBUS-TEST-TOOL(1) User Commands DBUS-TEST-TOOL(1) | |
NAME | |
dbus-test-tool - D-Bus traffic generator and test tool | |
SYNOPSIS | |
dbus-test-tool black-hole [--session | --system] [--name=NAME] [--no-read] | |
dbus-test-tool echo [--session | --system] [--name=NAME] [--sleep-ms=MS] | |
dbus-test-tool spam [--session | --system] [--dest=NAME] [--count=N] [--flood] [--ignore-errors] [--messages-per-conn=N] [--no-reply] [--queue=N] [--seed=SEED] [--string | --bytes | --empty] [--payload=S | --stdin | --message-stdin | --random-size] | |
DESCRIPTION | |
dbus-test-tool is a multi-purpose tool for debugging and profiling D-Bus. | |
dbus-test-tool black-hole connects to D-Bus, optionally requests a name, then does not reply to messages. It normally reads and discards messages from its D-Bus socket, but can be configured to sleep forever without reading. | |
dbus-test-tool echo connects to D-Bus, optionally requests a name, then sends back an empty reply to every method call, after an optional delay. | |
+ man dbus-update-activation-environment | |
+ head -n 20 | |
DBUS-UPDATE-ACTIVA(1) User Commands DBUS-UPDATE-ACTIVA(1) | |
NAME | |
dbus-update-activation-environment - update environment used for D-Bus session services | |
SYNOPSIS | |
dbus-update-activation-environment [--systemd] [--verbose] --all | VAR... | VAR=VAL... | |
DESCRIPTION | |
dbus-update-activation-environment updates the list of environment variables used by dbus-daemon --session when it activates session services without using systemd. | |
With the --systemd option, if an instance of systemd --user is available on D-Bus, it also updates the list of environment variables used by systemd --user when it activates user services, including D-Bus session services for which dbus-daemon has been configured to delegate activation to systemd. This is very similar to the import-environment command provided by systemctl(1)). | |
Variables that are special to dbus-daemon or systemd may be set, but their values will be overridden when a service is started. For instance, it is not useful to add DBUS_SESSION_BUS_ADDRESS to dbus-daemon's activation environment, although it might still be useful to add it to systemd's activation environment. | |
OPTIONS | |
--all | |
Set all environment variables present in the environment used by dbus-update-activation-environment. | |
+ man dbus-uuidgen | |
+ head -n 20 | |
DBUS-UUIDGEN(1) User Commands DBUS-UUIDGEN(1) | |
NAME | |
dbus-uuidgen - Utility to generate UUIDs | |
SYNOPSIS | |
dbus-uuidgen [--version] [--ensure [=FILENAME]] [--get [=FILENAME]] | |
DESCRIPTION | |
The dbus-uuidgen command generates or reads a universally unique ID. | |
Note that the D-Bus UUID has no relationship to RFC 4122 and does not generate UUIDs compatible with that spec. Many systems have a separate command for that (often called "uuidgen"). | |
See http://www.freedesktop.org/software/dbus/ for more information about D-Bus. | |
The primary usage of dbus-uuidgen is to run in the post-install script of a D-Bus package like this: | |
+ man dc | |
+ head -n 20 | |
dc(1) General Commands Manual dc(1) | |
NAME | |
dc - an arbitrary precision calculator | |
SYNOPSIS | |
dc [-V] [--version] [-h] [--help] | |
[-e scriptexpression] [--expression=scriptexpression] | |
[-f scriptfile] [--file=scriptfile] | |
[file ...] | |
DESCRIPTION | |
dc is a reverse-polish desk calculator which supports unlimited precision arithmetic. It also allows you to define and call macros. Normally dc reads from the standard input; if any command arguments are given to it, they are filenames, and dc reads and executes the contents of the files before reading from standard input. All normal output is to standard output; all error output is to standard | |
error. | |
A reverse-polish calculator stores numbers on a stack. Entering a number pushes it on the stack. Arithmetic operations pop arguments off the stack and push the results. | |
To enter a number in dc, type the digits (using upper case letters A through F as "digits" when working with input bases greater than ten), with an optional decimal point. Exponential notation is not supported. To enter a negative number, begin the number with ``_''. ``-'' cannot be used for this, as it is a binary operator for subtraction instead. To enter two numbers in succession, separate them | |
+ man deallocvt | |
+ head -n 20 | |
DEALLOCVT(1) General Commands Manual DEALLOCVT(1) | |
NAME | |
deallocvt - deallocate unused virtual consoles | |
SYNOPSIS | |
deallocvt [N ...] | |
DESCRIPTION | |
The command deallocvt deallocates kernel memory and data structures for all unused virtual consoles. If one or more arguments N ... are given, only the corresponding consoles /dev/ttyN are deallocated. | |
A virtual console is unused if it is not the foreground console, and no process has it open for reading or writing, and no text has been selected on its screen. | |
SEE ALSO | |
chvt(1), openvt(1) | |
+ man debugfs | |
+ head -n 20 | |
DEBUGFS(8) System Manager's Manual DEBUGFS(8) | |
NAME | |
debugfs - ext2/ext3/ext4 file system debugger | |
SYNOPSIS | |
debugfs [ -DVwci ] [ -b blocksize ] [ -s superblock ] [ -f cmd_file ] [ -R request ] [ -d data_source_device ] [ device ] | |
DESCRIPTION | |
The debugfs program is an interactive file system debugger. It can be used to examine and change the state of an ext2, ext3, or ext4 file system. | |
device is the special file corresponding to the device containing the file system (e.g /dev/hdXX). | |
OPTIONS | |
-w Specifies that the file system should be opened in read-write mode. Without this option, the file system is opened in read-only mode. | |
-c Specifies that the file system should be opened in catastrophic mode, in which the inode and group bitmaps are not read initially. This can be useful for filesystems with significant corruption, but because of this, catastrophic mode forces the filesystem to be opened read-only. | |
-i Specifies that device represents an ext2 image file created by the e2image program. Since the ext2 image file only contains the superblock, block group descriptor, block and inode allocation bitmaps, and the inode table, many debugfs commands will not function properly. Warning: no safety checks are in place, and debugfs may fail in interesting ways if commands such as ls, dump, etc. are tried | |
+ man debuginfo-install | |
+ head -n 20 | |
debuginfo-install(1) debuginfo-install(1) | |
NAME | |
debuginfo-install - install debuginfo packages and their dependencies | |
SYNOPSIS | |
debuginfo-install package | |
DESCRIPTION | |
debuginfo-install is a program which installs the RPMs needed to debug the specified package. The package argument can be a wildcard, but will only match installed packages. debuginfo-install will then enable any debuginfo repositories, and install the relevant debuginfo rpm. | |
EXAMPLES | |
Download and install all the RPMs needed to debug the kernel RPM: | |
debuginfo-install kernel | |
WARNING MESSAGES | |
Could not find debuginfo for: | |
You may sometimes see warning messages about certain packages not being found if you run debuginfo-install for a wildcard or glob. Debuginfo packages are not necessary for "noarch" RPMs; these will generate a warning message. Additionally, On 64-bit systems, no multilib debuginfo packages are published, so if you have 32-bit packages installed, these will also generate warning messages. | |
+ man delpart | |
+ head -n 20 | |
DELPART(8) System Administration DELPART(8) | |
NAME | |
delpart - tell the kernel to forget about a partition | |
SYNOPSIS | |
delpart device partition | |
DESCRIPTION | |
delpart asks the Linux kernel to forget about the specified partition (a number) on the specified device. The command is a simple wrapper around the "del partition" ioctl. | |
This command doesn't manipulate partitions on a block device. | |
SEE ALSO | |
addpart(8), fdisk(8), parted(8), partprobe(8), partx(8) | |
AVAILABILITY | |
+ man delv | |
+ head -n 20 | |
DELV(1) BIND9 DELV(1) | |
NAME | |
delv - DNS lookup and validation utility | |
SYNOPSIS | |
delv [@server] [[-4] | [-6]] [-a anchor-file] [-b address] [-c class] [-d level] [-i] [-m] [-p port#] [-q name] [-t type] [-x addr] [name] [type] [class] [queryopt...] | |
delv [-h] | |
delv [-v] | |
delv [queryopt...] [query...] | |
DESCRIPTION | |
delv is a tool for sending DNS queries and validating the results, using the same internal resolver and validator logic as named. | |
delv will send to a specified name server all queries needed to fetch and validate the requested data; this includes the original requested query, subsequent queries to follow CNAME or DNAME chains, and queries for DNSKEY, DS and DLV records to establish a chain of trust for DNSSEC validation. It does not perform iterative resolution, but simulates the behavior of a name server configured for DNSSEC | |
+ man depmod | |
+ head -n 20 | |
DEPMOD(8) depmod DEPMOD(8) | |
NAME | |
depmod - Generate modules.dep and map files. | |
SYNOPSIS | |
depmod [-b basedir] [-e] [-E Module.symvers] [-F System.map] [-n] [-v] [-A] [-P prefix] [-w] [version] | |
depmod [-e] [-E Module.symvers] [-F System.map] [-m] [-n] [-v] [-P prefix] [-w] [version] [filename...] | |
DESCRIPTION | |
Linux kernel modules can provide services (called "symbols") for other modules to use (using one of the EXPORT_SYMBOL variants in the code). If a second module uses this symbol, that second module clearly depends on the first module. These dependencies can get quite complex. | |
depmod creates a list of module dependencies by reading each module under /lib/modules/version and determining what symbols it exports and what symbols it needs. By default, this list is written to modules.dep, and a binary hashed version named modules.dep.bin, in the same directory. If filenames are given on the command line, only those modules are examined (which is rarely useful unless all modules | |
are listed). depmod also creates a list of symbols provided by modules in the file named modules.symbols and its binary hashed version, modules.symbols.bin. Finally, depmod will output a file named modules.devname if modules supply special device names (devname) that should be populated in /dev on boot (by a utility such as systemd-tmpfiles). | |
If a version is provided, then that kernel version's module directory is used rather than the current kernel version (as returned by uname -r). | |
+ man dequote | |
+ head -n 20 | |
No manual entry for dequote | |
+ man devlink | |
+ head -n 20 | |
DEVLINK(8) Linux DEVLINK(8) | |
NAME | |
devlink - Devlink tool | |
SYNOPSIS | |
devlink [ OPTIONS ] OBJECT { COMMAND | help } | |
devlink [ -force ] -batch filename | |
OBJECT := { dev | port | monitor } | |
OPTIONS := { -V[ersion] | -n[no-nice-names] } -j[json] } -p[pretty] } | |
+ man dhclient | |
+ head -n 20 | |
dhclient(8) System Manager's Manual dhclient(8) | |
NAME | |
dhclient - Dynamic Host Configuration Protocol Client | |
SYNOPSIS | |
dhclient [ -4 | -6 ] [ -S ] [ -N [ -N... ] ] [ -T [ -T... ] ] [ -P [ -P... ] ] [ -i ] [ -C ] [ -D LL|LLT ] [ -p port-number ] [ -d ] [ -e VAR=value ] [ -q ] [ -1 ] [ -r | -x ] [ -lf lease-file ] [ -pf pid-file ] [ --no-pid ] [ -cf config-file ] [ -sf script-file ] [ -s server-addr ] [ -g relay ] [ -n ] [ -nw ] [ -w ] [ -nc ] [ -B ] [ -I dhcp-client-identifier ] [ -H host-name ] [ -F fqdn.fqdn ] [ -V | |
vendor-class-identifier ] [ -R request-option-list ] [ -timeout timeout ] [ -v ] [ --version ] [ if0 [ ...ifN ] ] | |
DESCRIPTION | |
The Internet Systems Consortium DHCP Client, dhclient, provides a means for configuring one or more network interfaces using the Dynamic Host Configuration Protocol, BOOTP protocol, or if these protocols fail, by statically assigning an address. | |
OPERATION | |
The DHCP protocol allows a host to contact a central server which maintains a list of IP addresses which may be assigned on one or more subnets. A DHCP client may request an address from this pool, and then use it on a temporary basis for communication on network. The DHCP protocol also provides a mechanism whereby a client can learn important details about the network to which it is attached, such | |
as the location of a default router, the location of a name server, and so on. | |
There are two versions of the DHCP protocol DHCPv4 and DHCPv6. At startup the client may be started for one or the other via the -4 or -6 options. | |
+ man dhclient-script | |
+ head -n 20 | |
dhclient-script(8) System Manager's Manual dhclient-script(8) | |
NAME | |
dhclient-script - DHCP client network configuration script | |
DESCRIPTION | |
The DHCP client network configuration script is invoked from time to time by dhclient(8). This script is used by the dhcp client to set each interface's initial configuration prior to requesting an address, to test the address once it has been offered, and to set the interface's final configuration once a lease has been acquired. If no lease is acquired, the script is used to test predefined leases, | |
if any, and also called once if no valid lease can be identified. | |
This script is not meant to be customized by the end user. If local customizations are needed, they should be possible using the enter and exit hooks provided (see HOOKS for details). These hooks will allow the user to override the default behaviour of the client in creating a /etc/resolv.conf file, and to handle DHCP options not handled by default. | |
No standard client script exists for some operating systems, even though the actual client may work, so a pioneering user may well need to create a new script or modify an existing one. In general, customizations specific to a particular computer should be done in the /etc/dhcp/dhclient.conf file. If you find that you can't make such a customization without customizing /etc/dhcp/dhclient.conf or | |
using the enter and exit hooks, please submit a bug report. | |
HOOKS | |
When it starts, the client script first defines a shell function, make_resolv_conf , which is later used to create the /etc/resolv.conf file. To override the default behaviour, redefine this function in the enter hook script. | |
On after defining the make_resolv_conf function, the client script checks for the presence of an executable /etc/dhcp/dhclient-enter-hooks script, and if present, it invokes the script inline, using the Bourne shell ´.´ command. The entire environment documented under OPERATION is available to this script, which may modify the environment if needed to change the behaviour of the script. If an error | |
+ man dig | |
+ head -n 20 | |
DIG(1) BIND9 DIG(1) | |
NAME | |
dig - DNS lookup utility | |
SYNOPSIS | |
dig [@server] [-b address] [-c class] [-f filename] [-k filename] [-m] [-p port#] [-q name] [-t type] [-v] [-x addr] [-y [hmac:]name:key] [[-4] | [-6]] [name] [type] [class] [queryopt...] | |
dig [-h] | |
dig [global-queryopt...] [query...] | |
DESCRIPTION | |
dig is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried. Most DNS administrators use dig to troubleshoot DNS problems because of its flexibility, ease of use and clarity of output. Other lookup tools tend to have less functionality than dig. | |
Although dig is normally used with command-line arguments, it also has a batch mode of operation for reading lookup requests from a file. A brief summary of its command-line arguments and options is printed when the -h option is given. Unlike earlier versions, the BIND 9 implementation of dig allows multiple lookups to be issued from the command line. | |
Unless it is told to query a specific name server, dig will try each of the servers listed in /etc/resolv.conf. If no usable server addresses are found, dig will send the query to the local host. | |
+ man dm_dso_reg_tool | |
+ head -n 20 | |
DMEVENT_TOOL(8) DMEVENT_TOOL(8) | |
NAME | |
dmevent_tool - A utility used to load a DSO into dmeventd and (un)register devices with it for monitoring | |
SYNOPSIS | |
dmevent_tool -[Vhmru] {RAID device name} {DSO Name} | |
DESCRIPTION | |
dmevent_tool is a userspace utility used to register/unregister DSOs with the daemon dmeventd. | |
If used with the -m command line parameter users can display all of the actively dmeventd monitored devices. | |
OPTIONS | |
-V Show version of dmevent_tool | |
+ man dmesg | |
+ head -n 20 | |
DMESG(1) User Commands DMESG(1) | |
NAME | |
dmesg - print or control the kernel ring buffer | |
SYNOPSIS | |
dmesg [options] | |
dmesg --clear | |
dmesg --read-clear [options] | |
dmesg --console-level level | |
dmesg --console-on | |
dmesg --console-off | |
DESCRIPTION | |
dmesg is used to examine or control the kernel ring buffer. | |
The default action is to display all messages from the kernel ring buffer. | |
+ man dmevent_tool | |
+ head -n 20 | |
DMEVENT_TOOL(8) DMEVENT_TOOL(8) | |
NAME | |
dmevent_tool - A utility used to load a DSO into dmeventd and (un)register devices with it for monitoring | |
SYNOPSIS | |
dmevent_tool -[Vhmru] {RAID device name} {DSO Name} | |
DESCRIPTION | |
dmevent_tool is a userspace utility used to register/unregister DSOs with the daemon dmeventd. | |
If used with the -m command line parameter users can display all of the actively dmeventd monitored devices. | |
OPTIONS | |
-V Show version of dmevent_tool | |
+ man dmeventd | |
+ head -n 20 | |
DMEVENTD(8) System Manager's Manual DMEVENTD(8) | |
NAME | |
dmeventd — Device-mapper event daemon | |
SYNOPSIS | |
dmeventd [-d [-d [-d]]] [-f] [-h] [-l] [-R] [-V] [-?] | |
DESCRIPTION | |
dmeventd is the event monitoring daemon for device-mapper devices. Library plugins can register and carry out actions triggered when particular events occur. | |
OPTIONS | |
-d | |
Repeat from 1 to 3 times ( -d, -dd, -ddd ) to increase the detail of debug messages sent to syslog. Each extra d adds more debugging information. | |
-f | |
Don't fork, run in the foreground. | |
+ man dmfilemapd | |
+ head -n 20 | |
DMFILEMAPD(8) MAINTENANCE COMMANDS DMFILEMAPD(8) | |
NAME | |
dmfilemapd — device-mapper filemap monitoring daemon | |
SYNOPSIS | |
dmfilemapd [file_descriptor] [group_id] [abs_path] [mode] [foreground[verbose]] | |
DESCRIPTION | |
The dmfilemapd daemon monitors groups of dmstats regions that correspond to the extents of a file, adding and removing regions to reflect the changing state of the file on-disk. | |
The daemon is normally launched automatically by the dmstats create command, but can be run manually, either to create a new daemon where one did not previously exist, or to change the options previously used, by killing the existing daemon and starting a new one. | |
OPTIONS | |
file_descriptor | |
Specify the file descriptor number for the file to be monitored. The file descriptor must reference a regular file, open for reading, in a local file system that supports the FIEMAP ioctl, and that returns data describing the physical location of extents. | |
The process that executes dmfilemapd is responsible for opening the file descriptor that is handed to the daemon. | |
+ man dmidecode | |
+ head -n 20 | |
DMIDECODE(8) System Manager's Manual DMIDECODE(8) | |
NAME | |
dmidecode - DMI table decoder | |
SYNOPSIS | |
dmidecode [OPTIONS] | |
DESCRIPTION | |
dmidecode is a tool for dumping a computer's DMI (some say SMBIOS) table contents in a human-readable format. This table contains a description of the system's hardware components, as well as other useful pieces of information such as serial numbers and BIOS revision. Thanks to this table, you can retrieve this information without having to probe for the actual hardware. While this is a good point in | |
terms of report speed and safeness, this also makes the presented information possibly unreliable. | |
The DMI table doesn't only describe what the system is currently made of, it also can report the possible evolutions (such as the fastest supported CPU or the maximal amount of memory supported). | |
SMBIOS stands for System Management BIOS, while DMI stands for Desktop Management Interface. Both standards are tightly related and developed by the DMTF (Desktop Management Task Force). | |
As you run it, dmidecode will try to locate the DMI table. It will first try to read the DMI table from sysfs, and next try reading directly from memory if sysfs access failed. If dmidecode succeeds in locating a valid DMI table, it will then parse this table and display a list of records like this one: | |
+ man dmraid | |
+ head -n 20 | |
DMRAID(8) System Manager's Manual DMRAID(8) | |
NAME | |
dmraid - discover, configure and activate software (ATA)RAID | |
SYNOPSIS | |
dmraid | |
{-a|--activate} {y|n|yes|no} | |
[-d|--debug]... [-v|--verbose]... [-i|--ignorelocking] | |
[-f|--format FORMAT[,FORMAT...]] | |
[{-P|--partchar} CHAR] | |
[-p|--no_partitions] | |
[-Z|--rm_partitions] | |
[--separator SEPARATOR] | |
[-t|--test] | |
[-u|--update_defer] | |
[RAID-set...] | |
+ man dmraid.static | |
+ head -n 20 | |
DMRAID(8) System Manager's Manual DMRAID(8) | |
NAME | |
dmraid - discover, configure and activate software (ATA)RAID | |
SYNOPSIS | |
dmraid | |
{-a|--activate} {y|n|yes|no} | |
[-d|--debug]... [-v|--verbose]... [-i|--ignorelocking] | |
[-f|--format FORMAT[,FORMAT...]] | |
[{-P|--partchar} CHAR] | |
[-p|--no_partitions] | |
[-Z|--rm_partitions] | |
[--separator SEPARATOR] | |
[-t|--test] | |
[-u|--update_defer] | |
[RAID-set...] | |
+ man dmsetup | |
+ head -n 20 | |
DMSETUP(8) MAINTENANCE COMMANDS DMSETUP(8) | |
NAME | |
dmsetup — low level logical volume management | |
SYNOPSIS | |
dmsetup clear device_name | |
dmsetup create device_name [-u|--uuid uuid] [--addnodeoncreate|--addnodeonresume] [-n|--notable|--table table|table_file] [--readahead [+]sectors|auto|none] | |
dmsetup create --concise [concise_device_specification] | |
dmsetup deps [-o options] [device_name...] | |
dmsetup help [-c|-C|--columns] | |
dmsetup info [device_name...] | |
dmsetup info -c|-C|--columns [--count count] [--interval seconds] [--nameprefixes] [--noheadings] [-o fields] [-O|--sort sort_fields] [--separator separator] [device_name] | |
dmsetup load device_name [--table table|table_file] | |
dmsetup ls [--target target_type] [--exec command] [--tree] [-o options] | |
dmsetup mangle [device_name...] | |
dmsetup message device_name sector message | |
dmsetup mknodes [device_name...] | |
+ man dmstats | |
+ head -n 20 | |
DMSTATS(8) MAINTENANCE COMMANDS DMSTATS(8) | |
NAME | |
dmstats — device-mapper statistics management | |
SYNOPSIS | |
dmsetup stats command [OPTIONS] | |
dmstats command device_name | --major major --minor minor | -u|--uuid uuid [-v|--verbose] | |
dmstats clear device_name [--allprograms|--programid id] [--allregions|--regionid id] | |
dmstats create device_name...|file_path...|--alldevices [--areas nr_areas|--areasize area_size] [--bounds histogram_boundaries] [--filemap] [--follow follow_mode] [--foreground] [--nomonitor] [--nogroup] [--precise] [--start start_sector --length length|--segments] [--userdata user_data] [--programid id] | |
dmstats delete device_name|--alldevices [--allprograms|--programid id] [--allregions|--regionid id] | |
dmstats group [device_name|--alldevices] [--alias name] [--regions regions] | |
dmstats help [-c|-C|--columns] | |
dmstats list [device_name] [--histogram] [--allprograms|--programid id] [--units units] [--area] [--region] [--group] [--nosuffix] [--notimesuffix] [-v|--verbose] | |
dmstats print [device_name] [--clear] [--allprograms|--programid id] [--allregions|--regionid id] | |
dmstats report [device_name] [--interval seconds] [--count count] [--units units] [--histogram] [--allprograms|--programid id] [--allregions|--regionid id] [--area] [--region] [--group] [-O|--sort sort_fields] [-S|--select selection] [--units units] [--nosuffix] [--notimesuffix] | |
dmstats ungroup [device_name|--alldevices] [--groupid id] | |
+ man dnsdomainname | |
+ head -n 20 | |
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1) | |
NAME | |
hostname - show or set the system's host name | |
domainname - show or set the system's NIS/YP domain name | |
ypdomainname - show or set the system's NIS/YP domain name | |
nisdomainname - show or set the system's NIS/YP domain name | |
dnsdomainname - show the system's DNS domain name | |
SYNOPSIS | |
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis] | |
hostname [-b|--boot] [-F|--file filename] [hostname] | |
hostname [-h|--help] [-V|--version] | |
domainname [nisdomain] [-F file] | |
ypdomainname [nisdomain] [-F file] | |
nisdomainname [nisdomain] [-F file] | |
+ man domainname | |
+ head -n 20 | |
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1) | |
NAME | |
hostname - show or set the system's host name | |
domainname - show or set the system's NIS/YP domain name | |
ypdomainname - show or set the system's NIS/YP domain name | |
nisdomainname - show or set the system's NIS/YP domain name | |
dnsdomainname - show the system's DNS domain name | |
SYNOPSIS | |
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis] | |
hostname [-b|--boot] [-F|--file filename] [hostname] | |
hostname [-h|--help] [-V|--version] | |
domainname [nisdomain] [-F file] | |
ypdomainname [nisdomain] [-F file] | |
nisdomainname [nisdomain] [-F file] | |
+ man dosfsck | |
+ head -n 20 | |
FSCK.FAT(8) dosfstools FSCK.FAT(8) | |
NAME | |
fsck.fat - check and repair MS-DOS filesystems | |
SYNOPSIS | |
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE | |
DESCRIPTION | |
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them. | |
The following filesystem problems can be corrected (in this order): | |
* FAT contains invalid cluster numbers. Cluster is changed to EOF. | |
* File's cluster chain contains a loop. The loop is broken. | |
+ man dosfslabel | |
+ head -n 20 | |
No manual entry for dosfslabel | |
+ man dracut | |
+ head -n 20 | |
DRACUT(8) dracut DRACUT(8) | |
NAME | |
dracut - low-level tool for generating an initramfs image | |
SYNOPSIS | |
dracut [OPTION...] [<image> [<kernel version>]] | |
DESCRIPTION | |
Create an initramfs <image> for the kernel with the version <kernel version>. If <kernel version> is omitted, then the version of the actual running kernel is used. If <image> is omitted or empty, then the default location /boot/initramfs-<kernel version>.img is used. | |
dracut creates an initial image used by the kernel for preloading the block device modules (such as IDE, SCSI or RAID) which are needed to access the root filesystem, mounting the root filesystem and booting into the real system. | |
At boot time, the kernel unpacks that archive into RAM disk, mounts and uses it as initial root file system. All finding of the root device happens in this early userspace. | |
For a complete list of kernel command line options see dracut.cmdline(7). | |
If you are dropped to an emergency shell, while booting your initramfs, the file /run/initramfs/rdsosreport.txt is created, which can be safed to a (to be mounted by hand) partition (usually /boot) or a USB stick. Additional debugging info can be produced by adding rd.debug to the kernel command line. /run/initramfs/rdsosreport.txt contains all logs and the output of some tools. It should be attached | |
+ man dump-acct | |
+ head -n 20 | |
DUMP_ACCT(8) System Manager's Manual DUMP_ACCT(8) | |
NAME | |
dump-acct - print an acct/pacct file in human-readable format | |
SYNOPSIS | |
dump-acct [-r|--reverse] [-R|--raw] [-n|--num recs] [--byte-swap] [--format] [--ahz freq] [-h|--help] [files] | |
DESCRIPTION | |
The dump-acct command transforms the output file from the accton format to the human-readable format: one record per line. Each record consists of severald fields which are separated by character "|" (the meaning of concreate field depends on the version of kernel package - with which the accton file was created). | |
OPTIONS | |
The following options are supported: | |
-r, --reverse | |
+ man dump-utmp | |
+ head -n 20 | |
DUMP-UTMP(8) GNU Accounting Utilities DUMP-UTMP(8) | |
NAME | |
dump-utmp - print an utmp file in human-readable format. | |
SYNOPSIS | |
dump-utmp [-r|--reverse] [-R|--raw] [-n|--num recs] [-h|--help] [ files] | |
DESCRIPTION | |
dump-utmp filename prints a list of all logins. This list is usually written in /var/log/wtmp. | |
All fields are separated by vertical line. Fields are: user name, tty, type, id, pid, hostaddr, host, time. | |
OPTIONS | |
-h, --help | |
+ man dumpe2fs | |
+ head -n 20 | |
DUMPE2FS(8) System Manager's Manual DUMPE2FS(8) | |
NAME | |
dumpe2fs - dump ext2/ext3/ext4 filesystem information | |
SYNOPSIS | |
dumpe2fs [ -bfhixV ] [ -o superblock=superblock ] [ -o blocksize=blocksize ] device | |
DESCRIPTION | |
dumpe2fs prints the super block and blocks group information for the filesystem present on device. | |
Note: When used with a mounted filesystem, the printed information may be old or inconsistent. | |
OPTIONS | |
-b print the blocks which are reserved as bad in the filesystem. | |
-o superblock=superblock | |
use the block superblock when examining the filesystem. This option is not usually needed except by a filesystem wizard who is examining the remains of a very badly corrupted filesystem. | |
+ man dumpkeys | |
+ head -n 20 | |
DUMPKEYS(1) General Commands Manual DUMPKEYS(1) | |
NAME | |
dumpkeys - dump keyboard translation tables | |
SYNOPSIS | |
dumpkeys [ -1Vdfhiklnstv -h --help -i --short-info -l -s --long-info -n --numeric -f --full-table -1 --separate-lines -Sshape --shape=shape -t --funcs-only -k --keys-only -d --compose-only -ccharset --charset=charset -v --verbose -V --version ] | |
DESCRIPTION | |
dumpkeys writes, to the standard output, the current contents of the keyboard driver's translation tables, in the format specified by keymaps(5). | |
Using the various options, the format of the output can be controlled and also other information from the kernel and the programs dumpkeys(1) and loadkeys(1) can be obtained. | |
OPTIONS | |
-h --help | |
Prints the program's version number and a short usage message to the program's standard error output and exits. | |
-i --short-info | |
+ man dwp | |
+ head -n 20 | |
No manual entry for dwp | |
+ man e2freefrag | |
+ head -n 20 | |
E2FREEFRAG(8) System Manager's Manual E2FREEFRAG(8) | |
NAME | |
e2freefrag - report free space fragmentation information | |
SYNOPSIS | |
e2freefrag [ -c chunk_kb ] [ -h ] filesys | |
DESCRIPTION | |
e2freefrag is used to report free space fragmentation on ext2/3/4 file systems. filesys is the filesystem device name (e.g. /dev/hdc1, /dev/md0). The e2freefrag program will scan the block bitmap information to check how many free blocks are present as contiguous and aligned free space. The percentage of contiguous free blocks of size and of alignment chunk_kb is reported. It also displays the min‐ | |
imum/maximum/average free chunk size in the filesystem, along with a histogram of all free chunks. This information can be used to gauge the level of free space fragmentation in the filesystem. | |
OPTIONS | |
-c chunk_kb | |
If a chunk size is specified, then e2freefrag will print how many free chunks of size chunk_kb are available in units of kilobytes (Kb). The chunk size must be a power of two and be larger than filesystem block size. | |
-h Print the usage of the program. | |
+ man e2fsck | |
+ head -n 20 | |
E2FSCK(8) System Manager's Manual E2FSCK(8) | |
NAME | |
e2fsck - check a Linux ext2/ext3/ext4 file system | |
SYNOPSIS | |
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device | |
DESCRIPTION | |
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its | |
superblock indicates that further checking is required. | |
device is the device file where the filesystem is stored (e.g. /dev/hdc1). | |
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''. | |
Only experts who really know what they are doing should consider answering this question in any other way. | |
OPTIONS | |
+ man e2image | |
+ head -n 20 | |
E2IMAGE(8) System Manager's Manual E2IMAGE(8) | |
NAME | |
e2image - Save critical ext2/ext3/ext4 filesystem metadata to a file | |
SYNOPSIS | |
e2image [ -r|Q ] [ -fr ] device image-file | |
e2image -I device image-file | |
e2image -ra [ -cfnp ] [ -o src_offset ] [ -O dest_offset ] src_fs [ dest_fs ] | |
DESCRIPTION | |
The e2image program will save critical ext2, ext3, or ext4 filesystem metadata located on device to a file specified by image-file. The image file may be examined by dumpe2fs and debugfs, by using the -i option to those programs. This can assist an expert in recovering catastrophically corrupted filesystems. In the future, e2fsck will be enhanced to be able to use the image file to help recover a | |
badly damaged filesystem. | |
When saving an e2image for debugging purposes, using either the -r or -Q options, the filesystem must be unmounted or be mounted read/only, in order for the image file to be in a consistent state. This requirement can be overriden using the -f option, but the resulting image file is very likely not going to be useful. | |
If image-file is -, then the output of e2image will be sent to standard output, so that the output can be piped to another program, such as gzip(1). (Note that this is currently only supported when creating a raw image file using the -r option, since the process of creating a normal image file, or QCOW2 image currently requires random access to the file, which cannot be done using a pipe. This | |
restriction will hopefully be lifted in a future version of e2image.) | |
+ man e2label | |
+ head -n 20 | |
E2LABEL(8) System Manager's Manual E2LABEL(8) | |
NAME | |
e2label - Change the label on an ext2/ext3/ext4 filesystem | |
SYNOPSIS | |
e2label device [ new-label ] | |
DESCRIPTION | |
e2label will display or change the filesystem label on the ext2, ext3, or ext4 filesystem located on device. | |
If the optional argument new-label is not present, e2label will simply display the current filesystem label. | |
If the optional argument new-label is present, then e2label will set the filesystem label to be new-label. Ext2 filesystem labels can be at most 16 characters long; if new-label is longer than 16 characters, e2label will truncate it and print a warning message. | |
It is also possible to set the filesystem label using the -L option of tune2fs(8). | |
AUTHOR | |
+ man e2undo | |
+ head -n 20 | |
E2UNDO(8) System Manager's Manual E2UNDO(8) | |
NAME | |
e2undo - Replay an undo log for an ext2/ext3/ext4 filesystem | |
SYNOPSIS | |
e2undo [ -f ] undo_log device | |
DESCRIPTION | |
e2undo will replay the undo log undo_log for an ext2/ext3/ext4 filesystem found on device. This can be used to undo a failed operation by an e2fsprogs program. | |
OPTIONS | |
-f Normally, e2undo will check the filesystem UUID and last modified time to make sure the undo log matches with the filesystem on the device. If they do not match, e2undo will refuse to apply the undo log as a safety mechanism. The -f option disables this safety mechanism. | |
AUTHOR | |
e2undo was written by Aneesh Kumar K.V. ([email protected]) | |
AVAILABILITY | |
+ man e4defrag | |
+ head -n 20 | |
E4DEFRAG(8) System Manager's Manual E4DEFRAG(8) | |
NAME | |
e4defrag - online defragmenter for ext4 filesystem | |
SYNOPSIS | |
e4defrag [ -c ] [ -v ] target ... | |
DESCRIPTION | |
e4defrag reduces fragmentation of extent based file. The file targeted by e4defrag is created on ext4 filesystem made with "-O extent" option (see mke2fs(8)). The targeted file gets more contiguous blocks and improves the file access speed. | |
target is a regular file, a directory, or a device that is mounted as ext4 filesystem. If target is a directory, e4defrag reduces fragmentation of all files in it. If target is a device, e4defrag gets the mount point of it and reduces fragmentation of all files in this mount point. | |
OPTIONS | |
-c Get a current fragmentation count and an ideal fragmentation count, and calculate fragmentation score based on them. By seeing this score, we can determine whether we should execute e4defrag to target. When used with -v option, the current fragmentation count and the ideal fragmentation count are printed for each file. | |
Also this option outputs the average data size in one extent. If you see it, you'll find the file has ideal extents or not. Note that the maximum extent size is 131072KB in ext4 filesystem (if block size is 4KB). | |
+ man easy_install | |
+ head -n 20 | |
No manual entry for easy_install | |
+ man easy_install-2.7 | |
+ head -n 20 | |
No manual entry for easy_install-2.7 | |
+ man easy_install-3.7 | |
+ head -n 20 | |
No manual entry for easy_install-3.7 | |
+ man ebsnvme-id | |
+ head -n 20 | |
No manual entry for ebsnvme-id | |
+ man ec2-metadata | |
+ head -n 20 | |
No manual entry for ec2-metadata | |
+ man ec2ifdown | |
+ head -n 20 | |
ec2ifup(8) System Administration tools and Daemons ec2ifup(8) | |
NAME | |
ec2ifup - bring an elastic network interface up | |
ec2ifdown - take an elastic network interface down | |
SYNOPSIS | |
ec2ifup IFACE | |
ec2ifdown IFACE | |
DESCRIPTION | |
The ec2ifup and ec2ifdown commands may be used to configure (or, respectively, deconfigure) a network interface based on its definition in the instance metadata store. The resulting configuration will be stored in /etc/sysconfig/network-scripts. | |
These scripts take one argument: the name of the network interface (e.g. eth0). If the configuration for this interface is present and defines EC2SYNC=no, the scripts will exit without making changes. Otherwise, the configuration will be replaced or removed. | |
+ man ec2ifscan | |
+ head -n 20 | |
ec2ifscan(8) System Administration tools and Daemons ec2ifscan(8) | |
NAME | |
ec2ifscan - find and configure elastic network interfaces | |
SYNOPSIS | |
ec2ifscan | |
DESCRIPTION | |
Elastic network interfaces require the instance metadata service to be reachable for correct configuration in the general case, which requires at least one active network interface. This condition may not be met for interfaces attached at instance launch time. Consequently, those interfaces can remain unconfigured. | |
The ec2ifscan command may be used to find and configure elastic network interfaces in an unconfigured state. An interface is considered to be unconfigured if the link is down, and no configuration exists in /etc/sysconfig/network-scripts. | |
A hotplug add event is generated for each unconfigured interface that is found. This provides another opportunity for udev rules to automatically configure and activate the elastic network interface. | |
+ man ec2ifup | |
+ head -n 20 | |
ec2ifup(8) System Administration tools and Daemons ec2ifup(8) | |
NAME | |
ec2ifup - bring an elastic network interface up | |
ec2ifdown - take an elastic network interface down | |
SYNOPSIS | |
ec2ifup IFACE | |
ec2ifdown IFACE | |
DESCRIPTION | |
The ec2ifup and ec2ifdown commands may be used to configure (or, respectively, deconfigure) a network interface based on its definition in the instance metadata store. The resulting configuration will be stored in /etc/sysconfig/network-scripts. | |
These scripts take one argument: the name of the network interface (e.g. eth0). If the configuration for this interface is present and defines EC2SYNC=no, the scripts will exit without making changes. Otherwise, the configuration will be replaced or removed. | |
+ man ec2udev-vbd | |
+ head -n 20 | |
No manual entry for ec2udev-vbd | |
+ man ec2udev-vcpu | |
+ head -n 20 | |
No manual entry for ec2udev-vcpu | |
+ man ed | |
+ head -n 20 | |
ED(1) User Commands ED(1) | |
NAME | |
Ed - line-oriented text editor | |
SYNOPSIS | |
ed [options] [file] | |
DESCRIPTION | |
GNU Ed - The GNU line editor. | |
OPTIONS | |
-h, --help | |
display this help and exit | |
-V, --version | |
output version information and exit | |
+ man edquota | |
+ head -n 20 | |
EDQUOTA(8) System Manager's Manual EDQUOTA(8) | |
NAME | |
edquota - edit user quotas | |
SYNOPSIS | |
edquota [ -p protoname ] [ -u | -g ] [ -rm ] [ -F format-name ] [ -f filesystem ] username... | |
edquota [ -u | -g ] [ -F format-name ] [ -f filesystem ] -t | |
edquota [ -u | -g ] [ -F format-name ] [ -f filesystem ] -T username | groupname... | |
DESCRIPTION | |
edquota is a quota editor. One or more users or groups may be specified on the command line. If a number is given in the place of user/group name it is treated as an UID/GID. For each user or group a temporary file is created with an ASCII representation of the current disk quotas for that user or group and an editor is then invoked on the file. The quotas may then be modified, new quotas added, etc. | |
Setting a quota to zero indicates that no quota should be imposed. | |
Block usage and limits are reported and interpereted as multiples of kibibyte (1024 bytes) blocks by default. Symbols K, M, G, and T can be appended to numeric value to express kibibytes, mebibytes, gibibytes, and tebibytes. | |
+ man efibootmgr | |
+ head -n 20 | |
EFIBOOTMGR(8) EFIBOOTMGR(8) | |
NAME | |
efibootmgr - manipulate the EFI Boot Manager | |
SYNOPSIS | |
efibootmgr [ -a ] [ -A ] [ -b XXXX ] [ -r | -y ] [ -B ] [ -c ] [ -d DISK ] [ -D ] [ -e 1|3|-1 ] [ -E NUM ] [ -g ] [ -i NAME ] [ -l NAME ] [ -L LABEL ] [ -m t|f ] [ -M X ] [ -n XXXX ] [ -N ] [ -o XXXX,YYYY,ZZZZ ... ] [ -O ] [ -p PART ] [ -q ] [ -t seconds ] [ -T ] [ -u ] [ -v ] [ -V ] [ -w ] [ -@ file ] | |
DESCRIPTION | |
efibootmgr is a userspace application used to modify the Intel Extensible Firmware Interface (EFI) Boot Manager. This application can create and destroy boot entries, change the boot order, change the next running boot option, and more. | |
Details on the EFI Boot Manager are available from the EFI Specification, v1.02 or later, available from: | |
<URL:http://developer.intel.com> | |
Note: efibootmgr requires that the kernel support access to EFI non-volatile variables through /sys/firmware/efi/vars or /sys/firmware/efi/efivars/. | |
OPTIONS | |
+ man eject | |
+ head -n 20 | |
EJECT(1) User Commands EJECT(1) | |
NAME | |
eject - eject removable media | |
SYNOPSIS | |
eject [options] device|mountpoint | |
DESCRIPTION | |
eject allows removable media (typically a CD-ROM, floppy disk, tape, JAZ, ZIP or USB disk) to be ejected under software control. The command can also control some multi-disc CD-ROM changers, the auto-eject feature supported by some devices, and close the disc tray of some CD-ROM drives. | |
The device corresponding to device or mountpoint is ejected. If no name is specified, the default name /dev/cdrom is used. The device may be addressed by device name (e.g. 'sda'), device path (e.g. '/dev/sda'), UUID=uuid or LABEL=label tags. | |
There are four different methods of ejecting, depending on whether the device is a CD-ROM, SCSI device, removable floppy, or tape. By default eject tries all four methods in order until it succeeds. | |
If a device partition is specified, the whole-disk device is used. If the device or a device partition is currently mounted, it is unmounted before ejecting. | |
OPTIONS | |
+ man elfedit | |
+ head -n 20 | |
ELFEDIT(1) GNU Development Tools ELFEDIT(1) | |
NAME | |
elfedit - Update the ELF header of ELF files. | |
SYNOPSIS | |
elfedit [--input-mach=machine] | |
[--input-type=type] | |
[--input-osabi=osabi] | |
--output-mach=machine | |
--output-type=type | |
--output-osabi=osabi | |
[-v|--version] | |
[-h|--help] | |
elffile... | |
DESCRIPTION | |
elfedit updates the ELF header of ELF files which have the matching ELF machine and file types. The options control how and which fields in the ELF header should be updated. | |
+ man enable-ec2-spot-hibernation | |
+ head -n 20 | |
No manual entry for enable-ec2-spot-hibernation | |
+ man envsubst | |
+ head -n 20 | |
ENVSUBST(1) GNU ENVSUBST(1) | |
NAME | |
envsubst - substitutes environment variables in shell format strings | |
SYNOPSIS | |
envsubst [OPTION] [SHELL-FORMAT] | |
DESCRIPTION | |
Substitutes the values of environment variables. | |
Operation mode: | |
-v, --variables | |
output the variables occurring in SHELL-FORMAT | |
Informative output: | |
-h, --help | |
display this help and exit | |
+ man era_check | |
+ head -n 20 | |
era_check(8) System Manager's Manual era_check(8) | |
NAME | |
era_check - validate era metadata on device or file. | |
SYNOPSIS | |
era_check [options] {device|file} | |
DESCRIPTION | |
era_check checks era metadata created by the device-mapper era target on a device or file. | |
This tool cannot be run on live metadata. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man era_dump | |
+ head -n 20 | |
era_dump(8) System Manager's Manual era_dump(8) | |
NAME | |
era_dump - dump era metadata from device or file to standard output. | |
SYNOPSIS | |
era_dump [options] {device|file} | |
DESCRIPTION | |
era_dump dumps binary era metadata created by the device-mapper era target on a device or file to standard output for analysis or postprocessing in XML format. XML formated metadata can be fed into era_restore (see era_restore(8)) in order to put it back onto a metadata device (to process by the device-mapper target) or file. | |
This tool cannot be run on live metadata. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man era_invalidate | |
+ head -n 20 | |
era_invalidate(8) System Manager's Manual era_invalidate(8) | |
NAME | |
era_invalidate - Provide a list of blocks that have changed since a particular era. | |
SYNOPSIS | |
era_invalidate [options] {device|file} | |
DESCRIPTION | |
era_invalidate examines era metadata and lists blocks that may have changed since a given era. | |
This tool cannot be run on live metadata unless the --metadata-snap option is used. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man era_restore | |
+ head -n 20 | |
era_restore(8) System Manager's Manual era_restore(8) | |
NAME | |
era_restore - restore era metadata file to device or file. | |
SYNOPSIS | |
era_restore [options] -i {xml file} -o {device|file} | |
DESCRIPTION | |
era_restore restores era metadata created by the respective device-mapper target dumped into an XML formatted (see era_dump(8)) file, which optionally can be preprocessed before the restore to another device or file. If restored to a metadata device, the metadata can be processed by the device-mapper target. | |
This tool cannot be run on live metadata. | |
OPTIONS | |
-h, --help | |
Print help and exit. | |
-V, --version | |
+ man ether-wake | |
+ head -n 20 | |
ETHER-WAKE(8) System Manager's Manual ETHER-WAKE(8) | |
NAME | |
ether-wake - A tool to send a Wake-On-LAN "Magic Packet" | |
SYNOPSIS | |
ether-wake [options] Host-ID | |
DESCRIPTION | |
This manual page documents the usage of the ether-wake command. | |
ether-wake is a program that generates and transmits a Wake-On-LAN (WOL) "Magic Packet", used for restarting machines that have been soft-powered-down (ACPI D3-warm state). It generates the standard AMD Magic Packet format, optionally with a password included. The single required parameter is a station (MAC) address or a host ID that can be translated to a MAC address by an ethers(5) database speci‐ | |
fied in nsswitch.conf(5) | |
OPTIONS | |
ether-wake needs a single dash (´-´) in front of options. A summary of options is included below. | |
-b Send the wake-up packet to the broadcast address. | |
+ man ethtool | |
+ head -n 20 | |
ETHTOOL(8) System Manager's Manual ETHTOOL(8) | |
NAME | |
ethtool - query or control network driver and hardware settings | |
SYNOPSIS | |
ethtool devname | |
ethtool -h|--help | |
ethtool --version | |
ethtool -a|--show-pause devname | |
ethtool -A|--pause devname [autoneg on|off] [rx on|off] [tx on|off] | |
ethtool -c|--show-coalesce devname | |
+ man exportfs | |
+ head -n 20 | |
exportfs(8) System Manager's Manual exportfs(8) | |
NAME | |
exportfs - maintain table of exported NFS file systems | |
SYNOPSIS | |
/usr/sbin/exportfs [-avi] [-o options,..] [client:/path ..] | |
/usr/sbin/exportfs -r [-v] | |
/usr/sbin/exportfs [-av] -u [client:/path ..] | |
/usr/sbin/exportfs [-v] | |
/usr/sbin/exportfs -f | |
/usr/sbin/exportfs -s | |
DESCRIPTION | |
An NFS server maintains a table of local physical file systems that are accessible to NFS clients. Each file system in this table is referred to as an exported file system, or export, for short. | |
The exportfs command maintains the current table of exports for the NFS server. The master export table is kept in a file named /var/lib/nfs/etab. This file is read by rpc.mountd when a client sends an NFS MOUNT request. | |
+ man faillock | |
+ head -n 20 | |
FAILLOCK(8) Linux-PAM Manual FAILLOCK(8) | |
NAME | |
faillock - Tool for displaying and modifying the authentication failure record files | |
SYNOPSIS | |
faillock [--dir /path/to/tally-directory] [--user username] [--reset] | |
DESCRIPTION | |
The pam_faillock.so module maintains a list of failed authentication attempts per user during a specified interval and locks the account in case there were more than deny consecutive failed authentications. It stores the failure records into per-user files in the tally directory. | |
The faillock command is an application which can be used to examine and modify the contents of the the tally files. It can display the recent failed authentication attempts of the username or clear the tally files of all or individual usernames. | |
OPTIONS | |
--dir /path/to/tally-directory | |
The directory where the user files with the failure records are kept. The default is /var/run/faillock. | |
--user username | |
+ man fallocate | |
+ head -n 20 | |
FALLOCATE(1) User Commands FALLOCATE(1) | |
NAME | |
fallocate - preallocate or deallocate space to a file | |
SYNOPSIS | |
fallocate [-c|-p|-z] [-o offset] -l length [-n] filename | |
fallocate -d [-o offset] [-l length] filename | |
fallocate -x [-o offset] -l length filename | |
DESCRIPTION | |
fallocate is used to manipulate the allocated disk space for a file, either to deallocate or preallocate it. For filesystems which support the fallocate system call, preallocation is done quickly by allocating blocks and marking them as uninitialized, requiring no IO to the data blocks. This is much faster than creating a file by filling it with zeroes. | |
The exit code returned by fallocate is 0 on success and 1 on failure. | |
OPTIONS | |
+ man fatlabel | |
+ head -n 20 | |
FATLABEL(8) dosfstools FATLABEL(8) | |
NAME | |
fatlabel - set or get MS-DOS filesystem label | |
SYNOPSIS | |
fatlabel DEVICE [LABEL] | |
DESCRIPTION | |
fatlabel set or gets a MS-DOS filesystem label from a given device. | |
If the label is omitted, then the label name of the specified device is written on the standard output. A label can't be longer than 11 bytes. | |
OPTIONS | |
-h, --help | |
+ man fdformat | |
+ head -n 20 | |
FDFORMAT(8) System Administration FDFORMAT(8) | |
NAME | |
fdformat - low-level format a floppy disk | |
SYNOPSIS | |
fdformat [options] device | |
DESCRIPTION | |
fdformat does a low-level format on a floppy disk. device is usually one of the following (for floppy devices the major = 2, and the minor is shown for informational purposes only): | |
/dev/fd0d360 (minor = 4) | |
/dev/fd0h1200 (minor = 8) | |
/dev/fd0D360 (minor = 12) | |
/dev/fd0H360 (minor = 12) | |
/dev/fd0D720 (minor = 16) | |
/dev/fd0H720 (minor = 16) | |
/dev/fd0h360 (minor = 20) | |
+ man fdisk | |
+ head -n 20 | |
FDISK(8) System Administration FDISK(8) | |
NAME | |
fdisk - manipulate disk partition table | |
SYNOPSIS | |
fdisk [options] device | |
fdisk -l [device...] | |
DESCRIPTION | |
fdisk is a dialog-driven program for creation and manipulation of partition tables. It understands GPT, MBR, Sun, SGI and BSD partition tables. | |
Block devices can be divided into one or more logical disks called partitions. This division is recorded in the partition table, usually found in sector 0 of the disk. (In the BSD world one talks about `disk slices' and a `disklabel'.) | |
All partitioning is driven by device I/O limits (the topology) by default. fdisk is able to optimize the disk layout for a 4K-sector size and use an alignment offset on modern devices for MBR and GPT. It is always a good idea to follow fdisk's defaults as the default values (e.g. first and last partition sectors) and partition sizes specified by the +<size>{M,G,...} notation are always aligned | |
+ man fgconsole | |
+ head -n 20 | |
FGCONSOLE(1) Linux User's Manual FGCONSOLE(1) | |
NAME | |
fgconsole - print the number of the active VT. | |
SYNOPSIS | |
fgconsole [ -h --help | -V --version | -n --next-available ] | |
DESCRIPTION | |
If the active Virtual Terminal is /dev/ttyN, then prints N on standard output. | |
If the console is a serial console, then "serial" is printed instead. | |
-h --help | |
Prints short usage message and exits. | |
-V --version | |
+ man file | |
+ head -n 20 | |
FILE(1) BSD General Commands Manual FILE(1) | |
NAME | |
file — determine file type | |
SYNOPSIS | |
file [-bchiklLNnprsvz0] [--apple] [--mime-encoding] [--mime-type] [-e testname] [-F separator] [-f namefile] [-m magicfiles] file ... | |
file -C [-m magicfiles] | |
file [--help] | |
DESCRIPTION | |
This manual page documents version 5.11 of the file command. | |
file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file type to be printed. | |
The type printed will usually contain one of the words text (the file contains only printing characters and a few common control characters and is probably safe to read on an ASCII terminal), executable (the file contains the result of compiling a program in a form understandable to some UNIX kernel or another), or data meaning anything else (data is usually “binary” or non-printable). Exceptions are | |
well-known file formats (core files, tar archives) that are known to contain binary data. When modifying magic files or the program itself, make sure to preserve these keywords. Users depend on knowing that all the readable files in a directory have the word “text” printed. Don't do as Berkeley did and change “shell commands text” to “shell script”. | |
The filesystem tests are based on examining the return from a stat(2) system call. The program checks to see if the file is empty, or if it's some sort of special file. Any known file types appropriate to the system you are running on (sockets, symbolic links, or named pipes (FIFOs) on those systems that implement them) are intuited if they are defined in the system header file <sys/stat.h>. | |
+ man filefrag | |
+ head -n 20 | |
FILEFRAG(8) System Manager's Manual FILEFRAG(8) | |
NAME | |
filefrag - report on file fragmentation | |
SYNOPSIS | |
filefrag [ -bblocksize ] [ -BeksvxX ] [ files... ] | |
DESCRIPTION | |
filefrag reports on how badly fragmented a particular file might be. It makes allowances for indirect blocks for ext2 and ext3 filesystems, but can be used on files for any filesystem. | |
The filefrag program initially attempts to get the extent information using FIEMAP ioctl which is more efficient and faster. If FIEMAP is not supported then filefrag will fall back to using FIBMAP. | |
OPTIONS | |
-B Force the use of the older FIBMAP ioctl instead of the FIEMAP ioctl for testing purposes. | |
-bblocksize | |
Use blocksize in bytes for output instead of the filesystem blocksize. For compatibility with earlier versions of filefrag, if blocksize is unspecified it defaults to 1024 bytes. | |
+ man fincore | |
+ head -n 20 | |
FINCORE(1) User Commands FINCORE(1) | |
NAME | |
fincore - count pages of file contents in core | |
SYNOPSIS | |
fincore [options] file ... | |
DESCRIPTION | |
fincore counts pages of file contents being resident in memory(in core), and reports the numbers. If an error occurs during counting, then an error message is printed to the stderr and fincore continues processing the rest of files listed in a command line. | |
The default output is subject to change. So whenever possible, you should avoid using default outputs in your scripts. Always explicitly define expected columns by using --output columns-list in environments where a stable output is required. | |
OPTIONS | |
-n, --noheadings | |
Do not print a header line in status output. | |
-b, --bytes | |
+ man find-repos-of-install | |
+ head -n 20 | |
find-repos-of-install(1) find-repos-of-install(1) | |
NAME | |
find-repos-of-install - report which Yum repository a package was installed from | |
SYNOPSIS | |
find-repos-of-install [options] package1 [package2...] | |
DESCRIPTION | |
find-repos-of-install is a program which reports the Yum repository that a specified package was installed from. | |
OPTIONS | |
--version | |
Report program version and exit. | |
-h, --help | |
Display a help message, and then quit. | |
+ man find2perl | |
+ head -n 20 | |
FIND2PERL(1) Perl Programmers Reference Guide FIND2PERL(1) | |
NAME | |
find2perl - translate find command lines to Perl code | |
SYNOPSIS | |
find2perl [paths] [predicates] | perl | |
DESCRIPTION | |
find2perl is a little translator to convert find command lines to equivalent Perl code. The resulting code is typically faster than running find itself. | |
"paths" are a set of paths where find2perl will start its searches and "predicates" are taken from the following list. | |
"! PREDICATE" | |
Negate the sense of the following predicate. The "!" must be passed as a distinct argument, so it may need to be surrounded by whitespace and/or quoted from interpretation by the shell using a backslash (just as with using find(1)). | |
"( PREDICATES )" | |
Group the given PREDICATES. The parentheses must be passed as distinct arguments, so they may need to be surrounded by whitespace and/or quoted from interpretation by the shell using a backslash (just as with using find(1)). | |
+ man findfs | |
+ head -n 20 | |
FINDFS(8) System Administration FINDFS(8) | |
NAME | |
findfs - find a filesystem by label or UUID | |
SYNOPSIS | |
findfs NAME=value | |
DESCRIPTION | |
findfs will search the block devices in the system looking for a filesystem or partition with specified tag. The currently supported tags are: | |
LABEL=<label> | |
Specifies filesystem label. | |
UUID=<uuid> | |
Specifies filesystem UUID. | |
PARTUUID=<uuid> | |
+ man findmnt | |
+ head -n 20 | |
FINDMNT(8) System Administration FINDMNT(8) | |
NAME | |
findmnt - find a filesystem | |
SYNOPSIS | |
findmnt [options] | |
findmnt [options] device|mountpoint | |
findmnt [options] [--source] device [--target|--mountpoint] mountpoint | |
DESCRIPTION | |
findmnt will list all mounted filesystems or search for a filesystem. The findmnt command is able to search in /etc/fstab, /etc/mtab or /proc/self/mountinfo. If device or mountpoint is not given, all filesystems are shown. | |
The device may be specified by device name, major:minor numbers, filesystem label or UUID, or partition label or UUID. Note that findmnt follows mount(8) behavior where a device name may be interpreted as a mountpoint (and vice versa) if the --target, --mountpoint or --source options are not specified. | |
The command prints all mounted filesystems in the tree-like format by default. | |
+ man fipscheck | |
+ head -n 20 | |
FIPSCHECK(8) fipscheck FIPSCHECK(8) | |
NAME | |
fipscheck - perform a FIPS-140-2 validation check of one or more files | |
SYNTAX | |
fipscheck [-s <hmac-suffix>] file1 [file2 ...] | |
DESCRIPTION | |
fipscheck will perform a FIPS-140-2 validation of a file using a stored checksum of a file. The file containing the checksum value is first looked up in the /usr/lib{64,}/fipscheck directory and if not found there, it will be searched for in the same directory as the file which is being checksummed. | |
The checksum file must have '.' prepended and '.hmac' appended to the original file name. The '.' must not be prepended to the file names in the /usr/lib{64,}/fipscheck directory. | |
If invoked correctly the fipscheck command will not print anything to the standard output or error and set the return code based on the test result. A return code of 0 means the file passed the checksum test. A value of non-zero means the checksum failed. | |
The -s option allows to specify the suffix of the hmac file names. The default value .hmac is used when this option is not specified. | |
RETURN CODES | |
+ man fipshmac | |
+ head -n 20 | |
FIPSHMAC(8) fipshmac FIPSHMAC(8) | |
NAME | |
fipshmac - create FIPS-140-2 validation checksum files | |
SYNTAX | |
fipshmac [-d <directory>] file1 [file2 ...] | |
DESCRIPTION | |
fipshmac will create FIPS-140-2 checksum files for all the filenames specified. If the -d option is not specified, checksum files will be written in the same directory as the file being checksummed. It will prepend a '.' and append '.hmac' to the original file name. When a directory is specified with the -d option, the '.' will not be prepended and the files are stored into the directory. | |
If invoked correctly the fipshmac command will not print anything to the standard output or error. Otherwise it will print an error message to stderr. | |
The -s option allows to specify the suffix of the hmac file names. The default value .hmac is used when this option is not specified. | |
RETURN CODES | |
fipscheck can return the following return codes: | |
+ man fixfiles | |
+ head -n 20 | |
fixfiles(8) fixfiles(8) | |
NAME | |
fixfiles - fix file SELinux security contexts. | |
SYNOPSIS | |
fixfiles [-v] [-F] [-B] [ -N time ] [-l logfile ] { check | restore|[-f] relabel | verify } [[dir/file] ... ] | |
fixfiles [-v] [-F] [ -R rpmpackagename[,rpmpackagename...] ] [-l logfile ] { check | restore | verify } | |
fixfiles [-v] [-F] -C PREVIOUS_FILECONTEXT [-l logfile ] { check | restore | verify } | |
fixfiles [-F] [-B] onboot | |
DESCRIPTION | |
This manual page describes the fixfiles script. | |
+ man fixparts | |
+ head -n 20 | |
FIXPARTS(8) FixParts Manual FIXPARTS(8) | |
NAME | |
fixparts - MBR partition table repair utility | |
SYNOPSIS | |
fixparts device | |
DESCRIPTION | |
