Skip to content

Instantly share code, notes, and snippets.

@tamakiii
Last active May 5, 2021 11:26
Show Gist options
  • Save tamakiii/dd0bde433084ee509411b0e073ceb5d6 to your computer and use it in GitHub Desktop.
Save tamakiii/dd0bde433084ee509411b0e073ceb5d6 to your computer and use it in GitHub Desktop.
ami-0d14de74618b313e2...amazonlinux:2.0.20210126.0 (docker.io)
--- /dev/fd/11 2021-05-05 18:13:16.000000000 +0900
+++ /dev/fd/13 2021-05-05 18:13:16.000000000 +0900
@@ -3,267 +3,57 @@
:
[
[[
-[ec2-user@ip-10-0-0-0 ~]$ compgen -c
]]
-__expand_tilde_by_ref
-__get_cword_at_cursor_by_ref
-__ltrim_colon_completions
-__parse_options
-__reassemble_comp_words_by_ref
-_allowed_groups
-_allowed_users
-_available_interfaces
-_cd
-_cd_devices
-_command
-_command_offset
-_complete_as_root
-_completion_loader
-_configured_interfaces
-_count_args
-_dvd_devices
-_expand
-_filedir
-_filedir_xspec
-_fstypes
-_get_comp_words_by_ref
-_get_cword
-_get_first_arg
-_get_pword
-_gids
-_have
-_init_completion
-_installed_modules
-_ip_addresses
-_kernel_versions
-_known_hosts
-_known_hosts_real
-_longopt
-_mac_addresses
-_minimal
-_modules
-_ncpus
-_parse_help
-_parse_usage
-_pci_ids
-_pgids
-_pids
-_pnames
-_quote_readline_by_ref
-_realcommand
-_rl_enabled
-_root_command
-_scl
-_service
-_services
-_shells
-_signals
-_split_longopt
-_sysvdirs
-_terms
-_tilde
-_uids
-_upvar
-_upvars
-_usb_ids
-_user_at_host
-_usergroup
-_userland
-_variables
-_xfunc
-_xinetd_services
-_yu_builddep
-_yu_debug_dump
-_yu_debuginfo_install
-_yu_init_completion
-_yu_package_cleanup
-_yu_repo_graph
-_yu_repo_rss
-_yu_repoclosure
-_yu_repodiff
-_yu_repomanage
-_yu_repoquery
-_yu_verifytree
-_yu_yumdb
-_yu_yumdownloader
-_yum
-_yum_atgroups
-_yum_baseopts
-_yum_binrpmfiles
-_yum_complete_baseopts
-_yum_helper
-_yum_list
-_yum_plugins
-_yum_transactions
-a2p
-ac
-accessdb
-accton
addgnupghome
-addpart
-addr2line
-agetty
alias
alternatives
amazon-linux-extras
amazon-linux-https
-amazon-ssm-agent
-anacron
applygnupgdefaults
-apropos
-ar
arch
-arp
-arpd
-arping
-as
-at
-atd
-atq
-atrm
-atrun
-attr
-audispd
-auditctl
-auditd
-augenrules
-aulast
-aulastlog
-aureport
-ausearch
-ausyscall
-authconfig
-authconfig-tui
-auvirt
-avcstat
awk
-aws
-aws_completer
-badblocks
base64
basename
bash
bashbug
bashbug-64
-batch
-bc
bg
bind
-blkdeactivate
-blkdiscard
-blkid
-blkiomon
-blkmapd
-blkparse
-blkrawverify
-blktrace
-blkzone
-blockdev
-bno_plot.py
-bond2team
-bootctl
-brctl
break
-bridge
-btrace
-btrecord
-btreplay
-btt
+build-locale-archive
builtin
-bunzip2
-busctl
-bzcat
-bzcmp
-bzdiff
-bzgrep
-bzip2
-bzip2recover
-bzless
-bzmore
-c++filt
-c2ph
ca-legacy
-cacertdir_rehash
-cache_check
-cache_dump
-cache_metadata_size
-cache_repair
-cache_restore
-cache_writeback
-cal
caller
capsh
captoinfo
case
cat
catchsegv
-catman
cd
certutil
-cfdisk
-cgdisk
-chacl
-chage
-chardetect
-chattr
chcon
-chcpu
chgrp
chkconfig
-chmem
chmod
chown
-chpasswd
-chronyc
-chronyd
chroot
-chrt
-chvt
-cifsiostat
cksum
clear
-clock
-clockdiff
-cloud-id
-cloud-init
-cloud-init-per
cmp
cmsutil
-col
-colcrt
-colrm
-column
comm
command
compgen
complete
compopt
-consolehelper
-consoletype
continue
-convertquota
coproc
-coredumpctl
cp
cpio
-cpupower
-cracklib-check
-cracklib-format
-cracklib-packer
-cracklib-unpacker
-create-cracklib-dict
crlutil
-crond
-crontab
-cryptsetup
-csh
csplit
-csslint-0.6
-ctrlaltdel
-ctstat
curl
cut
-cvtsudoers
date
db_archive
db_checkpoint
@@ -280,186 +70,65 @@
db_tuner
db_upgrade
db_verify
-dbus-cleanup-sockets
-dbus-daemon
-dbus-monitor
-dbus-run-session
-dbus-send
-dbus-test-tool
-dbus-update-activation-environment
-dbus-uuidgen
-dc
dd
-deallocvt
-debugfs
-debuginfo-install
declare
-delpart
-delv
-depmod
-dequote
-devlink
df
dgawk
-dhclient
-dhclient-script
diff
diff3
-dig
dir
dircolors
dirname
dirs
disown
-dm_dso_reg_tool
-dmesg
-dmevent_tool
-dmeventd
-dmfilemapd
-dmidecode
-dmraid
-dmraid.static
-dmsetup
-dmstats
-dnsdomainname
do
-domainname
done
-dosfsck
-dosfslabel
-dracut
du
-dump-acct
-dump-utmp
-dumpe2fs
-dumpkeys
-dwp
-e2freefrag
-e2fsck
-e2image
-e2label
-e2undo
-e4defrag
-easy_install
-easy_install-2.7
-easy_install-3.7
-ebsnvme-id
-ec2-metadata
-ec2ifdown
-ec2ifscan
-ec2ifup
-ec2udev-vbd
-ec2udev-vcpu
echo
-ed
-edquota
-efibootmgr
egrep
-eject
-elfedit
elif
else
enable
-enable-ec2-spot-hibernation
env
-envsubst
eqn
-era_check
-era_dump
-era_invalidate
-era_restore
esac
-ether-wake
-ethtool
eval
ex
exec
exit
expand
export
-exportfs
expr
factor
-faillock
-fallocate
false
-fatlabel
fc
-fdformat
-fdisk
fg
-fgconsole
fgrep
fi
-file
-filefrag
-fincore
find
-find-repos-of-install
-find2perl
-findfs
-findmnt
-fipscheck
-fipshmac
-fixfiles
-fixparts
-flock
fmt
fold
for
-free
-fsadm
-fsck
-fsck.cramfs
-fsck.ext2
-fsck.ext3
-fsck.ext4
-fsck.fat
-fsck.minix
-fsck.msdos
-fsck.vfat
-fsck.xfs
-fsfreeze
-fstrim
function
-funzip
-fuser
gapplication
gawk
gdbm_dump
gdbm_load
gdbmtool
gdbus
-gdisk
gencat
-genhomedircon
-genhostid
-genl
-genl-ctrl-list
-geoiplookup
-geoiplookup6
-geoipupdate
geqn
getcap
getconf
-getenforce
getent
-getfacl
-getfattr
-getkeycodes
-getopt
getopts
getpcaps
-getsebool
-gettext
-gettext.sh
gio
gio-querymodules-64
glib-compile-schemas
-gmake
+glibc_post_upgrade.x86_64
gneqn
gnroff
-gpasswd
gpg
gpg-agent
gpg-connect-agent
@@ -472,150 +141,36 @@
gpgv
gpgv2
gpic
-gprof
grep
groff
grops
grotty
groups
-growpart
-grpck
-grpconv
-grpunconv
-grub2-editenv
-grub2-file
-grub2-fstest
-grub2-get-kernel-settings
-grub2-glue-efi
-grub2-install
-grub2-kbdcomp
-grub2-menulst2cfg
-grub2-mkconfig
-grub2-mkfont
-grub2-mkimage
-grub2-mklayout
-grub2-mknetdir
-grub2-mkpasswd-pbkdf2
-grub2-mkrelpath
-grub2-mkrescue
-grub2-mkstandalone
-grub2-ofpathname
-grub2-probe
-grub2-reboot
-grub2-rpm-sort
-grub2-script-check
-grub2-set-default
-grub2-setpassword
-grub2-sparc64-setup
-grub2-syslinux2cfg
-grubby
gsettings
gsoelim
-gssproxy
-gtar
gtbl
gtroff
-gunzip
-gzexe
-gzip
-h2ph
-halt
-hardlink
hash
head
help
-hexdump
-hibagent
history
-host
hostid
-hostname
-hostnamectl
-hunspell
-hwclock
iconv
iconvconfig
-iconvconfig.aarch64
+iconvconfig.x86_64
id
-idiag-socket-details
-idn
if
-ifcfg
-ifconfig
-ifdown
-ifenslave
-ifstat
-ifup
igawk
in
info
infocmp
infokey
infotocap
-init
-insmod
install
install-info
-installkernel
-ionice
-iostat
-ip
-ip6tables
-ip6tables-legacy
-ip6tables-legacy-restore
-ip6tables-legacy-save
-ip6tables-restore
-ip6tables-save
-ipcalc
-ipcmk
-ipcrm
-ipcs
-ipmaddr
-iptables
-iptables-apply
-iptables-legacy
-iptables-legacy-restore
-iptables-legacy-save
-iptables-restore
-iptables-save
-iptables-xml
-iptunnel
-irqbalance
-isosize
jobs
join
-journalctl
-jp.py
-jp.py-2
-jp.py-2.7
-json_reformat
-json_verify
-jsonpointer
-jsonschema
-kbd_mode
-kbdinfo
-kbdrate
-kernel-install
-key.dns_resolver
-keyctl
kill
-killall
-killall5
-kmod
-kpartx
-kpatch
-l.
-last
-lastb
-lastcomm
-lastlog
-lchage
-lchfn
-lchsh
-ld
-ld.bfd
-ld.gold
-ldattach
ldconfig
ldd
less
@@ -623,558 +178,89 @@
lesskey
lesspipe.sh
let
-lexgrog
-lgroupadd
-lgroupdel
-lgroupmod
-lid
link
-linux-boot-prober
-linux32
-linux64
-ll
ln
-lnewusers
-lnstat
-load_policy
-loadkeys
-loadunimap
local
locale
-localectl
localedef
-locate
-logger
-login
-loginctl
logname
logout
-logrotate
-logsave
-look
-losetup
-lpasswd
ls
-lsattr
-lsblk
-lscpu
-lsinitrd
-lsipc
-lslocks
-lslogins
-lsmcli
-lsmd
-lsmem
-lsmod
-lsns
-lsof
-lspci
lua
luac
-luseradd
-luserdel
-lusermod
-lvchange
-lvconvert
-lvcreate
-lvdisplay
-lvextend
-lvm
-lvmconf
-lvmconfig
-lvmdiskscan
-lvmdump
-lvmetad
-lvmpolld
-lvmsadc
-lvmsar
-lvreduce
-lvremove
-lvrename
-lvresize
-lvs
-lvscan
-lz4
-lz4c
-lz4cat
-machinectl
-mailq
-mailq.postfix
-make
makedb
-man
-mandb
-manpath
mapfile
-mapscrn
-matchpathcon
-mcookie
md5sum
-mdadm
-mdig
-mdmon
-mesg
-mii-diag
-mii-tool
-mkdict
mkdir
-mkdosfs
-mke2fs
mkfifo
-mkfs
-mkfs.cramfs
-mkfs.ext2
-mkfs.ext3
-mkfs.ext4
-mkfs.fat
-mkfs.minix
-mkfs.msdos
-mkfs.vfat
-mkfs.xfs
-mkhomedir_helper
-mkinitrd
-mklost+found
mknod
-mkswap
mktemp
-modinfo
-modprobe
modutil
-more
-mount
-mount.nfs
-mount.nfs4
-mountpoint
-mountstats
-mpstat
-msgattrib
-msgcat
-msgcmp
-msgcomm
-msgconv
-msgen
-msgexec
-msgfilter
-msgfmt
-msggrep
-msghack
-msginit
-msgmerge
-msgunfmt
-msguniq
-mtr
-mtr-packet
mv
-namei
-nameif
-nano
-needs-restarting
neqn
-netreport
-netstat
-nettle-hash
-nettle-lfib-stream
-new-kernel-pkg
-newaliases
-newaliases.postfix
-newgrp
-newusers
-nf-ct-add
-nf-ct-list
-nf-exp-add
-nf-exp-delete
-nf-exp-list
-nf-log
-nf-monitor
-nf-queue
-nfsdcltrack
-nfsidmap
-nfsiostat
-nfsiostat-sysstat
-nfsstat
-ngettext
nice
-nisdomainname
nl
-nl-addr-add
-nl-addr-delete
-nl-addr-list
-nl-class-add
-nl-class-delete
-nl-class-list
-nl-classid-lookup
-nl-cls-add
-nl-cls-delete
-nl-cls-list
-nl-fib-lookup
-nl-link-enslave
-nl-link-ifindex2name
-nl-link-list
-nl-link-name2ifindex
-nl-link-release
-nl-link-set
-nl-link-stats
-nl-list-caches
-nl-list-sockets
-nl-monitor
-nl-neigh-add
-nl-neigh-delete
-nl-neigh-list
-nl-neightbl-list
-nl-pktloc-lookup
-nl-qdisc-add
-nl-qdisc-delete
-nl-qdisc-list
-nl-route-add
-nl-route-delete
-nl-route-get
-nl-route-list
-nl-rule-list
-nl-tctree-list
-nl-util-addr
-nm
nohup
-nologin
nproc
nroff
-nsenter
-nslookup
nss-policy-check
-nstat
-nsupdate
-ntsysv
numfmt
-objcopy
-objdump
od
oldfind
-on_ac_power
-open
-openssl
-openvt
-os-prober
-osd_login
p11-kit
-package-cleanup
-packer
-pam_console_apply
-pam_tally2
-pam_timestamp_check
-parted
-partprobe
-partx
-passwd
paste
pathchk
-pdata_tools
-perl
-perl5.16.3
-perlbug
-perldoc
-perlthanks
pgawk
-pgrep
pic
-piconv
-pidof
-pidstat
pinentry
pinentry-curses
-ping
-ping6
pinky
-pip-3
-pip-3.7
-pip3
-pip3.7
-pivot_root
pk12util
-pkcs1-conv
-pkg-config
-pkill
-pl2pm
pldd
-plipconfig
-plymouth
-plymouth-set-default-theme
-plymouthd
-pm-hibernate
-pm-is-supported
-pm-powersave
-pm-suspend
-pm-suspend-hybrid
-pm-utils-bugreport-info.sh
-pmap
-pod2html
-pod2man
-pod2text
-pod2usage
popd
post-grohtml
-postalias
-postcat
-postconf
-postdrop
-postfix
-postkick
-postlock
-postlog
-postmap
-postmulti
-postqueue
-postsuper
-poweroff
-ppp-watch
pr
pre-grohtml
preconv
printenv
printf
-prlimit
-prtstat
-ps
-psed
-psfaddtable
-psfgettable
-psfstriptable
-psfxtable
-pstree
-pstree.x11
-pstruct
ptx
pushd
-pvchange
-pvck
-pvcreate
-pvdisplay
-pvmove
-pvremove
-pvresize
-pvs
-pvscan
-pwck
-pwconv
pwd
-pwdx
-pwhistory_helper
-pwmake
-pwscore
-pwunconv
pydoc
-pydoc3
-pydoc3.7
-pyrsa-decrypt
-pyrsa-decrypt-2
-pyrsa-decrypt-bigfile
-pyrsa-decrypt-bigfile-2
-pyrsa-encrypt
-pyrsa-encrypt-2
-pyrsa-encrypt-bigfile
-pyrsa-encrypt-bigfile-2
-pyrsa-keygen
-pyrsa-keygen-2
-pyrsa-priv2pub
-pyrsa-priv2pub-2
-pyrsa-sign
-pyrsa-sign-2
-pyrsa-verify
-pyrsa-verify-2
-pystache
-pystache-3
-pystache-test
-pystache-test-3
python
-python-config
python2
-python2-config
python2.7
-python2.7-config
-python3
-python3.7
-python3.7m
-pyvenv
-pyvenv-3.7
-quot
-quota
-quotacheck
-quotaoff
-quotaon
-quotastats
-quotasync
-quote
-quote_readline
-raid-check
-ranlib
-raw
-rdate
-rdisc
-rdma
read
readarray
-readelf
readlink
readonly
-readprofile
realpath
-reboot
-recode-sr-latin
-red
-rename
-renice
-repo-graph
-repo-rss
-repoclosure
-repodiff
-repomanage
-repoquery
-reposync
-repotrack
-repquota
-request-key
reset
-resize2fs
-resizepart
-restorecon
return
-rev
rm
-rmail
-rmail.postfix
rmdir
-rmmod
-rnano
-rngd
-rngtest
-route
-routef
-routel
-rpc.gssd
-rpc.idmapd
-rpc.mountd
-rpc.nfsd
-rpc.rquotad
-rpc.statd
-rpcbind
-rpcdebug
rpcgen
-rpcinfo
rpm
rpm2cpio
rpmdb
rpmkeys
rpmquery
rpmverify
-rst2html
-rst2html-3
-rst2html-3.7
-rst2html4-3
-rst2html4-3.7
-rst2html5-3
-rst2html5-3.7
-rst2latex
-rst2latex-3
-rst2latex-3.7
-rst2man
-rst2man-3
-rst2man-3.7
-rst2odt
-rst2odt-3
-rst2odt-3.7
-rst2odt_prepstyles
-rst2odt_prepstyles-3
-rst2odt_prepstyles-3.7
-rst2pseudoxml
-rst2pseudoxml-3
-rst2pseudoxml-3.7
-rst2s5
-rst2s5-3
-rst2s5-3.7
-rst2xetex
-rst2xetex-3
-rst2xetex-3.7
-rst2xml
-rst2xml-3
-rst2xml-3.7
-rstpep2html
-rstpep2html-3
-rstpep2html-3.7
-rsync
-rsyslog-recover-qi.pl
-rsyslogd
-rtacct
-rtcwake
-rtmon
-rtpr
-rtstat
-run-parts
runcon
-runlevel
-runuser
rvi
rview
-rvim
-s2p
-sa
-sadf
-safe_finger
-sar
sasldblistusers2
saslpasswd2
-scl
-scl_enabled
-scl_source
-scp
-screen
-script
-scriptreplay
sdiff
-secon
sed
sefcontext_compile
-selabel_digest
-selabel_lookup
-selabel_lookup_best_match
-selabel_partial_match
select
-selinux_restorecon
-selinuxconlist
-selinuxdefcon
-selinuxenabled
-selinuxexeccon
-semodule
-sendmail
-sendmail.postfix
seq
-service
-sestatus
set
-setarch
setcap
-setenforce
-setfacl
-setfattr
-setfiles
-setfont
-setkeycodes
-setleds
-setmetamode
-setpci
-setpriv
-setquota
-setsebool
-setserial
-setsid
-setterm
-setup
setup-nsssysinit
setup-nsssysinit.sh
-setvtrgb
-sexp-conv
-sfdisk
-sftp
-sg
-sgdisk
-sgpio
sh
sha1sum
sha224sum
@@ -1183,316 +269,83 @@
sha512sum
shift
shopt
-show-changed-rco
-show-installed
-showconsolefont
-showkey
-showmount
shred
shuf
-shutdown
signver
-sim_lsmplugin
-simc_lsmplugin
-size
-skill
-slabtop
-slattach
sleep
sln
-slogin
-sm-notify
-smtp-sink
-smtp-source
-snice
soelim
sort
sotruss
source
-splain
split
sprof
sqlite3
-ss
-ssh
-ssh-add
-ssh-agent
-ssh-copy-id
-ssh-keygen
-ssh-keyscan
-sshd
-sshd-keygen
ssltap
-ssm-agent-worker
-ssm-cli
-ssm-document-worker
-ssm-session-logger
-ssm-session-worker
-stap-merge
-stap-report
-stapbpf
-stapsh
-start-statd
stat
stdbuf
-strace
-strace-log-merge
-strings
-strip
stty
-su
-sudo
-sudoedit
-sudoreplay
-sulogin
sum
-sushell
suspend
-swaplabel
-swapoff
-swapon
-switch_root
sync
-sys-unconfig
-sysctl
-systemctl
-systemd-analyze
-systemd-ask-password
-systemd-cat
-systemd-cgls
-systemd-cgtop
-systemd-coredumpctl
-systemd-delta
-systemd-detect-virt
-systemd-escape
-systemd-firstboot
-systemd-hwdb
-systemd-inhibit
-systemd-loginctl
-systemd-machine-id-setup
-systemd-notify
-systemd-nspawn
-systemd-path
-systemd-run
-systemd-stdio-bridge
-systemd-sysv-convert
-systemd-tmpfiles
-systemd-tty-ask-password-agent
tabs
tac
tail
-tapestat
-tar
-taskset
tbl
-tcpd
-tcpdmatch
-tcpdump
-tcpslice
-tcptraceroute
-tcsh
-teamd
-teamdctl
-teamnl
tee
-telinit
test
then
-thin_check
-thin_delta
-thin_dump
-thin_ls
-thin_metadata_size
-thin_repair
-thin_restore
-thin_rmap
-thin_trim
tic
time
-timedatectl
timeout
times
-tipc
-tload
toe
-top
touch
tput
tr
-tracepath
-tracepath6
-traceroute
-traceroute6
trap
troff
true
truncate
trust
-try-from
tset
tsort
tty
-tune2fs
type
typeset
tzselect
-udevadm
-ul
ulimit
umask
-umount
-umount.nfs
-umount.nfs4
unalias
uname
-uname26
unexpand
-unicode_start
-unicode_stop
uniq
-unix_chkpwd
unlink
-unlz4
unset
-unshare
until
-unxz
-unzip
-unzipsfx
update-alternatives
update-ca-trust
update-mime-database
-update-motd
-update-pciids
-updatedb
-uptime
urlgrabber
-userhelper
-usernetctl
users
-usleep
-utmpdump
-uuidgen
vdir
-verify_blkparse
-verifytree
-vgcfgbackup
-vgcfgrestore
-vgchange
-vgck
-vgconvert
-vgcreate
-vgdisplay
-vgexport
-vgextend
-vgimport
-vgimportclone
-vgmerge
-vgmknodes
-vgreduce
-vgremove
-vgrename
-vgs
-vgscan
-vgsplit
vi
view
-vigr
-vim
-vimdiff
-vimtutor
-vipw
-virt-what
-visudo
-vlock
-vmstat
-w
wait
-wall
-watch
watchgnupg
wc
-wdctl
-weak-modules
-wget
-whatis
-whereis
which
while
-whiptail
who
whoami
-wipefs
-write
xargs
-xfs_admin
-xfs_bmap
-xfs_copy
-xfs_db
-xfs_estimate
-xfs_freeze
-xfs_fsr
-xfs_growfs
-xfs_info
-xfs_io
-xfs_logprint
-xfs_mdrestore
-xfs_metadump
-xfs_mkfile
-xfs_ncheck
-xfs_quota
-xfs_repair
-xfs_rtcp
-xfsdump
-xfsinvutil
-xfsrestore
-xgettext
xmlcatalog
xmllint
xmlwf
-xqmstats
-xtables-legacy-multi
-xxd
-xz
-xzcat
-xzcmp
-xzdec
-xzdiff
-xzegrep
-xzfgrep
-xzgrep
-xzless
-xzmore
yes
-ypdomainname
yum
-yum-builddep
-yum-complete-transaction
-yum-config-manager
-yum-debug-dump
-yum-debug-restore
-yum-groups-manager
-yumdb
-yumdownloader
-zcat
-zcmp
-zdiff
zdump
-zegrep
-zfgrep
-zforce
-zgrep
zic
-zip
-zipcloak
-zipgrep
-zipinfo
-zipnote
-zipsplit
-zless
-zmore
-znew
-zramctl
zsoelim
{
}
$ diff -u /tmp/aa.txt /tmp/bb.txt
--- /tmp/aa.txt 2021-05-05 18:23:03.000000000 +0900
+++ /tmp/bb.txt 2021-05-05 18:24:44.000000000 +0900
@@ -1,4 +1,3 @@
-[ec2-user@ip-10-0-4-176 ~]$ cat /etc/yum.repos.d/*
[amzn2-core]
name=Amazon Linux 2 core repository
mirrorlist=$awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/$product/$target/$basearch/mirror.list
@@ -31,57 +30,3 @@
metadata_expire=300
mirrorlist_expire=300
report_instanceid=yes
-
-
-
-
-### This file is managed with amazon-linux-extras. Please manage with that tool.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-[amzn2extra-docker-source]
-enabled = 0
-name = Amazon Extras source repo for docker
-mirrorlist = $awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/extras/docker/latest/SRPMS/mirror.list
-gpgcheck = 1
-gpgkey = file:///etc/pki/rpm-gpg/RPM-GPG-KEY-amazon-linux-2
-priority = 10
-skip_if_unavailable = 1
-report_instanceid = yes
-
-[amzn2extra-docker-debuginfo]
-enabled = 0
-name = Amazon Extras debuginfo repo for docker
-mirrorlist = $awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/extras/docker/latest/debuginfo/$basearch/mirror.list
-gpgcheck = 1
-gpgkey = file:///etc/pki/rpm-gpg/RPM-GPG-KEY-amazon-linux-2
-priority = 10
-skip_if_unavailable = 1
-report_instanceid = yes
-
-[amzn2extra-docker]
-enabled = 1
-name = Amazon Extras repo for docker
-mirrorlist = $awsproto://$amazonlinux.$awsregion.$awsdomain/$releasever/extras/docker/latest/$basearch/mirror.list
-gpgcheck = 1
-gpgkey = file:///etc/pki/rpm-gpg/RPM-GPG-KEY-amazon-linux-2
-priority = 10
-skip_if_unavailable = 1
-report_instanceid = yes
[ec2-user@ip-10-0-0-0 ~]$ set +x; for c in a2p ac accessdb accton addpart addr2line agetty amazon-ssm-agent anacron apropos ar arp arpd arping as at atd atq atrm atrun attr audispd auditctl auditd augenrules aulast aulastlog aureport ausearch ausyscall authconfig authconfig-tui auvirt avcstat aws aws_completer badblocks batch bc blkdeactivate blkdiscard blkid blkiomon blkmapd blkparse blkrawverify blktrace blkzone blockdev bno_plot.py bond2team bootctl brctl bridge btrace btrecord btreplay btt bunzip2 busctl bzcat bzcmp bzdiff bzgrep bzip2 bzip2recover bzless bzmore c++filt c2ph cacertdir_rehash cache_check cache_dump cache_metadata_size cache_repair cache_restore cache_writeback cal catman cfdisk cgdisk chacl chage chardetect chattr chcpu chmem chpasswd chronyc chronyd chrt chvt cifsiostat clock clockdiff cloud-id cloud-init cloud-init-per col colcrt colrm column consolehelper consoletype convertquota coredumpctl cpupower cracklib-check cracklib-format cracklib-packer cracklib-unpacker create-cracklib-dict crond crontab cryptsetup csh csslint-0.6 ctrlaltdel ctstat cvtsudoers dbus-cleanup-sockets dbus-daemon dbus-monitor dbus-run-session dbus-send dbus-test-tool dbus-update-activation-environment dbus-uuidgen dc deallocvt debugfs debuginfo-install delpart delv depmod dequote devlink dhclient dhclient-script dig dm_dso_reg_tool dmesg dmevent_tool dmeventd dmfilemapd dmidecode dmraid dmraid.static dmsetup dmstats dnsdomainname domainname dosfsck dosfslabel dracut dump-acct dump-utmp dumpe2fs dumpkeys dwp e2freefrag e2fsck e2image e2label e2undo e4defrag easy_install easy_install-2.7 easy_install-3.7 ebsnvme-id ec2-metadata ec2ifdown ec2ifscan ec2ifup ec2udev-vbd ec2udev-vcpu ed edquota efibootmgr eject elfedit enable-ec2-spot-hibernation envsubst era_check era_dump era_invalidate era_restore ether-wake ethtool exportfs faillock fallocate fatlabel fdformat fdisk fgconsole file filefrag fincore find-repos-of-install find2perl findfs findmnt fipscheck fipshmac fixfiles fixparts flock free fsadm fsck fsck.cramfs fsck.ext2 fsck.ext3 fsck.ext4 fsck.fat fsck.minix fsck.msdos fsck.vfat fsck.xfs fsfreeze fstrim funzip fuser gdisk genhomedircon genhostid genl genl-ctrl-list geoiplookup geoiplookup6 geoipupdate getenforce getfacl getfattr getkeycodes getopt getsebool gettext gettext.sh gmake gpasswd gprof growpart grpck grpconv grpunconv grub2-editenv grub2-file grub2-fstest grub2-get-kernel-settings grub2-glue-efi grub2-install grub2-kbdcomp grub2-menulst2cfg grub2-mkconfig grub2-mkfont grub2-mkimage grub2-mklayout grub2-mknetdir grub2-mkpasswd-pbkdf2 grub2-mkrelpath grub2-mkrescue grub2-mkstandalone grub2-ofpathname grub2-probe grub2-reboot grub2-rpm-sort grub2-script-check grub2-set-default grub2-setpassword grub2-sparc64-setup grub2-syslinux2cfg grubby gssproxy gtar gunzip gzexe gzip h2ph halt hardlink hexdump hibagent host hostname hostnamectl hunspell hwclock iconvconfig.aarch64 idiag-socket-details idn ifcfg ifconfig ifdown ifenslave ifstat ifup init insmod installkernel ionice iostat ip ip6tables ip6tables-legacy ip6tables-legacy-restore ip6tables-legacy-save ip6tables-restore ip6tables-save ipcalc ipcmk ipcrm ipcs ipmaddr iptables iptables-apply iptables-legacy iptables-legacy-restore iptables-legacy-save iptables-restore iptables-save iptables-xml iptunnel irqbalance isosize journalctl jp.py jp.py-2 jp.py-2.7 json_reformat json_verify jsonpointer jsonschema kbd_mode kbdinfo kbdrate kernel-install key.dns_resolver keyctl killall killall5 kmod kpartx kpatch l. last lastb lastcomm lastlog lchage lchfn lchsh ld ld.bfd ld.gold ldattach lexgrog lgroupadd lgroupdel lgroupmod lid linux-boot-prober linux32 linux64 ll lnewusers lnstat load_policy loadkeys loadunimap localectl locate logger login loginctl logrotate logsave look losetup lpasswd lsattr lsblk lscpu lsinitrd lsipc lslocks lslogins lsmcli lsmd lsmem lsmod lsns lsof lspci luseradd luserdel lusermod lvchange lvconvert lvcreate lvdisplay lvextend lvm lvmconf lvmconfig lvmdiskscan lvmdump lvmetad lvmpolld lvmsadc lvmsar lvreduce lvremove lvrename lvresize lvs lvscan lz4 lz4c lz4cat machinectl mailq mailq.postfix make man mandb manpath mapscrn matchpathcon mcookie mdadm mdig mdmon mesg mii-diag mii-tool mkdict mkdosfs mke2fs mkfs mkfs.cramfs mkfs.ext2 mkfs.ext3 mkfs.ext4 mkfs.fat mkfs.minix mkfs.msdos mkfs.vfat mkfs.xfs mkhomedir_helper mkinitrd mklost+found mkswap modinfo modprobe more mount mount.nfs mount.nfs4 mountpoint mountstats mpstat msgattrib msgcat msgcmp msgcomm msgconv msgen msgexec msgfilter msgfmt msggrep msghack msginit msgmerge msgunfmt msguniq mtr mtr-packet namei nameif nano needs-restarting netreport netstat nettle-hash nettle-lfib-stream new-kernel-pkg newaliases newaliases.postfix newgrp newusers nf-ct-add nf-ct-list nf-exp-add nf-exp-delete nf-exp-list nf-log nf-monitor nf-queue nfsdcltrack nfsidmap nfsiostat nfsiostat-sysstat nfsstat ngettext nisdomainname nl-addr-add nl-addr-delete nl-addr-list nl-class-add nl-class-delete nl-class-list nl-classid-lookup nl-cls-add nl-cls-delete nl-cls-list nl-fib-lookup nl-link-enslave nl-link-ifindex2name nl-link-list nl-link-name2ifindex nl-link-release nl-link-set nl-link-stats nl-list-caches nl-list-sockets nl-monitor nl-neigh-add nl-neigh-delete nl-neigh-list nl-neightbl-list nl-pktloc-lookup nl-qdisc-add nl-qdisc-delete nl-qdisc-list nl-route-add nl-route-delete nl-route-get nl-route-list nl-rule-list nl-tctree-list nl-util-addr nm nologin nsenter nslookup nstat nsupdate ntsysv objcopy objdump on_ac_power open openssl openvt os-prober osd_login package-cleanup packer pam_console_apply pam_tally2 pam_timestamp_check parted partprobe partx passwd pdata_tools perl perl5.16.3 perlbug perldoc perlthanks pgrep piconv pidof pidstat ping ping6 pip-3 pip-3.7 pip3 pip3.7 pivot_root pkcs1-conv pkg-config pkill pl2pm plipconfig plymouth plymouth-set-default-theme plymouthd pm-hibernate pm-is-supported pm-powersave pm-suspend pm-suspend-hybrid pm-utils-bugreport-info.sh pmap pod2html pod2man pod2text pod2usage postalias postcat postconf postdrop postfix postkick postlock postlog postmap postmulti postqueue postsuper poweroff ppp-watch prlimit prtstat ps psed psfaddtable psfgettable psfstriptable psfxtable pstree pstree.x11 pstruct pvchange pvck pvcreate pvdisplay pvmove pvremove pvresize pvs pvscan pwck pwconv pwdx pwhistory_helper pwmake pwscore pwunconv pydoc3 pydoc3.7 pyrsa-decrypt pyrsa-decrypt-2 pyrsa-decrypt-bigfile pyrsa-decrypt-bigfile-2 pyrsa-encrypt pyrsa-encrypt-2 pyrsa-encrypt-bigfile pyrsa-encrypt-bigfile-2 pyrsa-keygen pyrsa-keygen-2 pyrsa-priv2pub pyrsa-priv2pub-2 pyrsa-sign pyrsa-sign-2 pyrsa-verify pyrsa-verify-2 pystache pystache-3 pystache-test pystache-test-3 python-config python2-config python2.7-config python3 python3.7 python3.7m pyvenv pyvenv-3.7 quot quota quotacheck quotaoff quotaon quotastats quotasync quote quote_readline raid-check ranlib raw rdate rdisc rdma readelf readprofile reboot recode-sr-latin red rename renice repo-graph repo-rss repoclosure repodiff repomanage repoquery reposync repotrack repquota request-key resize2fs resizepart restorecon rev rmail rmail.postfix rmmod rnano rngd rngtest route routef routel rpc.gssd rpc.idmapd rpc.mountd rpc.nfsd rpc.rquotad rpc.statd rpcbind rpcdebug rpcinfo rst2html rst2html-3 rst2html-3.7 rst2html4-3 rst2html4-3.7 rst2html5-3 rst2html5-3.7 rst2latex rst2latex-3 rst2latex-3.7 rst2man rst2man-3 rst2man-3.7 rst2odt rst2odt-3 rst2odt-3.7 rst2odt_prepstyles rst2odt_prepstyles-3 rst2odt_prepstyles-3.7 rst2pseudoxml rst2pseudoxml-3 rst2pseudoxml-3.7 rst2s5 rst2s5-3 rst2s5-3.7 rst2xetex rst2xetex-3 rst2xetex-3.7 rst2xml rst2xml-3 rst2xml-3.7 rstpep2html rstpep2html-3 rstpep2html-3.7 rsync rsyslog-recover-qi.pl rsyslogd rtacct rtcwake rtmon rtpr rtstat run-parts runlevel runuser rvim s2p sa sadf safe_finger sar scl scl_enabled scl_source scp screen script scriptreplay secon selabel_digest selabel_lookup selabel_lookup_best_match selabel_partial_match selinux_restorecon selinuxconlist selinuxdefcon selinuxenabled selinuxexeccon semodule sendmail sendmail.postfix service sestatus setarch setenforce setfacl setfattr setfiles setfont setkeycodes setleds setmetamode setpci setpriv setquota setsebool setserial setsid setterm setup setvtrgb sexp-conv sfdisk sftp sg sgdisk sgpio show-changed-rco show-installed showconsolefont showkey showmount shutdown sim_lsmplugin simc_lsmplugin size skill slabtop slattach slogin sm-notify smtp-sink smtp-source snice splain ss ssh ssh-add ssh-agent ssh-copy-id ssh-keygen ssh-keyscan sshd sshd-keygen ssm-agent-worker ssm-cli ssm-document-worker ssm-session-logger ssm-session-worker stap-merge stap-report stapbpf stapsh start-statd strace strace-log-merge strings strip su sudo sudoedit sudoreplay sulogin sushell swaplabel swapoff swapon switch_root sys-unconfig sysctl systemctl systemd-analyze systemd-ask-password systemd-cat systemd-cgls systemd-cgtop systemd-coredumpctl systemd-delta systemd-detect-virt systemd-escape systemd-firstboot systemd-hwdb systemd-inhibit systemd-loginctl systemd-machine-id-setup systemd-notify systemd-nspawn systemd-path systemd-run systemd-stdio-bridge systemd-sysv-convert systemd-tmpfiles systemd-tty-ask-password-agent tapestat tar taskset tcpd tcpdmatch tcpdump tcpslice tcptraceroute tcsh teamd teamdctl teamnl telinit thin_check thin_delta thin_dump thin_ls thin_metadata_size thin_repair thin_restore thin_rmap thin_trim timedatectl tipc tload top tracepath tracepath6 traceroute traceroute6 try-from tune2fs udevadm ul umount umount.nfs umount.nfs4 uname26 unicode_start unicode_stop unix_chkpwd unlz4 unshare unxz unzip unzipsfx update-motd update-pciids updatedb uptime userhelper usernetctl usleep utmpdump uuidgen verify_blkparse verifytree vgcfgbackup vgcfgrestore vgchange vgck vgconvert vgcreate vgdisplay vgexport vgextend vgimport vgimportclone vgmerge vgmknodes vgreduce vgremove vgrename vgs vgscan vgsplit vigr vim vimdiff vimtutor vipw virt-what visudo vlock vmstat w wall watch wdctl weak-modules wget whatis whereis whiptail wipefs write xfs_admin xfs_bmap xfs_copy xfs_db xfs_estimate xfs_freeze xfs_fsr xfs_growfs xfs_info xfs_io xfs_logprint xfs_mdrestore xfs_metadump xfs_mkfile xfs_ncheck xfs_quota xfs_repair xfs_rtcp xfsdump xfsinvutil xfsrestore xgettext xqmstats xtables-legacy-multi xxd xz xzcat xzcmp xzdec xzdiff xzegrep xzfgrep xzgrep xzless xzmore ypdomainname yum-builddep yum-complete-transaction yum-config-manager yum-debug-dump yum-debug-restore yum-groups-manager yumdb yumdownloader zcat zcmp zdiff zegrep zfgrep zforce zgrep zip zipcloak zipgrep zipinfo zipnote zipsplit zless zmore znew zramctl; do ( set -x && man $c | head -n 20 ); done
+ set +x
+ man a2p
+ head -n 20
A2P(1) Perl Programmers Reference Guide A2P(1)
NAME
a2p - Awk to Perl translator
SYNOPSIS
a2p [options] [filename]
DESCRIPTION
A2p takes an awk script specified on the command line (or from standard input) and produces a comparable perl script on the standard output.
OPTIONS
Options include:
-D<number>
sets debugging flags.
-F<character>
+ man ac
+ head -n 20
AC(1) General Commands Manual AC(1)
NAME
ac - print statistics about users' connect time
SYNOPSIS
ac [ -d | --daily-totals ] [ -y | --print-year ]
[ -p | --individual-totals ] [ people ]
[ -f | --file filename ] [ -a | --all-days ]
[ --complain ] [ --reboots ] [ --supplants ]
[ --timewarps ] [ --compatibility ]
[ --tw-leniency num ] [ --tw-suspicious num ]
[ -z | --print-zeros ] [ --debug ]
[ -V | --version ] [ -h | --help ]
DESCRIPTION
ac prints out a report of connect time (in hours) based on the logins/logouts in the current wtmp file. A total is also printed out.
+ man accessdb
+ head -n 20
ACCESSDB(8) Manual pager utils ACCESSDB(8)
NAME
accessdb - dumps the content of a man-db database in a human readable format
SYNOPSIS
/usr/sbin/accessdb [-d?V] [<index-file>]
DESCRIPTION
accessdb will output the data contained within a man-db database in a human readable form. By default, it will dump the data from /var/cache/man/index.<db-type>, where <db-type> is dependent on the database library in use.
Supplying an argument to accessdb will override this default.
$mtime$ -> "795987034"
$version$ -> "2.3.1"
apropos -> "1 1 795981542 A - - search the manual page names and descriptions"
catman -> "8 8 795981544 A - - create or update the pre-formatted manual pages"
man -> "1 1 795981542 A - - an interface to the on-line reference manuals"
+ man accton
+ head -n 20
ACCTON(8) System Manager's Manual ACCTON(8)
NAME
accton - turns process accounting on or off
SYNOPSIS
accton [OPTION] on|off|filename
accton [ -V | --version ] [ -h | --help ]
DESCRIPTION
accton filename turns on process accounting.
OPTIONS
-V, --version
Print the version number of ac to standard output and quit.
-h, --help
Prints the usage string and default locations of system files to standard output and exits.
+ man addpart
+ head -n 20
ADDPART(8) System Administration ADDPART(8)
NAME
addpart - tell the kernel about the existence of a partition
SYNOPSIS
addpart device partition start length
DESCRIPTION
addpart tells the Linux kernel about the existence of the specified partition. The command is a simple wrapper around the "add partition" ioctl.
This command doesn't manipulate partitions on a block device.