FixParts (aka fixparts) is a text-mode menu-driven program for repairing certain types of problems with Master Boot Record (MBR) partition tables. The program has three design goals, although a few additional features are supported, as well: | |
* It can remove stray GUID Partition Table (GPT) data, which can be left behind on a disk that was once used as a GPT disk but then incompletely converted to the more common (as of 2011) MBR form. | |
* It can repair mis-sized extended partitions -- either partitions that extend beyond the physical end of the disk or that overlap with nearby primary partitions. FixParts is designed in such a way that this type of repair occurs automatically, so if it's the only problem with your disk, you can launch the program and then immediately save the partition table, making no manual changes, and the | |
program will fix the problem. | |
+ man flock | |
+ head -n 20 | |
FLOCK(1) User Commands FLOCK(1) | |
NAME | |
flock - manage locks from shell scripts | |
SYNOPSIS | |
flock [options] file|directory command [arguments] | |
flock [options] file|directory -c command | |
flock [options] number | |
DESCRIPTION | |
This utility manages flock(2) locks from within shell scripts or from the command line. | |
The first and second of the above forms wrap the lock around the execution of a command, in a manner similar to su(1) or newgrp(1). They lock a specified file or directory, which is created (assuming appropriate permissions) if it does not already exist. By default, if the lock cannot be immediately acquired, flock waits until the lock is available. | |
The third form uses an open file by its file descriptor number. See the examples below for how that can be used. | |
OPTIONS | |
+ man free | |
+ head -n 20 | |
FREE(1) User Commands FREE(1) | |
NAME | |
free - Display amount of free and used memory in the system | |
SYNOPSIS | |
free [options] | |
DESCRIPTION | |
free displays the total amount of free and used physical and swap memory in the system, as well as the buffers and caches used by the kernel. The information is gathered by parsing /proc/meminfo. The displayed columns are: | |
total Total installed memory (MemTotal and SwapTotal in /proc/meminfo) | |
used Used memory (calculated as total - free - buffers - cache) | |
free Unused memory (MemFree and SwapFree in /proc/meminfo) | |
shared Memory used (mostly) by tmpfs (Shmem in /proc/meminfo, available on kernels 2.6.32, displayed as zero if not available) | |
+ man fsadm | |
+ head -n 20 | |
FSADM(8) FSADM(8) | |
NAME | |
fsadm — utility to resize or check filesystem on a device | |
SYNOPSIS | |
fsadm [options] check device | |
fsadm [options] resize device [new_size] | |
DESCRIPTION | |
fsadm utility checks or resizes the filesystem on a device. It tries to use the same API for ext2, ext3, ext4, ReiserFS and XFS filesystem. | |
OPTIONS | |
-e|--ext-offline | |
Unmount ext2/ext3/ext4 filesystem before doing resize. | |
-f|--force | |
Bypass some sanity checks. | |
+ man fsck | |
+ head -n 20 | |
FSCK(8) System Administration FSCK(8) | |
NAME | |
fsck - check and repair a Linux filesystem | |
SYNOPSIS | |
fsck [-lsAVRTMNP] [-r [fd]] [-C [fd]] [-t fstype] [filesystem...] [--] [fs-specific-options] | |
DESCRIPTION | |
fsck is used to check and optionally repair one or more Linux filesystems. filesys can be a device name (e.g. /dev/hdc1, /dev/sdb2), a mount point (e.g. /, /usr, /home), or an ext2 label or UUID specifier (e.g. UUID=8868abf6-88c5-4a83-98b8-bfc24057f7bd or LABEL=root). Normally, the fsck program will try to handle filesystems on different physical disk drives in parallel to reduce the total amount | |
of time needed to check all of them. | |
If no filesystems are specified on the command line, and the -A option is not specified, fsck will default to checking filesystems in /etc/fstab serially. This is equivalent to the -As options. | |
The exit code returned by fsck is the sum of the following conditions: | |
0 No errors | |
1 Filesystem errors corrected | |
+ man fsck.cramfs | |
+ head -n 20 | |
FSCK.CRAMFS(8) System Administration FSCK.CRAMFS(8) | |
NAME | |
fsck.cramfs - fsck compressed ROM file system | |
SYNOPSIS | |
fsck.cramfs [options] file | |
DESCRIPTION | |
fsck.cramfs is used to check the cramfs file system. | |
OPTIONS | |
-v, --verbose | |
Enable verbose messaging. | |
-b, --blocksize blocksize | |
Use this blocksize, defaults to page size. Must be equal to what was set at creation time. Only used for --extract. | |
+ man fsck.ext2 | |
+ head -n 20 | |
E2FSCK(8) System Manager's Manual E2FSCK(8) | |
NAME | |
e2fsck - check a Linux ext2/ext3/ext4 file system | |
SYNOPSIS | |
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device | |
DESCRIPTION | |
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its | |
superblock indicates that further checking is required. | |
device is the device file where the filesystem is stored (e.g. /dev/hdc1). | |
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''. | |
Only experts who really know what they are doing should consider answering this question in any other way. | |
OPTIONS | |
+ man fsck.ext3 | |
+ head -n 20 | |
E2FSCK(8) System Manager's Manual E2FSCK(8) | |
NAME | |
e2fsck - check a Linux ext2/ext3/ext4 file system | |
SYNOPSIS | |
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device | |
DESCRIPTION | |
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its | |
superblock indicates that further checking is required. | |
device is the device file where the filesystem is stored (e.g. /dev/hdc1). | |
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''. | |
Only experts who really know what they are doing should consider answering this question in any other way. | |
OPTIONS | |
+ man fsck.ext4 | |
+ head -n 20 | |
E2FSCK(8) System Manager's Manual E2FSCK(8) | |
NAME | |
e2fsck - check a Linux ext2/ext3/ext4 file system | |
SYNOPSIS | |
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device | |
DESCRIPTION | |
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its | |
superblock indicates that further checking is required. | |
device is the device file where the filesystem is stored (e.g. /dev/hdc1). | |
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''. | |
Only experts who really know what they are doing should consider answering this question in any other way. | |
OPTIONS | |
+ man fsck.fat | |
+ head -n 20 | |
man: warning: /usr/share/man/man8/fsck.fat.8.manpage-fix.gz: ignoring bogus filename | |
FSCK.FAT(8) dosfstools FSCK.FAT(8) | |
NAME | |
fsck.fat - check and repair MS-DOS filesystems | |
SYNOPSIS | |
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE | |
DESCRIPTION | |
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them. | |
The following filesystem problems can be corrected (in this order): | |
* FAT contains invalid cluster numbers. Cluster is changed to EOF. | |
* File's cluster chain contains a loop. The loop is broken. | |
+ man fsck.minix | |
+ head -n 20 | |
FSCK.MINIX(8) System Administration FSCK.MINIX(8) | |
NAME | |
fsck.minix - check consistency of Minix filesystem | |
SYNOPSIS | |
fsck.minix [options] device | |
DESCRIPTION | |
fsck.minix performs a consistency check for the Linux MINIX filesystem. | |
The program assumes the filesystem is quiescent. fsck.minix should not be used on a mounted device unless you can be sure nobody is writing to it. Remember that the kernel can write to device when it searches for files. | |
The device name will usually have the following form: | |
/dev/hda[1–63] IDE disk 1 | |
/dev/hdb[1–63] IDE disk 2 | |
/dev/sda[1–15] SCSI disk 1 | |
+ man fsck.msdos | |
+ head -n 20 | |
FSCK.FAT(8) dosfstools FSCK.FAT(8) | |
NAME | |
fsck.fat - check and repair MS-DOS filesystems | |
SYNOPSIS | |
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE | |
DESCRIPTION | |
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them. | |
The following filesystem problems can be corrected (in this order): | |
* FAT contains invalid cluster numbers. Cluster is changed to EOF. | |
* File's cluster chain contains a loop. The loop is broken. | |
+ man fsck.vfat | |
+ head -n 20 | |
FSCK.FAT(8) dosfstools FSCK.FAT(8) | |
NAME | |
fsck.fat - check and repair MS-DOS filesystems | |
SYNOPSIS | |
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE | |
DESCRIPTION | |
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them. | |
The following filesystem problems can be corrected (in this order): | |
* FAT contains invalid cluster numbers. Cluster is changed to EOF. | |
* File's cluster chain contains a loop. The loop is broken. | |
+ man fsck.xfs | |
+ head -n 20 | |
fsck.xfs(8) System Manager's Manual fsck.xfs(8) | |
NAME | |
fsck.xfs - do nothing, successfully | |
SYNOPSIS | |
fsck.xfs [ filesys ... ] | |
DESCRIPTION | |
fsck.xfs is called by the generic Linux fsck(8) program at startup to check and repair an XFS filesystem. XFS is a journaling filesystem and performs recovery at mount(8) time if necessary, so fsck.xfs simply exits with a zero exit status. | |
If you wish to check the consistency of an XFS filesystem, or repair a damaged or corrupt XFS filesystem, see xfs_repair(8). | |
FILES | |
/etc/fstab. | |
SEE ALSO | |
fsck(8), fstab(5), xfs(5), xfs_repair(8). | |
+ man fsfreeze | |
+ head -n 20 | |
FSFREEZE(8) System Administration FSFREEZE(8) | |
NAME | |
fsfreeze - suspend access to a filesystem (Ext3/4, ReiserFS, JFS, XFS) | |
SYNOPSIS | |
fsfreeze --freeze|--unfreeze mountpoint | |
DESCRIPTION | |
fsfreeze suspends or resumes access to a filesystem. | |
fsfreeze halts any new access to the filesystem and creates a stable image on disk. fsfreeze is intended to be used with hardware RAID devices that support the creation of snapshots. | |
fsfreeze is unnecessary for device-mapper devices. The device-mapper (and LVM) automatically freezes a filesystem on the device when a snapshot creation is requested. For more details see the dmsetup(8) man page. | |
The mountpoint argument is the pathname of the directory where the filesystem is mounted. The filesystem must be mounted to be frozen (see mount(8)). | |
+ man fstrim | |
+ head -n 20 | |
FSTRIM(8) System Administration FSTRIM(8) | |
NAME | |
fstrim - discard unused blocks on a mounted filesystem | |
SYNOPSIS | |
fstrim [-a] [-o offset] [-l length] [-m minimum-size] [-v] mountpoint | |
DESCRIPTION | |
fstrim is used on a mounted filesystem to discard (or "trim") blocks which are not in use by the filesystem. This is useful for solid-state drives (SSDs) and thinly-provisioned storage. | |
By default, fstrim will discard all unused blocks in the filesystem. Options may be used to modify this behavior based on range or size, as explained below. | |
The mountpoint argument is the pathname of the directory where the filesystem is mounted. | |
Running fstrim frequently, or even using mount -o discard, might negatively affect the lifetime of poor-quality SSD devices. For most desktop and server systems a sufficient trimming frequency is once a week. Note that not all devices support a queued trim, so each trim command incurs a performance penalty on whatever else might be trying to use the disk at the time. | |
+ man funzip | |
+ head -n 20 | |
FUNZIP(1L) FUNZIP(1L) | |
NAME | |
funzip - filter for extracting from a ZIP archive in a pipe | |
SYNOPSIS | |
funzip [-password] [input[.zip|.gz]] | |
ARGUMENTS | |
[-password] | |
Optional password to be used if ZIP archive is encrypted. Decryption may not be supported at some sites. See DESCRIPTION for more details. | |
[input[.zip|.gz]] | |
Optional input archive file specification. See DESCRIPTION for details. | |
DESCRIPTION | |
funzip without a file argument acts as a filter; that is, it assumes that a ZIP archive (or a gzip'd(1) file) is being piped into standard input, and it extracts the first member from the archive to stdout. When stdin comes from a tty device, funzip assumes that this cannot be a stream of (binary) compressed data and shows a short help text, instead. If there is a file argument, then input is read | |
from the specified file instead of from stdin. | |
+ man fuser | |
+ head -n 20 | |
<standard input>:283: name expected (got `\{'): treated as missing | |
FUSER(1) User Commands FUSER(1) | |
NAME | |
fuser - identify processes using files or sockets | |
SYNOPSIS | |
fuser [-fuv] [-a|-s] [-4|-6] [-c|-m|-n space] [ -k [-i] [-M] [-w] [-SIGNAL] ] name ... | |
fuser -l | |
fuser -V | |
DESCRIPTION | |
fuser displays the PIDs of processes using the specified files or file systems. In the default display mode, each file name is followed by a letter denoting the type of access: | |
c current directory. | |
e executable being run. | |
f open file. f is omitted in default display mode. | |
F open file for writing. F is omitted in default display mode. | |
r root directory. | |
+ man gdisk | |
+ head -n 20 | |
GDISK(8) GPT fdisk Manual GDISK(8) | |
NAME | |
gdisk - Interactive GUID partition table (GPT) manipulator | |
SYNOPSIS | |
gdisk [ -l ] device | |
DESCRIPTION | |
GPT fdisk (aka gdisk) is a text-mode menu-driven program for creation and manipulation of partition tables. It will automatically convert an old-style Master Boot Record (MBR) partition table or BSD disklabel stored without an MBR carrier partition to the newer Globally Unique Identifier (GUID) Partition Table (GPT) format, or will load a GUID partition table. When used with the -l command-line option, | |
the program displays the current partition table and then exits. | |
GPT fdisk operates mainly on the GPT headers and partition tables; however, it can and will generate a fresh protective MBR, when required. (Any boot loader code in the protective MBR will not be disturbed.) If you've created an unusual protective MBR, such as a hybrid MBR created by gptsync or gdisk's own hybrid MBR creation feature, this should not be disturbed by most ordinary actions. Some advanced | |
data recovery options require you to understand the distinctions between the main and backup data, as well as between the GPT headers and the partition tables. For information on MBR vs. GPT, as well as GPT terminology and structure, see the extended gdisk documentation at http://www.rodsbooks.com/gdisk/ or consult Wikipedia. | |
The gdisk program employs a user interface similar to that of Linux's fdisk, but gdisk modifies GPT partitions. It also has the capability of transforming MBR partitions or BSD disklabels into GPT partitions. Like the original fdisk program, gdisk does not modify disk structures until you explicitly write them to disk, so if you make a mistake, you can exit from the program with the 'q' option to leave | |
your partitions unmodified. | |
+ man genhomedircon | |
+ head -n 20 | |
GENHOMEDIRCON(8) SELinux GENHOMEDIRCON(8) | |
NAME | |
genhomedircon - generate SELinux file context configuration entries for user home directories | |
DESCRIPTION | |
genhomedircon is a script that executes semodule to rebuild the currently active SELinux policy (without reloading it) and to create the labels for each user home directory based on directory paths returned by calls to getpwent(). | |
The latter functionality depends on the "usepasswd" parameter being set to "true" (default) in /etc/selinux/semanage.conf. | |
This script is usually executed by semanage although this default behavior can be optionally modified by setting to "true" the "disable-genhomedircon" in /etc/selinux/semanage.conf. | |
AUTHOR | |
This manual page was written by Dan Walsh <[email protected]> | |
SEE ALSO | |
+ man genhostid | |
+ head -n 20 | |
GENHOSTID(1) General Commands Manual GENHOSTID(1) | |
NAME | |
genhostid - generate and set a hostid for the current host | |
SYNOPSIS | |
genhostid | |
DESCRIPTION | |
genhostid generates a random hostid and stores it in /etc/hostid, if /etc/hostid does not already exist. | |
SEE ALSO | |
hostid(1), gethostid(2), sethostid(2) | |
+ man genl | |
+ head -n 20 | |
GENL(8) Linux GENL(8) | |
NAME | |
genl - generic netlink utility frontend | |
SYNOPSIS | |
genl [ -s[tatistics] ] [ -d[etails] ] [ -r[aw] ] OBJECT | |
genl { -V[ersion] | -h[elp] } | |
OBJECT := { ctrl CTRL_OPTS } | |
CTRL_OPTS := { help | list | monitor | get PARMS } | |
PARMS := { name NAME | id ID } | |
DESCRIPTION | |
The genl utility provides a simple frontend to the generic netlink library. Although it's designed to support multiple OBJECTs, for now only the ctrl object is available, which is used to query the generic netlink controller. | |
+ man genl-ctrl-list | |
+ head -n 20 | |
genl-ctrl-list(8) System Manager's Manual genl-ctrl-list(8) | |
NAME | |
genl-ctrl-list - List available kernel-side Generic Netlink families | |
SYNOPSIS | |
genl-ctrl-list [-d] | |
DESCRIPTION | |
Queries the Generic Netlink controller in kernel and prints a list of all registered Generic Netlink families including the version of the interface that has been registered. | |
OPTIONS | |
-h or --help | |
Print help text to console and exit. | |
-v or --version | |
+ man geoiplookup | |
+ head -n 20 | |
GEOIPLOOKUP(1) General Commands Manual GEOIPLOOKUP(1) | |
NAME | |
geoiplookup - look up country using IP Address or hostname | |
SYNOPSIS | |
geoiplookup [-d directory] [-f filename] [-v] <ipaddress|hostname> | |
DESCRIPTION | |
geoiplookup uses the GeoIP library and database to find the Country that an IP address or hostname originates from. | |
For example | |
geoiplookup 80.60.233.195 | |
will find the Country that 80.60.233.195 originates from, in the following format: | |
NL, Netherlands | |
+ man geoiplookup6 | |
+ head -n 20 | |
GEOIPLOOKUP6(1) General Commands Manual GEOIPLOOKUP6(1) | |
NAME | |
geouplookup6 - look up country using IP Address or hostname | |
SYNOPSIS | |
geouplookup6 [-d directory] [-f filename] [-v] <ipaddress|hostname> | |
DESCRIPTION | |
geouplookup6 uses the GeoIP library and database to find the Country that an IP address or hostname originates from. You must install a database suitable for geoiplookup6. IE: GeoIPv6.dat | |
For example: | |
geouplookup6 2001:4860:0:1001::68 | |
geoiplookup6 ipv6.google.com | |
will find the Country that 2001:4860:0:1001::68 originates from, in the following format: | |
+ man geoipupdate | |
+ head -n 20 | |
GEOIPUPDATE(1) General Commands Manual GEOIPUPDATE(1) | |
NAME | |
geoipupdate - a program for updating the MaxMind GeoIP databases | |
SYNOPSIS | |
geoipupdate [-v] [-f licensefile] | |
DESCRIPTION | |
geoipupdate automatically updates the GeoIP database for GeoIP subscribers. It connects to the MaxMind GeoIP Update server and checks for an updated database. If it finds an updated database, then it downloads it, uncompresses it, and installs it. If you are running a firewall, it requires that the DNS and HTTP (80) ports be open. | |
For example | |
geoipupdate -v | |
Performs the update in verbose mode. | |
OPTIONS | |
+ man getenforce | |
+ head -n 20 | |
getenforce(8) SELinux Command Line documentation getenforce(8) | |
NAME | |
getenforce - get the current mode of SELinux | |
SYNOPSIS | |
getenforce | |
DESCRIPTION | |
getenforce reports whether SELinux is enforcing, permissive, or disabled. | |
AUTHOR | |
Dan Walsh, <[email protected]> | |
SEE ALSO | |
selinux(8), setenforce(8), selinuxenabled(8) | |
+ man getfacl | |
+ head -n 20 | |
GETFACL(1) Access Control Lists GETFACL(1) | |
NAME | |
getfacl - get file access control lists | |
SYNOPSIS | |
getfacl [-aceEsRLPtpndvh] file ... | |
getfacl [-aceEsRLPtpndvh] - | |
DESCRIPTION | |
For each file, getfacl displays the file name, owner, the group, and the Access Control List (ACL). If a directory has a default ACL, getfacl also displays the default ACL. Non-directories cannot have default ACLs. | |
If getfacl is used on a file system that does not support ACLs, getfacl displays the access permissions defined by the traditional file mode permission bits. | |
The output format of getfacl is as follows: | |
1: # file: somedir/ | |
+ man getfattr | |
+ head -n 20 | |
GETFATTR(1) File Utilities GETFATTR(1) | |
NAME | |
getfattr - get extended attributes of filesystem objects | |
SYNOPSIS | |
getfattr [-hRLP] -n name [-e en] pathname... | |
getfattr [-hRLP] -d [-e en] [-m pattern] pathname... | |
DESCRIPTION | |
For each file, getfattr displays the file name, and the set of extended attribute names (and optionally values) which are associated with that file. | |
The output format of getfattr -d is as follows: | |
1: # file: somedir/ | |
2: user.name0="value0" | |
3: user.name1="value1" | |
4: user.name2="value2" | |
5: ... | |
+ man getkeycodes | |
+ head -n 20 | |
GETKEYCODES(8) Keyboard Support GETKEYCODES(8) | |
NAME | |
getkeycodes - print kernel scancode-to-keycode mapping table | |
SYNOPSIS | |
getkeycodes | |
DESCRIPTION | |
The getkeycodes command prints the kernel scancode-to-keycode mapping table. | |
OPTIONS | |
None. | |
SEE ALSO | |
setkeycodes (8) | |
+ man getopt | |
+ head -n 20 | |
GETOPT(1) User Commands GETOPT(1) | |
NAME | |
getopt - parse command options (enhanced) | |
SYNOPSIS | |
getopt optstring parameters | |
getopt [options] [--] optstring parameters | |
getopt [options] -o|--options optstring [options] [--] parameters | |
DESCRIPTION | |
getopt is used to break up (parse) options in command lines for easy parsing by shell procedures, and to check for legal options. It uses the GNU getopt(3) routines to do this. | |
The parameters getopt is called with can be divided into two parts: options which modify the way getopt will do the parsing (the options and the optstring in the SYNOPSIS), and the parameters which are to be parsed (parameters in the SYNOPSIS). The second part will start at the first non-option parameter that is not an option argument, or after the first occurrence of '--'. If no '-o' or '--options' | |
option is found in the first part, the first parameter of the second part is used as the short options string. | |
If the environment variable GETOPT_COMPATIBLE is set, or if the first parameter is not an option (does not start with a '-', the first format in the SYNOPSIS), getopt will generate output that is compatible with that of other versions of getopt(1). It will still do parameter shuffling and recognize optional arguments (see section COMPATIBILITY for more information). | |
+ man getsebool | |
+ head -n 20 | |
getsebool(8) SELinux Command Line documentation getsebool(8) | |
NAME | |
getsebool - get SELinux boolean value(s) | |
SYNOPSIS | |
getsebool [-a] [boolean] | |
DESCRIPTION | |
getsebool reports where a particular SELinux boolean or all SELinux booleans are on or off In certain situations a boolean can be in one state with a pending change to the other state. getsebool will report this as a pending change. The pending value indicates the value that will be applied upon the next boolean commit. | |
The setting of boolean values occurs in two stages; first the pending value is changed, then the booleans are committed, causing their active values to become their pending values. This allows a group of booleans to be changed in a single transaction, by setting all of their pending values as desired and then committing once. | |
OPTIONS | |
-a Show all SELinux booleans. | |
AUTHOR | |
This manual page was written by Dan Walsh <[email protected]>. The program was written by Tresys Technology. | |
+ man gettext | |
+ head -n 20 | |
GETTEXT(1) GNU GETTEXT(1) | |
NAME | |
gettext - translate message | |
SYNOPSIS | |
gettext [OPTION] [[TEXTDOMAIN] MSGID] | |
gettext [OPTION] -s [MSGID]... | |
DESCRIPTION | |
The gettext program translates a natural language message into the user's language, by looking up the translation in a message catalog. | |
Display native language translation of a textual message. | |
-d, --domain=TEXTDOMAIN | |
retrieve translated messages from TEXTDOMAIN | |
-e enable expansion of some escape sequences | |
+ man gettext.sh | |
+ head -n 20 | |
No manual entry for gettext.sh | |
+ man gmake | |
+ head -n 20 | |
MAKE(1) LOCAL USER COMMANDS MAKE(1) | |
NAME | |
make - GNU make utility to maintain groups of programs | |
SYNOPSIS | |
make [ -f makefile ] [ options ] ... [ targets ] ... | |
WARNING | |
This man page is an extract of the documentation of GNU make. It is updated only occasionally, because the GNU project does not use nroff. For complete, current documentation, refer to the Info file make.info which is made from the Texinfo source file make.texi. | |
DESCRIPTION | |
The purpose of the make utility is to determine automatically which pieces of a large program need to be recompiled, and issue the commands to recompile them. The manual describes the GNU implementation of make, which was written by Richard Stallman and Roland McGrath, and is currently maintained by Paul Smith. Our examples show C programs, since they are most common, but you can use make with any | |
programming language whose compiler can be run with a shell command. In fact, make is not limited to programs. You can use it to describe any task where some files must be updated automatically from others whenever the others change. | |
To prepare to use make, you must write a file called the makefile that describes the relationships among files in your program, and the states the commands for updating each file. In a program, typically the executable file is updated from object files, which are in turn made by compiling source files. | |
Once a suitable makefile exists, each time you change some source files, this simple shell command: | |
+ man gpasswd | |
+ head -n 20 | |
GPASSWD(1) User Commands GPASSWD(1) | |
NAME | |
gpasswd - administer /etc/group and /etc/gshadow | |
SYNOPSIS | |
gpasswd [option] group | |
DESCRIPTION | |
The gpasswd command is used to administer /etc/group, and /etc/gshadow. Every group can have administrators, members and a password. | |
System administrators can use the -A option to define group administrator(s) and the -M option to define members. They have all rights of group administrators and members. | |
gpasswd called by a group administrator with a group name only prompts for the new password of the group. | |
If a password is set the members can still use newgrp(1) without a password, and non-members must supply the password. | |
Notes about group passwords | |
+ man gprof | |
+ head -n 20 | |
GPROF(1) GNU GPROF(1) | |
NAME | |
gprof - display call graph profile data | |
SYNOPSIS | |
gprof [ -[abcDhilLrsTvwxyz] ] [ -[ACeEfFJnNOpPqQZ][name] ] | |
[ -I dirs ] [ -d[num] ] [ -k from/to ] | |
[ -m min-count ] [ -R map_file ] [ -t table-length ] | |
[ --[no-]annotated-source[=name] ] | |
[ --[no-]exec-counts[=name] ] | |
[ --[no-]flat-profile[=name] ] [ --[no-]graph[=name] ] | |
[ --[no-]time=name] [ --all-lines ] [ --brief ] | |
[ --debug[=level] ] [ --function-ordering ] | |
[ --file-ordering map_file ] [ --directory-path=dirs ] | |
[ --display-unused-functions ] [ --file-format=name ] | |
[ --file-info ] [ --help ] [ --line ] [ --inline-file-names ] | |
[ --min-count=n ] [ --no-static ] [ --print-path ] | |
+ man growpart | |
+ head -n 20 | |
growpart(1) cloud-utils growpart(1) | |
NAME | |
growpart - extend a partition in a partition table to fill available space | |
SYNOPSIS | |
growpart [OPTIONS] DISK PARTITION-NUMBER | |
growpart partition | |
rewrite partition table so that partition takes up all the space it can | |
options: | |
-h | --help print Usage an exit | |
--fudge F if part could be resized, but change would be | |
less than 'F', do not resize (default: 20480) | |
-N | --dry-run only report what would be done, show new 'sfdisk -d' | |
-v | --verbose increase verbosity / debug | |
+ man grpck | |
+ head -n 20 | |
GRPCK(8) System Management Commands GRPCK(8) | |
NAME | |
grpck - verify integrity of group files | |
SYNOPSIS | |
grpck [options] [group [ shadow ]] | |
DESCRIPTION | |
The grpck command verifies the integrity of the groups information. It checks that all entries in /etc/groupand /etc/gshadow have the proper format and contain valid data. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors. | |
Checks are made to verify that each entry has: | |
· the correct number of fields | |
· a unique and valid group name | |
· a valid group identifier (/etc/group only) | |
+ man grpconv | |
+ head -n 20 | |
PWCONV(8) System Management Commands PWCONV(8) | |
NAME | |
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups | |
SYNOPSIS | |
pwconv [options] | |
pwunconv [options] | |
grpconv [options] | |
grpunconv [options] | |
DESCRIPTION | |
The pwconv command creates shadow from passwd and an optionally existing shadow. | |
The pwunconv command creates passwd from passwd and shadow and then removes shadow. | |
+ man grpunconv | |
+ head -n 20 | |
PWCONV(8) System Management Commands PWCONV(8) | |
NAME | |
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups | |
SYNOPSIS | |
pwconv [options] | |
pwunconv [options] | |
grpconv [options] | |
grpunconv [options] | |
DESCRIPTION | |
The pwconv command creates shadow from passwd and an optionally existing shadow. | |
The pwunconv command creates passwd from passwd and shadow and then removes shadow. | |
+ man grub2-editenv | |
+ head -n 20 | |
GRUB-EDITENV(1) General Commands Manual GRUB-EDITENV(1) | |
NAME | |
grub-editenv — Manage the GRUB environment block. | |
SYNOPSIS | |
grub-editenv [-v | --verbose] [FILE] | |
<create | list | set NAME=VALUE | unset NAME> | |
DESCRIPTION | |
grub-editenv is a command line tool to manage GRUB's stored environment. | |
OPTIONS | |
--verbose | |
Print verbose messages. | |
+ man grub2-file | |
+ head -n 20 | |
GRUB-FILE(1) General Commands Manual GRUB-FILE(1) | |
NAME | |
grub-file — Check if FILE is of specified type. | |
SYNOPSIS | |
grub-file (--is-i386-xen-pae-domu | --is-x86_64-xen-domu | | |
--is-x86-xen-dom0 | --is-x86-multiboot | | |
--is-x86-multiboot2 | --is-arm-linux | --is-arm64-linux | | |
--is-ia64-linux | --is-mips-linux | --is-mipsel-linux | | |
--is-sparc64-linux | --is-powerpc-linux | --is-x86-linux | | |
--is-x86-linux32 | --is-x86-kfreebsd | --is-i386-kfreebsd | | |
--is-x86_64-kfreebsd | --is-x86-knetbsd | | |
--is-i386-knetbsd | --is-x86_64-knetbsd | --is-i386-efi | | |
--is-x86_64-efi | --is-ia64-efi | --is-arm64-efi | | |
--is-arm-efi | --is-hibernated-hiberfil | --is-x86_64-xnu | | |
--is-i386-xnu | --is-xnu-hibr | --is-x86-bios-bootsector) | |
+ man grub2-fstest | |
+ head -n 20 | |
GRUB-FSTEST(3) Library Functions Manual GRUB-FSTEST(3) | |
NAME | |
grub-fstest — Debug tool for GRUB's filesystem driver. | |
SYNOPSIS | |
grub-fstest [-c | --diskcount=NUM] [-C | --crypto] | |
[-d | --debug=STRING] [-K | --zfs-key=FILE|prompt] | |
[-n | --length=NUM] [-r | --root=DEVICE_NAME] | |
[-s | --skip=NUM] [-u | --uncompress] [-v | --verbose] | |
IMAGE_PATH <blocklist FILE | cat FILE | | |
cmp FILE LOCAL | cp FILE LOCAL | crc FILE | | |
hex FILE | ls PATH | xnu_uuid DEVICE> | |
DESCRIPTION | |
grub-fstest is a tool for testing GRUB's filesystem drivers. You should not normally need to run this program. | |
+ man grub2-get-kernel-settings | |
+ head -n 20 | |
GRUB-GET-KERNEL-SETTINGS(3) Library Functions Manual GRUB-GET-KERNEL-SETTINGS(3) | |
NAME | |
grub-get-kernel-settings — Evaluate the system's kernel installation settings for use while making a grub configuration file. | |
SYNOPSIS | |
grub-get-kernel-settings [OPTION] | |
DESCRIPTION | |
grub-get-kernel-settings reads the kernel installation settings on the host system, and emits a set of grub settings suitable for use when creating a grub configuration file. | |
OPTIONS | |
-h, --help | |
Display program usage and exit. | |
+ man grub2-glue-efi | |
+ head -n 20 | |
GRUB-GLUE-EFI(3) Library Functions Manual GRUB-GLUE-EFI(3) | |
NAME | |
grub-glue-efi — Create an Apple fat EFI binary. | |
SYNOPSIS | |
grub-glue-efi <-3 | --input32=FILE> <-6 | --input64=FILE> | |
<-o | --output=FILE> [-v | --verbose] | |
DESCRIPTION | |
grub-glue-efi creates an Apple fat EFI binary from two EFI binaries. | |
OPTIONS | |
--input32=FILE | |
Read 32-bit binary from FILE. | |
+ man grub2-install | |
+ head -n 20 | |
GRUB-INSTALL(1) General Commands Manual GRUB-INSTALL(1) | |
NAME | |
grub-install — Install GRUB on a device. | |
SYNOPSIS | |
grub-install [--modules=MODULES] [--install-modules=MODULES] | |
[--themes=THEMES] [--fonts=FONTS] [--locales=LOCALES] | |
[--compress[=no,xz,gz,lzo]] [-d | --directory=DIR] | |
[--grub-mkimage=FILE] [--boot-directory=DIR] | |
[--target=TARGET] [--grub-setup=FILE] | |
[--grub-mkrelpath=FILE] [--grub-probe=FILE] | |
[--allow-floppy] [--recheck] [--force] [--force-file-id] | |
[--disk-module=MODULE] [--no-nvram] [--removable] | |
[--bootloader-id=ID] [--efi-directory=DIR] INSTALL_DEVICE | |
+ man grub2-kbdcomp | |
+ head -n 20 | |
GRUB-KBDCOMP(3) Library Functions Manual GRUB-KBDCOMP(3) | |
NAME | |
grub-kbdcomp — Generate a GRUB keyboard layout file. | |
SYNOPSIS | |
grub-kbdcomp <-o | --output=FILE> CKBMAP_ARGUMENTS | |
DESCRIPTION | |
grub-kbdcomp processes an X keyboard layout description in keymaps(5) format into a format that can be used by GRUB's keymap command. | |
OPTIONS | |
--output=FILE | |
Write output to FILE. | |
+ man grub2-menulst2cfg | |
+ head -n 20 | |
GRUB-MENULST2CFG(1) General Commands Manual GRUB-MENULST2CFG(1) | |
NAME | |
grub-menulst2cfg — Convert a configuration file from GRUB 0.xx to GRUB 2.xx format. | |
SYNOPSIS | |
grub-menulst2cfg [INFILE [OUTFILE]] | |
DESCRIPTION | |
grub-menulst2cfg converts a configuration file from GRUB 0.xx to the current format. | |
SEE ALSO | |
info grub | |
+ man grub2-mkconfig | |
+ head -n 20 | |
GRUB-MKCONFIG(1) General Commands Manual GRUB-MKCONFIG(1) | |
NAME | |
grub-mkconfig — Generate a GRUB configuration file. | |
SYNOPSIS | |
grub-mkconfig [-o | --output=FILE] | |
DESCRIPTION | |
grub-mkconfig generates a configuration file for GRUB. | |
OPTIONS | |
--output=FILE | |
Write generated output to FILE. | |
+ man grub2-mkfont | |
+ head -n 20 | |
GRUB-MKFONT(3) Library Functions Manual GRUB-MKFONT(3) | |
NAME | |
grub-mkfont — Convert common font file formats into the PF2 format. | |
SYNOPSIS | |
grub-mkfont [--ascii-bitmaps] [-a | --force-autohint] | |
[-b | --bold] [-c | --asce=NUM] [-d | --desc=NUM] | |
[-i | --index=NUM] [-n | --name=NAME] [--no-bitmap] | |
[--no-hinting] <-o | --output=FILE> | |
[-r | --range=FROM-TO[,FROM-TO]] [-s | --size=SIZE] | |
[-v | --verbose] [--width-spec] FONT_FILES | |
DESCRIPTION | |
grub-mkfont converts font files from common formats into the PF2 format used by GRUB. | |
+ man grub2-mkimage | |
+ head -n 20 | |
GRUB-MKIMAGE(1) General Commands Manual GRUB-MKIMAGE(1) | |
NAME | |
grub-mkimage — Make a bootable GRUB image. | |
SYNOPSIS | |
grub-mkimage [-c | --config=FILE] [-C | --compression=(xz,none,auto)] | |
[-d | --directory=DIR] [-k | --pubkey=FILE] | |
[-m | --memdisk=FILE] [-n | --note] [-o | --output=FILE] | |
[-O | --format=FORMAT] [-p | --prefix=DIR] | |
[-v | --verbose] MODULES | |
DESCRIPTION | |
grub-mkimage builds a bootable image of GRUB. | |
+ man grub2-mklayout | |
+ head -n 20 | |
GRUB-MKLAYOUT(3) Library Functions Manual GRUB-MKLAYOUT(3) | |
NAME | |
grub-mklayout — Generate a GRUB keyboard layout file. | |
SYNOPSIS | |
grub-mklayout [-i | --input=FILE] [-o | --output=FILE] | |
[-v | --verbose] | |
DESCRIPTION | |
grub-mklayout generates a GRUB keyboard layout description which corresponds with the Linux console layout description given as input. | |
OPTIONS | |
--input=FILE | |
Use FILE as the input. The default value is the standard input device. | |
+ man grub2-mknetdir | |
+ head -n 20 | |
GRUB-MKNETDIR(3) Library Functions Manual GRUB-MKNETDIR(3) | |
NAME | |
grub-mknetdir — Prepare a GRUB netboot directory. | |
SYNOPSIS | |
grub-mknetdir | |
DESCRIPTION | |
grub-mknetdir prepares a directory for GRUB to be netbooted from. | |
SEE ALSO | |
info grub | |
+ man grub2-mkpasswd-pbkdf2 | |
+ head -n 20 | |
GRUB-MKPASSWD-PBKDF2(3) Library Functions Manual GRUB-MKPASSWD-PBKDF2(3) | |
NAME | |
grub-mkpasswd-pbkdf2 — Generate a PBKDF2 password hash. | |
SYNOPSIS | |
grub-mkpasswd-pbkdf2 [-c | --iteration-count=NUM] [-l | --buflen=NUM] | |
[-s | --salt=NUM] | |
DESCRIPTION | |
grub-mkpasswd-pbkdf2 generates a PBKDF2 password string suitable for use in a GRUB configuration file. | |
OPTIONS | |
--iteration-count=NUM | |
Number of PBKDF2 iterations. | |
+ man grub2-mkrelpath | |
+ head -n 20 | |
GRUB-MKRELPATH(3) Library Functions Manual GRUB-MKRELPATH(3) | |
NAME | |
grub-mkrelpath — Generate a relative GRUB path given an OS path. | |
SYNOPSIS | |
grub-mkrelpath FILE | |
DESCRIPTION | |
grub-mkrelpath takes an OS filesystem path for FILE and returns a relative path suitable for use in a GRUB configuration file. | |
SEE ALSO | |
info grub | |
+ man grub2-mkrescue | |
+ head -n 20 | |
GRUB-MKRESCUE(3) Library Functions Manual GRUB-MKRESCUE(3) | |
NAME | |
grub-mkrescue — Generate a GRUB rescue image using GNU Xorriso. | |
SYNOPSIS | |
grub-mkrescue [-o | --output=FILE] [--modules=MODULES] | |
[--install-modules=MODULES] [--themes=THEMES] | |
[--fonts=FONTS] [--locales=LOCALES] | |
[--compress[=no,xz,gz,lzo]] [-d | --directory=DIR] | |
[--grub-mkimage=FILE] [--rom-directory=DIR] | |
[--xorriso=FILE] [--grub-glue-efi=FILE] | |
[--grub-render-label=FILE] [--label-font=FILE] | |
[--label-color=COLOR] [--label-bgcolor=FILE] | |
[--product-name=STRING] [--product-version=STRING] | |
[--sparc-boot] [--arcs-boot] | |
+ man grub2-mkstandalone | |
+ head -n 20 | |
GRUB-MKSTANDALONE(3) Library Functions Manual GRUB-MKSTANDALONE(3) | |
NAME | |
grub-mkstandalone — Generate a standalone image in the selected format. | |
SYNOPSIS | |
grub-mkstandalone [-o | --output=FILE] [-O | --format=FORMAT] | |
[-C | --compression=(xz|none|auto)] | |
[--modules=MODULES] [--install-modules=MODULES] | |
[--themes=THEMES] [--fonts=FONTS] | |
[--locales=LOCALES] [--compress[=no,xz,gz,lzo]] | |
[-d | --directory=DIR] [--grub-mkimage=FILE] | |
SOURCE... | |
DESCRIPTION | |
OPTIONS | |
+ man grub2-ofpathname | |
+ head -n 20 | |
GRUB-OFPATHNAME(3) Library Functions Manual GRUB-OFPATHNAME(3) | |
NAME | |
grub-ofpathname — Generate an IEEE-1275 device path for a specified device. | |
SYNOPSIS | |
grub-ofpathname DEVICE | |
DESCRIPTION | |
grub-ofpathname generates an IEEE-1275 device path for the specified DEVICE. | |
SEE ALSO | |
info grub | |
+ man grub2-probe | |
+ head -n 20 | |
<standard input>:6: invalid base glyph `-d' in composite glyph name | |
<standard input>:6: warning: can't find special character `\' | |
GRUB-PROBE(3) Library Functions Manual GRUB-PROBE(3) | |
NAME | |
grub-probe — Probe device information for a given path. | |
SYNOPSIS | |
grub-probe [-m | --device-map=FILE] | |
[-t | --target=(fs|fs_uuid|fs_label|drive|device|partmap| | |
abstraction|cryptodisk_uuid| | |
msdos_parttype)] | |
[-v | --verbose] (PATH|DEVICE) | |
DESCRIPTION | |
grub-probe probes a path or device for filesystem and related information. | |
+ man grub2-reboot | |
+ head -n 20 | |
GRUB-REBOOT(3) Library Functions Manual GRUB-REBOOT(3) | |
NAME | |
grub-reboot — Set the default boot menu entry for the next boot only. | |
SYNOPSIS | |
grub-reboot [--boot-directory=DIR] MENU_ENTRY | |
DESCRIPTION | |
grub-reboot sets the default boot menu entry for the next boot, but not further boots after that. This command only works for GRUB configuration files created with GRUB_DEFAULT=saved in /etc/default/grub. | |
OPTIONS | |
--boot-directory=DIR | |
Find GRUB images under DIR/grub. The default value is /boot, resulting in grub images being search for at /boot/grub. | |
+ man grub2-rpm-sort | |
+ head -n 20 | |
GRUB-RPM-SORT(8) System Manager's Manual GRUB-RPM-SORT(8) | |
NAME | |
grub-rpm-sort — Sort input according to RPM version compare. | |
SYNOPSIS | |
grub-rpm-sort [OPTIONS]. | |
DESCRIPTION | |
You should not normally run this program directly. Use grub-mkconfig instead. | |
SEE ALSO | |
info grub | |
+ man grub2-script-check | |
+ head -n 20 | |
GRUB-SCRIPT-CHECK(3) Library Functions Manual GRUB-SCRIPT-CHECK(3) | |
NAME | |
grub-script-check — Check GRUB configuration file for syntax errors. | |
SYNOPSIS | |
grub-script-check [-v | --verbose] PATH | |
DESCRIPTION | |
grub-script-check verifies that a specified GRUB configuration file does not contain syntax errors. | |
OPTIONS | |
--verbose | |
Print verbose output. | |
+ man grub2-set-default | |
+ head -n 20 | |
GRUB-SET-DEFAULT(1) General Commands Manual GRUB-SET-DEFAULT(1) | |
NAME | |
grub-set-default — Set the default boot menu entry for GRUB. | |
SYNOPSIS | |
grub-set-default [--boot-directory=DIR] MENU_ENTRY | |
DESCRIPTION | |
grub-set-default sets the default boot menu entry for all subsequent boots. This command only works for GRUB configuration files created with GRUB_DEFAULT=saved in /etc/default/grub. | |
OPTIONS | |
--boot-directory=DIR | |
Find GRUB images under DIR/grub. The default value is /boot, resulting in grub images being search for at /boot/grub. | |
+ man grub2-setpassword | |
+ head -n 20 | |
GRUB-SETPASSWORD(3) Library Functions Manual GRUB-SETPASSWORD(3) | |
NAME | |
grub-setpassword — Generate the user.cfg file containing the hashed grub bootloader password. | |
SYNOPSIS | |
grub-setpassword [OPTION] | |
DESCRIPTION | |
grub-setpassword outputs the user.cfg file which contains the hashed GRUB bootloader password. This utility only supports configurations where there is a single root user. | |
The file has the format: GRUB2_PASSWORD=<hashed password>. | |
OPTIONS | |
-h, --help | |
+ man grub2-sparc64-setup | |
+ head -n 20 | |
GRUB-SPARC64-SETUP(3) Library Functions Manual GRUB-SPARC64-SETUP(3) | |
NAME | |
grub-sparc64-setup — Set up a device to boot a sparc64 GRUB image. | |
SYNOPSIS | |
grub-sparc64-setup [OPTIONS]. | |
DESCRIPTION | |
You should not normally run this program directly. Use grub-install instead. | |
SEE ALSO | |
info grub | |
+ man grub2-syslinux2cfg | |
+ head -n 20 | |
GRUB-SYSLINUX2CFG(1) General Commands Manual GRUB-SYSLINUX2CFG(1) | |
NAME | |
grub-syslinux2cfg — Transform a syslinux config file into a GRUB config. | |
SYNOPSIS | |
grub-syslinux2cfg [-c | --cwd=DIR] [-r | --root=DIR] [-v | --verbose] | |
[-t | --target-root=DIR] [-T | --target-cwd=DIR] | |
[-o | --output=FILE] [[-i | --isolinux] | | |
[-s | --syslinux] | | |
[-p | --pxelinux]] FILE | |
DESCRIPTION | |
grub-syslinux2cfg builds a GRUB configuration file out of an existing syslinux configuration file. | |
+ man grubby | |
+ head -n 20 | |
GRUBBY(8) System Manager's Manual GRUBBY(8) | |
NAME | |
grubby - command line tool used to configure bootloader menu entries across multiple architectures | |
SYNOPSIS | |
grubby [OPTIONS] | |
DESCRIPTION | |
General Information | |
grubby is a command line tool for updating and displaying information about the configuration files for various architecture specific bootloaders. It is primarily designed to be used from scripts which install new kernels and need to find information about the current boot environment. | |
Architecture Support | |
The grubby executable has full support for the grub2 bootloader on x86_64 systems using legacy BIOS or modern UEFI firmware and ppc64 and ppc64le hardware using OPAL or SLOF as firmware. | |
+ man gssproxy | |
+ head -n 20 | |
GSSPROXY(8) GssProxy Manual pages GSSPROXY(8) | |
NAME | |
gssproxy - GssProxy Daemon | |
SYNOPSIS | |
gssproxy [options] | |
DESCRIPTION | |
gssproxy provides a daemon to manage access to GSSAPI credentials. | |
gssproxy consists of the gssproxy daemon (configured by the gssproxy.conf(5) file) and a GSSAPI interposer plugin (gssproxy-mech(8)). | |
OPTIONS | |
-D,--daemon | |
Become a daemon after starting up. | |
-i,--interactive | |
+ man gtar | |
+ head -n 20 | |
TAR(1) User Commands TAR(1) | |
NAME | |
tar - manual page for tar 1.26 | |
SYNOPSIS | |
tar [OPTION...] [FILE]... | |
DESCRIPTION | |
GNU `tar' saves many files together into a single tape or disk archive, and can restore individual files from the archive. | |
Note that this manual page contains just very brief description (or more like a list of possible functionality) originally generated by the help2man utility. The full documentation for tar is maintained as a Texinfo manual. If the info and tar programs are properly installed at your site, the command `info tar' should give you access to the complete manual. | |
EXAMPLES | |
tar -cf archive.tar foo bar | |
# Create archive.tar from files foo and bar. | |
tar -tvf archive.tar | |
+ man gunzip | |
+ head -n 20 | |
GZIP(1) General Commands Manual GZIP(1) | |
NAME | |
gzip, gunzip, zcat - compress or expand files | |
SYNOPSIS | |
gzip [ -acdfhlLnNrtvV19 ] [-S suffix] [ name ... ] | |
gunzip [ -acfhlLnNrtvV ] [-S suffix] [ name ... ] | |
zcat [ -fhLV ] [ name ... ] | |
DESCRIPTION | |
Gzip reduces the size of the named files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz, while keeping the same ownership modes, access and modification times. (The default extension is -gz for VMS, z for MSDOS, OS/2 FAT, Windows NT FAT and Atari.) If no files are specified, or if a file name is "-", the standard input is compressed to the | |
standard output. Gzip will only attempt to compress regular files. In particular, it will ignore symbolic links. | |
If the compressed file name is too long for its file system, gzip truncates it. Gzip attempts to truncate only the parts of the file name longer than 3 characters. (A part is delimited by dots.) If the name consists of small parts only, the longest parts are truncated. For example, if file names are limited to 14 characters, gzip.msdos.exe is compressed to gzi.msd.exe.gz. Names are not truncated on | |
systems which do not have a limit on file name length. | |
By default, gzip keeps the original file name and timestamp in the compressed file. These are used when decompressing the file with the -N option. This is useful when the compressed file name was truncated or when the time stamp was not preserved after a file transfer. | |
+ man gzexe | |
+ head -n 20 | |
GZEXE(1) General Commands Manual GZEXE(1) | |
NAME | |
gzexe - compress executable files in place | |
SYNOPSIS | |
gzexe name ... | |
DESCRIPTION | |
The gzexe utility allows you to compress executables in place and have them automatically uncompress and execute when you run them (at a penalty in performance). For example if you execute ``gzexe /usr/bin/gdb'' it will create the following two files: | |
-rwxr-xr-x 1 root root 1026675 Jun 7 13:53 /usr/bin/gdb | |
-rwxr-xr-x 1 root root 2304524 May 30 13:02 /usr/bin/gdb~ | |
/usr/bin/gdb~ is the original file and /usr/bin/gdb is the self-uncompressing executable file. You can remove /usr/bin/gdb~ once you are sure that /usr/bin/gdb works properly. | |
This utility is most useful on systems with very small disks. | |
OPTIONS | |
-d Decompress the given executables instead of compressing them. | |
+ man gzip | |
+ head -n 20 | |
GZIP(1) General Commands Manual GZIP(1) | |
NAME | |
gzip, gunzip, zcat - compress or expand files | |
SYNOPSIS | |
gzip [ -acdfhlLnNrtvV19 ] [-S suffix] [ name ... ] | |
gunzip [ -acfhlLnNrtvV ] [-S suffix] [ name ... ] | |
zcat [ -fhLV ] [ name ... ] | |
DESCRIPTION | |
Gzip reduces the size of the named files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz, while keeping the same ownership modes, access and modification times. (The default extension is -gz for VMS, z for MSDOS, OS/2 FAT, Windows NT FAT and Atari.) If no files are specified, or if a file name is "-", the standard input is compressed to the | |
standard output. Gzip will only attempt to compress regular files. In particular, it will ignore symbolic links. | |
If the compressed file name is too long for its file system, gzip truncates it. Gzip attempts to truncate only the parts of the file name longer than 3 characters. (A part is delimited by dots.) If the name consists of small parts only, the longest parts are truncated. For example, if file names are limited to 14 characters, gzip.msdos.exe is compressed to gzi.msd.exe.gz. Names are not truncated on | |
systems which do not have a limit on file name length. | |
By default, gzip keeps the original file name and timestamp in the compressed file. These are used when decompressing the file with the -N option. This is useful when the compressed file name was truncated or when the time stamp was not preserved after a file transfer. | |
+ man h2ph | |
+ head -n 20 | |
H2PH(1) Perl Programmers Reference Guide H2PH(1) | |
NAME | |
h2ph - convert .h C header files to .ph Perl header files | |
SYNOPSIS | |
h2ph [-d destination directory] [-r | -a] [-l] [-h] [-e] [-D] [-Q] [headerfiles] | |
DESCRIPTION | |
h2ph converts any C header files specified to the corresponding Perl header file format. It is most easily run while in /usr/include: | |
cd /usr/include; h2ph * sys/* | |
or | |
cd /usr/include; h2ph * sys/* arpa/* netinet/* | |
or | |
+ man halt | |
+ head -n 20 | |
HALT(8) halt HALT(8) | |
NAME | |
halt, poweroff, reboot - Halt, power-off or reboot the machine | |
SYNOPSIS | |
halt [OPTIONS...] | |
poweroff [OPTIONS...] | |
reboot [OPTIONS...] | |
DESCRIPTION | |
halt, poweroff, reboot may be used to halt, power-off or reboot the machine. | |
OPTIONS | |
The following options are understood: | |
+ man hardlink | |
+ head -n 20 | |
hardlink(1) General Commands Manual hardlink(1) | |
NAME | |
hardlink - Consolidate duplicate files via hardlinks | |
SYNOPSIS | |
hardlink [-c] [-n] [-v] [-vv] [-x pattern] [-h] directory1 [ directory2 ... ] | |
DESCRIPTION | |
This manual page documents hardlink, a program which consolidates duplicate files in one or more directories using hardlinks. | |
hardlink traverses one or more directories searching for duplicate files. When it finds duplicate files, it uses one of them as the master. It then removes all other duplicates and places a hardlink for each one pointing to the master file. This allows for conservation of disk space where multiple directories on a single filesystem contain many duplicate files. | |
Since hard links can only span a single filesystem, hardlink is only useful when all directories specified are on the same filesystem. | |
OPTIONS | |
-c Compare only the contents of the files being considered for consolidation. Disregards permission, ownership and other differences. | |
+ man hexdump | |
+ head -n 20 | |
HEXDUMP(1) User Commands HEXDUMP(1) | |
NAME | |
hexdump - display file contents in hexadecimal, decimal, octal, or ascii | |
SYNOPSIS | |
hexdump [options] file... | |
DESCRIPTION | |
The hexdump utility is a filter which displays the specified files, or standard input if no files are specified, in a user-specified format. | |
OPTIONS | |
Below, the length and offset arguments may be followed by the multiplicative suffixes KiB (=1024), MiB (=1024*1024), and so on for GiB, TiB, PiB, EiB, ZiB and YiB (the "iB" is optional, e.g. "K" has the same meaning as "KiB"), or the suffixes KB (=1000), MB (=1000*1000), and so on for GB, TB, PB, EB, ZB and YB. | |
-b, --one-byte-octal | |
One-byte octal display. Display the input offset in hexadecimal, followed by sixteen space-separated, three-column, zero-filled bytes of input data, in octal, per line. | |
-c, --one-byte-char | |
+ man hibagent | |
+ head -n 20 | |
No manual entry for hibagent | |
+ man host | |
+ head -n 20 | |
HOST(1) BIND9 HOST(1) | |
NAME | |
host - DNS lookup utility | |
SYNOPSIS | |
host [-aCdlnrsTUwv] [-c class] [-N ndots] [-R number] [-t type] [-W wait] [-m flag] [[-4] | [-6]] [-v] [-V] {name} [server] | |
DESCRIPTION | |
host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its command line arguments and options. | |
name is the domain name that is to be looked up. It can also be a dotted-decimal IPv4 address or a colon-delimited IPv6 address, in which case host will by default perform a reverse lookup for that address. server is an optional argument which is either the name or IP address of the name server that host should query instead of the server or servers listed in /etc/resolv.conf. | |
OPTIONS | |
-4 | |
Use IPv4 only for query transport. See also the -6 option. | |
-6 | |
+ man hostname | |
+ head -n 20 | |
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1) | |
NAME | |
hostname - show or set the system's host name | |
domainname - show or set the system's NIS/YP domain name | |
ypdomainname - show or set the system's NIS/YP domain name | |
nisdomainname - show or set the system's NIS/YP domain name | |
dnsdomainname - show the system's DNS domain name | |
SYNOPSIS | |
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis] | |
hostname [-b|--boot] [-F|--file filename] [hostname] | |
hostname [-h|--help] [-V|--version] | |
domainname [nisdomain] [-F file] | |
ypdomainname [nisdomain] [-F file] | |
nisdomainname [nisdomain] [-F file] | |
+ man hostnamectl | |
+ head -n 20 | |
HOSTNAMECTL(1) hostnamectl HOSTNAMECTL(1) | |
NAME | |
hostnamectl - Control the system hostname | |
SYNOPSIS | |
hostnamectl [OPTIONS...] {COMMAND} | |
DESCRIPTION | |
hostnamectl may be used to query and change the system hostname and related settings. | |
This tool distinguishes three different hostnames: the high-level "pretty" hostname which might include all kinds of special characters (e.g. "Lennart's Laptop"), the static hostname which is used to initialize the kernel hostname at boot (e.g. "lennarts-laptop"), and the transient hostname which is a default received from network configuration. If a static hostname is set, and is valid (something | |
other than localhost), then the transient hostname is not used. | |
Note that the pretty hostname has little restrictions on the characters used, while the static and transient hostnames are limited to the usually accepted characters of Internet domain names. | |
The static hostname is stored in /etc/hostname, see hostname(5) for more information. The pretty hostname, chassis type, and icon name are stored in /etc/machine-info, see machine-info(5). | |
+ man hunspell | |
+ head -n 20 | |
hunspell(1) General Commands Manual hunspell(1) | |
NAME | |
hunspell - spell checker, stemmer and morphological analyzer | |
SYNOPSIS | |
hunspell [-1aDGHhLlmnrstvw] [--check-url] [-d dict[,dict2,...]] [--help] [-i enc] [-p dict] [-vv] [--version] [file(s)] | |
DESCRIPTION | |
Hunspell is fashioned after the Ispell program. The most common usage is "hunspell" or "hunspell filename". Without filename parameter, hunspell checks the standard input. Typing "cat" and "exsample" in two input lines, we got an asterisk (it means "cat" is a correct word) and a line with corrections: | |
$ hunspell -d en_US | |
Hunspell 1.2.3 | |
* | |
& exsample 4 0: example, examples, ex sample, ex-sample | |
Correct words signed with an '*', '+' or '-', unrecognized words signed with '#' or '&' in output lines (see later). (Close the standard input with Ctrl-d on Unix/Linux and Ctrl-Z Enter or Ctrl-C on Windows.) | |
+ man hwclock | |
+ head -n 20 | |
HWCLOCK(8) System Administration HWCLOCK(8) | |
NAME | |
hwclock - read or set the hardware clock (RTC) | |
SYNOPSIS | |
hwclock [function] [option...] | |
DESCRIPTION | |
hwclock is a tool for accessing the Hardware Clock. It can: display the Hardware Clock time; set the Hardware Clock to a specified time; set the Hardware Clock from the System Clock; set the System Clock from the Hardware Clock; compensate for Hardware Clock drift; correct the System Clock timescale; set the kernel's timezone, NTP timescale, and epoch (Alpha only); and predict future Hardware Clock | |
values based on its drift rate. | |
Since v2.26 important changes were made to the --hctosys function and the --directisa option, and a new option --update-drift was added. See their respective descriptions below. | |
FUNCTIONS | |
The following functions are mutually exclusive, only one can be given at a time. If none is given, the default is --show. | |
--adjust | |
+ man iconvconfig.aarch64 | |
+ head -n 20 | |
No manual entry for iconvconfig.aarch64 | |
+ man idiag-socket-details | |
+ head -n 20 | |
No manual entry for idiag-socket-details | |
+ man idn | |
+ head -n 20 | |
IDN(1) User Commands IDN(1) | |
NAME | |
idn - Internationalized Domain Names command line tool | |
SYNOPSIS | |
idn [OPTION]... [STRINGS]... | |
DESCRIPTION | |
Internationalized Domain Name (IDN) convert STRINGS, or standard input. | |
Command line interface to the internationalized domain name library. | |
All strings are expected to be encoded in the preferred charset used by your locale. Use `--debug' to find out what this charset is. You can override the charset used by setting environment variable CHARSET. | |
To process a string that starts with `-', for example `-foo', use `--' to signal the end of parameters, as in `idn --quiet -a -- -foo'. | |
Mandatory arguments to long options are mandatory for short options too. | |
+ man ifcfg | |
+ head -n 20 | |
IFCFG(8) Linux IFCFG(8) | |
NAME | |
ifcfg - simplistic script which replaces ifconfig IP management | |
SYNOPSIS | |
ifcfg [ DEVICE ] [ command ] ADDRESS [ PEER ] | |
DESCRIPTION | |
This manual page documents briefly the ifcfg command. | |
This is a simplistic script replacing one option of ifconfig , namely, IP address management. It not only adds addresses, but also carries out Duplicate Address Detection RFC-DHCP, sends unsolicited ARP to update the caches of other hosts sharing the interface, adds some control routes and restarts Router Discovery when it is necessary. | |
IFCONFIG - COMMAND SYNTAX | |
DEVICE - it may have alias, suffix, separated by colon. | |
+ man ifconfig | |
+ head -n 20 | |
IFCONFIG(8) Linux System Administrator's Manual IFCONFIG(8) | |
NAME | |
ifconfig - configure a network interface | |
SYNOPSIS | |
ifconfig [-v] [-a] [-s] [interface] | |
ifconfig [-v] interface [aftype] options | address ... | |
NOTE | |
This program is obsolete! For replacement check ip addr and ip link. For statistics use ip -s link. | |
DESCRIPTION | |
Ifconfig is used to configure the kernel-resident network interfaces. It is used at boot time to set up interfaces as necessary. After that, it is usually only needed when debugging or when system tuning is needed. | |
If no arguments are given, ifconfig displays the status of the currently active interfaces. If a single interface argument is given, it displays the status of the given interface only; if a single -a argument is given, it displays the status of all interfaces, even those that are down. Otherwise, it configures an interface. | |
+ man ifdown | |
+ head -n 20 | |
ifup(8) System Administration tools and Daemons ifup(8) | |
NAME | |
ifup - bring a network interface up | |
ifdown - take a network interface down | |
SYNOPSIS | |
ifup CONFIG [boot] | |
ifdown CONFIG | |
DESCRIPTION | |
The ifup and ifdown commands may be used to configure (or, respec- tively, deconfigure) network interfaces based on interface definitions in the files /etc/sysconfig/network and /etc/sysconfig/network-scripts/ifcfg-<configuration> | |
These scripts take one argument normally: the name of the configuration (e.g. eth0). They are called with a second argument of "boot" during the boot sequence so that devices that are not meant to be brought up on boot (ONBOOT=no, see below) can be ignored at that time. | |
+ man ifenslave | |
+ head -n 20 | |
IFENSLAVE(8) BSD System Manager's Manual IFENSLAVE(8) | |
NAME | |
ifenslave — Attach and detach slave network devices to a bonding device. | |
SYNOPSIS | |
ifenslave [-acdfhuvV] [--all-interfaces] [--change-active] [--detach] [--force] [--help] [--usage] [--verbose] [--version] master slave ... | |
DESCRIPTION | |
ifenslave is a tool to attach and detach slave network devices to a bonding device. A bonding device will act like a normal Ethernet network device to the kernel, but will send out the packets via the slave devices using a simple round-robin scheduler. This allows for simple load-balancing, identical to "channel bonding" or "trunking" techniques used in switches. | |
The kernel must have support for bonding devices for ifenslave to be useful. | |
OPTIONS | |
-a, --all-interfaces | |
Show information about all interfaces. | |
-c, --change-active | |
Change active slave. | |
+ man ifstat | |
+ head -n 20 | |
IFSTAT(8) Linux IFSTAT(8) | |
NAME | |
ifstat - handy utility to read network interface statistics | |
SYNOPSIS | |
ifstat [ OPTIONS ] [ INTERFACE_LIST ] | |
INTERFACE_LIST := INTERFACE_LIST | interface | |
DESCRIPTION | |
ifstat neatly prints out network interface statistics. The utility keeps records of the previous data displayed in history files and by default only shows difference between the last and the current call. Location of the history files defaults to /tmp/.ifstat.u$UID but may be overridden with the IFSTAT_HISTORY environment variable. Similarly, the default location for xstat (extended stats) is | |
/tmp/.<xstat name>_ifstat.u$UID. | |
OPTIONS | |
-h, --help | |
Show summary of options. | |
+ man ifup | |
+ head -n 20 | |
ifup(8) System Administration tools and Daemons ifup(8) | |
NAME | |
ifup - bring a network interface up | |
ifdown - take a network interface down | |
SYNOPSIS | |
ifup CONFIG [boot] | |
ifdown CONFIG | |
DESCRIPTION | |
The ifup and ifdown commands may be used to configure (or, respec- tively, deconfigure) network interfaces based on interface definitions in the files /etc/sysconfig/network and /etc/sysconfig/network-scripts/ifcfg-<configuration> | |
These scripts take one argument normally: the name of the configuration (e.g. eth0). They are called with a second argument of "boot" during the boot sequence so that devices that are not meant to be brought up on boot (ONBOOT=no, see below) can be ignored at that time. | |
+ man init | |
+ head -n 20 | |
SYSTEMD(1) systemd SYSTEMD(1) | |
NAME | |
systemd, init - systemd system and service manager | |
SYNOPSIS | |
systemd [OPTIONS...] | |
init [OPTIONS...] {COMMAND} | |
DESCRIPTION | |
systemd is a system and service manager for Linux operating systems. When run as first process on boot (as PID 1), it acts as init system that brings up and maintains userspace services. | |
For compatibility with SysV, if systemd is called as init and a PID that is not 1, it will execute telinit and pass all command line arguments unmodified. That means init and telinit are mostly equivalent when invoked from normal login sessions. See telinit(8) for more information. | |
When run as a system instance, systemd interprets the configuration file system.conf and the files in system.conf.d directories. See systemd-system.conf(5) for more information. | |
OPTIONS | |
+ man insmod | |
+ head -n 20 | |
INSMOD(8) insmod INSMOD(8) | |
NAME | |
insmod - Simple program to insert a module into the Linux Kernel | |
SYNOPSIS | |
insmod [filename] [module options...] | |
DESCRIPTION | |
insmod is a trivial program to insert a module into the kernel. Most users will want to use modprobe(8) instead, which is more clever and can handle module dependencies. | |
Only the most general of error messages are reported: as the work of trying to link the module is now done inside the kernel, the dmesg usually gives more information about errors. | |
COPYRIGHT | |
This manual page originally Copyright 2002, Rusty Russell, IBM Corporation. Maintained by Jon Masters and others. | |
SEE ALSO | |
modprobe(8), rmmod(8), lsmod(8), modinfo(8) depmod(8) | |
+ man installkernel | |
+ head -n 20 | |
INSTALLKERNEL(8) System Manager's Manual INSTALLKERNEL(8) | |
NAME | |
installkernel - tool to script kernel installation | |
SYNOPSIS | |
installkernel <kernel-version> <bootimage> <mapfile> | |
DESCRIPTION | |
installkernel installs a new kernel image onto the system from the Linux source tree. It is called by the Linux kernel makefiles when make install is invoked there. | |
The new kernel is installed into {directory}/vmlinuz-{version}. If a symbolic link {directory}/vmlinuz already exists, it is refreshed by making a link from {directory}/vmlinuz to the new kernel, and the previously installed kernel is available as {directory}/vmlinuz.old. | |
SEE ALSO | |
grubby(8) new-kernel-pkg(8) | |
+ man ionice | |
+ head -n 20 | |
IONICE(1) User Commands IONICE(1) | |
NAME | |
ionice - set or get process I/O scheduling class and priority | |
SYNOPSIS | |
ionice [-c class] [-n level] [-t] -p PID... | |
ionice [-c class] [-n level] [-t] -P PGID... | |
ionice [-c class] [-n level] [-t] -u UID... | |
ionice [-c class] [-n level] [-t] command [argument...] | |
DESCRIPTION | |
This program sets or gets the I/O scheduling class and priority for a program. If no arguments or just -p is given, ionice will query the current I/O scheduling class and priority for that process. | |
When command is given, ionice will run this command with the given arguments. If no class is specified, then command will be executed with the "best-effort" scheduling class. The default priority level is 4. | |
As of this writing, a process can be in one of three scheduling classes: | |
+ man iostat | |
+ head -n 20 | |
IOSTAT(1) Linux User's Manual IOSTAT(1) | |
NAME | |
iostat - Report Central Processing Unit (CPU) statistics and input/output statistics for devices and partitions. | |
SYNOPSIS | |
iostat [ -c ] [ -d ] [ -h ] [ -k | -m ] [ -N ] [ -t ] [ -V ] [ -x ] [ -y ] [ -z ] [ -j { ID | LABEL | PATH | UUID | ... } ] [ [ -T ] -g group_name ] [ -p [ device [,...] | ALL ] ] [ device [...] | ALL ] [ interval [ count ] ] | |
DESCRIPTION | |
The iostat command is used for monitoring system input/output device loading by observing the time the devices are active in relation to their average transfer rates. The iostat command generates reports that can be used to change system configuration to better balance the input/output load between physical disks. | |
The first report generated by the iostat command provides statistics concerning the time since the system was booted, unless the -y option is used (in this case, this first report is omitted). Each subsequent report covers the time since the previous report. All statistics are reported each time the iostat command is run. The report consists of a CPU header row followed by a row of CPU statistics. On | |
multiprocessor systems, CPU statistics are calculated system-wide as averages among all processors. A device header row is displayed followed by a line of statistics for each device that is configured. | |
The interval parameter specifies the amount of time in seconds between each report. The first report contains statistics for the time since system startup (boot), unless the -y option is used (in this case, this report is omitted). Each subsequent report contains statistics collected during the interval since the previous report. The count parameter can be specified in conjunction with the interval | |
parameter. If the count parameter is specified, the value of count determines the number of reports generated at interval seconds apart. If the interval parameter is specified without the count parameter, the iostat command generates reports continuously. | |
+ man ip | |
+ head -n 20 | |
IP(8) Linux IP(8) | |
NAME | |
ip - show / manipulate routing, network devices, interfaces and tunnels | |
SYNOPSIS | |
ip [ OPTIONS ] OBJECT { COMMAND | help } | |
ip [ -force ] -batch filename | |
OBJECT := { link | address | addrlabel | route | rule | neigh | ntable | tunnel | tuntap | maddress | mroute | mrule | monitor | xfrm | netns | l2tp | tcp_metrics | token | macsec } | |
OPTIONS := { -V[ersion] | -h[uman-readable] | -s[tatistics] | -d[etails] | -r[esolve] | -iec | -f[amily] { inet | inet6 | ipx | dnet | link } | -4 | -6 | -I | -D | -B | -0 | -l[oops] { maximum-addr-flush-attempts } | -o[neline] | -rc[vbuf] [size] | -t[imestamp] | -ts[hort] | -n[etns] name | -a[ll] | -c[olor] -br[ief] } | |
+ man ip6tables | |
+ head -n 20 | |
IPTABLES(8) iptables 1.8.4 IPTABLES(8) | |
NAME | |
iptables/ip6tables — administration tool for IPv4/IPv6 packet filtering and NAT | |
SYNOPSIS | |
iptables [-t table] {-A|-C|-D} chain rule-specification | |
ip6tables [-t table] {-A|-C|-D} chain rule-specification | |
iptables [-t table] -I chain [rulenum] rule-specification | |
iptables [-t table] -R chain rulenum rule-specification | |
iptables [-t table] -D chain rulenum | |
iptables [-t table] -S [chain [rulenum]] | |
+ man ip6tables-legacy | |
+ head -n 20 | |
No manual entry for ip6tables-legacy | |
+ man ip6tables-legacy-restore | |
+ head -n 20 | |
No manual entry for ip6tables-legacy-restore | |
+ man ip6tables-legacy-save | |
+ head -n 20 | |
No manual entry for ip6tables-legacy-save | |
+ man ip6tables-restore | |
+ head -n 20 | |
IPTABLES-RESTORE(8) iptables 1.8.4 IPTABLES-RESTORE(8) | |
NAME | |
iptables-restore — Restore IP Tables | |
ip6tables-restore — Restore IPv6 Tables | |
SYNOPSIS | |
iptables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file] | |
ip6tables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file] | |
DESCRIPTION | |
iptables-restore and ip6tables-restore are used to restore IP and IPv6 Tables from data specified on STDIN or in file. Use I/O redirection provided by your shell to read from a file or specify file as an argument. | |
-c, --counters | |
restore the values of all packet and byte counters | |
+ man ip6tables-save | |
+ head -n 20 | |
IPTABLES-SAVE(8) iptables 1.8.4 IPTABLES-SAVE(8) | |
NAME | |
iptables-save — dump iptables rules | |
ip6tables-save — dump iptables rules | |
SYNOPSIS | |
iptables-save [-M modprobe] [-c] [-t table] [-f filename] | |
ip6tables-save [-M modprobe] [-c] [-t table] [-f filename] | |
DESCRIPTION | |
iptables-save and ip6tables-save are used to dump the contents of IP or IPv6 Table in easily parseable format either to STDOUT or to a specified file. | |
-M, --modprobe modprobe_program | |
Specify the path to the modprobe program. By default, iptables-save will inspect /proc/sys/kernel/modprobe to determine the executable's path. | |
+ man ipcalc | |
+ head -n 20 | |
IPCALC(1) General Commands Manual IPCALC(1) | |
NAME | |
ipcalc - perform simple manipulation of IP addresses | |
SYNOPSIS | |
ipcalc [OPTION]... <IP address>[/prefix] [netmask] | |
DESCRIPTION | |
ipcalc provides a simple way to calculate IP information for a host. The various options specify what information ipcalc should display on standard out. Multiple options may be specified. An IP address to operate on must always be specified. Most operations also require a netmask or a CIDR prefix as well. | |
OPTIONS | |
-c, --check | |
Validate the IP address under the specified family. If no address family is specified, IPv4 is assumed. | |
+ man ipcmk | |
+ head -n 20 | |
IPCMK(1) User Commands IPCMK(1) | |
NAME | |
ipcmk - make various IPC resources | |
SYNOPSIS | |
ipcmk [options] | |
DESCRIPTION | |
ipcmk allows you to create shared memory segments, message queues, and semaphore arrays. | |
OPTIONS | |
Resources can be specified with these options: | |
-M, --shmem size | |
Create a shared memory segment of size bytes. The size argument may be followed by the multiplicative suffixes KiB (=1024), MiB (=1024*1024), and so on for GiB, etc. (the "iB" is optional, e.g., "K" has the same meaning as "KiB") or the suffixes KB (=1000), MB (=1000*1000), and so on for GB, etc. | |
-Q, --queue | |
+ man ipcrm | |
+ head -n 20 | |
IPCRM(1) User Commands IPCRM(1) | |
NAME | |
ipcrm - remove certain IPC resources | |
SYNOPSIS | |
ipcrm [options] | |
ipcrm {shm|msg|sem} id... | |
DESCRIPTION | |
ipcrm removes System V inter-process communication (IPC) objects and associated data structures from the system. In order to delete such objects, you must be superuser, or the creator or owner of the object. | |
System V IPC objects are of three types: shared memory, message queues, and semaphores. Deletion of a message queue or semaphore object is immediate (regardless of whether any process still holds an IPC identifier for the object). A shared memory object is only removed after all currently attached processes have detached (shmdt(2)) the object from their virtual address space. | |
Two syntax styles are supported. The old Linux historical syntax specifies a three-letter keyword indicating which class of object is to be deleted, followed by one or more IPC identifiers for objects of this type. | |
The SUS-compliant syntax allows the specification of zero or more objects of all three types in a single command line, with objects specified either by key or by identifier (see below). Both keys and identifiers may be specified in decimal, hexadecimal (specified with an initial '0x' or '0X'), or octal (specified with an initial '0'). | |
+ man ipcs | |
+ head -n 20 | |
IPCS(1) User Commands IPCS(1) | |
NAME | |
ipcs - show information on IPC facilities | |
SYNOPSIS | |
ipcs [options] | |
DESCRIPTION | |
ipcs shows information on the inter-process communication facilities for which the calling process has read access. By default it shows information about all three resources: shared memory segments, message queues, and semaphore arrays. | |
OPTIONS | |
-i, --id id | |
Show full details on just the one resource element identified by id. This option needs to be combined with one of the three resource options: -m, -q or -s. | |
-h, --help | |
Display help text and exit. | |
+ man ipmaddr | |
+ head -n 20 | |
IPMADDR(8) IPMADDR(8) | |
NAME | |
ipmaddr - adds, deletes, and displays multicast addresses | |
SYNOPSIS | |
/usr/sbin/ipmaddr [<operation>] [<args>] | |
NOTE | |
This program is obsolete. For replacement check ip maddr. | |
DESCRIPTION | |
The ipmaddr command can perform one of the following operations: | |
add - add a multicast address | |
+ man iptables | |
+ head -n 20 | |
IPTABLES(8) iptables 1.8.4 IPTABLES(8) | |
NAME | |
iptables/ip6tables — administration tool for IPv4/IPv6 packet filtering and NAT | |
SYNOPSIS | |
iptables [-t table] {-A|-C|-D} chain rule-specification | |
ip6tables [-t table] {-A|-C|-D} chain rule-specification | |
iptables [-t table] -I chain [rulenum] rule-specification | |
iptables [-t table] -R chain rulenum rule-specification | |
iptables [-t table] -D chain rulenum | |
iptables [-t table] -S [chain [rulenum]] | |
+ man iptables-apply | |
+ head -n 20 | |
IPTABLES-APPLY(8) iptables 1.8.4 IPTABLES-APPLY(8) | |
NAME | |
iptables-apply - a safer way to update iptables remotely | |
SYNOPSIS | |
iptables-apply [-hV] [-t timeout] ruleset-file | |
DESCRIPTION | |
iptables-apply will try to apply a new ruleset (as output by iptables-save/read by iptables-restore) to iptables, then prompt the user whether the changes are okay. If the new ruleset cut the existing connection, the user will not be able to answer affirmatively. In this case, the script rolls back to the previous ruleset after the timeout expired. The timeout can be set with -t. | |
When called as ip6tables-apply, the script will use ip6tables-save/-restore instead. | |
OPTIONS | |
-t seconds, --timeout seconds | |
Sets the timeout after which the script will roll back to the previous ruleset. | |
-h, --help | |
+ man iptables-legacy | |
+ head -n 20 | |
No manual entry for iptables-legacy | |
+ man iptables-legacy-restore | |
+ head -n 20 | |
No manual entry for iptables-legacy-restore | |
+ man iptables-legacy-save | |
+ head -n 20 | |
No manual entry for iptables-legacy-save | |
+ man iptables-restore | |
+ head -n 20 | |
IPTABLES-RESTORE(8) iptables 1.8.4 IPTABLES-RESTORE(8) | |
NAME | |
iptables-restore — Restore IP Tables | |
ip6tables-restore — Restore IPv6 Tables | |
SYNOPSIS | |
iptables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file] | |
ip6tables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file] | |
DESCRIPTION | |
iptables-restore and ip6tables-restore are used to restore IP and IPv6 Tables from data specified on STDIN or in file. Use I/O redirection provided by your shell to read from a file or specify file as an argument. | |
-c, --counters | |
restore the values of all packet and byte counters | |
+ man iptables-save | |
+ head -n 20 | |
IPTABLES-SAVE(8) iptables 1.8.4 IPTABLES-SAVE(8) | |
NAME | |
iptables-save — dump iptables rules | |
ip6tables-save — dump iptables rules | |
SYNOPSIS | |
iptables-save [-M modprobe] [-c] [-t table] [-f filename] | |
ip6tables-save [-M modprobe] [-c] [-t table] [-f filename] | |
DESCRIPTION | |
iptables-save and ip6tables-save are used to dump the contents of IP or IPv6 Table in easily parseable format either to STDOUT or to a specified file. | |
-M, --modprobe modprobe_program | |
Specify the path to the modprobe program. By default, iptables-save will inspect /proc/sys/kernel/modprobe to determine the executable's path. | |
+ man iptables-xml | |
+ head -n 20 | |
IPTABLES-XML(1) iptables 1.8.4 IPTABLES-XML(1) | |
NAME | |
iptables-xml — Convert iptables-save format to XML | |
SYNOPSIS | |
iptables-xml [-c] [-v] | |
DESCRIPTION | |
iptables-xml is used to convert the output of iptables-save into an easily manipulatable XML format to STDOUT. Use I/O-redirection provided by your shell to write to a file. | |
-c, --combine | |
combine consecutive rules with the same matches but different targets. iptables does not currently support more than one target per match, so this simulates that by collecting the targets from consecutive iptables rules into one action tag, but only when the rule matches are identical. Terminating actions like RETURN, DROP, ACCEPT and QUEUE are not combined with subsequent targets. | |
-v, --verbose | |
Output xml comments containing the iptables line from which the XML is derived | |
+ man iptunnel | |
+ head -n 20 | |
IPTUNNEL(8) IPTUNNEL(8) | |
NAME | |
iptunnel - creates, deletes, and displays configured tunnels | |
SYNOPSIS | |
/usr/sbin/iptunnel [<operation>] [<args>] | |
NOTE | |
This program is obsolete. For replacement check ip tunnel. | |
DESCRIPTION | |
The iptunnel command creates configured tunnels for sending and receiving IPV6 or IPV4 packets that are encapsulated as the payload of an IPV4 datagram. | |
The iptunnel command can perform one of the following operations: | |
+ man irqbalance | |
+ head -n 20 | |
IRQBALANCE(1) irqbalance IRQBALANCE(1) | |
NAME | |
irqbalance - distribute hardware interrupts across processors on a multiprocessor system | |
SYNOPSIS | |
irqbalance | |
DESCRIPTION | |
The purpose of irqbalance is to distribute hardware interrupts across processors on a multiprocessor system in order to increase performance. | |
OPTIONS | |
-o, --oneshot | |
Causes irqbalance to be run once, after which the daemon exits. | |
+ man isosize | |
+ head -n 20 | |
ISOSIZE(8) System Administration ISOSIZE(8) | |
NAME | |
isosize - output the length of an iso9660 filesystem | |
SYNOPSIS | |
isosize [options] iso9660_image_file | |
DESCRIPTION | |
This command outputs the length of an iso9660 filesystem that is contained in the specified file. This file may be a normal file or a block device (e.g. /dev/hdd or /dev/sr0). In the absence of any options (and errors), it will output the size of the iso9660 filesystem in bytes. This can now be a large number (>> 4 GB). | |
OPTIONS | |
-x, --sectors | |
Show the block count and block size in human-readable form. The output uses the term "sectors" for "blocks". | |
-d, --divisor number | |
Only has an effect when -x is not given. The value shown (if no errors) is the iso9660 file size in bytes divided by number. So if number is the block size then the shown value will be the block count. | |
+ man journalctl | |
+ head -n 20 | |
JOURNALCTL(1) journalctl JOURNALCTL(1) | |
NAME | |
journalctl - Query the systemd journal | |
SYNOPSIS | |
journalctl [OPTIONS...] [MATCHES...] | |
DESCRIPTION | |
journalctl may be used to query the contents of the systemd(1) journal as written by systemd-journald.service(8). | |
If called without parameters, it will show the full contents of the journal, starting with the oldest entry collected. | |
If one or more match arguments are passed, the output is filtered accordingly. A match is in the format "FIELD=VALUE", e.g. "_SYSTEMD_UNIT=httpd.service", referring to the components of a structured journal entry. See systemd.journal-fields(7) for a list of well-known fields. If multiple matches are specified matching different fields, the log entries are filtered by both, i.e. the resulting output | |
will show only entries matching all the specified matches of this kind. If two matches apply to the same field, then they are automatically matched as alternatives, i.e. the resulting output will show entries matching any of the specified matches for the same field. Finally, the character "+" may appears as a separate word between other terms on the command line. This causes all matches before and | |
after to be combined in a disjunction (i.e. logical OR). | |
As shortcuts for a few types of field/value matches, file paths may be specified. If a file path refers to an executable file, this is equivalent to an "_EXE=" match for the canonicalized binary path. Similarly, if a path refers to a device node then match is added for the kernel name of the device ("_KERNEL_DEVICE="). Also, matches for the kernel names of all the parent devices are added | |
+ man jp.py | |
+ head -n 20 | |
No manual entry for jp.py | |
+ man jp.py-2 | |
+ head -n 20 | |
No manual entry for jp.py-2 | |
+ man jp.py-2.7 | |
+ head -n 20 | |
No manual entry for jp.py-2.7 | |
+ man json_reformat | |
+ head -n 20 | |
No manual entry for json_reformat | |
+ man json_verify | |
+ head -n 20 | |
No manual entry for json_verify | |
+ man jsonpointer | |
+ head -n 20 | |
No manual entry for jsonpointer | |
+ man jsonschema | |
+ head -n 20 | |
No manual entry for jsonschema | |
+ man kbd_mode | |
+ head -n 20 | |
KBD_MODE(1) General Commands Manual KBD_MODE(1) | |
NAME | |
kbd_mode - report or set the keyboard mode | |
SYNOPSIS | |
kbd_mode [ -a | -u | -k | -s ] [ -C CONSOLE ] | |
DESCRIPTION | |
Without argument, kbd_mode prints the current keyboard mode (RAW, MEDIUMRAW or XLATE). With argument, it sets the keyboard mode as indicated: | |
-s: scancode mode (RAW), | |
-k: keycode mode (MEDIUMRAW), | |
-a: ASCII mode (XLATE), | |
-u: UTF-8 mode (UNICODE). | |
+ man kbdinfo | |
+ head -n 20 | |
KBDINFO(1) General Commands Manual KBDINFO(1) | |
NAME | |
kbdinfo - obtain information about the status of a console | |
SYNOPSIS | |
kbdinfo [-C DEVICE] getmode [text|graphics] | |
kbdinfo [-C DEVICE] gkbmode [raw|xlate|mediumraw|unicode] | |
kbdinfo [-C DEVICE] gkbmeta [metabit|escprefix] | |
kbdinfo [-C DEVICE] gkbled [scrolllock|numlock|capslock] | |
DESCRIPTION | |
kbdinfo is an interface to KDGETMODE, GKBMODE, GKBMETA and GKBLED ioctls. Its primary use case is to query the status of the given CONSOLE (or the currently active one, if no -C option is present) from a shell script. | |
If the final value argument is not specified, kbdinfo will print the result of the desired ioctl to the standard output. Otherwise, the given value is compared to the actual result, and the utility will exit with a status code of 0 for a match, 1 otherwise. No text is printed for this style of invocation. | |
+ man kbdrate | |
+ head -n 20 | |
KBDRATE(8) Linux Programmer's Manual KBDRATE(8) | |
NAME | |
kbdrate - reset the keyboard repeat rate and delay time | |
SYNOPSIS | |
kbdrate [ -s ] [ -r rate ] [ -d delay ] | |
DESCRIPTION | |
kbdrate is used to change the keyboard repeat rate and delay time. The delay is the amount of time that a key must be depressed before it will start to repeat. | |
Using kbdrate without any options will reset the repeat rate to 10.9 characters per second (cps) and the delay to 250 milliseconds (ms) for Intel- and M68K-based systems. These are the IBM defaults. On SPARC-based systems it will reset the repeat rate to 20 cps and the delay to 200 ms. | |
OPTIONS | |
-s Silent. No messages are printed. | |
-r rate | |
+ man kernel-install | |
+ head -n 20 | |
KERNEL-INSTALL(8) kernel-install KERNEL-INSTALL(8) | |
NAME | |
kernel-install - Add and remove kernel and initramfs images to and from /boot | |
SYNOPSIS | |
kernel-install COMMAND KERNEL-VERSION [KERNEL-IMAGE] | |
DESCRIPTION | |
kernel-install is used to install and remove kernel and initramfs images to and from /boot. | |
kernel-install will execute the files located in the directory /usr/lib/kernel/install.d/ and the local administration directory /etc/kernel/install.d/. All files are collectively sorted and executed in lexical order, regardless of the directory in which they live. However, files with identical filenames replace each other. Files in /etc/kernel/install.d/ take precedence over files with the same name | |
in /usr/lib/kernel/install.d/. This can be used to override a system-supplied executables with a local file if needed; a symbolic link in /etc/kernel/install.d/ with the same name as an executable in /usr/lib/kernel/install.d/, pointing to /dev/null, disables the executable entirely. Executables must have the extension ".install"; other extensions are ignored. | |
COMMANDS | |
The following commands are understood: | |
add KERNEL-VERSION KERNEL-IMAGE | |
+ man key.dns_resolver | |
+ head -n 20 | |
KEY.DNS_RESOLVER(8) Linux Key Management Utilities KEY.DNS_RESOLVER(8) | |
NAME | |
key.dns_resolver - Upcall for request-key to handle dns_resolver keys | |
SYNOPSIS | |
/sbin/key.dns_resolver <key> | |
/sbin/key.dns_resolver -D [-v] [-v] <keydesc> <calloutinfo> | |
DESCRIPTION | |
This program is invoked by request-key on behalf of the kernel when kernel services (such as NFS, CIFS and AFS) want to perform a hostname lookup and the kernel does not have the key cached. It is not ordinarily intended to be called directly. | |
It can be called in debugging mode to test its functionality by passing a -D flag on the command line. For this to work, the key description and the callout information must be supplied. Verbosity can be increased by supplying one or more -v flags. | |
ERRORS | |
All errors will be logged to the syslog. | |
SEE ALSO | |
+ man keyctl | |
+ head -n 20 | |
KEYCTL(1) Linux Key Management Utilities KEYCTL(1) | |
NAME | |
keyctl - Key management facility control | |
SYNOPSIS | |
keyctl --version | |
keyctl show [-x] [<keyring>] | |
keyctl add <type> <desc> <data> <keyring> | |
keyctl padd <type> <desc> <keyring> | |
keyctl request <type> <desc> [<dest_keyring>] | |
keyctl request2 <type> <desc> <info> [<dest_keyring>] | |
keyctl prequest2 <type> <desc> [<dest_keyring>] | |
keyctl update <key> <data> | |
keyctl pupdate <key> | |
keyctl newring <name> <keyring> | |
keyctl revoke <key> | |
keyctl clear <keyring> | |
+ man killall | |
+ head -n 20 | |
<standard input>:172: name expected (got `\{'): treated as missing | |
KILLALL(1) User Commands KILLALL(1) | |
NAME | |
killall - kill processes by name | |
SYNOPSIS | |
killall [-Z, --context pattern] [-e, --exact] [-g, --process-group] [-i, --interactive] [-o, --older-than TIME] [-q, --quiet] [-r, --regexp] [-s, --signal signal] [-u, --user user] [-v, --verbose] [-w, --wait] [-y, --younger-than TIME] [-I, --ignore-case] [-V, --version] [--] name ... | |
killall -l | |
killall -V, --version | |
DESCRIPTION | |
killall sends a signal to all processes running any of the specified commands. If no signal name is specified, SIGTERM is sent. | |
Signals can be specified either by name (e.g. -HUP or -SIGHUP) or by number (e.g. -1) or by option -s. | |
If the command name is not regular expression (option -r) and contains a slash (/), processes executing that particular file will be selected for killing, independent of their name. | |
killall returns a zero return code if at least one process has been killed for each listed command, or no commands were listed and at least one process matched the -u and -Z search criteria. killall returns non-zero otherwise. | |
+ man killall5 | |
+ head -n 20 | |
KILLALL5(8) Linux System Administrator's Manual KILLALL5(8) | |
NAME | |
killall5 -- send a signal to all processes. | |
SYNOPSIS | |
killall5 -signalnumber [-o omitpid[,omitpid..]] [-o omitpid[,omitpid..]..] | |
DESCRIPTION | |
killall5 is the SystemV killall command. It sends a signal to all processes except kernel threads and the processes in its own session, so it won't kill the shell that is running the script it was called from. Its primary (only) use is in the rc scripts found in the /etc/init.d directory. | |
OPTIONS | |
-o omitpid | |
Tells killall5 to omit processes with that process id. | |
NOTES | |
killall5 can also be invoked as pidof, which is simply a (symbolic) link to the killall5 program. | |
+ man kmod | |
+ head -n 20 | |
KMOD(8) kmod KMOD(8) | |
NAME | |
kmod - Program to manage Linux Kernel modules | |
SYNOPSIS | |
kmod [OPTIONS...] [COMMAND] [COMMAND_OPTIONS...] | |
DESCRIPTION | |
kmod is a multi-call binary which implements the programs used to control Linux Kernel modules. Most users will only run it using its other names. | |
OPTIONS | |
-V --version | |
Show the program version and exit. | |
-h --help | |
Show the help message. | |
+ man kpartx | |
+ head -n 20 | |
KPARTX(8) Linux Administrator's Manual KPARTX(8) | |
NAME | |
kpartx - Create device maps from partition tables | |
SYNOPSIS | |
kpartx [-a | -d | -l] [-v] wholedisk | |
DESCRIPTION | |
This tool, derived from util-linux' partx, reads partition tables on specified device and create device maps over partitions segments detected. It is called from hotplug upon device maps creation and deletion. | |
OPTIONS | |
-a Add partition mappings | |
-r Read-only partition mappings | |
-d Delete partition mappings | |
+ man kpatch | |
+ head -n 20 | |
man(1) kpatch man page man(1) | |
NAME | |
kpatch - hot patch module management | |
SYNOPSIS | |
kpatch <command> [<args>] | |
DESCRIPTION | |
kpatch is a user script that manages installing, loading, and displaying information about kernel patch modules installed on the system. | |
COMMANDS | |
install [-k|--kernel-version=<kernel version>] <module> | |
install patch module to be loaded at boot | |
uninstall [-k|--kernel-version=<kernel version>] <module> | |
uninstall patch module | |
+ man l. | |
+ head -n 20 | |
No manual entry for l. | |
+ man last | |
+ head -n 20 | |
LAST,LASTB(1) Linux System Administrator's Manual LAST,LASTB(1) | |
NAME | |
last, lastb - show listing of last logged in users | |
SYNOPSIS | |
last [-R] [-num] [ -n num ] [-adFiowx] [ -f file ] [ -t YYYYMMDDHHMMSS ] [name...] [tty...] | |
lastb [-R] [-num] [ -n num ] [ -f file ] [-adFiowx] [name...] [tty...] | |
DESCRIPTION | |
Last searches back through the file /var/log/wtmp (or the file designated by the -f flag) and displays a list of all users logged in (and out) since that file was created. Names of users and tty's can be given, in which case last will show only those entries matching the arguments. Names of ttys can be abbreviated, thus last 0 is the same as last tty0. | |
When last catches a SIGINT signal (generated by the interrupt key, usually control-C) or a SIGQUIT signal (generated by the quit key, usually control-\), last will show how far it has searched through the file; in the case of the SIGINT signal last will then terminate. | |
The pseudo user reboot logs in each time the system is rebooted. Thus last reboot will show a log of all reboots since the log file was created. | |
Lastb is the same as last, except that by default it shows a log of the file /var/log/btmp, which contains all the bad login attempts. | |
+ man lastb | |
+ head -n 20 | |
LAST,LASTB(1) Linux System Administrator's Manual LAST,LASTB(1) | |
NAME | |
last, lastb - show listing of last logged in users | |
SYNOPSIS | |
last [-R] [-num] [ -n num ] [-adFiowx] [ -f file ] [ -t YYYYMMDDHHMMSS ] [name...] [tty...] | |
lastb [-R] [-num] [ -n num ] [ -f file ] [-adFiowx] [name...] [tty...] | |
DESCRIPTION | |
Last searches back through the file /var/log/wtmp (or the file designated by the -f flag) and displays a list of all users logged in (and out) since that file was created. Names of users and tty's can be given, in which case last will show only those entries matching the arguments. Names of ttys can be abbreviated, thus last 0 is the same as last tty0. | |
When last catches a SIGINT signal (generated by the interrupt key, usually control-C) or a SIGQUIT signal (generated by the quit key, usually control-\), last will show how far it has searched through the file; in the case of the SIGINT signal last will then terminate. | |
The pseudo user reboot logs in each time the system is rebooted. Thus last reboot will show a log of all reboots since the log file was created. | |
Lastb is the same as last, except that by default it shows a log of the file /var/log/btmp, which contains all the bad login attempts. | |
+ man lastcomm | |
+ head -n 20 | |
LASTCOMM(1) General Commands Manual LASTCOMM(1) | |
NAME | |
lastcomm - print out information about previously executed commands. | |
SYNOPSIS | |
lastcomm | |
[ command-name ... ] | |
[ user-name ... ] | |
[ terminal-name ... ] | |
[ OPTION ... ] | |
DESCRIPTION | |
lastcomm prints out information about previously executed commands. If no arguments are specified, lastcomm will print info about all of the commands in acct (the record file). If called with one or more of command-name, user-name, or terminal-name, only records containing those items will be displayed. For example, to find out which users used command `a.out' and which users were logged into | |
`tty0', type: | |
lastcomm a.out tty0 | |
This will print any entry for which `a.out' or `tty0' matches in any of the record's fields (command, name, or terminal). If you want to find only items that match *all* of the arguments on the command line, you must use the '-strict-match' option. For example, to list all of the executions of command a.out by user root on terminal tty0, type: | |
+ man lastlog | |
+ head -n 20 | |
LASTLOG(8) System Management Commands LASTLOG(8) | |
NAME | |
lastlog - reports the most recent login of all users or of a given user | |
SYNOPSIS | |
lastlog [options] | |
DESCRIPTION | |
lastlog formats and prints the contents of the last login log /var/log/lastlog file. The login-name, port, and last login time will be printed. The default (no flags) causes lastlog entries to be printed, sorted by their order in /etc/passwd. | |
OPTIONS | |
The options which apply to the lastlog command are: | |
-b, --before DAYS | |
Print only lastlog records older than DAYS. | |
-C, --clear | |
+ man lchage | |
+ head -n 20 | |
lchage(1) General Commands Manual lchage(1) | |
NAME | |
lchage - Display or change user password policy | |
SYNOPSIS | |
lchage [OPTION]... user | |
DESCRIPTION | |
Displays or allows changing password policy of user. | |
OPTIONS | |
-d, --date=days | |
Set the date of last password change to days after Jan 1 1970. | |
+ man lchfn | |
+ head -n 20 | |
lchfn(1) General Commands Manual lchfn(1) | |
NAME | |
lchfn - Change finger information | |
SYNOPSIS | |
lchfn [OPTION]... [user] | |
DESCRIPTION | |
Displays and allows changing information about user that is available using the finger(1) command (usually stored in the "gecos" field of /etc/passwd). | |
If the user argument is not provided, username of the invoking user is used; the user argument is ignored if lchfn is run set-uid to a different user. | |
Entering an empty string (by pressing Enter) at a prompt is interpreted as accepting a default value; to erase an attribute (or to use an empty string as the attribute value), enter a single dot character. | |
+ man lchsh | |
+ head -n 20 | |
lchsh(1) General Commands Manual lchsh(1) | |
NAME | |
lchsh - Change login shell | |
SYNOPSIS | |
lchsh [OPTION]... [user] | |
DESCRIPTION | |
Displays and allows changing login shell of user. | |
If the user argument is not provided, username of the invoking user is used; the user argument is ignored if lchsh is run set-uid to a different user. | |
Entering an empty string (by pressing Enter) at the "New Shell" prompt is interpreted as accepting the current value. | |
+ man ld | |
+ head -n 20 | |
LD(1) GNU Development Tools LD(1) | |
NAME | |
ld - The GNU linker | |
SYNOPSIS | |
ld [options] objfile ... | |
DESCRIPTION | |
ld combines a number of object and archive files, relocates their data and ties up symbol references. Usually the last step in compiling a program is to run ld. | |
ld accepts Linker Command Language files written in a superset of AT&T's Link Editor Command Language syntax, to provide explicit and total control over the linking process. | |
This man page does not describe the command language; see the ld entry in "info" for full details on the command language and on other aspects of the GNU linker. | |
This version of ld uses the general purpose BFD libraries to operate on object files. This allows ld to read, combine, and write object files in many different formats---for example, COFF or "a.out". Different formats may be linked together to produce any available kind of object file. | |
Aside from its flexibility, the GNU linker is more helpful than other linkers in providing diagnostic information. Many linkers abandon execution immediately upon encountering an error; whenever possible, ld continues executing, allowing you to identify other errors (or, in some cases, to get an output file in spite of the error). | |
+ man ld.bfd | |
+ head -n 20 | |
No manual entry for ld.bfd | |
+ man ld.gold | |
+ head -n 20 | |
No manual entry for ld.gold | |
+ man ldattach | |
+ head -n 20 | |
LDATTACH(8) System Administration LDATTACH(8) | |
NAME | |
ldattach - attach a line discipline to a serial line | |
SYNOPSIS | |
ldattach [-1278denoVh] [-i iflag] [-s speed] ldisc device | |
DESCRIPTION | |
The ldattach daemon opens the specified device file (which should refer to a serial device) and attaches the line discipline ldisc to it for processing of the sent and/or received data. It then goes into the background keeping the device open so that the line discipline stays loaded. | |
The line discipline ldisc may be specified either by name or by number. | |
In order to detach the line discipline, kill(1) the ldattach process. | |
With no arguments, ldattach prints usage information. | |
LINE DISCIPLINES | |
+ man lexgrog | |
+ head -n 20 | |
LEXGROG(1) Manual pager utils LEXGROG(1) | |
NAME | |
lexgrog - parse header information in man pages | |
SYNOPSIS | |
lexgrog [-m|-c] [-dfw?V] [-E encoding] file ... | |
DESCRIPTION | |
lexgrog is an implementation of the traditional “groff guess” utility in lex. It reads the list of files on its command line as either man page source files or preformatted “cat” pages, and displays their name and description as used by apropos and whatis, the list of preprocessing filters required by the man page before it is passed to nroff or troff, or both. | |
If its input is badly formatted, lexgrog will print “parse failed”; this may be useful for external programs that need to check man pages for correctness. If one of lexgrog's input files is “-”, it will read from standard input; if any input file is compressed, a decompressed version will be read automatically. | |
OPTIONS | |
-d, --debug | |
Print debugging information. | |
-m, --man | |
+ man lgroupadd | |
+ head -n 20 | |
lgroupadd(1) General Commands Manual lgroupadd(1) | |
NAME | |
lgroupadd - Add an user group | |
SYNOPSIS | |
lgroupadd [OPTION]... group | |
DESCRIPTION | |
Adds a new user group with name group. | |
OPTIONS | |
-g, --gid=gid | |
Use group ID gid for the newly created group. A group ID is selected automatically if this option is not present. | |
+ man lgroupdel | |
+ head -n 20 | |
lgroupdel(1) General Commands Manual lgroupdel(1) | |
NAME | |
lgroupdel - Delete an user group | |
SYNOPSIS | |
lgroupdel [OPTION]... group | |
DESCRIPTION | |
Deletes the user group with name group. | |
OPTIONS | |
-i, --interactive | |
Ask all questions when connecting to the user database, even if default answers are set up in libuser configuration. | |
+ man lgroupmod | |
+ head -n 20 | |
lgroupmod(1) General Commands Manual lgroupmod(1) | |
NAME | |
lgroupmod - Modify an user group | |
SYNOPSIS | |
lgroupmod [OPTION]... group | |
DESCRIPTION | |
Modifies the user group with name group. | |
OPTIONS | |
-A, --admin-add=list | |
Add users in comma-separated list among group's administrators. | |
+ man lid | |
+ head -n 20 | |
lid(1) General Commands Manual lid(1) | |
NAME | |
lid - Display user's groups or group's users | |
SYNOPSIS | |
lid [OPTION]... [name] | |
DESCRIPTION | |
Displays information about groups containing user name, or users contained in group name. | |
By default lid lists groups containing user name, or groups containing the invoking user if name is not specified; the mode of operation can be changed using the -g option. | |
OPTIONS | |
-g, --group | |
+ man linux-boot-prober | |
+ head -n 20 | |
linux-boot-prober(1) General Commands Manual linux-boot-prober(1) | |
NAME | |
linux-boot-prober — Determine boot characteristics of a specified device. | |
SYNOPSIS | |
linux-boot-prober <partition> | |
DESCRIPTION | |
The linux-boot-prober utility will try to work out how to boot the linux root partition specified by <partition>. If successful, it will outoput one or more lines of the form: | |
<root partition>:<boot partition>:<label>:<kernel path>:<initrd path>:<kernel parameters> | |
For example, for a system with a kernel at /boot/vmlinuz and an initramfs at /boot/initrd.gz, and with / on /dev/sda2 and /boot on /dev/sda1, the command "linux-boot-prober /dev/sda1" will display: | |
/dev/sda2:/dev/sda1:Linux:/vmlinuz:/initrd.gz:root=/dev/sda1 | |
Some partitions will not be displayed by linux-boot-prober. If a partition is mounted on /, /target, or /target/boot, it will be skipped. | |
+ man linux32 | |
+ head -n 20 | |
SETARCH(8) System Administration SETARCH(8) | |
NAME | |
setarch - change reported architecture in new program environment and set personality flags | |
SYNOPSIS | |
setarch arch [options] [program [argument...]] | |
arch [options] [program [argument...]] | |
setarch --list|-h|-V | |
DESCRIPTION | |
setarch currently only affects the output of uname -m. For example, on an AMD64 system, running setarch i386 program will cause program to see i686 instead of x86_64 as the machine type. It also allows to set various personality options. The default program is /bin/sh. | |
OPTIONS | |
--list List the architectures that setarch knows about. Whether setarch can actually set each of these architectures depends on the running kernel. | |
+ man linux64 | |
+ head -n 20 | |
SETARCH(8) System Administration SETARCH(8) | |
NAME | |
setarch - change reported architecture in new program environment and set personality flags | |
SYNOPSIS | |
setarch arch [options] [program [argument...]] | |
arch [options] [program [argument...]] | |
setarch --list|-h|-V | |
DESCRIPTION | |
setarch currently only affects the output of uname -m. For example, on an AMD64 system, running setarch i386 program will cause program to see i686 instead of x86_64 as the machine type. It also allows to set various personality options. The default program is /bin/sh. | |
OPTIONS | |
--list List the architectures that setarch knows about. Whether setarch can actually set each of these architectures depends on the running kernel. | |
+ man ll | |
+ head -n 20 | |
No manual entry for ll | |
+ man lnewusers | |
+ head -n 20 | |
lnewusers(1) General Commands Manual lnewusers(1) | |
NAME | |
lnewusers - Create new user accounts | |
SYNOPSIS | |
lnewusers [OPTION]... | |
DESCRIPTION | |
Creates new user accounts using data read from standard input. | |
The input data consists of lines, each line has 7 colon-separated fields: | |
User name | |
+ man lnstat | |
+ head -n 20 | |
LNSTAT(8) System Manager's Manual LNSTAT(8) | |
NAME | |
lnstat - unified linux network statistics | |
SYNOPSIS | |
lnstat [options] | |
DESCRIPTION | |
This manual page documents briefly the lnstat command. | |
lnstat is a generalized and more feature-complete replacement for the old rtstat program. It is commonly used to periodically print a selection of statistical values exported by the kernel. In addition to routing cache statistics, it supports any kind of statistics the linux kernel exports via a file in /proc/net/stat/. | |
Each file in /proc/net/stat/ contains a header line listing the column names. These names are used by lnstat as keys for selecting which statistics to print. For every CPU present in the system, a line follows which lists the actual values for each column of the file. lnstat sums these values up (which in fact are counters) before printing them. After each interval, only the difference to the last | |
value is printed. | |
Files and columns may be selected by using the -f and -k parameters. By default, all columns of all files are printed. | |
+ man load_policy | |
+ head -n 20 | |
LOAD_POLICY(8) NSA LOAD_POLICY(8) | |
NAME | |
load_policy - load a new SELinux policy into the kernel | |
SYNOPSIS | |
load_policy [-qi] | |
DESCRIPTION | |
load_policy loads the installed policy file into the kernel. The existing policy boolean values are automatically preserved across policy reloads rather than being reset to the default values in the policy file. | |
OPTIONS | |
-q suppress warning messages. | |
-i initial policy load. Only use this if this is the first time policy is being loaded since boot (usually called from initramfs). | |
+ man loadkeys | |
+ head -n 20 | |
LOADKEYS(1) General Commands Manual LOADKEYS(1) | |
NAME | |
loadkeys - load keyboard translation tables | |
SYNOPSIS | |
loadkeys [ -a --ascii ] [ [ -b --bkeymap ] [ -c --clearcompose ] [ -C '<FILE>' | --console=<FILE> ] [ -d --default ] [ -h --help ] [ -m --mktable ] [ -p --parse ] [ -q --quiet ] [ -s --clearstrings ] [ -u --unicode ] [ -v --verbose ] [ -V --version ] [ filename... ] | |
DESCRIPTION | |
The program loadkeys reads the file or files specified by filename.... Its main purpose is to load the kernel keymap for the console. You can specify console device by the -C (or --console ) option. | |
RESET TO DEFAULT | |
If the -d (or --default ) option is given, loadkeys loads a default keymap, probably the file defkeymap.map either in /lib/kbd/keymaps or in /usr/src/linux/drivers/char. (Probably the former was user-defined, while the latter is a qwerty keyboard map for PCs - maybe not what was desired.) Sometimes, with a strange keymap loaded (with the minus on some obscure unknown modifier combination) it is eas‐ | |
ier to type `loadkeys defkeymap'. | |
LOAD KERNEL KEYMAP | |
The main function of loadkeys is to load or modify the keyboard driver's translation tables. When specifying the file names, standard input can be denoted by dash (-). If no file is specified, the data is read from the standard input. | |
+ man loadunimap | |
+ head -n 20 | |
LOADUNIMAP(8) System Manager's Manual LOADUNIMAP(8) | |
NAME | |
loadunimap - load the kernel unicode-to-font mapping table | |
SYNOPSIS | |
loadunimap [ -C console ] [ -o oldmap ] [ map ] | |
DESCRIPTION | |
The loadunimap command is obsolete - its function is now built-in into setfont. However, for backwards compatibility it is still available as a separate command. | |
The program loadunimap loads the specified map in the kernel unicode-to-font mapping table. If no map is given def is assumed. The default extension (that can be omitted) is .uni. | |
If the -o oldmap option is given, the old map is saved in the file specified. | |
On Linux 2.6.1 and later one can specify the console device using the -C option. | |
Usually one does not call loadunimap directly - its function is also built into setfont. | |
+ man localectl | |
+ head -n 20 | |
LOCALECTL(1) localectl LOCALECTL(1) | |
NAME | |
localectl - Control the system locale and keyboard layout settings | |
SYNOPSIS | |
localectl [OPTIONS...] {COMMAND} | |
DESCRIPTION | |
localectl may be used to query and change the system locale and keyboard layout settings. | |
The system locale controls the language settings of system services and of the UI before the user logs in, such as the display manager, as well as the default for users after login. | |
The keyboard settings control the keyboard layout used on the text console and of the graphical UI before the user logs in, such as the display manager, as well as the default for users after login. | |
Use systemd-firstboot(1) to initialize the system locale for mounted (but not booted) system images. | |
OPTIONS | |
+ man locate | |
+ head -n 20 | |
locate(1) General Commands Manual locate(1) | |
NAME | |
locate - find files by name | |
SYNOPSIS | |
locate [OPTION]... PATTERN... | |
DESCRIPTION | |
locate reads one or more databases prepared by updatedb(8) and writes file names matching at least one of the PATTERNs to standard output, one per line. | |
If --regex is not specified, PATTERNs can contain globbing characters. If any PATTERN contains no globbing characters, locate behaves as if the pattern were *PATTERN*. | |
By default, locate does not check whether files found in database still exist (but it does require all parent directories to exist if the database was built with --require-visibility no). locate can never report files created after the most recent update of the relevant database. | |
+ man logger | |
+ head -n 20 | |
LOGGER(1) User Commands LOGGER(1) | |
NAME | |
logger - enter messages into the system log | |
SYNOPSIS | |
logger [options] [message] | |
DESCRIPTION | |
logger makes entries in the system log. | |
When the optional message argument is present, it is written to the log. If it is not present, and the -f option is not given either, then standard input is logged. | |
OPTIONS | |
-d, --udp | |
Use datagrams (UDP) only. By default the connection is tried to the syslog port defined in /etc/services, which is often 514 . | |
-e, --skip-empty | |
+ man login | |
+ head -n 20 | |
LOGIN(1) User Commands LOGIN(1) | |
NAME | |
login - begin session on the system | |
SYNOPSIS | |
login [ -p ] [ -h host ] [ -H ] [ -f username | username ] | |
DESCRIPTION | |
login is used when signing onto a system. If no argument is given, login prompts for the username. | |
The user is then prompted for a password, where appropriate. Echoing is disabled to prevent revealing the password. Only a small number of password failures are permitted before login exits and the communications link is severed. | |
If password aging has been enabled for the account, the user may be prompted for a new password before proceeding. He will be forced to provide his old password and the new password before continuing. Please refer to passwd(1) for more information. | |
The user and group ID will be set according to their values in the /etc/passwd file. There is one exception if the user ID is zero: in this case, only the primary group ID of the account is set. This should allow the system administrator to login even in case of network problems. The value for $HOME, $USER, $SHELL, $PATH, $LOGNAME, and $MAIL are set according to the appropriate fields in the pass‐ | |
word entry. $PATH defaults to /usr/local/bin:/bin:/usr/bin for normal users, and to /usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin for root, if not otherwise configured. | |
+ man loginctl | |
+ head -n 20 | |
LOGINCTL(1) loginctl LOGINCTL(1) | |
NAME | |
loginctl - Control the systemd login manager | |
SYNOPSIS | |
loginctl [OPTIONS...] {COMMAND} [NAME...] | |
DESCRIPTION | |
loginctl may be used to introspect and control the state of the systemd(1) login manager systemd-logind.service(8). | |
OPTIONS | |
The following options are understood: | |
--no-ask-password | |
Do not query the user for authentication for privileged operations. | |
-p, --property= | |
+ man logrotate | |
+ head -n 20 | |
LOGROTATE(8) System Administrator's Manual LOGROTATE(8) | |
NAME | |
logrotate ‐ rotates, compresses, and mails system logs | |
SYNOPSIS | |
logrotate [-dv] [-f|--force] [-s|--state file] config_file .. | |
DESCRIPTION | |
logrotate is designed to ease administration of systems that generate large numbers of log files. It allows automatic rotation, compression, removal, and mailing of log files. Each log file may be handled daily, weekly, monthly, or when it grows too large. | |
Normally, logrotate is run as a daily cron job. It will not modify a log multiple times in one day unless the criterion for that log is based on the log's size and logrotate is being run multiple times each day, or unless the -f or --force option is used. | |
Any number of config files may be given on the command line. Later config files may override the options given in earlier files, so the order in which the logrotate config files are listed is important. Normally, a single config file which includes any other config files which are needed should be used. See below for more information on how to use the include directive to accomplish this. If a | |
directory is given on the command line, every file in that directory is used as a config file. | |
If no command line arguments are given, logrotate will print version and copyright information, along with a short usage summary. If any errors occur while rotating logs, logrotate will exit with non-zero status. | |
+ man logsave | |
+ head -n 20 | |
LOGSAVE(8) System Manager's Manual LOGSAVE(8) | |
NAME | |
logsave - save the output of a command in a logfile | |
SYNOPSIS | |
logsave [ -asv ] logfile cmd_prog [ ... ] | |
DESCRIPTION | |
The logsave program will execute cmd_prog with the specified argument(s), and save a copy of its output to logfile. If the containing directory for logfile does not exist, logsave will accumulate the output in memory until it can be written out. A copy of the output will also be written to standard output. | |
If cmd_prog is a single hyphen ('-'), then instead of executing a program, logsave will take its input from standard input and save it in logfile | |
logsave is useful for saving the output of initial boot scripts until the /var partition is mounted, so the output can be written to /var/log. | |
OPTIONS | |
-a This option will cause the output to be appended to logfile, instead of replacing its current contents. | |
+ man look | |
+ head -n 20 | |
LOOK(1) User Commands LOOK(1) | |
NAME | |
look - display lines beginning with a given string | |
SYNOPSIS | |
look [options] string [file] | |
DESCRIPTION | |
The look utility displays any lines in file which contain string. As look performs a binary search, the lines in file must be sorted (where sort(1) was given the same options -d and/or -f that look is invoked with). | |
If file is not specified, the file /usr/share/dict/words is used, only alphanumeric characters are compared and the case of alphabetic characters is ignored. | |
OPTIONS | |
-a, --alternative | |
Use the alternative dictionary file. | |
-d, --alphanum | |
+ man losetup | |
+ head -n 20 | |
LOSETUP(8) System Administration LOSETUP(8) | |
NAME | |
losetup - set up and control loop devices | |
SYNOPSIS | |
Get info: | |
losetup loopdev | |
losetup -l [-a] | |
losetup -j file [-o offset] | |
Detach a loop device: | |
losetup -d loopdev... | |
+ man lpasswd | |
+ head -n 20 | |
lpasswd(1) General Commands Manual lpasswd(1) | |
NAME | |
lpasswd - Change group or user password | |
SYNOPSIS | |
lpasswd [OPTION]... [name] | |
DESCRIPTION | |
Changes password of user or group name. | |
If the name argument is not provided, username of the invoking user is used; the name argument is ignored if lpasswd is run set-uid to a different user. | |
Entering an empty password (by pressing Enter) aborts the password setting operation. | |
+ man lsattr | |
+ head -n 20 | |
LSATTR(1) General Commands Manual LSATTR(1) | |
NAME | |
lsattr - list file attributes on a Linux second extended file system | |
SYNOPSIS | |
lsattr [ -RVadv ] [ files... ] | |
DESCRIPTION | |
lsattr lists the file attributes on a second extended file system. See chattr(1) for a description of the attributes and what they mean. | |
OPTIONS | |
-R Recursively list attributes of directories and their contents. | |
-V Display the program version. | |
-a List all files in directories, including files that start with `.'. | |
+ man lsblk | |
+ head -n 20 | |
LSBLK(8) System Administration LSBLK(8) | |
NAME | |
lsblk - list block devices | |
SYNOPSIS | |
lsblk [options] [device...] | |
DESCRIPTION | |
lsblk lists information about all available or the specified block devices. The lsblk command reads the sysfs filesystem and udev db to gather information. | |
The command prints all block devices (except RAM disks) in a tree-like format by default. Use lsblk --help to get a list of all available columns. | |
The default output, as well as the default output from options like --fs and --topology, is subject to change. So whenever possible, you should avoid using default outputs in your scripts. Always explicitly define expected columns by using --output columns-list in environments where a stable output is required. | |
Note that lsblk might be executed in time when udev does not have all information about recently added or modified devices yet. In this case it is recommended to use udevadm settle before lsblk to synchronize with udev. | |
OPTIONS | |
+ man lscpu | |
+ head -n 20 | |
LSCPU(1) User Commands LSCPU(1) | |
NAME | |
lscpu - display information about the CPU architecture | |
SYNOPSIS | |
lscpu [-a|-b|-c|-J] [-x] [-y] [-s directory] [-e[=list]|-p[=list]] | |
lscpu -h|-V | |
DESCRIPTION | |
lscpu gathers CPU architecture information from sysfs, /proc/cpuinfo and any applicable architecture-specific libraries (e.g. librtas on Powerpc). The command output can be optimized for parsing or for easy readability by humans. The information includes, for example, the number of CPUs, threads, cores, sockets, and Non-Uniform Memory Access (NUMA) nodes. There is also information about the CPU | |
caches and cache sharing, family, model, bogoMIPS, byte order, and stepping. | |
In virtualized environments, the CPU architecture information displayed reflects the configuration of the guest operating system which is typically different from the physical (host) system. On architectures that support retrieving physical topology information, lscpu also displays the number of physical sockets, chips, cores in the host system. | |
Options that result in an output table have a list argument. Use this argument to customize the command output. Specify a comma-separated list of column labels to limit the output table to only the specified columns, arranged in the specified order. See COLUMNS for a list of valid column labels. The column labels are not case sensitive. | |
Not all columns are supported on all architectures. If an unsupported column is specified, lscpu prints the column but does not provide any data for it. | |
+ man lsinitrd | |
+ head -n 20 | |
LSINITRD(1) dracut LSINITRD(1) | |
NAME | |
lsinitrd - tool to show the contents of an initramfs image | |
SYNOPSIS | |
lsinitrd [OPTION...] [<image> [<filename> [<filename> [...] ]]] | |
lsinitrd [OPTION...] -k <kernel-version> | |
DESCRIPTION | |
lsinitrd shows the contents of an initramfs image. if <image> is omitted, then lsinitrd uses the default image /boot/<machine-id>/<kernel-version>/initrd or /boot/initramfs-<kernel-version>.img. | |
OPTIONS | |
-h, --help | |
print a help message and exit. | |
-s, --size | |
+ man lsipc | |
+ head -n 20 | |
LSIPC(1) User Commands LSIPC(1) | |
NAME | |
lsipc - show information on IPC facilities currently employed in the system | |
SYNOPSIS | |
lsipc [options] | |
DESCRIPTION | |
lsipc shows information on the inter-process communication facilities for which the calling process has read access. | |
OPTIONS | |
-i, --id id | |
Show full details on just the one resource element identified by id. This option needs to be combined with one of the three resource options: -m, -q or -s. It is possible to override the default output format for this option with the --list, --raw, --json or --export option. | |
-g, --global | |
Show system-wide usage and limits of IPC resources. This option may be combined with one of the three resource options: -m, -q or -s. The default is to show information about all resources. | |
+ man lslocks | |
+ head -n 20 | |
LSLOCKS(8) System Administration LSLOCKS(8) | |
NAME | |
lslocks - list local system locks | |
SYNOPSIS | |
lslocks [options] | |
DESCRIPTION | |
lslocks lists information about all the currently held file locks in a Linux system. | |
OPTIONS | |
-i, --noinaccessible | |
Ignore lock files which are inaccessible for the current user. | |
+ man lslogins | |
+ head -n 20 | |
LSLOGINS(1) User Commands LSLOGINS(1) | |
NAME | |
lslogins - display information about known users in the system | |
SYNOPSIS | |
lslogins [options] [-s|-u[=UID]] [-g groups] [-l logins] | |
DESCRIPTION | |
Examine the wtmp and btmp logs, /etc/shadow (if necessary) and /etc/passwd and output the desired data. | |
The default action is to list info about all the users in the system. | |
OPTIONS | |
Mandatory arguments to long options are mandatory for short options too. | |
-a, --acc-expiration | |
Display data about the date of last password change and the account expiration date (see shadow(5) for more info). (Requires root privileges.) | |
+ man lsmcli | |
+ head -n 20 | |
<standard input>:338: cannot use a space as a starting delimiter | |
LSMCLI(1) libStorageMgmt LSMCLI(1) | |
NAME | |
lsmcli - libStorageMgmt command line interface | |
SYNOPSIS | |
lsmcli command [GLOBAL OPTIONS]...[COMMAND OPTIONS]... | |
DESCRIPTION | |
lsmcli is the command line tool for the libStorageMgmt library. This tool allows users to do one off storage related management operations or to script management of their storage. | |
PREREQUISITES | |
* libStorageMgmt daemon. | |
The daemon 'lsmd' is required by lsmcli. | |
+ man lsmd | |
+ head -n 20 | |
LSMD(1) libStorageMgmt plug-in daemon LSMD(1) | |
NAME | |
Daemon - lsmd | |
DESCRIPTION | |
libStorageMgmt plug-in daemon. Plug-ins execute in their own process space for fault isolation and to accommodate different plug-in licensing requirements. Runs as an unprivileged user. | |
OPTIONS | |
--plugindir = The directory where the plugins are located | |
--socketdir = The directory for IPC sockets | |
--confdir = The directory where the config file are located | |
-v = Verbose logging | |
+ man lsmem | |
+ head -n 20 | |
LSMEM(1) User Commands LSMEM(1) | |
NAME | |
lsmem - list the ranges of available memory with their online status | |
SYNOPSIS | |
lsmem [options] | |
DESCRIPTION | |
The lsmem command lists the ranges of available memory with their online status. The listed memory blocks correspond to the memory block representation in sysfs. The command also shows the memory block size and the amount of memory in online and offline state. | |
The default output compatible with original implementaion from s390-tools, but it's strongly recommended to avoid using default outputs in your scripts. Always explicitly define expected columns by using the --output option together with a columns list in environments where a stable output is required. | |
Not all columns are supported on all systems. If an unsupported column is specified, lsmem prints the column but does not provide any data for it. | |
Use the --help option to see the columns description. | |
+ man lsmod | |
+ head -n 20 | |
LSMOD(8) lsmod LSMOD(8) | |
NAME | |
lsmod - Show the status of modules in the Linux Kernel | |
SYNOPSIS | |
lsmod | |
DESCRIPTION | |
lsmod is a trivial program which nicely formats the contents of the /proc/modules, showing what kernel modules are currently loaded. | |
COPYRIGHT | |
This manual page originally Copyright 2002, Rusty Russell, IBM Corporation. Maintained by Jon Masters and others. | |