PARAMETERS
device The disk device.
partition
+ man addr2line
+ head -n 20
ADDR2LINE(1) GNU Development Tools ADDR2LINE(1)
NAME
addr2line - convert addresses into file names and line numbers.
SYNOPSIS
addr2line [-a|--addresses]
[-b bfdname|--target=bfdname]
[-C|--demangle[=style]]
[-e filename|--exe=filename]
[-f|--functions] [-s|--basename]
[-i|--inlines]
[-p|--pretty-print]
[-j|--section=name]
[-H|--help] [-V|--version]
[addr addr ...]
DESCRIPTION
+ man agetty
+ head -n 20
AGETTY(8) System Administration AGETTY(8)
NAME
agetty - alternative Linux getty
SYNOPSIS
agetty [options] port [baud_rate...] [term]
DESCRIPTION
agetty opens a tty port, prompts for a login name and invokes the /bin/login command. It is normally invoked by init(8).
agetty has several non-standard features that are useful for hardwired and for dial-in lines:
· Adapts the tty settings to parity bits and to erase, kill, end-of-line and uppercase characters when it reads a login name. The program can handle 7-bit characters with even, odd, none or space parity, and 8-bit characters with no parity. The following special characters are recognized: Control-U (kill); DEL and backspace (erase); carriage return and line feed (end of line). See also the
--erase-chars and --kill-chars options.
+ man amazon-ssm-agent
+ head -n 20
No manual entry for amazon-ssm-agent
+ man anacron
+ head -n 20
ANACRON(8) System Administration ANACRON(8)
NAME
anacron - runs commands periodically
SYNOPSIS
anacron [-s] [-f] [-n] [-d] [-q] [-t anacrontab] [-S spooldir] [job]
anacron [-S spooldir] -u [-t anacrontab] [job]
anacron [-V|-h]
anacron -T [-t anacrontab]
DESCRIPTION
Anacron is used to execute commands periodically, with a frequency specified in days. Unlike cron(8), it does not assume that the machine is running continuously. Hence, it can be used on machines that are not running 24 hours a day to control regular jobs as daily, weekly, and monthly jobs.
Anacron reads a list of jobs from the /etc/anacrontab configuration file (see anacrontab(5)). This file contains the list of jobs that Anacron controls. Each job entry specifies a period in days, a delay in minutes, a unique job identifier, and a shell command.
For each job, Anacron checks whether this job has been executed in the last n days, where n is the time period specified for that job. If a job has not been executed in n days or more, Anacron runs the job's shell command, after waiting for the number of minutes specified as the delay parameter.
+ man apropos
+ head -n 20
APROPOS(1) Manual pager utils APROPOS(1)
NAME
apropos - search the manual page names and descriptions
SYNOPSIS
apropos [-dalv?V] [-e|-w|-r] [-s list] [-m system[,...]] [-M path] [-L locale] [-C file] keyword ...
DESCRIPTION
Each manual page has a short description available within it. apropos searches the descriptions for instances of keyword.
keyword is usually a regular expression, as if (-r) was used, or may contain wildcards (-w), or match the exact keyword (-e). Using these options, it may be necessary to quote the keyword or escape (\) the special characters to stop the shell from interpreting them.
The standard matching rules allow matches to be made against the page name and word boundaries in the description.
The database searched by apropos is updated by the mandb program. Depending on your installation, this may be run by a periodic cron job, or may need to be run manually after new manual pages have been installed.
OPTIONS
+ man ar
+ head -n 20
AR(1) GNU Development Tools AR(1)
NAME
ar - create, modify, and extract from archives
SYNOPSIS
ar [-X32_64] [-]p[mod] [--plugin name] [--target bfdname] [relpos] [count] archive [member...]
DESCRIPTION
The GNU ar program creates, modifies, and extracts from archives. An archive is a single file holding a collection of other files in a structure that makes it possible to retrieve the original individual files (called members of the archive).
The original files' contents, mode (permissions), timestamp, owner, and group are preserved in the archive, and can be restored on extraction.
GNU ar can maintain archives whose members have names of any length; however, depending on how ar is configured on your system, a limit on member-name length may be imposed for compatibility with archive formats maintained with other tools. If it exists, the limit is often 15 characters (typical of formats related to a.out) or 16 characters (typical of formats related to coff).
ar is considered a binary utility because archives of this sort are most often used as libraries holding commonly needed subroutines.
ar creates an index to the symbols defined in relocatable object modules in the archive when you specify the modifier s. Once created, this index is updated in the archive whenever ar makes a change to its contents (save for the q update operation). An archive with such an index speeds up linking to the library, and allows routines in the library to call each other without regard to their placement
+ man arp
+ head -n 20
ARP(8) Linux System Administrator's Manual ARP(8)
NAME
arp - manipulate the system ARP cache
SYNOPSIS
arp [-vn] [-H type] [-i if] [-ae] [hostname]
arp [-v] [-i if] -d hostname [pub]
arp [-v] [-H type] [-i if] -s hostname hw_addr [temp]
arp [-v] [-H type] [-i if] -s hostname hw_addr [netmask nm] pub
arp [-v] [-H type] [-i if] -Ds hostname ifname [netmask nm] pub
arp [-vnD] [-H type] [-i if] -f [filename]
+ man arpd
+ head -n 20
ARPD(8) System Manager's Manual ARPD(8)
NAME
arpd - userspace arp daemon.
SYNOPSIS
Usage: arpd [ -lkh? ] [ -a N ] [ -b dbase ] [ -B number ] [ -f file ] [-p interval ] [ -n time ] [ -R rate ] [ <INTERFACES> ]
DESCRIPTION
The arpd daemon collects gratuitous ARP information, saving it on local disk and feeding it to the kernel on demand to avoid redundant broadcasting due to limited size of the kernel ARP cache.
OPTIONS
-h -? Print help
-l Dump the arpd database to stdout and exit. The output consists of three columns: the interface index, the IP address of the interface, and the MAC address of the interface. Negative entries for dead hosts are also shown, in this case the MAC address is replaced by the word FAILED followed by a colon and the most recent time when the fact that the host is dead was proven.
+ man arping
+ head -n 20
ARPING(8) System Manager's Manual: iputils ARPING(8)
NAME
arping - send ARP REQUEST to a neighbour host
SYNOPSIS
arping [-AbDfhqUV] [-c count] [-w deadline] [-s source] [-I interface] destination
DESCRIPTION
Ping destination on device interface by ARP packets, using source address source.
OPTIONS
-A The same as -U, but ARP REPLY packets used instead of ARP REQUEST.
-b Send only MAC level broadcasts. Normally arping starts from sending broadcast, and switch to unicast after reply received.
-c count
+ man as
+ head -n 20
AS(1) GNU Development Tools AS(1)
NAME
AS - the portable GNU assembler.
SYNOPSIS
as [-a[cdghlns][=file]] [--alternate] [-D]
[--compress-debug-sections] [--nocompress-debug-sections]
[--debug-prefix-map old=new]
[--defsym sym=val] [-f] [-g] [--gstabs]
[--gstabs+] [--gdwarf-2] [--gdwarf-sections]
[--help] [-I dir] [-J]
[-K] [-L] [--listing-lhs-width=NUM]
[--listing-lhs-width2=NUM] [--listing-rhs-width=NUM]
[--listing-cont-lines=NUM] [--keep-locals]
[--no-pad-sections]
[-o objfile] [-R]
[--hash-size=NUM] [--reduce-memory-overheads]
+ man at
+ head -n 20
AT(1) General Commands Manual AT(1)
NAME
at, batch, atq, atrm - queue, examine or delete jobs for later execution
SYNOPSIS
at [-V] [-q queue] [-f file] [-mMlv] timespec...
at [-V] [-q queue] [-f file] [-mMkv] [-t time]
at -c job [job...]
atq [-V] [-q queue]
at [-rd] job [job...]
atrm [-V] job [job...]
batch
at -b
DESCRIPTION
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh.
+ man atd
+ head -n 20
ATD(8) System Manager's Manual ATD(8)
NAME
atd - run jobs queued for later execution
SYNOPSIS
atd [-l load_avg] [-b batch_interval] [-d] [-f] [-n] [-s]
DESCRIPTION
atd runs jobs queued by at(1).
OPTIONS
-l Specifies a limiting load factor, over which batch jobs should not be run, instead of the compile-time choice of 0.8. For an SMP system with n CPUs, you will probably want to set this higher than n-1.
-b Specify the minimum interval in seconds between the start of two batch jobs (60 default).
-d Debug; print error messages to standard error instead of using syslog(3). This option also implies -f.
+ man atq
+ head -n 20
AT(1) General Commands Manual AT(1)
NAME
at, batch, atq, atrm - queue, examine or delete jobs for later execution
SYNOPSIS
at [-V] [-q queue] [-f file] [-mMlv] timespec...
at [-V] [-q queue] [-f file] [-mMkv] [-t time]
at -c job [job...]
atq [-V] [-q queue]
at [-rd] job [job...]
atrm [-V] job [job...]
batch
at -b
DESCRIPTION
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh.
+ man atrm
+ head -n 20
AT(1) General Commands Manual AT(1)
NAME
at, batch, atq, atrm - queue, examine or delete jobs for later execution
SYNOPSIS
at [-V] [-q queue] [-f file] [-mMlv] timespec...
at [-V] [-q queue] [-f file] [-mMkv] [-t time]
at -c job [job...]
atq [-V] [-q queue]
at [-rd] job [job...]
atrm [-V] job [job...]
batch
at -b
DESCRIPTION
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh.
+ man atrun
+ head -n 20
ATRUN(8) Linux Programmer's Manual ATRUN(8)
NAME
atrun - run jobs queued for later execution
SYNOPSIS
atrun [-l load_avg] [-d]
DESCRIPTION
atrun runs jobs queued by at(1). It is a shell script invoking /usr/sbin/atd with the -s option, and is provided for backward compatibility with older installations.
SEE ALSO
at(1), atd(8).
AUTHOR
At was mostly written by Thomas Koenig, [email protected].
+ man attr
+ head -n 20
ATTR(1) XFS Compatibility API ATTR(1)
NAME
attr - extended attributes on XFS filesystem objects
SYNOPSIS
attr [ -LRSq ] -s attrname [ -V attrvalue ] pathname
attr [ -LRSq ] -g attrname pathname
attr [ -LRSq ] -r attrname pathname
attr [ -LRSq ] -l pathname
OVERVIEW
Extended attributes implement the ability for a user to attach name:value pairs to objects within the XFS filesystem.
+ man audispd
+ head -n 20
AUDISPD:(8) System Administration Utilities AUDISPD:(8)
NAME
audispd - an event multiplexor
SYNOPSIS
audispd [-c <config_dir>].SHDESCRIPTION audispd is an audit event multiplexor. It has to be started by the audit daemon in order to get events. It takes audit events and distributes them to child programs that want to analyze events in realtime. When the audit daemon receives a SIGTERM or SIGHUP, it passes that signal to the dispatcher, too. The dispatcher in turn passes those signals to its child pro‐
cesses.
The child programs install a configuration file in a plugins directory, /etc/audisp/plugins.d. Filenames are not allowed to have more than one '.' in the name or it will be treated as a backup copy and skipped. Options are given one per line with an equal sign between the keyword and its value. The available options are as follows:
active The options for this are yes or no.
direction
The option is dictated by the plugin. In or out are the only choices. You cannot make a plugin operate in a way it wasn't designed just by changing this option.This option is to give a clue to the event dispatcher about which direction events flow. NOTE: inbound events are not supported yet.
path This is the absolute path to the plugin executable. In the case of internal plugins, it would be the name of the plugin.
+ man auditctl
+ head -n 20
AUDITCTL:(8) System Administration Utilities AUDITCTL:(8)
NAME
auditctl - a utility to assist controlling the kernel's audit system
SYNOPSIS
auditctl [options]
DESCRIPTION
The auditctl program is used to configure kernel options related to auditing, to see status of the configuration, and to load discretionary audit rules.
CONFIGURATION OPTIONS
-b backlog
Set max number of outstanding audit buffers allowed (Kernel Default=64) If all buffers are full, the failure flag is consulted by the kernel for action.
-c Continue loading rules in spite of an error. This summarizes the results of loading the rules. The exit code will not be success if any rule fails to load.
-D Delete all rules and watches. This can take a key option (-k), too.
+ man auditd
+ head -n 20
AUDITD(8) System Administration Utilities AUDITD(8)
NAME
auditd - The Linux Audit daemon
SYNOPSIS
auditd [-f] [-l] [-n] [-s disable|enable|nochange] [-c <config_dir>]
DESCRIPTION
auditd is the userspace component to the Linux Auditing System. It's responsible for writing audit records to the disk. Viewing the logs is done with the ausearch or aureport utilities. Configuring the audit system or loading rules is done with the auditctl utility. During startup, the rules in /etc/audit/audit.rules are read by auditctl and loaded into the kernel. Alternately, there is also an augen‐
rules program that reads rules located in /etc/audit/rules.d/ and compiles them into an audit.rules file. The audit daemon itself has some configuration options that the admin may wish to customize. They are found in the auditd.conf file.
OPTIONS
-f leave the audit daemon in the foreground for debugging. Messages also go to stderr rather than the audit log.
-l allow the audit daemon to follow symlinks for config files.
-n no fork. This is useful for running off of inittab or systemd.
+ man augenrules
+ head -n 20
AUGENRULES:(8) System Administration Utilities AUGENRULES:(8)
NAME
augenrules - a script that merges component audit rule files
SYNOPSIS
augenrules [--check] [--load]
DESCRIPTION
augenrules is a script that merges all component audit rules files, found in the audit rules directory, /etc/audit/rules.d, placing the merged file in /etc/audit/audit.rules. Component audit rule files, must end in .rules in order to be processed. All other files in /etc/audit/rules.d are ignored.
The files are concatenated in order, based on their natural sort (see -v option of ls(1)) and stripped of empty and comment (#) lines.
The last processed -D directive without an option, if present, is always emitted as the first line in the resultant file. Those with an option are replicated in place. The last processed -b directive, if present, is always emitted as the second line in the resultant file. The last processed -f directive, if present, is always emitted as the third line in the resultant file. The last processed -e
directive, if present, is always emitted as the last line in the resultant file.
The generated file is only copied to /etc/audit/audit.rules, if it differs.
+ man aulast
+ head -n 20
AULAST:(8) System Administration Utilities AULAST:(8)
NAME
aulast - a program similar to last
SYNOPSIS
aulast [ options ]
DESCRIPTION
aulast is a program that prints out a listing of the last logged in users similarly to the program last and lastb. Aulast searches back through the audit logs or the given audit log file and displays a list of all users logged in (and out) based on the range of time in the audit logs. Names of users and tty’s can be given, in which case aulast will show only those entries matching the arguments.
The pseudo user reboot logs in each time the system is rebooted. Thus last reboot will show a log of all reboots since the log file was created.
The main difference that a user will notice is that aulast print events from oldest to newest, while last prints records from newest to oldest. Also, the audit system is not notified each time a tty or pty is allocated, so you may not see quite as many records indicating users and their tty's.
OPTIONS
+ man aulastlog
+ head -n 20
AULASTLOG:(8) System Administration Utilities AULASTLOG:(8)
NAME
aulastlog - a program similar to lastlog
SYNOPSIS
aulastlog [ options ]
DESCRIPTION
aulastlog is a program that prints out the last login for all users of the local machine similar to the way lastlog does. The login-name, port, and last login time will be printed.
If the user has never logged in, the message ** Never logged in** will be displayed instead of the port and time.
OPTIONS
-u, --user
Print the lastlog record for user with specified LOGIN only.
+ man aureport
+ head -n 20
AUREPORT:(8) System Administration Utilities AUREPORT:(8)
NAME
aureport - a tool that produces summary reports of audit daemon logs
SYNOPSIS
aureport [options]
DESCRIPTION
aureport is a tool that produces summary reports of the audit system logs. The aureport utility can also take input from stdin as long as the input is the raw log data. The reports have a column label at the top to help with interpretation of the various fields. Except for the main summary report, all reports have the audit event number. You can subsequently lookup the full event with ausearch -a event
number. You may need to specify start & stop times if you get multiple hits. The reports produced by aureport can be used as building blocks for more complicated analysis.
OPTIONS
-au, --auth
Report about authentication attempts
-a, --avc
+ man ausearch
+ head -n 20
AUSEARCH:(8) System Administration Utilities AUSEARCH:(8)
NAME
ausearch - a tool to query audit daemon logs
SYNOPSIS
ausearch [options]
DESCRIPTION
ausearch is a tool that can query the audit daemon logs based for events based on different search criteria. The ausearch utility can also take input from stdin as long as the input is the raw log data. Each commandline option given forms an "and" statement. For example, searching with -m and -ui means return events that have both the requested type and match the user id given. An exception is the -m
and -n options; multiple record types and nodes are allowed in a search which will return any matching node and record.
It should also be noted that each syscall excursion from user space into the kernel and back into user space has one event ID that is unique. Any auditable event that is triggered during this trip share this ID so that they may be correlated.
Different parts of the kernel may add supplemental records. For example, an audit event on the syscall "open" will also cause the kernel to emit a PATH record with the file name. The ausearch utility will present all records that make up one event together. This could mean that even though you search for a specific kind of record, the resulting events may contain SYSCALL records.
Also be aware that not all record types have the requested information. For example, a PATH record does not have a hostname or a loginuid.
+ man ausyscall
+ head -n 20
AUSYSCALL:(8) System Administration Utilities AUSYSCALL:(8)
NAME
ausyscall - a program that allows mapping syscall names and numbers
SYNOPSIS
ausyscall [arch] name | number | --dump | --exact
DESCRIPTION
ausyscall is a program that prints out the mapping from syscall name to number and reverse for the given arch. The arch can be anything returned by `uname -m`. If arch is not given, the program will take a guess based on the running image. You may give the syscall name or number and it will find the opposite. You can also dump the whole table with the --dump option. By default a syscall name lookup
will be a substring match meaning that it will try to match all occurrences of the given name with syscalls. So giving a name of chown will match both fchown and chown as any other syscall with chown in its name. If this behavior is not desired, pass the --exact flag and it will do an exact string match.
This program can be used to verify syscall numbers on a biarch platform for rule optimization. For example, suppose you had an auditctl rule:
-a always, exit -S open -F exit=-EPERM -k fail-open
If you wanted to verify that both 32 and 64 bit programs would be audited, run "ausyscall i386 open" and then "ausyscall x86_64 open". Look at the returned numbers. If they are different, you will have to write two auditctl rules to get complete coverage.
+ man authconfig
+ head -n 20
AUTHCONFIG(8) System Manager's Manual AUTHCONFIG(8)
NAME
authconfig, authconfig-tui - an interface for configuring system authentication resources
SYNOPSIS
authconfig
[options] {--update|--updateall|--test|--probe|--restorebackup <name>|--savebackup <name>|--restorelastbackup}
DESCRIPTION
authconfig provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as /etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and Winbind client configuration is also provided.
If --test action is specified, the authconfig just reads the current settings from the various configuration files and prints their values. If --update action is specified, authconfig must be run by root (or through console helper), and configuration changes are saved. Only the files affected by the configuration changes are overwritten. If --updateall action is specified, authconfig must be run by
root (or through console helper), and all configuration files are written. The --probe action instructs authconfig to use DNS and other means to guess at configuration information for the current host, print its guesses if it finds them, to standard output, and exit.
The --restorebackup, --savebackup, and --restorelastbackup actions provide a possibility to save and later restore a backup of configuration files which authconfig modifies. Authconfig also saves an automatic backup of configuration files before every configuration change. This special backup can be restored by the --restorelastbackup action.
If --nostart is specified (which is what the install program does), ypbind or other daemons will not be started or stopped immediately following program execution, but only enabled to start or stop at boot time.
+ man authconfig-tui
+ head -n 20
AUTHCONFIG(8) System Manager's Manual AUTHCONFIG(8)
NAME
authconfig, authconfig-tui - an interface for configuring system authentication resources
SYNOPSIS
authconfig
[options] {--update|--updateall|--test|--probe|--restorebackup <name>|--savebackup <name>|--restorelastbackup}
DESCRIPTION
authconfig provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as /etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and Winbind client configuration is also provided.
If --test action is specified, the authconfig just reads the current settings from the various configuration files and prints their values. If --update action is specified, authconfig must be run by root (or through console helper), and configuration changes are saved. Only the files affected by the configuration changes are overwritten. If --updateall action is specified, authconfig must be run by
root (or through console helper), and all configuration files are written. The --probe action instructs authconfig to use DNS and other means to guess at configuration information for the current host, print its guesses if it finds them, to standard output, and exit.
The --restorebackup, --savebackup, and --restorelastbackup actions provide a possibility to save and later restore a backup of configuration files which authconfig modifies. Authconfig also saves an automatic backup of configuration files before every configuration change. This special backup can be restored by the --restorelastbackup action.
If --nostart is specified (which is what the install program does), ypbind or other daemons will not be started or stopped immediately following program execution, but only enabled to start or stop at boot time.
+ man auvirt
+ head -n 20
AUVIRT(8) System Administration Utilities AUVIRT(8)
NAME
auvirt - a program that shows data related to virtual machines
SYNOPSIS
auvirt [ OPTIONS ]
DESCRIPTION
auvirt shows a list of guest sessions found in the audit logs. If a guest is specified, only the events related to that guest is considered. To specify a guest, both UUID or VM name can be given.
For each guest session the tool prints a record with the domain name, the user that started the guest, the time when the guest was started and the time when the guest was stopped.
If the option "--all-events" is given a more detailed output is shown. In this mode other records are shown for guest's stops, resource assignments, AVC and anomaly events. The first field indicates the event type and can have the following values: start, stop, res, avc, and anom.
Resource assignments have the additional fields: resource type, reason and resource. And AVC records have the following additional fields: operation, result, command and target.
+ man avcstat
+ head -n 20
avcstat(8) SELinux Command Line documentation avcstat(8)
NAME
avcstat - Display SELinux AVC statistics
SYNOPSIS
avcstat [-c] [-f status_file] [interval]
DESCRIPTION
Display SELinux AVC statistics. If the interval parameter is specified, the program will loop, displaying updated statistics every interval seconds. Relative values are displayed by default.
OPTIONS
-c Display the cumulative values.
-f Specifies the location of the AVC statistics file, defaulting to /sys/fs/selinux/avc/cache_stats.
AUTHOR
This manual page was written by Dan Walsh <[email protected]>. The program was written by James Morris <[email protected]>.
+ man aws
+ head -n 20
No manual entry for aws
+ man aws_completer
+ head -n 20
No manual entry for aws_completer
+ man badblocks
+ head -n 20
BADBLOCKS(8) System Manager's Manual BADBLOCKS(8)
NAME
badblocks - search a device for bad blocks
SYNOPSIS
badblocks [ -svwnfBX ] [ -b block-size ] [ -c blocks_at_once ] [ -e max_bad_blocks ] [ -d read_delay_factor ] [ -i input_file ] [ -o output_file ] [ -p num_passes ] [ -t test_pattern ] device [ last-block ] [ first-block ]
DESCRIPTION
badblocks is used to search for bad blocks on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdc1). last-block is the last block to be checked; if it is not specified, the last block on the device is used as a default. first-block is an optional parameter specifying the starting block number for the test, which allows the testing to start in the
middle of the disk. If it is not specified the first block on the disk is used as a default.
Important note: If the output of badblocks is going to be fed to the e2fsck or mke2fs programs, it is important that the block size is properly specified, since the block numbers which are generated are very dependent on the block size in use by the filesystem. For this reason, it is strongly recommended that users not run badblocks directly, but rather use the -c option of the e2fsck and mke2fs pro‐
grams.
OPTIONS
-b block-size
Specify the size of blocks in bytes. The default is 1024.
+ man batch
+ head -n 20
AT(1) General Commands Manual AT(1)
NAME
at, batch, atq, atrm - queue, examine or delete jobs for later execution
SYNOPSIS
at [-V] [-q queue] [-f file] [-mMlv] timespec...
at [-V] [-q queue] [-f file] [-mMkv] [-t time]
at -c job [job...]
atq [-V] [-q queue]
at [-rd] job [job...]
atrm [-V] job [job...]
batch
at -b
DESCRIPTION
at and batch read commands from standard input or a specified file which are to be executed at a later time, using /bin/sh.
+ man bc
+ head -n 20
bc(1) General Commands Manual bc(1)
NAME
bc - An arbitrary precision calculator language
SYNTAX
bc [ -hlwsqv ] [long-options] [ file ... ]
DESCRIPTION
bc is a language that supports arbitrary precision numbers with interactive execution of statements. There are some similarities in the syntax to the C programming language. A standard math library is available by command line option. If requested, the math library is defined before processing any files. bc starts by processing code from all the files listed on the command line in the order listed.
After all files have been processed, bc reads from the standard input. All code is executed as it is read. (If a file contains a command to halt the processor, bc will never read from the standard input.)
This version of bc contains several extensions beyond traditional bc implementations and the POSIX draft standard. Command line options can cause these extensions to print a warning or to be rejected. This document describes the language accepted by this processor. Extensions will be identified as such.
OPTIONS
-h, --help
Print the usage and exit.
+ man blkdeactivate
+ head -n 20
BLKDEACTIVATE(8) BLKDEACTIVATE(8)
NAME
blkdeactivate — utility to deactivate block devices
SYNOPSIS
blkdeactivate [-d dm_options] [-e] [-h] [-l lvm_options] [-m mpath_options] [-r mdraid_options] [-u] [-v] [device]
DESCRIPTION
The blkdeactivate utility deactivates block devices. For mounted block devices, it attempts to unmount it automatically before trying to deactivate. The utility currently supports device-mapper devices (DM), including LVM volumes and software RAID MD devices. LVM volumes are handled directly using the lvm(8) command, the rest of device-mapper based devices are handled using the dmsetup(8) command. MD
devices are handled using the mdadm(8) command.
OPTIONS
-d, --dmoptions dm_options
Comma separated list of device-mapper specific options. Accepted dmsetup(8) options are:
retry Retry removal several times in case of failure.
+ man blkdiscard
+ head -n 20
BLKDISCARD(8) System Administration BLKDISCARD(8)
NAME
blkdiscard - discard sectors on a device
SYNOPSIS
blkdiscard [options] [-o offset] [-l length] device
DESCRIPTION
blkdiscard is used to discard device sectors. This is useful for solid-state drivers (SSDs) and thinly-provisioned storage. Unlike fstrim(8), this command is used directly on the block device.
By default, blkdiscard will discard all blocks on the device. Options may be used to modify this behavior based on range or size, as explained below.
The device argument is the pathname of the block device.
WARNING: All data in the discarded region on the device will be lost!
OPTIONS
+ man blkid
+ head -n 20
BLKID(8) System Administration BLKID(8)
NAME
blkid - locate/print block device attributes
SYNOPSIS
blkid --label label | --uuid uuid
blkid [--no-encoding --garbage-collect --list-one --cache-file file] [--output format] [--match-tag tag] [--match-token NAME=value] [device ...]
blkid --probe [--offset offset] [--output format] [--size size] [--match-tag tag] [--match-types list] [--usages list] device ...
blkid --info [--output format] [--match-tag tag] device ...
+ man blkiomon
+ head -n 20
BLKIOMON(8) BLKIOMON(8)
NAME
blkiomon - monitor block device I/O based o blktrace data
SYNOPSIS
blkiomon -I interval [ -h file ] [ -b file ] [ -d file ] [ -D file ] [ -Q path_name -q msg_queue_id -m msg_id ] [ -V ]
DESCRIPTION
blkiomon is a block device I/O monitor. It periodically generates per-device request size and request latency statistics from blktrace data. It provides histograms as well as data that can be used to calculate min, max, average and variance. For this purpose, it consumes D and C traces read from stdin. Note, that this doesn't work for logical volumes, as high-level drivers don't see the completion of
the events (C).
There are options for binary output and human-readable output to files and stdout. Output to a message queue is supported as well.
+ man blkmapd
+ head -n 20
blkmapd(8) System Manager's Manual blkmapd(8)
NAME
blkmapd - pNFS block layout mapping daemon
SYNOPSIS
blkmapd [-h] [-d] [-f]
DESCRIPTION
The blkmapd daemon performs device discovery and mapping for the parallel NFS (pNFS) block layout client [RFC5663].
The pNFS block layout protocol builds a complex storage hierarchy from a set of simple volumes. These simple volumes are addressed by content, using a signature on the volume to uniquely name each one. The daemon locates a volume by examining each block device in the system for the given signature.
The topology typically consists of a hierarchy of volumes built by striping, slicing, and concatenating the simple volumes. The blkmapd daemon uses the device-mapper driver to construct logical devices that reflect the server topology, and passes these devices to the kernel for use by the pNFS block layout client.
OPTIONS
-h Display usage message.
+ man blkparse
+ head -n 20
BLKPARSE(1) BLKPARSE(1)
NAME
blkparse - produce formatted output of event streams of block devices
SYNOPSIS
blkparse [ options ]
DESCRIPTION
The blkparse utility will attempt to combine streams of events for various devices on various CPUs, and produce a formatted output of the event information. Specifically, it will take the (machine-readable) output of the blktrace utility and convert it to a nicely formatted and human-readable form.
As with blktrace, some details concerning blkparse will help in understanding the command line options presented below.
+ man blkrawverify
+ head -n 20
BLKRAWVERIFY(1) BLKRAWVERIFY(1)
NAME
blkrawverify - verifies an output file produced by blkparse
SYNOPSIS
blkrawverify <dev> [<dev>...]
DESCRIPTION
The blkrawverify utility can be used to verify data retrieved via blktrace. It will check for valid event formats, forward progressing sequence numbers and time stamps, also does reasonable checks for other potential issues within individual events.
Errors found will be tracked in <dev>.verify.out.
+ man blktrace
+ head -n 20
BLKTRACE(8) BLKTRACE(8)
NAME
blktrace - generate traces of the i/o traffic on block devices
SYNOPSIS
blktrace -d dev [ -r debugfs_path ] [ -o output ] [ -w time ] [ -a action ] [ -A action_mask ] [ -v ]
DESCRIPTION
blktrace is a block layer IO tracing mechanism which provides detailed information about request queue operations up to user space. There are three major components: a kernel component, a utility to record the i/o trace information for the kernel to user space, and utilities to analyse and view the trace information. This man page describes blktrace, which records the i/o event trace information for a
specific block device to a file.
The blktrace utility extracts event traces from the kernel (via the relaying through the debug file system). Some background details concerning the run-time behaviour of blktrace will help to understand some of the more arcane command line options:
+ man blkzone
+ head -n 20
BLKZONE(8) System Administration BLKZONE(8)
NAME
blkzone - run zone command on a device
SYNOPSIS
blkzone command [options] device
DESCRIPTION
blkzone is used to run zone command on device that support the Zoned Block Commands (ZBC) or Zoned-device ATA Commands (ZAC). The zones to operate on can be specified using the offset, count and length options.
The device argument is the pathname of the block device.
COMMANDS
report
The command blkzone report is used to report device zone information.
By default, the command will report all zones from the start of the block device. Options may be used to modify this behavior, changing the starting zone or the size of the report, as explained below.
+ man blockdev
+ head -n 20
BLOCKDEV(8) System Administration BLOCKDEV(8)
NAME
blockdev - call block device ioctls from the command line
SYNOPSIS
blockdev [-q] [-v] command [command...] device [device...]
blockdev --report [device...]
DESCRIPTION
The utility blockdev allows one to call block device ioctls from the command line.
OPTIONS
-V Print version and exit.
-q Be quiet.
-v Be verbose.
+ man bno_plot.py
+ head -n 20
No manual entry for bno_plot.py
+ man bond2team
+ head -n 20
BOND2TEAM(1) Bonding to Team conversion tool BOND2TEAM(1)
NAME
bond2team — Converts bonding configuration to team
SYNOPSIS
bond2team [options]
DESCRIPTION
bond2team is a tool to convert bonding options to team trying as much as possible to keep the original functionality.
The resulting files are saved in a temporary directory using ifcfg style by default. In the case of converting an ifcfg file, it translates the bonding options to team, preserving all other options. In that case, it converts the respective slave ifcfg files to team port, preserving all their other options too. In case of converting from given bonding options in the command line, the tool can use the
specified ports as team ports.
OPTIONS
--master <interface>
Specify the interface name or ifcfg file to convert. If the interface name is specified, the tool will look at /etc/sysconfig/network-scripts/ for the respective ifcfg file.
+ man bootctl
+ head -n 20
BOOTCTL(1) bootctl BOOTCTL(1)
NAME
bootctl - Control the firmware and boot manager settings
SYNOPSIS
bootctl [OPTIONS...] {COMMAND}
DESCRIPTION
bootctl may be used to query or (in the future) change the firmware and boot manager settings.
Firmware information is available only on EFI systems.
Currently, only the gummiboot(8) boot manager implements the required boot loader interface to provide complete boot manager information.
OPTIONS
The following options are understood:
+ man brctl
+ head -n 20
BRCTL(8) BRCTL(8)
NAME
brctl - ethernet bridge administration
SYNOPSIS
brctl [command]
DESCRIPTION
brctl is used to set up, maintain, and inspect the ethernet bridge configuration in the linux kernel.
An ethernet bridge is a device commonly used to connect different networks of ethernets together, so that these ethernets will appear as one ethernet to the participants.
Each of the ethernets being connected corresponds to one physical interface in the bridge. These individual ethernets are bundled into one bigger ('logical') ethernet, this bigger ethernet corresponds to the bridge network interface.
INSTANCES
+ man bridge
+ head -n 20
BRIDGE(8) Linux BRIDGE(8)
NAME
bridge - show / manipulate bridge addresses and devices
SYNOPSIS
bridge [ OPTIONS ] OBJECT { COMMAND | help }
OBJECT := { link | fdb | mdb | vlan | monitor }
OPTIONS := { -V[ersion] | -s[tatistics] | -n[etns] name | -b[atch] filename | -j[son] }
bridge link set dev DEV [ cost COST ] [ priority PRIO ] [ state STATE] [ guard { on | off } ] [ hairpin { on | off } ] [ fastleave { on | off } ] [ root_block { on | off } ] [ learning { on | off } ] [ learning_sync { on | off } ] [ flood { on | off } ] [ hwmode { vepa | veb } ] [ mcast_flood { on | off } ] [ neigh_suppress { on | off } ] [ vlan_tunnel { on | off } ] [ self ] [ master ]
bridge link [ show ] [ dev DEV ]
+ man btrace
+ head -n 20
BTRACE(8) BTRACE(8)
NAME
btrace - perform live tracing for block devices
SYNOPSIS
btrace [-s] [-t] [-w N] [-n N] [-b N] [-r <dbg mnt>] [-a <trace>...] <dev>...
DESCRIPTION
The btrace script provides a quick and easy way to do live tracing of block devices. It calls blktrace on the specified devices and pipes the output through blkparse for formatting. See blktrace (8) for more in-depth information about how blktrace works.
OPTIONS
-s Displays data sorted by program (see blkparse (1)).
+ man btrecord
+ head -n 20
BTRECORD(8) BTRECORD(8)
NAME
btrecord - recreate IO loads recorded by blktrace
SYNOPSIS
Usage:
btrecord [ options ] <dev...>
DESCRIPTION
The btrecord and btreplay tools provide the ability to record and replay IOs captured by the blktrace utility. Attempts are made to maintain ordering, CPU mappings and time-separation of IOs.
+ man btreplay
+ head -n 20
BTREPLAY(8) BTREPLAY(8)
NAME
btreplay - recreate IO loads recorded by blktrace
SYNOPSIS
btreplay [ options ] <dev...>
DESCRIPTION
The btrecord and btreplay tools provide the ability to record and replay IOs captured by the blktrace utility. Attempts are made to maintain ordering, CPU mappings and time-separation of IOs.
The blktrace utility provides the ability to collect detailed traces from the kernel for each IO processed by the block IO layer. The traces provide a complete timeline for each IO processed, including detailed information concerning when an IO was first received by the block IO layer — indicating the device, CPU number, time stamp, IO direction, sector number and IO size (number of sectors). Using
+ man btt
+ head -n 20
BTT(1) BTT(1)
NAME
btt - analyse block i/o traces produces by blktrace
SYNOPSIS
btt
[ -a | --seek-absolute ]
[ -A | --all-data ]
[ -B <output name> | --dump-blocknos=<output name> ]
[ -d <seconds> | --range-delta=<seconds> ]
[ -D <dev;...> | --devices=<dev;...> ]
[ -e <exe,...> | --exes=<exe,...> ]
[ -h | --help ]
[ -i <input name> | --input-file=<input name> ]
[ -I <output name> | --iostat=<output name> ]
+ man bunzip2
+ head -n 20
bzip2(1) General Commands Manual bzip2(1)
NAME
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6
bzcat - decompresses files to stdout
bzip2recover - recovers data from damaged bzip2 files
SYNOPSIS
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ]
bunzip2 [ -fkvsVL ] [ filenames ... ]
bzcat [ -s ] [ filenames ... ]
bzip2recover filename
DESCRIPTION
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors.
+ man busctl
+ head -n 20
BUSCTL(1) busctl BUSCTL(1)
NAME
busctl - Introspect the bus
SYNOPSIS
busctl [OPTIONS...] [COMMAND] [NAME...]
DESCRIPTION
busctl may be used to introspect and monitor the D-Bus bus.
OPTIONS
The following options are understood:
--address=ADDRESS
Connect to the bus specified by ADDRESS instead of using suitable defaults for the system bus (see --system option).
--show-machine
+ man bzcat
+ head -n 20
bzip2(1) General Commands Manual bzip2(1)
NAME
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6
bzcat - decompresses files to stdout
bzip2recover - recovers data from damaged bzip2 files
SYNOPSIS
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ]
bunzip2 [ -fkvsVL ] [ filenames ... ]
bzcat [ -s ] [ filenames ... ]
bzip2recover filename
DESCRIPTION
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors.
+ man bzcmp
+ head -n 20
BZDIFF(1) General Commands Manual BZDIFF(1)
NAME
bzcmp, bzdiff - compare bzip2 compressed files
SYNOPSIS
bzcmp [ cmp_options ] file1 [ file2 ]
bzdiff [ diff_options ] file1 [ file2 ]
DESCRIPTION
Bzcmp and bzdiff are used to invoke the cmp or the diff program on bzip2 compressed files. All options specified are passed directly to cmp or diff. If only 1 file is specified, then the files compared are file1 and an uncompressed file1.bz2. If two files are specified, then they are uncompressed if necessary and fed to cmp or diff. The exit status from cmp or diff is preserved.
SEE ALSO
cmp(1), diff(1), bzmore(1), bzless(1), bzgrep(1), bzip2(1)
BUGS
+ man bzdiff
+ head -n 20
BZDIFF(1) General Commands Manual BZDIFF(1)
NAME
bzcmp, bzdiff - compare bzip2 compressed files
SYNOPSIS
bzcmp [ cmp_options ] file1 [ file2 ]
bzdiff [ diff_options ] file1 [ file2 ]
DESCRIPTION
Bzcmp and bzdiff are used to invoke the cmp or the diff program on bzip2 compressed files. All options specified are passed directly to cmp or diff. If only 1 file is specified, then the files compared are file1 and an uncompressed file1.bz2. If two files are specified, then they are uncompressed if necessary and fed to cmp or diff. The exit status from cmp or diff is preserved.
SEE ALSO
cmp(1), diff(1), bzmore(1), bzless(1), bzgrep(1), bzip2(1)
BUGS
+ man bzgrep
+ head -n 20
BZGREP(1) General Commands Manual BZGREP(1)
NAME
bzgrep, bzfgrep, bzegrep - search possibly bzip2 compressed files for a regular expression
SYNOPSIS
bzgrep [ grep_options ] [ -e ] pattern filename...
bzegrep [ egrep_options ] [ -e ] pattern filename...
bzfgrep [ fgrep_options ] [ -e ] pattern filename...
DESCRIPTION
Bzgrep is used to invoke the grep on bzip2-compressed files. All options specified are passed directly to grep. If no file is specified, then the standard input is decompressed if necessary and fed to grep. Otherwise the given files are uncompressed if necessary and fed to grep.
If bzgrep is invoked as bzegrep or bzfgrep then egrep or fgrep is used instead of grep. If the GREP environment variable is set, bzgrep uses it as the grep program to be invoked. For example:
for sh: GREP=fgrep bzgrep string files
+ man bzip2
+ head -n 20
bzip2(1) General Commands Manual bzip2(1)
NAME
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6
bzcat - decompresses files to stdout
bzip2recover - recovers data from damaged bzip2 files
SYNOPSIS
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ]
bunzip2 [ -fkvsVL ] [ filenames ... ]
bzcat [ -s ] [ filenames ... ]
bzip2recover filename
DESCRIPTION
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors.
+ man bzip2recover
+ head -n 20
bzip2(1) General Commands Manual bzip2(1)
NAME
bzip2, bunzip2 - a block-sorting file compressor, v1.0.6
bzcat - decompresses files to stdout
bzip2recover - recovers data from damaged bzip2 files
SYNOPSIS
bzip2 [ -cdfkqstvzVL123456789 ] [ filenames ... ]
bunzip2 [ -fkvsVL ] [ filenames ... ]
bzcat [ -s ] [ filenames ... ]
bzip2recover filename
DESCRIPTION
bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors.
+ man bzless
+ head -n 20
BZMORE(1) General Commands Manual BZMORE(1)
NAME
bzmore, bzless - file perusal filter for crt viewing of bzip2 compressed text
SYNOPSIS
bzmore [ name ... ]
bzless [ name ... ]
NOTE
In the following description, bzless and less can be used interchangeably with bzmore and more.
DESCRIPTION
Bzmore is a filter which allows examination of compressed or plain text files one screenful at a time on a soft-copy terminal. bzmore works on files compressed with bzip2 and also on uncompressed files. If a file does not exist, bzmore looks for a file of the same name with the addition of a .bz2 suffix.
Bzmore normally pauses after each screenful, printing --More-- at the bottom of the screen. If the user then types a carriage return, one more line is displayed. If the user hits a space, another screenful is displayed. Other possibilities are enumerated later.