SEE ALSO | |
insmod(8), modprobe(8), modinfo(8) depmod(8) | |
AUTHORS | |
+ man lsns | |
+ head -n 20 | |
LSNS(8) System Administration LSNS(8) | |
NAME | |
lsns - list namespaces | |
SYNOPSIS | |
lsns [options] [namespace] | |
DESCRIPTION | |
lsns lists information about all the currently accessible namespaces or about the given namespace. The namespace identifier is an inode number. | |
The default output is subject to change. So whenever possible, you should avoid using default outputs in your scripts. Always explicitly define expected columns by using the --output option together with a columns list in environments where a stable output is required. | |
Note that lsns reads information directly from the /proc filesystem and for non-root users it may return incomplete information. The current /proc filesystem may be unshared and affected by a PID namespace (see unshare --mount-proc for more details). lsns is not able to see persistent namespaces without processes where the namespace instance is held by a bind mount to /proc/pid/ns/type. | |
+ man lsof | |
+ head -n 20 | |
LSOF(8) System Manager's Manual LSOF(8) | |
NAME | |
lsof - list open files | |
SYNOPSIS | |
lsof [ -?abChlnNOPRtUvVX ] [ -A A ] [ -c c ] [ +c c ] [ +|-d d ] [ +|-D D ] [ +|-e s ] [ +|-f [cfgGn] ] [ -F [f] ] [ -g [s] ] [ -i [i] ] [ -k k ] [ -K k ] [ +|-L [l] ] [ +|-m m ] [ +|-M ] [ -o [o] ] [ -p s ] [ +|-r [t[m<fmt>]] ] [ -s [p:s] ] [ -S [t] ] [ -T [t] ] [ -u s ] [ +|-w ] [ -x [fl] ] [ -z [z] ] [ -Z [Z] ] [ -- ] [names] | |
DESCRIPTION | |
Lsof revision 4.87 lists on its standard output file information about files opened by processes for the following UNIX dialects: | |
Apple Darwin 9 and Mac OS X 10.[567] | |
FreeBSD 4.9 and 6.4 for x86-based systems | |
FreeBSD 8.2, 9.0 and 10.0 for AMD64-based systems | |
Linux 2.1.72 and above for x86-based systems | |
Solaris 9, 10 and 11 | |
(See the DISTRIBUTION section of this manual page for information on how to obtain the latest lsof revision.) | |
+ man lspci | |
+ head -n 20 | |
lspci(8) The PCI Utilities lspci(8) | |
NAME | |
lspci - list all PCI devices | |
SYNOPSIS | |
lspci [options] | |
DESCRIPTION | |
lspci is a utility for displaying information about PCI buses in the system and devices connected to them. | |
By default, it shows a brief list of devices. Use the options described below to request either a more verbose output or output intended for parsing by other programs. | |
If you are going to report bugs in PCI device drivers or in lspci itself, please include output of "lspci -vvx" or even better "lspci -vvxxx" (however, see below for possible caveats). | |
Some parts of the output, especially in the highly verbose modes, are probably intelligible only to experienced PCI hackers. For exact definitions of the fields, please consult either the PCI specifications or the header.h and /usr/include/linux/pci.h include files. | |
Access to some parts of the PCI configuration space is restricted to root on many operating systems, so the features of lspci available to normal users are limited. However, lspci tries its best to display as much as available and mark all other information with <access denied> text. | |
+ man luseradd | |
+ head -n 20 | |
luseradd(1) General Commands Manual luseradd(1) | |
NAME | |
luseradd - Add an user | |
SYNOPSIS | |
luseradd [OPTION]... user | |
DESCRIPTION | |
Adds an user with name user. | |
OPTIONS | |
-c, --gecos=gecos | |
Set the GECOS field to gecos. The GECOS field is traditionally used to store user's real name and other information. | |
+ man luserdel | |
+ head -n 20 | |
luserdel(1) General Commands Manual luserdel(1) | |
NAME | |
luserdel - Delete an user | |
SYNOPSIS | |
luserdel [OPTION]... user | |
DESCRIPTION | |
Deletes the user with name user. | |
OPTIONS | |
-G, --dontremovegroup | |
By default the user's primary group is removed if it has group name user (user's private group). This option disables this behavior. | |
+ man lusermod | |
+ head -n 20 | |
lusermod(1) General Commands Manual lusermod(1) | |
NAME | |
lusermod - Modify an user | |
SYNOPSIS | |
lusermod [OPTION]... user | |
DESCRIPTION | |
Modifies the user with name user. | |
OPTIONS | |
-c, --gecos=gecos | |
Set user's GECOS field to gecos. The GECOS field is traditionally used to store user's real name and other information. | |
+ man lvchange | |
+ head -n 20 | |
LVCHANGE(8) System Manager's Manual LVCHANGE(8) | |
NAME | |
lvchange - Change the attributes of logical volume(s) | |
SYNOPSIS | |
lvchange option_args position_args | |
[ option_args ] | |
-a|--activate y|n|ay | |
--activationmode partial|degraded|complete | |
--addtag Tag | |
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit | |
-A|--autobackup y|n | |
--cachemode writethrough|writeback|passthrough | |
--cachepolicy String | |
--cachesettings String | |
--commandprofile String | |
+ man lvconvert | |
+ head -n 20 | |
LVCONVERT(8) System Manager's Manual LVCONVERT(8) | |
NAME | |
lvconvert - Change logical volume layout | |
SYNOPSIS | |
lvconvert option_args position_args | |
[ option_args ] | |
[ position_args ] | |
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit | |
-b|--background | |
-H|--cache | |
--cachemetadataformat auto|1|2 | |
--cachemode writethrough|writeback|passthrough | |
--cachepolicy String | |
--cachepool LV | |
--cachesettings String | |
+ man lvcreate | |
+ head -n 20 | |
LVCREATE(8) System Manager's Manual LVCREATE(8) | |
NAME | |
lvcreate - Create a logical volume | |
SYNOPSIS | |
lvcreate option_args position_args | |
[ option_args ] | |
[ position_args ] | |
-a|--activate y|n|ay | |
--addtag Tag | |
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit | |
-A|--autobackup y|n | |
-H|--cache | |
--cachemetadataformat auto|1|2 | |
--cachemode writethrough|writeback|passthrough | |
--cachepolicy String | |
+ man lvdisplay | |
+ head -n 20 | |
LVDISPLAY(8) System Manager's Manual LVDISPLAY(8) | |
NAME | |
lvdisplay - Display information about a logical volume | |
SYNOPSIS | |
lvdisplay | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
lvdisplay shows the attributes of LVs, like size, read/write status, snapshot information, etc. | |
lvs(8) is a preferred alternative that shows the same information and more, using a more compact and configurable output format. | |
USAGE | |
lvdisplay | |
[ -a|--all ] | |
+ man lvextend | |
+ head -n 20 | |
LVEXTEND(8) System Manager's Manual LVEXTEND(8) | |
NAME | |
lvextend - Add space to a logical volume | |
SYNOPSIS | |
lvextend option_args position_args | |
[ option_args ] | |
[ position_args ] | |
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit | |
-A|--autobackup y|n | |
--commandprofile String | |
--config String | |
-d|--debug | |
--driverloaded y|n | |
-l|--extents [+]Number[PERCENT] | |
-f|--force | |
+ man lvm | |
+ head -n 20 | |
LVM(8) System Manager's Manual LVM(8) | |
NAME | |
lvm — LVM2 tools | |
SYNOPSIS | |
lvm [command|file] | |
DESCRIPTION | |
The Logical Volume Manager (LVM) provides tools to create virtual block devices from physical devices. Virtual devices may be easier to manage than physical devices, and can have capabilities beyond what the physical devices provide themselves. A Volume Group (VG) is a collection of one or more physical devices, each called a Physical Volume (PV). A Logical Volume (LV) is a virtual block device that | |
can be used by the system or applications. Each block of data in an LV is stored on one or more PV in the VG, according to algorithms implemented by Device Mapper (DM) in the kernel. | |
The lvm command, and other commands listed below, are the command-line tools for LVM. A separate manual page describes each command in detail. | |
If lvm is invoked with no arguments it presents a readline prompt (assuming it was compiled with readline support). LVM commands may be entered interactively at this prompt with readline facilities including history and command name and option completion. Refer to readline(3) for details. | |
If lvm is invoked with argv[0] set to the name of a specific LVM command (for example by using a hard or soft link) it acts as that command. | |
+ man lvmconf | |
+ head -n 20 | |
LVMCONF(8) LVMCONF(8) | |
NAME | |
lvmconf — LVM configuration modifier | |
SYNOPSIS | |
lvmconf [--disable-cluster] [--enable-cluster] [--enable-halvm] [--disable-halvm] [--file <configfile>] [--lockinglib <lib>] [--lockinglibdir <dir>] [--services] [--mirrorservice] [--startstopservices] | |
DESCRIPTION | |
lvmconf is a script that modifies the locking configuration in an lvm configuration file. See lvm.conf(5). In addition to that, it can also set Systemd or SysV services according to changes in the lvm configuration if needed. | |
OPTIONS | |
--disable-cluster | |
Set locking_type to the default non-clustered type. Also reset lvmetad use to its default. | |
--enable-cluster | |
+ man lvmconfig | |
+ head -n 20 | |
LVMCONFIG(8) System Manager's Manual LVMCONFIG(8) | |
NAME | |
lvmconfig - Display and manipulate configuration information | |
SYNOPSIS | |
lvmconfig | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
lvmconfig, lvm config, lvm dumpconfig (for compatibility reasons, to be phased out) produce formatted output from the LVM configuration tree. The sources of the configuration data include lvm.conf(5) and command line settings from --config. | |
USAGE | |
lvmconfig | |
[ -f|--file String ] | |
[ -l|--list ] | |
[ --atversion String ] | |
+ man lvmdiskscan | |
+ head -n 20 | |
LVMDISKSCAN(8) System Manager's Manual LVMDISKSCAN(8) | |
NAME | |
lvmdiskscan - List devices that may be used as physical volumes | |
SYNOPSIS | |
lvmdiskscan | |
[ option_args ] | |
DESCRIPTION | |
lvmdiskscan scans all SCSI, (E)IDE disks, multiple devices and a bunch of other block devices in the system looking for LVM PVs. The size reported is the real device size. Define a filter in lvm.conf(5) to restrict the scan to avoid a CD ROM, for example. | |
This command is deprecated, use pvs instead. | |
USAGE | |
lvmdiskscan | |
[ -l|--lvmpartition ] | |
+ man lvmdump | |
+ head -n 20 | |
LVMDUMP(8) System Manager's Manual LVMDUMP(8) | |
NAME | |
lvmdump — create lvm2 information dumps for diagnostic purposes | |
SYNOPSIS | |
lvmdump [-a] [-c] [-d directory] [-h] [-l] [-m] [-p] [-s] [-u] | |
DESCRIPTION | |
lvmdump is a tool to dump various information concerning LVM2. By default, it creates a tarball suitable for submission along with a problem report. | |
The content of the tarball is as follows: | |
- dmsetup info | |
- table of currently running processes | |
- recent entries from /var/log/messages (containing system messages) | |
- complete lvm configuration and cache (content of /etc/lvm) | |
- list of device nodes present under /dev | |
- list of files present /sys/block | |
+ man lvmetad | |
+ head -n 20 | |
LVMETAD(8) System Manager's Manual LVMETAD(8) | |
NAME | |
lvmetad — LVM metadata cache daemon | |
SYNOPSIS | |
lvmetad [-l level[,level...]] [-p pidfile_path] [-s socket_path] [-t timeout_value] [-f] [-h] [-V] [-?] | |
DESCRIPTION | |
The lvmetad daemon caches LVM metadata so that LVM commands can read metadata from the cache rather than scanning disks. This can be an advantage because scanning disks is time consuming and may interfere with the normal work of the system. lvmetad can be a disadvantage when disk event notifications from the system are unreliable. | |
lvmetad does not read metadata from disks itself. Instead, it relies on an LVM command, like pvscan --cache, to read metadata from disks and send it to lvmetad to be cached. | |
New LVM disks that appear on the system must be scanned before lvmetad knows about them. If lvmetad does not know about a disk, then LVM commands using lvmetad will also not know about it. When disks are added or removed from the system, lvmetad must be updated. | |
lvmetad is usually combined with event-based system services that automatically run pvscan --cache on disks added or removed. This way, the cache is automatically updated with metadata from new disks when they appear. LVM udev rules and systemd services implement this automation. Automatic scanning is usually combined with automatic activation. For more information, see pvscan(8). | |
+ man lvmpolld | |
+ head -n 20 | |
LVMPOLLD(8) System Manager's Manual LVMPOLLD(8) | |
NAME | |
lvmpolld — LVM poll daemon | |
SYNOPSIS | |
lvmpolld [-l|--log {all|wire|debug}] [-p|--pidfile pidfile_path] [-s|--socket socket_path] [-B|--binary lvm_binary_path] [-t|--timeout timeout_value] [-f|--foreground] [-h|--help] [-V|--version] | |
lvmpolld [--dump] | |
DESCRIPTION | |
lvmpolld is polling daemon for LVM. The daemon receives requests for polling of already initialised operations originating in LVM2 command line tool. The requests for polling originate in the lvconvert, pvmove, lvchange or vgchange LVM2 commands. | |
The purpose of lvmpolld is to reduce the number of spawned background processes per otherwise unique polling operation. There should be only one. It also eliminates the possibility of unsolicited termination of background process by external factors. | |
lvmpolld is used by LVM only if it is enabled in lvm.conf(5) by specifying the global/use_lvmpolld setting. If this is not defined in the LVM configuration explicitly then default setting is used instead (see the output of lvmconfig --type default global/use_lvmpolld command). | |
OPTIONS | |
+ man lvmsadc | |
+ head -n 20 | |
LVMSADC(8) LVMSADC(8) | |
NAME | |
lvmsadc — LVM system activity data collector | |
SYNOPSIS | |
lvmsadc | |
DESCRIPTION | |
lvmsadc is not supported under LVM2. The device-mapper statistics facility provides similar performance metrics using the dmstats(8) command. | |
SEE ALSO | |
dmstats(8) lvm(8) | |
Red Hat, Inc LVM TOOLS 2.02.177(2)-RHEL7 (2018-01-22) LVMSADC(8) | |
+ man lvmsar | |
+ head -n 20 | |
LVMSAR(8) LVMSAR(8) | |
NAME | |
lvmsar — LVM system activity reporter | |
SYNOPSIS | |
lvmsar | |
DESCRIPTION | |
lvmsar is not supported under LVM2. The device-mapper statistics facility provides similar performance metrics using the dmstats(8) command. | |
SEE ALSO | |
dmstats(8) lvm(8) | |
Red Hat, Inc LVM TOOLS 2.02.177(2)-RHEL7 (2018-01-22) LVMSAR(8) | |
+ man lvreduce | |
+ head -n 20 | |
LVREDUCE(8) System Manager's Manual LVREDUCE(8) | |
NAME | |
lvreduce - Reduce the size of a logical volume | |
SYNOPSIS | |
lvreduce option_args position_args | |
[ option_args ] | |
DESCRIPTION | |
lvreduce reduces the size of an LV. The freed logical extents are returned to the VG to be used by other LVs. A copy-on-write snapshot LV can also be reduced if less space is needed to hold COW blocks. Use lvconvert(8) to change the number of data images in a RAID or mirrored LV. | |
Be careful when reducing an LV's size, because data in the reduced area is lost. Ensure that any file system on the LV is resized before running lvreduce so that the removed extents are not in use by the file system. | |
Sizes will be rounded if necessary. For example, the LV size must be an exact number of extents, and the size of a striped segment must be a multiple of the number of stripes. | |
In the usage section below, --size Size can be replaced with --extents Number. See both descriptions the options section. | |
+ man lvremove | |
+ head -n 20 | |
LVREMOVE(8) System Manager's Manual LVREMOVE(8) | |
NAME | |
lvremove - Remove logical volume(s) from the system | |
SYNOPSIS | |
lvremove position_args | |
[ option_args ] | |
DESCRIPTION | |
lvremove removes one or more LVs. For standard LVs, this returns the logical extents that were used by the LV to the VG for use by other LVs. | |
Confirmation will be requested before deactivating any active LV prior to removal. LVs cannot be deactivated or removed while they are open (e.g. if they contain a mounted filesystem). Removing an origin LV will also remove all dependent snapshots. | |
When a single force option is used, LVs are removed without confirmation, and the command will try to deactivate unused LVs. | |
To remove damaged LVs, two force options may be required (-ff). | |
+ man lvrename | |
+ head -n 20 | |
LVRENAME(8) System Manager's Manual LVRENAME(8) | |
NAME | |
lvrename - Rename a logical volume | |
SYNOPSIS | |
lvrename position_args | |
[ option_args ] | |
DESCRIPTION | |
lvrename renames an existing LV or a historical LV (see lvremove for historical LV information.) | |
USAGE | |
lvrename VG LV LV_new | |
[ COMMON_OPTIONS ] | |
lvrename LV LV_new | |
[ COMMON_OPTIONS ] | |
+ man lvresize | |
+ head -n 20 | |
LVRESIZE(8) System Manager's Manual LVRESIZE(8) | |
NAME | |
lvresize - Resize a logical volume | |
SYNOPSIS | |
lvresize option_args position_args | |
[ option_args ] | |
[ position_args ] | |
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit | |
-A|--autobackup y|n | |
--commandprofile String | |
--config String | |
-d|--debug | |
--driverloaded y|n | |
-l|--extents [+|-]Number[PERCENT] | |
-f|--force | |
+ man lvs | |
+ head -n 20 | |
LVS(8) System Manager's Manual LVS(8) | |
NAME | |
lvs - Display information about logical volumes | |
SYNOPSIS | |
lvs | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
lvs produces formatted output about LVs. | |
USAGE | |
lvs | |
[ -H|--history ] | |
[ -a|--all ] | |
[ -o|--options String ] | |
+ man lvscan | |
+ head -n 20 | |
LVSCAN(8) System Manager's Manual LVSCAN(8) | |
NAME | |
lvscan - List all logical volumes in all volume groups | |
SYNOPSIS | |
lvscan option_args | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
lvscan scans all VGs or all supported LVM block devices in the system for LVs. The output consists of one line for each LV indicating whether or not it is active, a snapshot or origin, the size of the device and its allocation policy. Use lvs(8) or lvdisplay(8) to obtain more comprehensive information about LVs. | |
USAGE | |
lvscan | |
[ -a|--all ] | |
[ COMMON_OPTIONS ] | |
+ man lz4 | |
+ head -n 20 | |
LZ4(1) User Commands LZ4(1) | |
NAME | |
lz4 - lz4, unlz4, lz4cat - Compress or decompress .lz4 files | |
SYNOPSIS | |
lz4 [OPTIONS] [-|INPUT-FILE] OUTPUT-FILE | |
unlz4 is equivalent to lz4 -d | |
lz4cat is equivalent to lz4 -dcfm | |
When writing scripts that need to decompress files, it is recommended to always use the name lz4 with appropriate arguments (lz4 -d or lz4 -dc) instead of the names unlz4 and lz4cat. | |
DESCRIPTION | |
lz4 is an extremely fast lossless compression algorithm, based on byte-aligned LZ77 family of compression scheme. lz4 offers compression speeds of 400 MB/s per core, linearly scalable with multi-core CPUs. It features an extremely fast decoder, with speed in multiple GB/s per core, typically reaching RAM speed limit on multi-core systems. The native file format is the .lz4 format. | |
Difference between lz4 and gzip | |
+ man lz4c | |
+ head -n 20 | |
LZ4(1) User Commands LZ4(1) | |
NAME | |
lz4 - lz4, unlz4, lz4cat - Compress or decompress .lz4 files | |
SYNOPSIS | |
lz4 [OPTIONS] [-|INPUT-FILE] OUTPUT-FILE | |
unlz4 is equivalent to lz4 -d | |
lz4cat is equivalent to lz4 -dcfm | |
When writing scripts that need to decompress files, it is recommended to always use the name lz4 with appropriate arguments (lz4 -d or lz4 -dc) instead of the names unlz4 and lz4cat. | |
DESCRIPTION | |
lz4 is an extremely fast lossless compression algorithm, based on byte-aligned LZ77 family of compression scheme. lz4 offers compression speeds of 400 MB/s per core, linearly scalable with multi-core CPUs. It features an extremely fast decoder, with speed in multiple GB/s per core, typically reaching RAM speed limit on multi-core systems. The native file format is the .lz4 format. | |
Difference between lz4 and gzip | |
+ man lz4cat | |
+ head -n 20 | |
LZ4(1) User Commands LZ4(1) | |
NAME | |
lz4 - lz4, unlz4, lz4cat - Compress or decompress .lz4 files | |
SYNOPSIS | |
lz4 [OPTIONS] [-|INPUT-FILE] OUTPUT-FILE | |
unlz4 is equivalent to lz4 -d | |
lz4cat is equivalent to lz4 -dcfm | |
When writing scripts that need to decompress files, it is recommended to always use the name lz4 with appropriate arguments (lz4 -d or lz4 -dc) instead of the names unlz4 and lz4cat. | |
DESCRIPTION | |
lz4 is an extremely fast lossless compression algorithm, based on byte-aligned LZ77 family of compression scheme. lz4 offers compression speeds of 400 MB/s per core, linearly scalable with multi-core CPUs. It features an extremely fast decoder, with speed in multiple GB/s per core, typically reaching RAM speed limit on multi-core systems. The native file format is the .lz4 format. | |
Difference between lz4 and gzip | |
+ man machinectl | |
+ head -n 20 | |
MACHINECTL(1) machinectl MACHINECTL(1) | |
NAME | |
machinectl - Control the systemd machine manager | |
SYNOPSIS | |
machinectl [OPTIONS...] {COMMAND} [NAME...] | |
DESCRIPTION | |
machinectl may be used to introspect and control the state of the systemd(1) virtual machine and container registration manager systemd-machined.service(8). | |
OPTIONS | |
The following options are understood: | |
-p, --property= | |
When showing machine or image properties, limit the output to certain properties as specified by the argument. If not specified, all set properties are shown. The argument should be a property name, such as "Name". If specified more than once, all properties with the specified names are shown. | |
-a, --all | |
+ man mailq | |
+ head -n 20 | |
SENDMAIL(1) General Commands Manual SENDMAIL(1) | |
NAME | |
sendmail - Postfix to Sendmail compatibility interface | |
SYNOPSIS | |
sendmail [option ...] [recipient ...] | |
mailq | |
sendmail -bp | |
newaliases | |
sendmail -I | |
DESCRIPTION | |
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored. | |
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory. | |
+ man mailq.postfix | |
+ head -n 20 | |
SENDMAIL(1) General Commands Manual SENDMAIL(1) | |
NAME | |
sendmail - Postfix to Sendmail compatibility interface | |
SYNOPSIS | |
sendmail [option ...] [recipient ...] | |
mailq | |
sendmail -bp | |
newaliases | |
sendmail -I | |
DESCRIPTION | |
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored. | |
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory. | |
+ man make | |
+ head -n 20 | |
MAKE(1) LOCAL USER COMMANDS MAKE(1) | |
NAME | |
make - GNU make utility to maintain groups of programs | |
SYNOPSIS | |
make [ -f makefile ] [ options ] ... [ targets ] ... | |
WARNING | |
This man page is an extract of the documentation of GNU make. It is updated only occasionally, because the GNU project does not use nroff. For complete, current documentation, refer to the Info file make.info which is made from the Texinfo source file make.texi. | |
DESCRIPTION | |
The purpose of the make utility is to determine automatically which pieces of a large program need to be recompiled, and issue the commands to recompile them. The manual describes the GNU implementation of make, which was written by Richard Stallman and Roland McGrath, and is currently maintained by Paul Smith. Our examples show C programs, since they are most common, but you can use make with any | |
programming language whose compiler can be run with a shell command. In fact, make is not limited to programs. You can use it to describe any task where some files must be updated automatically from others whenever the others change. | |
To prepare to use make, you must write a file called the makefile that describes the relationships among files in your program, and the states the commands for updating each file. In a program, typically the executable file is updated from object files, which are in turn made by compiling source files. | |
Once a suitable makefile exists, each time you change some source files, this simple shell command: | |
+ man man | |
+ head -n 20 | |
MAN(1) Manual pager utils MAN(1) | |
NAME | |
man - an interface to the on-line reference manuals | |
SYNOPSIS | |
man [-C file] [-d] [-D] [--warnings[=warnings]] [-R encoding] [-L locale] [-m system[,...]] [-M path] [-S list] [-e extension] [-i|-I] [--regex|--wildcard] [--names-only] [-a] [-u] [--no-subpages] [-P pager] [-r prompt] [-7] [-E encoding] [--no-hyphenation] [--no-justification] [-p string] [-t] [-T[device]] [-H[browser]] [-X[dpi]] [-Z] [[section] page ...] ... | |
man -k [apropos options] regexp ... | |
man -K [-w|-W] [-S list] [-i|-I] [--regex] [section] term ... | |
man -f [whatis options] page ... | |
man -l [-C file] [-d] [-D] [--warnings[=warnings]] [-R encoding] [-L locale] [-P pager] [-r prompt] [-7] [-E encoding] [-p string] [-t] [-T[device]] [-H[browser]] [-X[dpi]] [-Z] file ... | |
man -w|-W [-C file] [-d] [-D] page ... | |
man -c [-C file] [-d] [-D] page ... | |
man [-?V] | |
DESCRIPTION | |
man is the system's manual pager. Each page argument given to man is normally the name of a program, utility or function. The manual page associated with each of these arguments is then found and displayed. A section, if provided, will direct man to look only in that section of the manual. The default action is to search in all of the available sections, following a pre-defined order and to show only | |
the first page found, even if page exists in several sections. | |
+ man mandb | |
+ head -n 20 | |
MANDB(8) Manual pager utils MANDB(8) | |
NAME | |
mandb - create or update the manual page index caches | |
SYNOPSIS | |
mandb [-dqsucpt?V] [-C file] [manpath] | |
mandb [-dqsut] [-C file] -f filename ... | |
DESCRIPTION | |
mandb is used to initialise or manually update index database caches that are usually maintained by man. The caches contain information relevant to the current state of the manual page system and the information stored within them is used by the man-db utilities to enhance their speed and functionality. | |
When creating or updating an index, mandb will warn of bad ROFF .so requests, bogus manual page filenames and manual pages from which the whatis cannot be parsed. | |
Supplying mandb with an optional colon-delimited path will override the internal system manual page hierarchy search path, determined from information found within the man-db configuration file. | |
DATABASE CACHES | |
mandb can be compiled with support for any one of the following database types. | |
+ man manpath | |
+ head -n 20 | |
MANPATH(1) Manual pager utils MANPATH(1) | |
NAME | |
manpath - determine search path for manual pages | |
SYNOPSIS | |
manpath [-qgdc?V] [-m system[,...]] [-C file] | |
DESCRIPTION | |
If $MANPATH is set, manpath will simply display its contents and issue a warning. If not, manpath will determine a suitable manual page hierarchy search path and display the results. | |
The colon-delimited path is determined using information gained from the man-db configuration file - (/etc/man_db.conf) and the user's environment. | |
OPTIONS | |
-q, --quiet | |
Do not issue warnings. | |
-d, --debug | |
+ man mapscrn | |
+ head -n 20 | |
MAPSCRN(8) International Support MAPSCRN(8) | |
NAME | |
mapscrn - load screen output mapping table | |
SYNOPSIS | |
mapscrn [-V] [-v] [-o map.orig] mapfile | |
DESCRIPTION | |
The mapscrn command is obsolete - its function is now built-in into setfont. However, for backwards compatibility it is still available as a separate command. | |
The mapscrn command loads a user defined output character mapping table into the console driver. The console driver may be later put into use user-defined mapping table mode by outputting a special escape sequence to the console device. This sequence is <esc>(K for the G0 character set and <esc>)K for the G1 character set. When the -o option is given, the old map is saved in map.orig. | |
USE | |
There are two kinds of mapping tables: direct-to-font tables, that give a font position for each user byte value, and user-to-unicode tables that give a unicode value for each user byte. The corresponding glyph is now found using the unicode index of the font. The command | |
mapscrn trivial | |
sets up a one-to-one direct-to-font table where user bytes directly address the font. This is useful for fonts that are in the same order as the character set one uses. A command like | |
mapscrn 8859-2 | |
+ man matchpathcon | |
+ head -n 20 | |
matchpathcon(8) SELinux Command Line documentation matchpathcon(8) | |
NAME | |
matchpathcon - get the default SELinux security context for the specified path from the file contexts configuration | |
SYNOPSIS | |
matchpathcon [-V] [-N] [-n] [-m type] [-f file_contexts_file] [-p prefix] [-P policy_root_path] filepath... | |
DESCRIPTION | |
matchpathcon queries the system policy and outputs the default security context associated with the filepath. | |
Note: Identical paths can have different security contexts, depending on the file type (regular file, directory, link file, char file ...). | |
matchpathcon will also take the file type into consideration in determining the default security context if the file exists. If the file does not exist, no file type matching will occur. | |
OPTIONS | |
-m type | |
Force file type for the lookup. Valid types are file, dir, pipe, chr_file, blk_file, lnk_file, sock_file. | |
+ man mcookie | |
+ head -n 20 | |
MCOOKIE(1) User Commands MCOOKIE(1) | |
NAME | |
mcookie - generate magic cookies for xauth | |
SYNOPSIS | |
mcookie [options] | |
DESCRIPTION | |
mcookie generates a 128-bit random hexadecimal number for use with the X authority system. Typical usage: | |
xauth add :0 . `mcookie` | |
The "random" number generated is actually the MD5 message digest of random information coming from one of the sources /dev/urandom, /dev/random, or the libc pseudo-random functions, in this preference order. | |
OPTIONS | |
-f, --file file | |
Use this file as an additional source of randomness. When file is '-', characters are read from standard input. | |
+ man mdadm | |
+ head -n 20 | |
MDADM(8) System Manager's Manual MDADM(8) | |
NAME | |
mdadm - manage MD devices aka Linux Software RAID | |
SYNOPSIS | |
mdadm [mode] <raiddevice> [options] <component-devices> | |
DESCRIPTION | |
RAID devices are virtual devices created from two or more real block devices. This allows multiple devices (typically disk drives or partitions thereof) to be combined into a single device to hold (for example) a single filesystem. Some RAID levels include redundancy and so can survive some degree of device failure. | |
Linux Software RAID devices are implemented through the md (Multiple Devices) device driver. | |
Currently, Linux supports LINEAR md devices, RAID0 (striping), RAID1 (mirroring), RAID4, RAID5, RAID6, RAID10, MULTIPATH, FAULTY, and CONTAINER. | |
MULTIPATH is not a Software RAID mechanism, but does involve multiple devices: each device is a path to one common physical storage device. New installations should not use md/multipath as it is not well supported and has no ongoing development. Use the Device Mapper based multipath-tools instead. | |
+ man mdig | |
+ head -n 20 | |
MDIG(1) BIND9 MDIG(1) | |
NAME | |
mdig - DNS pipelined lookup utility | |
SYNOPSIS | |
mdig {@server} [-f filename] [-h] [-v] [[-4] | [-6]] [-m] [-b address] [-p port#] [-c class] [-t type] [-i] [-x addr] [plusopt...] | |
mdig {-h} | |
mdig [@server] {global-opt...} {{local-opt...} {query}...} | |
DESCRIPTION | |
mdig is a multiple/pipelined query version of dig: instead of waiting for a response after sending each query, it begins by sending all queries. Responses are displayed in the order in which they are received, not in the order the corresponding queries were sent. | |
mdig options are a subset of the dig options, and are divided into "anywhere options" which can occur anywhere, "global options" which must occur before the query name (or they are ignored with a warning), and "local options" which apply to the next query on the command line. | |
The {@server} option is a mandatory global option. It is the name or IP address of the name server to query. (Unlike dig, this value is not retrieved from /etc/resolv.conf.) It can be an IPv4 address in dotted-decimal notation, an IPv6 address in colon-delimited notation, or a hostname. When the supplied server argument is a hostname, mdig resolves that name before querying the name server. | |
+ man mdmon | |
+ head -n 20 | |
MDMON(8) System Manager's Manual MDMON(8) | |
NAME | |
mdmon - monitor MD external metadata arrays | |
SYNOPSIS | |
mdmon [--all] [--takeover] [--foreground] CONTAINER | |
OVERVIEW | |
The 2.6.27 kernel brings the ability to support external metadata arrays. External metadata implies that user space handles all updates to the metadata. The kernel's responsibility is to notify user space when a "metadata event" occurs, like disk failures and clean-to-dirty transitions. The kernel, in important cases, waits for user space to take action on these notifications. | |
DESCRIPTION | |
Metadata updates: | |
To service metadata update requests a daemon, mdmon, is introduced. Mdmon is tasked with polling the sysfs namespace looking for changes in array_state, sync_action, and per disk state attributes. When a change is detected it calls a per metadata type handler to make modifications to the metadata. The following actions are taken: | |
+ man mesg | |
+ head -n 20 | |
MESG(1) Linux User's Manual MESG(1) | |
NAME | |
mesg - control write access to your terminal | |
SYNOPSIS | |
mesg [y|n] | |
DESCRIPTION | |
Mesg controls the access to your terminal by others. It's typically used to allow or disallow other users to write to your terminal (see write(1)). | |
OPTIONS | |
y Allow write access to your terminal. | |
n Disallow write access to your terminal. | |
If no option is given, mesg prints out the current access state of your terminal. | |
+ man mii-diag | |
+ head -n 20 | |
MII-DIAG(8) System Manager's Manual MII-DIAG(8) | |
NAME | |
mii-diag - Network adapter control and monitoring | |
SYNOPSIS | |
mii-diag [options]<interface> | |
DESCRIPTION | |
This manual page documents briefly the mii-diag network adapter control and monitoring command. Addition documentation is available from http://scyld.com/diag/index.html. | |
This mii-diag command configures, controls and monitors the transceiver management registers for network interfaces, and configures driver operational parameters. For transceiver control mii-diag uses the Media Independent Interface (MII) standard (thus the command name). It also has additional Linux-specific controls to communicate parameters such as message enable settings and buffer sizes to the | |
underlying device driver. | |
The MII standard defines registers that control and report network transceiver capabilities, link settings and errors. Examples are link speed, duplex, capabilities advertised to the link partner, status LED indications and link error counters. | |
+ man mii-tool | |
+ head -n 20 | |
MII-TOOL(8) Linux System Administrator's Manual MII-TOOL(8) | |
NAME | |
mii-tool - view, manipulate media-independent interface status | |
SYNOPSIS | |
mii-tool [-v, --verbose] [-V, --version] [-R, --reset] [-r, --restart] [-w, --watch] [-l, --log] [-A, --advertise=media,...] [-F, --force=media] [-p, --phy=addr] interface ... | |
NOTE | |
This program is obsolete. For replacement check ethtool. | |
DESCRIPTION | |
This utility checks or sets the status of a network interface's Media Independent Interface (MII) unit. Most fast ethernet adapters use an MII to autonegotiate link speed and duplex setting. | |
Most intelligent network devices use an autonegotiation protocol to communicate what media technologies they support, and then select the fastest mutually supported media technology. The -A or --advertise options can be used to tell the MII to only advertise a subset of its capabilities. Some passive devices, such as single-speed hubs, are unable to autonegotiate. To handle such devices, the MII | |
+ man mkdict | |
+ head -n 20 | |
No manual entry for mkdict | |
+ man mkdosfs | |
+ head -n 20 | |
MKFS.FAT(8) dosfstools MKFS.FAT(8) | |
NAME | |
mkfs.fat - create an MS-DOS filesystem under Linux | |
SYNOPSIS | |
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ] | |
DESCRIPTION | |
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size. | |
OPTIONS | |
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash | |
media or large-sector hard disks. | |
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle. | |
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot | |
message (option -m) is ignored. | |
+ man mke2fs | |
+ head -n 20 | |
MKE2FS(8) System Manager's Manual MKE2FS(8) | |
NAME | |
mke2fs - create an ext2/ext3/ext4 filesystem | |
SYNOPSIS | |
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last- | |
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ] | |
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ] | |
DESCRIPTION | |
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified. | |
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details. | |
OPTIONS | |
-b block-size | |
+ man mkfs | |
+ head -n 20 | |
MKFS(8) System Administration MKFS(8) | |
NAME | |
mkfs - build a Linux filesystem | |
SYNOPSIS | |
mkfs [options] [-t type] [fs-options] device [size] | |
DESCRIPTION | |
This mkfs frontend is deprecated in favour of filesystem specific mkfs.<type> utils. | |
mkfs is used to build a Linux filesystem on a device, usually a hard disk partition. The device argument is either the device name (e.g. /dev/hda1, /dev/sdb2), or a regular file that shall contain the filesystem. The size argument is the number of blocks to be used for the filesystem. | |
The exit code returned by mkfs is 0 on success and 1 on failure. | |
In actuality, mkfs is simply a front-end for the various filesystem builders (mkfs.fstype) available under Linux. The filesystem-specific builder is searched for via your PATH environment setting only. Please see the filesystem-specific builder manual pages for further details. | |
OPTIONS | |
+ man mkfs.cramfs | |
+ head -n 20 | |
MKFS.CRAMFS(8) System Administration MKFS.CRAMFS(8) | |
NAME | |
mkfs.cramfs - make compressed ROM file system | |
SYNOPSIS | |
mkfs.cramfs [options] directory file | |
DESCRIPTION | |
Files on cramfs file systems are zlib-compressed one page at a time to allow random read access. The metadata is not compressed, but is expressed in a terse representation that is more space-efficient than conventional file systems. | |
The file system is intentionally read-only to simplify its design; random write access for compressed files is difficult to implement. cramfs ships with a utility (mkcramfs) to pack files into new cramfs images. | |
File sizes are limited to less than 16 MB. | |
Maximum file system size is a little under 272 MB. (The last file on the file system must begin before the 256 MB block, but can extend past it.) | |
ARGUMENTS | |
+ man mkfs.ext2 | |
+ head -n 20 | |
MKE2FS(8) System Manager's Manual MKE2FS(8) | |
NAME | |
mke2fs - create an ext2/ext3/ext4 filesystem | |
SYNOPSIS | |
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last- | |
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ] | |
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ] | |
DESCRIPTION | |
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified. | |
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details. | |
OPTIONS | |
-b block-size | |
+ man mkfs.ext3 | |
+ head -n 20 | |
MKE2FS(8) System Manager's Manual MKE2FS(8) | |
NAME | |
mke2fs - create an ext2/ext3/ext4 filesystem | |
SYNOPSIS | |
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last- | |
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ] | |
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ] | |
DESCRIPTION | |
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified. | |
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details. | |
OPTIONS | |
-b block-size | |
+ man mkfs.ext4 | |
+ head -n 20 | |
MKE2FS(8) System Manager's Manual MKE2FS(8) | |
NAME | |
mke2fs - create an ext2/ext3/ext4 filesystem | |
SYNOPSIS | |
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last- | |
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ] | |
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ] | |
DESCRIPTION | |
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified. | |
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details. | |
OPTIONS | |
-b block-size | |
+ man mkfs.fat | |
+ head -n 20 | |
MKFS.FAT(8) dosfstools MKFS.FAT(8) | |
NAME | |
mkfs.fat - create an MS-DOS filesystem under Linux | |
SYNOPSIS | |
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ] | |
DESCRIPTION | |
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size. | |
OPTIONS | |
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash | |
media or large-sector hard disks. | |
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle. | |
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot | |
message (option -m) is ignored. | |
+ man mkfs.minix | |
+ head -n 20 | |
MKFS.MINIX(8) System Administration MKFS.MINIX(8) | |
NAME | |
mkfs.minix - make a Minix filesystem | |
SYNOPSIS | |
mkfs.minix [options] device [size-in-blocks] | |
DESCRIPTION | |
mkfs.minix creates a Linux MINIX filesystem on a device (usually a disk partition). | |
The device is usually of the following form: | |
/dev/hda[1–8] (IDE disk 1) | |
/dev/hdb[1–8] (IDE disk 2) | |
/dev/sda[1–8] (SCSI disk 1) | |
/dev/sdb[1–8] (SCSI disk 2) | |
+ man mkfs.msdos | |
+ head -n 20 | |
MKFS.FAT(8) dosfstools MKFS.FAT(8) | |
NAME | |
mkfs.fat - create an MS-DOS filesystem under Linux | |
SYNOPSIS | |
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ] | |
DESCRIPTION | |
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size. | |
OPTIONS | |
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash | |
media or large-sector hard disks. | |
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle. | |
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot | |
message (option -m) is ignored. | |
+ man mkfs.vfat | |
+ head -n 20 | |
MKFS.FAT(8) dosfstools MKFS.FAT(8) | |
NAME | |
mkfs.fat - create an MS-DOS filesystem under Linux | |
SYNOPSIS | |
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ] | |
DESCRIPTION | |
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size. | |
OPTIONS | |
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash | |
media or large-sector hard disks. | |
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle. | |
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot | |
message (option -m) is ignored. | |
+ man mkfs.xfs | |
+ head -n 20 | |
mkfs.xfs(8) System Manager's Manual mkfs.xfs(8) | |
NAME | |
mkfs.xfs - construct an XFS filesystem | |
SYNOPSIS | |
mkfs.xfs [ -b block_size ] [ -m global_metadata_options ] [ -d data_section_options ] [ -f ] [ -i inode_options ] [ -l log_section_options ] [ -n naming_options ] [ -p protofile ] [ -q ] [ -r realtime_section_options ] [ -s sector_size ] [ -L label ] [ -N ] [ -K ] device | |
mkfs.xfs -V | |
DESCRIPTION | |
mkfs.xfs constructs an XFS filesystem by writing on a special file using the values found in the arguments of the command line. It is invoked automatically by mkfs(8) when it is given the -t xfs option. | |
In its simplest (and most commonly used form), the size of the filesystem is determined from the disk driver. As an example, to make a filesystem with an internal log on the first partition on the first SCSI disk, use: | |
mkfs.xfs /dev/sda1 | |
The metadata log can be placed on another device to reduce the number of disk seeks. To create a filesystem on the first partition on the first SCSI disk with a 10000 block log located on the first partition on the second SCSI disk, use: | |
+ man mkhomedir_helper | |
+ head -n 20 | |
MKHOMEDIR_HELPER(8) Linux-PAM Manual MKHOMEDIR_HELPER(8) | |
NAME | |
mkhomedir_helper - Helper binary that creates home directories | |
SYNOPSIS | |
mkhomedir_helper {user} [umask [ path-to-skel ]] | |
DESCRIPTION | |
mkhomedir_helper is a helper program for the pam_mkhomedir module that creates home directories and populates them with contents of the specified skel directory. | |
The default value of umask is 0022 and the default value of path-to-skel is /etc/skel. | |
The helper is separated from the module to not require direct access from login SELinux domains to the contents of user home directories. The SELinux domain transition happens when the module is executing the mkhomedir_helper. | |
The helper never touches home directories if they already exist. | |
SEE ALSO | |
+ man mkinitrd | |
+ head -n 20 | |
MKINITRD(8) dracut MKINITRD(8) | |
NAME | |
mkinitrd - is a compat wrapper, which calls dracut to generate an initramfs | |
SYNOPSIS | |
mkinitrd [OPTION...] [<initrd-image>] <kernel-version> | |
DESCRIPTION | |
mkinitrd creates an initramfs image <initrd-image> for the kernel with version <kernel-version> by calling "dracut". | |
Important | |
If a more fine grained control over the resulting image is needed, "dracut" should be called directly. | |
OPTIONS | |
--version | |
print info about the version | |
+ man mklost+found | |
+ head -n 20 | |
MKLOST+FOUND(8) System Manager's Manual MKLOST+FOUND(8) | |
NAME | |
mklost+found - create a lost+found directory on a mounted Linux second extended file system | |
SYNOPSIS | |
mklost+found | |
DESCRIPTION | |
mklost+found is used to create a lost+found directory in the current working directory on a Linux second extended file system. There is normally a lost+found directory in the root directory of each filesystem. | |
mklost+found pre-allocates disk blocks to the lost+found directory so that when e2fsck(8) is being run to recover a filesystem, it does not need to allocate blocks in the filesystem to store a large number of unlinked files. This ensures that e2fsck will not have to allocate data blocks in the filesystem during recovery. | |
OPTIONS | |
There are none. | |
AUTHOR | |
mklost+found has been written by Remy Card <[email protected]>. It is currently being maintained by Theodore Ts'o <[email protected]>. | |
+ man mkswap | |
+ head -n 20 | |
MKSWAP(8) System Administration MKSWAP(8) | |
NAME | |
mkswap - set up a Linux swap area | |
SYNOPSIS | |
mkswap [options] device [size] | |
DESCRIPTION | |
mkswap sets up a Linux swap area on a device or in a file. | |
The device argument will usually be a disk partition (something like /dev/sdb7) but can also be a file. The Linux kernel does not look at partition IDs, but many installation scripts will assume that partitions of hex type 82 (LINUX_SWAP) are meant to be swap partitions. (Warning: Solaris also uses this type. Be careful not to kill your Solaris partitions.) | |
The size parameter is superfluous but retained for backwards compatibility. (It specifies the desired size of the swap area in 1024-byte blocks. mkswap will use the entire partition or file if it is omitted. Specifying it is unwise – a typo may destroy your disk.) | |
After creating the swap area, you need the swapon command to start using it. Usually swap areas are listed in /etc/fstab so that they can be taken into use at boot time by a swapon -a command in some boot script. | |
+ man modinfo | |
+ head -n 20 | |
MODINFO(8) modinfo MODINFO(8) | |
NAME | |
modinfo - Show information about a Linux Kernel module | |
SYNOPSIS | |
modinfo [-0] [-F field] [-k kernel] [modulename|filename...] | |
modinfo -V | |
modinfo -h | |
DESCRIPTION | |
modinfo extracts information from the Linux Kernel modules given on the command line. If the module name is not a filename, then the /lib/modules/version directory is searched, as is also done by modprobe(8) when loading kernel modules. | |
modinfo by default lists each attribute of the module in form fieldname : value, for easy reading. The filename is listed the same way (although it's not really an attribute). | |
This version of modinfo can understand modules of any Linux Kernel architecture. | |
+ man modprobe | |
+ head -n 20 | |
MODPROBE(8) modprobe MODPROBE(8) | |
NAME | |
modprobe - Add and remove modules from the Linux Kernel | |
SYNOPSIS | |
modprobe [-v] [-V] [-C config-file] [-n] [-i] [-q] [-b] [modulename] [module parameters...] | |
modprobe [-r] [-v] [-n] [-i] [modulename...] | |
modprobe [-c] | |
modprobe [--dump-modversions] [filename] | |
DESCRIPTION | |
modprobe intelligently adds or removes a module from the Linux kernel: note that for convenience, there is no difference between _ and - in module names (automatic underscore conversion is performed). modprobe looks in the module directory /lib/modules/`uname -r` for all the modules and other files, except for the optional configuration files in the /etc/modprobe.d directory (see modprobe.d(5)). | |
modprobe will also use module options specified on the kernel command line in the form of <module>.<option> and blacklists in the form of modprobe.blacklist=<module>. | |
+ man more | |
+ head -n 20 | |
MORE(1) User Commands MORE(1) | |
NAME | |
more - file perusal filter for crt viewing | |
SYNOPSIS | |
more [options] file... | |
DESCRIPTION | |
more is a filter for paging through text one screenful at a time. This version is especially primitive. Users should realize that less(1) provides more(1) emulation plus extensive enhancements. | |
OPTIONS | |
Options are also taken from the environment variable MORE (make sure to precede them with a dash (-)) but command-line options will override those. | |
-d Prompt with "[Press space to continue, 'q' to quit.]", and display "[Press 'h' for instructions.]" instead of ringing the bell when an illegal key is pressed. | |
-l Do not pause after any line containing a ^L (form feed). | |
+ man mount | |
+ head -n 20 | |
MOUNT(8) System Administration MOUNT(8) | |
NAME | |
mount - mount a filesystem | |
SYNOPSIS | |
mount [-l|-h|-V] | |
mount -a [-fFnrsvw] [-t fstype] [-O optlist] | |
mount [-fnrsvw] [-o options] device|dir | |
mount [-fnrsvw] [-t fstype] [-o options] device dir | |
DESCRIPTION | |
All files accessible in a Unix system are arranged in one big tree, the file hierarchy, rooted at /. These files can be spread out over several devices. The mount command serves to attach the filesystem found on some device to the big file tree. Conversely, the umount(8) command will detach it again. | |
The standard form of the mount command is: | |
+ man mount.nfs | |
+ head -n 20 | |
MOUNT.NFS(8) System Manager's Manual MOUNT.NFS(8) | |
NAME | |
mount.nfs, mount.nfs4 - mount a Network File System | |
SYNOPSIS | |
mount.nfs remotetarget dir [-rvVwfnsh ] [-o options] | |
DESCRIPTION | |
mount.nfs is a part of nfs(5) utilities package, which provides NFS client functionality. | |
mount.nfs is meant to be used by the mount(8) command for mounting NFS shares. This subcommand, however, can also be used as a standalone command with limited functionality. | |
remotetarget is a server share usually in the form of servername:/path/to/share. dir is the directory on which the file system is to be mounted. | |
Under Linux 2.6.32 and later kernel versions, mount.nfs can mount all NFS file system versions. Under earlier Linux kernel versions, mount.nfs4 must be used for mounting NFSv4 file systems while mount.nfs must be used for NFSv3 and v2. | |
+ man mount.nfs4 | |
+ head -n 20 | |
MOUNT.NFS(8) System Manager's Manual MOUNT.NFS(8) | |
NAME | |
mount.nfs, mount.nfs4 - mount a Network File System | |
SYNOPSIS | |
mount.nfs remotetarget dir [-rvVwfnsh ] [-o options] | |
DESCRIPTION | |
mount.nfs is a part of nfs(5) utilities package, which provides NFS client functionality. | |
mount.nfs is meant to be used by the mount(8) command for mounting NFS shares. This subcommand, however, can also be used as a standalone command with limited functionality. | |
remotetarget is a server share usually in the form of servername:/path/to/share. dir is the directory on which the file system is to be mounted. | |
Under Linux 2.6.32 and later kernel versions, mount.nfs can mount all NFS file system versions. Under earlier Linux kernel versions, mount.nfs4 must be used for mounting NFSv4 file systems while mount.nfs must be used for NFSv3 and v2. | |
+ man mountpoint | |
+ head -n 20 | |
MOUNTPOINT(1) User Commands MOUNTPOINT(1) | |
NAME | |
mountpoint - see if a directory or file is a mountpoint | |
SYNOPSIS | |
mountpoint [-d|-q] directory | file | |
mountpoint -x device | |
DESCRIPTION | |
mountpoint checks whether the given directory or file is mentioned in the /proc/self/mountinfo file. | |
OPTIONS | |
-d, --fs-devno | |
Show the major/minor numbers of the device that is mounted on the given directory. | |
+ man mountstats | |
+ head -n 20 | |
mountstats(8) System Manager's Manual mountstats(8) | |
NAME | |
mountstats - Displays various NFS client per-mount statistics | |
SYNOPSIS | |
mountstats [-h|--help] [-v|--version] [-f|--file infile] [-S|--since sincefile] [ [-n|--nfs] | [-r|--rpc] | [-R|--raw] ] [mountpoint]... | |
mountstats iostat [-h|--help] [-v|--version] [-f|--file infile] [-S|--since sincefile] [interval] [count] [mountpoint]... | |
mounstats nfsstat [-h|--help] [-v|--version] [-f|--file infile] [-S|--since sincefile] [-3] [-4] [mountpoint]... | |
DESCRIPTION | |
The mountstats command displays various NFS client statisitics for each given mountpoint. | |
If no mountpoint is given, statistics will be displayed for all NFS mountpoints on the client. | |
Sub-commands | |
+ man mpstat | |
+ head -n 20 | |
MPSTAT(1) Linux User's Manual MPSTAT(1) | |
NAME | |
mpstat - Report processors related statistics. | |
SYNOPSIS | |
mpstat [ -A ] [ -u ] [ -V ] [ -I { SUM | CPU | SCPU | ALL } ] [ -P { cpu [,...] | ON | ALL } ] [ interval [ count ] ] | |
DESCRIPTION | |
The mpstat command writes to standard output activities for each available processor, processor 0 being the first one. Global average activities among all processors are also reported. The mpstat command can be used both on SMP and UP machines, but in the latter, only global average activities will be printed. If no activity has been selected, then the default report is the CPU utilization report. | |
The interval parameter specifies the amount of time in seconds between each report. A value of 0 (or no parameters at all) indicates that processors statistics are to be reported for the time since system startup (boot). The count parameter can be specified in conjunction with the interval parameter if this one is not set to zero. The value of count determines the number of reports generated at | |
interval seconds apart. If the interval parameter is specified without the count parameter, the mpstat command generates reports continuously. | |
OPTIONS | |
-A This option is equivalent to specifying -u -I ALL -P ALL | |
+ man msgattrib | |
+ head -n 20 | |
MSGATTRIB(1) GNU MSGATTRIB(1) | |
NAME | |
msgattrib - attribute matching and manipulation on message catalog | |
SYNOPSIS | |
msgattrib [OPTION] [INPUTFILE] | |
DESCRIPTION | |
Filters the messages of a translation catalog according to their attributes, and manipulates the attributes. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
INPUTFILE | |
input PO file | |
-D, --directory=DIRECTORY | |
+ man msgcat | |
+ head -n 20 | |
MSGCAT(1) GNU MSGCAT(1) | |
NAME | |
msgcat - combines several message catalogs | |
SYNOPSIS | |
msgcat [OPTION] [INPUTFILE]... | |
DESCRIPTION | |
Concatenates and merges the specified PO files. Find messages which are common to two or more of the specified PO files. By using the --more-than option, greater commonality may be requested before messages are printed. Conversely, the --less-than option may be used to specify less commonality before messages are printed (i.e. --less-than=2 will only print the unique messages). Translations, com‐ | |
ments, extracted comments, and file positions will be cumulated, except that if --use-first is specified, they will be taken from the first PO file to define them. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
INPUTFILE ... | |
input files | |
+ man msgcmp | |
+ head -n 20 | |
MSGCMP(1) GNU MSGCMP(1) | |
NAME | |
msgcmp - compare message catalog and template | |
SYNOPSIS | |
msgcmp [OPTION] def.po ref.pot | |
DESCRIPTION | |
Compare two Uniforum style .po files to check that both contain the same set of msgid strings. The def.po file is an existing PO file with the translations. The ref.pot file is the last created PO file, or a PO Template file (generally created by xgettext). This is useful for checking that you have translated each and every message in your program. Where an exact match cannot be found, fuzzy match‐ | |
ing is used to produce better diagnostics. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
def.po translations | |
ref.pot | |
+ man msgcomm | |
+ head -n 20 | |
MSGCOMM(1) GNU MSGCOMM(1) | |
NAME | |
msgcomm - match two message catalogs | |
SYNOPSIS | |
msgcomm [OPTION] [INPUTFILE]... | |
DESCRIPTION | |
Find messages which are common to two or more of the specified PO files. By using the --more-than option, greater commonality may be requested before messages are printed. Conversely, the --less-than option may be used to specify less commonality before messages are printed (i.e. --less-than=2 will only print the unique messages). Translations, comments and extracted comments will be preserved, but | |
only from the first PO file to define them. File positions from all PO files will be cumulated. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
INPUTFILE ... | |
input files | |
+ man msgconv | |
+ head -n 20 | |
MSGCONV(1) GNU MSGCONV(1) | |
NAME | |
msgconv - character set conversion for message catalog | |
SYNOPSIS | |
msgconv [OPTION] [INPUTFILE] | |
DESCRIPTION | |
Converts a translation catalog to a different character encoding. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
INPUTFILE | |
input PO file | |
-D, --directory=DIRECTORY | |
+ man msgen | |
+ head -n 20 | |
MSGEN(1) GNU MSGEN(1) | |
NAME | |
msgen - create English message catalog | |
SYNOPSIS | |
msgen [OPTION] INPUTFILE | |
DESCRIPTION | |
Creates an English translation catalog. The input file is the last created English PO file, or a PO Template file (generally created by xgettext). Untranslated entries are assigned a translation that is identical to the msgid. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
INPUTFILE | |
input PO or POT file | |
-D, --directory=DIRECTORY | |
+ man msgexec | |
+ head -n 20 | |
MSGEXEC(1) GNU MSGEXEC(1) | |
NAME | |
msgexec - process translations of message catalog | |
SYNOPSIS | |
msgexec [OPTION] COMMAND [COMMAND-OPTION] | |
DESCRIPTION | |
Applies a command to all translations of a translation catalog. The COMMAND can be any program that reads a translation from standard input. It is invoked once for each translation. Its output becomes msgexec's output. msgexec's return code is the maximum return code across all invocations. | |
A special builtin command called '0' outputs the translation, followed by a null byte. The output of "msgexec 0" is suitable as input for "xargs -0". | |
Command input: | |
--newline | |
add newline at the end of input | |
Mandatory arguments to long options are mandatory for short options too. | |
+ man msgfilter | |
+ head -n 20 | |
MSGFILTER(1) GNU MSGFILTER(1) | |
NAME | |
msgfilter - edit translations of message catalog | |
SYNOPSIS | |
msgfilter [OPTION] FILTER [FILTER-OPTION] | |
DESCRIPTION | |
Applies a filter to all translations of a translation catalog. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
-i, --input=INPUTFILE | |
input PO file | |
-D, --directory=DIRECTORY | |
+ man msgfmt | |
+ head -n 20 | |
MSGFMT(1) GNU MSGFMT(1) | |
NAME | |
msgfmt - compile message catalog to binary format | |
SYNOPSIS | |
msgfmt [OPTION] filename.po ... | |
DESCRIPTION | |
Generate binary message catalog from textual translation description. | |
Mandatory arguments to long options are mandatory for short options too. Similarly for optional arguments. | |
Input file location: | |
filename.po ... | |
input files | |
-D, --directory=DIRECTORY | |
+ man msggrep | |
+ head -n 20 | |
MSGGREP(1) GNU MSGGREP(1) | |
NAME | |
msggrep - pattern matching on message catalog | |
SYNOPSIS | |
msggrep [OPTION] [INPUTFILE] | |
DESCRIPTION | |
Extracts all messages of a translation catalog that match a given pattern or belong to some given source files. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
INPUTFILE | |
input PO file | |
-D, --directory=DIRECTORY | |
+ man msghack | |
+ head -n 20 | |
MSGHACK(1) User Commands MSGHACK(1) | |
NAME | |
msghack - alter PO files in ways | |
SYNOPSIS | |
msghack [OPTION] file.po [ref.po] | |
DESCRIPTION | |
This program can be used to alter .po files in ways no sane mind would think about. | |
-o result will be written to FILE | |
--invert | |
invert a po file by switching msgid and msgstr | |
--master | |
join any number of files in a master-formatted catalog | |
+ man msginit | |
+ head -n 20 | |
MSGINIT(1) GNU MSGINIT(1) | |
NAME | |
msginit - initialize a message catalog | |
SYNOPSIS | |
msginit [OPTION] | |
DESCRIPTION | |
Creates a new PO file, initializing the meta information with values from the user's environment. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
-i, --input=INPUTFILE | |
input POT file | |
If no input file is given, the current directory is searched for the POT file. If it is -, standard input is read. | |
+ man msgmerge | |
+ head -n 20 | |
MSGMERGE(1) GNU MSGMERGE(1) | |
NAME | |
msgmerge - merge message catalog and template | |
SYNOPSIS | |
msgmerge [OPTION] def.po ref.pot | |
DESCRIPTION | |
Merges two Uniforum style .po files together. The def.po file is an existing PO file with translations which will be taken over to the newly created file as long as they still match; comments will be preserved, but extracted comments and file positions will be discarded. The ref.pot file is the last created PO file with up-to-date source references but old translations, or a PO Template file (gener‐ | |
ally created by xgettext); any translations or comments in the file will be discarded, however dot comments and file positions will be preserved. Where an exact match cannot be found, fuzzy matching is used to produce better results. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
def.po translations referring to old sources | |
ref.pot | |
+ man msgunfmt | |
+ head -n 20 | |
MSGUNFMT(1) GNU MSGUNFMT(1) | |
NAME | |
msgunfmt - uncompile message catalog from binary format | |
SYNOPSIS | |
msgunfmt [OPTION] [FILE]... | |
DESCRIPTION | |
Convert binary message catalog to Uniforum style .po file. | |
Mandatory arguments to long options are mandatory for short options too. | |
Operation mode: | |
-j, --java | |
Java mode: input is a Java ResourceBundle class | |
--csharp | |
+ man msguniq | |
+ head -n 20 | |
MSGUNIQ(1) GNU MSGUNIQ(1) | |
NAME | |
msguniq - unify duplicate translations in message catalog | |
SYNOPSIS | |
msguniq [OPTION] [INPUTFILE] | |
DESCRIPTION | |
Unifies duplicate translations in a translation catalog. Finds duplicate translations of the same message ID. Such duplicates are invalid input for other programs like msgfmt, msgmerge or msgcat. By default, duplicates are merged together. When using the --repeated option, only duplicates are output, and all other messages are discarded. Comments and extracted comments will be cumulated, except | |
that if --use-first is specified, they will be taken from the first translation. File positions will be cumulated. When using the --unique option, duplicates are discarded. | |
Mandatory arguments to long options are mandatory for short options too. | |
Input file location: | |
INPUTFILE | |
input PO file | |
+ man mtr | |
+ head -n 20 | |
MTR(8) System Administration MTR(8) | |
NAME | |
mtr - a network diagnostic tool | |
SYNOPSIS | |
mtr [-4|-6] [-F FILENAME] [--report] [--report-wide] [--xml] [--gtk] [--curses] [--displaymode MODE] [--raw] [--csv] [--json] [--split] [--no-dns] [--show-ips] [-o FIELDS] [-y IPINFO] [--aslookup] [-i INTERVAL] [-c COUNT] [-s PACKETSIZE] [-B BITPATTERN] [-G GRACEPERIOD] [-Q TOS] [--mpls] [-a ADDRESS] [-f FIRST-TTL] [-m MAX-TTL] [-U MAX-UNKNOWN] [--udp] [--tcp] [--sctp] [-P PORT] [-L LOCALPORT] | |
[-Z TIMEOUT] [-M MARK] HOSTNAME | |
DESCRIPTION | |
mtr combines the functionality of the traceroute and ping programs in a single network diagnostic tool. | |
As mtr starts, it investigates the network connection between the host mtr runs on and HOSTNAME by sending packets with purposely low TTLs. It continues to send packets with low TTL, noting the response time of the intervening routers. This allows mtr to print the response percentage and response times of the internet route to HOSTNAME. A sudden increase in packet loss or response time is often an | |
indication of a bad (or simply overloaded) link. | |
The results are usually reported as round-trip-response times in milliseconds and the percentage of packetloss. | |
OPTIONS | |
+ man mtr-packet | |
+ head -n 20 | |
MTR-PACKET(8) System Administration MTR-PACKET(8) | |
NAME | |
mtr-packet - send and receive network probes | |
DESCRIPTION | |
mtr-packet is a tool for sending network probes to measure network connectivity and performance. Many network probes can be sent simultaneously by a single process instance of mtr-packet and additional probes can be generated by an instance of mtr-packet which already has network probes in flight. It is intended to be used by programs which invoke it with Unix pipes attached to its standard input and | |
output streams. | |
mtr-packet reads command requests from stdin, each separated by a newline character, and responds with command replies to stdout, also each separated by a newline character. The syntactic structure of requests and replies are the same. The following format is used: | |
TOKEN COMMAND [ARGUMENT-NAME ARGUMENT-VALUE ...] | |
TOKEN is a unique integer value. The same value will be used as the TOKEN for the response. This is necessary for associating replies with requests, as commands may be completed in a different order than they are requested. The invoker of mtr-packet should always use the TOKEN value to determine which command request has completed. | |
COMMAND is a string identifying the command request type. A common command is send-probe, which will transmit one network probe. | |
+ man namei | |
+ head -n 20 | |
NAMEI(1) User Commands NAMEI(1) | |
NAME | |
namei - follow a pathname until a terminal point is found | |
SYNOPSIS | |
namei [options] pathname... | |
DESCRIPTION | |
namei interprets its arguments as pathnames to any type of Unix file (symlinks, files, directories, and so forth). namei then follows each pathname until an endpoint is found (a file, a directory, a device node, etc). If it finds a symbolic link, it shows the link, and starts following it, indenting the output to show the context. | |
This program is useful for finding "too many levels of symbolic links" problems. | |
For each line of output, namei uses the following characters to identify the file type found: | |
f: = the pathname currently being resolved | |
d = directory | |
l = symbolic link (both the link and its contents are output) | |
+ man nameif | |
+ head -n 20 | |
NAMEIF(8) Linux System Administrator's Manual NAMEIF(8) | |
NAME | |
nameif - name network interfaces based on MAC addresses | |
SYNOPSIS | |
nameif [-c configfile] [-s] | |
nameif [-c configfile] [-s] {interface macaddress} | |
NOTE | |
This program is obsolete. For replacement check ip link. This functionality is also much better provided by udev methods. | |
DESCRIPTION | |
nameif renames network interfaces based on mac addresses. When no arguments are given /etc/mactab is read. Each line of it contains an interface name and a Ethernet MAC address. Comments are allowed starting with #. Otherwise the interfaces specified on the command line are processed. nameif looks for the interface with the given MAC address and renames it to the name given. | |
When the -s argument is given all error messages go to the syslog. | |
+ man nano | |
+ head -n 20 | |
NANO(1) General Commands Manual NANO(1) | |
NAME | |
nano - Nano's ANOther editor, an enhanced free Pico clone | |
SYNOPSIS | |
nano [options] [[+line[,column]] file]... | |
DESCRIPTION | |
nano is a small and friendly editor. It copies the look and feel of Pico, but is free software, and implements several features that Pico lacks, such as: opening multiple files, scrolling per line, undo/redo, syntax coloring, line numbering, and soft-wrapping overlong lines. | |
When giving a filename on the command line, the cursor can be put on a specific line by adding the line number with a plus sign (+) before the filename, and even in a specific column by adding it with a comma. | |
As a special case: if instead of a filename a dash (-) is given, nano will read data from standard input. | |
+ man needs-restarting | |
+ head -n 20 | |
needs-restarting(1) needs-restarting(1) | |
NAME | |
needs-restarting - report running processes that have been updated | |
SYNOPSIS | |
needs-restarting [options] | |
DESCRIPTION | |
needs-restarting is a program that reports a list of process ids that started running before they or some component that they use were updated. | |
OPTIONS | |
-h, --help | |
Display a help message, and then quit. | |
-u, --useronly | |
Show processes for my userid only. | |
+ man netreport | |
+ head -n 20 | |
NETREPORT(1) General Commands Manual NETREPORT(1) | |
NAME | |
netreport - request notification of network interface changes | |
SYNOPSIS | |
netreport [-r] | |
DESCRIPTION | |
netreport tells the network management scripts to send a SIGIO signal to the process which called netreport when any network interface status changes occur. | |
OPTIONS | |
-r Remove the current request (if any) for the calling process. | |
NOTES | |
If a program does not call netreport with the -r option before it exits, and another process is created with the same PID before any changes take place in interface status, it is possible that the new process will receive a spurious SIGIO. | |
+ man netstat | |
+ head -n 20 | |
NETSTAT(8) Linux System Administrator's Manual NETSTAT(8) | |
NAME | |
netstat - Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships | |
SYNOPSIS | |
netstat [address_family_options] [--tcp|-t] [--udp|-u] [--udplite|-U] [--sctp|-S] [--raw|-w] [--listening|-l] [--all|-a] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--symbolic|-N] [--extend|-e[--extend|-e]] [--timers|-o] [--program|-p] [--verbose|-v] [--continuous|-c] [--wide|-W] [delay] | |
netstat {--route|-r} [address_family_options] [--extend|-e[--extend|-e]] [--verbose|-v] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay] | |
netstat {--interfaces|-I|-i} [--all|-a] [--extend|-e] [--verbose|-v] [--program|-p] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay] | |
netstat {--groups|-g} [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay] | |
netstat {--masquerade|-M} [--extend|-e] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay] | |
netstat {--statistics|-s} [--tcp|-t] [--udp|-u] [--udplite|-U] [--sctp|-S] [--raw|-w] [delay] | |
+ man nettle-hash | |
+ head -n 20 | |
No manual entry for nettle-hash | |
+ man nettle-lfib-stream | |
+ head -n 20 | |
No manual entry for nettle-lfib-stream | |
+ man new-kernel-pkg | |
+ head -n 20 | |
NEW-KERNEL-PKG(8) System Manager's Manual NEW-KERNEL-PKG(8) | |
NAME | |
new-kernel-pkg - tool to script kernel installation | |
SYNOPSIS | |
new-kernel-pkg [-v] [--mkinitrd] [--rminitrd] [--dracut] | |
[--initrdfile=initrd-image [--depmod] [--rmmoddep] | |
[--kernel-args=args] [--remove-args=args] | |
[--banner=banner] [--multiboot=multiboot] | |
[--mbargs=mbargs] [--make-default] [--add-dracut-args] | |
[--add-plymouth-initrd] [--host-only] | |
<--install | --remove | --update | --rpmposttrans> <kernel-version> | |
DESCRIPTION | |
new-kernel-pkg is a tool used in packaging to automate the installation of a new kernel, including the creation of an initial ram filesystem image, updating of bootloader configuration, and other associated tasks. | |
+ man newaliases | |
+ head -n 20 | |
SENDMAIL(1) General Commands Manual SENDMAIL(1) | |
NAME | |
sendmail - Postfix to Sendmail compatibility interface | |
SYNOPSIS | |
sendmail [option ...] [recipient ...] | |
mailq | |
sendmail -bp | |
newaliases | |
sendmail -I | |
DESCRIPTION | |
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored. | |
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory. | |
+ man newaliases.postfix | |
+ head -n 20 | |
SENDMAIL(1) General Commands Manual SENDMAIL(1) | |
NAME | |
sendmail - Postfix to Sendmail compatibility interface | |
SYNOPSIS | |
sendmail [option ...] [recipient ...] | |
mailq | |
sendmail -bp | |
newaliases | |
sendmail -I | |
DESCRIPTION | |
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored. | |
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory. | |
+ man newgrp | |
+ head -n 20 | |
NEWGRP(1) User Commands NEWGRP(1) | |
NAME | |
newgrp - log in to a new group | |
SYNOPSIS | |
newgrp [-] [group] | |
DESCRIPTION | |
The newgrp command is used to change the current group ID during a login session. If the optional - flag is given, the user's environment will be reinitialized as though the user had logged in, otherwise the current environment, including current working directory, remains unchanged. | |
newgrp changes the current real group ID to the named group, or to the default group listed in /etc/passwd if no group name is given. newgrp also tries to add the group to the user groupset. If not root, the user will be prompted for a password if she does not have a password (in /etc/shadow if this user has an entry in the shadowed password file, or in /etc/passwd otherwise) and the group does, or if | |
the user is not listed as a member and the group has a password. The user will be denied access if the group password is empty and the user is not listed as a member. | |
If there is an entry for this group in /etc/gshadow, then the list of members and the password of this group will be taken from this file, otherwise, the entry in /etc/group is considered. | |
CONFIGURATION | |
The following configuration variables in /etc/login.defs change the behavior of this tool: | |
+ man newusers | |
+ head -n 20 | |
NEWUSERS(8) System Management Commands NEWUSERS(8) | |
NAME | |
newusers - update and create new users in batch | |
SYNOPSIS | |
newusers [options] [file] | |
DESCRIPTION | |
The newusers command reads a file (or the standard input by default) and uses this information to update a set of existing users or to create new users. Each line is in the same format as the standard password file (see passwd(5)) with the exceptions explained below: | |
pw_name:pw_passwd:pw_uid:pw_gid:pw_gecos:pw_dir:pw_shell | |
pw_name | |
This is the name of the user. | |
It can be the name of a new user or the name of an existing user (or an user created before by newusers). In case of an existing user, the user's information will be changed, otherwise a new user will be created. | |
+ man nf-ct-add | |
+ head -n 20 | |
No manual entry for nf-ct-add | |
+ man nf-ct-list | |
+ head -n 20 | |
No manual entry for nf-ct-list | |
+ man nf-exp-add | |
+ head -n 20 | |
No manual entry for nf-exp-add | |
+ man nf-exp-delete | |
+ head -n 20 | |
No manual entry for nf-exp-delete | |
+ man nf-exp-list | |
+ head -n 20 | |
No manual entry for nf-exp-list | |
+ man nf-log | |
+ head -n 20 | |
No manual entry for nf-log | |
+ man nf-monitor | |
+ head -n 20 | |
No manual entry for nf-monitor | |
+ man nf-queue | |
+ head -n 20 | |
No manual entry for nf-queue | |
+ man nfsdcltrack | |
+ head -n 20 | |
NFSDCLTRACK(8) NFSDCLTRACK(8) | |
NAME | |
nfsdcltrack - NFSv4 Client Tracking Callout Program | |
SYNOPSIS | |
nfsdcltrack [-d] [-f] [-s stable storage dir] <command> <args...> | |
DESCRIPTION | |
nfsdcltack is the NFSv4 client tracking callout program. It is not necessary to install this daemon on machines that are not acting as NFSv4 servers. | |
When a network partition is combined with a server reboot, there are edge conditions that can cause the server to grant lock reclaims when other clients have taken conflicting locks in the interim. A more detailed explanation of this issue is described in RFC 3530, section 8.6.3. | |
In order to prevent these problems, the server must track a small amount of per-client information on stable storage. This program provides the userspace piece of that functionality. When the kernel needs to manipulate the database that stores this info, it will execute this program to handle it. | |
OPTIONS | |
-d, --debug | |
Enable debug level logging. | |
+ man nfsidmap | |
+ head -n 20 | |
nfsidmap(5) File Formats Manual nfsidmap(5) | |
NAME | |
nfsidmap - The NFS idmapper upcall program | |
SYNOPSIS | |
nfsidmap [-v] [-t timeout] key desc | |
nfsidmap [-v] [-c] | |
nfsidmap [-v] [-u|-g|-r user] | |
nfsidmap -d | |
nfsidmap -l | |
nfsidmap -h | |
DESCRIPTION | |
The NFSv4 protocol represents the local system's UID and GID values on the wire as strings of the form user@domain. The process of translating from UID to string and string to UID is referred to as "ID mapping." | |
The system derives the user part of the string by performing a password or group lookup. The lookup mechanism is configured in /etc/idmapd.conf. | |
+ man nfsiostat | |
+ head -n 20 | |
nfsiostat(8) System Manager's Manual nfsiostat(8) | |
NAME | |
nfsiostat - Emulate iostat for NFS mount points using /proc/self/mountstats | |
SYNOPSIS | |
nfsiostat [[<interval>] [<count>]] [<options>][<mount_point>] | |
DESCRIPTION | |
The nfsiostat command displays NFS client per-mount statisitics. | |
<interval> | |
specifies the amount of time in seconds between each report. The first report contains statistics for the time since each file system was mounted. Each subsequent report contains statistics collected during the interval since the previous report. | |
<count> | |
If the <count> parameter is specified, the value of <count> determines the number of reports generated at <interval> seconds apart. if the interval parameter is specified without the <count> parameter, the command generates reports continuously. | |
<options> | |
+ man nfsiostat-sysstat | |
+ head -n 20 | |
NFSIOSTAT-SYSSTAT(1) Linux User's Manual NFSIOSTAT-SYSSTAT(1) | |
NAME | |
nfsiostat-sysstat (the nfsiostat command from the sysstat package) - Report input/output statistics for network filesystems (NFS). | |
SYNOPSIS | |
nfsiostat-sysstat [ -h ] [ -k | -m ] [ -t ] [ -V ] [ interval [ count ] ] | |
DESCRIPTION | |
The nfsiostat-sysstat command displays statistics about read and write operations on NFS filesystems. | |
The interval parameter specifies the amount of time in seconds between each report. The first report contains statistics for the time since system startup (boot). Each subsequent report contains statistics collected during the interval since the previous report. A report consists of an NFS header row followed by a line of statistics for each network filesystem that is mounted. The count parameter can | |
be specified in conjunction with the interval parameter. If the count parameter is specified, the value of count determines the number of reports generated at interval seconds apart. If the interval parameter is specified without the count parameter, the nfsiostat-sysstat command generates reports continuously. | |
REPORT | |
The Network Filesystem (NFS) report provides statistics for each mounted network filesystem. Transfer rates are shown in 1K blocks by default, unless the environment variable POSIXLY_CORRECT is set, in which case 512-byte blocks are used. The report shows the following fields: | |
+ man nfsstat | |
+ head -n 20 | |
nfsstat(8) System Manager's Manual nfsstat(8) | |
NAME | |
nfsstat - list NFS statistics | |
SYNOPSIS | |
nfsstat [OPTION]... | |
DESCRIPTION | |
The nfsstat displays statistics kept about NFS client and server activity. | |
OPTIONS | |
-s, --server | |
Print only server-side statistics. The default is to print both server and client statistics. | |
-c, --client | |
Print only client-side statistics. | |
+ man ngettext | |
+ head -n 20 | |
NGETTEXT(1) GNU NGETTEXT(1) | |
NAME | |
ngettext - translate message and choose plural form | |
SYNOPSIS | |
ngettext [OPTION] [TEXTDOMAIN] MSGID MSGID-PLURAL COUNT | |
DESCRIPTION | |
The ngettext program translates a natural language message into the user's language, by looking up the translation in a message catalog, and chooses the appropriate plural form, which depends on the number COUNT and the language of the message catalog where the translation was found. | |
Display native language translation of a textual message whose grammatical form depends on a number. | |
-d, --domain=TEXTDOMAIN | |
retrieve translated message from TEXTDOMAIN | |
-e enable expansion of some escape sequences | |
+ man nisdomainname | |
+ head -n 20 | |
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1) | |
NAME | |
hostname - show or set the system's host name | |
domainname - show or set the system's NIS/YP domain name | |
ypdomainname - show or set the system's NIS/YP domain name | |
nisdomainname - show or set the system's NIS/YP domain name | |
dnsdomainname - show the system's DNS domain name | |
SYNOPSIS | |
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis] | |
hostname [-b|--boot] [-F|--file filename] [hostname] | |
hostname [-h|--help] [-V|--version] | |
domainname [nisdomain] [-F file] | |
ypdomainname [nisdomain] [-F file] | |
nisdomainname [nisdomain] [-F file] | |
+ man nl-addr-add | |
+ head -n 20 | |
No manual entry for nl-addr-add | |
+ man nl-addr-delete | |
+ head -n 20 | |
No manual entry for nl-addr-delete | |
+ man nl-addr-list | |
+ head -n 20 | |
No manual entry for nl-addr-list | |
+ man nl-class-add | |
+ head -n 20 | |
No manual entry for nl-class-add | |
+ man nl-class-delete | |
+ head -n 20 | |
No manual entry for nl-class-delete | |
+ man nl-class-list | |
+ head -n 20 | |
No manual entry for nl-class-list | |
+ man nl-classid-lookup | |
+ head -n 20 | |
nl-classid-lookup(8) System Manager's Manual nl-classid-lookup(8) | |
NAME | |
nl-classid-lookup - Lookup classid definitions | |
SYNOPSIS | |
nl-classid-lookup [-hv] [-r] [--raw] name | |
DESCRIPTION | |
nl-classid-lookup searches the classid database for a matching entry. It is used to resolve qdisc/class names to classid values and vice versa. | |
OPTIONS | |
-h or --help | |
Print help text to console and exit. | |
-v or --version | |
+ man nl-cls-add | |
+ head -n 20 | |
No manual entry for nl-cls-add | |
+ man nl-cls-delete | |
+ head -n 20 | |
No manual entry for nl-cls-delete | |
+ man nl-cls-list | |
+ head -n 20 | |
No manual entry for nl-cls-list | |
+ man nl-fib-lookup | |
+ head -n 20 | |
No manual entry for nl-fib-lookup | |
+ man nl-link-enslave | |
+ head -n 20 | |
No manual entry for nl-link-enslave | |
+ man nl-link-ifindex2name | |
+ head -n 20 | |
No manual entry for nl-link-ifindex2name | |
+ man nl-link-list | |
+ head -n 20 | |
No manual entry for nl-link-list | |
+ man nl-link-name2ifindex | |
+ head -n 20 | |
No manual entry for nl-link-name2ifindex | |
+ man nl-link-release | |
+ head -n 20 | |
No manual entry for nl-link-release | |
+ man nl-link-set | |
+ head -n 20 | |
No manual entry for nl-link-set | |
+ man nl-link-stats | |
+ head -n 20 | |
No manual entry for nl-link-stats | |
+ man nl-list-caches | |
+ head -n 20 | |
No manual entry for nl-list-caches | |
+ man nl-list-sockets | |
+ head -n 20 | |
No manual entry for nl-list-sockets | |
+ man nl-monitor | |
+ head -n 20 | |
No manual entry for nl-monitor | |
+ man nl-neigh-add | |
+ head -n 20 | |
No manual entry for nl-neigh-add | |
+ man nl-neigh-delete | |
+ head -n 20 | |
No manual entry for nl-neigh-delete | |
+ man nl-neigh-list | |
+ head -n 20 | |
No manual entry for nl-neigh-list | |
+ man nl-neightbl-list | |
+ head -n 20 | |
No manual entry for nl-neightbl-list | |
+ man nl-pktloc-lookup | |
+ head -n 20 | |
nl-pktloc-lookup(8) System Manager's Manual nl-pktloc-lookup(8) | |
NAME | |
nl-pktloc-lookup - Lookup packet location definitions | |
SYNOPSIS | |
nl-pktloc-lookup name | |
nl-pktloc-lookup --list | |
DESCRIPTION | |
nl-pktloc-lookup searches the packet location database for a matching entry. It is used to resolve packet location aliases to their definition, i.e. alignment, layer, offset, and mask. | |
OPTIONS | |
-h or --help | |
Print help text to console and exit. | |
+ man nl-qdisc-add | |
+ head -n 20 | |
nl-qdisc(8) System Manager's Manual nl-qdisc(8) | |
NAME | |
nl-qdisc-{add|list|delete} - Manage queueing disciplines | |
SYNOPSIS | |
nl-qdisc-add --dev dev --parent id [OPTIONS] qdisc-type [QDISC] | |
nl-qdisc-delete [ --interactive ] [OPTIONS] | |
nl-qdisc-list [OPTIONS] | |
DESCRIPTION | |
The nl-qdisc tools allow to manage and configure queueing disciplines (qdiscs) in the kernel. | |
OPTIONS | |
+ man nl-qdisc-delete | |
+ head -n 20 | |
nl-qdisc(8) System Manager's Manual nl-qdisc(8) | |
NAME | |
nl-qdisc-{add|list|delete} - Manage queueing disciplines | |
SYNOPSIS | |
nl-qdisc-add --dev dev --parent id [OPTIONS] qdisc-type [QDISC] | |
nl-qdisc-delete [ --interactive ] [OPTIONS] | |
nl-qdisc-list [OPTIONS] | |
DESCRIPTION | |
The nl-qdisc tools allow to manage and configure queueing disciplines (qdiscs) in the kernel. | |
OPTIONS | |
+ man nl-qdisc-list | |
+ head -n 20 | |
nl-qdisc(8) System Manager's Manual nl-qdisc(8) | |
NAME | |
nl-qdisc-{add|list|delete} - Manage queueing disciplines | |
SYNOPSIS | |
nl-qdisc-add --dev dev --parent id [OPTIONS] qdisc-type [QDISC] | |
nl-qdisc-delete [ --interactive ] [OPTIONS] | |
nl-qdisc-list [OPTIONS] | |
DESCRIPTION | |
The nl-qdisc tools allow to manage and configure queueing disciplines (qdiscs) in the kernel. | |
OPTIONS | |
+ man nl-route-add | |
+ head -n 20 | |
No manual entry for nl-route-add | |
+ man nl-route-delete | |
+ head -n 20 | |
No manual entry for nl-route-delete | |
+ man nl-route-get | |
+ head -n 20 | |
No manual entry for nl-route-get | |
+ man nl-route-list | |
+ head -n 20 | |
No manual entry for nl-route-list | |
+ man nl-rule-list | |
+ head -n 20 | |
No manual entry for nl-rule-list | |
+ man nl-tctree-list | |
+ head -n 20 | |
No manual entry for nl-tctree-list | |
+ man nl-util-addr | |
+ head -n 20 | |
No manual entry for nl-util-addr | |
+ man nm | |
+ head -n 20 | |
NM(1) GNU Development Tools NM(1) | |
NAME | |
nm - list symbols from object files | |
SYNOPSIS | |
nm [-A|-o|--print-file-name] [-a|--debug-syms] | |
[-B|--format=bsd] [-C|--demangle[=style]] | |
[-D|--dynamic] [-fformat|--format=format] | |
[-g|--extern-only] [-h|--help] | |
[-l|--line-numbers] [--inlines] | |
[-n|-v|--numeric-sort] | |
[-P|--portability] [-p|--no-sort] | |
[-r|--reverse-sort] [-S|--print-size] | |
[-s|--print-armap] [-t radix|--radix=radix] | |
[-u|--undefined-only] [-V|--version] | |
[-X 32_64] [--defined-only] [--no-demangle] | |
[--plugin name] [--size-sort] [--special-syms] | |
+ man nologin | |
+ head -n 20 | |
NOLOGIN(8) System Administration NOLOGIN(8) | |
NAME | |
nologin - politely refuse a login | |
SYNOPSIS | |
nologin [-V] [-h] | |
DESCRIPTION | |
nologin displays a message that an account is not available and exits non-zero. It is intended as a replacement shell field to deny login access to an account. | |
If the file /etc/nologin.txt exists, nologin displays its contents to the user instead of the default message. | |
The exit code returned by nologin is always 1. | |
OPTIONS | |
-h, --help | |
Display help text and exit. | |
+ man nsenter | |
+ head -n 20 | |
NSENTER(1) User Commands NSENTER(1) | |
NAME | |
nsenter - run program with namespaces of other processes | |
SYNOPSIS | |
nsenter [options] [program [arguments]] | |
DESCRIPTION | |
Enters the namespaces of one or more other processes and then executes the specified program. If program is not given, then ``${SHELL}'' is run (default: /bin/sh). | |
Enterable namespaces are: | |
mount namespace | |
Mounting and unmounting filesystems will not affect the rest of the system, except for filesystems which are explicitly marked as shared (with mount --make-shared; see /proc/self/mountinfo for the shared flag). For further details, see mount_namespaces(7) and the discussion of the CLONE_NEWNS flag in clone(2). | |
UTS namespace | |
Setting hostname or domainname will not affect the rest of the system. For further details, see namespaces(7) and the discussion of the CLONE_NEWUTS flag in clone(2). | |
+ man nslookup | |
+ head -n 20 | |
NSLOOKUP(1) BIND9 NSLOOKUP(1) | |
NAME | |
nslookup - query Internet name servers interactively | |
SYNOPSIS | |
nslookup [-option] [name | -] [server] | |
DESCRIPTION | |
Nslookup is a program to query Internet domain name servers. Nslookup has two modes: interactive and non-interactive. Interactive mode allows the user to query name servers for information about various hosts and domains or to print a list of hosts in a domain. Non-interactive mode is used to print just the name and requested information for a host or domain. | |
ARGUMENTS | |
Interactive mode is entered in the following cases: | |
1. when no arguments are given (the default name server will be used) | |
2. when the first argument is a hyphen (-) and the second argument is the host name or Internet address of a name server. | |
+ man nstat | |
+ head -n 20 | |
RTACCT(8) System Manager's Manual RTACCT(8) | |
NAME | |
nstat, rtacct - network statistics tools. | |
SYNOPSIS | |
Usage: nstat [ -h?vVzrnasd:t: ] [ PATTERN [ PATTERN ] ] | |
Usage: rtacct [ -h?vVzrnasd:t: ] [ ListOfRealms ] | |
DESCRIPTION | |
nstat and rtacct are simple tools to monitor kernel snmp counters and network interface statistics. | |
OPTIONS | |
-h, --help Print help | |
+ man nsupdate | |
+ head -n 20 | |
NSUPDATE(1) BIND9 NSUPDATE(1) | |
NAME | |
nsupdate - Dynamic DNS update utility | |
SYNOPSIS | |
nsupdate [-d] [-D] [-i] [-L level] [[-g] | [-o] | [-l] | [-y [hmac:]keyname:secret] | [-k keyfile]] [-t timeout] [-u udptimeout] [-r udpretries] [-R randomdev] [-v] [-T] [-P] [-V] [filename] | |
DESCRIPTION | |
nsupdate is used to submit Dynamic DNS Update requests as defined in RFC 2136 to a name server. This allows resource records to be added or removed from a zone without manually editing the zone file. A single update request can contain requests to add or remove more than one resource record. | |
Zones that are under dynamic control via nsupdate or a DHCP server should not be edited by hand. Manual edits could conflict with dynamic updates and cause data to be lost. | |
The resource records that are dynamically added or removed with nsupdate have to be in the same zone. Requests are sent to the zone's master server. This is identified by the MNAME field of the zone's SOA record. | |
Transaction signatures can be used to authenticate the Dynamic DNS updates. These use the TSIG resource record type described in RFC 2845 or the SIG(0) record described in RFC 2535 and RFC 2931 or GSS-TSIG as described in RFC 3645. | |
TSIG relies on a shared secret that should only be known to nsupdate and the name server. For instance, suitable key and server statements would be added to /etc/named.conf so that the name server can associate the appropriate secret key and algorithm with the IP address of the client application that will be using TSIG authentication. You can use ddns-confgen to generate suitable configuration | |
+ man ntsysv | |
+ head -n 20 | |
NTSYSV(8) System Manager's Manual NTSYSV(8) | |
NAME | |
ntsysv - simple interface for configuring runlevels | |
SYNOPSIS | |
ntsysv [--back] [--level <levels>] | |
DESCRIPTION | |
ntsysv is a simple interface for configuring runlevel services which are also configurable through chkconfig. By default, it configures runlevels 2, 3, 4, and 5. If the user would like to configure other runlevels, those levels can be specified on the command line by listing the levels after --level, without any spaces. For example, the option --level 016 edits runlevels 0, 1, and 6. | |
A service is considered to be started in the runlevel set if it is started in any of the runlevels which are being edited. | |
The ntsysv window normally contains a Cancel button. If --back is specified, a Back button appears instead. | |
RETURN CODES | |
ntsysv returns 0 on success, 2 on error, and 1 if the user cancelled (or backed out of) the program. | |
+ man objcopy | |
+ head -n 20 | |
OBJCOPY(1) GNU Development Tools OBJCOPY(1) | |
NAME | |
objcopy - copy and translate object files | |
SYNOPSIS | |
objcopy [-F bfdname|--target=bfdname] | |
[-I bfdname|--input-target=bfdname] | |
[-O bfdname|--output-target=bfdname] | |
[-B bfdarch|--binary-architecture=bfdarch] | |
[-S|--strip-all] | |
[-g|--strip-debug] | |
[-K symbolname|--keep-symbol=symbolname] | |
[-N symbolname|--strip-symbol=symbolname] | |
[--strip-unneeded-symbol=symbolname] | |
[-G symbolname|--keep-global-symbol=symbolname] | |
[--localize-hidden] | |
[-L symbolname|--localize-symbol=symbolname] | |
+ man objdump | |
+ head -n 20 | |
OBJDUMP(1) GNU Development Tools OBJDUMP(1) | |
NAME | |
objdump - display information from object files. | |
SYNOPSIS | |
objdump [-a|--archive-headers] | |
[-b bfdname|--target=bfdname] | |
[-C|--demangle[=style] ] | |
[-d|--disassemble] | |
[-D|--disassemble-all] | |
[-z|--disassemble-zeroes] | |
[-EB|-EL|--endian={big | little }] | |
[-f|--file-headers] | |
[-F|--file-offsets] | |
[--file-start-context] | |
[-g|--debugging] | |
[-e|--debugging-tags] | |
+ man on_ac_power | |
+ head -n 20 | |
ON_AC_POWER(1) [FIXME: manual] ON_AC_POWER(1) | |
NAME | |
on_ac_power - test whether the computer is running on line power | |
SYNOPSIS | |
on_ac_power | |
DESCRIPTION | |
This manual page documents briefly the on_ac_power command. | |
on_ac_power is a command line program to test whether the computer is running on line power | |
EXIT CODES | |
The command succeeds (status 0) if the system is using line power and fails (status other than 0) otherwise. It is designed to be easy to use in shell scripts. | |
0 (true) | |
System is on line power. | |
+ man open | |
+ head -n 20 | |
OPENVT(1) Linux 1.x OPENVT(1) | |
NAME | |
openvt - start a program on a new virtual terminal (VT). | |
SYNOPSIS | |
openvt [-c vtnumber] [OPTIONS] [--] command | |
DESCRIPTION | |
openvt will find the first available VT, and run on it the given command with the given command options, standard input, output and error are directed to that terminal. The current search path ($PATH) is used to find the requested command. If no command is specified then the environment variable $SHELL is used. | |
OPTIONS | |
-c, --console=VTNUMBER | |
Use the given VT number and not the first available. Note you must have write access to the supplied VT for this to work; | |
-f, --force | |
Force opening a VT without checking whether it is already in use; | |
+ man openssl | |
+ head -n 20 | |
OPENSSL(1) OpenSSL OPENSSL(1) | |
NAME | |
openssl - OpenSSL command line tool | |
SYNOPSIS | |
openssl command [ command_opts ] [ command_args ] | |
openssl [ list-standard-commands | list-message-digest-commands | list-cipher-commands | list-cipher-algorithms | list-message-digest-algorithms | list-public-key-algorithms] | |
openssl no-XXX [ arbitrary options ] | |
DESCRIPTION | |
OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) network protocols and related cryptography standards required by them. | |
The openssl program is a command line tool for using the various cryptography functions of OpenSSL's crypto library from the shell. It can be used for | |
o Creation and management of private keys, public keys and parameters | |
+ man openvt | |
+ head -n 20 | |
OPENVT(1) Linux 1.x OPENVT(1) | |
NAME | |
openvt - start a program on a new virtual terminal (VT). | |
SYNOPSIS | |
openvt [-c vtnumber] [OPTIONS] [--] command | |
DESCRIPTION | |
openvt will find the first available VT, and run on it the given command with the given command options, standard input, output and error are directed to that terminal. The current search path ($PATH) is used to find the requested command. If no command is specified then the environment variable $SHELL is used. | |
OPTIONS | |
-c, --console=VTNUMBER | |
Use the given VT number and not the first available. Note you must have write access to the supplied VT for this to work; | |
-f, --force | |
Force opening a VT without checking whether it is already in use; | |
+ man os-prober | |
+ head -n 20 | |
os-prober(1) General Commands Manual os-prober(1) | |
NAME | |
os-prober — Discover bootable partitions on the local system. | |
SYNOPSIS | |
os-prober | |
DESCRIPTION | |
The os-prober utility will scan all disks available on the system for other operating systems. For each discovered OS, it will output a line of the form: | |
<partition>:<descriptive name>:<short name>:<kind of loader> | |
For example, on system with Windows XP installed on /dev/sda1, os-prober will display: | |
/dev/sda1:Windows NT/2000/XP:WinNT:chain | |
Note that for Linux systems that are discovered, a call to linux-boot-prober may be required in order to fully discover the necessary information to boot the system. | |
+ man osd_login | |
+ head -n 20 | |
No manual entry for osd_login | |
+ man package-cleanup | |
+ head -n 20 | |
package-cleanup(1) package-cleanup(1) | |
NAME | |
package-cleanup - clean up locally installed, duplicate, or orphaned packages | |
SYNOPSIS | |
package-cleanup [options] <item ...> | |
DESCRIPTION | |
package-cleanup is a program for cleaning up the locally-installed RPMs. | |
GENERAL OPTIONS | |
-c <config file> | |
Use alternative config file (default is /etc/yum.conf). | |
-h, --help | |
Help; display a help message and then quit. | |
+ man packer | |
+ head -n 20 | |
No manual entry for packer | |
+ man pam_console_apply | |
+ head -n 20 | |
pam_console_apply(8) System Administrator's Manual pam_console_apply(8) | |
NAME | |
pam_console_apply - set or revoke permissions for users at the system console | |
SYNOPSIS | |
pam_console_apply [-f <fstab file>] [-c <console.perms file>] [-r] [-t <tty>] [-s] [-d] [<device file> ...] | |
DESCRIPTION | |
pam_console_apply is a helper executable which sets or resets permissions on device nodes. | |
If /var/run/console.lock exists, pam_console_apply will grant permissions to the user listed therein. If the lock file does not exist, permissions are reset according to defaults set in console.perms files, normally configured to set permissions on devices so that root owns them. | |
When initializing its configuration it first parses the /etc/security/console.perms file and then it searches for files ending with the .perms suffix in the /etc/security/console.perms.d directory. These files are parsed in the lexical order in "C" locale. Permission rules are appended to a global list, console and device class definitions override previous definitions of the same class. | |
ARGUMENTS | |
-c Load other console.perms file than the default one. | |
-f Load other fstab file than the default one (/etc/fstab). | |
+ man pam_tally2 | |
+ head -n 20 | |
PAM_TALLY2(8) Linux-PAM Manual PAM_TALLY2(8) | |
NAME | |
pam_tally2 - The login counter (tallying) module | |
SYNOPSIS | |
pam_tally2.so [file=/path/to/counter] [onerr=[fail|succeed]] [magic_root] [even_deny_root] [deny=n] [lock_time=n] [unlock_time=n] [root_unlock_time=n] [serialize] [audit] [silent] [no_log_info] | |
pam_tally2 [--file /path/to/counter] [--user username] [--reset[=n]] [--quiet] | |
DESCRIPTION | |
This module maintains a count of attempted accesses, can reset count on success, can deny access if too many attempts fail. | |
pam_tally2 comes in two parts: pam_tally2.so and pam_tally2. The former is the PAM module and the latter, a stand-alone program. pam_tally2 is an (optional) application which can be used to interrogate and manipulate the counter file. It can display users' counts, set individual counts, or clear all counts. Setting artificially high counts may be useful for blocking users without changing their | |
passwords. For example, one might find it useful to clear all counts every midnight from a cron job. | |
Normally, failed attempts to access root will not cause the root account to become blocked, to prevent denial-of-service: if your users aren't given shell accounts and root may only login via su or at the machine console (not telnet/rsh, etc), this is safe. | |
+ man pam_timestamp_check | |
+ head -n 20 | |
PAM_TIMESTAMP_CHECK(8) Linux-PAM Manual PAM_TIMESTAMP_CHECK(8) | |
NAME | |
pam_timestamp_check - Check to see if the default timestamp is valid | |
SYNOPSIS | |
pam_timestamp_check [-k] [-d] [target_user] | |
DESCRIPTION | |
With no arguments pam_timestamp_check will check to see if the default timestamp is valid, or optionally remove it. | |
OPTIONS | |
-k | |
Instead of checking the validity of a timestamp, remove it. This is analogous to sudo's -k option. | |
-d | |
Instead of returning validity using an exit status, loop indefinitely, polling regularly and printing the status on standard output. | |
+ man parted | |
+ head -n 20 | |
PARTED(8) GNU Parted Manual PARTED(8) | |
NAME | |
parted - a partition manipulation program | |
SYNOPSIS | |
parted [options] [device [command [options...]...]] | |
DESCRIPTION | |
parted is a program to manipulate disk partitions. It supports multiple partition table formats, including MS-DOS and GPT. It is useful for creating space for new operating systems, reorganising disk usage, and copying data to new hard disks. | |
This manual page documents parted briefly. Complete documentation is distributed with the package in GNU Info format. | |
OPTIONS | |
-h, --help | |
displays a help message | |
-l, --list | |
+ man partprobe | |
+ head -n 20 | |
PARTPROBE(8) GNU Parted Manual PARTPROBE(8) | |
NAME | |
partprobe - inform the OS of partition table changes | |
SYNOPSIS | |
partprobe [-d] [-s] [devices...] | |
DESCRIPTION | |
This manual page documents briefly the partprobe command. | |
partprobe is a program that informs the operating system kernel of partition table changes, by requesting that the operating system re-read the partition table. | |
OPTIONS | |
This program uses short UNIX style options. | |
-d Don't update the kernel. | |
+ man partx | |
+ head -n 20 | |
PARTX(8) System Administration PARTX(8) | |
NAME | |
partx - tell the kernel about the presence and numbering of on-disk partitions | |
SYNOPSIS | |
partx [-a|-d|-P|-r|-s|-u] [-t type] [-n M:N] [-] disk | |
partx [-a|-d|-P|-r|-s|-u] [-t type] partition [disk] | |
DESCRIPTION | |
Given a device or disk-image, partx tries to parse the partition table and list its contents. It can also tell the kernel to add or remove partitions from its bookkeeping. | |
The disk argument is optional when a partition argument is provided. To force scanning a partition as if it were a whole disk (for example to list nested subpartitions), use the argument "-" (hyphen-minus). For example: | |
partx --show - /dev/sda3 | |
This will see sda3 as a whole-disk rather than as a partition. | |
+ man passwd | |
+ head -n 20 | |
PASSWD(1) User utilities PASSWD(1) | |
NAME | |
passwd - update user's authentication tokens | |
SYNOPSIS | |
passwd [-k] [-l] [-u [-f]] [-d] [-e] [-n mindays] [-x maxdays] [-w warndays] [-i inactivedays] [-S] [--stdin] [username] | |
DESCRIPTION | |
The passwd utility is used to update user's authentication token(s). | |
This task is achieved through calls to the Linux-PAM and Libuser API. Essentially, it initializes itself as a "passwd" service with Linux-PAM and utilizes configured password modules to authenticate and then update a user's password. | |
A simple entry in the global Linux-PAM configuration file for this service would be: | |
+ man pdata_tools | |
+ head -n 20 | |
No manual entry for pdata_tools | |
+ man perl | |
+ head -n 20 | |
PERL(1) Perl Programmers Reference Guide PERL(1) | |
NAME | |
perl - The Perl 5 language interpreter | |
SYNOPSIS | |
perl [ -sTtuUWX ] [ -hv ] [ -V[:configvar] ] [ -cw ] [ -d[t][:debugger] ] [ -D[number/list] ] [ -pna ] [ -Fpattern ] [ -l[octal] ] [ -0[octal/hexadecimal] ] [ -Idir ] [ -m[-]module ] [ -M[-]'module...' ] [ -f ] [ -C [number/list] ] [ -S ] [ -x[dir] ] [ -i[extension] ] [ [-e|-E] 'command' ] [ -- ] [ programfile ] [ argument ]... | |
GETTING HELP | |
The perldoc program gives you access to all the documentation that comes with Perl. You can get more documentation, tutorials and community support online at <http://www.perl.org/>. | |
If you're new to Perl, you should start by running "perldoc perlintro", which is a general intro for beginners and provides some background to help you navigate the rest of Perl's extensive documentation. Run "perldoc perldoc" to learn more things you can do with perldoc. | |
For ease of access, the Perl manual has been split up into several sections. | |
Overview | |
perl Perl overview (this section) | |
perlintro Perl introduction for beginners | |
+ man perl5.16.3 | |
+ head -n 20 | |
No manual entry for perl5.16.3 | |
+ man perlbug | |
+ head -n 20 | |
PERLBUG(1) Perl Programmers Reference Guide PERLBUG(1) | |
NAME | |
perlbug - how to submit bug reports on Perl | |
SYNOPSIS | |
perlbug | |
perlbug [ -v ] [ -a address ] [ -s subject ] [ -b body | -f inputfile ] [ -F outputfile ] [ -r returnaddress ] [ -e editor ] [ -c adminaddress | -C ] [ -S ] [ -t ] [ -d ] [ -A ] [ -h ] [ -T ] | |
perlbug [ -v ] [ -r returnaddress ] | |
[ -A ] [ -ok | -okay | -nok | -nokay ] | |
perlthanks | |
DESCRIPTION | |
This program is designed to help you generate and send bug reports (and thank-you notes) about perl5 and the modules which ship with it. | |
+ man perldoc | |
+ head -n 20 | |
PERLDOC(1) User Contributed Perl Documentation PERLDOC(1) | |
NAME | |
perldoc - Look up Perl documentation in Pod format. | |
SYNOPSIS | |
perldoc [-h] [-D] [-t] [-u] [-m] [-l] [-F] | |
[-i] [-V] [-T] [-r] | |
[-d destination_file] | |
[-o formatname] | |
[-M FormatterClassName] | |
[-w formatteroption:value] | |
[-n nroff-replacement] | |
[-X] | |
[-L language_code] | |
PageName|ModuleName|ProgramName|URL | |
Examples: | |
+ man perlthanks | |
+ head -n 20 | |
PERLBUG(1) Perl Programmers Reference Guide PERLBUG(1) | |
NAME | |
perlbug - how to submit bug reports on Perl | |
SYNOPSIS | |
perlbug | |
perlbug [ -v ] [ -a address ] [ -s subject ] [ -b body | -f inputfile ] [ -F outputfile ] [ -r returnaddress ] [ -e editor ] [ -c adminaddress | -C ] [ -S ] [ -t ] [ -d ] [ -A ] [ -h ] [ -T ] | |
perlbug [ -v ] [ -r returnaddress ] | |
[ -A ] [ -ok | -okay | -nok | -nokay ] | |
perlthanks | |
DESCRIPTION | |
This program is designed to help you generate and send bug reports (and thank-you notes) about perl5 and the modules which ship with it. | |
+ man pgrep | |
+ head -n 20 | |
PGREP(1) User Commands PGREP(1) | |
NAME | |
pgrep, pkill - look up or signal processes based on name and other attributes | |
SYNOPSIS | |
pgrep [options] pattern | |
pkill [options] pattern | |
DESCRIPTION | |
pgrep looks through the currently running processes and lists the process IDs which match the selection criteria to stdout. All the criteria have to match. For example, | |
$ pgrep -u root sshd | |
will only list the processes called sshd AND owned by root. On the other hand, | |
$ pgrep -u root,daemon | |
+ man piconv | |
+ head -n 20 | |
PICONV(1) User Contributed Perl Documentation PICONV(1) | |
NAME | |
piconv -- iconv(1), reinvented in perl | |
SYNOPSIS | |
piconv [-f from_encoding] [-t to_encoding] | |
[-p|--perlqq|--htmlcref|--xmlcref] [-C N|-c] [-D] [-S scheme] | |
[-s string|file...] | |
piconv -l | |
piconv -r encoding_alias | |
piconv -h | |
DESCRIPTION | |
piconv is perl version of iconv, a character encoding converter widely available for various Unixen today. This script was primarily a technology demonstrator for Perl 5.8.0, but you can use piconv in the place of iconv for virtually any case. | |
piconv converts the character encoding of either STDIN or files specified in the argument and prints out to STDOUT. | |
+ man pidof | |
+ head -n 20 | |
PIDOF(8) Linux System Administrator's Manual PIDOF(8) | |
NAME | |
pidof -- find the process ID of a running program. | |
SYNOPSIS | |
pidof [-s] [-c] [-n] [-x] [-m] [-o omitpid[,omitpid..]] [-o omitpid[,omitpid..]..] program [program..] | |
DESCRIPTION | |
Pidof finds the process id's (pids) of the named programs. It prints those id's on the standard output. This program is on some systems used in run-level change scripts, especially when the system has a System-V like rc structure. In that case these scripts are located in /etc/rc?.d, where ? is the runlevel. If the system has a start-stop-daemon (8) program that should be used instead. | |
OPTIONS | |
-s Single shot - this instructs the program to only return one pid. | |
-c Only return process ids that are running with the same root directory. This option is ignored for non-root users, as they will be unable to check the current root directory of processes they do not own. | |
-n Avoid stat(2) system function call on all binaries which are located on network based file systems like NFS. Instead of using this option the the variable PIDOF_NETFS may be set and exported. | |
+ man pidstat | |
+ head -n 20 | |
PIDSTAT(1) Linux User's Manual PIDSTAT(1) | |
NAME | |
pidstat - Report statistics for Linux tasks. | |
SYNOPSIS | |
pidstat [ -d ] [ -h ] [ -I ] [ -l ] [ -r ] [ -s ] [ -t ] [ -U [ username ] ] [ -u ] [ -V ] [ -w ] [ -C comm ] [ -p { pid [,...] | SELF | ALL } ] [ -T { TASK | CHILD | ALL } ] [ interval [ count ] ] | |
DESCRIPTION | |
The pidstat command is used for monitoring individual tasks currently being managed by the Linux kernel. It writes to standard output activities for every task selected with option -p or for every task managed by the Linux kernel if option -p ALL has been used. Not selecting any tasks is equivalent to specifying -p ALL but only active tasks (tasks with non-zero statistics values) will appear in the | |
report. | |
The pidstat command can also be used for monitoring the child processes of selected tasks. Read about option -T below. | |
The interval parameter specifies the amount of time in seconds between each report. A value of 0 (or no parameters at all) indicates that tasks statistics are to be reported for the time since system startup (boot). The count parameter can be specified in conjunction with the interval parameter if this one is not set to zero. The value of count determines the number of reports generated at interval | |
seconds apart. If the interval parameter is specified without the count parameter, the pidstat command generates reports continuously. | |
You can select information about specific task activities using flags. Not specifying any flags selects only CPU activity. | |
+ man ping | |
+ head -n 20 | |
PING(8) System Manager's Manual: iputils PING(8) | |
NAME | |
ping - send ICMP ECHO_REQUEST to network hosts | |
SYNOPSIS | |
ping [-aAbBdDfhLnOqrRUvV46] [-c count] [-F flowlabel] [-i interval] [-I interface] [-l preload] [-m mark] [-M pmtudisc_option] [-N nodeinfo_option] [-w deadline] [-W timeout] [-p pattern] [-Q tos] [-s packetsize] [-S sndbuf] [-t ttl] [-T timestamp option] [hop ...] destination | |
DESCRIPTION | |
ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of ``pad'' bytes used to fill out the packet. | |
ping works with both IPv4 and IPv6. Using only one of them explicitly can be enforced by specifying -4 or -6. | |
ping can also send IPv6 Node Information Queries (RFC4620). Intermediate hops may not be allowed, because IPv6 source routing was deprecated (RFC5095). | |
OPTIONS | |
-4 Use IPv4 only. | |
+ man ping6 | |
+ head -n 20 | |
PING(8) System Manager's Manual: iputils PING(8) | |
NAME | |
ping - send ICMP ECHO_REQUEST to network hosts | |
SYNOPSIS | |
ping [-aAbBdDfhLnOqrRUvV46] [-c count] [-F flowlabel] [-i interval] [-I interface] [-l preload] [-m mark] [-M pmtudisc_option] [-N nodeinfo_option] [-w deadline] [-W timeout] [-p pattern] [-Q tos] [-s packetsize] [-S sndbuf] [-t ttl] [-T timestamp option] [hop ...] destination | |
DESCRIPTION | |
ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of ``pad'' bytes used to fill out the packet. | |
ping works with both IPv4 and IPv6. Using only one of them explicitly can be enforced by specifying -4 or -6. | |
ping can also send IPv6 Node Information Queries (RFC4620). Intermediate hops may not be allowed, because IPv6 source routing was deprecated (RFC5095). | |
OPTIONS | |
-4 Use IPv4 only. | |
+ man pip-3 | |
+ head -n 20 | |
No manual entry for pip-3 | |
+ man pip-3.7 | |
+ head -n 20 | |
No manual entry for pip-3.7 | |
+ man pip3 | |
+ head -n 20 | |
No manual entry for pip3 | |
+ man pip3.7 | |
+ head -n 20 | |
No manual entry for pip3.7 | |
+ man pivot_root | |
+ head -n 20 | |
PIVOT_ROOT(8) System Administration PIVOT_ROOT(8) | |
NAME | |
pivot_root - change the root filesystem | |
SYNOPSIS | |
pivot_root new_root put_old | |
DESCRIPTION | |
pivot_root moves the root file system of the current process to the directory put_old and makes new_root the new root file system. Since pivot_root(8) simply calls pivot_root(2), we refer to the man page of the latter for further details. | |
Note that, depending on the implementation of pivot_root, root and cwd of the caller may or may not change. The following is a sequence for invoking pivot_root that works in either case, assuming that pivot_root and chroot are in the current PATH: | |
cd new_root | |
pivot_root . put_old | |
exec chroot . command | |
Note that chroot must be available under the old root and under the new root, because pivot_root may or may not have implicitly changed the root directory of the shell. | |
+ man pkcs1-conv | |
+ head -n 20 | |
No manual entry for pkcs1-conv | |
+ man pkg-config | |
+ head -n 20 | |
pkg-config(1) General Commands Manual pkg-config(1) | |
NAME | |
pkg-config - Return metainformation about installed libraries | |
SYNOPSIS | |
pkg-config [--modversion] [--version] [--help] [--atleast-pkgconfig-version=VERSION] [--print-errors] [--short-errors] [--silence-errors] [--errors-to-stdout] [--debug] [--cflags] [--libs] [--libs-only-L] [--libs-only-l] [--cflags-only-I] [--libs-only-other] [--cflags-only-other] [--variable=VARIABLENAME] [--define-variable=VARIABLENAME=VARIABLEVALUE] [--print-variables] [--uninstalled] [--exists] | |
[--atleast-version=VERSION] [--exact-version=VERSION] [--max-version=VERSION] [--list-all] [LIBRARIES...] [--print-provides] [--print-requires] [--print-requires-private] [LIBRARIES...] | |
DESCRIPTION | |
The pkg-config program is used to retrieve information about installed libraries in the system. It is typically used to compile and link against one or more libraries. Here is a typical usage scenario in a Makefile: | |
program: program.c | |
cc program.c $(pkg-config --cflags --libs gnomeui) | |
pkg-config retrieves information about packages from special metadata files. These files are named after the package, and has a .pc extension. On most systems, pkg-config looks in /usr/lib/pkgconfig, /usr/share/pkgconfig, /usr/local/lib/pkgconfig and /usr/local/share/pkgconfig for these files. It will additionally look in the colon-separated (on Windows, semicolon-separated) list of directories spec‐ | |
ified by the PKG_CONFIG_PATH environment variable. | |
+ man pkill | |
+ head -n 20 | |
PGREP(1) User Commands PGREP(1) | |
NAME | |
pgrep, pkill - look up or signal processes based on name and other attributes | |
SYNOPSIS | |
pgrep [options] pattern | |
pkill [options] pattern | |
DESCRIPTION | |
pgrep looks through the currently running processes and lists the process IDs which match the selection criteria to stdout. All the criteria have to match. For example, | |
$ pgrep -u root sshd | |
will only list the processes called sshd AND owned by root. On the other hand, | |
$ pgrep -u root,daemon | |
+ man pl2pm | |
+ head -n 20 | |
PL2PM(1) Perl Programmers Reference Guide PL2PM(1) | |
NAME | |
pl2pm - Rough tool to translate Perl4 .pl files to Perl5 .pm modules. | |
SYNOPSIS | |
pl2pm files | |
DESCRIPTION | |
pl2pm is a tool to aid in the conversion of Perl4-style .pl library files to Perl5-style library modules. Usually, your old .pl file will still work fine and you should only use this tool if you plan to update your library to use some of the newer Perl 5 features, such as AutoLoading. | |
LIMITATIONS | |
It's just a first step, but it's usually a good first step. | |
AUTHOR | |
Larry Wall <[email protected]> | |
+ man plipconfig | |
+ head -n 20 | |
PLIPCONFIG(8) Linux System Administrator's Manual PLIPCONFIG(8) | |
NAME | |
plipconfig - fine tune PLIP device parameters | |
SYNOPSIS | |
plipconfig interface [nibble NN] [trigger NN] | |
plipconfig [-V] [--version] [-h] [--help] | |
DESCRIPTION | |
Plipconfig is used to (hopefully) improve PLIP performance by changing the default timing parameters used by the PLIP protocol. Results are dependent on the parallel port hardware, cable, and the CPU speed of each machine on each end of the PLIP link. | |
If the single interface argument is given, plipconfig displays the status of the given interface only. Otherwise, it will try to set the options. | |
OPTIONS | |
nibble NN | |
Sets the nibble wait value in microseconds. Default is 3000. | |
+ man plymouth | |
+ head -n 20 | |
PLYMOUTH(1) User Commands PLYMOUTH(1) | |
NAME | |
plymouth - Send commands to plymouthd | |
SYNOPSIS | |
plymouth [OPTION...] | |
plymouth COMMAND [OPTION...] | |
DESCRIPTION | |
The plymouth sends commands to a running plymouthd. This is used during the boot process to control the display of the graphical boot splash. | |
OPTIONS | |
The following options are understood. These options are supported for compatibility with the old rhgb-client interface, and have been replaced by the commands that are described in the next section. | |
--help | |
Show summary of options. | |
+ man plymouth-set-default-theme | |
+ head -n 20 | |
PLYMOUTH-SET-DEFAU(1) User Commands PLYMOUTH-SET-DEFAU(1) | |
NAME | |
plymouth-set-default-theme - Set the plymouth theme | |
SYNOPSIS | |
plymouth-set-default-theme [OPTION...] [THEME] | |
DESCRIPTION | |
When called with a THEME argument, the plymouth-set-default-theme command changes the preferred boot theme and also performs the necessary regeneration of the initial ramdisk (initrd) since plymouth is loaded from the boot loader from the initrd prior to the mounting of the root filesystem. | |
If plymouth-set-default-theme is invoked with no options or parameters, it shows the currently selected theme by default. This output is used by the helper scripts plymouth-generate-initrd and plymouth-update-initrd to set the proper theme in the initial ramdisk. | |
OPTIONS | |
The following options are understood: | |
-h, --help | |
Show summary of options. | |
+ man plymouthd | |
+ head -n 20 | |
PLYMOUTHD(8) System Administration PLYMOUTHD(8) | |
NAME | |
plymouthd - The plymouth daemon | |
SYNOPSIS | |
plymouthd [OPTION...] | |
DESCRIPTION | |
The plymouthd daemon is usually run out of the initrd. It does the heavy lifting of the plymouth system, logging the session and showing the splash screen. | |
The plymouth is used to send commands to plymouthd that control its behaviour. | |
OPTIONS | |
The following options are understood: | |
--help | |
Show summary of options. | |
+ man pm-hibernate | |
+ head -n 20 | |
PM-ACTION(8) pm-utils User Manual PM-ACTION(8) | |
NAME | |
pm-action - Suspend or Hibernate your computer | |
SYNOPSIS | |
pm-hibernate [--help] | |
pm-suspend [--quirk-*] [--help] | |
pm-suspend-hybrid [--quirk-*] [--help] | |
DESCRIPTION | |
This manual page documents briefly the pm-action, pm-hibernate, pm-suspend and pm-suspend-hybrid commands. This manual page was originally written for the Debian(TM) distribution and has been adopted by the pm-utils project. | |
These commands can be used to put the machine in a sleep state. The precise way how this is done can be influenced by installing executables and configuration snippets. For some options external programs are needed. | |
These commands will usually be called by UPower or hald when triggered to do so by a program in a desktop session such as gnome-power-manager. Calling them from the command line is also possible, but it is not guaranteed that all programs in your desktop session keep working as expected. | |
+ man pm-is-supported | |
+ head -n 20 | |
PM-IS-SUPPORTED(1) pm-utils User Manual PM-IS-SUPPORTED(1) | |
NAME | |
pm-is-supported - Test whether suspend or hibernate is supported. | |
SYNOPSIS | |
pm-is-supported [{--suspend | --hibernate | --suspend-hybrid}] | |
DESCRIPTION | |
This manual page documents briefly the pm-is-supported command. | |
The intended purpose of pm-is-supported is to find out which power management modes are supported by the system. hald(8) will call it to do just that. (Note that UPower does not use this.) | |
OPTIONS | |
--suspend | |
Test whether suspend is supported. Suspend is a state where most devices are shutdown, except for RAM. This state still draws power. | |
--hibernate | |
+ man pm-powersave | |
+ head -n 20 | |
PM-POWERSAVE(8) pm-utils User Manual PM-POWERSAVE(8) | |
NAME | |
pm-powersave - Put your computer into low power mode | |
SYNOPSIS | |
pm-powersave [{true | false}] [--help] | |
DESCRIPTION | |
This manual page documents briefly the pm-powersave command. | |
pm-powersave can be used to set your system into low power mode. | |
OPTIONS | |
true | |
Put the computer into low power mode to reduce energy consumption and extend your laptop´s battery life. | |
false | |
+ man pm-suspend | |
+ head -n 20 | |
PM-ACTION(8) pm-utils User Manual PM-ACTION(8) | |
NAME | |
pm-action - Suspend or Hibernate your computer | |
SYNOPSIS | |
pm-hibernate [--help] | |
pm-suspend [--quirk-*] [--help] | |
pm-suspend-hybrid [--quirk-*] [--help] | |
DESCRIPTION | |
This manual page documents briefly the pm-action, pm-hibernate, pm-suspend and pm-suspend-hybrid commands. This manual page was originally written for the Debian(TM) distribution and has been adopted by the pm-utils project. | |
These commands can be used to put the machine in a sleep state. The precise way how this is done can be influenced by installing executables and configuration snippets. For some options external programs are needed. | |
These commands will usually be called by UPower or hald when triggered to do so by a program in a desktop session such as gnome-power-manager. Calling them from the command line is also possible, but it is not guaranteed that all programs in your desktop session keep working as expected. | |
+ man pm-suspend-hybrid | |
+ head -n 20 | |
PM-ACTION(8) pm-utils User Manual PM-ACTION(8) | |
NAME | |
pm-action - Suspend or Hibernate your computer | |
SYNOPSIS | |
pm-hibernate [--help] | |
pm-suspend [--quirk-*] [--help] | |
pm-suspend-hybrid [--quirk-*] [--help] | |
DESCRIPTION | |
This manual page documents briefly the pm-action, pm-hibernate, pm-suspend and pm-suspend-hybrid commands. This manual page was originally written for the Debian(TM) distribution and has been adopted by the pm-utils project. | |
These commands can be used to put the machine in a sleep state. The precise way how this is done can be influenced by installing executables and configuration snippets. For some options external programs are needed. | |
These commands will usually be called by UPower or hald when triggered to do so by a program in a desktop session such as gnome-power-manager. Calling them from the command line is also possible, but it is not guaranteed that all programs in your desktop session keep working as expected. | |