Bzmore looks in the file /etc/termcap to determine terminal characteristics, and to determine the default window size. On a terminal capable of displaying 24 lines, the default window size is 22 lines. Other sequences which may be typed when bzmore pauses, and their effects, are as follows (i is an optional integer argument, defaulting to 1) :
+ man bzmore
+ head -n 20
BZMORE(1) General Commands Manual BZMORE(1)
NAME
bzmore, bzless - file perusal filter for crt viewing of bzip2 compressed text
SYNOPSIS
bzmore [ name ... ]
bzless [ name ... ]
NOTE
In the following description, bzless and less can be used interchangeably with bzmore and more.
DESCRIPTION
Bzmore is a filter which allows examination of compressed or plain text files one screenful at a time on a soft-copy terminal. bzmore works on files compressed with bzip2 and also on uncompressed files. If a file does not exist, bzmore looks for a file of the same name with the addition of a .bz2 suffix.
Bzmore normally pauses after each screenful, printing --More-- at the bottom of the screen. If the user then types a carriage return, one more line is displayed. If the user hits a space, another screenful is displayed. Other possibilities are enumerated later.
Bzmore looks in the file /etc/termcap to determine terminal characteristics, and to determine the default window size. On a terminal capable of displaying 24 lines, the default window size is 22 lines. Other sequences which may be typed when bzmore pauses, and their effects, are as follows (i is an optional integer argument, defaulting to 1) :
+ man c++filt
+ head -n 20
C++FILT(1) GNU Development Tools C++FILT(1)
NAME
c++filt - Demangle C++ and Java symbols.
SYNOPSIS
c++filt [-_|--strip-underscore]
[-n|--no-strip-underscore]
[-p|--no-params]
[-t|--types]
[-i|--no-verbose]
[-s format|--format=format]
[--help] [--version] [symbol...]
DESCRIPTION
The C++ and Java languages provide function overloading, which means that you can write many functions with the same name, providing that each function takes parameters of different types. In order to be able to distinguish these similarly named functions C++ and Java encode them into a low-level assembler name which uniquely identifies each different version. This process is known as mangling. The
c++filt [1] program does the inverse mapping: it decodes (demangles) low-level names into user-level names so that they can be read.
+ man c2ph
+ head -n 20
C2PH(1) Perl Programmers Reference Guide C2PH(1)
NAME
c2ph, pstruct - Dump C structures as generated from "cc -g -S" stabs
SYNOPSIS
c2ph [-dpnP] [var=val] [files ...]
OPTIONS
Options:
-w wide; short for: type_width=45 member_width=35 offset_width=8
-x hex; short for: offset_fmt=x offset_width=08 size_fmt=x size_width=04
-n do not generate perl code (default when invoked as pstruct)
-p generate perl code (default when invoked as c2ph)
-v generate perl code, with C decls as comments
+ man cacertdir_rehash
+ head -n 20
CACERTDIR_REHASH(8) System Manager's Manual CACERTDIR_REHASH(8)
NAME
cacertdir_rehash - simple script to create or update hash links to certificate files in a directory
SYNOPSIS
cacertdir_rehash <directory>
DESCRIPTION
cacertdir_rehash is a simple shell script that is called by authconfig and authconfig-gtk. It uses openssl command line utility to create hash symbolic links of certificate files in the specified directory.
NOTES
The script is internal to authconfig and its functionality and command line options might be changed in future.
RETURN CODES
cacertdir_rehash returns 0 on success, non-zero on error.
+ man cache_check
+ head -n 20
cache_check(8) System Manager's Manual cache_check(8)
NAME
cache_check - validates cache metadata on a device or file.
SYNOPSIS
cache_check [options] {device|file}
DESCRIPTION
cache_check checks cache metadata created by the device-mapper cache target on a device or file.
This tool cannot be run on live metadata.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man cache_dump
+ head -n 20
cache_dump(8) System Manager's Manual cache_dump(8)
NAME
cache_dump - dump cache metadata from device or file to standard output.
SYNOPSIS
cache_dump [options] {device|file}
DESCRIPTION
cache_dump dumps binary cache metadata created by the device-mapper cache target on a device or file to standard output for analysis or postprocessing in XML format. XML formatted metadata can be fed into cache_restore in order to put it back onto a metadata device (to process by the device-mapper target), or file.
This tool cannot be run on live metadata.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man cache_metadata_size
+ head -n 20
cache_metadata_size(8) System Manager's Manual cache_metadata_size(8)
NAME
cache_metadata_size - Estimate the size of the metadata device needed for a given configuration.
SYNOPSIS
cache_metadata_size [options]
DESCRIPTION
cache_metadata_size estimates the size of the metadata.
Either --nr-blocks, or --block-size and --device-size must be specified.
OPTIONS
--nr-blocks {natural}
Specify the number of cache blocks.
--block-size {sectors}
Specify the size of each cache block in 512 byte sectors.
+ man cache_repair
+ head -n 20
cache_repair(8) System Manager's Manual cache_repair(8)
NAME
cache_repair - repair cache binary metadata from device/file to device/file.
SYNOPSIS
cache_repair [options] -i {device|file} -o {device|file}
DESCRIPTION
cache_repair reads binary cache metadata created by the respective device-mapper target from one device or file, repairs it and writes it to another device or file. If written to a metadata device, the metadata can be processed by the device-mapper target.
This tool cannot be run on live metadata.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man cache_restore
+ head -n 20
cache_restore(8) System Manager's Manual cache_restore(8)
NAME
cache_restore - restore cache metadata file to device or file.
SYNOPSIS
cache_restore [options] -i {xml file} -o {device|file}
DESCRIPTION
cache_restore restores cache metadata created by the respective device-mapper target dumped into an XML formatted (see cache_dump(8)) file, which optionally can be preprocessed before the restore to another device or file. If restored to a metadata device, the metadata can be processed by the device-mapper target.
This tool cannot be run on live metadata.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man cache_writeback
+ head -n 20
cache_writeback(8) System Manager's Manual cache_writeback(8)
NAME
cache_writeback - writeback dirty blocks to the origin device.
SYNOPSIS
cache_writeback [options] --metadata-device {device|file} --origin-device {device|file} --fast-device {device|file}
DESCRIPTION
cache_writeback is an offline tool that writes back dirty data to the data device (origin). Intended for use in recovery scenarios when the SSD is giving IO errors.
This tool cannot be run on a live cache.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man cal
+ head -n 20
CAL(1) User Commands CAL(1)
NAME
cal - display a calendar
SYNOPSIS
cal [options] [[[day] month] year]
cal [options] <timestamp|monthname>
DESCRIPTION
cal displays a simple calendar. If no arguments are specified, the current month is displayed.
The month may be specified as a number (1-12), as a month name or as an abbreviated month name according to the current locales.
OPTIONS
-1, --one
Display single month output. (This is the default.)
+ man catman
+ head -n 20
CATMAN(8) Manual pager utils CATMAN(8)
NAME
catman - create or update the pre-formatted manual pages
SYNOPSIS
catman [-d?V] [-M path] [-C file] [section] ...
DESCRIPTION
catman is used to create an up to date set of pre-formatted manual pages known as cat pages. Cat pages are generally much faster to display than the original manual pages, but require extra storage space. The decision to support cat pages is that of the local administrator, who must provide suitable directories to contain them.
The options available to catman are the manual page hierarchies and sections to pre-format. The default hierarchies are those specified as system hierarchies in the man-db configuration file, and the default sections are either the colon-delimited contents of the environment variable $MANSECT or the standard set compiled into man if $MANSECT is undefined. Supplying catman with a set of whitespace-
delimited section names will override both of the above.
catman makes use of the index database cache associated with each hierarchy to determine which files need to be formatted.
OPTIONS
-d, --debug
+ man cfdisk
+ head -n 20
CFDISK(8) System Administration CFDISK(8)
NAME
cfdisk - display or manipulate a disk partition table
SYNOPSIS
cfdisk [options] [device]
DESCRIPTION
cfdisk is a curses-based program for partitioning any block device. The default device is /dev/sda.
Note that cfdisk provides basic partitioning functionality with a user-friendly interface. If you need advanced features, use fdisk(8) instead.
Since version 2.25 cfdisk supports MBR (DOS), GPT, SUN and SGI disk labels, but no longer provides any functionality for CHS (Cylinder-Head-Sector) addressing. CHS has never been important for Linux, and this addressing concept does not make any sense for new devices.
Since version 2.25 cfdisk also does not provide a 'print' command any more. This functionality is provided by the utilities partx(8) and lsblk(8) in a very comfortable and rich way.
If you want to remove an old partition table from a device, use wipefs(8).
+ man cgdisk
+ head -n 20
CGDISK(8) GPT fdisk Manual CGDISK(8)
NAME
cgdisk - Curses-based GUID partition table (GPT) manipulator
SYNOPSIS
cgdisk [ -a ] device
DESCRIPTION
GPT fdisk is a text-mode family of programs for creation and manipulation of partition tables. The cgdisk member of this family employs a curses-based user interface for interaction using a text-mode menuing system. It will automatically convert an old-style Master Boot Record (MBR) partition table or BSD disklabel stored without an MBR carrier partition to the newer Globally Unique Identifier (GUID)
Partition Table (GPT) format, or will load a GUID partition table. Other members of this program family are gdisk (the most feature-rich program of the group, with a non-curses-based interactive user interface) and sgdisk (which is driven via command-line options for use by experts or in scripts). FixParts is a related program for fixing a limited set of problems with MBR disks.
For information on MBR vs. GPT, as well as GPT terminology and structure, see the extended GPT fdisk documentation at http://www.rodsbooks.com/gdisk/ or consult Wikipedia.
The cgdisk program employs a user interface similar to that of Linux's cfdisk, but cgdisk modifies GPT partitions. It also has the capability of transforming MBR partitions or BSD disklabels into GPT partitions. Like the original cfdisk program, cgdisk does not modify disk structures until you explicitly write them to disk, so if you make a mistake, you can exit from the program with the Quit option to
leave your partitions unmodified.
+ man chacl
+ head -n 20
CHACL(1) Access Control Lists CHACL(1)
NAME
chacl - change the access control list of a file or directory
SYNOPSIS
chacl acl pathname...
chacl -b acl dacl pathname...
chacl -d dacl pathname...
chacl -R pathname...
chacl -D pathname...
chacl -B pathname...
chacl -l pathname...
chacl -r pathname...
DESCRIPTION
chacl is an IRIX-compatibility command, and is maintained for those users who are familiar with its use from either XFS or IRIX. Refer to the SEE ALSO section below for a description of tools which conform more closely to the (withdrawn draft) POSIX 1003.1e standard which describes Access Control Lists (ACLs).
+ man chage
+ head -n 20
CHAGE(1) User Commands CHAGE(1)
NAME
chage - change user password expiry information
SYNOPSIS
chage [options] LOGIN
DESCRIPTION
The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change his/her password.
OPTIONS
The options which apply to the chage command are:
-d, --lastday LAST_DAY
Set the number of days since January 1st, 1970 when the password was last changed. The date may also be expressed in the format YYYY-MM-DD (or the format more commonly used in your area). If the LAST_DAY is set to 0 the user is forced to change his password on the next log on.
-E, --expiredate EXPIRE_DATE
+ man chardetect
+ head -n 20
No manual entry for chardetect
+ man chattr
+ head -n 20
CHATTR(1) General Commands Manual CHATTR(1)
NAME
chattr - change file attributes on a Linux file system
SYNOPSIS
chattr [ -RVf ] [ -v version ] [ mode ] files...
DESCRIPTION
chattr changes the file attributes on a Linux file system.
The format of a symbolic mode is +-=[aAcCdDeijsStTu].
The operator '+' causes the selected attributes to be added to the existing attributes of the files; '-' causes them to be removed; and '=' causes them to be the only attributes that the files have.
The letters 'aAcCdDeijsStTu' select the new attributes for the files: append only (a), no atime updates (A), compressed (c), no copy on write (C), no dump (d), synchronous directory updates (D), extent format (e), immutable (i), data journalling (j), secure deletion (s), synchronous updates (S), no tail-merging (t), top of directory hierarchy (T), and undeletable (u).
The following attributes are read-only, and may be listed by lsattr(1) but not modified by chattr: compression error (E), huge file (h), indexed directory (I), inline data (N), compression raw access (X), and compressed dirty file (Z).
+ man chcpu
+ head -n 20
CHCPU(8) System Administration CHCPU(8)
NAME
chcpu - configure CPUs
SYNOPSIS
chcpu -c|-d|-e|-g cpu-list
chcpu -p mode
chcpu -r|-h|-V
DESCRIPTION
chcpu can modify the state of CPUs. It can enable or disable CPUs, scan for new CPUs, change the CPU dispatching mode of the underlying hypervisor, and request CPUs from the hypervisor (configure) or return CPUs to the hypervisor (deconfigure).
Some options have a cpu-list argument. Use this argument to specify a comma-separated list of CPUs. The list can contain individual CPU addresses or ranges of addresses. For example, 0,5,7,9-11 makes the command applicable to the CPUs with the addresses 0, 5, 7, 9, 10, and 11.
OPTIONS
-c, --configure cpu-list
Configure the specified CPUs. Configuring a CPU means that the hypervisor takes a CPU from the CPU pool and assigns it to the virtual hardware on which your kernel runs.
+ man chmem
+ head -n 20
CHMEM(8) System Administration CHMEM(8)
NAME
chmem - configure memory
SYNOPSIS
chmem [-h] [-V] [-v] [-e|-d] [SIZE|RANGE|-b BLOCKRANGE]
DESCRIPTION
The chmem command sets a particular size or range of memory online or offline.
‐ Specify SIZE as <size>[m|M|g|G]. With m or M, <size> specifies the memory size in MiB (1024 x 1024 bytes). With g or G, <size> specifies the memory size in GiB (1024 x 1024 x 1024 bytes). The default unit is MiB.
‐ Specify RANGE in the form 0x<start>-0x<end> as shown in the output of the lsmem command. <start> is the hexadecimal address of the first byte and <end> is the hexadecimal address of the last byte in the memory range.
‐ Specify BLOCKRANGE in the form <first>-<last> or <block> as shown in the output of the lsmem command. <first> is the number of the first memory block and <last> is the number of the last memory block in the memory range. Alternatively a single block can be specified. BLOCKRANGE requires the --blocks option.
SIZE and RANGE must be aligned to the Linux memory block size, as shown in the output of the lsmem command.
+ man chpasswd
+ head -n 20
CHPASSWD(8) System Management Commands CHPASSWD(8)
NAME
chpasswd - update passwords in batch mode
SYNOPSIS
chpasswd [options]
DESCRIPTION
The chpasswd command reads a list of user name and password pairs from standard input and uses this information to update a group of existing users. Each line is of the format:
user_name:password
By default the passwords must be supplied in clear-text, and are encrypted by chpasswd. Also the password age will be updated, if present.
The default encryption algorithm can be defined for the system with the ENCRYPT_METHOD or MD5_CRYPT_ENAB variables of /etc/login.defs, and can be overwitten with the -e, -m, or -c options.
chpasswd first updates all the passwords in memory, and then commits all the changes to disk if no errors occured for any user.
+ man chronyc
+ head -n 20
CHRONYC(1) User manual CHRONYC(1)
NAME
chronyc - command-line interface for chrony daemon
SYNOPSIS
chronyc [OPTION]... [COMMAND]...
DESCRIPTION
chronyc is a command-line interface program which can be used to monitor chronyd’s performance and to change various operating parameters whilst it is running.
If no commands are specified on the command line, chronyc will expect input from the user. The prompt chronyc> will be displayed when it is being run from a terminal. If chronyc’s input or output are redirected from or to a file, the prompt is not shown.
There are two ways chronyc can access chronyd. One is the Internet Protocol (IPv4 or IPv6) and the other is a Unix domain socket, which is accessible locally by the root or chrony user. By default, chronyc first tries to connect to the Unix domain socket. The compiled-in default path is /var/run/chrony/chronyd.sock. If that fails (e.g. because chronyc is running under a non-root user), it will try to
connect to 127.0.0.1 and then ::1.
Only the following monitoring commands, which do not affect the behaviour of chronyd, are allowed from the network: activity, manual list, rtcdata, smoothing, sources, sourcestats, tracking, waitsync. The set of hosts from which chronyd will accept these commands can be configured with the cmdallow directive in the chronyd’s configuration file or the cmdallow command in chronyc. By default, the
commands are accepted only from localhost (127.0.0.1 or ::1).
+ man chronyd
+ head -n 20
CHRONYD(8) System Administration CHRONYD(8)
NAME
chronyd - chrony daemon
SYNOPSIS
chronyd [OPTION]... [DIRECTIVE]...
DESCRIPTION
chronyd is a daemon for synchronisation of the system clock. It can synchronise the clock with NTP servers, reference clocks (e.g. a GPS receiver), and manual input using wristwatch and keyboard via chronyc. It can also operate as an NTPv4 (RFC 5905) server and peer to provide a time service to other computers in the network.
If no configuration directives are specified on the command line, chronyd will read them from a configuration file. The compiled-in default location of the file is /etc/chrony.conf.
Information messages and warnings will be logged to syslog.
OPTIONS
-4
With this option hostnames will be resolved only to IPv4 addresses and only IPv4 sockets will be created.
+ man chrt
+ head -n 20
CHRT(1) User Commands CHRT(1)
NAME
chrt - manipulate the real-time attributes of a process
SYNOPSIS
chrt [options] priority command [argument...]
chrt [options] -p [priority] pid
DESCRIPTION
chrt sets or retrieves the real-time scheduling attributes of an existing pid, or runs command with the given attributes.
POLICIES
-o, --other
Set scheduling policy to SCHED_OTHER. This is the default Linux scheduling policy.
-f, --fifo
+ man chvt
+ head -n 20
CHVT(1) General Commands Manual CHVT(1)
NAME
chvt - change foreground virtual terminal
SYNOPSIS
chvt N
DESCRIPTION
The command chvt N makes /dev/ttyN the foreground terminal. (The corresponding screen is created if it did not exist yet. To get rid of unused VTs, use deallocvt(1).) The key combination (Ctrl-)LeftAlt-FN (with N in the range 1-12) usually has a similar effect.
26 January 1997 CHVT(1)
+ man cifsiostat
+ head -n 20
CIFSIOSTAT(1) Linux User's Manual CIFSIOSTAT(1)
NAME
cifsiostat - Report CIFS statistics.
SYNOPSIS
cifsiostat [ -h ] [ -k | -m ] [ -t ] [ -V ] [ interval [ count ] ]
DESCRIPTION
The cifsiostat command displays statistics about read and write operations on CIFS filesystems.
The interval parameter specifies the amount of time in seconds between each report. The first report contains statistics for the time since system startup (boot). Each subsequent report contains statistics collected during the interval since the previous report. A report consists of a CIFS header row followed by a line of statistics for each CIFS filesystem that is mounted. The count parameter can be
specified in conjunction with the interval parameter. If the count parameter is specified, the value of count determines the number of reports generated at interval seconds apart. If the interval parameter is specified without the count parameter, the cifsiostat command generates reports continuously.
REPORT
The CIFS report provides statistics for each mounted CIFS filesystem. The report shows the following fields:
+ man clock
+ head -n 20
HWCLOCK(8) System Administration HWCLOCK(8)
NAME
hwclock - read or set the hardware clock (RTC)
SYNOPSIS
hwclock [function] [option...]
DESCRIPTION
hwclock is a tool for accessing the Hardware Clock. It can: display the Hardware Clock time; set the Hardware Clock to a specified time; set the Hardware Clock from the System Clock; set the System Clock from the Hardware Clock; compensate for Hardware Clock drift; correct the System Clock timescale; set the kernel's timezone, NTP timescale, and epoch (Alpha only); and predict future Hardware Clock
values based on its drift rate.
Since v2.26 important changes were made to the --hctosys function and the --directisa option, and a new option --update-drift was added. See their respective descriptions below.
FUNCTIONS
The following functions are mutually exclusive, only one can be given at a time. If none is given, the default is --show.
--adjust
+ man clockdiff
+ head -n 20
CLOCKDIFF(8) System Manager's Manual: iputils CLOCKDIFF(8)
NAME
clockdiff - measure clock difference between hosts
SYNOPSIS
clockdiff [-o] [-o1] destination
DESCRIPTION
clockdiff Measures clock difference between us and destination with 1 msec resolution using ICMP TIMESTAMP [2] packets or, optionally, IP TIMESTAMP option [3] option added to ICMP ECHO. [1]
OPTIONS
-o Use IP TIMESTAMP with ICMP ECHO instead of ICMP TIMESTAMP messages. It is useful with some destinations, which do not support ICMP TIMESTAMP (f.e. Solaris <2.4).
-o1 Slightly different form of -o, namely it uses three-term IP TIMESTAMP with prespecified hop addresses instead of four term one. What flavor works better depends on target host. Particularly, -o is better for Linux.
WARNINGS
+ man cloud-id
+ head -n 20
No manual entry for cloud-id
+ man cloud-init
+ head -n 20
No manual entry for cloud-init
+ man cloud-init-per
+ head -n 20
No manual entry for cloud-init-per
+ man col
+ head -n 20
COL(1) User Commands COL(1)
NAME
col - filter reverse line feeds from input
SYNOPSIS
col [options]
DESCRIPTION
col filters out reverse (and half-reverse) line feeds so the output is in the correct order, with only forward and half-forward line feeds. It also replaces any whitespace characters with tabs where possible. This can be useful in processing the output of nroff(1) and tbl(1).
col reads from standard input and writes to standard output.
OPTIONS
-b, --no-backspaces
Do not output any backspaces, printing only the last character written to each column position.
-f, --fine
+ man colcrt
+ head -n 20
COLCRT(1) User Commands COLCRT(1)
NAME
colcrt - filter nroff output for CRT previewing
SYNOPSIS
colcrt [options] [file...]
DESCRIPTION
colcrt provides virtual half-line and reverse line feed sequences for terminals without such capability, and on which overstriking is destructive. Half-line characters and underlining (changed to dashing `-') are placed on new lines in between the normal output lines.
OPTIONS
-, --no-underlining
Suppress all underlining. This option is especially useful for previewing allboxed tables from tbl(1).
-2, --half-lines
Causes all half-lines to be printed, effectively double spacing the output. Normally, a minimal space output format is used which will suppress empty lines. The program never suppresses two consecutive empty lines, however. The -2 option is useful for sending output to the line printer when the output contains superscripts and subscripts which would otherwise be invisible.
+ man colrm
+ head -n 20
COLRM(1) User Commands COLRM(1)
NAME
colrm - remove columns from a file
SYNOPSIS
colrm [first [last]]
DESCRIPTION
colrm removes selected columns from a file. Input is taken from standard input. Output is sent to standard output.
If called with one parameter the columns of each line will be removed starting with the specified first column. If called with two parameters the columns from the first column to the last column will be removed.
Column numbering starts with column 1.
OPTIONS
-V, --version
Display version information and exit.
+ man column
+ head -n 20
COLUMN(1) User Commands COLUMN(1)
NAME
column - columnate lists
SYNOPSIS
column [options] [file...]
DESCRIPTION
The column utility formats its input into multiple columns. The util support three modes:
columns are filled before rows
This is the default mode (required by backward compatibility).
rows are filed before columns
This mode is enabled by option -x, --fillrows
table Determine the number of columns the input contains and create a table. This mode is enabled by option -t, --table and columns formatting is possible to modify by --table-* options. Use this mode if not sure.
+ man consolehelper
+ head -n 20
CONSOLEHELPER(8) System Manager's Manual CONSOLEHELPER(8)
NAME
consolehelper - A wrapper that helps console users run system programs
SYNOPSIS
progname [ options ]
DESCRIPTION
consolehelper is a tool that makes it easy for console users to run system programs, doing authentication via PAM (which can be set up to trust all console users or to ask for a password at the system administrator's discretion). When possible, the authentication is done graphically; otherwise, it is done within the text console from which consolehelper was started.
It is intended to be completely transparent. This means that the user will never run the consolehelper program directly. Instead, programs like /sbin/shutdown are paired with a link from /usr/bin/shutdown to /usr/bin/consolehelper. Then when non-root users (specifically, users without /sbin in their path, or /sbin after /usr/bin) call the "shutdown" program, consolehelper will be invoked to authen‐
ticate the action and then invoke /sbin/shutdown. (consolehelper itself has no priviledges; it calls the userhelper(8) program do the real work.)
consolehelper requires that a PAM configuration for every managed program exist. So to make /sbin/foo or /usr/sbin/foo managed, you need to create a link from /usr/bin/foo to /usr/bin/consolehelper and create the file /etc/pam.d/foo, normally using the pam_console(8) PAM module.
OPTIONS
This program has no command line options of its own; it passes all command line options on to the program it is calling.
+ man consoletype
+ head -n 20
CONSOLETYPE(1) General Commands Manual CONSOLETYPE(1)
NAME
consoletype - print type of the console connected to standard input
SYNOPSIS
consoletype [stdout] [fg]
DESCRIPTION
consoletype prints the type of console connected to standard input, and checks whether the console connected to standard input is the current foreground virtual console. With no arguments, it prints vt if console is a virtual terminal (/dev/tty* or /dev/console device if not on a serial console), serial if standard input is a serial console (/dev/console or /dev/ttyS*) and pty if standard input is a
pseudo terminal.
RETURN VALUE
consoletype when passed no arguments returns
0 if on virtual terminal
1 if on serial console
+ man convertquota
+ head -n 20
CONVERTQUOTA(8) System Manager's Manual CONVERTQUOTA(8)
NAME
convertquota - convert quota from old file format to new one
SYNOPSIS
convertquota [ -ug ] -e filesystem
convertquota [ -ug ] -f oldformat,newformat filesystem
DESCRIPTION
convertquota converts old quota files quota.user and quota.group to files aquota.user and aquota.group in new format currently used by 2.4.0-ac? and newer or by SuSE or Red Hat Linux 2.4 kernels on filesystem.
New file format allows using quotas for 32-bit uids / gids, setting quotas for root, accounting used space in bytes (and so allowing use of quotas in ReiserFS) and it is also architecture independent. This format introduces Radix Tree (a simple form of tree structure) to quota file.
OPTIONS
-u, --user
convert user quota file. This is the default.
+ man coredumpctl
+ head -n 20
COREDUMPCTL(1) coredumpctl COREDUMPCTL(1)
NAME
coredumpctl - Retrieve coredumps from the journal
SYNOPSIS
coredumpctl [OPTIONS...] {COMMAND} [PID|COMM|EXE|MATCH...]
DESCRIPTION
coredumpctl may be used to retrieve coredumps from systemd-journald(8).
OPTIONS
The following options are understood:
--no-legend
Do not print column headers.
-1
+ man cpupower
+ head -n 20
CPUPOWER(1) cpupower Manual CPUPOWER(1)
NAME
cpupower - Shows and sets processor power related values
SYNOPSIS
cpupower [ -c cpulist ] <command> [ARGS]
cpupower -v|--version
cpupower -h|--help
DESCRIPTION
cpupower is a collection of tools to examine and tune power saving related features of your processor.
The manpages of the commands (cpupower-<command>(1)) provide detailed descriptions of supported features. Run cpupower help to get an overview of supported commands.
+ man cracklib-check
+ head -n 20
cracklib-check(8) System Manager's Manual cracklib-check(8)
NAME
cracklib-check - Check passwords using libcrack2
SYNOPSIS
cracklib-check
DESCRIPTION
cracklib-check takes a list of passwords from stdin and checks them via libcrack2's FascistCheck(3) sub routine.
RESULT
cracklib-check prints each checked password and the corresponding result of FascistCheck(3) to stdout. The password and the result are separated by a colon.
SEE ALSO
+ man cracklib-format
+ head -n 20
cracklib-format(8) Debian GNU/Linux manual cracklib-format(8)
NAME
cracklib-format, cracklib-packer, cracklib-unpacker - cracklib dictionary utilities
SYNOPSIS
cracklib-format file ...
cracklib-packer cracklib_dictpath
cracklib-unpacker cracklib_dictpath
DESCRIPTION
cracklib-format takes a list of text files each containing a list of words, one per line, It lowercases all words, removes control characters, and sorts the lists. It outputs the cleaned up list to standard output. The text files may be optionally compressed with gzip(1).
If you supply massive amounts of text to cracklib-format you must have enough free space available for use by the sort(1) command. If you do not have 20Mb free in /var/tmp (or whatever temporary area your sort(1) command uses), have a look at the /usr/sbin/cracklib-format program which is a sh(1) program. You can usually tweak the sort(1) command to use any large area of disk you desire, by use of
the -T option. cracklib-format has a hook for this.
+ man cracklib-packer
+ head -n 20
cracklib-format(8) Debian GNU/Linux manual cracklib-format(8)
NAME
cracklib-format, cracklib-packer, cracklib-unpacker - cracklib dictionary utilities
SYNOPSIS
cracklib-format file ...
cracklib-packer cracklib_dictpath
cracklib-unpacker cracklib_dictpath
DESCRIPTION
cracklib-format takes a list of text files each containing a list of words, one per line, It lowercases all words, removes control characters, and sorts the lists. It outputs the cleaned up list to standard output. The text files may be optionally compressed with gzip(1).
If you supply massive amounts of text to cracklib-format you must have enough free space available for use by the sort(1) command. If you do not have 20Mb free in /var/tmp (or whatever temporary area your sort(1) command uses), have a look at the /usr/sbin/cracklib-format program which is a sh(1) program. You can usually tweak the sort(1) command to use any large area of disk you desire, by use of
the -T option. cracklib-format has a hook for this.
+ man cracklib-unpacker
+ head -n 20
cracklib-format(8) Debian GNU/Linux manual cracklib-format(8)
NAME
cracklib-format, cracklib-packer, cracklib-unpacker - cracklib dictionary utilities
SYNOPSIS
cracklib-format file ...
cracklib-packer cracklib_dictpath
cracklib-unpacker cracklib_dictpath
DESCRIPTION
cracklib-format takes a list of text files each containing a list of words, one per line, It lowercases all words, removes control characters, and sorts the lists. It outputs the cleaned up list to standard output. The text files may be optionally compressed with gzip(1).
If you supply massive amounts of text to cracklib-format you must have enough free space available for use by the sort(1) command. If you do not have 20Mb free in /var/tmp (or whatever temporary area your sort(1) command uses), have a look at the /usr/sbin/cracklib-format program which is a sh(1) program. You can usually tweak the sort(1) command to use any large area of disk you desire, by use of
the -T option. cracklib-format has a hook for this.
+ man create-cracklib-dict
+ head -n 20
create-cracklib-dict(8) System Manager's Manual create-cracklib-dict(8)
NAME
create-cracklib-dict - Check passwords using libcrack2
SYNOPSIS
create-cracklib-dict wordlist ...
DESCRIPTION
create-cracklib-dict takes one or more word list files as arguments and converts them into cracklib dictionaries for use by password checking programs. The results are placed in the default compiled-in dictionary location.
If you wish to store the dictionary in a different location, use the cracklib-format and cracklib-packer commands directly.
SEE ALSO
cracklib-format(8), cracklib-packer(8), cracklib-check(8),
+ man crond
+ head -n 20
CRON(8) System Administration CRON(8)
NAME
crond - daemon to execute scheduled commands
SYNOPSIS
crond [-c | -h | -i | -n | -p | -P | -s | -m<mailcommand>]
crond -x [ext,sch,proc,pars,load,misc,test,bit]
DESCRIPTION
Cron is started from /etc/rc.d/init.d or /etc/init.d when classical sysvinit scripts are used. In case systemd is enabled, then unit file is installed into /lib/systemd/system/crond.service and daemon is started by systemctl start crond.service command. It returns immediately, thus, there is no need to need to start it with the '&' parameter.
Cron searches /var/spool/cron for crontab files which are named after accounts in /etc/passwd; The found crontabs are loaded into the memory. Cron also searches for /etc/anacrontab and any files in the /etc/cron.d directory, which have a different format (see crontab(5)). Cron examines all stored crontabs and checks each job to see if it needs to be run in the current minute. When executing com‐
mands, any output is mailed to the owner of the crontab (or to the user specified in the MAILTO environment variable in the crontab, if such exists). Any job output can also be sent to syslog by using the -s option.
There are two ways how changes in crontables are checked. The first method is checking the modtime of a file. The second method is using the inotify support. Using of inotify is logged in the /var/log/cron log after the daemon is started. The inotify support checks for changes in all crontables and accesses the hard disk only when a change is detected.
When using the modtime option, Cron checks its crontables' modtimes every minute to check for any changes and reloads the crontables which have changed. There is no need to restart Cron after some of the crontables were modified. The modtime option is also used when inotify can not be initialized.
+ man crontab
+ head -n 20
CRONTAB(1) User Commands CRONTAB(1)
NAME
crontab - maintains crontab files for individual users
SYNOPSIS
crontab [-u user] file
crontab [-u user] [-l | -r | -e] [-i] [-s]
crontab -n [ hostname ]
crontab -c
DESCRIPTION
Crontab is the program used to install a crontab table file, remove or list the existing tables used to serve the cron(8) daemon. Each user can have their own crontab, and though these are files in /var/spool/, they are not intended to be edited directly. For SELinux in MLS mode, you can define more crontabs for each range. For more information, see selinux(8).
In this version of Cron it is possible to use a network-mounted shared /var/spool/cron across a cluster of hosts and specify that only one of the hosts should run the crontab jobs in the particular directory at any one time. You may also use crontab(1) from any of these hosts to edit the same shared set of crontab files, and to set and query which host should run the crontab jobs.
Running cron jobs can be allowed or disallowed for different users. For this purpose, use the cron.allow and cron.deny files. If the cron.allow file exists, a user must be listed in it to be allowed to use cron If the cron.allow file does not exist but the cron.deny file does exist, then a user must not be listed in the cron.deny file in order to use cron. If neither of these files exists, only the
super user is allowed to use cron. Another way to restrict access to cron is to use PAM authentication in /etc/security/access.conf to set up users, which are allowed or disallowed to use crontab or modify system cron jobs in the /etc/cron.d/ directory.
+ man cryptsetup
+ head -n 20
CRYPTSETUP(8) Maintenance Commands CRYPTSETUP(8)
NAME
cryptsetup - manage plain dm-crypt and LUKS encrypted volumes
SYNOPSIS
cryptsetup <options> <action> <action args>
DESCRIPTION
cryptsetup is used to conveniently setup dm-crypt managed device-mapper mappings. These include plain dm-crypt volumes and LUKS volumes. The difference is that LUKS uses a metadata header and can hence offer more features than plain dm-crypt. On the other hand, the header is visible and vulnerable to damage.
In addition, cryptsetup provides limited support for the use of historic loopaes volumes and for TrueCrypt compatible volumes.
PLAIN DM-CRYPT OR LUKS?
Unless you understand the cryptographic background well, use LUKS. With plain dm-crypt there are a number of possible user errors that massively decrease security. While LUKS cannot fix them all, it can lessen the impact for many of them.
WARNINGS
+ man csh
+ head -n 20
TCSH(1) General Commands Manual TCSH(1)
NAME
tcsh - C shell with file name completion and command line editing
SYNOPSIS
tcsh [-bcdefFimnqstvVxX] [-Dname[=value]] [arg ...]
tcsh -l
DESCRIPTION
tcsh is an enhanced but completely compatible version of the Berkeley UNIX C shell, csh(1). It is a command language interpreter usable both as an interactive login shell and a shell script command processor. It includes a command-line editor (see The command-line editor), programmable word completion (see Completion and listing), spelling correction (see Spelling correction), a history mechanism
(see History substitution), job control (see Jobs) and a C-like syntax. The NEW FEATURES section describes major enhancements of tcsh over csh(1). Throughout this manual, features of tcsh not found in most csh(1) implementations (specifically, the 4.4BSD csh) are labeled with `(+)', and features which are present in csh(1) but not usually documented are labeled with `(u)'.
Argument list processing
If the first argument (argument 0) to the shell is `-' then it is a login shell. A login shell can be also specified by invoking the shell with the -l flag as the only argument.
The rest of the flag arguments are interpreted as follows:
+ man csslint-0.6
+ head -n 20
No manual entry for csslint-0.6
+ man ctrlaltdel
+ head -n 20
CTRLALTDEL(8) System Administration CTRLALTDEL(8)
NAME
ctrlaltdel - set the function of the Ctrl-Alt-Del combination
SYNOPSIS
ctrlaltdel hard|soft
DESCRIPTION
Based on examination of the linux/kernel/reboot.c code, it is clear that there are two supported functions that the Ctrl-Alt-Del sequence can perform.
hard Immediately reboot the computer without calling sync(2) and without any other preparation. This is the default.
soft Make the kernel send the SIGINT (interrupt) signal to the init process (this is always the process with PID 1). If this option is used, the init(8) program must support this feature. Since there are now several init(8) programs in the Linux community, please consult the documentation for the version that you are currently using.
When the command is run without any argument, it will display the current setting.
The function of ctrlaltdel is usually set in the /etc/rc.local file.
+ man ctstat
+ head -n 20
LNSTAT(8) System Manager's Manual LNSTAT(8)
NAME
lnstat - unified linux network statistics
SYNOPSIS
lnstat [options]
DESCRIPTION
This manual page documents briefly the lnstat command.
lnstat is a generalized and more feature-complete replacement for the old rtstat program. It is commonly used to periodically print a selection of statistical values exported by the kernel. In addition to routing cache statistics, it supports any kind of statistics the linux kernel exports via a file in /proc/net/stat/.
Each file in /proc/net/stat/ contains a header line listing the column names. These names are used by lnstat as keys for selecting which statistics to print. For every CPU present in the system, a line follows which lists the actual values for each column of the file. lnstat sums these values up (which in fact are counters) before printing them. After each interval, only the difference to the last
value is printed.
Files and columns may be selected by using the -f and -k parameters. By default, all columns of all files are printed.
+ man cvtsudoers
+ head -n 20
CVTSUDOERS(1) BSD General Commands Manual CVTSUDOERS(1)
NAME
cvtsudoers — convert between sudoers file formats
SYNOPSIS
cvtsudoers [-ehMpV] [-b dn] [-c conf_file] [-d deftypes] [-f output_format] [-i input_format] [-I increment] [-m filter] [-o output_file] [-O start_point] [-s sections] [input_file]
DESCRIPTION
cvtsudoers can be used to convert between sudoers security policy file formats. The default input format is sudoers. The default output format is LDIF. It is only possible to convert a sudoers file that is syntactically correct.
If no input_file is specified, or if it is ‘-’, the policy is read from the standard input. By default, the result is written to the standard output.
The options are as follows:
-b dn, --base=dn
The base DN (distinguished name) that will be used when performing LDAP queries. Typically this is of the form ou=SUDOers,dc=-mydomain,dc=com for the domain my-domain.com. If this option is not specified, the value of the SUDOERS_BASE environment variable will be used instead. Only necessary when converting to LDIF format.
-c, --config
Specify the path to a configuration file. Defaults to /etc/cvtsudoers.conf.
+ man dbus-cleanup-sockets
+ head -n 20
DBUS-CLEANUP-SOCKE(1) User Commands DBUS-CLEANUP-SOCKE(1)
NAME
dbus-cleanup-sockets - clean up leftover sockets in a directory
SYNOPSIS
dbus-cleanup-sockets [DIRECTORY]
DESCRIPTION
The dbus-cleanup-sockets command cleans up unused D-Bus connection sockets. See http://www.freedesktop.org/software/dbus/ for more information about the big picture.
If given no arguments, dbus-cleanup-sockets cleans up sockets in the standard default socket directory for the per-user-login-session message bus; this is usually /tmp. Optionally, you can pass a different directory on the command line.
On Linux, this program is essentially useless, because D-Bus defaults to using "abstract sockets" that exist only in memory and don't have a corresponding file in /tmp.
On most other flavors of UNIX, it's possible for the socket files to leak when programs using D-Bus exit abnormally or without closing their D-Bus connections. Thus, it might be interesting to run dbus-cleanup-sockets in a cron job to mop up any leaked sockets. Or you can just ignore the leaked sockets, they aren't really hurting anything, other than cluttering the output of "ls /tmp"
+ man dbus-daemon
+ head -n 20
DBUS-DAEMON(1) User Commands DBUS-DAEMON(1)
NAME
dbus-daemon - Message bus daemon
SYNOPSIS
dbus-daemon
dbus-daemon [--version] [--session] [--system] [--config-file=FILE] [--print-address [=DESCRIPTOR]] [--print-pid [=DESCRIPTOR]] [--fork]
DESCRIPTION
dbus-daemon is the D-Bus message bus daemon. See http://www.freedesktop.org/software/dbus/ for more information about the big picture. D-Bus is first a library that provides one-to-one communication between any two applications; dbus-daemon is an application that uses this library to implement a message bus daemon. Multiple programs connect to the message bus daemon and can exchange messages with one
another.
There are two standard message bus instances: the systemwide message bus (installed on many systems as the "messagebus" init service) and the per-user-login-session message bus (started each time a user logs in). dbus-daemon is used for both of these instances, but with a different configuration file.
The --session option is equivalent to "--config-file=/usr/share/dbus-1/session.conf" and the --system option is equivalent to "--config-file=/usr/share/dbus-1/system.conf". By creating additional configuration files and using the --config-file option, additional special-purpose message bus daemons could be created.
+ man dbus-monitor
+ head -n 20
DBUS-MONITOR(1) User Commands DBUS-MONITOR(1)
NAME
dbus-monitor - debug probe to print message bus messages
SYNOPSIS
dbus-monitor [--system | --session | --address ADDRESS] [--profile | --monitor | --pcap | --binary] [watch expressions]
DESCRIPTION
The dbus-monitor command is used to monitor messages going through a D-Bus message bus. See http://www.freedesktop.org/software/dbus/ for more information about the big picture.
There are two well-known message buses: the systemwide message bus (installed on many systems as the "messagebus" service) and the per-user-login-session message bus (started each time a user logs in). The --system and --session options direct dbus-monitor to monitor the system or session buses respectively. If neither is specified, dbus-monitor monitors the session bus.
dbus-monitor has two different text output modes: the 'classic'-style monitoring mode, and profiling mode. The profiling format is a compact format with a single line per message and microsecond-resolution timing information. The --profile and --monitor options select the profiling and monitoring output format respectively.
dbus-monitor also has two binary output modes. The binary mode, selected by --binary, outputs the entire binary message stream (without the initial authentication handshake). The PCAP mode, selected by --pcap, adds a PCAP file header to the beginning of the output, and prepends a PCAP message header to each message; this produces a binary file that can be read by, for instance, Wireshark.