+ man pm-utils-bugreport-info.sh | |
+ head -n 20 | |
PM-UTILS-BUGREPORT-INFO.SH(8) pm-utils User Manual PM-UTILS-BUGREPORT-INFO.SH(8) | |
NAME | |
pm-utils-bugreport-info.sh - Print pm-utils bug report | |
SYNOPSIS | |
pm-utils-bugreport-info.sh | |
DESCRIPTION | |
pm-utils-bugreport-info.sh can be used to print pm-utils bug report including your HW configuration and pm-utils logs. This can help developers to diagnose problems regarding suspend / hibernate. | |
SEE ALSO | |
pm-suspend(8), pm-hibernate(8) | |
AUTHOR | |
Jaroslav Škarvada <[email protected]> | |
Manpage author. | |
+ man pmap | |
+ head -n 20 | |
PMAP(1) User Commands PMAP(1) | |
NAME | |
pmap - report memory map of a process | |
SYNOPSIS | |
pmap [options] pid [...] | |
DESCRIPTION | |
The pmap command reports the memory map of a process or processes. | |
OPTIONS | |
-x, --extended | |
Show the extended format. | |
-d, --device | |
Show the device format. | |
+ man pod2html | |
+ head -n 20 | |
POD2HTML(1) Perl Programmers Reference Guide POD2HTML(1) | |
NAME | |
pod2html - convert .pod files to .html files | |
SYNOPSIS | |
pod2html --help --htmldir=<name> --htmlroot=<URL> | |
--infile=<name> --outfile=<name> | |
--podpath=<name>:...:<name> --podroot=<name> | |
--cachedir=<name> --flush --recurse --norecurse | |
--quiet --noquiet --verbose --noverbose | |
--index --noindex --backlink --nobacklink | |
--header --noheader --poderrors --nopoderrors | |
--css=<URL> --title=<name> | |
DESCRIPTION | |
Converts files from pod format (see perlpod) to HTML format. | |
+ man pod2man | |
+ head -n 20 | |
POD2MAN(1) User Contributed Perl Documentation POD2MAN(1) | |
NAME | |
pod2man - Convert POD data to formatted *roff input | |
SYNOPSIS | |
pod2man [--center=string] [--date=string] [--errors=style] | |
[--fixed=font] [--fixedbold=font] [--fixeditalic=font] | |
[--fixedbolditalic=font] [--name=name] [--nourls] | |
[--official] [--quotes=quotes] [--release[=version]] | |
[--section=manext] [--stderr] [--utf8] [--verbose] | |
[input [output] ...] | |
pod2man --help | |
DESCRIPTION | |
pod2man is a front-end for Pod::Man, using it to generate *roff input from POD source. The resulting *roff code is suitable for display on a terminal using nroff(1), normally via man(1), or printing using troff(1). | |
+ man pod2text | |
+ head -n 20 | |
POD2TEXT(1) User Contributed Perl Documentation POD2TEXT(1) | |
NAME | |
pod2text - Convert POD data to formatted ASCII text | |
SYNOPSIS | |
pod2text [-aclostu] [--code] [--errors=style] [-i indent] | |
[-q quotes] [--nourls] [--stderr] [-w width] | |
[input [output ...]] | |
pod2text -h | |
DESCRIPTION | |
pod2text is a front-end for Pod::Text and its subclasses. It uses them to generate formatted ASCII text from POD source. It can optionally use either termcap sequences or ANSI color escape sequences to format the text. | |
input is the file to read for POD source (the POD can be embedded in code). If input isn't given, it defaults to "STDIN". output, if given, is the file to which to write the formatted output. If output isn't given, the formatted output is written to "STDOUT". Several POD files can be processed in the same pod2text invocation (saving module load and compile times) by providing multiple pairs of | |
input and output files on the command line. | |
+ man pod2usage | |
+ head -n 20 | |
POD2USAGE(1) User Contributed Perl Documentation POD2USAGE(1) | |
NAME | |
pod2usage - print usage messages from embedded pod docs in files | |
SYNOPSIS | |
pod2usage [-help] [-man] [-exit exitval] [-output outfile] [-verbose level] [-pathlist dirlist] [-formatter module] file | |
OPTIONS AND ARGUMENTS | |
-help Print a brief help message and exit. | |
-man Print this command's manual page and exit. | |
-exit exitval | |
The exit status value to return. | |
-output outfile | |
The output file to print to. If the special names "-" or ">&1" or ">&STDOUT" are used then standard output is used. If ">&2" or ">&STDERR" is used then standard error is used. | |
+ man postalias | |
+ head -n 20 | |
POSTALIAS(1) General Commands Manual POSTALIAS(1) | |
NAME | |
postalias - Postfix alias database maintenance | |
SYNOPSIS | |
postalias [-Nfinoprsvw] [-c config_dir] [-d key] [-q key] | |
[file_type:]file_name ... | |
DESCRIPTION | |
The postalias(1) command creates or queries one or more Postfix alias databases, or updates an existing one. The input and output file formats are expected to be compatible with Sendmail version 8, and are expected to be suitable for the use as NIS alias maps. | |
If the result files do not exist they will be created with the same group and other read permissions as their source file. | |
While a database update is in progress, signal delivery is postponed, and an exclusive, advisory, lock is placed on the entire database, in order to avoid surprises in spectator processes. | |
The format of Postfix alias input files is described in aliases(5). | |
+ man postcat | |
+ head -n 20 | |
POSTCAT(1) General Commands Manual POSTCAT(1) | |
NAME | |
postcat - show Postfix queue file contents | |
SYNOPSIS | |
postcat [-bdehnoqv] [-c config_dir] [files...] | |
DESCRIPTION | |
The postcat(1) command prints the contents of the named files in human-readable form. The files are expected to be in Postfix queue file format. If no files are specified on the command line, the program reads from standard input. | |
By default, postcat(1) shows the envelope and message content, as if the options -beh were specified. To view message content only, specify -bh (Postfix 2.7 and later). | |
Options: | |
-b Show body content. The -b option starts producing output at the first non-header line, and stops when the end of the message is reached. | |
This feature is available in Postfix 2.7 and later. | |
+ man postconf | |
+ head -n 20 | |
POSTCONF(1) General Commands Manual POSTCONF(1) | |
NAME | |
postconf - Postfix configuration utility | |
SYNOPSIS | |
Managing main.cf: | |
postconf [-dfhnovx] [-c config_dir] [-C class,...] [parameter ...] | |
postconf [-ev] [-c config_dir] [parameter=value ...] | |
postconf [-#vX] [-c config_dir] [parameter ...] | |
Managing master.cf: | |
postconf [-fMovx] [-c config_dir] [service ...] | |
+ man postdrop | |
+ head -n 20 | |
POSTDROP(1) General Commands Manual POSTDROP(1) | |
NAME | |
postdrop - Postfix mail posting utility | |
SYNOPSIS | |
postdrop [-rv] [-c config_dir] | |
DESCRIPTION | |
The postdrop(1) command creates a file in the maildrop directory and copies its standard input to the file. | |
Options: | |
-c config_dir | |
The main.cf configuration file is in the named directory instead of the default configuration directory. See also the MAIL_CONFIG environment setting below. | |
-r Use a Postfix-internal protocol for reading the message from standard input, and for reporting status information on standard output. This is currently the only supported method. | |
+ man postfix | |
+ head -n 20 | |
POSTFIX(1) General Commands Manual POSTFIX(1) | |
NAME | |
postfix - Postfix control program | |
SYNOPSIS | |
postfix [-Dv] [-c config_dir] command | |
DESCRIPTION | |
This command is reserved for the superuser. To submit mail, use the Postfix sendmail(1) command. | |
The postfix(1) command controls the operation of the Postfix mail system: start or stop the master(8) daemon, do a health check, and other maintenance. | |
By default, the postfix(1) command sets up a standardized environment and runs the postfix-script shell script to do the actual work. | |
However, when support for multiple Postfix instances is configured, postfix(1) executes the command specified with the multi_instance_wrapper configuration parameter. This command will execute the command for each applicable Postfix instance. | |
The following commands are implemented: | |
+ man postkick | |
+ head -n 20 | |
POSTKICK(1) General Commands Manual POSTKICK(1) | |
NAME | |
postkick - kick a Postfix service | |
SYNOPSIS | |
postkick [-c config_dir] [-v] class service request | |
DESCRIPTION | |
The postkick(1) command sends request to the specified service over a local transport channel. This command makes Postfix private IPC accessible for use in, for example, shell scripts. | |
Options: | |
-c config_dir | |
Read the main.cf configuration file in the named directory instead of the default configuration directory. | |
-v Enable verbose logging for debugging purposes. Multiple -v options make the software increasingly verbose. | |
+ man postlock | |
+ head -n 20 | |
POSTLOCK(1) General Commands Manual POSTLOCK(1) | |
NAME | |
postlock - lock mail folder and execute command | |
SYNOPSIS | |
postlock [-c config_dir] [-l lock_style] | |
[-v] file command... | |
DESCRIPTION | |
The postlock(1) command locks file for exclusive access, and executes command. The locking method is compatible with the Postfix UNIX-style local delivery agent. | |
Options: | |
-c config_dir | |
Read the main.cf configuration file in the named directory instead of the default configuration directory. | |
-l lock_style | |
+ man postlog | |
+ head -n 20 | |
POSTLOG(1) General Commands Manual POSTLOG(1) | |
NAME | |
postlog - Postfix-compatible logging utility | |
SYNOPSIS | |
postlog [-iv] [-c config_dir] [-p priority] [-t tag] [text...] | |
DESCRIPTION | |
The postlog(1) command implements a Postfix-compatible logging interface for use in, for example, shell scripts. | |
By default, postlog(1) logs the text given on the command line as one record. If no text is specified on the command line, postlog(1) reads from standard input and logs each input line as one record. | |
Logging is sent to syslogd(8); when the standard error stream is connected to a terminal, logging is sent there as well. | |
The following options are implemented: | |
-c config_dir | |
+ man postmap | |
+ head -n 20 | |
POSTMAP(1) General Commands Manual POSTMAP(1) | |
NAME | |
postmap - Postfix lookup table management | |
SYNOPSIS | |
postmap [-Nbfhimnoprsvw] [-c config_dir] [-d key] [-q key] | |
[file_type:]file_name ... | |
DESCRIPTION | |
The postmap(1) command creates or queries one or more Postfix lookup tables, or updates an existing one. The input and output file formats are expected to be compatible with: | |
makemap file_type file_name < file_name | |
If the result files do not exist they will be created with the same group and other read permissions as their source file. | |
While the table update is in progress, signal delivery is postponed, and an exclusive, advisory, lock is placed on the entire table, in order to avoid surprises in spectator processes. | |
+ man postmulti | |
+ head -n 20 | |
POSTMULTI(1) General Commands Manual POSTMULTI(1) | |
NAME | |
postmulti - Postfix multi-instance manager | |
SYNOPSIS | |
ENABLING MULTI-INSTANCE MANAGEMENT: | |
postmulti -e init [-v] | |
ITERATOR MODE: | |
postmulti -l [-aRv] [-g group] [-i name] | |
postmulti -p [-av] [-g group] [-i name] command... | |
postmulti -x [-aRv] [-g group] [-i name] command... | |
+ man postqueue | |
+ head -n 20 | |
POSTQUEUE(1) General Commands Manual POSTQUEUE(1) | |
NAME | |
postqueue - Postfix queue control | |
SYNOPSIS | |
postqueue [-v] [-c config_dir] -f | |
postqueue [-v] [-c config_dir] -i queue_id | |
postqueue [-v] [-c config_dir] -p | |
postqueue [-v] [-c config_dir] -s site | |
DESCRIPTION | |
The postqueue(1) command implements the Postfix user interface for queue management. It implements operations that are traditionally available via the sendmail(1) command. See the postsuper(1) command for queue operations that require super-user privileges such as deleting a message from the queue or changing the status of a message. | |
The following options are recognized: | |
-c config_dir | |
The main.cf configuration file is in the named directory instead of the default configuration directory. See also the MAIL_CONFIG environment setting below. | |
+ man postsuper | |
+ head -n 20 | |
POSTSUPER(1) General Commands Manual POSTSUPER(1) | |
NAME | |
postsuper - Postfix superintendent | |
SYNOPSIS | |
postsuper [-psSv] [-c config_dir] [-d queue_id] | |
[-h queue_id] [-H queue_id] | |
[-r queue_id] [directory ...] | |
DESCRIPTION | |
The postsuper(1) command does maintenance jobs on the Postfix queue. Use of the command is restricted to the superuser. See the postqueue(1) command for unprivileged queue operations such as listing or flushing the mail queue. | |
By default, postsuper(1) performs the operations requested with the -s and -p command-line options on all Postfix queue directories - this includes the incoming, active and deferred directories with mail files and the bounce, defer, trace and flush directories with log files. | |
Options: | |
-c config_dir | |
+ man poweroff | |
+ head -n 20 | |
HALT(8) halt HALT(8) | |
NAME | |
halt, poweroff, reboot - Halt, power-off or reboot the machine | |
SYNOPSIS | |
halt [OPTIONS...] | |
poweroff [OPTIONS...] | |
reboot [OPTIONS...] | |
DESCRIPTION | |
halt, poweroff, reboot may be used to halt, power-off or reboot the machine. | |
OPTIONS | |
The following options are understood: | |
+ man ppp-watch | |
+ head -n 20 | |
PPP-WATCH(8) System Manager's Manual PPP-WATCH(8) | |
NAME | |
ppp-watch - daemon to make PPP interfaces act more like other interfaces | |
SYNOPSIS | |
ppp-watch interface-name [boot] | |
DESCRIPTION | |
ppp-watch manages one PPP connection, including starting, stopping, and redialing. It makes starting and stopping the connection synchronous activities. | |
ppp-watch is not really meant to be called directly. It should only be used from within the ifup-ppp script. | |
OPTIONS | |
interface-name | |
The name of the PPP interface to bring up. | |
boot ppp-watch is being called at boot time and should time out after a while if the PPP connection does not come up in order not to hang the boot sequence. | |
+ man prlimit | |
+ head -n 20 | |
PRLIMIT(1) User Commands PRLIMIT(1) | |
NAME | |
prlimit - get and set process resource limits | |
SYNOPSIS | |
prlimit [options] [--resource[=limits] [--pid PID] | |
prlimit [options] [--resource[=limits] command [argument...] | |
DESCRIPTION | |
Given a process ID and one or more resources, prlimit tries to retrieve and/or modify the limits. | |
When command is given, prlimit will run this command with the given arguments. | |
The limits parameter is composed of a soft and a hard value, separated by a colon (:), in order to modify the existing values. If no limits are given, prlimit will display the current values. If one of the values is not given, then the existing one will be used. To specify the unlimited or infinity limit (RLIM_INFINITY), the -1 or 'unlimited' string can be passed. | |
+ man prtstat | |
+ head -n 20 | |
PRTSTAT(1) User Commands PRTSTAT(1) | |
NAME | |
prtstat - print statistics of a process | |
SYNOPSIS | |
prtstat [-r|--raw] pid | |
prtstat -V|--version | |
DESCRIPTION | |
prtstat prints the statistics of the specified process. This information comes from the /proc/PID/stat file. | |
OPTIONS | |
-r, --raw | |
Print the information in raw format. | |
-V, --version | |
Show the version information for prtstat. | |
+ man ps | |
+ head -n 20 | |
PS(1) User Commands PS(1) | |
NAME | |
ps - report a snapshot of the current processes. | |
SYNOPSIS | |
ps [options] | |
DESCRIPTION | |
ps displays information about a selection of the active processes. If you want a repetitive update of the selection and the displayed information, use top(1) instead. | |
This version of ps accepts several kinds of options: | |
1 UNIX options, which may be grouped and must be preceded by a dash. | |
2 BSD options, which may be grouped and must not be used with a dash. | |
3 GNU long options, which are preceded by two dashes. | |
Options of different types may be freely mixed, but conflicts can appear. There are some synonymous options, which are functionally identical, due to the many standards and ps implementations that this ps is compatible with. | |
+ man psed | |
+ head -n 20 | |
S2P(1) Perl Programmers Reference Guide S2P(1) | |
NAME | |
psed - a stream editor | |
SYNOPSIS | |
psed [-an] script [file ...] | |
psed [-an] [-e script] [-f script-file] [file ...] | |
s2p [-an] [-e script] [-f script-file] | |
DESCRIPTION | |
A stream editor reads the input stream consisting of the specified files (or standard input, if none are given), processes is line by line by applying a script consisting of edit commands, and writes resulting lines to standard output. The filename '"-"' may be used to read standard input. | |
The edit script is composed from arguments of -e options and script-files, in the given order. A single script argument may be specified as the first parameter. | |
If this program is invoked with the name s2p, it will act as a sed-to-Perl translator. See "SED SCRIPT TRANSLATION". | |
+ man psfaddtable | |
+ head -n 20 | |
PSFADDTABLE(1) General Commands Manual PSFADDTABLE(1) | |
NAME | |
psfaddtable - add a Unicode character table to a console font | |
SYNOPSIS | |
psfaddtable fontfile tablefile outfile | |
DESCRIPTION | |
psfaddtable takes a console font in .psf format given by fontfile and merges it with the Unicode character table given by tablefile to produce a font file with an embedded character table, which is written to outfile. An input file name of "-" denotes standard input, and an output file name of "-" denotes standard output. If the fontfile already contains an embedded character table, it is ignored. | |
TABLE FILE FORMAT | |
Each line in the tablefile should be either blank, contain a comment (preceded by #), or contain a sequence of numbers in either decimal (default), octal (preceded by 0), or hexadecimal (preceded by 0x) format, separated by spaces or tabs. The first number on each line indicates the glyph slot in the font that is being referred to, this is between 0 and 0xff for a 256-character font and 0 and 0x1ff | |
for a 512-character font. Any subsequent numbers on the same line are Unicodes matched by this specific glyph slot. Instead of a single Unicode one may have a sequence of Unicodes separates by commas, to denote that the glyph depicts the corresponding composed symbol. It is permissible to have multiple lines for the same glyph. | |
SEE ALSO | |
setfont(8), psfgettable(1), psfstriptable(1), psfxtable(1) | |
+ man psfgettable | |
+ head -n 20 | |
PSFGETTABLE(1) General Commands Manual PSFGETTABLE(1) | |
NAME | |
psfgettable - extract the embedded Unicode character table from a console font | |
SYNOPSIS | |
psfgettable fontfile [outfile] | |
DESCRIPTION | |
psfgettable extracts the embedded Unicode character table from a .psf format console font into a human readable ASCII file of the format used by psfaddtable(1). If the font file name is a single dash (-), the font is read from standard input. | |
SEE ALSO | |
setfont(8), psfaddtable(1), psfstriptable(1), psfxtable(1) | |
25 Oct 1994 PSFGETTABLE(1) | |
+ man psfstriptable | |
+ head -n 20 | |
PSFSTRIPTABLE(1) General Commands Manual PSFSTRIPTABLE(1) | |
NAME | |
psfstriptable - remove the embedded Unicode character table from a console font | |
SYNOPSIS | |
psfstriptable fontfile outfile | |
DESCRIPTION | |
psfstriptable reads a .psf format console font from fontfile, removes the embedded Unicode font table if there is one, and writes the result to outfile. An input file name of "-" denotes standard input, and an output file name of "-" denotes standard output. | |
SEE ALSO | |
setfont(8), psfaddtable(1), psfgettable(1), psfxtable(1) | |
25 Oct 1994 PSFSTRIPTABLE(1) | |
+ man psfxtable | |
+ head -n 20 | |
PSFXTABLE(1) General Commands Manual PSFXTABLE(1) | |
NAME | |
psfxtable - handle Unicode character tables for console fonts | |
SYNOPSIS | |
psfxtable [-i infont] [-o outfont] [-it intable] [-ot outtable] [-nt] | |
DESCRIPTION | |
psfxtable handles the embedded Unicode character table for .psf format console fonts. It reads a font and possibly a table and writes a font and/or a table. psfaddtable(1), psfgettable(1) and psfstriptable(1) are links to it. | |
Each of the filenames infont, outfont, intable, and outtable may be replaced by a single dash (-), in which case standard input or standard output is used. If no -i option is given, the font is read from standard input. If no -it or -o or -ot option is given, no input table is read or no output font or output table is written. | |
By default the output font (if any) will have a Unicode table when either the input font has one, or an explicit table (which overrides an input font table) has been provided. The option -nt causes output of a font without table. When outfont is requested it will get a psf1 header when infont has a psf1 header and intable does not have sequences and a psf2 header otherwise. | |
SEE ALSO | |
setfont(8), psfaddtable(1), psfgettable(1), psfstriptable(1) | |
+ man pstree | |
+ head -n 20 | |
PSTREE(1) User Commands PSTREE(1) | |
NAME | |
pstree - display a tree of processes | |
SYNOPSIS | |
pstree [-a, --arguments] [-c, --compact] [-h, --highlight-all, -Hpid, --highlight-pid pid] [-g] --show-pgids] [-l, --long] [-n, --numeric-sort] [-N, --ns-sortns [-p, --show-pids] [-s, --show-parents] [-S, --ns-changes] [-u, --uid-changes] [-Z, --security-context] [-A, --ascii, -G, --vt100, -U, --unicode] [pid, user] | |
pstree -V, --version | |
DESCRIPTION | |
pstree shows running processes as a tree. The tree is rooted at either pid or init if pid is omitted. If a user name is specified, all process trees rooted at processes owned by that user are shown. | |
pstree visually merges identical branches by putting them in square brackets and prefixing them with the repetition count, e.g. | |
init-+-getty | |
|-getty | |
|-getty | |
`-getty | |
+ man pstree.x11 | |
+ head -n 20 | |
No manual entry for pstree.x11 | |
+ man pstruct | |
+ head -n 20 | |
C2PH(1) Perl Programmers Reference Guide C2PH(1) | |
NAME | |
c2ph, pstruct - Dump C structures as generated from "cc -g -S" stabs | |
SYNOPSIS | |
c2ph [-dpnP] [var=val] [files ...] | |
OPTIONS | |
Options: | |
-w wide; short for: type_width=45 member_width=35 offset_width=8 | |
-x hex; short for: offset_fmt=x offset_width=08 size_fmt=x size_width=04 | |
-n do not generate perl code (default when invoked as pstruct) | |
-p generate perl code (default when invoked as c2ph) | |
-v generate perl code, with C decls as comments | |
+ man pvchange | |
+ head -n 20 | |
PVCHANGE(8) System Manager's Manual PVCHANGE(8) | |
NAME | |
pvchange - Change attributes of physical volume(s) | |
SYNOPSIS | |
pvchange option_args position_args | |
[ option_args ] | |
DESCRIPTION | |
pvchange changes PV attributes in the VG. | |
For options listed in parentheses, any one is required, after which the others are optional. | |
USAGE | |
Change properties of all PVs. | |
pvchange | |
+ man pvck | |
+ head -n 20 | |
PVCK(8) System Manager's Manual PVCK(8) | |
NAME | |
pvck - Check the consistency of physical volume(s) | |
SYNOPSIS | |
pvck position_args | |
[ option_args ] | |
DESCRIPTION | |
pvck checks the LVM metadata for consistency on PVs. | |
USAGE | |
pvck PV ... | |
[ --labelsector Number ] | |
[ COMMON_OPTIONS ] | |
Common options for lvm: | |
+ man pvcreate | |
+ head -n 20 | |
PVCREATE(8) System Manager's Manual PVCREATE(8) | |
NAME | |
pvcreate - Initialize physical volume(s) for use by LVM | |
SYNOPSIS | |
pvcreate position_args | |
[ option_args ] | |
DESCRIPTION | |
pvcreate initializes a PV so that it is recognized as belonging to LVM, and allows the PV to be used in a VG. A PV can be a disk partition, whole disk, meta device, or loopback file. | |
For DOS disk partitions, the partition id should be set to 0x8e using fdisk(8), cfdisk(8), or a equivalent. For GUID Partition Table (GPT), the id is E6D6D379-F507-44C2-A23C-238F2A3DF928. For whole disk devices only the partition table must be erased, which will effectively destroy all data on that disk. This can be done by zeroing the first sector with: | |
dd if=/dev/zero of=PhysicalVolume bs=512 count=1 | |
Use vgcreate(8) to create a new VG on the PV, or vgextend(8) to add the PV to existing VG. | |
+ man pvdisplay | |
+ head -n 20 | |
PVDISPLAY(8) System Manager's Manual PVDISPLAY(8) | |
NAME | |
pvdisplay - Display various attributes of physical volume(s) | |
SYNOPSIS | |
pvdisplay | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
pvdisplay shows the attributes of PVs, like size, physical extent size, space used for the VG descriptor area, etc. | |
pvs(8) is a preferred alternative that shows the same information and more, using a more compact and configurable output format. | |
USAGE | |
pvdisplay | |
[ -a|--all ] | |
+ man pvmove | |
+ head -n 20 | |
PVMOVE(8) System Manager's Manual PVMOVE(8) | |
NAME | |
pvmove - Move extents from one physical volume to another | |
SYNOPSIS | |
pvmove position_args | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
pvmove moves the allocated physical extents (PEs) on a source PV to one or more destination PVs. You can optionally specify a source LV in which case only extents used by that LV will be moved to free (or specified) extents on the destination PV. If no destination PV is specified, the normal allocation rules for the VG are used. | |
If pvmove is interrupted for any reason (e.g. the machine crashes) then run pvmove again without any PV arguments to restart any operations that were in progress from the last checkpoint. Alternatively, use the abort option at any time to abort the operation. The resulting location of LVs after an abort depends on whether the atomic option was used. | |
More than one pvmove can run concurrently if they are moving data from different source PVs, but additional pvmoves will ignore any LVs already in the process of being changed, so some data might not get moved. | |
USAGE | |
+ man pvremove | |
+ head -n 20 | |
PVREMOVE(8) System Manager's Manual PVREMOVE(8) | |
NAME | |
pvremove - Remove LVM label(s) from physical volume(s) | |
SYNOPSIS | |
pvremove position_args | |
[ option_args ] | |
DESCRIPTION | |
pvremove wipes the label on a device so that LVM will no longer recognise it as a PV. | |
A PV cannot be removed from a VG while it is used by an active LV. | |
Repeat the force option (-ff) to forcibly remove a PV belonging to an existing VG. Normally, vgreduce(8) should be used instead. | |
USAGE | |
pvremove PV ... | |
+ man pvresize | |
+ head -n 20 | |
PVRESIZE(8) System Manager's Manual PVRESIZE(8) | |
NAME | |
pvresize - Resize physical volume(s) | |
SYNOPSIS | |
pvresize position_args | |
[ option_args ] | |
DESCRIPTION | |
pvresize resizes a PV. The PV may already be in a VG and may have active LVs allocated on it. | |
USAGE | |
pvresize PV ... | |
[ --setphysicalvolumesize Size[m|UNIT] ] | |
[ --reportformat basic|json ] | |
[ COMMON_OPTIONS ] | |
+ man pvs | |
+ head -n 20 | |
PVS(8) System Manager's Manual PVS(8) | |
NAME | |
pvs - Display information about physical volumes | |
SYNOPSIS | |
pvs | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
pvs produces formatted output about PVs. | |
USAGE | |
pvs | |
[ -a|--all ] | |
[ -o|--options String ] | |
[ -S|--select String ] | |
+ man pvscan | |
+ head -n 20 | |
PVSCAN(8) System Manager's Manual PVSCAN(8) | |
NAME | |
pvscan - List all physical volumes | |
SYNOPSIS | |
pvscan option_args | |
[ option_args ] | |
[ position_args ] | |
DESCRIPTION | |
pvscan scans all supported LVM block devices in the system for PVs. | |
Scanning with lvmetad | |
pvscan operates differently when used with the lvmetad(8) daemon. | |
Scanning disks is required to read LVM metadata and identify LVM PVs. Once read, lvmetad caches the metadata so that LVM commands can read it without repeatedly scanning disks. This is helpful because scanning disks is time consuming, and frequent scanning may interfere with the normal work of the system and disks. | |
+ man pwck | |
+ head -n 20 | |
PWCK(8) System Management Commands PWCK(8) | |
NAME | |
pwck - verify integrity of password files | |
SYNOPSIS | |
pwck [options] [passwd [ shadow ]] | |
DESCRIPTION | |
The pwck command verifies the integrity of the users and authentication information. It checks that all entries in /etc/passwd and /etc/shadow have the proper format and contain valid data. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors. | |
Checks are made to verify that each entry has: | |
· the correct number of fields | |
· a unique and valid user name | |
· a valid user and group identifier | |
+ man pwconv | |
+ head -n 20 | |
PWCONV(8) System Management Commands PWCONV(8) | |
NAME | |
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups | |
SYNOPSIS | |
pwconv [options] | |
pwunconv [options] | |
grpconv [options] | |
grpunconv [options] | |
DESCRIPTION | |
The pwconv command creates shadow from passwd and an optionally existing shadow. | |
The pwunconv command creates passwd from passwd and shadow and then removes shadow. | |
+ man pwdx | |
+ head -n 20 | |
PWDX(1) User Commands PWDX(1) | |
NAME | |
pwdx - report current working directory of a process | |
SYNOPSIS | |
pwdx [options] pid [...] | |
OPTIONS | |
-V, --version | |
Output version information and exit. | |
-h, --help | |
Output help screen and exit. | |
SEE ALSO | |
ps(1), pgrep(1) | |
+ man pwhistory_helper | |
+ head -n 20 | |
PWHISTORY_HELPER(8) Linux-PAM Manual PWHISTORY_HELPER(8) | |
NAME | |
pwhistory_helper - Helper binary that transfers password hashes from passwd or shadow to opasswd | |
SYNOPSIS | |
pwhistory_helper [...] | |
DESCRIPTION | |
pwhistory_helper is a helper program for the pam_pwhistory module that transfers password hashes from passwd or shadow file to the opasswd file and checks a password supplied by user against the existing hashes in the opasswd file. | |
The purpose of the helper is to enable tighter confinement of login and password changing services. The helper is thus called only when SELinux is enabled on the system. | |
The interface of the helper - command line options, and input/output data format are internal to the pam_pwhistory module and it should not be called directly from applications. | |
SEE ALSO | |
pam_pwhistory(8) | |
+ man pwmake | |
+ head -n 20 | |
PWMAKE(1) General Commands Manual PWMAKE(1) | |
NAME | |
pwmake - simple tool for generating random relatively easily pronounceable passwords | |
SYNOPSIS | |
pwmake <entropy-bits> | |
DESCRIPTION | |
pwmake is a simple configurable tool for generating random and relatively easily pronounceable passwords. The tool allows you to specify the number of entropy bits that are used to generate the password. | |
The entropy is pulled from /dev/urandom. | |
The minimum number of bits is 56 which is usable for passwords on systems/services where brute force attacks are of very limited rate of tries. The 64 bits should be adequate for applications where the attacker does not have direct access to the password hash file. For situations where the attacker might obtain the direct access to the password hash or the password is used as an encryption key 80 to | |
128 bits should be used depending on your level of paranoia. | |
OPTIONS | |
+ man pwscore | |
+ head -n 20 | |
PWSCORE(1) General Commands Manual PWSCORE(1) | |
NAME | |
pwscore - simple configurable tool for checking quality of a password | |
SYNOPSIS | |
pwscore [user] | |
DESCRIPTION | |
pwscore is a simple tool for checking quality of a password. The password is read from stdin. | |
The tool uses the libpwquality library to perform configurable checks for minimum length, dictionary checking against cracklib dictionaries, and other checks. | |
It either reports an error if the password fails any of the checks, or it prints out the password quality score as an integer value between 0 and 100. | |
The password quality score is relative to the minlen setting in the configuration file. But in general values below 50 can be treated as moderate quality and above it fairly strong quality. Any password that passes the quality checks (especially the mandatory cracklib check) should withstand dictionary attacks and scores above 50 with the default minlen setting even fast brute force attacks. | |
+ man pwunconv | |
+ head -n 20 | |
PWCONV(8) System Management Commands PWCONV(8) | |
NAME | |
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups | |
SYNOPSIS | |
pwconv [options] | |
pwunconv [options] | |
grpconv [options] | |
grpunconv [options] | |
DESCRIPTION | |
The pwconv command creates shadow from passwd and an optionally existing shadow. | |
The pwunconv command creates passwd from passwd and shadow and then removes shadow. | |
+ man pydoc3 | |
+ head -n 20 | |
No manual entry for pydoc3 | |
+ man pydoc3.7 | |
+ head -n 20 | |
No manual entry for pydoc3.7 | |
+ man pyrsa-decrypt | |
+ head -n 20 | |
No manual entry for pyrsa-decrypt | |
+ man pyrsa-decrypt-2 | |
+ head -n 20 | |
No manual entry for pyrsa-decrypt-2 | |
+ man pyrsa-decrypt-bigfile | |
+ head -n 20 | |
No manual entry for pyrsa-decrypt-bigfile | |
+ man pyrsa-decrypt-bigfile-2 | |
+ head -n 20 | |
No manual entry for pyrsa-decrypt-bigfile-2 | |
+ man pyrsa-encrypt | |
+ head -n 20 | |
No manual entry for pyrsa-encrypt | |
+ man pyrsa-encrypt-2 | |
+ head -n 20 | |
No manual entry for pyrsa-encrypt-2 | |
+ man pyrsa-encrypt-bigfile | |
+ head -n 20 | |
No manual entry for pyrsa-encrypt-bigfile | |
+ man pyrsa-encrypt-bigfile-2 | |
+ head -n 20 | |
No manual entry for pyrsa-encrypt-bigfile-2 | |
+ man pyrsa-keygen | |
+ head -n 20 | |
No manual entry for pyrsa-keygen | |
+ man pyrsa-keygen-2 | |
+ head -n 20 | |
No manual entry for pyrsa-keygen-2 | |
+ man pyrsa-priv2pub | |
+ head -n 20 | |
No manual entry for pyrsa-priv2pub | |
+ man pyrsa-priv2pub-2 | |
+ head -n 20 | |
No manual entry for pyrsa-priv2pub-2 | |
+ man pyrsa-sign | |
+ head -n 20 | |
No manual entry for pyrsa-sign | |
+ man pyrsa-sign-2 | |
+ head -n 20 | |
No manual entry for pyrsa-sign-2 | |
+ man pyrsa-verify | |
+ head -n 20 | |
No manual entry for pyrsa-verify | |
+ man pyrsa-verify-2 | |
+ head -n 20 | |
No manual entry for pyrsa-verify-2 | |
+ man pystache | |
+ head -n 20 | |
No manual entry for pystache | |
+ man pystache-3 | |
+ head -n 20 | |
No manual entry for pystache-3 | |
+ man pystache-test | |
+ head -n 20 | |
No manual entry for pystache-test | |
+ man pystache-test-3 | |
+ head -n 20 | |
No manual entry for pystache-test-3 | |
+ man python-config | |
+ head -n 20 | |
No manual entry for python-config | |
+ man python2-config | |
+ head -n 20 | |
No manual entry for python2-config | |
+ man python2.7-config | |
+ head -n 20 | |
No manual entry for python2.7-config | |
+ man python3 | |
+ head -n 20 | |
PYTHON(1) General Commands Manual PYTHON(1) | |
NAME | |
python - an interpreted, interactive, object-oriented programming language | |
SYNOPSIS | |
python [ -B ] [ -b ] [ -d ] [ -E ] [ -h ] [ -i ] [ -I ] | |
[ -m module-name ] [ -q ] [ -O ] [ -OO ] [ -s ] [ -S ] [ -u ] | |
[ -v ] [ -V ] [ -W argument ] [ -x ] [ [ -X option ] -? ] | |
[ --check-hash-based-pycs default | always | never ] | |
[ -c command | script | - ] [ arguments ] | |
DESCRIPTION | |
Python is an interpreted, interactive, object-oriented programming language that combines remarkable power with very clear syntax. For an introduction to programming in Python, see the Python Tutorial. The Python Library Reference documents built-in and standard types, constants, functions and modules. Finally, the Python Reference Manual describes the syntax and semantics of the core language in | |
(perhaps too) much detail. (These documents may be located via the INTERNET RESOURCES below; they may be installed on your system as well.) | |
Python's basic power can be extended with your own modules written in C or C++. On most systems such modules may be dynamically loaded. Python is also adaptable as an extension language for existing applications. See the internal documentation for hints. | |
+ man python3.7 | |
+ head -n 20 | |
PYTHON(1) General Commands Manual PYTHON(1) | |
NAME | |
python - an interpreted, interactive, object-oriented programming language | |
SYNOPSIS | |
python [ -B ] [ -b ] [ -d ] [ -E ] [ -h ] [ -i ] [ -I ] | |
[ -m module-name ] [ -q ] [ -O ] [ -OO ] [ -s ] [ -S ] [ -u ] | |
[ -v ] [ -V ] [ -W argument ] [ -x ] [ [ -X option ] -? ] | |
[ --check-hash-based-pycs default | always | never ] | |
[ -c command | script | - ] [ arguments ] | |
DESCRIPTION | |
Python is an interpreted, interactive, object-oriented programming language that combines remarkable power with very clear syntax. For an introduction to programming in Python, see the Python Tutorial. The Python Library Reference documents built-in and standard types, constants, functions and modules. Finally, the Python Reference Manual describes the syntax and semantics of the core language in | |
(perhaps too) much detail. (These documents may be located via the INTERNET RESOURCES below; they may be installed on your system as well.) | |
Python's basic power can be extended with your own modules written in C or C++. On most systems such modules may be dynamically loaded. Python is also adaptable as an extension language for existing applications. See the internal documentation for hints. | |
+ man python3.7m | |
+ head -n 20 | |
No manual entry for python3.7m | |
+ man pyvenv | |
+ head -n 20 | |
No manual entry for pyvenv | |
+ man pyvenv-3.7 | |
+ head -n 20 | |
No manual entry for pyvenv-3.7 | |
+ man quot | |
+ head -n 20 | |
QUOT(8) System Manager's Manual QUOT(8) | |
NAME | |
quot - summarize filesystem ownership | |
SYNOPSIS | |
quot [ -acfguvi ] [ filesystem... ] | |
DESCRIPTION | |
quot displays the number of kilobytes in the named filesystem currently owned by each user or group. Note that this utility currently works only for XFS. | |
OPTIONS | |
-a Generate a report for all mounted filesystems giving the number of kilobytes used by each user or group. | |
-c Display three columns giving file size in kilobytes, number of files of that size, and cumulative total of kilobytes in that size or smaller file. The last row is used as an overflow bucket and is the total of all files greater than 500 kilobytes. | |
-f Display count of kilobytes and number of files owned by each user or group. | |
+ man quota | |
+ head -n 20 | |
QUOTA(1) General Commands Manual QUOTA(1) | |
NAME | |
quota - display disk usage and limits | |
SYNOPSIS | |
quota [ -F format-name ] [ -guqvswi ] [ -l | [ -QAm ]] | |
quota [ -F format-name ] [ -qvswi ] [ -l | [ -QAm ]] -u user... | |
quota [ -F format-name ] [ -qvswi ] [ -l | [ -QAm ]] -g group... | |
quota [ -F format-name ] [ -qvswugQm ] -f filesystem... | |
DESCRIPTION | |
quota displays users' disk usage and limits. By default only the user quotas are printed. | |
quota reports the quotas of all the filesystems listed in /etc/mtab. For filesystems that are NFS-mounted a call to the rpc.rquotad on the server machine is performed to get the information. | |
OPTIONS | |
-F, --format=format-name | |
+ man quotacheck | |
+ head -n 20 | |
quotacheck(8) System Manager's Manual quotacheck(8) | |
NAME | |
quotacheck - scan a filesystem for disk usage, create, check and repair quota files | |
SYNOPSIS | |
quotacheck [ -gubcfinvdMmR ] [ -F quota-format ] -a | filesystem | |
DESCRIPTION | |
quotacheck examines each filesystem, builds a table of current disk usage, and compares this table against that recorded in the disk quota file for the filesystem (this step is omitted if option -c is specified). If any inconsistencies are detected, both the quota file and the current system copy of the incorrect quotas are updated (the latter only occurs if an active filesystem is checked which is not | |
advised). By default, only user quotas are checked. quotacheck expects each filesystem to be checked to have quota files named [a]quota.user and [a]quota.group located at the root of the associated filesystem. If a file is not present, quotacheck will create it. | |
If the quota file is corrupted, quotacheck tries to save as much data as possible. Rescuing data may need user intervention. With no additional options quotacheck will simply exit in such a situation. When in interactive mode (option -i) , the user is asked for advice. Advice can also be provided from command line (see option -n) , which is useful when quotacheck is run automatically (ie. from script) | |
and failure is unacceptable. | |
quotacheck should be run each time the system boots and mounts non-valid filesystems. This is most likely to happen after a system crash. | |
It is strongly recommended to run quotacheck with quotas turned off for the filesystem. Otherwise, possible damage or loss to data in the quota files can result. It is also unwise to run quotacheck on a live filesystem as actual usage may change during the scan. To prevent this, quotacheck tries to remount the filesystem read-only before starting the scan. After the scan is done it remounts the | |
+ man quotaoff | |
+ head -n 20 | |
QUOTAON(8) System Manager's Manual QUOTAON(8) | |
NAME | |
quotaon, quotaoff - turn filesystem quotas on and off | |
SYNOPSIS | |
/usr/sbin/quotaon [ -vugfp ] [ -F format-name ] filesystem... | |
/usr/sbin/quotaon [ -avugfp ] [ -F format-name ] | |
/usr/sbin/quotaoff [ -vugp ] [ -x state ] filesystem... | |
/usr/sbin/quotaoff [ -avugp ] | |
DESCRIPTION | |
quotaon | |
quotaon announces to the system that disk quotas should be enabled on one or more filesystems. The filesystem quota files must be present in the root directory of the specified filesystem and be named either aquota.user (for version 2 user quota), quota.user (for version 1 user quota), aquota.group (for version 2 group quota), or quota.group (for version 1 group quota). | |
XFS filesystems are a special case - XFS considers quota information as filesystem metadata and uses journaling to provide a higher level guarantee of consistency. There are two components to the XFS disk quota system: accounting and limit enforcement. XFS filesystems require that quota accounting be turned on at mount time. It is possible to enable and disable limit enforcement on an XFS filesystem | |
after quota accounting is already turned on. The default is to turn on both accounting and enforcement. | |
+ man quotaon | |
+ head -n 20 | |
QUOTAON(8) System Manager's Manual QUOTAON(8) | |
NAME | |
quotaon, quotaoff - turn filesystem quotas on and off | |
SYNOPSIS | |
/usr/sbin/quotaon [ -vugfp ] [ -F format-name ] filesystem... | |
/usr/sbin/quotaon [ -avugfp ] [ -F format-name ] | |
/usr/sbin/quotaoff [ -vugp ] [ -x state ] filesystem... | |
/usr/sbin/quotaoff [ -avugp ] | |
DESCRIPTION | |
quotaon | |
quotaon announces to the system that disk quotas should be enabled on one or more filesystems. The filesystem quota files must be present in the root directory of the specified filesystem and be named either aquota.user (for version 2 user quota), quota.user (for version 1 user quota), aquota.group (for version 2 group quota), or quota.group (for version 1 group quota). | |
XFS filesystems are a special case - XFS considers quota information as filesystem metadata and uses journaling to provide a higher level guarantee of consistency. There are two components to the XFS disk quota system: accounting and limit enforcement. XFS filesystems require that quota accounting be turned on at mount time. It is possible to enable and disable limit enforcement on an XFS filesystem | |
after quota accounting is already turned on. The default is to turn on both accounting and enforcement. | |
+ man quotastats | |
+ head -n 20 | |
QUOTASTATS(8) quota QUOTASTATS(8) | |
NAME | |
quotastats - Program to query quota statistics | |
SYNOPSIS | |
/usr/sbin/quotastats | |
DESCRIPTION | |
quotastats queries the kernel for quota statistics. It displays: | |
· Supported kernel quota version | |
· Number of dquot lookups | |
· Number of dquot drops | |
· Number of dquot reads | |
· Number of dquot writes | |
· Number of quotafile syncs | |
· Number of dquot cache hits | |
+ man quotasync | |
+ head -n 20 | |
QUOTASYNC(1) General Commands Manual QUOTASYNC(1) | |
NAME | |
quotasync - synchronize in-kernel file system usage and limits to disk format | |
SYNOPSIS | |
quotasync [ -ug ] mount-point... | |
quotasync [ -ug ] -a | |
quotasync -h | -V | |
DESCRIPTION | |
quotasync flushes file system usage and limits from kernel memory to quota files stored in the file system. By default only the user quotas are synchronized. | |
This tool can be useful if you want to display accurate quotas by tools that parse quota files, like repquota(8). | |
OPTIONS | |
-u, --user | |
Synchronize user usage and limits. | |
+ man quote | |
+ head -n 20 | |
No manual entry for quote | |
+ man quote_readline | |
+ head -n 20 | |
No manual entry for quote_readline | |
+ man raid-check | |
+ head -n 20 | |
No manual entry for raid-check | |
+ man ranlib | |
+ head -n 20 | |
RANLIB(1) GNU Development Tools RANLIB(1) | |
NAME | |
ranlib - generate index to archive. | |
SYNOPSIS | |
ranlib [--plugin name] [-DhHvVt] archive | |
DESCRIPTION | |
ranlib generates an index to the contents of an archive and stores it in the archive. The index lists each symbol defined by a member of an archive that is a relocatable object file. | |
You may use nm -s or nm --print-armap to list this index. | |
An archive with such an index speeds up linking to the library and allows routines in the library to call each other without regard to their placement in the archive. | |
The GNU ranlib program is another form of GNU ar; running ranlib is completely equivalent to executing ar -s. | |
OPTIONS | |
+ man raw | |
+ head -n 20 | |
RAW(8) System Administration RAW(8) | |
NAME | |
raw - bind a Linux raw character device | |
SYNOPSIS | |
raw /dev/raw/raw<N> <major> <minor> | |
raw /dev/raw/raw<N> /dev/<blockdev> | |
raw -q /dev/raw/raw<N> | |
raw -qa | |
DESCRIPTION | |
raw is used to bind a Linux raw character device to a block device. Any block device may be used: at the time of binding, the device driver does not even have to be accessible (it may be loaded on demand as a kernel module later). | |
raw is used in two modes: it either sets raw device bindings, or it queries existing bindings. When setting a raw device, /dev/raw/raw<N> is the device name of an existing raw device node in the filesystem. The block device to which it is to be bound can be specified either in terms of its major and minor device numbers, or as a path name /dev/<blockdev> to an existing block device file. | |
+ man rdate | |
+ head -n 20 | |
RDATE(1) Red Hat RDATE(1) | |
NAME | |
rdate - get the time via the network | |
SYNOPSIS | |
rdate [-p] [-s] [-u] [-l] [-t sec] [host...] | |
DESCRIPTION | |
rdate connects to an RFC 868 time server over a TCP/IP network, printing the returned time and/or setting the system clock. | |
OPTIONS | |
-p Print the time returned by the remote machine. | |
-s Set the system time to the returned time. | |
-u Use UDP instead of TCP as the transport. | |
+ man rdisc | |
+ head -n 20 | |
RDISC(8) System Manager's Manual: iputils RDISC(8) | |
NAME | |
rdisc - network router discovery daemon | |
SYNOPSIS | |
rdisc [-abdfrstvV] [-p preference] [-T max_interval] [send_address] [receive_address] | |
DESCRIPTION | |
rdisc implements client side of the ICMP router discover protocol. rdisc is invoked at boot time to populate the network routing tables with default routes. | |
rdisc listens on the ALL_HOSTS (224.0.0.1) multicast address (or receive_address provided it is given) for ROUTER_ADVERTISE messages from routers. The received messages are handled by first ignoring those listed router addresses with which the host does not share a network. Among the remaining addresses the ones with the highest preference are selected as default routers and a default route is entered | |
in the kernel routing table for each one of them. | |
Optionally, rdisc can avoid waiting for routers to announce themselves by sending out a few ROUTER_SOLICITATION messages to the ALL_ROUTERS (224.0.0.2) multicast address (or send_address provided it is given) when it is started. | |
A timer is associated with each router address and the address will no longer be considered for inclusion in the the routing tables if the timer expires before a new advertise message is received from the router. The address will also be excluded from consideration if the host receives an advertise message with the preference being maximally negative. | |
+ man rdma | |
+ head -n 20 | |
RDMA(8) Linux RDMA(8) | |
NAME | |
rdma - RDMA tool | |
SYNOPSIS | |
rdma [ OPTIONS ] OBJECT { COMMAND | help } | |
OBJECT := { dev | link } | |
OPTIONS := { -V[ersion] | -d[etails] } -j[son] } -p[retty] } | |
OPTIONS | |
-V, -Version | |
Print the version of the rdma tool and exit. | |
+ man readelf | |
+ head -n 20 | |
READELF(1) GNU Development Tools READELF(1) | |
NAME | |
readelf - Displays information about ELF files. | |
SYNOPSIS | |
readelf [-a|--all] | |
[-h|--file-header] | |
[-l|--program-headers|--segments] | |
[-S|--section-headers|--sections] | |
[-g|--section-groups] | |
[-t|--section-details] | |
[-e|--headers] | |
[-s|--syms|--symbols] | |
[--dyn-syms] | |
[-n|--notes] | |
[-r|--relocs] | |
[-u|--unwind] | |
+ man readprofile | |
+ head -n 20 | |
READPROFILE(8) System Administration READPROFILE(8) | |
NAME | |
readprofile - read kernel profiling information | |
SYNOPSIS | |
readprofile [options] | |
VERSION | |
This manpage documents version 2.0 of the program. | |
DESCRIPTION | |
The readprofile command uses the /proc/profile information to print ascii data on standard output. The output is organized in three columns: the first is the number of clock ticks, the second is the name of the C function in the kernel where those many ticks occurred, and the third is the normalized `load' of the procedure, calculated as a ratio between the number of ticks and the length of the proce‐ | |
dure. The output is filled with blanks to ease readability. | |
OPTIONS | |
-a, --all | |
Print all symbols in the mapfile. By default the procedures with reported ticks are not printed. | |
+ man reboot | |
+ head -n 20 | |
HALT(8) halt HALT(8) | |
NAME | |
halt, poweroff, reboot - Halt, power-off or reboot the machine | |
SYNOPSIS | |
halt [OPTIONS...] | |
poweroff [OPTIONS...] | |
reboot [OPTIONS...] | |
DESCRIPTION | |
halt, poweroff, reboot may be used to halt, power-off or reboot the machine. | |
OPTIONS | |
The following options are understood: | |
+ man recode-sr-latin | |
+ head -n 20 | |
RECODE-SR-LATIN(1) GNU RECODE-SR-LATIN(1) | |
NAME | |
recode-sr-latin - convert Serbian text from Cyrillic to Latin script | |
SYNOPSIS | |
recode-sr-latin [OPTION] | |
DESCRIPTION | |
Recode Serbian text from Cyrillic to Latin script. The input text is read from standard input. The converted text is output to standard output. | |
Informative output: | |
-h, --help | |
display this help and exit | |
-V, --version | |
output version information and exit | |
+ man red | |
+ head -n 20 | |
ED(1) User Commands ED(1) | |
NAME | |
Ed - line-oriented text editor | |
SYNOPSIS | |
ed [options] [file] | |
DESCRIPTION | |
GNU Ed - The GNU line editor. | |
OPTIONS | |
-h, --help | |
display this help and exit | |
-V, --version | |
output version information and exit | |
+ man rename | |
+ head -n 20 | |
RENAME(1) User Commands RENAME(1) | |
NAME | |
rename - rename files | |
SYNOPSIS | |
rename [options] expression replacement file... | |
DESCRIPTION | |
rename will rename the specified files by replacing the first occurrence of expression in their name by replacement. | |
OPTIONS | |
-s, --symlink | |
Do not rename a symlink but its target. | |
-v, --verbose | |
Show which files where renamed, if any. | |
+ man renice | |
+ head -n 20 | |
RENICE(1) User Commands RENICE(1) | |
NAME | |
renice - alter priority of running processes | |
SYNOPSIS | |
renice [-n] priority [-g|-p|-u] identifier... | |
DESCRIPTION | |
renice alters the scheduling priority of one or more running processes. The first argument is the priority value to be used. The other arguments are interpreted as process IDs (by default), process group IDs, user IDs, or user names. renice'ing a process group causes all processes in the process group to have their scheduling priority altered. renice'ing a user causes all processes owned by the | |
user to have their scheduling priority altered. | |
OPTIONS | |
-n, --priority priority | |
Specify the scheduling priority to be used for the process, process group, or user. Use of the option -n or --priority is optional, but when used it must be the first argument. | |
-g, --pgrp | |
Interpret the succeeding arguments as process group IDs. | |
+ man repo-graph | |
+ head -n 20 | |
repo-graph(1) repo-graph(1) | |
NAME | |
repo-graph - output a full package dependency graph in dot format | |
SYNOPSIS | |
repo-graph [options] | |
DESCRIPTION | |
repo-graph is a program that generates a full package dependency list from a yum repository and outputs it in dot format. | |
OPTIONS | |
-h, --help | |
Display a help message, and then quit. | |
--repoid=REPOID | |
Specify repo ids to query, can be specified multiple times (default is all enabled). | |
+ man repo-rss | |
+ head -n 20 | |
repo-rss(1) repo-rss(1) | |
NAME | |
repo-rss - generates an RSS feed from one or more Yum repositories | |
SYNOPSIS | |
repo-rss [options] repoid1 [repoid2...] | |
DESCRIPTION | |
repo-rss is a program for generating RSS feeds for one or more Yum repositories. | |
GENERAL OPTIONS | |
-h, --help | |
Help; display a help message and then quit. | |
-f <file> | |
Specify the file to which the RSS will be written. Default is repo-rss.xml. | |
+ man repoclosure | |
+ head -n 20 | |
repoclosure(1) repoclosure(1) | |
NAME | |
repoclosure - display a list of unresolved dependencies for a yum repository | |
SYNOPSIS | |
repoclosure [options] | |
DESCRIPTION | |
repoclosure is a program that reads package metadata from one or more yum repositories, checks all dependencies, and displays a list of packages with unresolved dependencies. | |
OPTIONS | |
-h, --help | |
Display a help message, and then quit. | |
-c CONFIG, --config=CONFIG | |
Config file to use (defaults to /etc/yum.conf). | |
+ man repodiff | |
+ head -n 20 | |
repodiff(1) repodiff(1) | |
NAME | |
repodiff - list differences between two or more Yum repositories | |
SYNOPSIS | |
repodiff --old=old_repo_baseurl --new=new_repo_baseurl | |
DESCRIPTION | |
repodiff is a program which will list differences between two sets of repositories. Note that by default only source packages are compared. | |
GENERAL OPTIONS | |
--old, -o | |
Add a repo. as an old repo. Note that if you prefix the url with "mirror:" then the following url is treated as a mirror and not a baseurl. | |
--new, -n | |
Add a repo. as an new repo. Note that if you prefix the url with "mirror:" then the following url is treated as a mirror and not a baseurl. | |
+ man repomanage | |
+ head -n 20 | |
repomanage(1) repomanage(1) | |
NAME | |
repomanage - list the newest or oldest RPM packages in a directory | |
SYNOPSIS | |
repomanage [options] directory | |
DESCRIPTION | |
repomanage is a program to manage a directory of RPM packages. It displays a list of the newest or oldest packages in a directory for easy piping to xargs or similar programs. | |
OPTIONS | |
-h, --help | |
Display a help message, and then quit. | |
-o, --old | |
Print the oldest packages. | |
+ man repoquery | |
+ head -n 20 | |
repoquery(1) repoquery(1) | |
NAME | |
repoquery - query information from Yum repositories | |
SYNOPSIS | |
repoquery [options] <item ...> | |
repoquery -a [options] | |
DESCRIPTION | |
repoquery is a program for querying information from YUM repositories similarly to rpm queries. | |
GENERAL OPTIONS | |
--querytags | |
List valid queryformat tags and exit.. | |
--version | |
Report program version and exit. | |
+ man reposync | |
+ head -n 20 | |
reposync(1) reposync(1) | |
NAME | |
reposync - synchronize yum repositories to a local directory | |
SYNOPSIS | |
reposync [options] | |
DESCRIPTION | |
reposync is used to synchronize a remote yum repository to a local directory, using yum to retrieve the packages. | |
OPTIONS | |
-h, --help | |
Display a help message, and then quit. | |
-c CONFIG, --config=CONFIG | |
Config file to use (defaults to /etc/yum.conf). | |
+ man repotrack | |
+ head -n 20 | |
repotrack(1) repotrack(1) | |
NAME | |
repotrack - track a package and its dependencies and download them | |
SYNOPSIS | |
repotrack [options] package1 [package2...] | |
DESCRIPTION | |
repotrack is a program for keeping track of a particular package and its dependencies. It will download one or more packages and all dependencies. | |
OPTIONS | |
-h, --help | |
Display a help message, and then quit. | |
-c CONFIG, --config=CONFIG | |
Config file to use (defaults to /etc/yum.conf). | |
+ man repquota | |
+ head -n 20 | |
REPQUOTA(8) System Manager's Manual REPQUOTA(8) | |
NAME | |
repquota - summarize quotas for a filesystem | |
SYNOPSIS | |
/usr/sbin/repquota [ -vspiug ] [ -c | -C ] [ -t | -n ] [ -F format-name ] filesystem... | |
/usr/sbin/repquota [ -avtpsiug ] [ -c | -C ] [ -t | -n ] [ -F format-name ] | |
DESCRIPTION | |
repquota prints a summary of the disc usage and quotas for the specified file systems. For each user the current number of files and amount of space (in kilobytes) is printed, along with any quota limits set with edquota(8) or setquota(8). In the second column repquota prints two characters marking which limits are exceeded. If user is over his space softlimit or reaches his space hardlimit in case | |
softlimit is unset, the first character is '+'. Otherwise the character printed is '-'. The second character denotes the state of inode usage analogously. | |
repquota has to translate ids of all users/groups to names (unless option -n was specified) so it may take a while to print all the information. To make translating as fast as possible repquota tries to detect (by reading /etc/nsswitch.conf) whether entries are stored in standard plain text file or in a database and either translates chunks of 1024 names or each name individually. You can override this | |
autodetection by -c or -C options. | |
OPTIONS | |
+ man request-key | |
+ head -n 20 | |
REQUEST-KEY(8) Linux Key Management Utilities REQUEST-KEY(8) | |
NAME | |
request-key - Handle key instantiation callback requests from the kernel | |
SYNOPSIS | |
/sbin/request-key <op> <key> <uid> <gid> <threadring> <processring> <sessionring> [<info>] | |
DESCRIPTION | |
This program is invoked by the kernel when the kernel is asked for a key that it doesn't have immediately available. The kernel creates a partially set up key and then calls out to this program to instantiate it. It is not intended to be called directly. | |
ERRORS | |
All errors will be logged to the syslog. | |
FILES | |
/etc/request-key.conf Instantiation handler configuration file. | |
/etc/request-key.d/<keytype>.conf Keytype specific configuration file. | |
+ man resize2fs | |
+ head -n 20 | |
RESIZE2FS(8) System Manager's Manual RESIZE2FS(8) | |
NAME | |
resize2fs - ext2/ext3/ext4 file system resizer | |
SYNOPSIS | |
resize2fs [ -fFpPM ] [ -d debug-flags ] [ -S RAID-stride ] device [ size ] | |
DESCRIPTION | |
The resize2fs program will resize ext2, ext3, or ext4 file systems. It can be used to enlarge or shrink an unmounted file system located on device. If the filesystem is mounted, it can be used to expand the size of the mounted filesystem, assuming the kernel supports on-line resizing. (As of this writing, the Linux 2.6 kernel supports on-line resize for filesystems mounted using ext3 and ext4.). | |
The size parameter specifies the requested new size of the filesystem. If no units are specified, the units of the size parameter shall be the filesystem blocksize of the filesystem. Optionally, the size parameter may be suffixed by one of the following units designators: 'K', 'M', 'G', 'T' (either upper-case or lower-case) or 's' for power-of-two kilobytes, megabytes, gigabytes, terabytes or 512 | |
byte sectors respectively. The size of the filesystem may never be larger than the size of the partition. If size parameter is not specified, it will default to the size of the partition. | |
The resize2fs program does not manipulate the size of partitions. If you wish to enlarge a filesystem, you must make sure you can expand the size of the underlying partition first. This can be done using fdisk(8) by deleting the partition and recreating it with a larger size or using lvextend(8), if you're using the logical volume manager lvm(8). When recreating the partition, make sure you create | |
it with the same starting disk cylinder as before! Otherwise, the resize operation will certainly not work, and you may lose your entire filesystem. After running fdisk(8), run resize2fs to resize the ext2 filesystem to use all of the space in the newly enlarged partition. | |
If you wish to shrink an ext2 partition, first use resize2fs to shrink the size of filesystem. Then you may use fdisk(8) to shrink the size of the partition. When shrinking the size of the partition, make sure you do not make it smaller than the new size of the ext2 filesystem! | |
+ man resizepart | |
+ head -n 20 | |
RESIZEPART(8) System Administration RESIZEPART(8) | |
NAME | |
resizepart - tell the kernel about the new size of a partition | |
SYNOPSIS | |
resizepart device partition length | |
DESCRIPTION | |
resizepart tells the Linux kernel about the new size of the specified partition. The command is a simple wrapper around the "resize partition" ioctl. | |
This command doesn't manipulate partitions on a block device. | |
PARAMETERS | |
device The disk device. | |
partition | |
+ man restorecon | |
+ head -n 20 | |
restorecon(8) restorecon(8) | |
NAME | |
restorecon - restore file(s) default SELinux security contexts. | |
SYNOPSIS | |
restorecon [-R] [-n] [-p] [-v] [-e directory] pathname... | |
restorecon -f infilename [-e directory] [-R] [-n] [-p] [-v] [-F] | |
DESCRIPTION | |
This manual page describes the restorecon program. | |
This program is primarily used to set the security context (extended attributes) on one or more files. | |
It can also be run at any other time to correct inconsistent labels, to add support for newly-installed policy or, by using the -n option, to passively check whether the file contexts are all set as specified by the active policy (default behavior). | |
+ man rev | |
+ head -n 20 | |
REV(1) User Commands REV(1) | |
NAME | |
rev - reverse lines characterwise | |
SYNOPSIS | |
rev [option] [file...] | |
DESCRIPTION | |
The rev utility copies the specified files to standard output, reversing the order of characters in every line. If no files are specified, standard input is read. | |
OPTIONS | |
-V, --version | |
Display version information and exit. | |
-h, --help | |
Display help text and exit. | |
+ man rmail | |
+ head -n 20 | |
No manual entry for rmail | |
+ man rmail.postfix | |
+ head -n 20 | |
No manual entry for rmail.postfix | |
+ man rmmod | |
+ head -n 20 | |
RMMOD(8) rmmod RMMOD(8) | |
NAME | |
rmmod - Simple program to remove a module from the Linux Kernel | |
SYNOPSIS | |
rmmod [-f] [-s] [-v] [modulename] | |
DESCRIPTION | |
rmmod is a trivial program to remove a module (when module unloading support is provided) from the kernel. Most users will want to use modprobe(8) with the -r option instead. | |
OPTIONS | |
-v, --verbose | |
Print messages about what the program is doing. Usually rmmod prints messages only if something goes wrong. | |
-f, --force | |
This option can be extremely dangerous: it has no effect unless CONFIG_MODULE_FORCE_UNLOAD was set when the kernel was compiled. With this option, you can remove modules which are being used, or which are not designed to be removed, or have been marked as unsafe (see lsmod(8)). | |
+ man rnano | |
+ head -n 20 | |
RNANO(1) General Commands Manual RNANO(1) | |
NAME | |
rnano - a restricted nano | |
SYNOPSIS | |
rnano [options] [[+line[,column]] file]... | |
DESCRIPTION | |
rnano runs the nano editor in restricted mode. This allows editing only the specified file or files, and doesn't allow the user access to the filesystem nor to a command shell. | |
In restricted mode, nano will: | |
· not read any nanorc files; | |
· not allow suspending; | |
+ man rngd | |
+ head -n 20 | |
RNGD(8) System Manager's Manual RNGD(8) | |
NAME | |
rngd - Check and feed random data from hardware device to kernel random device | |
SYNOPSIS | |
rngd [-b, --background] [-f, --foreground] [-d, --debug] [-l, --list] [-x, --exclude] [-n, --include] [-O, --option] [-i, --ignorefail] [-o, --random-device=file] [-p, --pid-file=file] [-r, --rng-device=file] [-s, --random-step=nnn] [-t, --test] [-W, --fill-watermark=nnn] [-q, --quiet] [-?, --help] [-V, --version] | |
DESCRIPTION | |
This daemon feeds data from a random number generator to the kernel's random number entropy pool, after first checking the data to ensure that it is properly random. | |
The -f or --foreground options can be used to tell rngd to avoid forking on startup. This is typically used for debugging. The -b or --background options, which fork and put rngd into the background automatically, are the default. | |
The -r or --rng-device options can be used to select an alternate source of input, besides the default /dev/hwrng. The -o or --random-device options can be used to select an alternate entropy output device, besides the default /dev/random. Note that this device must support the Linux kernel /dev/random ioctl API. | |
OPTIONS | |
+ man rngtest | |
+ head -n 20 | |
RNGTEST(1) General Commands Manual RNGTEST(1) | |
NAME | |
rngtest - Check the randomness of data using FIPS 140-2 tests | |
SYNOPSIS | |
rngtest [-c n | --blockcount=n] [-b n | --blockstats=n] [-t n | --timedstats=n] [-p | --pipe] [-?] [--help] [-V] [--version] | |
DESCRIPTION | |
rngtest works on blocks of 20000 bits at a time, using the FIPS 140-2 (errata of 2001-10-10) tests to verify the randomness of the block of data. | |
It takes input from stdin, and outputs statistics to stderr, optionally echoing blocks that passed the FIPS tests to stdout (when operating in pipe mode). Errors are sent to stderr. | |
At startup, rngtest will trow away the first 32 bits of data when operating in pipe mode. It will use the next 32 bits of data to bootstrap the FIPS tests (even when not operating in pipe mode). These bits are not tested for randomness. | |
Statistics are dumped to stderr when the program exits. | |
+ man route | |
+ head -n 20 | |
ROUTE(8) Linux System Administrator's Manual ROUTE(8) | |
NAME | |
route - show / manipulate the IP routing table | |
SYNOPSIS | |
route [-CFvnNee] [-A family |-4|-6] | |
route [-v] [-A family |-4|-6] add [-net|-host] target [netmask Nm] [gw Gw] [metric N] [mss M] [window W] [irtt I] [reject] [mod] [dyn] [reinstate] [[dev] If] | |
route [-v] [-A family |-4|-6] del [-net|-host] target [gw Gw] [netmask Nm] [metric N] [[dev] If] | |
route [-V] [--version] [-h] [--help] | |
NOTE | |
This program is obsolete. For replacement check ip route. | |
+ man routef | |
+ head -n 20 | |
ROUTEL(8) Linux ROUTEL(8) | |
NAME | |
routel - list routes with pretty output format | |
routef - flush routes | |
SYNTAX | |
routel [tablenr [raw ip args...]] | |
routef | |
DESCRIPTION | |
These programs are a set of helper scripts you can use instead of raw iproute2 commands. | |
The routel script will list routes in a format that some might consider easier to interpret then the ip route list equivalent. | |
The routef script does not take any arguments and will simply flush the routing table down the drain. Beware! This means deleting all routes which will make your network unusable! | |
AUTHORS | |
The routel script was written by Stephen R. van den Berg <[email protected]>, 1999/04/18 and donated to the public domain. | |
+ man routel | |
+ head -n 20 | |
ROUTEL(8) Linux ROUTEL(8) | |
NAME | |
routel - list routes with pretty output format | |
routef - flush routes | |
SYNTAX | |
routel [tablenr [raw ip args...]] | |
routef | |
DESCRIPTION | |
These programs are a set of helper scripts you can use instead of raw iproute2 commands. | |
The routel script will list routes in a format that some might consider easier to interpret then the ip route list equivalent. | |
The routef script does not take any arguments and will simply flush the routing table down the drain. Beware! This means deleting all routes which will make your network unusable! | |
AUTHORS | |
The routel script was written by Stephen R. van den Berg <[email protected]>, 1999/04/18 and donated to the public domain. | |
+ man rpc.gssd | |
+ head -n 20 | |
rpc.gssd(8) System Manager's Manual rpc.gssd(8) | |
NAME | |
rpc.gssd - RPCSEC_GSS daemon | |
SYNOPSIS | |
rpc.gssd [-DfMnlvr] [-k keytab] [-p pipefsdir] [-d ccachedir] [-t timeout] [-R realm] | |
INTRODUCTION | |
The RPCSEC_GSS protocol, defined in RFC 5403, is used to provide strong security for RPC-based protocols such as NFS. | |
Before exchanging RPC requests using RPCSEC_GSS, an RPC client must establish a GSS security context. A security context is shared state on each end of a network transport that enables GSS-API security services. | |
Security contexts are established using security credentials. A credential grants temporary access to a secure network service, much as a railway ticket grants temporary access to use a rail service. | |
A user typically obtains a credential by providing a password to the kinit(1) command, or via a PAM library at login time. A credential acquired with a user principal is known as a user credential (see kerberos(1) for more on principals). | |
For certain operations, a credential is required which represents no user, is otherwise unprivileged, and is always available. This is referred to as a machine credential. | |
+ man rpc.idmapd | |
+ head -n 20 | |
RPC.IDMAPD(8) BSD System Manager's Manual RPC.IDMAPD(8) | |
NAME | |
rpc.idmapd — NFSv4 ID <-> Name Mapper | |
SYNOPSIS | |
rpc.idmapd [-h] [-f] [-v] [-C] [-S] [-p path] [-c path] | |
DESCRIPTION | |
rpc.idmapd is the NFSv4 ID <-> name mapping daemon. It provides functionality to the NFSv4 kernel client and server, to which it communicates via upcalls, by translating user and group IDs to names, and vice versa. | |
Note that on more recent kernels only the NFSv4 server uses rpc.idmapd. The NFSv4 client instead uses nfsidmap(8), and only falls back to rpc.idmapd if there was a problem running the nfsidmap(8) program. | |
The options are as follows: | |
-h Display usage message. | |
-v Increases the verbosity level (can be specified multiple times). | |
-f Runs rpc.idmapd in the foreground and prints all output to the terminal. | |
+ man rpc.mountd | |
+ head -n 20 | |
rpc.mountd(8) System Manager's Manual rpc.mountd(8) | |
NAME | |
rpc.mountd - NFS mount daemon | |
SYNOPSIS | |
/usr/sbin/rpc.mountd [options] | |
DESCRIPTION | |
The rpc.mountd daemon implements the server side of the NFS MOUNT protocol, an NFS side protocol used by NFS version 2 [RFC1094] and NFS version 3 [RFC1813]. | |
An NFS server maintains a table of local physical file systems that are accessible to NFS clients. Each file system in this table is referred to as an exported file system, or export, for short. | |
Each file system in the export table has an access control list. rpc.mountd uses these access control lists to determine whether an NFS client is permitted to access a given file system. For details on how to manage your NFS server's export table, see the exports(5) and exportfs(8) man pages. | |
Mounting exported NFS File Systems | |
The NFS MOUNT protocol has several procedures. The most important of these are MNT (mount an export) and UMNT (unmount an export). | |
+ man rpc.nfsd | |
+ head -n 20 | |
rpc.nfsd(8) System Manager's Manual rpc.nfsd(8) | |
NAME | |
rpc.nfsd - NFS server process | |
SYNOPSIS | |
/usr/sbin/rpc.nfsd [options] nproc | |
DESCRIPTION | |
The rpc.nfsd program implements the user level part of the NFS service. The main functionality is handled by the nfsd kernel module. The user space program merely specifies what sort of sockets the kernel service should listen on, what NFS versions it should support, and how many kernel threads it should use. | |
The rpc.mountd server provides an ancillary service needed to satisfy mount requests by NFS clients. | |
OPTIONS | |
-d or --debug | |
enable logging of debugging messages | |
-H or --host hostname | |
+ man rpc.rquotad | |
+ head -n 20 | |
RQUOTAD(8) System Manager's Manual RQUOTAD(8) | |
NAME | |
rpc.rquotad - remote quota server | |
SYNOPSIS | |
/usr/sbin/rpc.rquotad [ -FI ] [ -p port ] [ -s | -S ] [ -x path ] | |
/usr/sbin/rpc.rquotad [ -h | -V ] | |
DESCRIPTION | |
rpc.rquotad is an rpc(3) server which returns quotas for a user of a local filesystem which is mounted by a remote machine over the NFS. It also allows setting of quotas on NFS mounted filesystem (if configured during compilation and allowed by a command line option -S). The results are used by quota(1) to display user quotas for remote filesystems and by edquota(8) to set quotas on remote filesys‐ | |
tems. rquotad daemon uses tcp-wrappers library (under service name rquotad) which allows you to specify hosts allowed/disallowed to use the daemon (see hosts.allow(5) manpage for more information). The rquotad daemon is normally started at boot time from the system startup scripts. | |
OPTIONS | |
-h, --help | |
Show program usage and exit. -V, --version Show version of quota tools. | |
+ man rpc.statd | |
+ head -n 20 | |
RPC.STATD(8) System Manager's Manual RPC.STATD(8) | |
NAME | |
rpc.statd - NSM service daemon | |
SYNOPSIS | |
rpc.statd [-dh?FLNvV] [-H prog] [-n my-name] [-o outgoing-port] | |
[-p listener-port] [-P path] | |
[--nlm-port port] [--nlm-udp-port port] | |
DESCRIPTION | |
File locks are not part of persistent file system state. Lock state is thus lost when a host reboots. | |
Network file systems must also detect when lock state is lost because a remote host has rebooted. After an NFS client reboots, an NFS server must release all file locks held by applications that were running on that client. After a server reboots, a client must remind the server of file locks held by applications running on that client. | |
For NFS version 2 [RFC1094] and NFS version 3 [RFC1813], the Network Status Monitor protocol (or NSM for short) is used to notify NFS peers of reboots. On Linux, two separate user-space components constitute the NSM service: | |
rpc.statd | |
+ man rpcbind | |
+ head -n 20 | |
mdoc warning: Unknown list type `Aurelien' (or missing list type) | |
in .Bl macro | |
Usage: .Bl {-hang | -ohang | -tag | -diag | -inset} | |
[-width <string>] | |
[-offset <string>] [-compact] | |
.Bl -column [-offset <string>] <string1> <string2> ... | |
.Bl {-item | -enum [-nested] | -bullet | -hyphen | -dash} | |
[-offset <string>] [-compact] (#148) | |
mdoc warning: extraneous .El call (#149) | |
RPCBIND(8) BSD System Manager's Manual RPCBIND(8) | |
NAME | |
rpcbind — universal addresses to RPC program number mapper | |
SYNOPSIS | |
rpcbind [-adhiLls] | |
DESCRIPTION | |
The rpcbind utility is a server that converts RPC program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. | |
When an RPC service is started, it tells rpcbind the address at which it is listening, and the RPC program numbers it is prepared to serve. When a client wishes to make an RPC call to a given program number, it first contacts rpcbind on the server machine to determine the address where RPC requests should be sent. | |
The rpcbind utility should be started before any other RPC service. Normally, standard RPC servers are started by port monitors, so rpcbind must be started before port monitors are invoked. | |
When rpcbind is started, it checks that certain name-to-address translation-calls function correctly. If they fail, the network configuration databases may be corrupt. Since RPC services cannot function correctly in this situation, rpcbind reports the condition and terminates. | |
The rpcbind utility can only be started by the super-user. | |
+ man rpcdebug | |
+ head -n 20 | |
rpcdebug(8) System Manager's Manual rpcdebug(8) | |
NAME | |
rpcdebug - set and clear NFS and RPC kernel debug flags | |
SYNOPSIS | |
rpcdebug -vh | |
rpcdebug -m module | |
rpcdebug -m module -s flags... | |
rpcdebug -m module -c flags... | |
DESCRIPTION | |
The rpcdebug command allows an administrator to set and clear the Linux kernel's NFS client and server debug flags. Setting these flags causes the kernel to emit messages to the system log in response to NFS activity; this is typically useful when debugging NFS problems. | |
The first form in the synopsis can be used to list all available debug flags. The second form shows the currently set debug flags for the given module. The third form sets one or more flags, and the fourth form clears one or more flags. | |
The value all may be used to set or clear all the flags for the given module. | |
+ man rpcinfo | |
+ head -n 20 | |
RPCINFO(8) BSD System Manager's Manual RPCINFO(8) | |
NAME | |
rpcinfo — report RPC information | |
SYNOPSIS | |
rpcinfo [-m | -s] [host] | |
rpcinfo -p [host] | |
rpcinfo -T transport host prognum [versnum] | |
rpcinfo -l [-T transport] host prognum versnum | |
rpcinfo [-n portnum] -u host prognum [versnum] | |
rpcinfo [-n portnum] [-t] host prognum [versnum] | |
rpcinfo -a serv_address -T transport prognum [versnum] | |
rpcinfo -b [-T transport] prognum versnum | |
rpcinfo -d [-T transport] prognum versnum | |
DESCRIPTION | |
rpcinfo makes an RPC call to an RPC server and reports what it finds. | |
In the first synopsis, rpcinfo lists all the registered RPC services with rpcbind on host. If host is not specified, the local host is the default. If -s is used, the information is displayed in a concise format. | |
+ man rst2html | |
+ head -n 20 | |
No manual entry for rst2html | |
+ man rst2html-3 | |
+ head -n 20 | |
No manual entry for rst2html-3 | |
+ man rst2html-3.7 | |
+ head -n 20 | |
No manual entry for rst2html-3.7 | |
+ man rst2html4-3 | |
+ head -n 20 | |
No manual entry for rst2html4-3 | |
+ man rst2html4-3.7 | |
+ head -n 20 | |
No manual entry for rst2html4-3.7 | |
+ man rst2html5-3 | |
+ head -n 20 | |
No manual entry for rst2html5-3 | |
+ man rst2html5-3.7 | |
+ head -n 20 | |
No manual entry for rst2html5-3.7 | |
+ man rst2latex | |
+ head -n 20 | |
No manual entry for rst2latex | |
+ man rst2latex-3 | |
+ head -n 20 | |
No manual entry for rst2latex-3 | |
+ man rst2latex-3.7 | |
+ head -n 20 | |
No manual entry for rst2latex-3.7 | |
+ man rst2man | |
+ head -n 20 | |
No manual entry for rst2man | |
+ man rst2man-3 | |
+ head -n 20 | |
No manual entry for rst2man-3 | |
+ man rst2man-3.7 | |
+ head -n 20 | |
No manual entry for rst2man-3.7 | |
+ man rst2odt | |
+ head -n 20 | |
No manual entry for rst2odt | |
+ man rst2odt-3 | |
+ head -n 20 | |
No manual entry for rst2odt-3 | |
+ man rst2odt-3.7 | |
+ head -n 20 | |
No manual entry for rst2odt-3.7 | |
+ man rst2odt_prepstyles | |
+ head -n 20 | |
No manual entry for rst2odt_prepstyles | |
+ man rst2odt_prepstyles-3 | |
+ head -n 20 | |
No manual entry for rst2odt_prepstyles-3 | |
+ man rst2odt_prepstyles-3.7 | |
+ head -n 20 | |
No manual entry for rst2odt_prepstyles-3.7 | |
+ man rst2pseudoxml | |
+ head -n 20 | |
No manual entry for rst2pseudoxml | |
+ man rst2pseudoxml-3 | |
+ head -n 20 | |
No manual entry for rst2pseudoxml-3 | |
+ man rst2pseudoxml-3.7 | |
+ head -n 20 | |
No manual entry for rst2pseudoxml-3.7 | |
+ man rst2s5 | |
+ head -n 20 | |
No manual entry for rst2s5 | |
+ man rst2s5-3 | |
+ head -n 20 | |
No manual entry for rst2s5-3 | |
+ man rst2s5-3.7 | |
+ head -n 20 | |
No manual entry for rst2s5-3.7 | |
+ man rst2xetex | |
+ head -n 20 | |
No manual entry for rst2xetex | |
+ man rst2xetex-3 | |
+ head -n 20 | |
No manual entry for rst2xetex-3 | |
+ man rst2xetex-3.7 | |
+ head -n 20 | |
No manual entry for rst2xetex-3.7 | |
+ man rst2xml | |
+ head -n 20 | |
No manual entry for rst2xml | |
+ man rst2xml-3 | |
+ head -n 20 | |
No manual entry for rst2xml-3 | |
+ man rst2xml-3.7 | |
+ head -n 20 | |
No manual entry for rst2xml-3.7 | |
+ man rstpep2html | |
+ head -n 20 | |
No manual entry for rstpep2html | |
+ man rstpep2html-3 | |
+ head -n 20 | |
No manual entry for rstpep2html-3 | |
+ man rstpep2html-3.7 | |
+ head -n 20 | |
No manual entry for rstpep2html-3.7 | |
+ man rsync | |
+ head -n 20 | |
rsync(1) rsync(1) | |
NAME | |
rsync - a fast, versatile, remote (and local) file-copying tool | |
SYNOPSIS | |
Local: rsync [OPTION...] SRC... [DEST] | |
Access via remote shell: | |
Pull: rsync [OPTION...] [USER@]HOST:SRC... [DEST] | |
Push: rsync [OPTION...] SRC... [USER@]HOST:DEST | |
Access via rsync daemon: | |
Pull: rsync [OPTION...] [USER@]HOST::SRC... [DEST] | |
rsync [OPTION...] rsync://[USER@]HOST[:PORT]/SRC... [DEST] | |
Push: rsync [OPTION...] SRC... [USER@]HOST::DEST | |
rsync [OPTION...] SRC... rsync://[USER@]HOST[:PORT]/DEST | |
+ man rsyslog-recover-qi.pl | |
+ head -n 20 | |
No manual entry for rsyslog-recover-qi.pl | |
+ man rsyslogd | |
+ head -n 20 | |
RSYSLOGD(8) Linux System Administration RSYSLOGD(8) | |
NAME | |
rsyslogd - reliable and extended syslogd | |
SYNOPSIS | |
rsyslogd [ -d ] [ -D ] [ -f config file ] [ -i pid file ] [ -n ] [ -N level ] [ -C ] [ -v ] | |
DESCRIPTION | |
Rsyslogd is a system utility providing support for message logging. Support of both internet and unix domain sockets enables this utility to support both local and remote logging. | |
Note that this version of rsyslog ships with extensive documentation in html format. This is provided in the ./doc subdirectory and probably in a separate package if you installed rsyslog via a packaging system. To use rsyslog's advanced features, you need to look at the html documentation, because the man pages only covers basic aspects of operation. For details and configuration examples, see the | |
rsyslog.conf (5) man page and the online documentation at http://www.rsyslog.com/doc | |
Rsyslogd(8) is derived from the sysklogd package which in turn is derived from the stock BSD sources. | |
Rsyslogd provides a kind of logging that many modern programs use. Every logged message contains at least a time and a hostname field, normally a program name field, too, but that depends on how trusty the logging program is. The rsyslog package supports free definition of output formats via templates. It also supports precise timestamps and writing directly to databases. If the database option is | |
used, tools like phpLogCon can be used to view the log data. | |
+ man rtacct | |
+ head -n 20 | |
RTACCT(8) System Manager's Manual RTACCT(8) | |
NAME | |
nstat, rtacct - network statistics tools. | |
SYNOPSIS | |
Usage: nstat [ -h?vVzrnasd:t: ] [ PATTERN [ PATTERN ] ] | |
Usage: rtacct [ -h?vVzrnasd:t: ] [ ListOfRealms ] | |
DESCRIPTION | |
nstat and rtacct are simple tools to monitor kernel snmp counters and network interface statistics. | |
OPTIONS | |
-h, --help Print help | |
+ man rtcwake | |
+ head -n 20 | |
RTCWAKE(8) System Administration RTCWAKE(8) | |
NAME | |
rtcwake - enter a system sleep state until specified wakeup time | |
SYNOPSIS | |
rtcwake [options] [-d device] [-m standby_mode] {-s seconds|-t time_t} | |
DESCRIPTION | |
This program is used to enter a system sleep state and to automatically wake from it at a specified time. | |
This uses cross-platform Linux interfaces to enter a system sleep state, and leave it no later than a specified time. It uses any RTC framework driver that supports standard driver model wakeup flags. | |
This is normally used like the old apmsleep utility, to wake from a suspend state like ACPI S1 (standby) or S3 (suspend-to-RAM). Most platforms can implement those without analogues of BIOS, APM, or ACPI. | |
On some systems, this can also be used like nvram-wakeup, waking from states like ACPI S4 (suspend to disk). Not all systems have persistent media that are appropriate for such suspend modes. | |
Note that alarm functionality depends on hardware; not every RTC is able to setup an alarm up to 24 hours in the future. | |
+ man rtmon | |
+ head -n 20 | |
RTMON(8) System Manager's Manual RTMON(8) | |
NAME | |
rtmon - listens to and monitors RTnetlink | |
SYNOPSIS | |
rtmon [ options ] file FILE [ all | LISTofOBJECTS ] | |
DESCRIPTION | |
This manual page documents briefly the rtmon command. | |
rtmon listens on netlink socket and monitors routing table changes. | |
rtmon can be started before the first network configuration command is issued. For example if you insert: | |
rtmon file /var/log/rtmon.log | |
in a startup script, you will be able to view the full history later. Certainly, it is possible to start rtmon at any time. It prepends the history with the state snapshot dumped at the moment of starting. | |
+ man rtpr | |
+ head -n 20 | |
RTPR(8) System Manager's Manual RTPR(8) | |
NAME | |
rtpr - replace backslashes with newlines. | |
DESCRIPTION | |
rtpr is a trivial bash script which converts backslashes in standard input to newlines. It's sole purpose is to be fed with input from ip when executed with it's --oneline flag. | |
EXAMPLES | |
ip --oneline address show | rtpr | |
Undo oneline converted ip-address output. | |
SEE ALSO | |
ip(8) | |
+ man rtstat | |
+ head -n 20 | |
LNSTAT(8) System Manager's Manual LNSTAT(8) | |
NAME | |
lnstat - unified linux network statistics | |
SYNOPSIS | |
lnstat [options] | |
DESCRIPTION | |
This manual page documents briefly the lnstat command. | |
lnstat is a generalized and more feature-complete replacement for the old rtstat program. It is commonly used to periodically print a selection of statistical values exported by the kernel. In addition to routing cache statistics, it supports any kind of statistics the linux kernel exports via a file in /proc/net/stat/. | |
Each file in /proc/net/stat/ contains a header line listing the column names. These names are used by lnstat as keys for selecting which statistics to print. For every CPU present in the system, a line follows which lists the actual values for each column of the file. lnstat sums these values up (which in fact are counters) before printing them. After each interval, only the difference to the last | |
value is printed. | |
Files and columns may be selected by using the -f and -k parameters. By default, all columns of all files are printed. | |
+ man run-parts | |
+ head -n 20 | |
man: can't open /usr/share/man/man/man4/crontabs.4: No such file or directory | |
CRONTABS(4) Crontabs users' Manual CRONTABS(4) | |
NAME | |
crontabs - configuration and scripts for running periodical jobs | |
SYNOPSIS | |
run-parts [--list|--test]<directory> | |
DESCRIPTION | |
Crontabs is a historical name for the run-parts script and the system crontab. The run-parts script runs all executables in the specified directory. Run-parts runs all executables in the specified directory. The execution of files can be allowed or denied by creating file jobs.allow or jobs.deny which worked similar as other allow/deny config files. The file must be created in the specified | |
directory. | |
--list print names of all files (not limited to executables), but don't run them. This option can't be used with test option. | |
--test print names of files, which would be run. | |
Randomization of jobs can be configured in the /etc/sysconfig/run-parts file. To enable randomization of jobs, set the RANDOMIZE parameter to 1 and set the RANDOM parameter to an integer which determines a random seed. Additionally, you may configure the RANDOMTIME parameter (again, by specifying an integer) to provide an additional level of randomization. Jobs are not randomized when the RANDOM | |
and RANDOMTIME parameters are set to 0. Values in these two parameters must be set to 1 or larger to provide a good enough randomization. | |
+ man runlevel | |
+ head -n 20 | |
RUNLEVEL(8) runlevel RUNLEVEL(8) | |
NAME | |
runlevel - Print previous and current SysV runlevel | |
SYNOPSIS | |
runlevel [options...] | |
DESCRIPTION | |
runlevel prints the previous and current SysV runlevel if they are known. | |
The two runlevel characters are separated by a single space character. If a runlevel cannot be determined, N is printed instead. If neither can be determined, the word "unknown" is printed. | |
Unless overridden in the environment, this will check the utmp database for recent runlevel changes. | |
OPTIONS | |
The following option is understood: | |
+ man runuser | |
+ head -n 20 | |
RUNUSER(1) User Commands RUNUSER(1) | |
NAME | |
runuser - run a command with substitute user and group ID | |
SYNOPSIS | |
runuser [options] -u user [[--] command [argument...]] | |
runuser [options] [-] [user [argument...]] | |
DESCRIPTION | |
runuser allows to run commands with a substitute user and group ID. If the option -u is not given, it falls back to su-compatible semantics and a shell is executed. The difference between the commands runuser and su is that runuser does not ask for a password (because it may be executed by the root user only) and it uses a different PAM configuration. The command runuser does not have to be | |
installed with set-user-ID permissions. | |
If the PAM session is not required then recommended solution is to use setpriv(1) command. | |
When called without arguments, runuser defaults to running an interactive shell as root. | |
+ man rvim | |
+ head -n 20 | |
VIM(1) General Commands Manual VIM(1) | |
NAME | |
vim - Vi IMproved, a programmer's text editor | |
SYNOPSIS | |
vim [options] [file ..] | |
vim [options] - | |
vim [options] -t tag | |
vim [options] -q [errorfile] | |
ex gex | |
view | |
gvim gview vimx evim eview | |
rvim rview rgvim rgview | |
DESCRIPTION | |
Vim is a text editor that is upwards compatible to Vi. It can be used to edit all kinds of plain text. It is especially useful for editing programs. | |
+ man s2p | |
+ head -n 20 | |
S2P(1) Perl Programmers Reference Guide S2P(1) | |
NAME | |
psed - a stream editor | |
SYNOPSIS | |
psed [-an] script [file ...] | |
psed [-an] [-e script] [-f script-file] [file ...] | |
s2p [-an] [-e script] [-f script-file] | |
DESCRIPTION | |
A stream editor reads the input stream consisting of the specified files (or standard input, if none are given), processes is line by line by applying a script consisting of edit commands, and writes resulting lines to standard output. The filename '"-"' may be used to read standard input. | |
The edit script is composed from arguments of -e options and script-files, in the given order. A single script argument may be specified as the first parameter. | |
If this program is invoked with the name s2p, it will act as a sed-to-Perl translator. See "SED SCRIPT TRANSLATION". | |
+ man sa | |
+ head -n 20 | |
SA(8) System Manager's Manual SA(8) | |
NAME | |
sa - summarizes accounting information | |
SYNOPSIS | |
sa [ -a | --list-all-names ] | |
[ -b | --sort-sys-user-div-calls ] | |
[ -c | --percentages ] [ -d | --sort-avio ] | |
[ -D | --sort-tio ] [ -f | --not-interactive ] | |
[ -i | --dont-read-summary-files ] | |
[ -j | --print-seconds ] [ -k | --sort-cpu-avmem ] | |
[ -K | --sort-ksec ] [ -l | --separate-times ] | |
[ -m | --user-summary ] [ -n | --sort-num-calls ] | |
[ -p | --show-paging ] [ -P | --show-paging-avg ] | |
[ -r | --reverse-sort ] [ -s | --merge ] | |
[ -t | --print-ratio ] [ -u | --print-users ] | |
[ -v num | --threshold num ] [ --sort-real-time ] | |
+ man sadf | |
+ head -n 20 | |
SADF(1) Linux User's Manual SADF(1) | |
NAME | |
sadf - Display data collected by sar in multiple formats. | |
SYNOPSIS | |
sadf [ -C ] [ -d | -j | -p | -x ] [ -H ] [ -h ] [ -T | -t | -U ] [ -V ] [ -P { cpu [,...] | ALL } ] [ -s [ hh:mm:ss ] ] [ -e [ hh:mm:ss ] ] [ -- sar_options ] [ interval [ count ] ] [ datafile ] | |
DESCRIPTION | |
The sadf command is used for displaying the contents of data files created by the sar(1) command. But unlike sar, sadf can write its data in many different formats (CSV, XML, etc.) The default format is one that can easily be handled by pattern processing commands like awk (see option -p). | |
The sadf command extracts and writes to standard output records saved in the datafile file. This file must have been created by a version of sar which is compatible with that of sadf. If datafile is omitted, sadf uses the standard system activity file, the /var/log/sa/sadd file, where the dd parameter indicates the current day. | |
The interval and count parameters are used to tell sadf to select count records at interval seconds apart. If the count parameter is not set, then all the records saved in the data file will be displayed. | |
All the activity flags of sar may be entered on the command line to indicate which activities are to be reported. Before specifying them, put a pair of dashes (--) on the command line in order not to confuse the flags with those of sadf. Not specifying any flags selects only CPU activity. | |
+ man safe_finger | |
+ head -n 20 | |
SAFE_FINGER(8) Linux Programmer's Manual SAFE_FINGER(8) | |
NAME | |
safe_finger - finger client wrapper that protects against nasty stuff from finger servers | |
SYNOPSIS | |
safe_finger [finger_options] | |
DESCRIPTION | |
The safe_finger command protects against nasty stuff from finger servers. Use this program for automatic reverse finger probes from the tcp_wrapper (tcpd) , not the raw finger command. The safe_finger command makes sure that the finger client is not run with root privileges. It also runs the finger client with a defined PATH environment. safe_finger will also protect you from problems caused by the | |
output of some finger servers. The problem: some programs may react to stuff in the first column. Other programs may get upset by thrash anywhere on a line. File systems may fill up as the finger server keeps sending data. Text editors may bomb out on extremely long lines. The finger server may take forever because it is somehow wedged. safe_finger takes care of all this badness. | |
SEE ALSO | |
hosts_access(5), hosts_options(5), tcpd(8) | |
AUTHOR | |
Wietse Venema, Eindhoven University of Technology, The Netherlands. | |
+ man sar | |
+ head -n 20 | |
SAR(1) Linux User's Manual SAR(1) | |
NAME | |
sar - Collect, report, or save system activity information. | |
SYNOPSIS | |
sar [ -A ] [ -B ] [ -b ] [ -C ] [ -d ] [ -F ] [ -H ] [ -h ] [ -p ] [ -q ] [ -R ] [ -r ] [ -S ] [ -t ] [ -u [ ALL ] ] [ -V ] [ -v ] [ -W ] [ -w ] [ -y ] [ -I { int [,...] | SUM | ALL | XALL } ] [ -P { cpu [,...] | ALL } ] [ -m { keyword [,...] | ALL } ] [ -n { keyword [,...] | ALL } ] [ -j { ID | LABEL | PATH | UUID | ... } ] [ -f [ filename ] | -o [ filename ] | -[0-9]+ ] [ -i interval ] [ -s [ | |
hh:mm:ss ] ] [ -e [ hh:mm:ss ] ] [ interval [ count ] ] | |
DESCRIPTION | |
The sar command writes to standard output the contents of selected cumulative activity counters in the operating system. The accounting system, based on the values in the count and interval parameters, writes information the specified number of times spaced at the specified intervals in seconds. If the interval parameter is set to zero, the sar command displays the average statistics for the time | |
since the system was started. If the interval parameter is specified without the count parameter, then reports are generated continuously. The collected data can also be saved in the file specified by the -o filename flag, in addition to being displayed onto the screen. If filename is omitted, sar uses the standard system activity daily data file, the /var/log/sa/sadd file, where the dd parameter | |
indicates the current day. By default all the data available from the kernel are saved in the data file. | |
The sar command extracts and writes to standard output records previously saved in a file. This file can be either the one specified by the -f flag or, by default, the standard system activity daily data file. It is also possible to enter -1, -2 etc. as an argument to sar to display data of that days ago. For example, -1 will point at the standard system activity file of yesterday. | |
Without the -P flag, the sar command reports system-wide (global among all processors) statistics, which are calculated as averages for values expressed as percentages, and as sums otherwise. If the -P flag is given, the sar command reports activity which relates to the specified processor or processors. If -P ALL is given, the sar command reports statistics for each individual processor and global | |
statistics among all processors. | |
+ man scl | |
+ head -n 20 | |
<standard input>:12: a newline character is not allowed in an escape name | |
scl(1) General Commands Manual scl(1) | |
NAME | |
scl - Setup and run software from Software Collection environment | |
SYNOPSIS | |
scl <action> <collection1> [<collection2> ...] <command> | |
scl <action> <collection1> [<collection2> ...] -- <command> | |
scl {-l|--list} [<collection1> <collection2> ...] | |
scl register <path> | |
scl deregister <collection> [--force] | |
DESCRIPTION | |
This manual page documents scl, a program which is an utility for running software packaged as a Software Collection. | |
+ man scl_enabled | |
+ head -n 20 | |
No manual entry for scl_enabled | |
+ man scl_source | |
+ head -n 20 | |
No manual entry for scl_source | |
+ man scp | |
+ head -n 20 | |
mdoc warning: .Ek found without .Bk before (#42) | |
SCP(1) BSD General Commands Manual SCP(1) | |
NAME | |
scp — secure copy (remote file copy program) | |
SYNOPSIS | |
scp [-12346BCpqrTv] [-c cipher] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-S program] [[user@]host1:]file1 ... [[user@]host2:]file2 | |
DESCRIPTION | |
scp copies files between hosts on a network. It uses ssh(1) for data transfer, and uses the same authentication and provides the same security as ssh(1). scp will ask for passwords or passphrases if they are needed for authentication. | |
File names may contain a user and host specification to indicate that the file is to be copied to/from that host. Local file names can be made explicit using absolute or relative pathnames to avoid scp treating file names containing ‘:’ as host specifiers. Copies between two remote hosts are also permitted. | |
The options are as follows: | |
-1 Forces scp to use protocol 1. | |
-2 Forces scp to use protocol 2. | |
-3 Copies between two remote hosts are transferred through the local host. Without this option the data is copied directly between the two remote hosts. Note that this option disables the progress meter. | |
+ man screen | |
+ head -n 20 | |
SCREEN(1) General Commands Manual SCREEN(1) | |
NAME | |
screen - screen manager with VT100/ANSI terminal emulation | |
SYNOPSIS | |
screen [ -options ] [ cmd [ args ] ] | |
screen -r [[pid.]tty[.host]] | |
screen -r sessionowner/[[pid.]tty[.host]] | |
DESCRIPTION | |
Screen is a full-screen window manager that multiplexes a physical terminal between several processes (typically interactive shells). Each virtual terminal provides the functions of a DEC VT100 terminal and, in addition, several control functions from the ISO 6429 (ECMA 48, ANSI X3.64) and ISO 2022 standards (e.g. insert/delete line and support for multiple character sets). There is a scrollback his‐ | |
tory buffer for each virtual terminal and a copy-and-paste mechanism that allows moving text regions between windows. | |
+ man script | |
+ head -n 20 | |
SCRIPT(1) User Commands SCRIPT(1) | |
NAME | |
script - make typescript of terminal session | |
SYNOPSIS | |
script [options] [file] | |
DESCRIPTION | |
script makes a typescript of everything displayed on your terminal. It is useful for students who need a hardcopy record of an interactive session as proof of an assignment, as the typescript file can be printed out later with lpr(1). | |
If the argument file is given, script saves the dialogue in this file. If no filename is given, the dialogue is saved in the file typescript. | |
OPTIONS | |
-a, --append | |
Append the output to file or to typescript, retaining the prior contents. | |
-c, --command command | |
+ man scriptreplay | |
+ head -n 20 | |
SCRIPTREPLAY(1) User Commands SCRIPTREPLAY(1) | |
NAME | |
scriptreplay - play back typescripts, using timing information | |
SYNOPSIS | |
scriptreplay [options] [-t] timingfile [typescript [divisor]] | |
DESCRIPTION | |
This program replays a typescript, using timing information to ensure that output happens in the same rhythm as it originally appeared when the script was recorded. | |
The replay simply displays the information again; the programs that were run when the typescript was being recorded are not run again. Since the same information is simply being displayed, scriptreplay is only guaranteed to work properly if run on the same type of terminal the typescript was recorded on. Otherwise, any escape characters in the typescript may be interpreted differently by the terminal | |
to which scriptreplay is sending its output. | |
The timing information is what script(1) outputs to standard error if it is run with the -t parameter. | |
By default, the typescript to display is assumed to be named typescript, but other filenames may be specified, as the second parameter or with option -s. | |
+ man secon | |
+ head -n 20 | |
SECON(1) NSA SECON(1) | |
NAME | |
secon - See an SELinux context, from a file, program or user input. | |
SYNOPSIS | |
secon [-hVurtscmPRfLp] [CONTEXT] | |
[--file] FILE | |
[--link] FILE | |
[--pid] PID | |
DESCRIPTION | |
See a part of a context. The context is taken from a file, pid, user input or the context in which secon is originally executed. | |
-V, --version | |
shows the current version of secon | |
-h, --help | |
+ man selabel_digest | |
+ head -n 20 | |
No manual entry for selabel_digest | |
+ man selabel_lookup | |
+ head -n 20 | |
No manual entry for selabel_lookup | |
+ man selabel_lookup_best_match | |
+ head -n 20 | |
No manual entry for selabel_lookup_best_match | |
+ man selabel_partial_match | |
+ head -n 20 | |
No manual entry for selabel_partial_match | |
+ man selinux_restorecon | |
+ head -n 20 | |
No manual entry for selinux_restorecon | |
+ man selinuxconlist | |
+ head -n 20 | |
selinuxconlist(1) SELinux Command Line documentation selinuxconlist(1) | |
NAME | |
selinuxconlist - list all SELinux context reachable for user | |
SYNOPSIS | |
selinuxconlist [-l level] user [context] | |
DESCRIPTION | |
selinuxconlist reports the list of context reachable for user from the current context or specified context | |
-l level mcs/mls level | |
AUTHOR | |
This manual page was written by Dan Walsh <[email protected]>. | |
+ man selinuxdefcon | |
+ head -n 20 | |
selinuxdefcon(1) SELinux Command Line documentation selinuxdefcon(1) | |
NAME | |
selinuxdefcon - report default SELinux context for user | |
SYNOPSIS | |
selinuxdefcon [-l level] user fromcon | |
DESCRIPTION | |
selinuxdefcon reports the default context for the specified user from the specified context | |
-l level mcs/mls level | |
EXAMPLE | |
# selinuxdefcon jsmith system_u:system_r:sshd_t:s0 | |
+ man selinuxenabled | |
+ head -n 20 | |
selinuxenabled(8) SELinux Command Line documentation selinuxenabled(8) | |
NAME | |
selinuxenabled - tool to be used within shell scripts to determine if selinux is enabled | |
SYNOPSIS | |
selinuxenabled | |
DESCRIPTION | |
Indicates whether SELinux is enabled or disabled. | |
EXIT STATUS | |
It exits with status 0 if SELinux is enabled and 1 if it is not enabled. | |
AUTHOR | |
Dan Walsh, <[email protected]> | |
SEE ALSO | |
+ man selinuxexeccon | |
+ head -n 20 | |
selinuxexeccon(8) SELinux Command Line documentation selinuxexeccon(8) | |
NAME | |
selinuxexeccon - report SELinux context used for this executable | |
SYNOPSIS | |
selinuxexeccon command [fromcon] | |
DESCRIPTION | |
selinuxexeccon reports the SELinux process context for the specified command from the specified context or the current context. | |
EXAMPLE | |
# selinuxexeccon /usr/bin/passwd | |
staff_u:staff_r:passwd_t:s0-s0:c0.c1023 | |
# selinuxexeccon /usr/sbin/sendmail system_u:system_r:httpd_t:s0 | |
system_u:system_r:system_mail_t:s0 | |
+ man semodule | |
+ head -n 20 | |
SEMODULE(8) NSA SEMODULE(8) | |
NAME | |
semodule - Manage SELinux policy modules. | |
SYNOPSIS | |
semodule [options]... MODE [MODES]... | |
DESCRIPTION | |
semodule is the tool used to manage SELinux policy modules, including installing, upgrading, listing and removing modules. semodule may also be used to force a rebuild of policy from the module store and/or to force a reload of policy without performing any other transaction. semodule acts on module packages created by semodule_package. Conventionally, these files have a .pp suffix (policy package), | |
although this is not mandated in any way. | |
OPTIONS | |
-R, --reload | |
force a reload of policy | |
+ man sendmail | |
+ head -n 20 | |
SENDMAIL(1) General Commands Manual SENDMAIL(1) | |
NAME | |
sendmail - Postfix to Sendmail compatibility interface | |
SYNOPSIS | |
sendmail [option ...] [recipient ...] | |
mailq | |
sendmail -bp | |
newaliases | |
sendmail -I | |
DESCRIPTION | |
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored. | |
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory. | |
+ man sendmail.postfix | |
+ head -n 20 | |
SENDMAIL(1) General Commands Manual SENDMAIL(1) | |
NAME | |
sendmail - Postfix to Sendmail compatibility interface | |
SYNOPSIS | |
sendmail [option ...] [recipient ...] | |
mailq | |
sendmail -bp | |
newaliases | |
sendmail -I | |
DESCRIPTION | |
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored. | |
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory. | |
+ man service | |
+ head -n 20 | |
service(8) System Manager's Manual service(8) | |
NAME | |
service - run a System V init script | |
SYNOPSIS | |
service SCRIPT COMMAND [OPTIONS] | |
service --status-all | |
service --help | -h | --version | |
DESCRIPTION | |
service runs a System V init script in as predictable environment as possible, removing most environment variables and with current working directory set to /. | |
The SCRIPT parameter specifies a System V init script, located in /etc/init.d/SCRIPT. The supported values of COMMAND depend on the invoked script, service passes COMMAND and OPTIONS it to the init script unmodified. All scripts should support at least the start and stop commands. As a special case, if COMMAND is --full-restart, the script is run twice, first with the stop command, then with the | |
+ man sestatus | |
+ head -n 20 | |
sestatus(8) SELinux command line documentation sestatus(8) | |
NAME | |
sestatus - SELinux status tool | |
SYNOPSIS | |
sestatus [-v] [-b] | |
This tool is used to get the status of a system running SELinux. | |
DESCRIPTION | |
This manual page describes the sestatus program. | |
This tool is used to get the status of a system running SELinux. It displays data about whether SELinux is enabled or disabled, location of key directories, and the loaded policy with its status as shown in the example: | |
> sestatus | |
SELinux status: enabled | |
+ man setarch | |
+ head -n 20 | |
SETARCH(8) System Administration SETARCH(8) | |
NAME | |
setarch - change reported architecture in new program environment and set personality flags | |
SYNOPSIS | |
setarch arch [options] [program [argument...]] | |
arch [options] [program [argument...]] | |
setarch --list|-h|-V | |
DESCRIPTION | |
setarch currently only affects the output of uname -m. For example, on an AMD64 system, running setarch i386 program will cause program to see i686 instead of x86_64 as the machine type. It also allows to set various personality options. The default program is /bin/sh. | |
OPTIONS | |
--list List the architectures that setarch knows about. Whether setarch can actually set each of these architectures depends on the running kernel. | |
+ man setenforce | |
+ head -n 20 | |
setenforce(8) SELinux Command Line documentation setenforce(8) | |
NAME | |
setenforce - modify the mode SELinux is running in | |
SYNOPSIS | |
setenforce [Enforcing|Permissive|1|0] | |
DESCRIPTION | |
Use Enforcing or 1 to put SELinux in enforcing mode. | |
Use Permissive or 0 to put SELinux in permissive mode. | |
If SELinux is disabled and you want to enable it, or SELinux is enabled and you want to disable it, please see selinux(8). | |
AUTHOR | |
Dan Walsh, <[email protected]> | |
SEE ALSO | |
+ man setfacl | |
+ head -n 20 | |
SETFACL(1) Access Control Lists SETFACL(1) | |
NAME | |
setfacl - set file access control lists | |
SYNOPSIS | |
setfacl [-bkndRLPvh] [{-m|-x} acl_spec] [{-M|-X} acl_file] file ... | |
setfacl --restore=file | |
DESCRIPTION | |
This utility sets Access Control Lists (ACLs) of files and directories. On the command line, a sequence of commands is followed by a sequence of files (which in turn can be followed by another sequence of commands, ...). | |
The options -m, and -x expect an ACL on the command line. Multiple ACL entries are separated by comma characters (`,'). The options -M, and -X read an ACL from a file or from standard input. The ACL entry format is described in Section ACL ENTRIES. | |
The --set and --set-file options set the ACL of a file or a directory. The previous ACL is replaced. ACL entries for this operation must include permissions. | |
+ man setfattr | |
+ head -n 20 | |
SETFATTR(1) File Utilities SETFATTR(1) | |
NAME | |
setfattr - set extended attributes of filesystem objects | |
SYNOPSIS | |
setfattr [-h] -n name [-v value] pathname... | |
setfattr [-h] -x name pathname... | |
setfattr [-h] --restore=file | |
DESCRIPTION | |
The setfattr command associates a new value with an extended attribute name for each specified file. | |
OPTIONS | |
-n name, --name=name | |
Specifies the name of the extended attribute to set. | |
-v value, --value=value | |
+ man setfiles | |
+ head -n 20 | |
setfiles(8) setfiles(8) | |
NAME | |
setfiles - set SELinux file security contexts. | |
SYNOPSIS | |
setfiles [-c policy] [-d] [-l] [-n] [-e directory] [-o filename] [-p] [-q] [-s] [-v] [-W] [-F] spec_file pathname... | |
DESCRIPTION | |
This manual page describes the setfiles program. | |
This program is primarily used to initialize the security context fields (extended attributes) on one or more filesystems (or parts of them). Usually it is initially run as part of the SELinux installation process (a step commonly known as labeling). | |
It can also be run at any other time to correct inconsistent labels, to add support for newly-installed policy or, by using the -n option, to passively check whether the file contexts are all set as specified by the active policy (default behavior) or by some other policy (see the -c option). | |
If a file object does not have a context, setfiles will write the default context to the file object's extended attributes. If a file object has a context, setfiles will only modify the type portion of the security context. The -F option will force a replacement of the entire context. | |
+ man setfont | |
+ head -n 20 | |
SETFONT(8) International Support SETFONT(8) | |
NAME | |
setfont - load EGA/VGA console screen font | |
SYNOPSIS | |
setfont [-O font+umap.orig] [-o font.orig] [-om cmap.orig] [-ou umap.orig] [-N] [font.new ...] [-m cmap] [-u umap] [-C console] [-hH] [-v] [-V] | |
DESCRIPTION | |
The setfont command reads a font from the file font.new and loads it into the EGA/VGA character generator, and optionally outputs the previous font. It can also load various mapping tables and output the previous versions. | |
If no args are given (or only the option -N for some number N), then a default (8xN) font is loaded (see below). One may give several small fonts, all containing a Unicode table, and setfont will combine them and load the union. Typical use: | |
setfont | |
Load a default font. | |
setfont drdos8x16 | |
Load a given font (here the 448-glyph drdos font). | |
+ man setkeycodes | |
+ head -n 20 | |
SETKEYCODES(8) Keyboard Support SETKEYCODES(8) | |
NAME | |
setkeycodes - load kernel scancode-to-keycode mapping table entries | |
SYNOPSIS | |
setkeycodes scancode keycode ... | |
DESCRIPTION | |
The setkeycodes command reads its arguments two at a time, each pair of arguments consisting of a scancode (given in hexadecimal) and a keycode (given in decimal). For each such pair, it tells the kernel keyboard driver to map the specified scancode to the specified keycode. | |
This command is useful only for people with slightly unusual keyboards, that have a few keys which produce scancodes that the kernel does not recognize. | |
THEORY | |
The usual PC keyboard produces a series of scancodes for each key press and key release. (Scancodes are shown by showkey -s, see showkey(1).) The kernel parses this stream of scancodes, and converts it to a stream of keycodes (key press/release events). (Keycodes are shown by showkey.) Apart from a few scancodes with special meaning, and apart from the sequence produced by the Pause key, and apart | |
from shiftstate related scancodes, and apart from the key up/down bit, the stream of scancodes consists of unescaped scancodes xx (7 bits) and escaped scancodes e0 xx (8+7 bits). To these scancodes or scancode pairs, a corresponding keycode can be assigned (in the range 1-127). For example, if you have a Macro key that produces e0 6f according to showkey(1), the command | |
setkeycodes e06f 112 | |
+ man setleds | |
+ head -n 20 | |
SETLEDS(1) General Commands Manual SETLEDS(1) | |
NAME | |
setleds - set the keyboard leds | |
SYNOPSIS | |
setleds [-v] [-L] [-D] [-F] [{+|-}num] [{+|-}caps] [{+|-}scroll] | |
DESCRIPTION | |
Setleds reports and changes the led flag settings of a VT (namely NumLock, CapsLock and ScrollLock). Without arguments, setleds prints the current settings. With arguments, it sets or clears the indicated flags (and leaves the others unchanged). The settings before and after the change are reported if the -v flag is given. | |
The led flag settings are specific for each VT (and the VT corresponding to stdin is used). | |
By default (or with option -F), setleds will only change the VT flags (and their setting may be reflected by the keyboard leds). | |
With option -D, setleds will change both the VT flags and their default settings (so that a subsequent reset will not undo the change). This might be useful for people who always want to have numlock set. | |
With option -L, setleds will not touch the VT flags, but only change the leds. From this moment on, the leds will no longer reflect the VT flags (but display whatever is put into them). The command setleds -L (without further arguments) will restore the situation in which the leds reflect the VT flags. | |
+ man setmetamode | |
+ head -n 20 | |
SETMETAMODE(1) General Commands Manual SETMETAMODE(1) | |
NAME | |
setmetamode - define the keyboard meta key handling | |
SYNOPSIS | |
setmetamode [ {meta|bit|metabit | esc|prefix|escprefix} ] | |
DESCRIPTION | |
Without argument, setmetamode prints the current Meta key mode. With argument, it sets the Meta key mode as indicated. The setting before and after the change are reported. | |
The Meta key mode is specific for each VT (and the VT corresponding to stdin is used). One might use setmetamode in /etc/rc to define the initial state of the Meta key mode, e.g. by | |
INITTY=/dev/tty[1-8] | |
for tty in $INITTY; do | |
setmetamode escprefix < $tty | |
done | |
OPTIONS | |
+ man setpci | |
+ head -n 20 | |
setpci(8) The PCI Utilities setpci(8) | |
NAME | |
setpci - configure PCI devices | |
SYNOPSIS | |
setpci [options] devices operations... | |
DESCRIPTION | |
setpci is a utility for querying and configuring PCI devices. | |
All numbers are entered in hexadecimal notation. | |
Root privileges are necessary for almost all operations, excluding reads of the standard header of the configuration space on some operating systems. Please see lspci(8) for details on access rights. | |
OPTIONS | |
+ man setpriv | |
+ head -n 20 | |
SETPRIV(1) User Commands SETPRIV(1) | |
NAME | |
setpriv - run a program with different Linux privilege settings | |
SYNOPSIS | |
setpriv [options] program [arguments] | |
DESCRIPTION | |
Sets or queries various Linux privilege settings that are inherited across execve(2). | |
The difference between the commands setpriv and su (or runuser) is that setpriv does not use open PAM session and does not ask for password. It's simple non-set-user-ID wrapper around execve system call. | |
OPTION | |
--clear-groups | |
Clear supplementary groups. | |
-d, --dump | |
+ man setquota | |
+ head -n 20 | |
SETQUOTA(8) System Manager's Manual SETQUOTA(8) | |
NAME | |
setquota - set disk quotas | |
SYNOPSIS | |
setquota [ -rm ] [ -u | -g ] [ -F quotaformat ] name block-softlimit block-hardlimit inode-softlimit inode-hardlimit -a | filesystem... | |
setquota [ -rm ] [ -u | -g ] [ -F quotaformat ] [ -p protoname ] name -a | filesystem... | |
setquota -b [ -rm ] [ -u | -g ] [ -F quotaformat ] -a | filesystem... | |
setquota -t [ -u | -g ] [ -F quotaformat ] block-grace inode-grace -a | filesystem... | |
setquota -T [ -u | -g ] [ -F quotaformat ] name block-grace inode-grace -a | filesystem... | |
DESCRIPTION | |
setquota is a command line quota editor. The filesystem, user/group name and new quotas for this filesystem can be specified on the command line. Note that if a number is given in the place of a user/group name it is treated as an UID/GID. | |
+ man setsebool | |
+ head -n 20 | |
setsebool(8) SELinux Command Line documentation setsebool(8) | |
NAME | |
setsebool - set SELinux boolean value | |
SYNOPSIS | |
setsebool [ -PNV ] boolean value | bool1=val1 bool2=val2 ... | |
DESCRIPTION | |
setsebool sets the current state of a particular SELinux boolean or a list of booleans to a given value. The value may be 1 or true or on to enable the boolean, or 0 or false or off to disable it. | |
Without the -P option, only the current boolean value is affected; the boot-time default settings are not changed. | |
If the -P option is given, all pending values are written to the policy file on disk. So they will be persistent across reboots. | |
If the -N option is given, the policy on disk is not reloaded into the kernel. | |
+ man setserial | |
+ head -n 20 | |
SETSERIAL(8) System Manager's Manual SETSERIAL(8) | |
NAME | |
setserial - get/set Linux serial port information | |
SYNOPSIS | |
setserial [ -abqvVWz ] device [ parameter1 [ arg ] ] ... | |
setserial -g [ -abGv ] device1 ... | |
DESCRIPTION | |
setserial is a program designed to set and/or report the configuration information associated with a serial port. This information includes what I/O port and IRQ a particular serial port is using, and whether or not the break key should be interpreted as the Secure Attention Key, and so on. | |
During the normal bootup process, only COM ports 1-4 are initialized, using the default I/O ports and IRQ values, as listed below. In order to initialize any additional serial ports, or to change the COM 1-4 ports to a nonstadard configuration, the setserial program should be used. Typically it is called from an rc.serial script, which is usually run out of /etc/rc.local. | |
The device argument or arguments specifies the serial device which should be configured or interrogated. It will usually have the following form: /dev/cua[0-3]. | |
If no parameters are specified, setserial will print out the port type (i.e., 8250, 16450, 16550, 16550A, etc.), the hardware I/O port, the hardware IRQ line, its "baud base," and some of its operational flags. | |
+ man setsid | |
+ head -n 20 | |
SETSID(1) User Commands SETSID(1) | |
NAME | |
setsid - run a program in a new session | |
SYNOPSIS | |
setsid [options] program [arguments] | |
DESCRIPTION | |
setsid runs a program in a new session. | |
OPTIONS | |
-c, --ctty | |
Set the controlling terminal to the current one. | |
-w, --wait | |
Wait for the execution of the program to end, and return the exit value of this program as the return value of setsid. | |
+ man setterm | |
+ head -n 20 | |
SETTERM(1) User Commands SETTERM(1) | |
NAME | |
setterm - set terminal attributes | |
SYNOPSIS | |
setterm [options] | |
DESCRIPTION | |
setterm writes to standard output a character string that will invoke the specified terminal capabilities. Where possible terminfo is consulted to find the string to use. Some options however (marked "virtual consoles only" below) do not correspond to a terminfo(5) capability. In this case, if the terminal type is "con" or "linux" the string that invokes the specified capabilities on the PC Minix | |
virtual console driver is output. Options that are not implemented by the terminal are ignored. | |
OPTIONS | |
For boolean options (on or off), the default is on. | |
Below, an 8-color can be black, red, green, yellow, blue, magenta, cyan, or white. | |
A 16-color can be an 8-color, or grey, or bright followed by red, green, yellow, blue, magenta, cyan, or white. | |
+ man setup | |
+ head -n 20 | |
setup(1) setuptool setup(1) | |
NAME | |
setup - A text mode system configuration tool | |
SYNOPSIS | |
setup | |
DESCRIPTION | |
The setuptool program (setup) is a front-end menu program for a group of other tools, mostly system-config-*-tui tools. The list of options which it presents is assembled by scanning /etc/setuptool.d and /usr/share/setuptool/setuptool.d for files. | |
Each file in the directory should contain one or more lines of text. Each line contains from one to four fields which are separated by "|" characters. In order, they are: | |
- the path to the binary to invoke (mandatory) | |
- the untranslated name of the application which should be displayed | |
(If unset, defaults to the path of the binary, but don't depend on that.) | |
- the gettext textdomain in which a translation of the name of the application can be found | |
(If unset, defaults to "setup".) | |
- the directory in which translations for the textdomain can be found | |
+ man setvtrgb | |
+ head -n 20 | |
SETVTRGB(8) System Manager's Manual SETVTRGB(8) | |
NAME | |
setvtrgb - set the virtual terminal RGB colors | |
SYNOPSIS | |
setvtrgb -h|-V|vga|FILE|- | |
DESCRIPTION | |
The setvtrgb command takes a single argument, either the string vga , or a path to a file containing the red, green, and blue colors to be used by the Linux virtual terminals. | |
If you use the FILE parameter, FILE should be exactly 3 lines of 16 comma-separated decimal values for RED, GREEN, and BLUE. | |
To seed a valid FILE : | |
cat /sys/module/vt/parameters/default_{red,grn,blu} > FILE | |
And then edit the values in FILE | |
+ man sexp-conv | |
+ head -n 20 | |
No manual entry for sexp-conv | |
+ man sfdisk | |
+ head -n 20 | |
SFDISK(8) System Administration SFDISK(8) | |
NAME | |
sfdisk - display or manipulate a disk partition table | |
SYNOPSIS | |
sfdisk [options] device [-N partition-number] | |
sfdisk [options] command | |
DESCRIPTION | |
sfdisk is a script-oriented tool for partitioning any block device. | |
Since version 2.26 sfdisk supports MBR (DOS), GPT, SUN and SGI disk labels, but no longer provides any functionality for CHS (Cylinder-Head-Sector) addressing. CHS has never been important for Linux, and this addressing concept does not make any sense for new devices. | |
sfdisk (since version 2.26) aligns the start and end of partitions to block-device I/O limits when relative sizes are specified, when the default values are used or when multiplicative suffixes (e.g MiB) are used for sizes. It is possible that partition size will be optimized (reduced or enlarged) due to alignment if the start offset is specified exactly in sectors and partition size relative or by | |