+ man dbus-run-session
+ head -n 20
DBUS-RUN-SESSION(1) User Commands DBUS-RUN-SESSION(1)
NAME
dbus-run-session - start a process as a new D-Bus session
SYNOPSIS
dbus-run-session [--config-file FILENAME] [--dbus-daemon BINARY] [--] PROGRAM [ARGUMENTS...]
dbus-run-session --help
dbus-run-session --version
DESCRIPTION
dbus-run-session is used to start a session bus instance of dbus-daemon from a shell script, and start a specified program in that session. The dbus-daemon will run for as long as the program does, after which it will terminate.
One use is to run a shell with its own dbus-daemon in a text‐mode or SSH session, and have the dbus-daemon terminate automatically on leaving the sub‐shell, like this:
dbus-run-session -- bash
+ man dbus-send
+ head -n 20
DBUS-SEND(1) User Commands DBUS-SEND(1)
NAME
dbus-send - Send a message to a message bus
SYNOPSIS
dbus-send [--system | --session | --address=ADDRESS] [--dest=NAME] [--print-reply [=literal]] [--reply-timeout=MSEC] [--type=TYPE] OBJECT_PATH INTERFACE.MEMBER [CONTENTS...]
DESCRIPTION
The dbus-send command is used to send a message to a D-Bus message bus. See http://www.freedesktop.org/software/dbus/ for more information about the big picture.
There are two well-known message buses: the systemwide message bus (installed on many systems as the "messagebus" service) and the per-user-login-session message bus (started each time a user logs in). The --system and --session options direct dbus-send to send messages to the system or session buses respectively. If neither is specified, dbus-send sends to the session bus.
Nearly all uses of dbus-send must provide the --dest argument which is the name of a connection on the bus to send the message to. If --dest is omitted, no destination is set.
The object path and the name of the message to send must always be specified. Following arguments, if any, are the message contents (message arguments). These are given as type-specified values and may include containers (arrays, dicts, and variants) as described below.
+ man dbus-test-tool
+ head -n 20
DBUS-TEST-TOOL(1) User Commands DBUS-TEST-TOOL(1)
NAME
dbus-test-tool - D-Bus traffic generator and test tool
SYNOPSIS
dbus-test-tool black-hole [--session | --system] [--name=NAME] [--no-read]
dbus-test-tool echo [--session | --system] [--name=NAME] [--sleep-ms=MS]
dbus-test-tool spam [--session | --system] [--dest=NAME] [--count=N] [--flood] [--ignore-errors] [--messages-per-conn=N] [--no-reply] [--queue=N] [--seed=SEED] [--string | --bytes | --empty] [--payload=S | --stdin | --message-stdin | --random-size]
DESCRIPTION
dbus-test-tool is a multi-purpose tool for debugging and profiling D-Bus.
dbus-test-tool black-hole connects to D-Bus, optionally requests a name, then does not reply to messages. It normally reads and discards messages from its D-Bus socket, but can be configured to sleep forever without reading.
dbus-test-tool echo connects to D-Bus, optionally requests a name, then sends back an empty reply to every method call, after an optional delay.
+ man dbus-update-activation-environment
+ head -n 20
DBUS-UPDATE-ACTIVA(1) User Commands DBUS-UPDATE-ACTIVA(1)
NAME
dbus-update-activation-environment - update environment used for D-Bus session services
SYNOPSIS
dbus-update-activation-environment [--systemd] [--verbose] --all | VAR... | VAR=VAL...
DESCRIPTION
dbus-update-activation-environment updates the list of environment variables used by dbus-daemon --session when it activates session services without using systemd.
With the --systemd option, if an instance of systemd --user is available on D-Bus, it also updates the list of environment variables used by systemd --user when it activates user services, including D-Bus session services for which dbus-daemon has been configured to delegate activation to systemd. This is very similar to the import-environment command provided by systemctl(1)).
Variables that are special to dbus-daemon or systemd may be set, but their values will be overridden when a service is started. For instance, it is not useful to add DBUS_SESSION_BUS_ADDRESS to dbus-daemon's activation environment, although it might still be useful to add it to systemd's activation environment.
OPTIONS
--all
Set all environment variables present in the environment used by dbus-update-activation-environment.
+ man dbus-uuidgen
+ head -n 20
DBUS-UUIDGEN(1) User Commands DBUS-UUIDGEN(1)
NAME
dbus-uuidgen - Utility to generate UUIDs
SYNOPSIS
dbus-uuidgen [--version] [--ensure [=FILENAME]] [--get [=FILENAME]]
DESCRIPTION
The dbus-uuidgen command generates or reads a universally unique ID.
Note that the D-Bus UUID has no relationship to RFC 4122 and does not generate UUIDs compatible with that spec. Many systems have a separate command for that (often called "uuidgen").
See http://www.freedesktop.org/software/dbus/ for more information about D-Bus.
The primary usage of dbus-uuidgen is to run in the post-install script of a D-Bus package like this:
+ man dc
+ head -n 20
dc(1) General Commands Manual dc(1)
NAME
dc - an arbitrary precision calculator
SYNOPSIS
dc [-V] [--version] [-h] [--help]
[-e scriptexpression] [--expression=scriptexpression]
[-f scriptfile] [--file=scriptfile]
[file ...]
DESCRIPTION
dc is a reverse-polish desk calculator which supports unlimited precision arithmetic. It also allows you to define and call macros. Normally dc reads from the standard input; if any command arguments are given to it, they are filenames, and dc reads and executes the contents of the files before reading from standard input. All normal output is to standard output; all error output is to standard
error.
A reverse-polish calculator stores numbers on a stack. Entering a number pushes it on the stack. Arithmetic operations pop arguments off the stack and push the results.
To enter a number in dc, type the digits (using upper case letters A through F as "digits" when working with input bases greater than ten), with an optional decimal point. Exponential notation is not supported. To enter a negative number, begin the number with ``_''. ``-'' cannot be used for this, as it is a binary operator for subtraction instead. To enter two numbers in succession, separate them
+ man deallocvt
+ head -n 20
DEALLOCVT(1) General Commands Manual DEALLOCVT(1)
NAME
deallocvt - deallocate unused virtual consoles
SYNOPSIS
deallocvt [N ...]
DESCRIPTION
The command deallocvt deallocates kernel memory and data structures for all unused virtual consoles. If one or more arguments N ... are given, only the corresponding consoles /dev/ttyN are deallocated.
A virtual console is unused if it is not the foreground console, and no process has it open for reading or writing, and no text has been selected on its screen.
SEE ALSO
chvt(1), openvt(1)
+ man debugfs
+ head -n 20
DEBUGFS(8) System Manager's Manual DEBUGFS(8)
NAME
debugfs - ext2/ext3/ext4 file system debugger
SYNOPSIS
debugfs [ -DVwci ] [ -b blocksize ] [ -s superblock ] [ -f cmd_file ] [ -R request ] [ -d data_source_device ] [ device ]
DESCRIPTION
The debugfs program is an interactive file system debugger. It can be used to examine and change the state of an ext2, ext3, or ext4 file system.
device is the special file corresponding to the device containing the file system (e.g /dev/hdXX).
OPTIONS
-w Specifies that the file system should be opened in read-write mode. Without this option, the file system is opened in read-only mode.
-c Specifies that the file system should be opened in catastrophic mode, in which the inode and group bitmaps are not read initially. This can be useful for filesystems with significant corruption, but because of this, catastrophic mode forces the filesystem to be opened read-only.
-i Specifies that device represents an ext2 image file created by the e2image program. Since the ext2 image file only contains the superblock, block group descriptor, block and inode allocation bitmaps, and the inode table, many debugfs commands will not function properly. Warning: no safety checks are in place, and debugfs may fail in interesting ways if commands such as ls, dump, etc. are tried
+ man debuginfo-install
+ head -n 20
debuginfo-install(1) debuginfo-install(1)
NAME
debuginfo-install - install debuginfo packages and their dependencies
SYNOPSIS
debuginfo-install package
DESCRIPTION
debuginfo-install is a program which installs the RPMs needed to debug the specified package. The package argument can be a wildcard, but will only match installed packages. debuginfo-install will then enable any debuginfo repositories, and install the relevant debuginfo rpm.
EXAMPLES
Download and install all the RPMs needed to debug the kernel RPM:
debuginfo-install kernel
WARNING MESSAGES
Could not find debuginfo for:
You may sometimes see warning messages about certain packages not being found if you run debuginfo-install for a wildcard or glob. Debuginfo packages are not necessary for "noarch" RPMs; these will generate a warning message. Additionally, On 64-bit systems, no multilib debuginfo packages are published, so if you have 32-bit packages installed, these will also generate warning messages.
+ man delpart
+ head -n 20
DELPART(8) System Administration DELPART(8)
NAME
delpart - tell the kernel to forget about a partition
SYNOPSIS
delpart device partition
DESCRIPTION
delpart asks the Linux kernel to forget about the specified partition (a number) on the specified device. The command is a simple wrapper around the "del partition" ioctl.
This command doesn't manipulate partitions on a block device.
SEE ALSO
addpart(8), fdisk(8), parted(8), partprobe(8), partx(8)
AVAILABILITY
+ man delv
+ head -n 20
DELV(1) BIND9 DELV(1)
NAME
delv - DNS lookup and validation utility
SYNOPSIS
delv [@server] [[-4] | [-6]] [-a anchor-file] [-b address] [-c class] [-d level] [-i] [-m] [-p port#] [-q name] [-t type] [-x addr] [name] [type] [class] [queryopt...]
delv [-h]
delv [-v]
delv [queryopt...] [query...]
DESCRIPTION
delv is a tool for sending DNS queries and validating the results, using the same internal resolver and validator logic as named.
delv will send to a specified name server all queries needed to fetch and validate the requested data; this includes the original requested query, subsequent queries to follow CNAME or DNAME chains, and queries for DNSKEY, DS and DLV records to establish a chain of trust for DNSSEC validation. It does not perform iterative resolution, but simulates the behavior of a name server configured for DNSSEC
+ man depmod
+ head -n 20
DEPMOD(8) depmod DEPMOD(8)
NAME
depmod - Generate modules.dep and map files.
SYNOPSIS
depmod [-b basedir] [-e] [-E Module.symvers] [-F System.map] [-n] [-v] [-A] [-P prefix] [-w] [version]
depmod [-e] [-E Module.symvers] [-F System.map] [-m] [-n] [-v] [-P prefix] [-w] [version] [filename...]
DESCRIPTION
Linux kernel modules can provide services (called "symbols") for other modules to use (using one of the EXPORT_SYMBOL variants in the code). If a second module uses this symbol, that second module clearly depends on the first module. These dependencies can get quite complex.
depmod creates a list of module dependencies by reading each module under /lib/modules/version and determining what symbols it exports and what symbols it needs. By default, this list is written to modules.dep, and a binary hashed version named modules.dep.bin, in the same directory. If filenames are given on the command line, only those modules are examined (which is rarely useful unless all modules
are listed). depmod also creates a list of symbols provided by modules in the file named modules.symbols and its binary hashed version, modules.symbols.bin. Finally, depmod will output a file named modules.devname if modules supply special device names (devname) that should be populated in /dev on boot (by a utility such as systemd-tmpfiles).
If a version is provided, then that kernel version's module directory is used rather than the current kernel version (as returned by uname -r).
+ man dequote
+ head -n 20
No manual entry for dequote
+ man devlink
+ head -n 20
DEVLINK(8) Linux DEVLINK(8)
NAME
devlink - Devlink tool
SYNOPSIS
devlink [ OPTIONS ] OBJECT { COMMAND | help }
devlink [ -force ] -batch filename
OBJECT := { dev | port | monitor }
OPTIONS := { -V[ersion] | -n[no-nice-names] } -j[json] } -p[pretty] }
+ man dhclient
+ head -n 20
dhclient(8) System Manager's Manual dhclient(8)
NAME
dhclient - Dynamic Host Configuration Protocol Client
SYNOPSIS
dhclient [ -4 | -6 ] [ -S ] [ -N [ -N... ] ] [ -T [ -T... ] ] [ -P [ -P... ] ] [ -i ] [ -C ] [ -D LL|LLT ] [ -p port-number ] [ -d ] [ -e VAR=value ] [ -q ] [ -1 ] [ -r | -x ] [ -lf lease-file ] [ -pf pid-file ] [ --no-pid ] [ -cf config-file ] [ -sf script-file ] [ -s server-addr ] [ -g relay ] [ -n ] [ -nw ] [ -w ] [ -nc ] [ -B ] [ -I dhcp-client-identifier ] [ -H host-name ] [ -F fqdn.fqdn ] [ -V
vendor-class-identifier ] [ -R request-option-list ] [ -timeout timeout ] [ -v ] [ --version ] [ if0 [ ...ifN ] ]
DESCRIPTION
The Internet Systems Consortium DHCP Client, dhclient, provides a means for configuring one or more network interfaces using the Dynamic Host Configuration Protocol, BOOTP protocol, or if these protocols fail, by statically assigning an address.
OPERATION
The DHCP protocol allows a host to contact a central server which maintains a list of IP addresses which may be assigned on one or more subnets. A DHCP client may request an address from this pool, and then use it on a temporary basis for communication on network. The DHCP protocol also provides a mechanism whereby a client can learn important details about the network to which it is attached, such
as the location of a default router, the location of a name server, and so on.
There are two versions of the DHCP protocol DHCPv4 and DHCPv6. At startup the client may be started for one or the other via the -4 or -6 options.
+ man dhclient-script
+ head -n 20
dhclient-script(8) System Manager's Manual dhclient-script(8)
NAME
dhclient-script - DHCP client network configuration script
DESCRIPTION
The DHCP client network configuration script is invoked from time to time by dhclient(8). This script is used by the dhcp client to set each interface's initial configuration prior to requesting an address, to test the address once it has been offered, and to set the interface's final configuration once a lease has been acquired. If no lease is acquired, the script is used to test predefined leases,
if any, and also called once if no valid lease can be identified.
This script is not meant to be customized by the end user. If local customizations are needed, they should be possible using the enter and exit hooks provided (see HOOKS for details). These hooks will allow the user to override the default behaviour of the client in creating a /etc/resolv.conf file, and to handle DHCP options not handled by default.
No standard client script exists for some operating systems, even though the actual client may work, so a pioneering user may well need to create a new script or modify an existing one. In general, customizations specific to a particular computer should be done in the /etc/dhcp/dhclient.conf file. If you find that you can't make such a customization without customizing /etc/dhcp/dhclient.conf or
using the enter and exit hooks, please submit a bug report.
HOOKS
When it starts, the client script first defines a shell function, make_resolv_conf , which is later used to create the /etc/resolv.conf file. To override the default behaviour, redefine this function in the enter hook script.
On after defining the make_resolv_conf function, the client script checks for the presence of an executable /etc/dhcp/dhclient-enter-hooks script, and if present, it invokes the script inline, using the Bourne shell ´.´ command. The entire environment documented under OPERATION is available to this script, which may modify the environment if needed to change the behaviour of the script. If an error
+ man dig
+ head -n 20
DIG(1) BIND9 DIG(1)
NAME
dig - DNS lookup utility
SYNOPSIS
dig [@server] [-b address] [-c class] [-f filename] [-k filename] [-m] [-p port#] [-q name] [-t type] [-v] [-x addr] [-y [hmac:]name:key] [[-4] | [-6]] [name] [type] [class] [queryopt...]
dig [-h]
dig [global-queryopt...] [query...]
DESCRIPTION
dig is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried. Most DNS administrators use dig to troubleshoot DNS problems because of its flexibility, ease of use and clarity of output. Other lookup tools tend to have less functionality than dig.
Although dig is normally used with command-line arguments, it also has a batch mode of operation for reading lookup requests from a file. A brief summary of its command-line arguments and options is printed when the -h option is given. Unlike earlier versions, the BIND 9 implementation of dig allows multiple lookups to be issued from the command line.
Unless it is told to query a specific name server, dig will try each of the servers listed in /etc/resolv.conf. If no usable server addresses are found, dig will send the query to the local host.
+ man dm_dso_reg_tool
+ head -n 20
DMEVENT_TOOL(8) DMEVENT_TOOL(8)
NAME
dmevent_tool - A utility used to load a DSO into dmeventd and (un)register devices with it for monitoring
SYNOPSIS
dmevent_tool -[Vhmru] {RAID device name} {DSO Name}
DESCRIPTION
dmevent_tool is a userspace utility used to register/unregister DSOs with the daemon dmeventd.
If used with the -m command line parameter users can display all of the actively dmeventd monitored devices.
OPTIONS
-V Show version of dmevent_tool
+ man dmesg
+ head -n 20
DMESG(1) User Commands DMESG(1)
NAME
dmesg - print or control the kernel ring buffer
SYNOPSIS
dmesg [options]
dmesg --clear
dmesg --read-clear [options]
dmesg --console-level level
dmesg --console-on
dmesg --console-off
DESCRIPTION
dmesg is used to examine or control the kernel ring buffer.
The default action is to display all messages from the kernel ring buffer.
+ man dmevent_tool
+ head -n 20
DMEVENT_TOOL(8) DMEVENT_TOOL(8)
NAME
dmevent_tool - A utility used to load a DSO into dmeventd and (un)register devices with it for monitoring
SYNOPSIS
dmevent_tool -[Vhmru] {RAID device name} {DSO Name}
DESCRIPTION
dmevent_tool is a userspace utility used to register/unregister DSOs with the daemon dmeventd.
If used with the -m command line parameter users can display all of the actively dmeventd monitored devices.
OPTIONS
-V Show version of dmevent_tool
+ man dmeventd
+ head -n 20
DMEVENTD(8) System Manager's Manual DMEVENTD(8)
NAME
dmeventd — Device-mapper event daemon
SYNOPSIS
dmeventd [-d [-d [-d]]] [-f] [-h] [-l] [-R] [-V] [-?]
DESCRIPTION
dmeventd is the event monitoring daemon for device-mapper devices. Library plugins can register and carry out actions triggered when particular events occur.
OPTIONS
-d
Repeat from 1 to 3 times ( -d, -dd, -ddd ) to increase the detail of debug messages sent to syslog. Each extra d adds more debugging information.
-f
Don't fork, run in the foreground.
+ man dmfilemapd
+ head -n 20
DMFILEMAPD(8) MAINTENANCE COMMANDS DMFILEMAPD(8)
NAME
dmfilemapd — device-mapper filemap monitoring daemon
SYNOPSIS
dmfilemapd [file_descriptor] [group_id] [abs_path] [mode] [foreground[verbose]]
DESCRIPTION
The dmfilemapd daemon monitors groups of dmstats regions that correspond to the extents of a file, adding and removing regions to reflect the changing state of the file on-disk.
The daemon is normally launched automatically by the dmstats create command, but can be run manually, either to create a new daemon where one did not previously exist, or to change the options previously used, by killing the existing daemon and starting a new one.
OPTIONS
file_descriptor
Specify the file descriptor number for the file to be monitored. The file descriptor must reference a regular file, open for reading, in a local file system that supports the FIEMAP ioctl, and that returns data describing the physical location of extents.
The process that executes dmfilemapd is responsible for opening the file descriptor that is handed to the daemon.
+ man dmidecode
+ head -n 20
DMIDECODE(8) System Manager's Manual DMIDECODE(8)
NAME
dmidecode - DMI table decoder
SYNOPSIS
dmidecode [OPTIONS]
DESCRIPTION
dmidecode is a tool for dumping a computer's DMI (some say SMBIOS) table contents in a human-readable format. This table contains a description of the system's hardware components, as well as other useful pieces of information such as serial numbers and BIOS revision. Thanks to this table, you can retrieve this information without having to probe for the actual hardware. While this is a good point in
terms of report speed and safeness, this also makes the presented information possibly unreliable.
The DMI table doesn't only describe what the system is currently made of, it also can report the possible evolutions (such as the fastest supported CPU or the maximal amount of memory supported).
SMBIOS stands for System Management BIOS, while DMI stands for Desktop Management Interface. Both standards are tightly related and developed by the DMTF (Desktop Management Task Force).
As you run it, dmidecode will try to locate the DMI table. It will first try to read the DMI table from sysfs, and next try reading directly from memory if sysfs access failed. If dmidecode succeeds in locating a valid DMI table, it will then parse this table and display a list of records like this one:
+ man dmraid
+ head -n 20
DMRAID(8) System Manager's Manual DMRAID(8)
NAME
dmraid - discover, configure and activate software (ATA)RAID
SYNOPSIS
dmraid
{-a|--activate} {y|n|yes|no}
[-d|--debug]... [-v|--verbose]... [-i|--ignorelocking]
[-f|--format FORMAT[,FORMAT...]]
[{-P|--partchar} CHAR]
[-p|--no_partitions]
[-Z|--rm_partitions]
[--separator SEPARATOR]
[-t|--test]
[-u|--update_defer]
[RAID-set...]
+ man dmraid.static
+ head -n 20
DMRAID(8) System Manager's Manual DMRAID(8)
NAME
dmraid - discover, configure and activate software (ATA)RAID
SYNOPSIS
dmraid
{-a|--activate} {y|n|yes|no}
[-d|--debug]... [-v|--verbose]... [-i|--ignorelocking]
[-f|--format FORMAT[,FORMAT...]]
[{-P|--partchar} CHAR]
[-p|--no_partitions]
[-Z|--rm_partitions]
[--separator SEPARATOR]
[-t|--test]
[-u|--update_defer]
[RAID-set...]
+ man dmsetup
+ head -n 20
DMSETUP(8) MAINTENANCE COMMANDS DMSETUP(8)
NAME
dmsetup — low level logical volume management
SYNOPSIS
dmsetup clear device_name
dmsetup create device_name [-u|--uuid uuid] [--addnodeoncreate|--addnodeonresume] [-n|--notable|--table table|table_file] [--readahead [+]sectors|auto|none]
dmsetup create --concise [concise_device_specification]
dmsetup deps [-o options] [device_name...]
dmsetup help [-c|-C|--columns]
dmsetup info [device_name...]
dmsetup info -c|-C|--columns [--count count] [--interval seconds] [--nameprefixes] [--noheadings] [-o fields] [-O|--sort sort_fields] [--separator separator] [device_name]
dmsetup load device_name [--table table|table_file]
dmsetup ls [--target target_type] [--exec command] [--tree] [-o options]
dmsetup mangle [device_name...]
dmsetup message device_name sector message
dmsetup mknodes [device_name...]
+ man dmstats
+ head -n 20
DMSTATS(8) MAINTENANCE COMMANDS DMSTATS(8)
NAME
dmstats — device-mapper statistics management
SYNOPSIS
dmsetup stats command [OPTIONS]
dmstats command device_name | --major major --minor minor | -u|--uuid uuid [-v|--verbose]
dmstats clear device_name [--allprograms|--programid id] [--allregions|--regionid id]
dmstats create device_name...|file_path...|--alldevices [--areas nr_areas|--areasize area_size] [--bounds histogram_boundaries] [--filemap] [--follow follow_mode] [--foreground] [--nomonitor] [--nogroup] [--precise] [--start start_sector --length length|--segments] [--userdata user_data] [--programid id]
dmstats delete device_name|--alldevices [--allprograms|--programid id] [--allregions|--regionid id]
dmstats group [device_name|--alldevices] [--alias name] [--regions regions]
dmstats help [-c|-C|--columns]
dmstats list [device_name] [--histogram] [--allprograms|--programid id] [--units units] [--area] [--region] [--group] [--nosuffix] [--notimesuffix] [-v|--verbose]
dmstats print [device_name] [--clear] [--allprograms|--programid id] [--allregions|--regionid id]
dmstats report [device_name] [--interval seconds] [--count count] [--units units] [--histogram] [--allprograms|--programid id] [--allregions|--regionid id] [--area] [--region] [--group] [-O|--sort sort_fields] [-S|--select selection] [--units units] [--nosuffix] [--notimesuffix]
dmstats ungroup [device_name|--alldevices] [--groupid id]
+ man dnsdomainname
+ head -n 20
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1)
NAME
hostname - show or set the system's host name
domainname - show or set the system's NIS/YP domain name
ypdomainname - show or set the system's NIS/YP domain name
nisdomainname - show or set the system's NIS/YP domain name
dnsdomainname - show the system's DNS domain name
SYNOPSIS
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis]
hostname [-b|--boot] [-F|--file filename] [hostname]
hostname [-h|--help] [-V|--version]
domainname [nisdomain] [-F file]
ypdomainname [nisdomain] [-F file]
nisdomainname [nisdomain] [-F file]
+ man domainname
+ head -n 20
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1)
NAME
hostname - show or set the system's host name
domainname - show or set the system's NIS/YP domain name
ypdomainname - show or set the system's NIS/YP domain name
nisdomainname - show or set the system's NIS/YP domain name
dnsdomainname - show the system's DNS domain name
SYNOPSIS
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis]
hostname [-b|--boot] [-F|--file filename] [hostname]
hostname [-h|--help] [-V|--version]
domainname [nisdomain] [-F file]
ypdomainname [nisdomain] [-F file]
nisdomainname [nisdomain] [-F file]
+ man dosfsck
+ head -n 20
FSCK.FAT(8) dosfstools FSCK.FAT(8)
NAME
fsck.fat - check and repair MS-DOS filesystems
SYNOPSIS
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE
DESCRIPTION
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them.
The following filesystem problems can be corrected (in this order):
* FAT contains invalid cluster numbers. Cluster is changed to EOF.
* File's cluster chain contains a loop. The loop is broken.
+ man dosfslabel
+ head -n 20
No manual entry for dosfslabel
+ man dracut
+ head -n 20
DRACUT(8) dracut DRACUT(8)
NAME
dracut - low-level tool for generating an initramfs image
SYNOPSIS
dracut [OPTION...] [<image> [<kernel version>]]
DESCRIPTION
Create an initramfs <image> for the kernel with the version <kernel version>. If <kernel version> is omitted, then the version of the actual running kernel is used. If <image> is omitted or empty, then the default location /boot/initramfs-<kernel version>.img is used.
dracut creates an initial image used by the kernel for preloading the block device modules (such as IDE, SCSI or RAID) which are needed to access the root filesystem, mounting the root filesystem and booting into the real system.
At boot time, the kernel unpacks that archive into RAM disk, mounts and uses it as initial root file system. All finding of the root device happens in this early userspace.
For a complete list of kernel command line options see dracut.cmdline(7).
If you are dropped to an emergency shell, while booting your initramfs, the file /run/initramfs/rdsosreport.txt is created, which can be safed to a (to be mounted by hand) partition (usually /boot) or a USB stick. Additional debugging info can be produced by adding rd.debug to the kernel command line. /run/initramfs/rdsosreport.txt contains all logs and the output of some tools. It should be attached
+ man dump-acct
+ head -n 20
DUMP_ACCT(8) System Manager's Manual DUMP_ACCT(8)
NAME
dump-acct - print an acct/pacct file in human-readable format
SYNOPSIS
dump-acct [-r|--reverse] [-R|--raw] [-n|--num recs] [--byte-swap] [--format] [--ahz freq] [-h|--help] [files]
DESCRIPTION
The dump-acct command transforms the output file from the accton format to the human-readable format: one record per line. Each record consists of severald fields which are separated by character "|" (the meaning of concreate field depends on the version of kernel package - with which the accton file was created).
OPTIONS
The following options are supported:
-r, --reverse
+ man dump-utmp
+ head -n 20
DUMP-UTMP(8) GNU Accounting Utilities DUMP-UTMP(8)
NAME
dump-utmp - print an utmp file in human-readable format.
SYNOPSIS
dump-utmp [-r|--reverse] [-R|--raw] [-n|--num recs] [-h|--help] [ files]
DESCRIPTION
dump-utmp filename prints a list of all logins. This list is usually written in /var/log/wtmp.
All fields are separated by vertical line. Fields are: user name, tty, type, id, pid, hostaddr, host, time.
OPTIONS
-h, --help
+ man dumpe2fs
+ head -n 20
DUMPE2FS(8) System Manager's Manual DUMPE2FS(8)
NAME
dumpe2fs - dump ext2/ext3/ext4 filesystem information
SYNOPSIS
dumpe2fs [ -bfhixV ] [ -o superblock=superblock ] [ -o blocksize=blocksize ] device
DESCRIPTION
dumpe2fs prints the super block and blocks group information for the filesystem present on device.
Note: When used with a mounted filesystem, the printed information may be old or inconsistent.
OPTIONS
-b print the blocks which are reserved as bad in the filesystem.
-o superblock=superblock
use the block superblock when examining the filesystem. This option is not usually needed except by a filesystem wizard who is examining the remains of a very badly corrupted filesystem.
+ man dumpkeys
+ head -n 20
DUMPKEYS(1) General Commands Manual DUMPKEYS(1)
NAME
dumpkeys - dump keyboard translation tables
SYNOPSIS
dumpkeys [ -1Vdfhiklnstv -h --help -i --short-info -l -s --long-info -n --numeric -f --full-table -1 --separate-lines -Sshape --shape=shape -t --funcs-only -k --keys-only -d --compose-only -ccharset --charset=charset -v --verbose -V --version ]
DESCRIPTION
dumpkeys writes, to the standard output, the current contents of the keyboard driver's translation tables, in the format specified by keymaps(5).
Using the various options, the format of the output can be controlled and also other information from the kernel and the programs dumpkeys(1) and loadkeys(1) can be obtained.
OPTIONS
-h --help
Prints the program's version number and a short usage message to the program's standard error output and exits.
-i --short-info
+ man dwp
+ head -n 20
No manual entry for dwp
+ man e2freefrag
+ head -n 20
E2FREEFRAG(8) System Manager's Manual E2FREEFRAG(8)
NAME
e2freefrag - report free space fragmentation information
SYNOPSIS
e2freefrag [ -c chunk_kb ] [ -h ] filesys
DESCRIPTION
e2freefrag is used to report free space fragmentation on ext2/3/4 file systems. filesys is the filesystem device name (e.g. /dev/hdc1, /dev/md0). The e2freefrag program will scan the block bitmap information to check how many free blocks are present as contiguous and aligned free space. The percentage of contiguous free blocks of size and of alignment chunk_kb is reported. It also displays the min‐
imum/maximum/average free chunk size in the filesystem, along with a histogram of all free chunks. This information can be used to gauge the level of free space fragmentation in the filesystem.
OPTIONS
-c chunk_kb
If a chunk size is specified, then e2freefrag will print how many free chunks of size chunk_kb are available in units of kilobytes (Kb). The chunk size must be a power of two and be larger than filesystem block size.
-h Print the usage of the program.
+ man e2fsck
+ head -n 20
E2FSCK(8) System Manager's Manual E2FSCK(8)
NAME
e2fsck - check a Linux ext2/ext3/ext4 file system
SYNOPSIS
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device
DESCRIPTION
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its
superblock indicates that further checking is required.
device is the device file where the filesystem is stored (e.g. /dev/hdc1).
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''.
Only experts who really know what they are doing should consider answering this question in any other way.
OPTIONS
+ man e2image
+ head -n 20
E2IMAGE(8) System Manager's Manual E2IMAGE(8)
NAME
e2image - Save critical ext2/ext3/ext4 filesystem metadata to a file
SYNOPSIS
e2image [ -r|Q ] [ -fr ] device image-file
e2image -I device image-file
e2image -ra [ -cfnp ] [ -o src_offset ] [ -O dest_offset ] src_fs [ dest_fs ]
DESCRIPTION
The e2image program will save critical ext2, ext3, or ext4 filesystem metadata located on device to a file specified by image-file. The image file may be examined by dumpe2fs and debugfs, by using the -i option to those programs. This can assist an expert in recovering catastrophically corrupted filesystems. In the future, e2fsck will be enhanced to be able to use the image file to help recover a
badly damaged filesystem.
When saving an e2image for debugging purposes, using either the -r or -Q options, the filesystem must be unmounted or be mounted read/only, in order for the image file to be in a consistent state. This requirement can be overriden using the -f option, but the resulting image file is very likely not going to be useful.
If image-file is -, then the output of e2image will be sent to standard output, so that the output can be piped to another program, such as gzip(1). (Note that this is currently only supported when creating a raw image file using the -r option, since the process of creating a normal image file, or QCOW2 image currently requires random access to the file, which cannot be done using a pipe. This
restriction will hopefully be lifted in a future version of e2image.)
+ man e2label
+ head -n 20
E2LABEL(8) System Manager's Manual E2LABEL(8)
NAME
e2label - Change the label on an ext2/ext3/ext4 filesystem
SYNOPSIS
e2label device [ new-label ]
DESCRIPTION
e2label will display or change the filesystem label on the ext2, ext3, or ext4 filesystem located on device.
If the optional argument new-label is not present, e2label will simply display the current filesystem label.
If the optional argument new-label is present, then e2label will set the filesystem label to be new-label. Ext2 filesystem labels can be at most 16 characters long; if new-label is longer than 16 characters, e2label will truncate it and print a warning message.
It is also possible to set the filesystem label using the -L option of tune2fs(8).
AUTHOR
+ man e2undo
+ head -n 20
E2UNDO(8) System Manager's Manual E2UNDO(8)
NAME
e2undo - Replay an undo log for an ext2/ext3/ext4 filesystem
SYNOPSIS
e2undo [ -f ] undo_log device
DESCRIPTION
e2undo will replay the undo log undo_log for an ext2/ext3/ext4 filesystem found on device. This can be used to undo a failed operation by an e2fsprogs program.
OPTIONS
-f Normally, e2undo will check the filesystem UUID and last modified time to make sure the undo log matches with the filesystem on the device. If they do not match, e2undo will refuse to apply the undo log as a safety mechanism. The -f option disables this safety mechanism.
AUTHOR
e2undo was written by Aneesh Kumar K.V. ([email protected])
AVAILABILITY
+ man e4defrag
+ head -n 20
E4DEFRAG(8) System Manager's Manual E4DEFRAG(8)
NAME
e4defrag - online defragmenter for ext4 filesystem
SYNOPSIS
e4defrag [ -c ] [ -v ] target ...
DESCRIPTION
e4defrag reduces fragmentation of extent based file. The file targeted by e4defrag is created on ext4 filesystem made with "-O extent" option (see mke2fs(8)). The targeted file gets more contiguous blocks and improves the file access speed.
target is a regular file, a directory, or a device that is mounted as ext4 filesystem. If target is a directory, e4defrag reduces fragmentation of all files in it. If target is a device, e4defrag gets the mount point of it and reduces fragmentation of all files in this mount point.
OPTIONS
-c Get a current fragmentation count and an ideal fragmentation count, and calculate fragmentation score based on them. By seeing this score, we can determine whether we should execute e4defrag to target. When used with -v option, the current fragmentation count and the ideal fragmentation count are printed for each file.
Also this option outputs the average data size in one extent. If you see it, you'll find the file has ideal extents or not. Note that the maximum extent size is 131072KB in ext4 filesystem (if block size is 4KB).
+ man easy_install
+ head -n 20
No manual entry for easy_install
+ man easy_install-2.7
+ head -n 20
No manual entry for easy_install-2.7
+ man easy_install-3.7
+ head -n 20
No manual entry for easy_install-3.7
+ man ebsnvme-id
+ head -n 20
No manual entry for ebsnvme-id
+ man ec2-metadata
+ head -n 20
No manual entry for ec2-metadata
+ man ec2ifdown
+ head -n 20
ec2ifup(8) System Administration tools and Daemons ec2ifup(8)
NAME
ec2ifup - bring an elastic network interface up
ec2ifdown - take an elastic network interface down
SYNOPSIS
ec2ifup IFACE
ec2ifdown IFACE
DESCRIPTION
The ec2ifup and ec2ifdown commands may be used to configure (or, respectively, deconfigure) a network interface based on its definition in the instance metadata store. The resulting configuration will be stored in /etc/sysconfig/network-scripts.
These scripts take one argument: the name of the network interface (e.g. eth0). If the configuration for this interface is present and defines EC2SYNC=no, the scripts will exit without making changes. Otherwise, the configuration will be replaced or removed.
+ man ec2ifscan
+ head -n 20
ec2ifscan(8) System Administration tools and Daemons ec2ifscan(8)
NAME
ec2ifscan - find and configure elastic network interfaces
SYNOPSIS
ec2ifscan
DESCRIPTION
Elastic network interfaces require the instance metadata service to be reachable for correct configuration in the general case, which requires at least one active network interface. This condition may not be met for interfaces attached at instance launch time. Consequently, those interfaces can remain unconfigured.
The ec2ifscan command may be used to find and configure elastic network interfaces in an unconfigured state. An interface is considered to be unconfigured if the link is down, and no configuration exists in /etc/sysconfig/network-scripts.
A hotplug add event is generated for each unconfigured interface that is found. This provides another opportunity for udev rules to automatically configure and activate the elastic network interface.
+ man ec2ifup
+ head -n 20
ec2ifup(8) System Administration tools and Daemons ec2ifup(8)
NAME
ec2ifup - bring an elastic network interface up
ec2ifdown - take an elastic network interface down
SYNOPSIS
ec2ifup IFACE
ec2ifdown IFACE
DESCRIPTION
The ec2ifup and ec2ifdown commands may be used to configure (or, respectively, deconfigure) a network interface based on its definition in the instance metadata store. The resulting configuration will be stored in /etc/sysconfig/network-scripts.
These scripts take one argument: the name of the network interface (e.g. eth0). If the configuration for this interface is present and defines EC2SYNC=no, the scripts will exit without making changes. Otherwise, the configuration will be replaced or removed.
+ man ec2udev-vbd
+ head -n 20
No manual entry for ec2udev-vbd
+ man ec2udev-vcpu
+ head -n 20
No manual entry for ec2udev-vcpu
+ man ed
+ head -n 20
ED(1) User Commands ED(1)
NAME
Ed - line-oriented text editor
SYNOPSIS
ed [options] [file]
DESCRIPTION
GNU Ed - The GNU line editor.
OPTIONS
-h, --help
display this help and exit
-V, --version
output version information and exit
+ man edquota
+ head -n 20
EDQUOTA(8) System Manager's Manual EDQUOTA(8)
NAME
edquota - edit user quotas
SYNOPSIS
edquota [ -p protoname ] [ -u | -g ] [ -rm ] [ -F format-name ] [ -f filesystem ] username...
edquota [ -u | -g ] [ -F format-name ] [ -f filesystem ] -t
edquota [ -u | -g ] [ -F format-name ] [ -f filesystem ] -T username | groupname...
DESCRIPTION
edquota is a quota editor. One or more users or groups may be specified on the command line. If a number is given in the place of user/group name it is treated as an UID/GID. For each user or group a temporary file is created with an ASCII representation of the current disk quotas for that user or group and an editor is then invoked on the file. The quotas may then be modified, new quotas added, etc.
Setting a quota to zero indicates that no quota should be imposed.
Block usage and limits are reported and interpereted as multiples of kibibyte (1024 bytes) blocks by default. Symbols K, M, G, and T can be appended to numeric value to express kibibytes, mebibytes, gibibytes, and tebibytes.
+ man efibootmgr
+ head -n 20
EFIBOOTMGR(8) EFIBOOTMGR(8)
NAME
efibootmgr - manipulate the EFI Boot Manager
SYNOPSIS
efibootmgr [ -a ] [ -A ] [ -b XXXX ] [ -r | -y ] [ -B ] [ -c ] [ -d DISK ] [ -D ] [ -e 1|3|-1 ] [ -E NUM ] [ -g ] [ -i NAME ] [ -l NAME ] [ -L LABEL ] [ -m t|f ] [ -M X ] [ -n XXXX ] [ -N ] [ -o XXXX,YYYY,ZZZZ ... ] [ -O ] [ -p PART ] [ -q ] [ -t seconds ] [ -T ] [ -u ] [ -v ] [ -V ] [ -w ] [ -@ file ]
DESCRIPTION
efibootmgr is a userspace application used to modify the Intel Extensible Firmware Interface (EFI) Boot Manager. This application can create and destroy boot entries, change the boot order, change the next running boot option, and more.
Details on the EFI Boot Manager are available from the EFI Specification, v1.02 or later, available from:
<URL:http://developer.intel.com>
Note: efibootmgr requires that the kernel support access to EFI non-volatile variables through /sys/firmware/efi/vars or /sys/firmware/efi/efivars/.
OPTIONS
+ man eject
+ head -n 20
EJECT(1) User Commands EJECT(1)
NAME
eject - eject removable media
SYNOPSIS
eject [options] device|mountpoint
DESCRIPTION
eject allows removable media (typically a CD-ROM, floppy disk, tape, JAZ, ZIP or USB disk) to be ejected under software control. The command can also control some multi-disc CD-ROM changers, the auto-eject feature supported by some devices, and close the disc tray of some CD-ROM drives.
The device corresponding to device or mountpoint is ejected. If no name is specified, the default name /dev/cdrom is used. The device may be addressed by device name (e.g. 'sda'), device path (e.g. '/dev/sda'), UUID=uuid or LABEL=label tags.
There are four different methods of ejecting, depending on whether the device is a CD-ROM, SCSI device, removable floppy, or tape. By default eject tries all four methods in order until it succeeds.
If a device partition is specified, the whole-disk device is used. If the device or a device partition is currently mounted, it is unmounted before ejecting.
OPTIONS
+ man elfedit
+ head -n 20
ELFEDIT(1) GNU Development Tools ELFEDIT(1)
NAME
elfedit - Update the ELF header of ELF files.
SYNOPSIS
elfedit [--input-mach=machine]
[--input-type=type]
[--input-osabi=osabi]
--output-mach=machine
--output-type=type
--output-osabi=osabi
[-v|--version]
[-h|--help]
elffile...
DESCRIPTION
elfedit updates the ELF header of ELF files which have the matching ELF machine and file types. The options control how and which fields in the ELF header should be updated.
+ man enable-ec2-spot-hibernation
+ head -n 20
No manual entry for enable-ec2-spot-hibernation
+ man envsubst
+ head -n 20
ENVSUBST(1) GNU ENVSUBST(1)
NAME
envsubst - substitutes environment variables in shell format strings
SYNOPSIS
envsubst [OPTION] [SHELL-FORMAT]
DESCRIPTION
Substitutes the values of environment variables.
Operation mode:
-v, --variables
output the variables occurring in SHELL-FORMAT
Informative output:
-h, --help
display this help and exit
+ man era_check
+ head -n 20
era_check(8) System Manager's Manual era_check(8)
NAME
era_check - validate era metadata on device or file.
SYNOPSIS
era_check [options] {device|file}
DESCRIPTION
era_check checks era metadata created by the device-mapper era target on a device or file.
This tool cannot be run on live metadata.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man era_dump
+ head -n 20
era_dump(8) System Manager's Manual era_dump(8)
NAME
era_dump - dump era metadata from device or file to standard output.
SYNOPSIS
era_dump [options] {device|file}
DESCRIPTION
era_dump dumps binary era metadata created by the device-mapper era target on a device or file to standard output for analysis or postprocessing in XML format. XML formated metadata can be fed into era_restore (see era_restore(8)) in order to put it back onto a metadata device (to process by the device-mapper target) or file.
This tool cannot be run on live metadata.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man era_invalidate
+ head -n 20
era_invalidate(8) System Manager's Manual era_invalidate(8)
NAME
era_invalidate - Provide a list of blocks that have changed since a particular era.
SYNOPSIS
era_invalidate [options] {device|file}
DESCRIPTION
era_invalidate examines era metadata and lists blocks that may have changed since a given era.
This tool cannot be run on live metadata unless the --metadata-snap option is used.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man era_restore
+ head -n 20
era_restore(8) System Manager's Manual era_restore(8)
NAME
era_restore - restore era metadata file to device or file.
SYNOPSIS
era_restore [options] -i {xml file} -o {device|file}
DESCRIPTION
era_restore restores era metadata created by the respective device-mapper target dumped into an XML formatted (see era_dump(8)) file, which optionally can be preprocessed before the restore to another device or file. If restored to a metadata device, the metadata can be processed by the device-mapper target.
This tool cannot be run on live metadata.
OPTIONS
-h, --help
Print help and exit.
-V, --version
+ man ether-wake
+ head -n 20
ETHER-WAKE(8) System Manager's Manual ETHER-WAKE(8)
NAME
ether-wake - A tool to send a Wake-On-LAN "Magic Packet"
SYNOPSIS
ether-wake [options] Host-ID
DESCRIPTION
This manual page documents the usage of the ether-wake command.
ether-wake is a program that generates and transmits a Wake-On-LAN (WOL) "Magic Packet", used for restarting machines that have been soft-powered-down (ACPI D3-warm state). It generates the standard AMD Magic Packet format, optionally with a password included. The single required parameter is a station (MAC) address or a host ID that can be translated to a MAC address by an ethers(5) database speci‐
fied in nsswitch.conf(5)
OPTIONS
ether-wake needs a single dash (´-´) in front of options. A summary of options is included below.
-b Send the wake-up packet to the broadcast address.
+ man ethtool
+ head -n 20
ETHTOOL(8) System Manager's Manual ETHTOOL(8)
NAME
ethtool - query or control network driver and hardware settings
SYNOPSIS
ethtool devname
ethtool -h|--help
ethtool --version
ethtool -a|--show-pause devname
ethtool -A|--pause devname [autoneg on|off] [rx on|off] [tx on|off]
ethtool -c|--show-coalesce devname
+ man exportfs
+ head -n 20
exportfs(8) System Manager's Manual exportfs(8)
NAME
exportfs - maintain table of exported NFS file systems
SYNOPSIS
/usr/sbin/exportfs [-avi] [-o options,..] [client:/path ..]
/usr/sbin/exportfs -r [-v]
/usr/sbin/exportfs [-av] -u [client:/path ..]
/usr/sbin/exportfs [-v]
/usr/sbin/exportfs -f
/usr/sbin/exportfs -s
DESCRIPTION
An NFS server maintains a table of local physical file systems that are accessible to NFS clients. Each file system in this table is referred to as an exported file system, or export, for short.
The exportfs command maintains the current table of exports for the NFS server. The master export table is kept in a file named /var/lib/nfs/etab. This file is read by rpc.mountd when a client sends an NFS MOUNT request.
+ man faillock
+ head -n 20
FAILLOCK(8) Linux-PAM Manual FAILLOCK(8)
NAME
faillock - Tool for displaying and modifying the authentication failure record files
SYNOPSIS
faillock [--dir /path/to/tally-directory] [--user username] [--reset]
DESCRIPTION
The pam_faillock.so module maintains a list of failed authentication attempts per user during a specified interval and locks the account in case there were more than deny consecutive failed authentications. It stores the failure records into per-user files in the tally directory.
The faillock command is an application which can be used to examine and modify the contents of the the tally files. It can display the recent failed authentication attempts of the username or clear the tally files of all or individual usernames.
OPTIONS
--dir /path/to/tally-directory
The directory where the user files with the failure records are kept. The default is /var/run/faillock.
--user username
+ man fallocate
+ head -n 20
FALLOCATE(1) User Commands FALLOCATE(1)
NAME
fallocate - preallocate or deallocate space to a file
SYNOPSIS
fallocate [-c|-p|-z] [-o offset] -l length [-n] filename
fallocate -d [-o offset] [-l length] filename
fallocate -x [-o offset] -l length filename
DESCRIPTION
fallocate is used to manipulate the allocated disk space for a file, either to deallocate or preallocate it. For filesystems which support the fallocate system call, preallocation is done quickly by allocating blocks and marking them as uninitialized, requiring no IO to the data blocks. This is much faster than creating a file by filling it with zeroes.
The exit code returned by fallocate is 0 on success and 1 on failure.
OPTIONS
+ man fatlabel
+ head -n 20
FATLABEL(8) dosfstools FATLABEL(8)
NAME
fatlabel - set or get MS-DOS filesystem label
SYNOPSIS
fatlabel DEVICE [LABEL]
DESCRIPTION
fatlabel set or gets a MS-DOS filesystem label from a given device.
If the label is omitted, then the label name of the specified device is written on the standard output. A label can't be longer than 11 bytes.
OPTIONS
-h, --help
+ man fdformat
+ head -n 20
FDFORMAT(8) System Administration FDFORMAT(8)
NAME
fdformat - low-level format a floppy disk
SYNOPSIS
fdformat [options] device
DESCRIPTION
fdformat does a low-level format on a floppy disk. device is usually one of the following (for floppy devices the major = 2, and the minor is shown for informational purposes only):
/dev/fd0d360 (minor = 4)
/dev/fd0h1200 (minor = 8)
/dev/fd0D360 (minor = 12)
/dev/fd0H360 (minor = 12)
/dev/fd0D720 (minor = 16)
/dev/fd0H720 (minor = 16)
/dev/fd0h360 (minor = 20)
+ man fdisk
+ head -n 20
FDISK(8) System Administration FDISK(8)
NAME
fdisk - manipulate disk partition table
SYNOPSIS
fdisk [options] device
fdisk -l [device...]
DESCRIPTION
fdisk is a dialog-driven program for creation and manipulation of partition tables. It understands GPT, MBR, Sun, SGI and BSD partition tables.
Block devices can be divided into one or more logical disks called partitions. This division is recorded in the partition table, usually found in sector 0 of the disk. (In the BSD world one talks about `disk slices' and a `disklabel'.)
All partitioning is driven by device I/O limits (the topology) by default. fdisk is able to optimize the disk layout for a 4K-sector size and use an alignment offset on modern devices for MBR and GPT. It is always a good idea to follow fdisk's defaults as the default values (e.g. first and last partition sectors) and partition sizes specified by the +<size>{M,G,...} notation are always aligned
+ man fgconsole
+ head -n 20
FGCONSOLE(1) Linux User's Manual FGCONSOLE(1)
NAME
fgconsole - print the number of the active VT.
SYNOPSIS
fgconsole [ -h --help | -V --version | -n --next-available ]
DESCRIPTION
If the active Virtual Terminal is /dev/ttyN, then prints N on standard output.
If the console is a serial console, then "serial" is printed instead.
-h --help
Prints short usage message and exits.
-V --version
+ man file
+ head -n 20
FILE(1) BSD General Commands Manual FILE(1)
NAME
file — determine file type
SYNOPSIS
file [-bchiklLNnprsvz0] [--apple] [--mime-encoding] [--mime-type] [-e testname] [-F separator] [-f namefile] [-m magicfiles] file ...
file -C [-m magicfiles]
file [--help]
DESCRIPTION
This manual page documents version 5.11 of the file command.
file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file type to be printed.
The type printed will usually contain one of the words text (the file contains only printing characters and a few common control characters and is probably safe to read on an ASCII terminal), executable (the file contains the result of compiling a program in a form understandable to some UNIX kernel or another), or data meaning anything else (data is usually “binary” or non-printable). Exceptions are
well-known file formats (core files, tar archives) that are known to contain binary data. When modifying magic files or the program itself, make sure to preserve these keywords. Users depend on knowing that all the readable files in a directory have the word “text” printed. Don't do as Berkeley did and change “shell commands text” to “shell script”.
The filesystem tests are based on examining the return from a stat(2) system call. The program checks to see if the file is empty, or if it's some sort of special file. Any known file types appropriate to the system you are running on (sockets, symbolic links, or named pipes (FIFOs) on those systems that implement them) are intuited if they are defined in the system header file <sys/stat.h>.
+ man filefrag
+ head -n 20
FILEFRAG(8) System Manager's Manual FILEFRAG(8)
NAME
filefrag - report on file fragmentation
SYNOPSIS
filefrag [ -bblocksize ] [ -BeksvxX ] [ files... ]
DESCRIPTION
filefrag reports on how badly fragmented a particular file might be. It makes allowances for indirect blocks for ext2 and ext3 filesystems, but can be used on files for any filesystem.
The filefrag program initially attempts to get the extent information using FIEMAP ioctl which is more efficient and faster. If FIEMAP is not supported then filefrag will fall back to using FIBMAP.
OPTIONS
-B Force the use of the older FIBMAP ioctl instead of the FIEMAP ioctl for testing purposes.
-bblocksize
Use blocksize in bytes for output instead of the filesystem blocksize. For compatibility with earlier versions of filefrag, if blocksize is unspecified it defaults to 1024 bytes.
+ man fincore
+ head -n 20
FINCORE(1) User Commands FINCORE(1)
NAME
fincore - count pages of file contents in core
SYNOPSIS
fincore [options] file ...
DESCRIPTION
fincore counts pages of file contents being resident in memory(in core), and reports the numbers. If an error occurs during counting, then an error message is printed to the stderr and fincore continues processing the rest of files listed in a command line.
The default output is subject to change. So whenever possible, you should avoid using default outputs in your scripts. Always explicitly define expected columns by using --output columns-list in environments where a stable output is required.
OPTIONS
-n, --noheadings
Do not print a header line in status output.
-b, --bytes
+ man find-repos-of-install
+ head -n 20
find-repos-of-install(1) find-repos-of-install(1)
NAME
find-repos-of-install - report which Yum repository a package was installed from
SYNOPSIS
find-repos-of-install [options] package1 [package2...]
DESCRIPTION
find-repos-of-install is a program which reports the Yum repository that a specified package was installed from.
OPTIONS
--version
Report program version and exit.
-h, --help
Display a help message, and then quit.
+ man find2perl
+ head -n 20
FIND2PERL(1) Perl Programmers Reference Guide FIND2PERL(1)
NAME
find2perl - translate find command lines to Perl code
SYNOPSIS
find2perl [paths] [predicates] | perl
DESCRIPTION
find2perl is a little translator to convert find command lines to equivalent Perl code. The resulting code is typically faster than running find itself.
"paths" are a set of paths where find2perl will start its searches and "predicates" are taken from the following list.
"! PREDICATE"
Negate the sense of the following predicate. The "!" must be passed as a distinct argument, so it may need to be surrounded by whitespace and/or quoted from interpretation by the shell using a backslash (just as with using find(1)).
"( PREDICATES )"
Group the given PREDICATES. The parentheses must be passed as distinct arguments, so they may need to be surrounded by whitespace and/or quoted from interpretation by the shell using a backslash (just as with using find(1)).
+ man findfs
+ head -n 20
FINDFS(8) System Administration FINDFS(8)
NAME
findfs - find a filesystem by label or UUID
SYNOPSIS
findfs NAME=value
DESCRIPTION
findfs will search the block devices in the system looking for a filesystem or partition with specified tag. The currently supported tags are:
LABEL=<label>
Specifies filesystem label.
UUID=<uuid>
Specifies filesystem UUID.
PARTUUID=<uuid>
+ man findmnt
+ head -n 20
FINDMNT(8) System Administration FINDMNT(8)
NAME
findmnt - find a filesystem
SYNOPSIS
findmnt [options]
findmnt [options] device|mountpoint
findmnt [options] [--source] device [--target|--mountpoint] mountpoint
DESCRIPTION
findmnt will list all mounted filesystems or search for a filesystem. The findmnt command is able to search in /etc/fstab, /etc/mtab or /proc/self/mountinfo. If device or mountpoint is not given, all filesystems are shown.
The device may be specified by device name, major:minor numbers, filesystem label or UUID, or partition label or UUID. Note that findmnt follows mount(8) behavior where a device name may be interpreted as a mountpoint (and vice versa) if the --target, --mountpoint or --source options are not specified.
The command prints all mounted filesystems in the tree-like format by default.
+ man fipscheck
+ head -n 20
FIPSCHECK(8) fipscheck FIPSCHECK(8)
NAME
fipscheck - perform a FIPS-140-2 validation check of one or more files
SYNTAX
fipscheck [-s <hmac-suffix>] file1 [file2 ...]
DESCRIPTION
fipscheck will perform a FIPS-140-2 validation of a file using a stored checksum of a file. The file containing the checksum value is first looked up in the /usr/lib{64,}/fipscheck directory and if not found there, it will be searched for in the same directory as the file which is being checksummed.
The checksum file must have '.' prepended and '.hmac' appended to the original file name. The '.' must not be prepended to the file names in the /usr/lib{64,}/fipscheck directory.
If invoked correctly the fipscheck command will not print anything to the standard output or error and set the return code based on the test result. A return code of 0 means the file passed the checksum test. A value of non-zero means the checksum failed.
The -s option allows to specify the suffix of the hmac file names. The default value .hmac is used when this option is not specified.
RETURN CODES
+ man fipshmac
+ head -n 20
FIPSHMAC(8) fipshmac FIPSHMAC(8)
NAME
fipshmac - create FIPS-140-2 validation checksum files
SYNTAX
fipshmac [-d <directory>] file1 [file2 ...]
DESCRIPTION
fipshmac will create FIPS-140-2 checksum files for all the filenames specified. If the -d option is not specified, checksum files will be written in the same directory as the file being checksummed. It will prepend a '.' and append '.hmac' to the original file name. When a directory is specified with the -d option, the '.' will not be prepended and the files are stored into the directory.
If invoked correctly the fipshmac command will not print anything to the standard output or error. Otherwise it will print an error message to stderr.
The -s option allows to specify the suffix of the hmac file names. The default value .hmac is used when this option is not specified.
RETURN CODES
fipscheck can return the following return codes:
+ man fixfiles
+ head -n 20
fixfiles(8) fixfiles(8)
NAME
fixfiles - fix file SELinux security contexts.
SYNOPSIS
fixfiles [-v] [-F] [-B] [ -N time ] [-l logfile ] { check | restore|[-f] relabel | verify } [[dir/file] ... ]
fixfiles [-v] [-F] [ -R rpmpackagename[,rpmpackagename...] ] [-l logfile ] { check | restore | verify }
fixfiles [-v] [-F] -C PREVIOUS_FILECONTEXT [-l logfile ] { check | restore | verify }
fixfiles [-F] [-B] onboot
DESCRIPTION
This manual page describes the fixfiles script.
+ man fixparts
+ head -n 20
FIXPARTS(8) FixParts Manual FIXPARTS(8)
NAME
fixparts - MBR partition table repair utility
SYNOPSIS
fixparts device
DESCRIPTION
FixParts (aka fixparts) is a text-mode menu-driven program for repairing certain types of problems with Master Boot Record (MBR) partition tables. The program has three design goals, although a few additional features are supported, as well:
* It can remove stray GUID Partition Table (GPT) data, which can be left behind on a disk that was once used as a GPT disk but then incompletely converted to the more common (as of 2011) MBR form.
* It can repair mis-sized extended partitions -- either partitions that extend beyond the physical end of the disk or that overlap with nearby primary partitions. FixParts is designed in such a way that this type of repair occurs automatically, so if it's the only problem with your disk, you can launch the program and then immediately save the partition table, making no manual changes, and the
program will fix the problem.
+ man flock
+ head -n 20
FLOCK(1) User Commands FLOCK(1)
NAME
flock - manage locks from shell scripts
SYNOPSIS
flock [options] file|directory command [arguments]
flock [options] file|directory -c command
flock [options] number
DESCRIPTION
This utility manages flock(2) locks from within shell scripts or from the command line.
The first and second of the above forms wrap the lock around the execution of a command, in a manner similar to su(1) or newgrp(1). They lock a specified file or directory, which is created (assuming appropriate permissions) if it does not already exist. By default, if the lock cannot be immediately acquired, flock waits until the lock is available.
The third form uses an open file by its file descriptor number. See the examples below for how that can be used.
OPTIONS
+ man free
+ head -n 20
FREE(1) User Commands FREE(1)
NAME
free - Display amount of free and used memory in the system
SYNOPSIS
free [options]
DESCRIPTION
free displays the total amount of free and used physical and swap memory in the system, as well as the buffers and caches used by the kernel. The information is gathered by parsing /proc/meminfo. The displayed columns are:
total Total installed memory (MemTotal and SwapTotal in /proc/meminfo)
used Used memory (calculated as total - free - buffers - cache)
free Unused memory (MemFree and SwapFree in /proc/meminfo)
shared Memory used (mostly) by tmpfs (Shmem in /proc/meminfo, available on kernels 2.6.32, displayed as zero if not available)
+ man fsadm
+ head -n 20
FSADM(8) FSADM(8)
NAME
fsadm — utility to resize or check filesystem on a device
SYNOPSIS
fsadm [options] check device
fsadm [options] resize device [new_size]
DESCRIPTION
fsadm utility checks or resizes the filesystem on a device. It tries to use the same API for ext2, ext3, ext4, ReiserFS and XFS filesystem.
OPTIONS
-e|--ext-offline
Unmount ext2/ext3/ext4 filesystem before doing resize.
-f|--force
Bypass some sanity checks.
+ man fsck
+ head -n 20
FSCK(8) System Administration FSCK(8)
NAME
fsck - check and repair a Linux filesystem
SYNOPSIS
fsck [-lsAVRTMNP] [-r [fd]] [-C [fd]] [-t fstype] [filesystem...] [--] [fs-specific-options]
DESCRIPTION
fsck is used to check and optionally repair one or more Linux filesystems. filesys can be a device name (e.g. /dev/hdc1, /dev/sdb2), a mount point (e.g. /, /usr, /home), or an ext2 label or UUID specifier (e.g. UUID=8868abf6-88c5-4a83-98b8-bfc24057f7bd or LABEL=root). Normally, the fsck program will try to handle filesystems on different physical disk drives in parallel to reduce the total amount
of time needed to check all of them.
If no filesystems are specified on the command line, and the -A option is not specified, fsck will default to checking filesystems in /etc/fstab serially. This is equivalent to the -As options.
The exit code returned by fsck is the sum of the following conditions:
0 No errors
1 Filesystem errors corrected
+ man fsck.cramfs
+ head -n 20
FSCK.CRAMFS(8) System Administration FSCK.CRAMFS(8)
NAME
fsck.cramfs - fsck compressed ROM file system
SYNOPSIS
fsck.cramfs [options] file
DESCRIPTION
fsck.cramfs is used to check the cramfs file system.
OPTIONS
-v, --verbose
Enable verbose messaging.
-b, --blocksize blocksize
Use this blocksize, defaults to page size. Must be equal to what was set at creation time. Only used for --extract.
+ man fsck.ext2
+ head -n 20
E2FSCK(8) System Manager's Manual E2FSCK(8)
NAME
e2fsck - check a Linux ext2/ext3/ext4 file system
SYNOPSIS
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device
DESCRIPTION
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its
superblock indicates that further checking is required.
device is the device file where the filesystem is stored (e.g. /dev/hdc1).
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''.
Only experts who really know what they are doing should consider answering this question in any other way.
OPTIONS
+ man fsck.ext3
+ head -n 20
E2FSCK(8) System Manager's Manual E2FSCK(8)
NAME
e2fsck - check a Linux ext2/ext3/ext4 file system
SYNOPSIS
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device
DESCRIPTION
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its
superblock indicates that further checking is required.
device is the device file where the filesystem is stored (e.g. /dev/hdc1).
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''.
Only experts who really know what they are doing should consider answering this question in any other way.
OPTIONS
+ man fsck.ext4
+ head -n 20
E2FSCK(8) System Manager's Manual E2FSCK(8)
NAME
e2fsck - check a Linux ext2/ext3/ext4 file system
SYNOPSIS
e2fsck [ -pacnyrdfkvtDFV ] [ -b superblock ] [ -B blocksize ] [ -l|-L bad_blocks_file ] [ -C fd ] [ -j external-journal ] [ -E extended_options ] device
DESCRIPTION
e2fsck is used to check the ext2/ext3/ext4 family of file systems. For ext3 and ext4 filesystems that use a journal, if the system has been shut down uncleanly without any errors, normally, after replaying the committed transactions in the journal, the file system should be marked as clean. Hence, for filesystems that use journalling, e2fsck will normally replay the journal and exit, unless its
superblock indicates that further checking is required.
device is the device file where the filesystem is stored (e.g. /dev/hdc1).
Note that in general it is not safe to run e2fsck on mounted filesystems. The only exception is if the -n option is specified, and -c, -l, or -L options are not specified. However, even if it is safe to do so, the results printed by e2fsck are not valid if the filesystem is mounted. If e2fsck asks whether or not you should check a filesystem which is mounted, the only correct answer is ``no''.
Only experts who really know what they are doing should consider answering this question in any other way.
OPTIONS
+ man fsck.fat
+ head -n 20
man: warning: /usr/share/man/man8/fsck.fat.8.manpage-fix.gz: ignoring bogus filename
FSCK.FAT(8) dosfstools FSCK.FAT(8)
NAME
fsck.fat - check and repair MS-DOS filesystems
SYNOPSIS
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE
DESCRIPTION
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them.
The following filesystem problems can be corrected (in this order):
* FAT contains invalid cluster numbers. Cluster is changed to EOF.
* File's cluster chain contains a loop. The loop is broken.
+ man fsck.minix
+ head -n 20
FSCK.MINIX(8) System Administration FSCK.MINIX(8)
NAME
fsck.minix - check consistency of Minix filesystem
SYNOPSIS
fsck.minix [options] device
DESCRIPTION
fsck.minix performs a consistency check for the Linux MINIX filesystem.
The program assumes the filesystem is quiescent. fsck.minix should not be used on a mounted device unless you can be sure nobody is writing to it. Remember that the kernel can write to device when it searches for files.
The device name will usually have the following form:
/dev/hda[1–63] IDE disk 1
/dev/hdb[1–63] IDE disk 2
/dev/sda[1–15] SCSI disk 1
+ man fsck.msdos
+ head -n 20
FSCK.FAT(8) dosfstools FSCK.FAT(8)
NAME
fsck.fat - check and repair MS-DOS filesystems
SYNOPSIS
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE
DESCRIPTION
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them.
The following filesystem problems can be corrected (in this order):
* FAT contains invalid cluster numbers. Cluster is changed to EOF.
* File's cluster chain contains a loop. The loop is broken.
+ man fsck.vfat
+ head -n 20
FSCK.FAT(8) dosfstools FSCK.FAT(8)
NAME
fsck.fat - check and repair MS-DOS filesystems
SYNOPSIS
fsck.fat|fsck.msdos|fsck.vfat [-aAflnprtvVwy] [-d PATH -d ...] [-u PATH -u ...] DEVICE
DESCRIPTION
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them.
The following filesystem problems can be corrected (in this order):
* FAT contains invalid cluster numbers. Cluster is changed to EOF.
* File's cluster chain contains a loop. The loop is broken.
+ man fsck.xfs
+ head -n 20
fsck.xfs(8) System Manager's Manual fsck.xfs(8)
NAME
fsck.xfs - do nothing, successfully
SYNOPSIS
fsck.xfs [ filesys ... ]
DESCRIPTION
fsck.xfs is called by the generic Linux fsck(8) program at startup to check and repair an XFS filesystem. XFS is a journaling filesystem and performs recovery at mount(8) time if necessary, so fsck.xfs simply exits with a zero exit status.
If you wish to check the consistency of an XFS filesystem, or repair a damaged or corrupt XFS filesystem, see xfs_repair(8).
FILES
/etc/fstab.
SEE ALSO
fsck(8), fstab(5), xfs(5), xfs_repair(8).
+ man fsfreeze
+ head -n 20
FSFREEZE(8) System Administration FSFREEZE(8)
NAME
fsfreeze - suspend access to a filesystem (Ext3/4, ReiserFS, JFS, XFS)
SYNOPSIS
fsfreeze --freeze|--unfreeze mountpoint
DESCRIPTION
fsfreeze suspends or resumes access to a filesystem.
fsfreeze halts any new access to the filesystem and creates a stable image on disk. fsfreeze is intended to be used with hardware RAID devices that support the creation of snapshots.
fsfreeze is unnecessary for device-mapper devices. The device-mapper (and LVM) automatically freezes a filesystem on the device when a snapshot creation is requested. For more details see the dmsetup(8) man page.
The mountpoint argument is the pathname of the directory where the filesystem is mounted. The filesystem must be mounted to be frozen (see mount(8)).
+ man fstrim
+ head -n 20
FSTRIM(8) System Administration FSTRIM(8)
NAME
fstrim - discard unused blocks on a mounted filesystem
SYNOPSIS
fstrim [-a] [-o offset] [-l length] [-m minimum-size] [-v] mountpoint
DESCRIPTION
fstrim is used on a mounted filesystem to discard (or "trim") blocks which are not in use by the filesystem. This is useful for solid-state drives (SSDs) and thinly-provisioned storage.
By default, fstrim will discard all unused blocks in the filesystem. Options may be used to modify this behavior based on range or size, as explained below.
The mountpoint argument is the pathname of the directory where the filesystem is mounted.
Running fstrim frequently, or even using mount -o discard, might negatively affect the lifetime of poor-quality SSD devices. For most desktop and server systems a sufficient trimming frequency is once a week. Note that not all devices support a queued trim, so each trim command incurs a performance penalty on whatever else might be trying to use the disk at the time.
+ man funzip
+ head -n 20
FUNZIP(1L) FUNZIP(1L)
NAME
funzip - filter for extracting from a ZIP archive in a pipe
SYNOPSIS
funzip [-password] [input[.zip|.gz]]
ARGUMENTS
[-password]
Optional password to be used if ZIP archive is encrypted. Decryption may not be supported at some sites. See DESCRIPTION for more details.
[input[.zip|.gz]]
Optional input archive file specification. See DESCRIPTION for details.
DESCRIPTION
funzip without a file argument acts as a filter; that is, it assumes that a ZIP archive (or a gzip'd(1) file) is being piped into standard input, and it extracts the first member from the archive to stdout. When stdin comes from a tty device, funzip assumes that this cannot be a stream of (binary) compressed data and shows a short help text, instead. If there is a file argument, then input is read
from the specified file instead of from stdin.
+ man fuser
+ head -n 20
<standard input>:283: name expected (got `\{'): treated as missing
FUSER(1) User Commands FUSER(1)
NAME
fuser - identify processes using files or sockets
SYNOPSIS
fuser [-fuv] [-a|-s] [-4|-6] [-c|-m|-n space] [ -k [-i] [-M] [-w] [-SIGNAL] ] name ...
fuser -l
fuser -V
DESCRIPTION
fuser displays the PIDs of processes using the specified files or file systems. In the default display mode, each file name is followed by a letter denoting the type of access:
c current directory.
e executable being run.
f open file. f is omitted in default display mode.
F open file for writing. F is omitted in default display mode.
r root directory.
+ man gdisk
+ head -n 20
GDISK(8) GPT fdisk Manual GDISK(8)
NAME
gdisk - Interactive GUID partition table (GPT) manipulator
SYNOPSIS
gdisk [ -l ] device
DESCRIPTION
GPT fdisk (aka gdisk) is a text-mode menu-driven program for creation and manipulation of partition tables. It will automatically convert an old-style Master Boot Record (MBR) partition table or BSD disklabel stored without an MBR carrier partition to the newer Globally Unique Identifier (GUID) Partition Table (GPT) format, or will load a GUID partition table. When used with the -l command-line option,
the program displays the current partition table and then exits.
GPT fdisk operates mainly on the GPT headers and partition tables; however, it can and will generate a fresh protective MBR, when required. (Any boot loader code in the protective MBR will not be disturbed.) If you've created an unusual protective MBR, such as a hybrid MBR created by gptsync or gdisk's own hybrid MBR creation feature, this should not be disturbed by most ordinary actions. Some advanced
data recovery options require you to understand the distinctions between the main and backup data, as well as between the GPT headers and the partition tables. For information on MBR vs. GPT, as well as GPT terminology and structure, see the extended gdisk documentation at http://www.rodsbooks.com/gdisk/ or consult Wikipedia.
The gdisk program employs a user interface similar to that of Linux's fdisk, but gdisk modifies GPT partitions. It also has the capability of transforming MBR partitions or BSD disklabels into GPT partitions. Like the original fdisk program, gdisk does not modify disk structures until you explicitly write them to disk, so if you make a mistake, you can exit from the program with the 'q' option to leave
your partitions unmodified.
+ man genhomedircon
+ head -n 20
GENHOMEDIRCON(8) SELinux GENHOMEDIRCON(8)
NAME
genhomedircon - generate SELinux file context configuration entries for user home directories
DESCRIPTION
genhomedircon is a script that executes semodule to rebuild the currently active SELinux policy (without reloading it) and to create the labels for each user home directory based on directory paths returned by calls to getpwent().
The latter functionality depends on the "usepasswd" parameter being set to "true" (default) in /etc/selinux/semanage.conf.
This script is usually executed by semanage although this default behavior can be optionally modified by setting to "true" the "disable-genhomedircon" in /etc/selinux/semanage.conf.
AUTHOR
This manual page was written by Dan Walsh <[email protected]>
SEE ALSO
+ man genhostid
+ head -n 20
GENHOSTID(1) General Commands Manual GENHOSTID(1)
NAME
genhostid - generate and set a hostid for the current host
SYNOPSIS
genhostid
DESCRIPTION
genhostid generates a random hostid and stores it in /etc/hostid, if /etc/hostid does not already exist.
SEE ALSO
hostid(1), gethostid(2), sethostid(2)
+ man genl
+ head -n 20
GENL(8) Linux GENL(8)
NAME
genl - generic netlink utility frontend
SYNOPSIS
genl [ -s[tatistics] ] [ -d[etails] ] [ -r[aw] ] OBJECT
genl { -V[ersion] | -h[elp] }
OBJECT := { ctrl CTRL_OPTS }
CTRL_OPTS := { help | list | monitor | get PARMS }
PARMS := { name NAME | id ID }
DESCRIPTION
The genl utility provides a simple frontend to the generic netlink library. Although it's designed to support multiple OBJECTs, for now only the ctrl object is available, which is used to query the generic netlink controller.
+ man genl-ctrl-list
+ head -n 20
genl-ctrl-list(8) System Manager's Manual genl-ctrl-list(8)
NAME
genl-ctrl-list - List available kernel-side Generic Netlink families
SYNOPSIS
genl-ctrl-list [-d]
DESCRIPTION
Queries the Generic Netlink controller in kernel and prints a list of all registered Generic Netlink families including the version of the interface that has been registered.
OPTIONS
-h or --help
Print help text to console and exit.
-v or --version
+ man geoiplookup
+ head -n 20
GEOIPLOOKUP(1) General Commands Manual GEOIPLOOKUP(1)
NAME
geoiplookup - look up country using IP Address or hostname
SYNOPSIS
geoiplookup [-d directory] [-f filename] [-v] <ipaddress|hostname>
DESCRIPTION
geoiplookup uses the GeoIP library and database to find the Country that an IP address or hostname originates from.
For example
geoiplookup 80.60.233.195
will find the Country that 80.60.233.195 originates from, in the following format:
NL, Netherlands
+ man geoiplookup6
+ head -n 20
GEOIPLOOKUP6(1) General Commands Manual GEOIPLOOKUP6(1)
NAME
geouplookup6 - look up country using IP Address or hostname
SYNOPSIS
geouplookup6 [-d directory] [-f filename] [-v] <ipaddress|hostname>
DESCRIPTION
geouplookup6 uses the GeoIP library and database to find the Country that an IP address or hostname originates from. You must install a database suitable for geoiplookup6. IE: GeoIPv6.dat
For example:
geouplookup6 2001:4860:0:1001::68
geoiplookup6 ipv6.google.com
will find the Country that 2001:4860:0:1001::68 originates from, in the following format:
+ man geoipupdate
+ head -n 20
GEOIPUPDATE(1) General Commands Manual GEOIPUPDATE(1)
NAME
geoipupdate - a program for updating the MaxMind GeoIP databases
SYNOPSIS
geoipupdate [-v] [-f licensefile]
DESCRIPTION
geoipupdate automatically updates the GeoIP database for GeoIP subscribers. It connects to the MaxMind GeoIP Update server and checks for an updated database. If it finds an updated database, then it downloads it, uncompresses it, and installs it. If you are running a firewall, it requires that the DNS and HTTP (80) ports be open.
For example
geoipupdate -v
Performs the update in verbose mode.
OPTIONS
+ man getenforce
+ head -n 20
getenforce(8) SELinux Command Line documentation getenforce(8)
NAME
getenforce - get the current mode of SELinux
SYNOPSIS
getenforce
DESCRIPTION
getenforce reports whether SELinux is enforcing, permissive, or disabled.
AUTHOR
Dan Walsh, <[email protected]>
SEE ALSO
selinux(8), setenforce(8), selinuxenabled(8)
+ man getfacl
+ head -n 20
GETFACL(1) Access Control Lists GETFACL(1)
NAME
getfacl - get file access control lists
SYNOPSIS
getfacl [-aceEsRLPtpndvh] file ...
getfacl [-aceEsRLPtpndvh] -
DESCRIPTION
For each file, getfacl displays the file name, owner, the group, and the Access Control List (ACL). If a directory has a default ACL, getfacl also displays the default ACL. Non-directories cannot have default ACLs.
If getfacl is used on a file system that does not support ACLs, getfacl displays the access permissions defined by the traditional file mode permission bits.
The output format of getfacl is as follows:
1: # file: somedir/
+ man getfattr
+ head -n 20
GETFATTR(1) File Utilities GETFATTR(1)
NAME
getfattr - get extended attributes of filesystem objects
SYNOPSIS
getfattr [-hRLP] -n name [-e en] pathname...
getfattr [-hRLP] -d [-e en] [-m pattern] pathname...
DESCRIPTION
For each file, getfattr displays the file name, and the set of extended attribute names (and optionally values) which are associated with that file.
The output format of getfattr -d is as follows:
1: # file: somedir/
2: user.name0="value0"
3: user.name1="value1"
4: user.name2="value2"
5: ...
+ man getkeycodes
+ head -n 20
GETKEYCODES(8) Keyboard Support GETKEYCODES(8)
NAME
getkeycodes - print kernel scancode-to-keycode mapping table
SYNOPSIS
getkeycodes
DESCRIPTION
The getkeycodes command prints the kernel scancode-to-keycode mapping table.
OPTIONS
None.
SEE ALSO
setkeycodes (8)
+ man getopt
+ head -n 20
GETOPT(1) User Commands GETOPT(1)
NAME
getopt - parse command options (enhanced)
SYNOPSIS
getopt optstring parameters
getopt [options] [--] optstring parameters
getopt [options] -o|--options optstring [options] [--] parameters
DESCRIPTION
getopt is used to break up (parse) options in command lines for easy parsing by shell procedures, and to check for legal options. It uses the GNU getopt(3) routines to do this.
The parameters getopt is called with can be divided into two parts: options which modify the way getopt will do the parsing (the options and the optstring in the SYNOPSIS), and the parameters which are to be parsed (parameters in the SYNOPSIS). The second part will start at the first non-option parameter that is not an option argument, or after the first occurrence of '--'. If no '-o' or '--options'
option is found in the first part, the first parameter of the second part is used as the short options string.
If the environment variable GETOPT_COMPATIBLE is set, or if the first parameter is not an option (does not start with a '-', the first format in the SYNOPSIS), getopt will generate output that is compatible with that of other versions of getopt(1). It will still do parameter shuffling and recognize optional arguments (see section COMPATIBILITY for more information).
+ man getsebool
+ head -n 20
getsebool(8) SELinux Command Line documentation getsebool(8)
NAME
getsebool - get SELinux boolean value(s)
SYNOPSIS
getsebool [-a] [boolean]
DESCRIPTION
getsebool reports where a particular SELinux boolean or all SELinux booleans are on or off In certain situations a boolean can be in one state with a pending change to the other state. getsebool will report this as a pending change. The pending value indicates the value that will be applied upon the next boolean commit.
The setting of boolean values occurs in two stages; first the pending value is changed, then the booleans are committed, causing their active values to become their pending values. This allows a group of booleans to be changed in a single transaction, by setting all of their pending values as desired and then committing once.
OPTIONS
-a Show all SELinux booleans.
AUTHOR
This manual page was written by Dan Walsh <[email protected]>. The program was written by Tresys Technology.
+ man gettext
+ head -n 20
GETTEXT(1) GNU GETTEXT(1)
NAME
gettext - translate message
SYNOPSIS
gettext [OPTION] [[TEXTDOMAIN] MSGID]
gettext [OPTION] -s [MSGID]...
DESCRIPTION
The gettext program translates a natural language message into the user's language, by looking up the translation in a message catalog.
Display native language translation of a textual message.
-d, --domain=TEXTDOMAIN
retrieve translated messages from TEXTDOMAIN
-e enable expansion of some escape sequences
+ man gettext.sh
+ head -n 20
No manual entry for gettext.sh
+ man gmake
+ head -n 20
MAKE(1) LOCAL USER COMMANDS MAKE(1)
NAME
make - GNU make utility to maintain groups of programs
SYNOPSIS
make [ -f makefile ] [ options ] ... [ targets ] ...
WARNING
This man page is an extract of the documentation of GNU make. It is updated only occasionally, because the GNU project does not use nroff. For complete, current documentation, refer to the Info file make.info which is made from the Texinfo source file make.texi.
DESCRIPTION
The purpose of the make utility is to determine automatically which pieces of a large program need to be recompiled, and issue the commands to recompile them. The manual describes the GNU implementation of make, which was written by Richard Stallman and Roland McGrath, and is currently maintained by Paul Smith. Our examples show C programs, since they are most common, but you can use make with any
programming language whose compiler can be run with a shell command. In fact, make is not limited to programs. You can use it to describe any task where some files must be updated automatically from others whenever the others change.
To prepare to use make, you must write a file called the makefile that describes the relationships among files in your program, and the states the commands for updating each file. In a program, typically the executable file is updated from object files, which are in turn made by compiling source files.
Once a suitable makefile exists, each time you change some source files, this simple shell command:
+ man gpasswd
+ head -n 20
GPASSWD(1) User Commands GPASSWD(1)
NAME
gpasswd - administer /etc/group and /etc/gshadow
SYNOPSIS
gpasswd [option] group
DESCRIPTION
The gpasswd command is used to administer /etc/group, and /etc/gshadow. Every group can have administrators, members and a password.
System administrators can use the -A option to define group administrator(s) and the -M option to define members. They have all rights of group administrators and members.
gpasswd called by a group administrator with a group name only prompts for the new password of the group.
If a password is set the members can still use newgrp(1) without a password, and non-members must supply the password.
Notes about group passwords
+ man gprof
+ head -n 20
GPROF(1) GNU GPROF(1)
NAME
gprof - display call graph profile data
SYNOPSIS
gprof [ -[abcDhilLrsTvwxyz] ] [ -[ACeEfFJnNOpPqQZ][name] ]
[ -I dirs ] [ -d[num] ] [ -k from/to ]
[ -m min-count ] [ -R map_file ] [ -t table-length ]
[ --[no-]annotated-source[=name] ]
[ --[no-]exec-counts[=name] ]
[ --[no-]flat-profile[=name] ] [ --[no-]graph[=name] ]
[ --[no-]time=name] [ --all-lines ] [ --brief ]
[ --debug[=level] ] [ --function-ordering ]
[ --file-ordering map_file ] [ --directory-path=dirs ]
[ --display-unused-functions ] [ --file-format=name ]
[ --file-info ] [ --help ] [ --line ] [ --inline-file-names ]
[ --min-count=n ] [ --no-static ] [ --print-path ]
+ man growpart
+ head -n 20
growpart(1) cloud-utils growpart(1)
NAME
growpart - extend a partition in a partition table to fill available space
SYNOPSIS
growpart [OPTIONS] DISK PARTITION-NUMBER
growpart partition
rewrite partition table so that partition takes up all the space it can
options:
-h | --help print Usage an exit
--fudge F if part could be resized, but change would be
less than 'F', do not resize (default: 20480)
-N | --dry-run only report what would be done, show new 'sfdisk -d'
-v | --verbose increase verbosity / debug
+ man grpck
+ head -n 20
GRPCK(8) System Management Commands GRPCK(8)
NAME
grpck - verify integrity of group files
SYNOPSIS
grpck [options] [group [ shadow ]]
DESCRIPTION
The grpck command verifies the integrity of the groups information. It checks that all entries in /etc/groupand /etc/gshadow have the proper format and contain valid data. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors.
Checks are made to verify that each entry has:
· the correct number of fields
· a unique and valid group name
· a valid group identifier (/etc/group only)
+ man grpconv
+ head -n 20
PWCONV(8) System Management Commands PWCONV(8)
NAME
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups
SYNOPSIS
pwconv [options]
pwunconv [options]
grpconv [options]
grpunconv [options]
DESCRIPTION
The pwconv command creates shadow from passwd and an optionally existing shadow.
The pwunconv command creates passwd from passwd and shadow and then removes shadow.
+ man grpunconv
+ head -n 20
PWCONV(8) System Management Commands PWCONV(8)
NAME
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups
SYNOPSIS
pwconv [options]
pwunconv [options]
grpconv [options]
grpunconv [options]
DESCRIPTION
The pwconv command creates shadow from passwd and an optionally existing shadow.
The pwunconv command creates passwd from passwd and shadow and then removes shadow.
+ man grub2-editenv
+ head -n 20
GRUB-EDITENV(1) General Commands Manual GRUB-EDITENV(1)
NAME
grub-editenv — Manage the GRUB environment block.
SYNOPSIS
grub-editenv [-v | --verbose] [FILE]
<create | list | set NAME=VALUE | unset NAME>
DESCRIPTION
grub-editenv is a command line tool to manage GRUB's stored environment.
OPTIONS
--verbose
Print verbose messages.
+ man grub2-file
+ head -n 20
GRUB-FILE(1) General Commands Manual GRUB-FILE(1)
NAME
grub-file — Check if FILE is of specified type.
SYNOPSIS
grub-file (--is-i386-xen-pae-domu | --is-x86_64-xen-domu |
--is-x86-xen-dom0 | --is-x86-multiboot |
--is-x86-multiboot2 | --is-arm-linux | --is-arm64-linux |
--is-ia64-linux | --is-mips-linux | --is-mipsel-linux |
--is-sparc64-linux | --is-powerpc-linux | --is-x86-linux |
--is-x86-linux32 | --is-x86-kfreebsd | --is-i386-kfreebsd |
--is-x86_64-kfreebsd | --is-x86-knetbsd |
--is-i386-knetbsd | --is-x86_64-knetbsd | --is-i386-efi |
--is-x86_64-efi | --is-ia64-efi | --is-arm64-efi |
--is-arm-efi | --is-hibernated-hiberfil | --is-x86_64-xnu |
--is-i386-xnu | --is-xnu-hibr | --is-x86-bios-bootsector)
+ man grub2-fstest
+ head -n 20
GRUB-FSTEST(3) Library Functions Manual GRUB-FSTEST(3)
NAME
grub-fstest — Debug tool for GRUB's filesystem driver.
SYNOPSIS
grub-fstest [-c | --diskcount=NUM] [-C | --crypto]
[-d | --debug=STRING] [-K | --zfs-key=FILE|prompt]
[-n | --length=NUM] [-r | --root=DEVICE_NAME]
[-s | --skip=NUM] [-u | --uncompress] [-v | --verbose]
IMAGE_PATH <blocklist FILE | cat FILE |
cmp FILE LOCAL | cp FILE LOCAL | crc FILE |
hex FILE | ls PATH | xnu_uuid DEVICE>
DESCRIPTION
grub-fstest is a tool for testing GRUB's filesystem drivers. You should not normally need to run this program.
+ man grub2-get-kernel-settings
+ head -n 20
GRUB-GET-KERNEL-SETTINGS(3) Library Functions Manual GRUB-GET-KERNEL-SETTINGS(3)
NAME
grub-get-kernel-settings — Evaluate the system's kernel installation settings for use while making a grub configuration file.
SYNOPSIS
grub-get-kernel-settings [OPTION]
DESCRIPTION
grub-get-kernel-settings reads the kernel installation settings on the host system, and emits a set of grub settings suitable for use when creating a grub configuration file.
OPTIONS
-h, --help
Display program usage and exit.
+ man grub2-glue-efi
+ head -n 20
GRUB-GLUE-EFI(3) Library Functions Manual GRUB-GLUE-EFI(3)
NAME
grub-glue-efi — Create an Apple fat EFI binary.
SYNOPSIS
grub-glue-efi <-3 | --input32=FILE> <-6 | --input64=FILE>
<-o | --output=FILE> [-v | --verbose]
DESCRIPTION
grub-glue-efi creates an Apple fat EFI binary from two EFI binaries.
OPTIONS
--input32=FILE
Read 32-bit binary from FILE.
+ man grub2-install
+ head -n 20
GRUB-INSTALL(1) General Commands Manual GRUB-INSTALL(1)
NAME
grub-install — Install GRUB on a device.
SYNOPSIS
grub-install [--modules=MODULES] [--install-modules=MODULES]
[--themes=THEMES] [--fonts=FONTS] [--locales=LOCALES]
[--compress[=no,xz,gz,lzo]] [-d | --directory=DIR]
[--grub-mkimage=FILE] [--boot-directory=DIR]
[--target=TARGET] [--grub-setup=FILE]
[--grub-mkrelpath=FILE] [--grub-probe=FILE]
[--allow-floppy] [--recheck] [--force] [--force-file-id]
[--disk-module=MODULE] [--no-nvram] [--removable]
[--bootloader-id=ID] [--efi-directory=DIR] INSTALL_DEVICE
+ man grub2-kbdcomp
+ head -n 20
GRUB-KBDCOMP(3) Library Functions Manual GRUB-KBDCOMP(3)
NAME
grub-kbdcomp — Generate a GRUB keyboard layout file.
SYNOPSIS
grub-kbdcomp <-o | --output=FILE> CKBMAP_ARGUMENTS
DESCRIPTION
grub-kbdcomp processes an X keyboard layout description in keymaps(5) format into a format that can be used by GRUB's keymap command.
OPTIONS
--output=FILE
Write output to FILE.
+ man grub2-menulst2cfg
+ head -n 20
GRUB-MENULST2CFG(1) General Commands Manual GRUB-MENULST2CFG(1)
NAME
grub-menulst2cfg — Convert a configuration file from GRUB 0.xx to GRUB 2.xx format.
SYNOPSIS
grub-menulst2cfg [INFILE [OUTFILE]]
DESCRIPTION
grub-menulst2cfg converts a configuration file from GRUB 0.xx to the current format.
SEE ALSO
info grub
+ man grub2-mkconfig
+ head -n 20
GRUB-MKCONFIG(1) General Commands Manual GRUB-MKCONFIG(1)
NAME
grub-mkconfig — Generate a GRUB configuration file.
SYNOPSIS
grub-mkconfig [-o | --output=FILE]
DESCRIPTION
grub-mkconfig generates a configuration file for GRUB.
OPTIONS
--output=FILE
Write generated output to FILE.
+ man grub2-mkfont
+ head -n 20
GRUB-MKFONT(3) Library Functions Manual GRUB-MKFONT(3)
NAME
grub-mkfont — Convert common font file formats into the PF2 format.
SYNOPSIS
grub-mkfont [--ascii-bitmaps] [-a | --force-autohint]
[-b | --bold] [-c | --asce=NUM] [-d | --desc=NUM]
[-i | --index=NUM] [-n | --name=NAME] [--no-bitmap]
[--no-hinting] <-o | --output=FILE>
[-r | --range=FROM-TO[,FROM-TO]] [-s | --size=SIZE]
[-v | --verbose] [--width-spec] FONT_FILES
DESCRIPTION
grub-mkfont converts font files from common formats into the PF2 format used by GRUB.
+ man grub2-mkimage
+ head -n 20
GRUB-MKIMAGE(1) General Commands Manual GRUB-MKIMAGE(1)
NAME
grub-mkimage — Make a bootable GRUB image.
SYNOPSIS
grub-mkimage [-c | --config=FILE] [-C | --compression=(xz,none,auto)]
[-d | --directory=DIR] [-k | --pubkey=FILE]
[-m | --memdisk=FILE] [-n | --note] [-o | --output=FILE]
[-O | --format=FORMAT] [-p | --prefix=DIR]
[-v | --verbose] MODULES
DESCRIPTION
grub-mkimage builds a bootable image of GRUB.
+ man grub2-mklayout
+ head -n 20
GRUB-MKLAYOUT(3) Library Functions Manual GRUB-MKLAYOUT(3)
NAME
grub-mklayout — Generate a GRUB keyboard layout file.
SYNOPSIS
grub-mklayout [-i | --input=FILE] [-o | --output=FILE]
[-v | --verbose]
DESCRIPTION
grub-mklayout generates a GRUB keyboard layout description which corresponds with the Linux console layout description given as input.
OPTIONS
--input=FILE
Use FILE as the input. The default value is the standard input device.
+ man grub2-mknetdir
+ head -n 20
GRUB-MKNETDIR(3) Library Functions Manual GRUB-MKNETDIR(3)
NAME
grub-mknetdir — Prepare a GRUB netboot directory.
SYNOPSIS
grub-mknetdir
DESCRIPTION
grub-mknetdir prepares a directory for GRUB to be netbooted from.
SEE ALSO
info grub
+ man grub2-mkpasswd-pbkdf2
+ head -n 20
GRUB-MKPASSWD-PBKDF2(3) Library Functions Manual GRUB-MKPASSWD-PBKDF2(3)
NAME
grub-mkpasswd-pbkdf2 — Generate a PBKDF2 password hash.
SYNOPSIS
grub-mkpasswd-pbkdf2 [-c | --iteration-count=NUM] [-l | --buflen=NUM]
[-s | --salt=NUM]
DESCRIPTION
grub-mkpasswd-pbkdf2 generates a PBKDF2 password string suitable for use in a GRUB configuration file.
OPTIONS
--iteration-count=NUM
Number of PBKDF2 iterations.
+ man grub2-mkrelpath
+ head -n 20
GRUB-MKRELPATH(3) Library Functions Manual GRUB-MKRELPATH(3)
NAME
grub-mkrelpath — Generate a relative GRUB path given an OS path.
SYNOPSIS
grub-mkrelpath FILE
DESCRIPTION
grub-mkrelpath takes an OS filesystem path for FILE and returns a relative path suitable for use in a GRUB configuration file.
SEE ALSO
info grub
+ man grub2-mkrescue
+ head -n 20
GRUB-MKRESCUE(3) Library Functions Manual GRUB-MKRESCUE(3)
NAME
grub-mkrescue — Generate a GRUB rescue image using GNU Xorriso.
SYNOPSIS
grub-mkrescue [-o | --output=FILE] [--modules=MODULES]
[--install-modules=MODULES] [--themes=THEMES]
[--fonts=FONTS] [--locales=LOCALES]
[--compress[=no,xz,gz,lzo]] [-d | --directory=DIR]
[--grub-mkimage=FILE] [--rom-directory=DIR]
[--xorriso=FILE] [--grub-glue-efi=FILE]
[--grub-render-label=FILE] [--label-font=FILE]
[--label-color=COLOR] [--label-bgcolor=FILE]
[--product-name=STRING] [--product-version=STRING]
[--sparc-boot] [--arcs-boot]
+ man grub2-mkstandalone
+ head -n 20
GRUB-MKSTANDALONE(3) Library Functions Manual GRUB-MKSTANDALONE(3)
NAME
grub-mkstandalone — Generate a standalone image in the selected format.
SYNOPSIS
grub-mkstandalone [-o | --output=FILE] [-O | --format=FORMAT]
[-C | --compression=(xz|none|auto)]
[--modules=MODULES] [--install-modules=MODULES]
[--themes=THEMES] [--fonts=FONTS]
[--locales=LOCALES] [--compress[=no,xz,gz,lzo]]
[-d | --directory=DIR] [--grub-mkimage=FILE]
SOURCE...
DESCRIPTION
OPTIONS
+ man grub2-ofpathname
+ head -n 20
GRUB-OFPATHNAME(3) Library Functions Manual GRUB-OFPATHNAME(3)
NAME
grub-ofpathname — Generate an IEEE-1275 device path for a specified device.
SYNOPSIS
grub-ofpathname DEVICE
DESCRIPTION
grub-ofpathname generates an IEEE-1275 device path for the specified DEVICE.
SEE ALSO
info grub
+ man grub2-probe
+ head -n 20
<standard input>:6: invalid base glyph `-d' in composite glyph name
<standard input>:6: warning: can't find special character `\'
GRUB-PROBE(3) Library Functions Manual GRUB-PROBE(3)
NAME
grub-probe — Probe device information for a given path.
SYNOPSIS
grub-probe [-m | --device-map=FILE]
[-t | --target=(fs|fs_uuid|fs_label|drive|device|partmap|
abstraction|cryptodisk_uuid|
msdos_parttype)]
[-v | --verbose] (PATH|DEVICE)
DESCRIPTION
grub-probe probes a path or device for filesystem and related information.
+ man grub2-reboot
+ head -n 20
GRUB-REBOOT(3) Library Functions Manual GRUB-REBOOT(3)
NAME
grub-reboot — Set the default boot menu entry for the next boot only.
SYNOPSIS
grub-reboot [--boot-directory=DIR] MENU_ENTRY
DESCRIPTION
grub-reboot sets the default boot menu entry for the next boot, but not further boots after that. This command only works for GRUB configuration files created with GRUB_DEFAULT=saved in /etc/default/grub.
OPTIONS
--boot-directory=DIR
Find GRUB images under DIR/grub. The default value is /boot, resulting in grub images being search for at /boot/grub.
+ man grub2-rpm-sort
+ head -n 20
GRUB-RPM-SORT(8) System Manager's Manual GRUB-RPM-SORT(8)
NAME
grub-rpm-sort — Sort input according to RPM version compare.
SYNOPSIS
grub-rpm-sort [OPTIONS].
DESCRIPTION
You should not normally run this program directly. Use grub-mkconfig instead.
SEE ALSO
info grub
+ man grub2-script-check
+ head -n 20
GRUB-SCRIPT-CHECK(3) Library Functions Manual GRUB-SCRIPT-CHECK(3)
NAME
grub-script-check — Check GRUB configuration file for syntax errors.
SYNOPSIS
grub-script-check [-v | --verbose] PATH
DESCRIPTION
grub-script-check verifies that a specified GRUB configuration file does not contain syntax errors.
OPTIONS
--verbose
Print verbose output.
+ man grub2-set-default
+ head -n 20
GRUB-SET-DEFAULT(1) General Commands Manual GRUB-SET-DEFAULT(1)
NAME
grub-set-default — Set the default boot menu entry for GRUB.
SYNOPSIS
grub-set-default [--boot-directory=DIR] MENU_ENTRY
DESCRIPTION
grub-set-default sets the default boot menu entry for all subsequent boots. This command only works for GRUB configuration files created with GRUB_DEFAULT=saved in /etc/default/grub.
OPTIONS
--boot-directory=DIR
Find GRUB images under DIR/grub. The default value is /boot, resulting in grub images being search for at /boot/grub.
+ man grub2-setpassword
+ head -n 20
GRUB-SETPASSWORD(3) Library Functions Manual GRUB-SETPASSWORD(3)
NAME
grub-setpassword — Generate the user.cfg file containing the hashed grub bootloader password.
SYNOPSIS
grub-setpassword [OPTION]
DESCRIPTION
grub-setpassword outputs the user.cfg file which contains the hashed GRUB bootloader password. This utility only supports configurations where there is a single root user.
The file has the format: GRUB2_PASSWORD=<hashed password>.
OPTIONS
-h, --help
+ man grub2-sparc64-setup
+ head -n 20
GRUB-SPARC64-SETUP(3) Library Functions Manual GRUB-SPARC64-SETUP(3)
NAME
grub-sparc64-setup — Set up a device to boot a sparc64 GRUB image.
SYNOPSIS
grub-sparc64-setup [OPTIONS].
DESCRIPTION
You should not normally run this program directly. Use grub-install instead.
SEE ALSO
info grub
+ man grub2-syslinux2cfg
+ head -n 20
GRUB-SYSLINUX2CFG(1) General Commands Manual GRUB-SYSLINUX2CFG(1)
NAME
grub-syslinux2cfg — Transform a syslinux config file into a GRUB config.
SYNOPSIS
grub-syslinux2cfg [-c | --cwd=DIR] [-r | --root=DIR] [-v | --verbose]
[-t | --target-root=DIR] [-T | --target-cwd=DIR]
[-o | --output=FILE] [[-i | --isolinux] |
[-s | --syslinux] |
[-p | --pxelinux]] FILE
DESCRIPTION
grub-syslinux2cfg builds a GRUB configuration file out of an existing syslinux configuration file.
+ man grubby
+ head -n 20
GRUBBY(8) System Manager's Manual GRUBBY(8)
NAME
grubby - command line tool used to configure bootloader menu entries across multiple architectures
SYNOPSIS
grubby [OPTIONS]
DESCRIPTION
General Information
grubby is a command line tool for updating and displaying information about the configuration files for various architecture specific bootloaders. It is primarily designed to be used from scripts which install new kernels and need to find information about the current boot environment.
Architecture Support
The grubby executable has full support for the grub2 bootloader on x86_64 systems using legacy BIOS or modern UEFI firmware and ppc64 and ppc64le hardware using OPAL or SLOF as firmware.
+ man gssproxy
+ head -n 20
GSSPROXY(8) GssProxy Manual pages GSSPROXY(8)
NAME
gssproxy - GssProxy Daemon
SYNOPSIS
gssproxy [options]
DESCRIPTION
gssproxy provides a daemon to manage access to GSSAPI credentials.
gssproxy consists of the gssproxy daemon (configured by the gssproxy.conf(5) file) and a GSSAPI interposer plugin (gssproxy-mech(8)).
OPTIONS
-D,--daemon
Become a daemon after starting up.
-i,--interactive
+ man gtar
+ head -n 20
TAR(1) User Commands TAR(1)
NAME
tar - manual page for tar 1.26
SYNOPSIS
tar [OPTION...] [FILE]...
DESCRIPTION
GNU `tar' saves many files together into a single tape or disk archive, and can restore individual files from the archive.
Note that this manual page contains just very brief description (or more like a list of possible functionality) originally generated by the help2man utility. The full documentation for tar is maintained as a Texinfo manual. If the info and tar programs are properly installed at your site, the command `info tar' should give you access to the complete manual.
EXAMPLES
tar -cf archive.tar foo bar
# Create archive.tar from files foo and bar.
tar -tvf archive.tar
+ man gunzip
+ head -n 20
GZIP(1) General Commands Manual GZIP(1)
NAME
gzip, gunzip, zcat - compress or expand files
SYNOPSIS
gzip [ -acdfhlLnNrtvV19 ] [-S suffix] [ name ... ]
gunzip [ -acfhlLnNrtvV ] [-S suffix] [ name ... ]
zcat [ -fhLV ] [ name ... ]
DESCRIPTION
Gzip reduces the size of the named files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz, while keeping the same ownership modes, access and modification times. (The default extension is -gz for VMS, z for MSDOS, OS/2 FAT, Windows NT FAT and Atari.) If no files are specified, or if a file name is "-", the standard input is compressed to the
standard output. Gzip will only attempt to compress regular files. In particular, it will ignore symbolic links.
If the compressed file name is too long for its file system, gzip truncates it. Gzip attempts to truncate only the parts of the file name longer than 3 characters. (A part is delimited by dots.) If the name consists of small parts only, the longest parts are truncated. For example, if file names are limited to 14 characters, gzip.msdos.exe is compressed to gzi.msd.exe.gz. Names are not truncated on
systems which do not have a limit on file name length.
By default, gzip keeps the original file name and timestamp in the compressed file. These are used when decompressing the file with the -N option. This is useful when the compressed file name was truncated or when the time stamp was not preserved after a file transfer.
+ man gzexe
+ head -n 20
GZEXE(1) General Commands Manual GZEXE(1)
NAME
gzexe - compress executable files in place
SYNOPSIS
gzexe name ...
DESCRIPTION
The gzexe utility allows you to compress executables in place and have them automatically uncompress and execute when you run them (at a penalty in performance). For example if you execute ``gzexe /usr/bin/gdb'' it will create the following two files:
-rwxr-xr-x 1 root root 1026675 Jun 7 13:53 /usr/bin/gdb
-rwxr-xr-x 1 root root 2304524 May 30 13:02 /usr/bin/gdb~
/usr/bin/gdb~ is the original file and /usr/bin/gdb is the self-uncompressing executable file. You can remove /usr/bin/gdb~ once you are sure that /usr/bin/gdb works properly.
This utility is most useful on systems with very small disks.
OPTIONS
-d Decompress the given executables instead of compressing them.
+ man gzip
+ head -n 20
GZIP(1) General Commands Manual GZIP(1)
NAME
gzip, gunzip, zcat - compress or expand files
SYNOPSIS
gzip [ -acdfhlLnNrtvV19 ] [-S suffix] [ name ... ]
gunzip [ -acfhlLnNrtvV ] [-S suffix] [ name ... ]
zcat [ -fhLV ] [ name ... ]
DESCRIPTION
Gzip reduces the size of the named files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz, while keeping the same ownership modes, access and modification times. (The default extension is -gz for VMS, z for MSDOS, OS/2 FAT, Windows NT FAT and Atari.) If no files are specified, or if a file name is "-", the standard input is compressed to the
standard output. Gzip will only attempt to compress regular files. In particular, it will ignore symbolic links.
If the compressed file name is too long for its file system, gzip truncates it. Gzip attempts to truncate only the parts of the file name longer than 3 characters. (A part is delimited by dots.) If the name consists of small parts only, the longest parts are truncated. For example, if file names are limited to 14 characters, gzip.msdos.exe is compressed to gzi.msd.exe.gz. Names are not truncated on
systems which do not have a limit on file name length.
By default, gzip keeps the original file name and timestamp in the compressed file. These are used when decompressing the file with the -N option. This is useful when the compressed file name was truncated or when the time stamp was not preserved after a file transfer.
+ man h2ph
+ head -n 20
H2PH(1) Perl Programmers Reference Guide H2PH(1)
NAME
h2ph - convert .h C header files to .ph Perl header files
SYNOPSIS
h2ph [-d destination directory] [-r | -a] [-l] [-h] [-e] [-D] [-Q] [headerfiles]
DESCRIPTION
h2ph converts any C header files specified to the corresponding Perl header file format. It is most easily run while in /usr/include:
cd /usr/include; h2ph * sys/*
or
cd /usr/include; h2ph * sys/* arpa/* netinet/*
or
+ man halt
+ head -n 20
HALT(8) halt HALT(8)
NAME
halt, poweroff, reboot - Halt, power-off or reboot the machine
SYNOPSIS
halt [OPTIONS...]
poweroff [OPTIONS...]
reboot [OPTIONS...]
DESCRIPTION
halt, poweroff, reboot may be used to halt, power-off or reboot the machine.
OPTIONS
The following options are understood:
+ man hardlink
+ head -n 20
hardlink(1) General Commands Manual hardlink(1)
NAME
hardlink - Consolidate duplicate files via hardlinks
SYNOPSIS
hardlink [-c] [-n] [-v] [-vv] [-x pattern] [-h] directory1 [ directory2 ... ]
DESCRIPTION
This manual page documents hardlink, a program which consolidates duplicate files in one or more directories using hardlinks.
hardlink traverses one or more directories searching for duplicate files. When it finds duplicate files, it uses one of them as the master. It then removes all other duplicates and places a hardlink for each one pointing to the master file. This allows for conservation of disk space where multiple directories on a single filesystem contain many duplicate files.
Since hard links can only span a single filesystem, hardlink is only useful when all directories specified are on the same filesystem.
OPTIONS
-c Compare only the contents of the files being considered for consolidation. Disregards permission, ownership and other differences.
+ man hexdump
+ head -n 20
HEXDUMP(1) User Commands HEXDUMP(1)
NAME
hexdump - display file contents in hexadecimal, decimal, octal, or ascii
SYNOPSIS
hexdump [options] file...
DESCRIPTION
The hexdump utility is a filter which displays the specified files, or standard input if no files are specified, in a user-specified format.
OPTIONS
Below, the length and offset arguments may be followed by the multiplicative suffixes KiB (=1024), MiB (=1024*1024), and so on for GiB, TiB, PiB, EiB, ZiB and YiB (the "iB" is optional, e.g. "K" has the same meaning as "KiB"), or the suffixes KB (=1000), MB (=1000*1000), and so on for GB, TB, PB, EB, ZB and YB.
-b, --one-byte-octal
One-byte octal display. Display the input offset in hexadecimal, followed by sixteen space-separated, three-column, zero-filled bytes of input data, in octal, per line.
-c, --one-byte-char
+ man hibagent
+ head -n 20
No manual entry for hibagent
+ man host
+ head -n 20
HOST(1) BIND9 HOST(1)
NAME
host - DNS lookup utility
SYNOPSIS
host [-aCdlnrsTUwv] [-c class] [-N ndots] [-R number] [-t type] [-W wait] [-m flag] [[-4] | [-6]] [-v] [-V] {name} [server]
DESCRIPTION
host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its command line arguments and options.
name is the domain name that is to be looked up. It can also be a dotted-decimal IPv4 address or a colon-delimited IPv6 address, in which case host will by default perform a reverse lookup for that address. server is an optional argument which is either the name or IP address of the name server that host should query instead of the server or servers listed in /etc/resolv.conf.
OPTIONS
-4
Use IPv4 only for query transport. See also the -6 option.
-6
+ man hostname
+ head -n 20
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1)
NAME
hostname - show or set the system's host name
domainname - show or set the system's NIS/YP domain name
ypdomainname - show or set the system's NIS/YP domain name
nisdomainname - show or set the system's NIS/YP domain name
dnsdomainname - show the system's DNS domain name
SYNOPSIS
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis]
hostname [-b|--boot] [-F|--file filename] [hostname]
hostname [-h|--help] [-V|--version]
domainname [nisdomain] [-F file]
ypdomainname [nisdomain] [-F file]
nisdomainname [nisdomain] [-F file]
+ man hostnamectl
+ head -n 20
HOSTNAMECTL(1) hostnamectl HOSTNAMECTL(1)
NAME
hostnamectl - Control the system hostname
SYNOPSIS
hostnamectl [OPTIONS...] {COMMAND}
DESCRIPTION
hostnamectl may be used to query and change the system hostname and related settings.
This tool distinguishes three different hostnames: the high-level "pretty" hostname which might include all kinds of special characters (e.g. "Lennart's Laptop"), the static hostname which is used to initialize the kernel hostname at boot (e.g. "lennarts-laptop"), and the transient hostname which is a default received from network configuration. If a static hostname is set, and is valid (something
other than localhost), then the transient hostname is not used.
Note that the pretty hostname has little restrictions on the characters used, while the static and transient hostnames are limited to the usually accepted characters of Internet domain names.
The static hostname is stored in /etc/hostname, see hostname(5) for more information. The pretty hostname, chassis type, and icon name are stored in /etc/machine-info, see machine-info(5).
+ man hunspell
+ head -n 20
hunspell(1) General Commands Manual hunspell(1)
NAME
hunspell - spell checker, stemmer and morphological analyzer
SYNOPSIS
hunspell [-1aDGHhLlmnrstvw] [--check-url] [-d dict[,dict2,...]] [--help] [-i enc] [-p dict] [-vv] [--version] [file(s)]
DESCRIPTION
Hunspell is fashioned after the Ispell program. The most common usage is "hunspell" or "hunspell filename". Without filename parameter, hunspell checks the standard input. Typing "cat" and "exsample" in two input lines, we got an asterisk (it means "cat" is a correct word) and a line with corrections:
$ hunspell -d en_US
Hunspell 1.2.3
*
& exsample 4 0: example, examples, ex sample, ex-sample
Correct words signed with an '*', '+' or '-', unrecognized words signed with '#' or '&' in output lines (see later). (Close the standard input with Ctrl-d on Unix/Linux and Ctrl-Z Enter or Ctrl-C on Windows.)
+ man hwclock
+ head -n 20
HWCLOCK(8) System Administration HWCLOCK(8)
NAME
hwclock - read or set the hardware clock (RTC)
SYNOPSIS
hwclock [function] [option...]
DESCRIPTION
hwclock is a tool for accessing the Hardware Clock. It can: display the Hardware Clock time; set the Hardware Clock to a specified time; set the Hardware Clock from the System Clock; set the System Clock from the Hardware Clock; compensate for Hardware Clock drift; correct the System Clock timescale; set the kernel's timezone, NTP timescale, and epoch (Alpha only); and predict future Hardware Clock
values based on its drift rate.
Since v2.26 important changes were made to the --hctosys function and the --directisa option, and a new option --update-drift was added. See their respective descriptions below.
FUNCTIONS
The following functions are mutually exclusive, only one can be given at a time. If none is given, the default is --show.
--adjust
+ man iconvconfig.aarch64
+ head -n 20
No manual entry for iconvconfig.aarch64
+ man idiag-socket-details
+ head -n 20
No manual entry for idiag-socket-details
+ man idn
+ head -n 20
IDN(1) User Commands IDN(1)
NAME
idn - Internationalized Domain Names command line tool
SYNOPSIS
idn [OPTION]... [STRINGS]...
DESCRIPTION
Internationalized Domain Name (IDN) convert STRINGS, or standard input.
Command line interface to the internationalized domain name library.
All strings are expected to be encoded in the preferred charset used by your locale. Use `--debug' to find out what this charset is. You can override the charset used by setting environment variable CHARSET.
To process a string that starts with `-', for example `-foo', use `--' to signal the end of parameters, as in `idn --quiet -a -- -foo'.
Mandatory arguments to long options are mandatory for short options too.
+ man ifcfg
+ head -n 20
IFCFG(8) Linux IFCFG(8)
NAME
ifcfg - simplistic script which replaces ifconfig IP management
SYNOPSIS
ifcfg [ DEVICE ] [ command ] ADDRESS [ PEER ]
DESCRIPTION
This manual page documents briefly the ifcfg command.
This is a simplistic script replacing one option of ifconfig , namely, IP address management. It not only adds addresses, but also carries out Duplicate Address Detection RFC-DHCP, sends unsolicited ARP to update the caches of other hosts sharing the interface, adds some control routes and restarts Router Discovery when it is necessary.
IFCONFIG - COMMAND SYNTAX
DEVICE - it may have alias, suffix, separated by colon.
+ man ifconfig
+ head -n 20
IFCONFIG(8) Linux System Administrator's Manual IFCONFIG(8)
NAME
ifconfig - configure a network interface
SYNOPSIS
ifconfig [-v] [-a] [-s] [interface]
ifconfig [-v] interface [aftype] options | address ...
NOTE
This program is obsolete! For replacement check ip addr and ip link. For statistics use ip -s link.
DESCRIPTION
Ifconfig is used to configure the kernel-resident network interfaces. It is used at boot time to set up interfaces as necessary. After that, it is usually only needed when debugging or when system tuning is needed.
If no arguments are given, ifconfig displays the status of the currently active interfaces. If a single interface argument is given, it displays the status of the given interface only; if a single -a argument is given, it displays the status of all interfaces, even those that are down. Otherwise, it configures an interface.
+ man ifdown
+ head -n 20
ifup(8) System Administration tools and Daemons ifup(8)
NAME
ifup - bring a network interface up
ifdown - take a network interface down
SYNOPSIS
ifup CONFIG [boot]
ifdown CONFIG
DESCRIPTION
The ifup and ifdown commands may be used to configure (or, respec- tively, deconfigure) network interfaces based on interface definitions in the files /etc/sysconfig/network and /etc/sysconfig/network-scripts/ifcfg-<configuration>
These scripts take one argument normally: the name of the configuration (e.g. eth0). They are called with a second argument of "boot" during the boot sequence so that devices that are not meant to be brought up on boot (ONBOOT=no, see below) can be ignored at that time.
+ man ifenslave
+ head -n 20
IFENSLAVE(8) BSD System Manager's Manual IFENSLAVE(8)
NAME
ifenslave — Attach and detach slave network devices to a bonding device.
SYNOPSIS
ifenslave [-acdfhuvV] [--all-interfaces] [--change-active] [--detach] [--force] [--help] [--usage] [--verbose] [--version] master slave ...
DESCRIPTION
ifenslave is a tool to attach and detach slave network devices to a bonding device. A bonding device will act like a normal Ethernet network device to the kernel, but will send out the packets via the slave devices using a simple round-robin scheduler. This allows for simple load-balancing, identical to "channel bonding" or "trunking" techniques used in switches.
The kernel must have support for bonding devices for ifenslave to be useful.
OPTIONS
-a, --all-interfaces
Show information about all interfaces.
-c, --change-active
Change active slave.
+ man ifstat
+ head -n 20
IFSTAT(8) Linux IFSTAT(8)
NAME
ifstat - handy utility to read network interface statistics
SYNOPSIS
ifstat [ OPTIONS ] [ INTERFACE_LIST ]
INTERFACE_LIST := INTERFACE_LIST | interface
DESCRIPTION
ifstat neatly prints out network interface statistics. The utility keeps records of the previous data displayed in history files and by default only shows difference between the last and the current call. Location of the history files defaults to /tmp/.ifstat.u$UID but may be overridden with the IFSTAT_HISTORY environment variable. Similarly, the default location for xstat (extended stats) is
/tmp/.<xstat name>_ifstat.u$UID.
OPTIONS
-h, --help
Show summary of options.
+ man ifup
+ head -n 20
ifup(8) System Administration tools and Daemons ifup(8)
NAME
ifup - bring a network interface up
ifdown - take a network interface down
SYNOPSIS
ifup CONFIG [boot]
ifdown CONFIG
DESCRIPTION
The ifup and ifdown commands may be used to configure (or, respec- tively, deconfigure) network interfaces based on interface definitions in the files /etc/sysconfig/network and /etc/sysconfig/network-scripts/ifcfg-<configuration>
These scripts take one argument normally: the name of the configuration (e.g. eth0). They are called with a second argument of "boot" during the boot sequence so that devices that are not meant to be brought up on boot (ONBOOT=no, see below) can be ignored at that time.
+ man init
+ head -n 20
SYSTEMD(1) systemd SYSTEMD(1)
NAME
systemd, init - systemd system and service manager
SYNOPSIS
systemd [OPTIONS...]
init [OPTIONS...] {COMMAND}
DESCRIPTION
systemd is a system and service manager for Linux operating systems. When run as first process on boot (as PID 1), it acts as init system that brings up and maintains userspace services.
For compatibility with SysV, if systemd is called as init and a PID that is not 1, it will execute telinit and pass all command line arguments unmodified. That means init and telinit are mostly equivalent when invoked from normal login sessions. See telinit(8) for more information.
When run as a system instance, systemd interprets the configuration file system.conf and the files in system.conf.d directories. See systemd-system.conf(5) for more information.
OPTIONS
+ man insmod
+ head -n 20
INSMOD(8) insmod INSMOD(8)
NAME
insmod - Simple program to insert a module into the Linux Kernel
SYNOPSIS
insmod [filename] [module options...]
DESCRIPTION
insmod is a trivial program to insert a module into the kernel. Most users will want to use modprobe(8) instead, which is more clever and can handle module dependencies.
Only the most general of error messages are reported: as the work of trying to link the module is now done inside the kernel, the dmesg usually gives more information about errors.
COPYRIGHT
This manual page originally Copyright 2002, Rusty Russell, IBM Corporation. Maintained by Jon Masters and others.
SEE ALSO
modprobe(8), rmmod(8), lsmod(8), modinfo(8) depmod(8)
+ man installkernel
+ head -n 20
INSTALLKERNEL(8) System Manager's Manual INSTALLKERNEL(8)
NAME
installkernel - tool to script kernel installation
SYNOPSIS
installkernel <kernel-version> <bootimage> <mapfile>
DESCRIPTION
installkernel installs a new kernel image onto the system from the Linux source tree. It is called by the Linux kernel makefiles when make install is invoked there.
The new kernel is installed into {directory}/vmlinuz-{version}. If a symbolic link {directory}/vmlinuz already exists, it is refreshed by making a link from {directory}/vmlinuz to the new kernel, and the previously installed kernel is available as {directory}/vmlinuz.old.
SEE ALSO
grubby(8) new-kernel-pkg(8)
+ man ionice
+ head -n 20
IONICE(1) User Commands IONICE(1)
NAME
ionice - set or get process I/O scheduling class and priority
SYNOPSIS
ionice [-c class] [-n level] [-t] -p PID...
ionice [-c class] [-n level] [-t] -P PGID...
ionice [-c class] [-n level] [-t] -u UID...
ionice [-c class] [-n level] [-t] command [argument...]
DESCRIPTION
This program sets or gets the I/O scheduling class and priority for a program. If no arguments or just -p is given, ionice will query the current I/O scheduling class and priority for that process.
When command is given, ionice will run this command with the given arguments. If no class is specified, then command will be executed with the "best-effort" scheduling class. The default priority level is 4.
As of this writing, a process can be in one of three scheduling classes:
+ man iostat
+ head -n 20
IOSTAT(1) Linux User's Manual IOSTAT(1)
NAME
iostat - Report Central Processing Unit (CPU) statistics and input/output statistics for devices and partitions.
SYNOPSIS
iostat [ -c ] [ -d ] [ -h ] [ -k | -m ] [ -N ] [ -t ] [ -V ] [ -x ] [ -y ] [ -z ] [ -j { ID | LABEL | PATH | UUID | ... } ] [ [ -T ] -g group_name ] [ -p [ device [,...] | ALL ] ] [ device [...] | ALL ] [ interval [ count ] ]
DESCRIPTION
The iostat command is used for monitoring system input/output device loading by observing the time the devices are active in relation to their average transfer rates. The iostat command generates reports that can be used to change system configuration to better balance the input/output load between physical disks.
The first report generated by the iostat command provides statistics concerning the time since the system was booted, unless the -y option is used (in this case, this first report is omitted). Each subsequent report covers the time since the previous report. All statistics are reported each time the iostat command is run. The report consists of a CPU header row followed by a row of CPU statistics. On
multiprocessor systems, CPU statistics are calculated system-wide as averages among all processors. A device header row is displayed followed by a line of statistics for each device that is configured.
The interval parameter specifies the amount of time in seconds between each report. The first report contains statistics for the time since system startup (boot), unless the -y option is used (in this case, this report is omitted). Each subsequent report contains statistics collected during the interval since the previous report. The count parameter can be specified in conjunction with the interval
parameter. If the count parameter is specified, the value of count determines the number of reports generated at interval seconds apart. If the interval parameter is specified without the count parameter, the iostat command generates reports continuously.
+ man ip
+ head -n 20
IP(8) Linux IP(8)
NAME
ip - show / manipulate routing, network devices, interfaces and tunnels
SYNOPSIS
ip [ OPTIONS ] OBJECT { COMMAND | help }
ip [ -force ] -batch filename
OBJECT := { link | address | addrlabel | route | rule | neigh | ntable | tunnel | tuntap | maddress | mroute | mrule | monitor | xfrm | netns | l2tp | tcp_metrics | token | macsec }
OPTIONS := { -V[ersion] | -h[uman-readable] | -s[tatistics] | -d[etails] | -r[esolve] | -iec | -f[amily] { inet | inet6 | ipx | dnet | link } | -4 | -6 | -I | -D | -B | -0 | -l[oops] { maximum-addr-flush-attempts } | -o[neline] | -rc[vbuf] [size] | -t[imestamp] | -ts[hort] | -n[etns] name | -a[ll] | -c[olor] -br[ief] }
+ man ip6tables
+ head -n 20
IPTABLES(8) iptables 1.8.4 IPTABLES(8)
NAME
iptables/ip6tables — administration tool for IPv4/IPv6 packet filtering and NAT
SYNOPSIS
iptables [-t table] {-A|-C|-D} chain rule-specification
ip6tables [-t table] {-A|-C|-D} chain rule-specification
iptables [-t table] -I chain [rulenum] rule-specification
iptables [-t table] -R chain rulenum rule-specification
iptables [-t table] -D chain rulenum
iptables [-t table] -S [chain [rulenum]]
+ man ip6tables-legacy
+ head -n 20
No manual entry for ip6tables-legacy
+ man ip6tables-legacy-restore
+ head -n 20
No manual entry for ip6tables-legacy-restore
+ man ip6tables-legacy-save
+ head -n 20
No manual entry for ip6tables-legacy-save
+ man ip6tables-restore
+ head -n 20
IPTABLES-RESTORE(8) iptables 1.8.4 IPTABLES-RESTORE(8)
NAME
iptables-restore — Restore IP Tables
ip6tables-restore — Restore IPv6 Tables
SYNOPSIS
iptables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file]
ip6tables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file]
DESCRIPTION
iptables-restore and ip6tables-restore are used to restore IP and IPv6 Tables from data specified on STDIN or in file. Use I/O redirection provided by your shell to read from a file or specify file as an argument.
-c, --counters
restore the values of all packet and byte counters
+ man ip6tables-save
+ head -n 20
IPTABLES-SAVE(8) iptables 1.8.4 IPTABLES-SAVE(8)
NAME
iptables-save — dump iptables rules
ip6tables-save — dump iptables rules
SYNOPSIS
iptables-save [-M modprobe] [-c] [-t table] [-f filename]
ip6tables-save [-M modprobe] [-c] [-t table] [-f filename]
DESCRIPTION
iptables-save and ip6tables-save are used to dump the contents of IP or IPv6 Table in easily parseable format either to STDOUT or to a specified file.
-M, --modprobe modprobe_program
Specify the path to the modprobe program. By default, iptables-save will inspect /proc/sys/kernel/modprobe to determine the executable's path.
+ man ipcalc
+ head -n 20
IPCALC(1) General Commands Manual IPCALC(1)
NAME
ipcalc - perform simple manipulation of IP addresses
SYNOPSIS
ipcalc [OPTION]... <IP address>[/prefix] [netmask]
DESCRIPTION
ipcalc provides a simple way to calculate IP information for a host. The various options specify what information ipcalc should display on standard out. Multiple options may be specified. An IP address to operate on must always be specified. Most operations also require a netmask or a CIDR prefix as well.
OPTIONS
-c, --check
Validate the IP address under the specified family. If no address family is specified, IPv4 is assumed.
+ man ipcmk
+ head -n 20
IPCMK(1) User Commands IPCMK(1)
NAME
ipcmk - make various IPC resources
SYNOPSIS
ipcmk [options]
DESCRIPTION
ipcmk allows you to create shared memory segments, message queues, and semaphore arrays.
OPTIONS
Resources can be specified with these options:
-M, --shmem size
Create a shared memory segment of size bytes. The size argument may be followed by the multiplicative suffixes KiB (=1024), MiB (=1024*1024), and so on for GiB, etc. (the "iB" is optional, e.g., "K" has the same meaning as "KiB") or the suffixes KB (=1000), MB (=1000*1000), and so on for GB, etc.
-Q, --queue
+ man ipcrm
+ head -n 20
IPCRM(1) User Commands IPCRM(1)
NAME
ipcrm - remove certain IPC resources
SYNOPSIS
ipcrm [options]
ipcrm {shm|msg|sem} id...
DESCRIPTION
ipcrm removes System V inter-process communication (IPC) objects and associated data structures from the system. In order to delete such objects, you must be superuser, or the creator or owner of the object.
System V IPC objects are of three types: shared memory, message queues, and semaphores. Deletion of a message queue or semaphore object is immediate (regardless of whether any process still holds an IPC identifier for the object). A shared memory object is only removed after all currently attached processes have detached (shmdt(2)) the object from their virtual address space.
Two syntax styles are supported. The old Linux historical syntax specifies a three-letter keyword indicating which class of object is to be deleted, followed by one or more IPC identifiers for objects of this type.
The SUS-compliant syntax allows the specification of zero or more objects of all three types in a single command line, with objects specified either by key or by identifier (see below). Both keys and identifiers may be specified in decimal, hexadecimal (specified with an initial '0x' or '0X'), or octal (specified with an initial '0').
+ man ipcs
+ head -n 20
IPCS(1) User Commands IPCS(1)
NAME
ipcs - show information on IPC facilities
SYNOPSIS
ipcs [options]
DESCRIPTION
ipcs shows information on the inter-process communication facilities for which the calling process has read access. By default it shows information about all three resources: shared memory segments, message queues, and semaphore arrays.
OPTIONS
-i, --id id
Show full details on just the one resource element identified by id. This option needs to be combined with one of the three resource options: -m, -q or -s.
-h, --help
Display help text and exit.
+ man ipmaddr
+ head -n 20
IPMADDR(8) IPMADDR(8)
NAME
ipmaddr - adds, deletes, and displays multicast addresses
SYNOPSIS
/usr/sbin/ipmaddr [<operation>] [<args>]
NOTE
This program is obsolete. For replacement check ip maddr.
DESCRIPTION
The ipmaddr command can perform one of the following operations:
add - add a multicast address
+ man iptables
+ head -n 20
IPTABLES(8) iptables 1.8.4 IPTABLES(8)
NAME
iptables/ip6tables — administration tool for IPv4/IPv6 packet filtering and NAT
SYNOPSIS
iptables [-t table] {-A|-C|-D} chain rule-specification
ip6tables [-t table] {-A|-C|-D} chain rule-specification
iptables [-t table] -I chain [rulenum] rule-specification
iptables [-t table] -R chain rulenum rule-specification
iptables [-t table] -D chain rulenum
iptables [-t table] -S [chain [rulenum]]
+ man iptables-apply
+ head -n 20
IPTABLES-APPLY(8) iptables 1.8.4 IPTABLES-APPLY(8)
NAME
iptables-apply - a safer way to update iptables remotely
SYNOPSIS
iptables-apply [-hV] [-t timeout] ruleset-file
DESCRIPTION
iptables-apply will try to apply a new ruleset (as output by iptables-save/read by iptables-restore) to iptables, then prompt the user whether the changes are okay. If the new ruleset cut the existing connection, the user will not be able to answer affirmatively. In this case, the script rolls back to the previous ruleset after the timeout expired. The timeout can be set with -t.
When called as ip6tables-apply, the script will use ip6tables-save/-restore instead.
OPTIONS
-t seconds, --timeout seconds
Sets the timeout after which the script will roll back to the previous ruleset.
-h, --help
+ man iptables-legacy
+ head -n 20
No manual entry for iptables-legacy
+ man iptables-legacy-restore
+ head -n 20
No manual entry for iptables-legacy-restore
+ man iptables-legacy-save
+ head -n 20
No manual entry for iptables-legacy-save
+ man iptables-restore
+ head -n 20
IPTABLES-RESTORE(8) iptables 1.8.4 IPTABLES-RESTORE(8)
NAME
iptables-restore — Restore IP Tables
ip6tables-restore — Restore IPv6 Tables
SYNOPSIS
iptables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file]
ip6tables-restore [-chntvV] [-w secs] [-W usecs] [-M modprobe] [-T name] [file]
DESCRIPTION
iptables-restore and ip6tables-restore are used to restore IP and IPv6 Tables from data specified on STDIN or in file. Use I/O redirection provided by your shell to read from a file or specify file as an argument.
-c, --counters
restore the values of all packet and byte counters
+ man iptables-save
+ head -n 20
IPTABLES-SAVE(8) iptables 1.8.4 IPTABLES-SAVE(8)
NAME
iptables-save — dump iptables rules
ip6tables-save — dump iptables rules
SYNOPSIS
iptables-save [-M modprobe] [-c] [-t table] [-f filename]
ip6tables-save [-M modprobe] [-c] [-t table] [-f filename]
DESCRIPTION
iptables-save and ip6tables-save are used to dump the contents of IP or IPv6 Table in easily parseable format either to STDOUT or to a specified file.
-M, --modprobe modprobe_program
Specify the path to the modprobe program. By default, iptables-save will inspect /proc/sys/kernel/modprobe to determine the executable's path.
+ man iptables-xml
+ head -n 20
IPTABLES-XML(1) iptables 1.8.4 IPTABLES-XML(1)
NAME
iptables-xml — Convert iptables-save format to XML
SYNOPSIS
iptables-xml [-c] [-v]
DESCRIPTION
iptables-xml is used to convert the output of iptables-save into an easily manipulatable XML format to STDOUT. Use I/O-redirection provided by your shell to write to a file.
-c, --combine
combine consecutive rules with the same matches but different targets. iptables does not currently support more than one target per match, so this simulates that by collecting the targets from consecutive iptables rules into one action tag, but only when the rule matches are identical. Terminating actions like RETURN, DROP, ACCEPT and QUEUE are not combined with subsequent targets.
-v, --verbose
Output xml comments containing the iptables line from which the XML is derived
+ man iptunnel
+ head -n 20
IPTUNNEL(8) IPTUNNEL(8)
NAME
iptunnel - creates, deletes, and displays configured tunnels
SYNOPSIS
/usr/sbin/iptunnel [<operation>] [<args>]
NOTE
This program is obsolete. For replacement check ip tunnel.
DESCRIPTION
The iptunnel command creates configured tunnels for sending and receiving IPV6 or IPV4 packets that are encapsulated as the payload of an IPV4 datagram.
The iptunnel command can perform one of the following operations:
+ man irqbalance
+ head -n 20
IRQBALANCE(1) irqbalance IRQBALANCE(1)
NAME
irqbalance - distribute hardware interrupts across processors on a multiprocessor system
SYNOPSIS
irqbalance
DESCRIPTION
The purpose of irqbalance is to distribute hardware interrupts across processors on a multiprocessor system in order to increase performance.
OPTIONS
-o, --oneshot
Causes irqbalance to be run once, after which the daemon exits.
+ man isosize
+ head -n 20
ISOSIZE(8) System Administration ISOSIZE(8)
NAME
isosize - output the length of an iso9660 filesystem
SYNOPSIS
isosize [options] iso9660_image_file
DESCRIPTION
This command outputs the length of an iso9660 filesystem that is contained in the specified file. This file may be a normal file or a block device (e.g. /dev/hdd or /dev/sr0). In the absence of any options (and errors), it will output the size of the iso9660 filesystem in bytes. This can now be a large number (>> 4 GB).
OPTIONS
-x, --sectors
Show the block count and block size in human-readable form. The output uses the term "sectors" for "blocks".
-d, --divisor number
Only has an effect when -x is not given. The value shown (if no errors) is the iso9660 file size in bytes divided by number. So if number is the block size then the shown value will be the block count.
+ man journalctl
+ head -n 20
JOURNALCTL(1) journalctl JOURNALCTL(1)
NAME
journalctl - Query the systemd journal
SYNOPSIS
journalctl [OPTIONS...] [MATCHES...]
DESCRIPTION
journalctl may be used to query the contents of the systemd(1) journal as written by systemd-journald.service(8).
If called without parameters, it will show the full contents of the journal, starting with the oldest entry collected.
If one or more match arguments are passed, the output is filtered accordingly. A match is in the format "FIELD=VALUE", e.g. "_SYSTEMD_UNIT=httpd.service", referring to the components of a structured journal entry. See systemd.journal-fields(7) for a list of well-known fields. If multiple matches are specified matching different fields, the log entries are filtered by both, i.e. the resulting output
will show only entries matching all the specified matches of this kind. If two matches apply to the same field, then they are automatically matched as alternatives, i.e. the resulting output will show entries matching any of the specified matches for the same field. Finally, the character "+" may appears as a separate word between other terms on the command line. This causes all matches before and
after to be combined in a disjunction (i.e. logical OR).
As shortcuts for a few types of field/value matches, file paths may be specified. If a file path refers to an executable file, this is equivalent to an "_EXE=" match for the canonicalized binary path. Similarly, if a path refers to a device node then match is added for the kernel name of the device ("_KERNEL_DEVICE="). Also, matches for the kernel names of all the parent devices are added
+ man jp.py
+ head -n 20
No manual entry for jp.py
+ man jp.py-2
+ head -n 20
No manual entry for jp.py-2
+ man jp.py-2.7
+ head -n 20
No manual entry for jp.py-2.7
+ man json_reformat
+ head -n 20
No manual entry for json_reformat
+ man json_verify
+ head -n 20
No manual entry for json_verify
+ man jsonpointer
+ head -n 20
No manual entry for jsonpointer
+ man jsonschema
+ head -n 20
No manual entry for jsonschema
+ man kbd_mode
+ head -n 20
KBD_MODE(1) General Commands Manual KBD_MODE(1)
NAME
kbd_mode - report or set the keyboard mode
SYNOPSIS
kbd_mode [ -a | -u | -k | -s ] [ -C CONSOLE ]
DESCRIPTION
Without argument, kbd_mode prints the current keyboard mode (RAW, MEDIUMRAW or XLATE). With argument, it sets the keyboard mode as indicated:
-s: scancode mode (RAW),
-k: keycode mode (MEDIUMRAW),
-a: ASCII mode (XLATE),
-u: UTF-8 mode (UNICODE).
+ man kbdinfo
+ head -n 20
KBDINFO(1) General Commands Manual KBDINFO(1)
NAME
kbdinfo - obtain information about the status of a console
SYNOPSIS
kbdinfo [-C DEVICE] getmode [text|graphics]
kbdinfo [-C DEVICE] gkbmode [raw|xlate|mediumraw|unicode]
kbdinfo [-C DEVICE] gkbmeta [metabit|escprefix]
kbdinfo [-C DEVICE] gkbled [scrolllock|numlock|capslock]
DESCRIPTION
kbdinfo is an interface to KDGETMODE, GKBMODE, GKBMETA and GKBLED ioctls. Its primary use case is to query the status of the given CONSOLE (or the currently active one, if no -C option is present) from a shell script.
If the final value argument is not specified, kbdinfo will print the result of the desired ioctl to the standard output. Otherwise, the given value is compared to the actual result, and the utility will exit with a status code of 0 for a match, 1 otherwise. No text is printed for this style of invocation.
+ man kbdrate
+ head -n 20
KBDRATE(8) Linux Programmer's Manual KBDRATE(8)
NAME
kbdrate - reset the keyboard repeat rate and delay time
SYNOPSIS
kbdrate [ -s ] [ -r rate ] [ -d delay ]
DESCRIPTION
kbdrate is used to change the keyboard repeat rate and delay time. The delay is the amount of time that a key must be depressed before it will start to repeat.
Using kbdrate without any options will reset the repeat rate to 10.9 characters per second (cps) and the delay to 250 milliseconds (ms) for Intel- and M68K-based systems. These are the IBM defaults. On SPARC-based systems it will reset the repeat rate to 20 cps and the delay to 200 ms.
OPTIONS
-s Silent. No messages are printed.
-r rate
+ man kernel-install
+ head -n 20
KERNEL-INSTALL(8) kernel-install KERNEL-INSTALL(8)
NAME
kernel-install - Add and remove kernel and initramfs images to and from /boot
SYNOPSIS
kernel-install COMMAND KERNEL-VERSION [KERNEL-IMAGE]
DESCRIPTION
kernel-install is used to install and remove kernel and initramfs images to and from /boot.
kernel-install will execute the files located in the directory /usr/lib/kernel/install.d/ and the local administration directory /etc/kernel/install.d/. All files are collectively sorted and executed in lexical order, regardless of the directory in which they live. However, files with identical filenames replace each other. Files in /etc/kernel/install.d/ take precedence over files with the same name
in /usr/lib/kernel/install.d/. This can be used to override a system-supplied executables with a local file if needed; a symbolic link in /etc/kernel/install.d/ with the same name as an executable in /usr/lib/kernel/install.d/, pointing to /dev/null, disables the executable entirely. Executables must have the extension ".install"; other extensions are ignored.
COMMANDS
The following commands are understood:
add KERNEL-VERSION KERNEL-IMAGE
+ man key.dns_resolver
+ head -n 20
KEY.DNS_RESOLVER(8) Linux Key Management Utilities KEY.DNS_RESOLVER(8)
NAME
key.dns_resolver - Upcall for request-key to handle dns_resolver keys
SYNOPSIS
/sbin/key.dns_resolver <key>
/sbin/key.dns_resolver -D [-v] [-v] <keydesc> <calloutinfo>
DESCRIPTION
This program is invoked by request-key on behalf of the kernel when kernel services (such as NFS, CIFS and AFS) want to perform a hostname lookup and the kernel does not have the key cached. It is not ordinarily intended to be called directly.
It can be called in debugging mode to test its functionality by passing a -D flag on the command line. For this to work, the key description and the callout information must be supplied. Verbosity can be increased by supplying one or more -v flags.
ERRORS
All errors will be logged to the syslog.
SEE ALSO
+ man keyctl
+ head -n 20
KEYCTL(1) Linux Key Management Utilities KEYCTL(1)
NAME
keyctl - Key management facility control
SYNOPSIS
keyctl --version
keyctl show [-x] [<keyring>]
keyctl add <type> <desc> <data> <keyring>
keyctl padd <type> <desc> <keyring>
keyctl request <type> <desc> [<dest_keyring>]
keyctl request2 <type> <desc> <info> [<dest_keyring>]
keyctl prequest2 <type> <desc> [<dest_keyring>]
keyctl update <key> <data>
keyctl pupdate <key>
keyctl newring <name> <keyring>
keyctl revoke <key>
keyctl clear <keyring>
+ man killall
+ head -n 20
<standard input>:172: name expected (got `\{'): treated as missing
KILLALL(1) User Commands KILLALL(1)
NAME
killall - kill processes by name
SYNOPSIS
killall [-Z, --context pattern] [-e, --exact] [-g, --process-group] [-i, --interactive] [-o, --older-than TIME] [-q, --quiet] [-r, --regexp] [-s, --signal signal] [-u, --user user] [-v, --verbose] [-w, --wait] [-y, --younger-than TIME] [-I, --ignore-case] [-V, --version] [--] name ...
killall -l
killall -V, --version
DESCRIPTION
killall sends a signal to all processes running any of the specified commands. If no signal name is specified, SIGTERM is sent.
Signals can be specified either by name (e.g. -HUP or -SIGHUP) or by number (e.g. -1) or by option -s.
If the command name is not regular expression (option -r) and contains a slash (/), processes executing that particular file will be selected for killing, independent of their name.
killall returns a zero return code if at least one process has been killed for each listed command, or no commands were listed and at least one process matched the -u and -Z search criteria. killall returns non-zero otherwise.
+ man killall5
+ head -n 20
KILLALL5(8) Linux System Administrator's Manual KILLALL5(8)
NAME
killall5 -- send a signal to all processes.
SYNOPSIS
killall5 -signalnumber [-o omitpid[,omitpid..]] [-o omitpid[,omitpid..]..]
DESCRIPTION
killall5 is the SystemV killall command. It sends a signal to all processes except kernel threads and the processes in its own session, so it won't kill the shell that is running the script it was called from. Its primary (only) use is in the rc scripts found in the /etc/init.d directory.
OPTIONS
-o omitpid
Tells killall5 to omit processes with that process id.
NOTES
killall5 can also be invoked as pidof, which is simply a (symbolic) link to the killall5 program.
+ man kmod
+ head -n 20
KMOD(8) kmod KMOD(8)
NAME
kmod - Program to manage Linux Kernel modules
SYNOPSIS
kmod [OPTIONS...] [COMMAND] [COMMAND_OPTIONS...]
DESCRIPTION
kmod is a multi-call binary which implements the programs used to control Linux Kernel modules. Most users will only run it using its other names.
OPTIONS
-V --version
Show the program version and exit.
-h --help
Show the help message.
+ man kpartx
+ head -n 20
KPARTX(8) Linux Administrator's Manual KPARTX(8)
NAME
kpartx - Create device maps from partition tables
SYNOPSIS
kpartx [-a | -d | -l] [-v] wholedisk
DESCRIPTION
This tool, derived from util-linux' partx, reads partition tables on specified device and create device maps over partitions segments detected. It is called from hotplug upon device maps creation and deletion.
OPTIONS
-a Add partition mappings
-r Read-only partition mappings
-d Delete partition mappings
+ man kpatch
+ head -n 20
man(1) kpatch man page man(1)
NAME
kpatch - hot patch module management
SYNOPSIS
kpatch <command> [<args>]
DESCRIPTION
kpatch is a user script that manages installing, loading, and displaying information about kernel patch modules installed on the system.
COMMANDS
install [-k|--kernel-version=<kernel version>] <module>
install patch module to be loaded at boot
uninstall [-k|--kernel-version=<kernel version>] <module>
uninstall patch module
+ man l.
+ head -n 20
No manual entry for l.
+ man last
+ head -n 20
LAST,LASTB(1) Linux System Administrator's Manual LAST,LASTB(1)
NAME
last, lastb - show listing of last logged in users
SYNOPSIS
last [-R] [-num] [ -n num ] [-adFiowx] [ -f file ] [ -t YYYYMMDDHHMMSS ] [name...] [tty...]
lastb [-R] [-num] [ -n num ] [ -f file ] [-adFiowx] [name...] [tty...]
DESCRIPTION
Last searches back through the file /var/log/wtmp (or the file designated by the -f flag) and displays a list of all users logged in (and out) since that file was created. Names of users and tty's can be given, in which case last will show only those entries matching the arguments. Names of ttys can be abbreviated, thus last 0 is the same as last tty0.
When last catches a SIGINT signal (generated by the interrupt key, usually control-C) or a SIGQUIT signal (generated by the quit key, usually control-\), last will show how far it has searched through the file; in the case of the SIGINT signal last will then terminate.
The pseudo user reboot logs in each time the system is rebooted. Thus last reboot will show a log of all reboots since the log file was created.
Lastb is the same as last, except that by default it shows a log of the file /var/log/btmp, which contains all the bad login attempts.
+ man lastb
+ head -n 20
LAST,LASTB(1) Linux System Administrator's Manual LAST,LASTB(1)
NAME
last, lastb - show listing of last logged in users
SYNOPSIS
last [-R] [-num] [ -n num ] [-adFiowx] [ -f file ] [ -t YYYYMMDDHHMMSS ] [name...] [tty...]
lastb [-R] [-num] [ -n num ] [ -f file ] [-adFiowx] [name...] [tty...]
DESCRIPTION
Last searches back through the file /var/log/wtmp (or the file designated by the -f flag) and displays a list of all users logged in (and out) since that file was created. Names of users and tty's can be given, in which case last will show only those entries matching the arguments. Names of ttys can be abbreviated, thus last 0 is the same as last tty0.
When last catches a SIGINT signal (generated by the interrupt key, usually control-C) or a SIGQUIT signal (generated by the quit key, usually control-\), last will show how far it has searched through the file; in the case of the SIGINT signal last will then terminate.
The pseudo user reboot logs in each time the system is rebooted. Thus last reboot will show a log of all reboots since the log file was created.
Lastb is the same as last, except that by default it shows a log of the file /var/log/btmp, which contains all the bad login attempts.
+ man lastcomm
+ head -n 20
LASTCOMM(1) General Commands Manual LASTCOMM(1)
NAME
lastcomm - print out information about previously executed commands.
SYNOPSIS
lastcomm
[ command-name ... ]
[ user-name ... ]
[ terminal-name ... ]
[ OPTION ... ]
DESCRIPTION
lastcomm prints out information about previously executed commands. If no arguments are specified, lastcomm will print info about all of the commands in acct (the record file). If called with one or more of command-name, user-name, or terminal-name, only records containing those items will be displayed. For example, to find out which users used command `a.out' and which users were logged into
`tty0', type:
lastcomm a.out tty0
This will print any entry for which `a.out' or `tty0' matches in any of the record's fields (command, name, or terminal). If you want to find only items that match *all* of the arguments on the command line, you must use the '-strict-match' option. For example, to list all of the executions of command a.out by user root on terminal tty0, type:
+ man lastlog
+ head -n 20
LASTLOG(8) System Management Commands LASTLOG(8)
NAME
lastlog - reports the most recent login of all users or of a given user
SYNOPSIS
lastlog [options]
DESCRIPTION
lastlog formats and prints the contents of the last login log /var/log/lastlog file. The login-name, port, and last login time will be printed. The default (no flags) causes lastlog entries to be printed, sorted by their order in /etc/passwd.
OPTIONS
The options which apply to the lastlog command are:
-b, --before DAYS
Print only lastlog records older than DAYS.
-C, --clear
+ man lchage
+ head -n 20
lchage(1) General Commands Manual lchage(1)
NAME
lchage - Display or change user password policy
SYNOPSIS
lchage [OPTION]... user
DESCRIPTION
Displays or allows changing password policy of user.
OPTIONS
-d, --date=days
Set the date of last password change to days after Jan 1 1970.
+ man lchfn
+ head -n 20
lchfn(1) General Commands Manual lchfn(1)
NAME
lchfn - Change finger information
SYNOPSIS
lchfn [OPTION]... [user]
DESCRIPTION
Displays and allows changing information about user that is available using the finger(1) command (usually stored in the "gecos" field of /etc/passwd).
If the user argument is not provided, username of the invoking user is used; the user argument is ignored if lchfn is run set-uid to a different user.
Entering an empty string (by pressing Enter) at a prompt is interpreted as accepting a default value; to erase an attribute (or to use an empty string as the attribute value), enter a single dot character.
+ man lchsh
+ head -n 20
lchsh(1) General Commands Manual lchsh(1)
NAME
lchsh - Change login shell
SYNOPSIS
lchsh [OPTION]... [user]
DESCRIPTION
Displays and allows changing login shell of user.
If the user argument is not provided, username of the invoking user is used; the user argument is ignored if lchsh is run set-uid to a different user.
Entering an empty string (by pressing Enter) at the "New Shell" prompt is interpreted as accepting the current value.
+ man ld
+ head -n 20
LD(1) GNU Development Tools LD(1)
NAME
ld - The GNU linker
SYNOPSIS
ld [options] objfile ...
DESCRIPTION
ld combines a number of object and archive files, relocates their data and ties up symbol references. Usually the last step in compiling a program is to run ld.
ld accepts Linker Command Language files written in a superset of AT&T's Link Editor Command Language syntax, to provide explicit and total control over the linking process.
This man page does not describe the command language; see the ld entry in "info" for full details on the command language and on other aspects of the GNU linker.
This version of ld uses the general purpose BFD libraries to operate on object files. This allows ld to read, combine, and write object files in many different formats---for example, COFF or "a.out". Different formats may be linked together to produce any available kind of object file.
Aside from its flexibility, the GNU linker is more helpful than other linkers in providing diagnostic information. Many linkers abandon execution immediately upon encountering an error; whenever possible, ld continues executing, allowing you to identify other errors (or, in some cases, to get an output file in spite of the error).
+ man ld.bfd
+ head -n 20
No manual entry for ld.bfd
+ man ld.gold
+ head -n 20
No manual entry for ld.gold
+ man ldattach
+ head -n 20
LDATTACH(8) System Administration LDATTACH(8)
NAME
ldattach - attach a line discipline to a serial line
SYNOPSIS
ldattach [-1278denoVh] [-i iflag] [-s speed] ldisc device
DESCRIPTION
The ldattach daemon opens the specified device file (which should refer to a serial device) and attaches the line discipline ldisc to it for processing of the sent and/or received data. It then goes into the background keeping the device open so that the line discipline stays loaded.
The line discipline ldisc may be specified either by name or by number.
In order to detach the line discipline, kill(1) the ldattach process.
With no arguments, ldattach prints usage information.
LINE DISCIPLINES
+ man lexgrog
+ head -n 20
LEXGROG(1) Manual pager utils LEXGROG(1)
NAME
lexgrog - parse header information in man pages
SYNOPSIS
lexgrog [-m|-c] [-dfw?V] [-E encoding] file ...
DESCRIPTION
lexgrog is an implementation of the traditional “groff guess” utility in lex. It reads the list of files on its command line as either man page source files or preformatted “cat” pages, and displays their name and description as used by apropos and whatis, the list of preprocessing filters required by the man page before it is passed to nroff or troff, or both.
If its input is badly formatted, lexgrog will print “parse failed”; this may be useful for external programs that need to check man pages for correctness. If one of lexgrog's input files is “-”, it will read from standard input; if any input file is compressed, a decompressed version will be read automatically.
OPTIONS
-d, --debug
Print debugging information.
-m, --man
+ man lgroupadd
+ head -n 20
lgroupadd(1) General Commands Manual lgroupadd(1)
NAME
lgroupadd - Add an user group
SYNOPSIS
lgroupadd [OPTION]... group
DESCRIPTION
Adds a new user group with name group.
OPTIONS
-g, --gid=gid
Use group ID gid for the newly created group. A group ID is selected automatically if this option is not present.
+ man lgroupdel
+ head -n 20
lgroupdel(1) General Commands Manual lgroupdel(1)
NAME
lgroupdel - Delete an user group
SYNOPSIS
lgroupdel [OPTION]... group
DESCRIPTION
Deletes the user group with name group.
OPTIONS
-i, --interactive
Ask all questions when connecting to the user database, even if default answers are set up in libuser configuration.
+ man lgroupmod
+ head -n 20
lgroupmod(1) General Commands Manual lgroupmod(1)
NAME
lgroupmod - Modify an user group
SYNOPSIS
lgroupmod [OPTION]... group
DESCRIPTION
Modifies the user group with name group.
OPTIONS
-A, --admin-add=list
Add users in comma-separated list among group's administrators.
+ man lid
+ head -n 20
lid(1) General Commands Manual lid(1)
NAME
lid - Display user's groups or group's users
SYNOPSIS
lid [OPTION]... [name]
DESCRIPTION
Displays information about groups containing user name, or users contained in group name.
By default lid lists groups containing user name, or groups containing the invoking user if name is not specified; the mode of operation can be changed using the -g option.
OPTIONS
-g, --group
+ man linux-boot-prober
+ head -n 20
linux-boot-prober(1) General Commands Manual linux-boot-prober(1)
NAME
linux-boot-prober — Determine boot characteristics of a specified device.
SYNOPSIS
linux-boot-prober <partition>
DESCRIPTION
The linux-boot-prober utility will try to work out how to boot the linux root partition specified by <partition>. If successful, it will outoput one or more lines of the form:
<root partition>:<boot partition>:<label>:<kernel path>:<initrd path>:<kernel parameters>
For example, for a system with a kernel at /boot/vmlinuz and an initramfs at /boot/initrd.gz, and with / on /dev/sda2 and /boot on /dev/sda1, the command "linux-boot-prober /dev/sda1" will display:
/dev/sda2:/dev/sda1:Linux:/vmlinuz:/initrd.gz:root=/dev/sda1
Some partitions will not be displayed by linux-boot-prober. If a partition is mounted on /, /target, or /target/boot, it will be skipped.
+ man linux32
+ head -n 20
SETARCH(8) System Administration SETARCH(8)
NAME
setarch - change reported architecture in new program environment and set personality flags
SYNOPSIS
setarch arch [options] [program [argument...]]
arch [options] [program [argument...]]
setarch --list|-h|-V
DESCRIPTION
setarch currently only affects the output of uname -m. For example, on an AMD64 system, running setarch i386 program will cause program to see i686 instead of x86_64 as the machine type. It also allows to set various personality options. The default program is /bin/sh.
OPTIONS
--list List the architectures that setarch knows about. Whether setarch can actually set each of these architectures depends on the running kernel.
+ man linux64
+ head -n 20
SETARCH(8) System Administration SETARCH(8)
NAME
setarch - change reported architecture in new program environment and set personality flags
SYNOPSIS
setarch arch [options] [program [argument...]]
arch [options] [program [argument...]]
setarch --list|-h|-V
DESCRIPTION
setarch currently only affects the output of uname -m. For example, on an AMD64 system, running setarch i386 program will cause program to see i686 instead of x86_64 as the machine type. It also allows to set various personality options. The default program is /bin/sh.
OPTIONS
--list List the architectures that setarch knows about. Whether setarch can actually set each of these architectures depends on the running kernel.
+ man ll
+ head -n 20
No manual entry for ll
+ man lnewusers
+ head -n 20
lnewusers(1) General Commands Manual lnewusers(1)
NAME
lnewusers - Create new user accounts
SYNOPSIS
lnewusers [OPTION]...
DESCRIPTION
Creates new user accounts using data read from standard input.
The input data consists of lines, each line has 7 colon-separated fields:
User name
+ man lnstat
+ head -n 20
LNSTAT(8) System Manager's Manual LNSTAT(8)
NAME
lnstat - unified linux network statistics
SYNOPSIS
lnstat [options]
DESCRIPTION
This manual page documents briefly the lnstat command.
lnstat is a generalized and more feature-complete replacement for the old rtstat program. It is commonly used to periodically print a selection of statistical values exported by the kernel. In addition to routing cache statistics, it supports any kind of statistics the linux kernel exports via a file in /proc/net/stat/.
Each file in /proc/net/stat/ contains a header line listing the column names. These names are used by lnstat as keys for selecting which statistics to print. For every CPU present in the system, a line follows which lists the actual values for each column of the file. lnstat sums these values up (which in fact are counters) before printing them. After each interval, only the difference to the last
value is printed.
Files and columns may be selected by using the -f and -k parameters. By default, all columns of all files are printed.
+ man load_policy
+ head -n 20
LOAD_POLICY(8) NSA LOAD_POLICY(8)
NAME
load_policy - load a new SELinux policy into the kernel
SYNOPSIS
load_policy [-qi]
DESCRIPTION
load_policy loads the installed policy file into the kernel. The existing policy boolean values are automatically preserved across policy reloads rather than being reset to the default values in the policy file.
OPTIONS
-q suppress warning messages.
-i initial policy load. Only use this if this is the first time policy is being loaded since boot (usually called from initramfs).
+ man loadkeys
+ head -n 20
LOADKEYS(1) General Commands Manual LOADKEYS(1)
NAME
loadkeys - load keyboard translation tables
SYNOPSIS
loadkeys [ -a --ascii ] [ [ -b --bkeymap ] [ -c --clearcompose ] [ -C '<FILE>' | --console=<FILE> ] [ -d --default ] [ -h --help ] [ -m --mktable ] [ -p --parse ] [ -q --quiet ] [ -s --clearstrings ] [ -u --unicode ] [ -v --verbose ] [ -V --version ] [ filename... ]
DESCRIPTION
The program loadkeys reads the file or files specified by filename.... Its main purpose is to load the kernel keymap for the console. You can specify console device by the -C (or --console ) option.
RESET TO DEFAULT
If the -d (or --default ) option is given, loadkeys loads a default keymap, probably the file defkeymap.map either in /lib/kbd/keymaps or in /usr/src/linux/drivers/char. (Probably the former was user-defined, while the latter is a qwerty keyboard map for PCs - maybe not what was desired.) Sometimes, with a strange keymap loaded (with the minus on some obscure unknown modifier combination) it is eas‐
ier to type `loadkeys defkeymap'.
LOAD KERNEL KEYMAP
The main function of loadkeys is to load or modify the keyboard driver's translation tables. When specifying the file names, standard input can be denoted by dash (-). If no file is specified, the data is read from the standard input.
+ man loadunimap
+ head -n 20
LOADUNIMAP(8) System Manager's Manual LOADUNIMAP(8)
NAME
loadunimap - load the kernel unicode-to-font mapping table
SYNOPSIS
loadunimap [ -C console ] [ -o oldmap ] [ map ]
DESCRIPTION
The loadunimap command is obsolete - its function is now built-in into setfont. However, for backwards compatibility it is still available as a separate command.
The program loadunimap loads the specified map in the kernel unicode-to-font mapping table. If no map is given def is assumed. The default extension (that can be omitted) is .uni.
If the -o oldmap option is given, the old map is saved in the file specified.
On Linux 2.6.1 and later one can specify the console device using the -C option.
Usually one does not call loadunimap directly - its function is also built into setfont.
+ man localectl
+ head -n 20
LOCALECTL(1) localectl LOCALECTL(1)
NAME
localectl - Control the system locale and keyboard layout settings
SYNOPSIS
localectl [OPTIONS...] {COMMAND}
DESCRIPTION
localectl may be used to query and change the system locale and keyboard layout settings.
The system locale controls the language settings of system services and of the UI before the user logs in, such as the display manager, as well as the default for users after login.
The keyboard settings control the keyboard layout used on the text console and of the graphical UI before the user logs in, such as the display manager, as well as the default for users after login.
Use systemd-firstboot(1) to initialize the system locale for mounted (but not booted) system images.
OPTIONS
+ man locate
+ head -n 20
locate(1) General Commands Manual locate(1)
NAME
locate - find files by name
SYNOPSIS
locate [OPTION]... PATTERN...
DESCRIPTION
locate reads one or more databases prepared by updatedb(8) and writes file names matching at least one of the PATTERNs to standard output, one per line.
If --regex is not specified, PATTERNs can contain globbing characters. If any PATTERN contains no globbing characters, locate behaves as if the pattern were *PATTERN*.
By default, locate does not check whether files found in database still exist (but it does require all parent directories to exist if the database was built with --require-visibility no). locate can never report files created after the most recent update of the relevant database.
+ man logger
+ head -n 20
LOGGER(1) User Commands LOGGER(1)
NAME
logger - enter messages into the system log
SYNOPSIS
logger [options] [message]
DESCRIPTION
logger makes entries in the system log.
When the optional message argument is present, it is written to the log. If it is not present, and the -f option is not given either, then standard input is logged.
OPTIONS
-d, --udp
Use datagrams (UDP) only. By default the connection is tried to the syslog port defined in /etc/services, which is often 514 .
-e, --skip-empty
+ man login
+ head -n 20
LOGIN(1) User Commands LOGIN(1)
NAME
login - begin session on the system
SYNOPSIS
login [ -p ] [ -h host ] [ -H ] [ -f username | username ]
DESCRIPTION
login is used when signing onto a system. If no argument is given, login prompts for the username.
The user is then prompted for a password, where appropriate. Echoing is disabled to prevent revealing the password. Only a small number of password failures are permitted before login exits and the communications link is severed.
If password aging has been enabled for the account, the user may be prompted for a new password before proceeding. He will be forced to provide his old password and the new password before continuing. Please refer to passwd(1) for more information.
The user and group ID will be set according to their values in the /etc/passwd file. There is one exception if the user ID is zero: in this case, only the primary group ID of the account is set. This should allow the system administrator to login even in case of network problems. The value for $HOME, $USER, $SHELL, $PATH, $LOGNAME, and $MAIL are set according to the appropriate fields in the pass‐
word entry. $PATH defaults to /usr/local/bin:/bin:/usr/bin for normal users, and to /usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin for root, if not otherwise configured.
+ man loginctl
+ head -n 20
LOGINCTL(1) loginctl LOGINCTL(1)
NAME
loginctl - Control the systemd login manager
SYNOPSIS
loginctl [OPTIONS...] {COMMAND} [NAME...]
DESCRIPTION
loginctl may be used to introspect and control the state of the systemd(1) login manager systemd-logind.service(8).
OPTIONS
The following options are understood:
--no-ask-password
Do not query the user for authentication for privileged operations.
-p, --property=
+ man logrotate
+ head -n 20
LOGROTATE(8) System Administrator's Manual LOGROTATE(8)
NAME
logrotate ‐ rotates, compresses, and mails system logs
SYNOPSIS
logrotate [-dv] [-f|--force] [-s|--state file] config_file ..
DESCRIPTION
logrotate is designed to ease administration of systems that generate large numbers of log files. It allows automatic rotation, compression, removal, and mailing of log files. Each log file may be handled daily, weekly, monthly, or when it grows too large.
Normally, logrotate is run as a daily cron job. It will not modify a log multiple times in one day unless the criterion for that log is based on the log's size and logrotate is being run multiple times each day, or unless the -f or --force option is used.
Any number of config files may be given on the command line. Later config files may override the options given in earlier files, so the order in which the logrotate config files are listed is important. Normally, a single config file which includes any other config files which are needed should be used. See below for more information on how to use the include directive to accomplish this. If a
directory is given on the command line, every file in that directory is used as a config file.
If no command line arguments are given, logrotate will print version and copyright information, along with a short usage summary. If any errors occur while rotating logs, logrotate will exit with non-zero status.
+ man logsave
+ head -n 20
LOGSAVE(8) System Manager's Manual LOGSAVE(8)
NAME
logsave - save the output of a command in a logfile
SYNOPSIS
logsave [ -asv ] logfile cmd_prog [ ... ]
DESCRIPTION
The logsave program will execute cmd_prog with the specified argument(s), and save a copy of its output to logfile. If the containing directory for logfile does not exist, logsave will accumulate the output in memory until it can be written out. A copy of the output will also be written to standard output.
If cmd_prog is a single hyphen ('-'), then instead of executing a program, logsave will take its input from standard input and save it in logfile
logsave is useful for saving the output of initial boot scripts until the /var partition is mounted, so the output can be written to /var/log.
OPTIONS
-a This option will cause the output to be appended to logfile, instead of replacing its current contents.
+ man look
+ head -n 20
LOOK(1) User Commands LOOK(1)
NAME
look - display lines beginning with a given string
SYNOPSIS
look [options] string [file]
DESCRIPTION
The look utility displays any lines in file which contain string. As look performs a binary search, the lines in file must be sorted (where sort(1) was given the same options -d and/or -f that look is invoked with).
If file is not specified, the file /usr/share/dict/words is used, only alphanumeric characters are compared and the case of alphabetic characters is ignored.
OPTIONS
-a, --alternative
Use the alternative dictionary file.
-d, --alphanum
+ man losetup
+ head -n 20
LOSETUP(8) System Administration LOSETUP(8)
NAME
losetup - set up and control loop devices
SYNOPSIS
Get info:
losetup loopdev
losetup -l [-a]
losetup -j file [-o offset]
Detach a loop device:
losetup -d loopdev...
+ man lpasswd
+ head -n 20
lpasswd(1) General Commands Manual lpasswd(1)
NAME
lpasswd - Change group or user password
SYNOPSIS
lpasswd [OPTION]... [name]
DESCRIPTION
Changes password of user or group name.
If the name argument is not provided, username of the invoking user is used; the name argument is ignored if lpasswd is run set-uid to a different user.
Entering an empty password (by pressing Enter) aborts the password setting operation.
+ man lsattr
+ head -n 20
LSATTR(1) General Commands Manual LSATTR(1)
NAME
lsattr - list file attributes on a Linux second extended file system
SYNOPSIS
lsattr [ -RVadv ] [ files... ]
DESCRIPTION
lsattr lists the file attributes on a second extended file system. See chattr(1) for a description of the attributes and what they mean.
OPTIONS
-R Recursively list attributes of directories and their contents.
-V Display the program version.
-a List all files in directories, including files that start with `.'.
+ man lsblk
+ head -n 20
LSBLK(8) System Administration LSBLK(8)
NAME
lsblk - list block devices
SYNOPSIS
lsblk [options] [device...]
DESCRIPTION
lsblk lists information about all available or the specified block devices. The lsblk command reads the sysfs filesystem and udev db to gather information.
The command prints all block devices (except RAM disks) in a tree-like format by default. Use lsblk --help to get a list of all available columns.
The default output, as well as the default output from options like --fs and --topology, is subject to change. So whenever possible, you should avoid using default outputs in your scripts. Always explicitly define expected columns by using --output columns-list in environments where a stable output is required.
Note that lsblk might be executed in time when udev does not have all information about recently added or modified devices yet. In this case it is recommended to use udevadm settle before lsblk to synchronize with udev.
OPTIONS
+ man lscpu
+ head -n 20
LSCPU(1) User Commands LSCPU(1)
NAME
lscpu - display information about the CPU architecture
SYNOPSIS
lscpu [-a|-b|-c|-J] [-x] [-y] [-s directory] [-e[=list]|-p[=list]]
lscpu -h|-V
DESCRIPTION
lscpu gathers CPU architecture information from sysfs, /proc/cpuinfo and any applicable architecture-specific libraries (e.g. librtas on Powerpc). The command output can be optimized for parsing or for easy readability by humans. The information includes, for example, the number of CPUs, threads, cores, sockets, and Non-Uniform Memory Access (NUMA) nodes. There is also information about the CPU
caches and cache sharing, family, model, bogoMIPS, byte order, and stepping.
In virtualized environments, the CPU architecture information displayed reflects the configuration of the guest operating system which is typically different from the physical (host) system. On architectures that support retrieving physical topology information, lscpu also displays the number of physical sockets, chips, cores in the host system.
Options that result in an output table have a list argument. Use this argument to customize the command output. Specify a comma-separated list of column labels to limit the output table to only the specified columns, arranged in the specified order. See COLUMNS for a list of valid column labels. The column labels are not case sensitive.
Not all columns are supported on all architectures. If an unsupported column is specified, lscpu prints the column but does not provide any data for it.
+ man lsinitrd
+ head -n 20
LSINITRD(1) dracut LSINITRD(1)
NAME
lsinitrd - tool to show the contents of an initramfs image
SYNOPSIS
lsinitrd [OPTION...] [<image> [<filename> [<filename> [...] ]]]
lsinitrd [OPTION...] -k <kernel-version>
DESCRIPTION
lsinitrd shows the contents of an initramfs image. if <image> is omitted, then lsinitrd uses the default image /boot/<machine-id>/<kernel-version>/initrd or /boot/initramfs-<kernel-version>.img.
OPTIONS
-h, --help
print a help message and exit.
-s, --size
+ man lsipc
+ head -n 20
LSIPC(1) User Commands LSIPC(1)
NAME
lsipc - show information on IPC facilities currently employed in the system
SYNOPSIS
lsipc [options]
DESCRIPTION
lsipc shows information on the inter-process communication facilities for which the calling process has read access.
OPTIONS
-i, --id id
Show full details on just the one resource element identified by id. This option needs to be combined with one of the three resource options: -m, -q or -s. It is possible to override the default output format for this option with the --list, --raw, --json or --export option.
-g, --global
Show system-wide usage and limits of IPC resources. This option may be combined with one of the three resource options: -m, -q or -s. The default is to show information about all resources.
+ man lslocks
+ head -n 20
LSLOCKS(8) System Administration LSLOCKS(8)
NAME
lslocks - list local system locks
SYNOPSIS
lslocks [options]
DESCRIPTION
lslocks lists information about all the currently held file locks in a Linux system.
OPTIONS
-i, --noinaccessible
Ignore lock files which are inaccessible for the current user.
+ man lslogins
+ head -n 20
LSLOGINS(1) User Commands LSLOGINS(1)
NAME
lslogins - display information about known users in the system
SYNOPSIS
lslogins [options] [-s|-u[=UID]] [-g groups] [-l logins]
DESCRIPTION
Examine the wtmp and btmp logs, /etc/shadow (if necessary) and /etc/passwd and output the desired data.
The default action is to list info about all the users in the system.
OPTIONS
Mandatory arguments to long options are mandatory for short options too.
-a, --acc-expiration
Display data about the date of last password change and the account expiration date (see shadow(5) for more info). (Requires root privileges.)
+ man lsmcli
+ head -n 20
<standard input>:338: cannot use a space as a starting delimiter
LSMCLI(1) libStorageMgmt LSMCLI(1)
NAME
lsmcli - libStorageMgmt command line interface
SYNOPSIS
lsmcli command [GLOBAL OPTIONS]...[COMMAND OPTIONS]...
DESCRIPTION
lsmcli is the command line tool for the libStorageMgmt library. This tool allows users to do one off storage related management operations or to script management of their storage.
PREREQUISITES
* libStorageMgmt daemon.
The daemon 'lsmd' is required by lsmcli.
+ man lsmd
+ head -n 20
LSMD(1) libStorageMgmt plug-in daemon LSMD(1)
NAME
Daemon - lsmd
DESCRIPTION
libStorageMgmt plug-in daemon. Plug-ins execute in their own process space for fault isolation and to accommodate different plug-in licensing requirements. Runs as an unprivileged user.
OPTIONS
--plugindir = The directory where the plugins are located
--socketdir = The directory for IPC sockets
--confdir = The directory where the config file are located
-v = Verbose logging
+ man lsmem
+ head -n 20
LSMEM(1) User Commands LSMEM(1)
NAME
lsmem - list the ranges of available memory with their online status
SYNOPSIS
lsmem [options]
DESCRIPTION
The lsmem command lists the ranges of available memory with their online status. The listed memory blocks correspond to the memory block representation in sysfs. The command also shows the memory block size and the amount of memory in online and offline state.
The default output compatible with original implementaion from s390-tools, but it's strongly recommended to avoid using default outputs in your scripts. Always explicitly define expected columns by using the --output option together with a columns list in environments where a stable output is required.
Not all columns are supported on all systems. If an unsupported column is specified, lsmem prints the column but does not provide any data for it.
Use the --help option to see the columns description.
+ man lsmod
+ head -n 20
LSMOD(8) lsmod LSMOD(8)
NAME
lsmod - Show the status of modules in the Linux Kernel
SYNOPSIS
lsmod
DESCRIPTION
lsmod is a trivial program which nicely formats the contents of the /proc/modules, showing what kernel modules are currently loaded.
COPYRIGHT
This manual page originally Copyright 2002, Rusty Russell, IBM Corporation. Maintained by Jon Masters and others.
SEE ALSO
insmod(8), modprobe(8), modinfo(8) depmod(8)
AUTHORS
+ man lsns
+ head -n 20
LSNS(8) System Administration LSNS(8)
NAME
lsns - list namespaces
SYNOPSIS
lsns [options] [namespace]
DESCRIPTION
lsns lists information about all the currently accessible namespaces or about the given namespace. The namespace identifier is an inode number.
The default output is subject to change. So whenever possible, you should avoid using default outputs in your scripts. Always explicitly define expected columns by using the --output option together with a columns list in environments where a stable output is required.
Note that lsns reads information directly from the /proc filesystem and for non-root users it may return incomplete information. The current /proc filesystem may be unshared and affected by a PID namespace (see unshare --mount-proc for more details). lsns is not able to see persistent namespaces without processes where the namespace instance is held by a bind mount to /proc/pid/ns/type.
+ man lsof
+ head -n 20
LSOF(8) System Manager's Manual LSOF(8)
NAME
lsof - list open files
SYNOPSIS
lsof [ -?abChlnNOPRtUvVX ] [ -A A ] [ -c c ] [ +c c ] [ +|-d d ] [ +|-D D ] [ +|-e s ] [ +|-f [cfgGn] ] [ -F [f] ] [ -g [s] ] [ -i [i] ] [ -k k ] [ -K k ] [ +|-L [l] ] [ +|-m m ] [ +|-M ] [ -o [o] ] [ -p s ] [ +|-r [t[m<fmt>]] ] [ -s [p:s] ] [ -S [t] ] [ -T [t] ] [ -u s ] [ +|-w ] [ -x [fl] ] [ -z [z] ] [ -Z [Z] ] [ -- ] [names]
DESCRIPTION
Lsof revision 4.87 lists on its standard output file information about files opened by processes for the following UNIX dialects:
Apple Darwin 9 and Mac OS X 10.[567]
FreeBSD 4.9 and 6.4 for x86-based systems
FreeBSD 8.2, 9.0 and 10.0 for AMD64-based systems
Linux 2.1.72 and above for x86-based systems
Solaris 9, 10 and 11
(See the DISTRIBUTION section of this manual page for information on how to obtain the latest lsof revision.)
+ man lspci
+ head -n 20
lspci(8) The PCI Utilities lspci(8)
NAME
lspci - list all PCI devices
SYNOPSIS
lspci [options]
DESCRIPTION
lspci is a utility for displaying information about PCI buses in the system and devices connected to them.
By default, it shows a brief list of devices. Use the options described below to request either a more verbose output or output intended for parsing by other programs.
If you are going to report bugs in PCI device drivers or in lspci itself, please include output of "lspci -vvx" or even better "lspci -vvxxx" (however, see below for possible caveats).
Some parts of the output, especially in the highly verbose modes, are probably intelligible only to experienced PCI hackers. For exact definitions of the fields, please consult either the PCI specifications or the header.h and /usr/include/linux/pci.h include files.
Access to some parts of the PCI configuration space is restricted to root on many operating systems, so the features of lspci available to normal users are limited. However, lspci tries its best to display as much as available and mark all other information with <access denied> text.
+ man luseradd
+ head -n 20
luseradd(1) General Commands Manual luseradd(1)
NAME
luseradd - Add an user
SYNOPSIS
luseradd [OPTION]... user
DESCRIPTION
Adds an user with name user.
OPTIONS
-c, --gecos=gecos
Set the GECOS field to gecos. The GECOS field is traditionally used to store user's real name and other information.
+ man luserdel
+ head -n 20
luserdel(1) General Commands Manual luserdel(1)
NAME
luserdel - Delete an user
SYNOPSIS
luserdel [OPTION]... user
DESCRIPTION
Deletes the user with name user.
OPTIONS
-G, --dontremovegroup
By default the user's primary group is removed if it has group name user (user's private group). This option disables this behavior.
+ man lusermod
+ head -n 20
lusermod(1) General Commands Manual lusermod(1)
NAME
lusermod - Modify an user
SYNOPSIS
lusermod [OPTION]... user
DESCRIPTION
Modifies the user with name user.
OPTIONS
-c, --gecos=gecos
Set user's GECOS field to gecos. The GECOS field is traditionally used to store user's real name and other information.
+ man lvchange
+ head -n 20
LVCHANGE(8) System Manager's Manual LVCHANGE(8)
NAME
lvchange - Change the attributes of logical volume(s)
SYNOPSIS
lvchange option_args position_args
[ option_args ]
-a|--activate y|n|ay
--activationmode partial|degraded|complete
--addtag Tag
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit
-A|--autobackup y|n
--cachemode writethrough|writeback|passthrough
--cachepolicy String
--cachesettings String
--commandprofile String
+ man lvconvert
+ head -n 20
LVCONVERT(8) System Manager's Manual LVCONVERT(8)
NAME
lvconvert - Change logical volume layout
SYNOPSIS
lvconvert option_args position_args
[ option_args ]
[ position_args ]
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit
-b|--background
-H|--cache
--cachemetadataformat auto|1|2
--cachemode writethrough|writeback|passthrough
--cachepolicy String
--cachepool LV
--cachesettings String
+ man lvcreate
+ head -n 20
LVCREATE(8) System Manager's Manual LVCREATE(8)
NAME
lvcreate - Create a logical volume
SYNOPSIS
lvcreate option_args position_args
[ option_args ]
[ position_args ]
-a|--activate y|n|ay
--addtag Tag
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit
-A|--autobackup y|n
-H|--cache
--cachemetadataformat auto|1|2
--cachemode writethrough|writeback|passthrough
--cachepolicy String
+ man lvdisplay
+ head -n 20
LVDISPLAY(8) System Manager's Manual LVDISPLAY(8)
NAME
lvdisplay - Display information about a logical volume
SYNOPSIS
lvdisplay
[ option_args ]
[ position_args ]
DESCRIPTION
lvdisplay shows the attributes of LVs, like size, read/write status, snapshot information, etc.
lvs(8) is a preferred alternative that shows the same information and more, using a more compact and configurable output format.
USAGE
lvdisplay
[ -a|--all ]
+ man lvextend
+ head -n 20
LVEXTEND(8) System Manager's Manual LVEXTEND(8)
NAME
lvextend - Add space to a logical volume
SYNOPSIS
lvextend option_args position_args
[ option_args ]
[ position_args ]
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit
-A|--autobackup y|n
--commandprofile String
--config String
-d|--debug
--driverloaded y|n
-l|--extents [+]Number[PERCENT]
-f|--force
+ man lvm
+ head -n 20
LVM(8) System Manager's Manual LVM(8)
NAME
lvm — LVM2 tools
SYNOPSIS
lvm [command|file]
DESCRIPTION
The Logical Volume Manager (LVM) provides tools to create virtual block devices from physical devices. Virtual devices may be easier to manage than physical devices, and can have capabilities beyond what the physical devices provide themselves. A Volume Group (VG) is a collection of one or more physical devices, each called a Physical Volume (PV). A Logical Volume (LV) is a virtual block device that
can be used by the system or applications. Each block of data in an LV is stored on one or more PV in the VG, according to algorithms implemented by Device Mapper (DM) in the kernel.
The lvm command, and other commands listed below, are the command-line tools for LVM. A separate manual page describes each command in detail.
If lvm is invoked with no arguments it presents a readline prompt (assuming it was compiled with readline support). LVM commands may be entered interactively at this prompt with readline facilities including history and command name and option completion. Refer to readline(3) for details.
If lvm is invoked with argv[0] set to the name of a specific LVM command (for example by using a hard or soft link) it acts as that command.
+ man lvmconf
+ head -n 20
LVMCONF(8) LVMCONF(8)
NAME
lvmconf — LVM configuration modifier
SYNOPSIS
lvmconf [--disable-cluster] [--enable-cluster] [--enable-halvm] [--disable-halvm] [--file <configfile>] [--lockinglib <lib>] [--lockinglibdir <dir>] [--services] [--mirrorservice] [--startstopservices]
DESCRIPTION
lvmconf is a script that modifies the locking configuration in an lvm configuration file. See lvm.conf(5). In addition to that, it can also set Systemd or SysV services according to changes in the lvm configuration if needed.
OPTIONS
--disable-cluster
Set locking_type to the default non-clustered type. Also reset lvmetad use to its default.
--enable-cluster
+ man lvmconfig
+ head -n 20
LVMCONFIG(8) System Manager's Manual LVMCONFIG(8)
NAME
lvmconfig - Display and manipulate configuration information
SYNOPSIS
lvmconfig
[ option_args ]
[ position_args ]
DESCRIPTION
lvmconfig, lvm config, lvm dumpconfig (for compatibility reasons, to be phased out) produce formatted output from the LVM configuration tree. The sources of the configuration data include lvm.conf(5) and command line settings from --config.
USAGE
lvmconfig
[ -f|--file String ]
[ -l|--list ]
[ --atversion String ]
+ man lvmdiskscan
+ head -n 20
LVMDISKSCAN(8) System Manager's Manual LVMDISKSCAN(8)
NAME
lvmdiskscan - List devices that may be used as physical volumes
SYNOPSIS
lvmdiskscan
[ option_args ]
DESCRIPTION
lvmdiskscan scans all SCSI, (E)IDE disks, multiple devices and a bunch of other block devices in the system looking for LVM PVs. The size reported is the real device size. Define a filter in lvm.conf(5) to restrict the scan to avoid a CD ROM, for example.
This command is deprecated, use pvs instead.
USAGE
lvmdiskscan
[ -l|--lvmpartition ]
+ man lvmdump
+ head -n 20
LVMDUMP(8) System Manager's Manual LVMDUMP(8)
NAME
lvmdump — create lvm2 information dumps for diagnostic purposes
SYNOPSIS
lvmdump [-a] [-c] [-d directory] [-h] [-l] [-m] [-p] [-s] [-u]
DESCRIPTION
lvmdump is a tool to dump various information concerning LVM2. By default, it creates a tarball suitable for submission along with a problem report.
The content of the tarball is as follows:
- dmsetup info
- table of currently running processes
- recent entries from /var/log/messages (containing system messages)
- complete lvm configuration and cache (content of /etc/lvm)
- list of device nodes present under /dev
- list of files present /sys/block
+ man lvmetad
+ head -n 20
LVMETAD(8) System Manager's Manual LVMETAD(8)
NAME
lvmetad — LVM metadata cache daemon
SYNOPSIS
lvmetad [-l level[,level...]] [-p pidfile_path] [-s socket_path] [-t timeout_value] [-f] [-h] [-V] [-?]
DESCRIPTION
The lvmetad daemon caches LVM metadata so that LVM commands can read metadata from the cache rather than scanning disks. This can be an advantage because scanning disks is time consuming and may interfere with the normal work of the system. lvmetad can be a disadvantage when disk event notifications from the system are unreliable.
lvmetad does not read metadata from disks itself. Instead, it relies on an LVM command, like pvscan --cache, to read metadata from disks and send it to lvmetad to be cached.
New LVM disks that appear on the system must be scanned before lvmetad knows about them. If lvmetad does not know about a disk, then LVM commands using lvmetad will also not know about it. When disks are added or removed from the system, lvmetad must be updated.
lvmetad is usually combined with event-based system services that automatically run pvscan --cache on disks added or removed. This way, the cache is automatically updated with metadata from new disks when they appear. LVM udev rules and systemd services implement this automation. Automatic scanning is usually combined with automatic activation. For more information, see pvscan(8).
+ man lvmpolld
+ head -n 20
LVMPOLLD(8) System Manager's Manual LVMPOLLD(8)
NAME
lvmpolld — LVM poll daemon
SYNOPSIS
lvmpolld [-l|--log {all|wire|debug}] [-p|--pidfile pidfile_path] [-s|--socket socket_path] [-B|--binary lvm_binary_path] [-t|--timeout timeout_value] [-f|--foreground] [-h|--help] [-V|--version]
lvmpolld [--dump]
DESCRIPTION
lvmpolld is polling daemon for LVM. The daemon receives requests for polling of already initialised operations originating in LVM2 command line tool. The requests for polling originate in the lvconvert, pvmove, lvchange or vgchange LVM2 commands.
The purpose of lvmpolld is to reduce the number of spawned background processes per otherwise unique polling operation. There should be only one. It also eliminates the possibility of unsolicited termination of background process by external factors.
lvmpolld is used by LVM only if it is enabled in lvm.conf(5) by specifying the global/use_lvmpolld setting. If this is not defined in the LVM configuration explicitly then default setting is used instead (see the output of lvmconfig --type default global/use_lvmpolld command).
OPTIONS
+ man lvmsadc
+ head -n 20
LVMSADC(8) LVMSADC(8)
NAME
lvmsadc — LVM system activity data collector
SYNOPSIS
lvmsadc
DESCRIPTION
lvmsadc is not supported under LVM2. The device-mapper statistics facility provides similar performance metrics using the dmstats(8) command.
SEE ALSO
dmstats(8) lvm(8)
Red Hat, Inc LVM TOOLS 2.02.177(2)-RHEL7 (2018-01-22) LVMSADC(8)
+ man lvmsar
+ head -n 20
LVMSAR(8) LVMSAR(8)
NAME
lvmsar — LVM system activity reporter
SYNOPSIS
lvmsar
DESCRIPTION
lvmsar is not supported under LVM2. The device-mapper statistics facility provides similar performance metrics using the dmstats(8) command.
SEE ALSO
dmstats(8) lvm(8)
Red Hat, Inc LVM TOOLS 2.02.177(2)-RHEL7 (2018-01-22) LVMSAR(8)
+ man lvreduce
+ head -n 20
LVREDUCE(8) System Manager's Manual LVREDUCE(8)
NAME
lvreduce - Reduce the size of a logical volume
SYNOPSIS
lvreduce option_args position_args
[ option_args ]
DESCRIPTION
lvreduce reduces the size of an LV. The freed logical extents are returned to the VG to be used by other LVs. A copy-on-write snapshot LV can also be reduced if less space is needed to hold COW blocks. Use lvconvert(8) to change the number of data images in a RAID or mirrored LV.
Be careful when reducing an LV's size, because data in the reduced area is lost. Ensure that any file system on the LV is resized before running lvreduce so that the removed extents are not in use by the file system.
Sizes will be rounded if necessary. For example, the LV size must be an exact number of extents, and the size of a striped segment must be a multiple of the number of stripes.
In the usage section below, --size Size can be replaced with --extents Number. See both descriptions the options section.
+ man lvremove
+ head -n 20
LVREMOVE(8) System Manager's Manual LVREMOVE(8)
NAME
lvremove - Remove logical volume(s) from the system
SYNOPSIS
lvremove position_args
[ option_args ]
DESCRIPTION
lvremove removes one or more LVs. For standard LVs, this returns the logical extents that were used by the LV to the VG for use by other LVs.
Confirmation will be requested before deactivating any active LV prior to removal. LVs cannot be deactivated or removed while they are open (e.g. if they contain a mounted filesystem). Removing an origin LV will also remove all dependent snapshots.
When a single force option is used, LVs are removed without confirmation, and the command will try to deactivate unused LVs.
To remove damaged LVs, two force options may be required (-ff).
+ man lvrename
+ head -n 20
LVRENAME(8) System Manager's Manual LVRENAME(8)
NAME
lvrename - Rename a logical volume
SYNOPSIS
lvrename position_args
[ option_args ]
DESCRIPTION
lvrename renames an existing LV or a historical LV (see lvremove for historical LV information.)
USAGE
lvrename VG LV LV_new
[ COMMON_OPTIONS ]
lvrename LV LV_new
[ COMMON_OPTIONS ]
+ man lvresize
+ head -n 20
LVRESIZE(8) System Manager's Manual LVRESIZE(8)
NAME
lvresize - Resize a logical volume
SYNOPSIS
lvresize option_args position_args
[ option_args ]
[ position_args ]
--alloc contiguous|cling|cling_by_tags|normal|anywhere|inherit
-A|--autobackup y|n
--commandprofile String
--config String
-d|--debug
--driverloaded y|n
-l|--extents [+|-]Number[PERCENT]
-f|--force
+ man lvs
+ head -n 20
LVS(8) System Manager's Manual LVS(8)
NAME
lvs - Display information about logical volumes
SYNOPSIS
lvs
[ option_args ]
[ position_args ]
DESCRIPTION
lvs produces formatted output about LVs.
USAGE
lvs
[ -H|--history ]
[ -a|--all ]
[ -o|--options String ]
+ man lvscan
+ head -n 20
LVSCAN(8) System Manager's Manual LVSCAN(8)
NAME
lvscan - List all logical volumes in all volume groups
SYNOPSIS
lvscan option_args
[ option_args ]
[ position_args ]
DESCRIPTION
lvscan scans all VGs or all supported LVM block devices in the system for LVs. The output consists of one line for each LV indicating whether or not it is active, a snapshot or origin, the size of the device and its allocation policy. Use lvs(8) or lvdisplay(8) to obtain more comprehensive information about LVs.
USAGE
lvscan
[ -a|--all ]
[ COMMON_OPTIONS ]
+ man lz4
+ head -n 20
LZ4(1) User Commands LZ4(1)
NAME
lz4 - lz4, unlz4, lz4cat - Compress or decompress .lz4 files
SYNOPSIS
lz4 [OPTIONS] [-|INPUT-FILE] OUTPUT-FILE
unlz4 is equivalent to lz4 -d
lz4cat is equivalent to lz4 -dcfm
When writing scripts that need to decompress files, it is recommended to always use the name lz4 with appropriate arguments (lz4 -d or lz4 -dc) instead of the names unlz4 and lz4cat.
DESCRIPTION
lz4 is an extremely fast lossless compression algorithm, based on byte-aligned LZ77 family of compression scheme. lz4 offers compression speeds of 400 MB/s per core, linearly scalable with multi-core CPUs. It features an extremely fast decoder, with speed in multiple GB/s per core, typically reaching RAM speed limit on multi-core systems. The native file format is the .lz4 format.
Difference between lz4 and gzip
+ man lz4c
+ head -n 20
LZ4(1) User Commands LZ4(1)
NAME
lz4 - lz4, unlz4, lz4cat - Compress or decompress .lz4 files
SYNOPSIS
lz4 [OPTIONS] [-|INPUT-FILE] OUTPUT-FILE
unlz4 is equivalent to lz4 -d
lz4cat is equivalent to lz4 -dcfm
When writing scripts that need to decompress files, it is recommended to always use the name lz4 with appropriate arguments (lz4 -d or lz4 -dc) instead of the names unlz4 and lz4cat.
DESCRIPTION
lz4 is an extremely fast lossless compression algorithm, based on byte-aligned LZ77 family of compression scheme. lz4 offers compression speeds of 400 MB/s per core, linearly scalable with multi-core CPUs. It features an extremely fast decoder, with speed in multiple GB/s per core, typically reaching RAM speed limit on multi-core systems. The native file format is the .lz4 format.
Difference between lz4 and gzip
+ man lz4cat
+ head -n 20
LZ4(1) User Commands LZ4(1)
NAME
lz4 - lz4, unlz4, lz4cat - Compress or decompress .lz4 files
SYNOPSIS
lz4 [OPTIONS] [-|INPUT-FILE] OUTPUT-FILE
unlz4 is equivalent to lz4 -d
lz4cat is equivalent to lz4 -dcfm
When writing scripts that need to decompress files, it is recommended to always use the name lz4 with appropriate arguments (lz4 -d or lz4 -dc) instead of the names unlz4 and lz4cat.
DESCRIPTION
lz4 is an extremely fast lossless compression algorithm, based on byte-aligned LZ77 family of compression scheme. lz4 offers compression speeds of 400 MB/s per core, linearly scalable with multi-core CPUs. It features an extremely fast decoder, with speed in multiple GB/s per core, typically reaching RAM speed limit on multi-core systems. The native file format is the .lz4 format.
Difference between lz4 and gzip
+ man machinectl
+ head -n 20
MACHINECTL(1) machinectl MACHINECTL(1)
NAME
machinectl - Control the systemd machine manager
SYNOPSIS
machinectl [OPTIONS...] {COMMAND} [NAME...]
DESCRIPTION
machinectl may be used to introspect and control the state of the systemd(1) virtual machine and container registration manager systemd-machined.service(8).
OPTIONS
The following options are understood:
-p, --property=
When showing machine or image properties, limit the output to certain properties as specified by the argument. If not specified, all set properties are shown. The argument should be a property name, such as "Name". If specified more than once, all properties with the specified names are shown.
-a, --all
+ man mailq
+ head -n 20
SENDMAIL(1) General Commands Manual SENDMAIL(1)
NAME
sendmail - Postfix to Sendmail compatibility interface
SYNOPSIS
sendmail [option ...] [recipient ...]
mailq
sendmail -bp
newaliases
sendmail -I
DESCRIPTION
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored.
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory.
+ man mailq.postfix
+ head -n 20
SENDMAIL(1) General Commands Manual SENDMAIL(1)
NAME
sendmail - Postfix to Sendmail compatibility interface
SYNOPSIS
sendmail [option ...] [recipient ...]
mailq
sendmail -bp
newaliases
sendmail -I
DESCRIPTION
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored.
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory.
+ man make
+ head -n 20
MAKE(1) LOCAL USER COMMANDS MAKE(1)
NAME
make - GNU make utility to maintain groups of programs
SYNOPSIS
make [ -f makefile ] [ options ] ... [ targets ] ...
WARNING
This man page is an extract of the documentation of GNU make. It is updated only occasionally, because the GNU project does not use nroff. For complete, current documentation, refer to the Info file make.info which is made from the Texinfo source file make.texi.
DESCRIPTION
The purpose of the make utility is to determine automatically which pieces of a large program need to be recompiled, and issue the commands to recompile them. The manual describes the GNU implementation of make, which was written by Richard Stallman and Roland McGrath, and is currently maintained by Paul Smith. Our examples show C programs, since they are most common, but you can use make with any
programming language whose compiler can be run with a shell command. In fact, make is not limited to programs. You can use it to describe any task where some files must be updated automatically from others whenever the others change.
To prepare to use make, you must write a file called the makefile that describes the relationships among files in your program, and the states the commands for updating each file. In a program, typically the executable file is updated from object files, which are in turn made by compiling source files.
Once a suitable makefile exists, each time you change some source files, this simple shell command:
+ man man
+ head -n 20
MAN(1) Manual pager utils MAN(1)
NAME
man - an interface to the on-line reference manuals
SYNOPSIS
man [-C file] [-d] [-D] [--warnings[=warnings]] [-R encoding] [-L locale] [-m system[,...]] [-M path] [-S list] [-e extension] [-i|-I] [--regex|--wildcard] [--names-only] [-a] [-u] [--no-subpages] [-P pager] [-r prompt] [-7] [-E encoding] [--no-hyphenation] [--no-justification] [-p string] [-t] [-T[device]] [-H[browser]] [-X[dpi]] [-Z] [[section] page ...] ...
man -k [apropos options] regexp ...
man -K [-w|-W] [-S list] [-i|-I] [--regex] [section] term ...
man -f [whatis options] page ...
man -l [-C file] [-d] [-D] [--warnings[=warnings]] [-R encoding] [-L locale] [-P pager] [-r prompt] [-7] [-E encoding] [-p string] [-t] [-T[device]] [-H[browser]] [-X[dpi]] [-Z] file ...
man -w|-W [-C file] [-d] [-D] page ...
man -c [-C file] [-d] [-D] page ...
man [-?V]
DESCRIPTION
man is the system's manual pager. Each page argument given to man is normally the name of a program, utility or function. The manual page associated with each of these arguments is then found and displayed. A section, if provided, will direct man to look only in that section of the manual. The default action is to search in all of the available sections, following a pre-defined order and to show only
the first page found, even if page exists in several sections.
+ man mandb
+ head -n 20
MANDB(8) Manual pager utils MANDB(8)
NAME
mandb - create or update the manual page index caches
SYNOPSIS
mandb [-dqsucpt?V] [-C file] [manpath]
mandb [-dqsut] [-C file] -f filename ...
DESCRIPTION
mandb is used to initialise or manually update index database caches that are usually maintained by man. The caches contain information relevant to the current state of the manual page system and the information stored within them is used by the man-db utilities to enhance their speed and functionality.
When creating or updating an index, mandb will warn of bad ROFF .so requests, bogus manual page filenames and manual pages from which the whatis cannot be parsed.
Supplying mandb with an optional colon-delimited path will override the internal system manual page hierarchy search path, determined from information found within the man-db configuration file.
DATABASE CACHES
mandb can be compiled with support for any one of the following database types.
+ man manpath
+ head -n 20
MANPATH(1) Manual pager utils MANPATH(1)
NAME
manpath - determine search path for manual pages
SYNOPSIS
manpath [-qgdc?V] [-m system[,...]] [-C file]
DESCRIPTION
If $MANPATH is set, manpath will simply display its contents and issue a warning. If not, manpath will determine a suitable manual page hierarchy search path and display the results.
The colon-delimited path is determined using information gained from the man-db configuration file - (/etc/man_db.conf) and the user's environment.
OPTIONS
-q, --quiet
Do not issue warnings.
-d, --debug
+ man mapscrn
+ head -n 20
MAPSCRN(8) International Support MAPSCRN(8)
NAME
mapscrn - load screen output mapping table
SYNOPSIS
mapscrn [-V] [-v] [-o map.orig] mapfile
DESCRIPTION
The mapscrn command is obsolete - its function is now built-in into setfont. However, for backwards compatibility it is still available as a separate command.
The mapscrn command loads a user defined output character mapping table into the console driver. The console driver may be later put into use user-defined mapping table mode by outputting a special escape sequence to the console device. This sequence is <esc>(K for the G0 character set and <esc>)K for the G1 character set. When the -o option is given, the old map is saved in map.orig.
USE
There are two kinds of mapping tables: direct-to-font tables, that give a font position for each user byte value, and user-to-unicode tables that give a unicode value for each user byte. The corresponding glyph is now found using the unicode index of the font. The command
mapscrn trivial
sets up a one-to-one direct-to-font table where user bytes directly address the font. This is useful for fonts that are in the same order as the character set one uses. A command like
mapscrn 8859-2
+ man matchpathcon
+ head -n 20
matchpathcon(8) SELinux Command Line documentation matchpathcon(8)
NAME
matchpathcon - get the default SELinux security context for the specified path from the file contexts configuration
SYNOPSIS
matchpathcon [-V] [-N] [-n] [-m type] [-f file_contexts_file] [-p prefix] [-P policy_root_path] filepath...
DESCRIPTION
matchpathcon queries the system policy and outputs the default security context associated with the filepath.
Note: Identical paths can have different security contexts, depending on the file type (regular file, directory, link file, char file ...).
matchpathcon will also take the file type into consideration in determining the default security context if the file exists. If the file does not exist, no file type matching will occur.
OPTIONS
-m type
Force file type for the lookup. Valid types are file, dir, pipe, chr_file, blk_file, lnk_file, sock_file.
+ man mcookie
+ head -n 20
MCOOKIE(1) User Commands MCOOKIE(1)
NAME
mcookie - generate magic cookies for xauth
SYNOPSIS
mcookie [options]
DESCRIPTION
mcookie generates a 128-bit random hexadecimal number for use with the X authority system. Typical usage:
xauth add :0 . `mcookie`
The "random" number generated is actually the MD5 message digest of random information coming from one of the sources /dev/urandom, /dev/random, or the libc pseudo-random functions, in this preference order.
OPTIONS
-f, --file file
Use this file as an additional source of randomness. When file is '-', characters are read from standard input.
+ man mdadm
+ head -n 20
MDADM(8) System Manager's Manual MDADM(8)
NAME
mdadm - manage MD devices aka Linux Software RAID
SYNOPSIS
mdadm [mode] <raiddevice> [options] <component-devices>
DESCRIPTION
RAID devices are virtual devices created from two or more real block devices. This allows multiple devices (typically disk drives or partitions thereof) to be combined into a single device to hold (for example) a single filesystem. Some RAID levels include redundancy and so can survive some degree of device failure.
Linux Software RAID devices are implemented through the md (Multiple Devices) device driver.
Currently, Linux supports LINEAR md devices, RAID0 (striping), RAID1 (mirroring), RAID4, RAID5, RAID6, RAID10, MULTIPATH, FAULTY, and CONTAINER.
MULTIPATH is not a Software RAID mechanism, but does involve multiple devices: each device is a path to one common physical storage device. New installations should not use md/multipath as it is not well supported and has no ongoing development. Use the Device Mapper based multipath-tools instead.
+ man mdig
+ head -n 20
MDIG(1) BIND9 MDIG(1)
NAME
mdig - DNS pipelined lookup utility
SYNOPSIS
mdig {@server} [-f filename] [-h] [-v] [[-4] | [-6]] [-m] [-b address] [-p port#] [-c class] [-t type] [-i] [-x addr] [plusopt...]
mdig {-h}
mdig [@server] {global-opt...} {{local-opt...} {query}...}
DESCRIPTION
mdig is a multiple/pipelined query version of dig: instead of waiting for a response after sending each query, it begins by sending all queries. Responses are displayed in the order in which they are received, not in the order the corresponding queries were sent.
mdig options are a subset of the dig options, and are divided into "anywhere options" which can occur anywhere, "global options" which must occur before the query name (or they are ignored with a warning), and "local options" which apply to the next query on the command line.
The {@server} option is a mandatory global option. It is the name or IP address of the name server to query. (Unlike dig, this value is not retrieved from /etc/resolv.conf.) It can be an IPv4 address in dotted-decimal notation, an IPv6 address in colon-delimited notation, or a hostname. When the supplied server argument is a hostname, mdig resolves that name before querying the name server.
+ man mdmon
+ head -n 20
MDMON(8) System Manager's Manual MDMON(8)
NAME
mdmon - monitor MD external metadata arrays
SYNOPSIS
mdmon [--all] [--takeover] [--foreground] CONTAINER
OVERVIEW
The 2.6.27 kernel brings the ability to support external metadata arrays. External metadata implies that user space handles all updates to the metadata. The kernel's responsibility is to notify user space when a "metadata event" occurs, like disk failures and clean-to-dirty transitions. The kernel, in important cases, waits for user space to take action on these notifications.
DESCRIPTION
Metadata updates:
To service metadata update requests a daemon, mdmon, is introduced. Mdmon is tasked with polling the sysfs namespace looking for changes in array_state, sync_action, and per disk state attributes. When a change is detected it calls a per metadata type handler to make modifications to the metadata. The following actions are taken:
+ man mesg
+ head -n 20
MESG(1) Linux User's Manual MESG(1)
NAME
mesg - control write access to your terminal
SYNOPSIS
mesg [y|n]
DESCRIPTION
Mesg controls the access to your terminal by others. It's typically used to allow or disallow other users to write to your terminal (see write(1)).
OPTIONS
y Allow write access to your terminal.
n Disallow write access to your terminal.
If no option is given, mesg prints out the current access state of your terminal.
+ man mii-diag
+ head -n 20
MII-DIAG(8) System Manager's Manual MII-DIAG(8)
NAME
mii-diag - Network adapter control and monitoring
SYNOPSIS
mii-diag [options]<interface>
DESCRIPTION
This manual page documents briefly the mii-diag network adapter control and monitoring command. Addition documentation is available from http://scyld.com/diag/index.html.
This mii-diag command configures, controls and monitors the transceiver management registers for network interfaces, and configures driver operational parameters. For transceiver control mii-diag uses the Media Independent Interface (MII) standard (thus the command name). It also has additional Linux-specific controls to communicate parameters such as message enable settings and buffer sizes to the
underlying device driver.
The MII standard defines registers that control and report network transceiver capabilities, link settings and errors. Examples are link speed, duplex, capabilities advertised to the link partner, status LED indications and link error counters.
+ man mii-tool
+ head -n 20
MII-TOOL(8) Linux System Administrator's Manual MII-TOOL(8)
NAME
mii-tool - view, manipulate media-independent interface status
SYNOPSIS
mii-tool [-v, --verbose] [-V, --version] [-R, --reset] [-r, --restart] [-w, --watch] [-l, --log] [-A, --advertise=media,...] [-F, --force=media] [-p, --phy=addr] interface ...
NOTE
This program is obsolete. For replacement check ethtool.
DESCRIPTION
This utility checks or sets the status of a network interface's Media Independent Interface (MII) unit. Most fast ethernet adapters use an MII to autonegotiate link speed and duplex setting.
Most intelligent network devices use an autonegotiation protocol to communicate what media technologies they support, and then select the fastest mutually supported media technology. The -A or --advertise options can be used to tell the MII to only advertise a subset of its capabilities. Some passive devices, such as single-speed hubs, are unable to autonegotiate. To handle such devices, the MII
+ man mkdict
+ head -n 20
No manual entry for mkdict
+ man mkdosfs
+ head -n 20
MKFS.FAT(8) dosfstools MKFS.FAT(8)
NAME
mkfs.fat - create an MS-DOS filesystem under Linux
SYNOPSIS
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ]
DESCRIPTION
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size.
OPTIONS
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash
media or large-sector hard disks.
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle.
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot
message (option -m) is ignored.
+ man mke2fs
+ head -n 20
MKE2FS(8) System Manager's Manual MKE2FS(8)
NAME
mke2fs - create an ext2/ext3/ext4 filesystem
SYNOPSIS
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last-
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ]
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ]
DESCRIPTION
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified.
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details.
OPTIONS
-b block-size
+ man mkfs
+ head -n 20
MKFS(8) System Administration MKFS(8)
NAME
mkfs - build a Linux filesystem
SYNOPSIS
mkfs [options] [-t type] [fs-options] device [size]
DESCRIPTION
This mkfs frontend is deprecated in favour of filesystem specific mkfs.<type> utils.
mkfs is used to build a Linux filesystem on a device, usually a hard disk partition. The device argument is either the device name (e.g. /dev/hda1, /dev/sdb2), or a regular file that shall contain the filesystem. The size argument is the number of blocks to be used for the filesystem.
The exit code returned by mkfs is 0 on success and 1 on failure.
In actuality, mkfs is simply a front-end for the various filesystem builders (mkfs.fstype) available under Linux. The filesystem-specific builder is searched for via your PATH environment setting only. Please see the filesystem-specific builder manual pages for further details.
OPTIONS
+ man mkfs.cramfs
+ head -n 20
MKFS.CRAMFS(8) System Administration MKFS.CRAMFS(8)
NAME
mkfs.cramfs - make compressed ROM file system
SYNOPSIS
mkfs.cramfs [options] directory file
DESCRIPTION
Files on cramfs file systems are zlib-compressed one page at a time to allow random read access. The metadata is not compressed, but is expressed in a terse representation that is more space-efficient than conventional file systems.
The file system is intentionally read-only to simplify its design; random write access for compressed files is difficult to implement. cramfs ships with a utility (mkcramfs) to pack files into new cramfs images.
File sizes are limited to less than 16 MB.
Maximum file system size is a little under 272 MB. (The last file on the file system must begin before the 256 MB block, but can extend past it.)
ARGUMENTS
+ man mkfs.ext2
+ head -n 20
MKE2FS(8) System Manager's Manual MKE2FS(8)
NAME
mke2fs - create an ext2/ext3/ext4 filesystem
SYNOPSIS
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last-
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ]
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ]
DESCRIPTION
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified.
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details.
OPTIONS
-b block-size
+ man mkfs.ext3
+ head -n 20
MKE2FS(8) System Manager's Manual MKE2FS(8)
NAME
mke2fs - create an ext2/ext3/ext4 filesystem
SYNOPSIS
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last-
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ]
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ]
DESCRIPTION
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified.
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details.
OPTIONS
-b block-size
+ man mkfs.ext4
+ head -n 20
MKE2FS(8) System Manager's Manual MKE2FS(8)
NAME
mke2fs - create an ext2/ext3/ext4 filesystem
SYNOPSIS
mke2fs [ -c | -l filename ] [ -b block-size ] [ -D ] [ -f fragment-size ] [ -g blocks-per-group ] [ -G number-of-groups ] [ -i bytes-per-inode ] [ -I inode-size ] [ -j ] [ -J journal-options ] [ -N number-of-inodes ] [ -n ] [ -m reserved-blocks-percentage ] [ -o creator-os ] [ -O feature[,...] ] [ -q ] [ -r fs-revision-level ] [ -E extended-options ] [ -v ] [ -F ] [ -L volume-label ] [ -M last-
mounted-directory ] [ -S ] [ -t fs-type ] [ -T usage-type ] [ -U UUID ] [ -V ] device [ blocks-count ]
mke2fs -O journal_dev [ -b block-size ] [ -L volume-label ] [ -n ] [ -q ] [ -v ] external-journal [ blocks-count ]
DESCRIPTION
mke2fs is used to create an ext2, ext3, or ext4 filesystem, usually in a disk partition. device is the special file corresponding to the device (e.g /dev/hdXX). blocks-count is the number of blocks on the device. If omitted, mke2fs automagically figures the file system size. If called as mkfs.ext3 a journal is created as if the -j option was specified.
The defaults of the parameters for the newly created filesystem, if not overridden by the options listed below, are controlled by the /etc/mke2fs.conf configuration file. See the mke2fs.conf(5) manual page for more details.
OPTIONS
-b block-size
+ man mkfs.fat
+ head -n 20
MKFS.FAT(8) dosfstools MKFS.FAT(8)
NAME
mkfs.fat - create an MS-DOS filesystem under Linux
SYNOPSIS
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ]
DESCRIPTION
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size.
OPTIONS
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash
media or large-sector hard disks.
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle.
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot
message (option -m) is ignored.
+ man mkfs.minix
+ head -n 20
MKFS.MINIX(8) System Administration MKFS.MINIX(8)
NAME
mkfs.minix - make a Minix filesystem
SYNOPSIS
mkfs.minix [options] device [size-in-blocks]
DESCRIPTION
mkfs.minix creates a Linux MINIX filesystem on a device (usually a disk partition).
The device is usually of the following form:
/dev/hda[1–8] (IDE disk 1)
/dev/hdb[1–8] (IDE disk 2)
/dev/sda[1–8] (SCSI disk 1)
/dev/sdb[1–8] (SCSI disk 2)
+ man mkfs.msdos
+ head -n 20
MKFS.FAT(8) dosfstools MKFS.FAT(8)
NAME
mkfs.fat - create an MS-DOS filesystem under Linux
SYNOPSIS
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ]
DESCRIPTION
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size.
OPTIONS
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash
media or large-sector hard disks.
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle.
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot
message (option -m) is ignored.
+ man mkfs.vfat
+ head -n 20
MKFS.FAT(8) dosfstools MKFS.FAT(8)
NAME
mkfs.fat - create an MS-DOS filesystem under Linux
SYNOPSIS
mkfs.fat [ -a ] [ -A ] [ -b sector-of-backup ] [ -c ] [ -l filename ] [ -C ] [ -f number-of-FATs ] [ -F FAT-size ] [ -h number-of-hidden-sectors ] [ -i volume-id ] [ -I ] [ -m message-file ] [ -n volume-name ] [ -r root-dir-entries ] [ -R number-of-reserved-sectors ] [ -s sectors-per-cluster ] [ -S logical-sector-size ] [ -v ] device [ block-count ]
DESCRIPTION
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g /dev/hdXX). block-count is the number of blocks on the device. If omitted, mkfs.fat automatically determines the filesystem size.
OPTIONS
-a Normally, for any filesystem except very small ones, mkfs.fat will align all the data structures to cluster size, to make sure that as long as the partition is properly aligned, so will all the data structures in the filesystem. This option disables alignment; this may provide a handful