multiplicative suffixes. | |
+ man sftp | |
+ head -n 20 | |
SFTP(1) BSD General Commands Manual SFTP(1) | |
NAME | |
sftp — secure file transfer program | |
SYNOPSIS | |
sftp [-1246aCfpqrv] [-B buffer_size] [-b batchfile] [-c cipher] [-D sftp_server_path] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-R num_requests] [-S program] [-s subsystem | sftp_server] host | |
sftp [user@]host[:file ...] | |
sftp [user@]host[:dir[/]] | |
sftp -b batchfile [user@]host | |
DESCRIPTION | |
sftp is an interactive file transfer program, similar to ftp(1), which performs all operations over an encrypted ssh(1) transport. It may also use many features of ssh, such as public key authentication and compression. sftp connects and logs into the specified host, then enters an interactive command mode. | |
The second usage format will retrieve files automatically if a non-interactive authentication method is used; otherwise it will do so after successful interactive authentication. | |
The third usage format allows sftp to start in a remote directory. | |
The final usage format allows for automated sessions using the -b option. In such cases, it is necessary to configure non-interactive authentication to obviate the need to enter a password at connection time (see sshd(8) and ssh-keygen(1) for details). | |
+ man sg | |
+ head -n 20 | |
SG(1) User Commands SG(1) | |
NAME | |
sg - execute command as different group ID | |
SYNOPSIS | |
sg [-] [group [-c ] command] | |
DESCRIPTION | |
The sg command works similar to newgrp but accepts a command. The command will be executed with the /bin/sh shell. With most shells you may run sg from, you need to enclose multi-word commands in quotes. Another difference between newgrp and sg is that some shells treat newgrp specially, replacing themselves with a new instance of a shell that newgrp creates. This doesn't happen with sg, so upon exit | |
from a sg command you are returned to your previous group ID. | |
CONFIGURATION | |
The following configuration variables in /etc/login.defs change the behavior of this tool: | |
SYSLOG_SG_ENAB (boolean) | |
Enable "syslog" logging of sg activity. | |
+ man sgdisk | |
+ head -n 20 | |
SGDISK(8) GPT fdisk Manual SGDISK(8) | |
NAME | |
sgdisk - Command-line GUID partition table (GPT) manipulator for Linux and Unix | |
SYNOPSIS | |
sgdisk [ options ] device | |
DESCRIPTION | |
GPT fdisk is a text-mode menu-driven package for creation and manipulation of partition tables. It consists of two programs: the text-mode interactive gdisk and the command-line sgdisk. Either program will automatically convert an old-style Master Boot Record (MBR) partition table or BSD disklabel stored without an MBR carrier partition to the newer Globally Unique Identifier (GUID) Partition Table | |
(GPT) format, or will load a GUID partition table. This man page documents the command-line sgdisk program. | |
Some advanced data manipulation and recovery options require you to understand the distinctions between the main and backup data, as well as between the GPT headers and the partition tables. For information on MBR vs. GPT, as well as GPT terminology and structure, see the extended gdisk documentation at http://www.rodsbooks.com/gdisk/ or consult Wikipedia. | |
The sgdisk program employs a user interface that's based entirely on the command line, making it suitable for use in scripts or by experts who want to make one or two quick changes to a disk. (The program may query the user when certain errors are encountered, though.) The program's name is based on sfdisk, but the user options of the two programs are entirely different from one another. | |
Ordinarily, sgdisk operates on disk device files, such as /dev/sda or /dev/hda under Linux, /dev/disk0 under Mac OS X, or /dev/ad0 or /dev/da0 under FreeBSD. The program can also operate on disk image files, which can be either copies of whole disks (made with dd, for instance) or raw disk images used by emulators such as QEMU or VMWare. Note that only raw disk images are supported; sgdisk cannot work | |
+ man sgpio | |
+ head -n 20 | |
sgpio(1) USER COMMANDS sgpio(1) | |
NAME | |
sgpio - captive backplane LED control utility | |
SYNOPSIS | |
sgpio [-h] [-V] [[-d|--disk <device>[,<device>...]] | [-p|--port <port>[,<port>...]]] [-s|--status <status>] [-f|--freq <frequency>] | |
DESCRIPTION | |
Serial General Purpose Input Output (SGPIO) is a communication method used between a main board and a variety of internal and external hard disk drive bay enclosures. This utility can be used to control LEDs in an enclosure. For more information about SGPIO, please consult the SFF-8485 Specification. | |
OPTIONS | |
-h, --help | |
displays a short help text | |
-V, --version | |
displays the utility and AHCI SGPIO specification | |
+ man show-changed-rco | |
+ head -n 20 | |
show-installed(1) show-installed(1) | |
NAME | |
show-changed-rco - show changes in an RPM package | |
SYNOPSIS | |
show-changed-rco [options] | |
DESCRIPTION | |
show-changed-rco gives a compact description of the changes to a packages Requires, Conflicts and Obsoletes data from the installed (or old) to a specified rpm file. | |
OPTIONS | |
-h, --help | |
show this help message and exit | |
-C, --cache | |
Tells repoquery to run entirely from YUM cache - does not download any metadata or update the cache. Queries in this mode can fail or give partial/incorrect results if the cache isn't fully populated beforehand with eg "yum makecache". | |
+ man show-installed | |
+ head -n 20 | |
show-installed(1) show-installed(1) | |
NAME | |
show-installed - show installed RPM packages and descriptions | |
SYNOPSIS | |
show-installed [options] | |
DESCRIPTION | |
show-installed gives a compact description of the packages installed (or given) making use of the comps groups found in the repositories. | |
OPTIONS | |
-h, --help | |
show this help message and exit | |
-f FORMAT, --format=FORMAT | |
yum, kickstart or human; yum gives the result as a yum command line; kickstart the content of a %packages section; "human" readable is default. | |
+ man showconsolefont | |
+ head -n 20 | |
SHOWCONSOLEFONT(8) Linux Console SHOWCONSOLEFONT(8) | |
NAME | |
showconsolefont - Show the current EGA/VGA console screen font | |
SYNOPSIS | |
showconsolefont [ -V | --version ] [ -v ] [ -i ] [ -C console ] | |
DESCRIPTION | |
The showconsolefont command outputs the current console font to stdout. The option -v prints additional information, while the option -V prints the program version number. The option -i doesn't print out the font table, just shows ROWSxCOLSxCOUNT and exits. On Linux 2.6.1 and later, the option -C allows one to indicate the console involved. Its argument is a pathname. | |
SEE ALSO | |
setfont(8) | |
+ man showkey | |
+ head -n 20 | |
SHOWKEY(1) General Commands Manual SHOWKEY(1) | |
NAME | |
showkey - examine the codes sent by the keyboard | |
SYNOPSIS | |
showkey [-h|--help] [-a|--ascii] [-s|--scancodes] [-k|--keycodes] [-V|--version] | |
DESCRIPTION | |
showkey prints to standard output either the scan codes or the keycode or the `ascii' code of each key pressed. In the first two modes the program runs until 10 seconds have elapsed since the last key press or release event, or until it receives a suitable signal, like SIGTERM, from another process. In `ascii' mode the program terminates when the user types ^D. | |
When in scancode dump mode, showkey prints in hexadecimal format each byte received from the keyboard to the standard output. A new line is printed when an interval of about 0.1 seconds occurs between the bytes received, or when the internal receive buffer fills up. This can be used to determine roughly, what byte sequences the keyboard sends at once on a given key press. The scan code dumping mode is | |
primarily intended for debugging the keyboard driver or other low level interfaces. As such it shouldn't be of much interest to the regular end-user. However, some modern keyboards have keys or buttons that produce scancodes to which the kernel does not associate a keycode, and, after finding out what these are, the user can assign keycodes with setkeycodes(8). | |
When in the default keycode dump mode, showkey prints to the standard output the keycode number or each key pressed or released. The kind of the event, press or release, is also reported. Keycodes are numbers assigned by the kernel to each individual physical key. Every key has always only one associated keycode number, whether the keyboard sends single or multiple scan codes when pressing it. Using | |
showkey in this mode, you can find out what numbers to use in your personalized keymap files. | |
When in `ascii' dump mode, showkey prints to the standard output the decimal, octal, and hexadecimal value(s) of the key pressed, according to he present keymap. | |
+ man showmount | |
+ head -n 20 | |
SHOWMOUNT(8) System Manager's Manual SHOWMOUNT(8) | |
NAME | |
showmount - show mount information for an NFS server | |
SYNOPSIS | |
showmount [ -adehv ] [ --all ] [ --directories ] [ --exports ] [ --help ] [ --version ] [ host ] | |
DESCRIPTION | |
showmount queries the mount daemon on a remote host for information about the state of the NFS server on that machine. With no options showmount lists the set of clients who are mounting from that host. The output from showmount is designed to appear as though it were processed through ``sort -u''. | |
OPTIONS | |
-a or --all | |
List both the client hostname or IP address and mounted directory in host:dir format. This info should not be considered reliable. See the notes on rmtab in rpc.mountd(8). | |
-d or --directories | |
List only the directories mounted by some client. | |
+ man shutdown | |
+ head -n 20 | |
SHUTDOWN(8) shutdown SHUTDOWN(8) | |
NAME | |
shutdown - Halt, power-off or reboot the machine | |
SYNOPSIS | |
shutdown [OPTIONS...] [TIME] [WALL...] | |
DESCRIPTION | |
shutdown may be used to halt, power-off or reboot the machine. | |
The first argument may be a time string (which is usually "now"). Optionally, this may be followed by a wall message to be sent to all logged-in users before going down. | |
The time string may either be in the format "hh:mm" for hour/minutes specifying the time to execute the shutdown at, specified in 24h clock format. Alternatively it may be in the syntax "+m" referring to the specified number of minutes m from now. "now" is an alias for "+0", i.e. for triggering an immediate shutdown. If no time argument is specified, "+1" is implied. | |
Note that to specify a wall message you must specify a time argument, too. | |
If the time argument is used, 5 minutes before the system goes down the /run/nologin file is created to ensure that further logins shall not be allowed. | |
+ man sim_lsmplugin | |
+ head -n 20 | |
sim_lsmplugin(1) libStorageMgmt sim_lsmplugin(1) | |
NAME | |
sim_lsmplugin -- LibStorageMgmt simulator python plugin | |
DESCRIPTION | |
LibstorageMgmt simulator plugin is for development or test use only. The plugin simulates an array which supports most features of the library. State is stored in a file, default is '/tmp/lsm_sim_data'. The 'sim_lsmplugin' executable file is for libStorageMgmt daemon to execute when client user specifies sim plugin in the URI. | |
This plugin is written in pure Python and is intended to be an example of a python plugin for the library. | |
URI | |
To use this plugin, users should set their URI to this format: | |
# All that is required | |
sim:// | |
+ man simc_lsmplugin | |
+ head -n 20 | |
simc_lsmplugin(1) libStorageMgmt simc_lsmplugin(1) | |
NAME | |
simc_lsmplugin -- LibstorageMgmt Simulator C Plugin | |
DESCRIPTION | |
LibStorageMgmt simulator C plugin is for development use. The plugin simulates an array which supports most features of the library. The simulator is memory based, state will be discarded once the plugin exits. The 'simc_lsmplugin' executable file is for the libStorageMgmt daemon to execute when client user specifies simc plugin in the URI. | |
Since every command of lsmcli is a standalone libStorageMgmt session, this plugin is essentially useless for this purpose. In this use case, the libStorageMgmt simulator plugin sim_lsmplugin(1) is suggested. | |
This plugin is written in pure C and is intended to be an example of a C plugin for the library. | |
URI | |
To use this plugin, users should set their URI to this format: | |
simc:// | |
+ man size | |
+ head -n 20 | |
SIZE(1) GNU Development Tools SIZE(1) | |
NAME | |
size - list section sizes and total size. | |
SYNOPSIS | |
size [-A|-B|--format=compatibility] | |
[--help] | |
[-d|-o|-x|--radix=number] | |
[--common] | |
[-t|--totals] | |
[--target=bfdname] [-V|--version] | |
[objfile...] | |
DESCRIPTION | |
The GNU size utility lists the section sizes---and the total size---for each of the object or archive files objfile in its argument list. By default, one line of output is generated for each object file or each module in an archive. | |
objfile... are the object files to be examined. If none are specified, the file "a.out" will be used. | |
+ man skill | |
+ head -n 20 | |
SKILL(1) User Commands SKILL(1) | |
NAME | |
skill, snice - send a signal or report process status | |
SYNOPSIS | |
skill [signal] [options] expression | |
snice [new priority] [options] expression | |
DESCRIPTION | |
These tools are obsolete and unportable. The command syntax is poorly defined. Consider using the killall, pkill, and pgrep commands instead. | |
The default signal for skill is TERM. Use -l or -L to list available signals. Particularly useful signals include HUP, INT, KILL, STOP, CONT, and 0. Alternate signals may be specified in three ways: -9 -SIGKILL -KILL. | |
The default priority for snice is +4. Priority numbers range from +20 (slowest) to -20 (fastest). Negative priority numbers are restricted to administrative users. | |
OPTIONS | |
-f, --fast | |
+ man slabtop | |
+ head -n 20 | |
SLABTOP(1) User Commands SLABTOP(1) | |
NAME | |
slabtop - display kernel slab cache information in real time | |
SYNOPSIS | |
slabtop [options] | |
DESCRIPTION | |
slabtop displays detailed kernel slab cache information in real time. It displays a listing of the top caches sorted by one of the listed sort criteria. It also displays a statistics header filled with slab layer information. | |
OPTIONS | |
Normal invocation of slabtop does not require any options. The behavior, however, can be fine-tuned by specifying one or more of the following flags: | |
-d, --delay=N | |
Refresh the display every n in seconds. By default, slabtop refreshes the display every three seconds. To exit the program, hit q. | |
-s, --sort=S | |
+ man slattach | |
+ head -n 20 | |
SLATTACH(8) Linux System Administrator's Manual SLATTACH(8) | |
NAME | |
slattach - attach a network interface to a serial line | |
SYNOPSIS | |
slattach [-dehlLmnqv] [-c command] [-p proto] [-s speed] [tty] | |
DESCRIPTION | |
Slattach is a tiny little program that can be used to put a normal terminal ("serial") line into one of several "network" modes, thus allowing you to use it for point-to-point links to other computers. | |
OPTIONS | |
tty Path to a serial device like /dev/ttyS*, /dev/cua* or /dev/ptmx to spawn a new pseudo tty. | |
[-c command] | |
Execute command when the line is hung up. This can be used to run scripts or re-establish connections when a link goes down. | |
[-d] Enable debugging output. Useful when determining why a given setup doesn't work. | |
+ man slogin | |
+ head -n 20 | |
SSH(1) BSD General Commands Manual SSH(1) | |
NAME | |
ssh — OpenSSH SSH client (remote login program) | |
SYNOPSIS | |
ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-J [user@]host[:port]] [-L address] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] [user@]hostname [command] | |
DESCRIPTION | |
ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections, arbitrary TCP ports and UNIX-domain sockets can also be forwarded over the secure channel. | |
ssh connects and logs into the specified hostname (with optional user name). The user must prove his/her identity to the remote machine using one of several methods (see below). | |
If command is specified, it is executed on the remote host instead of a login shell. | |
The options are as follows: | |
-1 Forces ssh to try protocol version 1 only. | |
-2 Forces ssh to try protocol version 2 only. | |
+ man sm-notify | |
+ head -n 20 | |
SM-NOTIFY(8) System Manager's Manual SM-NOTIFY(8) | |
NAME | |
sm-notify - send reboot notifications to NFS peers | |
SYNOPSIS | |
/usr/sbin/sm-notify [-dfn] [-m minutes] [-v name] [-p notify-port] [-P path] | |
DESCRIPTION | |
File locks are not part of persistent file system state. Lock state is thus lost when a host reboots. | |
Network file systems must also detect when lock state is lost because a remote host has rebooted. After an NFS client reboots, an NFS server must release all file locks held by applications that were running on that client. After a server reboots, a client must remind the server of file locks held by applications running on that client. | |
For NFS version 2 and version 3, the Network Status Monitor protocol (or NSM for short) is used to notify NFS peers of reboots. On Linux, two separate user-space components constitute the NSM service: | |
sm-notify | |
A helper program that notifies NFS peers after the local system reboots | |
+ man smtp-sink | |
+ head -n 20 | |
SMTP-SINK(1) General Commands Manual SMTP-SINK(1) | |
NAME | |
smtp-sink - multi-threaded SMTP/LMTP test server | |
SYNOPSIS | |
smtp-sink [options] [inet:][host]:port backlog | |
smtp-sink [options] unix:pathname backlog | |
DESCRIPTION | |
smtp-sink listens on the named host (or address) and port. It takes SMTP messages from the network and throws them away. The purpose is to measure client performance, not protocol compliance. | |
smtp-sink may also be configured to capture each mail delivery transaction to file. Since disk latencies are large compared to network delays, this mode of operation can reduce the maximal performance by several orders of magnitude. | |
Connections can be accepted on IPv4 or IPv6 endpoints, or on UNIX-domain sockets. IPv4 and IPv6 are the default. This program is the complement of the smtp-source(1) program. | |
Note: this is an unsupported test program. No attempt is made to maintain compatibility between successive versions. | |
+ man smtp-source | |
+ head -n 20 | |
SMTP-SOURCE(1) General Commands Manual SMTP-SOURCE(1) | |
NAME | |
smtp-source - multi-threaded SMTP/LMTP test generator | |
SYNOPSIS | |
smtp-source [options] [inet:]host[:port] | |
smtp-source [options] unix:pathname | |
DESCRIPTION | |
smtp-source connects to the named host and TCP port (default: port 25) and sends one or more messages to it, either sequentially or in parallel. The program speaks either SMTP (default) or LMTP. Connections can be made to UNIX-domain and IPv4 or IPv6 servers. IPv4 and IPv6 are the default. | |
Note: this is an unsupported test program. No attempt is made to maintain compatibility between successive versions. | |
Arguments: | |
-4 Connect to the server with IPv4. This option has no effect when Postfix is built without IPv6 support. | |
+ man snice | |
+ head -n 20 | |
SKILL(1) User Commands SKILL(1) | |
NAME | |
skill, snice - send a signal or report process status | |
SYNOPSIS | |
skill [signal] [options] expression | |
snice [new priority] [options] expression | |
DESCRIPTION | |
These tools are obsolete and unportable. The command syntax is poorly defined. Consider using the killall, pkill, and pgrep commands instead. | |
The default signal for skill is TERM. Use -l or -L to list available signals. Particularly useful signals include HUP, INT, KILL, STOP, CONT, and 0. Alternate signals may be specified in three ways: -9 -SIGKILL -KILL. | |
The default priority for snice is +4. Priority numbers range from +20 (slowest) to -20 (fastest). Negative priority numbers are restricted to administrative users. | |
OPTIONS | |
-f, --fast | |
+ man splain | |
+ head -n 20 | |
SPLAIN(1) Perl Programmers Reference Guide SPLAIN(1) | |
NAME | |
diagnostics, splain - produce verbose warning diagnostics | |
SYNOPSIS | |
Using the "diagnostics" pragma: | |
use diagnostics; | |
use diagnostics -verbose; | |
enable diagnostics; | |
disable diagnostics; | |
Using the "splain" standalone filter program: | |
perl program 2>diag.out | |
splain [-v] [-p] diag.out | |
+ man ss | |
+ head -n 20 | |
SS(8) System Manager's Manual SS(8) | |
NAME | |
ss - another utility to investigate sockets | |
SYNOPSIS | |
ss [options] [ FILTER ] | |
DESCRIPTION | |
ss is used to dump socket statistics. It allows showing information similar to netstat. It can display more TCP and state informations than other tools. | |
OPTIONS | |
When no option is used ss displays a list of open non-listening sockets (e.g. TCP/UNIX/UDP) that have established connection. | |
-h, --help | |
Show summary of options. | |
+ man ssh | |
+ head -n 20 | |
SSH(1) BSD General Commands Manual SSH(1) | |
NAME | |
ssh — OpenSSH SSH client (remote login program) | |
SYNOPSIS | |
ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-J [user@]host[:port]] [-L address] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] [user@]hostname [command] | |
DESCRIPTION | |
ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections, arbitrary TCP ports and UNIX-domain sockets can also be forwarded over the secure channel. | |
ssh connects and logs into the specified hostname (with optional user name). The user must prove his/her identity to the remote machine using one of several methods (see below). | |
If command is specified, it is executed on the remote host instead of a login shell. | |
The options are as follows: | |
-1 Forces ssh to try protocol version 1 only. | |
-2 Forces ssh to try protocol version 2 only. | |
+ man ssh-add | |
+ head -n 20 | |
SSH-ADD(1) BSD General Commands Manual SSH-ADD(1) | |
NAME | |
ssh-add — adds private key identities to the authentication agent | |
SYNOPSIS | |
ssh-add [-cDdkLlXx] [-E fingerprint_hash] [-t life] [file ...] | |
ssh-add -s pkcs11 | |
ssh-add -e pkcs11 | |
DESCRIPTION | |
ssh-add adds private key identities to the authentication agent, ssh-agent(1). When run without arguments, it adds the files ~/.ssh/id_rsa, ~/.ssh/id_dsa, ~/.ssh/id_ecdsa, ~/.ssh/id_ed25519 and ~/.ssh/identity. After loading a private key, ssh-add will try to load corresponding certificate information from the filename obtained by appending -cert.pub to the name of the private key file. Alternative | |
file names can be given on the command line. | |
If any file requires a passphrase, ssh-add asks for the passphrase from the user. The passphrase is read from the user's tty. ssh-add retries the last passphrase if multiple identity files are given. | |
The authentication agent must be running and the SSH_AUTH_SOCK environment variable must contain the name of its socket for ssh-add to work. | |
The options are as follows: | |
+ man ssh-agent | |
+ head -n 20 | |
SSH-AGENT(1) BSD General Commands Manual SSH-AGENT(1) | |
NAME | |
ssh-agent — authentication agent | |
SYNOPSIS | |
ssh-agent [-c | -s] [-Dd] [-a bind_address] [-E fingerprint_hash] [-P pkcs11_whitelist] [-t life] [command [arg ...]] | |
ssh-agent [-c | -s] -k | |
DESCRIPTION | |
ssh-agent is a program to hold private keys used for public key authentication (RSA, DSA, ECDSA, Ed25519). ssh-agent is usually started in the beginning of an X-session or a login session, and all other windows or programs are started as clients to the ssh-agent program. Through use of environment variables the agent can be located and automatically used for authentication when logging in to other | |
machines using ssh(1). | |
The agent initially does not have any private keys. Keys are added using ssh(1) (see AddKeysToAgent in ssh_config(5) for details) or ssh-add(1). Multiple identities may be stored in ssh-agent concurrently and ssh(1) will automatically use them if present. ssh-add(1) is also used to remove keys from ssh-agent and to query the keys that are held in one. | |
The options are as follows: | |
-a bind_address | |
Bind the agent to the UNIX-domain socket bind_address. The default is $TMPDIR/ssh-XXXXXXXXXX/agent.<ppid>. | |
+ man ssh-copy-id | |
+ head -n 20 | |
SSH-COPY-ID(1) BSD General Commands Manual SSH-COPY-ID(1) | |
NAME | |
ssh-copy-id — use locally available keys to authorise logins on a remote machine | |
SYNOPSIS | |
ssh-copy-id [-f] [-n] [-i [identity_file]] [-p port] [-o ssh_option] [user@]hostname | |
ssh-copy-id -h | -? | |
DESCRIPTION | |
ssh-copy-id is a script that uses ssh(1) to log into a remote machine (presumably using a login password, so password authentication should be enabled, unless you've done some clever use of multiple identities). It assembles a list of one or more fingerprints (as described below) and tries to log in with each key, to see if any of them are already installed (of course, if you are not using ssh-agent(1) | |
this may result in you being repeatedly prompted for pass-phrases). It then assembles a list of those that failed to log in, and using ssh, enables logins with those keys on the remote server. By default it adds the keys by appending them to the remote user's ~/.ssh/authorized_keys (creating the file, and directory, if necessary). It is also capable of detecting if the remote system is a NetScreen, | |
and using its ‘set ssh pka-dsa key ...’ command instead. | |
The options are as follows: | |
-i identity_file | |
Use only the key(s) contained in identity_file (rather than looking for identities via ssh-add(1) or in the default_ID_file). If the filename does not end in .pub this is added. If the filename is omitted, the default_ID_file is used. | |
Note that this can be used to ensure that the keys copied have the comment one prefers and/or extra options applied, by ensuring that the key file has these set as preferred before the copy is attempted. | |
+ man ssh-keygen | |
+ head -n 20 | |
SSH-KEYGEN(1) BSD General Commands Manual SSH-KEYGEN(1) | |
NAME | |
ssh-keygen — authentication key generation, management and conversion | |
SYNOPSIS | |
ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1] [-N new_passphrase] [-C comment] [-f output_keyfile] | |
ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile] | |
ssh-keygen -i [-m key_format] [-f input_keyfile] | |
ssh-keygen -e [-m key_format] [-f input_keyfile] | |
ssh-keygen -y [-f input_keyfile] | |
ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] | |
ssh-keygen -l [-v] [-E fingerprint_hash] [-f input_keyfile] | |
ssh-keygen -B [-f input_keyfile] | |
ssh-keygen -D pkcs11 | |
ssh-keygen -F hostname [-f known_hosts_file] [-l] | |
ssh-keygen -H [-f known_hosts_file] | |
ssh-keygen -R hostname [-f known_hosts_file] | |
ssh-keygen -r hostname [-f input_keyfile] [-g] | |
ssh-keygen -G output_file [-v] [-b bits] [-M memory] [-S start_point] | |
+ man ssh-keyscan | |
+ head -n 20 | |
SSH-KEYSCAN(1) BSD General Commands Manual SSH-KEYSCAN(1) | |
NAME | |
ssh-keyscan — gather ssh public keys | |
SYNOPSIS | |
ssh-keyscan [-46cHv] [-f file] [-p port] [-T timeout] [-t type] [host | addrlist namelist] ... | |
DESCRIPTION | |
ssh-keyscan is a utility for gathering the public ssh host keys of a number of hosts. It was designed to aid in building and verifying ssh_known_hosts files. ssh-keyscan provides a minimal interface suitable for use by shell and perl scripts. | |
ssh-keyscan uses non-blocking socket I/O to contact as many hosts as possible in parallel, so it is very efficient. The keys from a domain of 1,000 hosts can be collected in tens of seconds, even when some of those hosts are down or do not run ssh. For scanning, one does not need login access to the machines that are being scanned, nor does the scanning process involve any encryption. | |
The options are as follows: | |
-4 Forces ssh-keyscan to use IPv4 addresses only. | |
-6 Forces ssh-keyscan to use IPv6 addresses only. | |
-c Request certificates from target hosts instead of plain keys. | |
+ man sshd | |
+ head -n 20 | |
SSHD(8) BSD System Manager's Manual SSHD(8) | |
NAME | |
sshd — OpenSSH SSH daemon | |
SYNOPSIS | |
sshd [-46DdeiqTt] [-C connection_spec] [-c host_certificate_file] [-E log_file] [-f config_file] [-g login_grace_time] [-h host_key_file] [-o option] [-p port] [-u len] | |
DESCRIPTION | |
sshd (OpenSSH Daemon) is the daemon program for ssh(1). Together these programs replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. | |
sshd listens for connections from clients. It is normally started at boot from /etc/rc. It forks a new daemon for each incoming connection. The forked daemons handle key exchange, encryption, authentication, command execution, and data exchange. | |
sshd can be configured using command-line options or a configuration file (by default sshd_config(5)); command-line options override values specified in the configuration file. sshd rereads its configuration file when it receives a hangup signal, SIGHUP, by executing itself with the name and options it was started with, e.g. /usr/sbin/sshd. | |
The options are as follows: | |
-4 Forces sshd to use IPv4 addresses only. | |
-6 Forces sshd to use IPv6 addresses only. | |
+ man sshd-keygen | |
+ head -n 20 | |
No manual entry for sshd-keygen | |
+ man ssm-agent-worker | |
+ head -n 20 | |
No manual entry for ssm-agent-worker | |
+ man ssm-cli | |
+ head -n 20 | |
No manual entry for ssm-cli | |
+ man ssm-document-worker | |
+ head -n 20 | |
No manual entry for ssm-document-worker | |
+ man ssm-session-logger | |
+ head -n 20 | |
No manual entry for ssm-session-logger | |
+ man ssm-session-worker | |
+ head -n 20 | |
No manual entry for ssm-session-worker | |
+ man stap-merge | |
+ head -n 20 | |
No manual entry for stap-merge | |
+ man stap-report | |
+ head -n 20 | |
STAP-REPORT(1) General Commands Manual STAP-REPORT(1) | |
NAME | |
stap-report - collect system information that is useful for debugging systemtap bugs | |
SYNOPSIS | |
stap-report | |
DESCRIPTION | |
The stap-report executable collects system information that is useful for debugging systemtap bugs. It is a good idea to include such a report in bug reports especially if you send them directly to the upstream. stap-report can be run either as a normal user or as root. The report will be more complete if stap-report is run as root. | |
EXAMPLES | |
$ stap-report > report.txt | |
$ head report.txt | |
+ man stapbpf | |
+ head -n 20 | |
STAPBPF(8) System Manager's Manual STAPBPF(8) | |
NAME | |
stapbpf - systemtap bpf runtime | |
SYNOPSIS | |
stapbpf [ OPTIONS ] MODULE | |
DESCRIPTION | |
The stapbpf program is the BPF back-end of the Systemtap tool. It expects a bpf-elf file produced by the front-end stap tool, when run with --runtime=bpf. | |
Splitting the systemtap tool into a front-end and a back-end allows a user to compile a systemtap script on a development machine that has the debugging information needed to compile the script and then transfer the resulting shared object to a production machine that doesn't have any development tools or debugging information installed. | |
+ man stapsh | |
+ head -n 20 | |
STAPSH(8) System Manager's Manual STAPSH(8) | |
NAME | |
stapsh | |
SYNOPSIS | |
stapsh | |
DESCRIPTION | |
The stapsh executable is used by the stap --remote functionality, as a wrapper shell on the remote machines. It is not intended to be run directly by users. | |
SEE ALSO | |
stap(1) | |
+ man start-statd | |
+ head -n 20 | |
No manual entry for start-statd | |
+ man strace | |
+ head -n 20 | |
STRACE(1) General Commands Manual STRACE(1) | |
NAME | |
strace - trace system calls and signals | |
SYNOPSIS | |
strace [-ACdffhikqrtttTvVxxy] [-I n] [-b execve] [-e expr]... [-a column] [-o file] [-s strsize] [-X format] [-P path]... [-p pid]... { -p pid | [-D] [-E var[=val]]... [-u username] command [args] } | |
strace -c [-df] [-I n] [-b execve] [-e expr]... [-O overhead] [-S sortby] [-P path]... [-p pid]... { -p pid | [-D] [-E var[=val]]... [-u username] command [args] } | |
DESCRIPTION | |
In the simplest case strace runs the specified command until it exits. It intercepts and records the system calls which are called by a process and the signals which are received by a process. The name of each system call, its arguments and its return value are printed on standard error or to the file specified with the -o option. | |
strace is a useful diagnostic, instructional, and debugging tool. System administrators, diagnosticians and trouble-shooters will find it invaluable for solving problems with programs for which the source is not readily available since they do not need to be recompiled in order to trace them. Students, hackers and the overly-curious will find that a great deal can be learned about a system and its | |
system calls by tracing even ordinary programs. And programmers will find that since system calls and signals are events that happen at the user/kernel interface, a close examination of this boundary is very useful for bug isolation, sanity checking and attempting to capture race conditions. | |
Each line in the trace contains the system call name, followed by its arguments in parentheses and its return value. An example from stracing the command "cat /dev/null" is: | |
+ man strace-log-merge | |
+ head -n 20 | |
STRACE-LOG-MERGE(1) General Commands Manual STRACE-LOG-MERGE(1) | |
NAME | |
strace-log-merge - merge strace -ff -tt output | |
SYNOPSIS | |
strace-log-merge STRACE_LOG | |
strace-log-merge --help | |
DESCRIPTION | |
strace-log-merge merges the output of strace -ff -tt[t] command, prepending PID to each line and sorting the result using time stamp as a key. | |
OPTIONS | |
--help Show program usage and exit. | |
STRACE_LOG | |
Output file name prefix of files produced by a strace -ff -tt[t] command. | |
+ man strings | |
+ head -n 20 | |
STRINGS(1) GNU Development Tools STRINGS(1) | |
NAME | |
strings - print the strings of printable characters in files. | |
SYNOPSIS | |
strings [-afovV] [-min-len] | |
[-n min-len] [--bytes=min-len] | |
[-t radix] [--radix=radix] | |
[-e encoding] [--encoding=encoding] | |
[-] [--all] [--print-file-name] | |
[-T bfdname] [--target=bfdname] | |
[-w] [--include-all-whitespace] | |
[-s] [--output-separatorsep_string] | |
[--help] [--version] file... | |
DESCRIPTION | |
For each file given, GNU strings prints the printable character sequences that are at least 4 characters long (or the number given with the options below) and are followed by an unprintable character. | |
+ man strip | |
+ head -n 20 | |
STRIP(1) GNU Development Tools STRIP(1) | |
NAME | |
strip - Discard symbols from object files. | |
SYNOPSIS | |
strip [-F bfdname |--target=bfdname] | |
[-I bfdname |--input-target=bfdname] | |
[-O bfdname |--output-target=bfdname] | |
[-s|--strip-all] | |
[-S|-g|-d|--strip-debug] | |
[--strip-dwo] | |
[-K symbolname|--keep-symbol=symbolname] | |
[-M|--merge-notes][--no-merge-notes] | |
[-N symbolname |--strip-symbol=symbolname] | |
[-w|--wildcard] | |
[-x|--discard-all] [-X |--discard-locals] | |
[-R sectionname |--remove-section=sectionname] | |
+ man su | |
+ head -n 20 | |
SU(1) User Commands SU(1) | |
NAME | |
su - run a command with substitute user and group ID | |
SYNOPSIS | |
su [options] [-] [user [argument...]] | |
DESCRIPTION | |
su allows to run commands with a substitute user and group ID. | |
When called without arguments, su defaults to running an interactive shell as root. | |
For backward compatibility, su defaults to not change the current directory and to only set the environment variables HOME and SHELL (plus USER and LOGNAME if the target user is not root). It is recommended to always use the --login option (instead of its shortcut -) to avoid side effects caused by mixing environments. | |
This version of su uses PAM for authentication, account and session management. Some configuration options found in other su implementations, such as support for a wheel group, have to be configured via PAM. | |
su is mostly designed for unprivileged users, the recommended solution for privileged users (e.g. scripts executed by root) is to use non-set-user-ID command runuser(1) that does not require authentication and provide separate PAM configuration. If the PAM session is not required at all then the recommend solution is to use command setpriv(1). | |
+ man sudo | |
+ head -n 20 | |
SUDO(8) BSD System Manager's Manual SUDO(8) | |
NAME | |
sudo, sudoedit — execute a command as another user | |
SYNOPSIS | |
sudo -h | -K | -k | -V | |
sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] | |
sudo -l [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-U user] [-u user] [command] | |
sudo [-AbEHnPS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-r role] [-t type] [-T timeout] [-u user] [VAR=value] [-i | -s] [command] | |
sudoedit [-AknS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-T timeout] [-u user] file ... | |
DESCRIPTION | |
sudo allows a permitted user to execute a command as the superuser or another user, as specified by the security policy. The invoking user's real (not effective) user ID is used to determine the user name with which to query the security policy. | |
sudo supports a plugin architecture for security policies and input/output logging. Third parties can develop and distribute their own policy and I/O logging plugins to work seamlessly with the sudo front end. The default security policy is sudoers, which is configured via the file /etc/sudoers, or via LDAP. See the Plugins section for more information. | |
The security policy determines what privileges, if any, a user has to run sudo. The policy may require that users authenticate themselves with a password or another authentication mechanism. If authentication is required, sudo will exit if the user's password is not entered within a configurable time limit. This limit is policy-specific; the default password prompt timeout for the sudoers security | |
policy is 5 minutes. | |
+ man sudoedit | |
+ head -n 20 | |
SUDO(8) BSD System Manager's Manual SUDO(8) | |
NAME | |
sudo, sudoedit — execute a command as another user | |
SYNOPSIS | |
sudo -h | -K | -k | -V | |
sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] | |
sudo -l [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-U user] [-u user] [command] | |
sudo [-AbEHnPS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-r role] [-t type] [-T timeout] [-u user] [VAR=value] [-i | -s] [command] | |
sudoedit [-AknS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-T timeout] [-u user] file ... | |
DESCRIPTION | |
sudo allows a permitted user to execute a command as the superuser or another user, as specified by the security policy. The invoking user's real (not effective) user ID is used to determine the user name with which to query the security policy. | |
sudo supports a plugin architecture for security policies and input/output logging. Third parties can develop and distribute their own policy and I/O logging plugins to work seamlessly with the sudo front end. The default security policy is sudoers, which is configured via the file /etc/sudoers, or via LDAP. See the Plugins section for more information. | |
The security policy determines what privileges, if any, a user has to run sudo. The policy may require that users authenticate themselves with a password or another authentication mechanism. If authentication is required, sudo will exit if the user's password is not entered within a configurable time limit. This limit is policy-specific; the default password prompt timeout for the sudoers security | |
policy is 5 minutes. | |
+ man sudoreplay | |
+ head -n 20 | |
SUDOREPLAY(8) BSD System Manager's Manual SUDOREPLAY(8) | |
NAME | |
sudoreplay — replay sudo session logs | |
SYNOPSIS | |
sudoreplay [-hnR] [-d dir] [-f filter] [-m num] [-s num] ID | |
sudoreplay [-h] [-d dir] -l [search expression] | |
DESCRIPTION | |
sudoreplay plays back or lists the output logs created by sudo. When replaying, sudoreplay can play the session back in real-time, or the playback speed may be adjusted (faster or slower) based on the command line options. | |
The ID should either be a six character sequence of digits and upper case letters, e.g. 0100A5, or a pattern matching the iolog_file option in the sudoers file. When a command is run via sudo with log_output enabled in the sudoers file, a TSID=ID string is logged via syslog or to the sudo log file. The ID may also be determined using sudoreplay's list mode. | |
In list mode, sudoreplay can be used to find the ID of a session based on a number of criteria such as the user, tty or command run. | |
In replay mode, if the standard input and output are connected to a terminal and the -n option is not specified, sudoreplay will operate interactively. In interactive mode, sudoreplay will attempt to adjust the terminal size to match that of the session and write directly to the terminal (not all terminals support this). Additionally, it will poll the keyboard and act on the following keys: | |
‘\n’ or ‘\r’ Skip to the next replay event; useful for long pauses. | |
+ man sulogin | |
+ head -n 20 | |
SULOGIN(8) System Administration SULOGIN(8) | |
NAME | |
sulogin - single-user login | |
SYNOPSIS | |
sulogin [options] [tty] | |
DESCRIPTION | |
sulogin is invoked by init when the system goes into single-user mode. | |
The user is prompted: | |
Give root password for system maintenance | |
(or type Control-D for normal startup): | |
If the root account is locked and --force is specified, no password is required. | |
+ man sushell | |
+ head -n 20 | |
SUSHELL(8) System Manager's Manual SUSHELL(8) | |
NAME | |
sushell - execute the single-user shell | |
SYNOPSIS | |
sushell | |
DESCRIPTION | |
sushell executes the single-user shell. By default, this is /bin/bash This can be configured via the SUSHELL environment variable. | |
NOTES | |
sushell is an implementation detail, required for proper SELinux usage. It is not intended to be run regularly. | |
Red Hat, Inc SUSHELL(8) | |
+ man swaplabel | |
+ head -n 20 | |
SWAPLABEL(8) System Administration SWAPLABEL(8) | |
NAME | |
swaplabel - print or change the label or UUID of a swap area | |
SYNOPSIS | |
swaplabel [-L label] [-U UUID] device | |
DESCRIPTION | |
swaplabel will display or change the label or UUID of a swap partition located on device (or regular file). | |
If the optional arguments -L and -U are not given, swaplabel will simply display the current swap-area label and UUID of device. | |
If an optional argument is present, then swaplabel will change the appropriate value on device. These values can also be set during swap creation using mkswap(8). The swaplabel utility allows to change the label or UUID on an actively used swap device. | |
OPTIONS | |
-h, --help | |
Display help text and exit. | |
+ man swapoff | |
+ head -n 20 | |
SWAPON(8) System Administration SWAPON(8) | |
NAME | |
swapon, swapoff - enable/disable devices and files for paging and swapping | |
SYNOPSIS | |
swapon [options] [specialfile...] | |
swapoff [-va] [specialfile...] | |
DESCRIPTION | |
swapon is used to specify devices on which paging and swapping are to take place. | |
The device or file used is given by the specialfile parameter. It may be of the form -L label or -U uuid to indicate a device by label or uuid. | |
Calls to swapon normally occur in the system boot scripts making all swap devices available, so that the paging and swapping activity is interleaved across several devices and files. | |
swapoff disables swapping on the specified devices and files. When the -a flag is given, swapping is disabled on all known swap devices and files (as found in /proc/swaps or /etc/fstab). | |
+ man swapon | |
+ head -n 20 | |
SWAPON(8) System Administration SWAPON(8) | |
NAME | |
swapon, swapoff - enable/disable devices and files for paging and swapping | |
SYNOPSIS | |
swapon [options] [specialfile...] | |
swapoff [-va] [specialfile...] | |
DESCRIPTION | |
swapon is used to specify devices on which paging and swapping are to take place. | |
The device or file used is given by the specialfile parameter. It may be of the form -L label or -U uuid to indicate a device by label or uuid. | |
Calls to swapon normally occur in the system boot scripts making all swap devices available, so that the paging and swapping activity is interleaved across several devices and files. | |
swapoff disables swapping on the specified devices and files. When the -a flag is given, swapping is disabled on all known swap devices and files (as found in /proc/swaps or /etc/fstab). | |
+ man switch_root | |
+ head -n 20 | |
SWITCH_ROOT(8) System Administration SWITCH_ROOT(8) | |
NAME | |
switch_root - switch to another filesystem as the root of the mount tree | |
SYNOPSIS | |
switch_root [-hV] | |
switch_root newroot init [arg...] | |
DESCRIPTION | |
switch_root moves already mounted /proc, /dev, /sys and /run to newroot and makes newroot the new root filesystem and starts init process. | |
WARNING: switch_root removes recursively all files and directories on the current root filesystem. | |
OPTIONS | |
-h, --help | |
+ man sys-unconfig | |
+ head -n 20 | |
SYS-UNCONFIG(8) System Manager's Manual SYS-UNCONFIG(8) | |
NAME | |
sys-unconfig - shell script to reconfigure the system upon next boot | |
SYNOPSIS | |
sys-unconfig | |
DESCRIPTION | |
sys-unconfig provides a simple method of reconfiguring a system in a new environment. Upon executing sys-unconfig will poweroff your system, and run firstboot at next boot. | |
FILES | |
/.unconfigured The presence of this file will trigger firsboot. | |
NOTES | |
This utility should not be used for creating cloud or virtual machine images. For that use please see virt-sysprep. | |
+ man sysctl | |
+ head -n 20 | |
SYSCTL(8) System Administration SYSCTL(8) | |
NAME | |
sysctl - configure kernel parameters at runtime | |
SYNOPSIS | |
sysctl [options] [variable[=value]] [...] | |
sysctl -p [file or regexp] [...] | |
DESCRIPTION | |
sysctl is used to modify kernel parameters at runtime. The parameters available are those listed under /proc/sys/. Procfs is required for sysctl support in Linux. You can use sysctl to both read and write sysctl data. | |
PARAMETERS | |
variable | |
The name of a key to read from. An example is kernel.ostype. The '/' separator is also accepted in place of a '.'. | |
variable=value | |
To set a key, use the form variable=value where variable is the key and value is the value to set it to. If the value contains quotes or characters which are parsed by the shell, you may need to enclose the value in double quotes. This requires the -w parameter to use. | |
+ man systemctl | |
+ head -n 20 | |
SYSTEMCTL(1) systemctl SYSTEMCTL(1) | |
NAME | |
systemctl - Control the systemd system and service manager | |
SYNOPSIS | |
systemctl [OPTIONS...] COMMAND [NAME...] | |
DESCRIPTION | |
systemctl may be used to introspect and control the state of the "systemd" system and service manager. Please refer to systemd(1) for an introduction into the basic concepts and functionality this tool manages. | |
OPTIONS | |
The following options are understood: | |
-t, --type= | |
The argument should be a comma-separated list of unit types such as service and socket. | |
If one of the arguments is a unit type, when listing units, limit display to certain unit types. Otherwise, units of all types will be shown. | |
+ man systemd-analyze | |
+ head -n 20 | |
SYSTEMD-ANALYZE(1) systemd-analyze SYSTEMD-ANALYZE(1) | |
NAME | |
systemd-analyze - Analyze system boot-up performance | |
SYNOPSIS | |
systemd-analyze [OPTIONS...] [time] | |
systemd-analyze [OPTIONS...] blame | |
systemd-analyze [OPTIONS...] critical-chain [UNIT...] | |
systemd-analyze [OPTIONS...] plot [> file.svg] | |
systemd-analyze [OPTIONS...] dot [PATTERN...] [> file.dot] | |
systemd-analyze [OPTIONS...] dump | |
+ man systemd-ask-password | |
+ head -n 20 | |
SYSTEMD-ASK-PASSWORD(1) systemd-ask-password SYSTEMD-ASK-PASSWORD(1) | |
NAME | |
systemd-ask-password - Query the user for a system password | |
SYNOPSIS | |
systemd-ask-password [OPTIONS...] [MESSAGE] | |
DESCRIPTION | |
systemd-ask-password may be used to query a system password or passphrase from the user, using a question message specified on the command line. When run from a TTY it will query a password on the TTY and print it to standard output. When run with no TTY or with --no-tty it will query the password system-wide and allow active users to respond via several agents. The latter is only available to | |
privileged processes. | |
The purpose of this tool is to query system-wide passwords -- that is passwords not attached to a specific user account. Examples include: unlocking encrypted hard disks when they are plugged in or at boot, entering an SSL certificate passphrase for web and VPN servers. | |
Existing agents are: a boot-time password agent asking the user for passwords using Plymouth; a boot-time password agent querying the user directly on the console; an agent requesting password input via a wall(1) message; an agent suitable for running in a GNOME session; a command line agent which can be started temporarily to process queued password requests; a TTY agent that is temporarily spawned | |
during systemctl(1) invocations. | |
Additional password agents may be implemented according to the systemd Password Agent Specification[1]. | |
+ man systemd-cat | |
+ head -n 20 | |
SYSTEMD-CAT(1) systemd-cat SYSTEMD-CAT(1) | |
NAME | |
systemd-cat - Connect a pipeline or program's output with the journal | |
SYNOPSIS | |
systemd-cat [OPTIONS...] [COMMAND] [ARGUMENTS...] | |
systemd-cat [OPTIONS...] | |
DESCRIPTION | |
systemd-cat may be used to connect the standard input and output of a process to the journal, or as a filter tool in a shell pipeline to pass the output the previous pipeline element generates to the journal. | |
If no parameter is passed, systemd-cat will write everything it reads from standard input (stdin) to the journal. | |
If parameters are passed, they are executed as command line with standard output (stdout) and standard error output (stderr) connected to the journal, so that all it writes is stored in the journal. | |
OPTIONS | |
+ man systemd-cgls | |
+ head -n 20 | |
SYSTEMD-CGLS(1) systemd-cgls SYSTEMD-CGLS(1) | |
NAME | |
systemd-cgls - Recursively show control group contents | |
SYNOPSIS | |
systemd-cgls [OPTIONS...] [CGROUP...] | |
DESCRIPTION | |
systemd-cgls recursively shows the contents of the selected Linux control group hierarchy in a tree. If arguments are specified, shows all member processes of the specified control groups plus all their subgroups and their members. The control groups may either be specified by their full file paths or are assumed in the systemd control group hierarchy. If no argument is specified and the current | |
working directory is beneath the control group mount point /sys/fs/cgroup, shows the contents of the control group the working directory refers to. Otherwise, the full systemd control group hierarchy is shown. | |
By default, empty control groups are not shown. | |
OPTIONS | |
The following options are understood: | |
--all | |
+ man systemd-cgtop | |
+ head -n 20 | |
SYSTEMD-CGTOP(1) systemd-cgtop SYSTEMD-CGTOP(1) | |
NAME | |
systemd-cgtop - Show top control groups by their resource usage | |
SYNOPSIS | |
systemd-cgtop [OPTIONS...] | |
DESCRIPTION | |
systemd-cgtop shows the top control groups of the local Linux control group hierarchy, ordered by their CPU, memory, or disk I/O load. The display is refreshed in regular intervals (by default every 1s), similar in style to top(1). If systemd-cgtop is not connected to a tty, only one iteration is performed and no columns headers are printed. This mode is suitable for scripting. | |
Resource usage is only accounted for control groups in the relevant hierarchy, i.e. CPU usage is only accounted for control groups in the "cpuacct" hierarchy, memory usage only for those in "memory" and disk I/O usage for those in "blkio". If resource monitoring for these resources is required, it is recommended to add the CPUAccounting=1, MemoryAccounting=1 and BlockIOAccounting=1 settings in the unit | |
files in question. See systemd.resource-control(5) for details. | |
To emphasize this: unless "CPUAccounting=1", "MemoryAccounting=1" and "BlockIOAccounting=1" are enabled for the services in question, no resource accounting will be available for system services and the data shown by systemd-cgtop will be incomplete. | |
OPTIONS | |
The following options are understood: | |
+ man systemd-coredumpctl | |
+ head -n 20 | |
No manual entry for systemd-coredumpctl | |
+ man systemd-delta | |
+ head -n 20 | |
SYSTEMD-DELTA(1) systemd-delta SYSTEMD-DELTA(1) | |
NAME | |
systemd-delta - Find overridden configuration files | |
SYNOPSIS | |
systemd-delta [OPTIONS...] [PREFIX[/SUFFIX]|SUFFIX...] | |
DESCRIPTION | |
systemd-delta may be used to identify and compare configuration files that override other configuration files. Files in /etc have highest priority, files in /run have the second highest priority, ..., files in /lib have lowest priority. Files in a directory with higher priority override files with the same name in directories of lower priority. In addition, certain configuration files can have ".d" | |
directories which contain "drop-in" files with configuration snippets which augment the main configuration file. "Drop-in" files can be overriden in the same way by placing files with the same name in a directory of higher priority (except that in case of "drop-in" files, both the "drop-in" file name and the name of the containing directory, which corresponds to the name of the main configuration file, | |
must match). For a fuller explanation, see systemd.unit(5). | |
The command line argument will be split into a prefix and a suffix. Either is optional. The prefix must be one of the directories containing configuration files (/etc, /run, /usr/lib, ...). If it is given, only overriding files contained in this directory will be shown. Otherwise, all overriding files will be shown. The suffix must be a name of a subdirectory containing configuration files like | |
tmpfiles.d, sysctl.d or systemd/system. If it is given, only configuration files in this subdirectory (across all configuration paths) will be analyzed. Otherwise, all configuration files will be analyzed. If the command line argument is not given at all, all configuration files will be analyzed. See below for some examples. | |
OPTIONS | |
The following options are understood: | |
+ man systemd-detect-virt | |
+ head -n 20 | |
SYSTEMD-DETECT-VIRT(1) systemd-detect-virt SYSTEMD-DETECT-VIRT(1) | |
NAME | |
systemd-detect-virt - Detect execution in a virtualized environment | |
SYNOPSIS | |
systemd-detect-virt [OPTIONS...] | |
DESCRIPTION | |
systemd-detect-virt detects execution in a virtualized environment. It identifies the virtualization technology and can distinguish full VM virtualization from container virtualization. systemd-detect-virt exits with a return value of 0 (success) if a virtualization technology is detected, and non-zero (error) otherwise. By default any type of virtualization is detected, and the options --container | |
and --vm can be used to limit what types of virtualization are detected. | |
When executed without --quiet will print a short identifier for the detected virtualization technology. The following technologies are currently identified: | |
Table 1. Known virtualization technologies (both VM, i.e. full hardware virtualization, and container, i.e. shared kernel virtualization) | |
┌──────────┬────────────────┬──────────────────────────────────────────────────────────────────────────────┐ | |
│Type │ ID │ Product │ | |
├──────────┼────────────────┼──────────────────────────────────────────────────────────────────────────────┤ | |
+ man systemd-escape | |
+ head -n 20 | |
SYSTEMD-ESCAPE(1) systemd-escape SYSTEMD-ESCAPE(1) | |
NAME | |
systemd-escape - Escape strings for usage in system unit names | |
SYNOPSIS | |
systemd-escape [OPTIONS...] [STRING...] | |
DESCRIPTION | |
systemd-escape may be used to escape strings for inclusion in systemd unit names. The command may be used to escape and to undo escaping of strings. | |
The command takes any number of strings on the command line, and will process them individually, one after the other. It will output them separated by spaces to stdout. | |
By default this command will escape the strings passed, unless --unescape is passed which results in the inverse operation being applied. If --mangle a special mode of escaping is applied instead, which assumes a string to be already escaped but will escape everything that appears obviously non-escaped. | |
OPTIONS | |
The following options are understood: | |
+ man systemd-firstboot | |
+ head -n 20 | |
SYSTEMD-FIRSTBOOT(1) systemd-firstboot SYSTEMD-FIRSTBOOT(1) | |
NAME | |
systemd-firstboot, systemd-firstboot.service - Initialize basic system settings on or before the first boot-up of a system | |
SYNOPSIS | |
systemd-firstboot [OPTIONS...] | |
systemd-firstboot.service | |
DESCRIPTION | |
systemd-firstboot initializes the most basic system settings interactively on the first boot, or optionally non-interactively when a system image is created. The following settings may be set up: | |
· The system locale, more specifically the two locale variables LANG= and LC_MESSAGES | |
· The system time zone | |
· The system host name | |
+ man systemd-hwdb | |
+ head -n 20 | |
SYSTEMD-HWDB(8) systemd-hwdb SYSTEMD-HWDB(8) | |
NAME | |
systemd-hwdb - hardware database management tool | |
SYNOPSIS | |
systemd-hwdb [options] update | |
systemd-hwdb [options] query modalias | |
DESCRIPTION | |
systemd-hwdb expects a command and command specific arguments. It manages the binary hardware database. | |
OPTIONS | |
-h, --help | |
Print help text. | |
--usr | |
+ man systemd-inhibit | |
+ head -n 20 | |
SYSTEMD-INHIBIT(1) systemd-inhibit SYSTEMD-INHIBIT(1) | |
NAME | |
systemd-inhibit - Execute a program with an inhibition lock taken | |
SYNOPSIS | |
systemd-inhibit [OPTIONS...] [COMMAND] [ARGUMENTS...] | |
systemd-inhibit [OPTIONS...] --list | |
DESCRIPTION | |
systemd-inhibit may be used to execute a program with a shutdown, sleep or idle inhibitor lock taken. The lock will be acquired before the specified command line is executed and released afterwards. | |
Inhibitor locks may be used to block or delay system sleep and shutdown requests from the user, as well as automatic idle handling of the OS. This is useful to avoid system suspends while an optical disc is being recorded, or similar operations that should not be interrupted. | |
For more information see the Inhibitor Lock Developer Documentation[1]. | |
OPTIONS | |
+ man systemd-loginctl | |
+ head -n 20 | |
No manual entry for systemd-loginctl | |
+ man systemd-machine-id-setup | |
+ head -n 20 | |
SYSTEMD-MACHINE-ID-SETUP(1) systemd-machine-id-setup SYSTEMD-MACHINE-ID-SETUP(1) | |
NAME | |
systemd-machine-id-setup - Initialize the machine ID in /etc/machine-id | |
SYNOPSIS | |
systemd-machine-id-setup | |
DESCRIPTION | |
systemd-machine-id-setup may be used by system installer tools to initialize the machine ID stored in /etc/machine-id at install time with a randomly generated ID. See machine-id(5) for more information about this file. | |
This tool will execute no operation if /etc/machine-id is already initialized. | |
If a valid D-Bus machine ID is already configured for the system, the D-Bus machine ID is copied and used to initialize the machine ID in /etc/machine-id. | |
If run inside a KVM virtual machine and a UUID is passed via the -uuid option, this UUID is used to initialize the machine ID instead of a randomly generated one. The caller must ensure that the UUID passed is sufficiently unique and is different for every booted instanced of the VM. | |
Similar, if run inside a Linux container environment and a UUID is set for the container this is used to initialize the machine ID. For details see the documentation of the Container Interface[1]. | |
+ man systemd-notify | |
+ head -n 20 | |
SYSTEMD-NOTIFY(1) systemd-notify SYSTEMD-NOTIFY(1) | |
NAME | |
systemd-notify - Notify service manager about start-up completion and other daemon status changes | |
SYNOPSIS | |
systemd-notify [OPTIONS...] [VARIABLE=VALUE...] | |
DESCRIPTION | |
systemd-notify may be called by daemon scripts to notify the init system about status changes. It can be used to send arbitrary information, encoded in an environment-block-like list of strings. Most importantly it can be used for start-up completion notification. | |
This is mostly just a wrapper around sd_notify() and makes this functionality available to shell scripts. For details see sd_notify(3). | |
The command line may carry a list of environment variables to send as part of the status update. | |
Note that systemd will refuse reception of status updates from this command unless NotifyAccess=all is set for the service unit this command is called from. | |
OPTIONS | |
+ man systemd-nspawn | |
+ head -n 20 | |
SYSTEMD-NSPAWN(1) systemd-nspawn SYSTEMD-NSPAWN(1) | |
NAME | |
systemd-nspawn - Spawn a namespace container for debugging, testing and building | |
SYNOPSIS | |
systemd-nspawn [OPTIONS...] [COMMAND [ARGS...]] | |
systemd-nspawn -b [OPTIONS...] [ARGS...] | |
DESCRIPTION | |
systemd-nspawn may be used to run a command or OS in a light-weight namespace container. In many ways it is similar to chroot(1), but more powerful since it fully virtu |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment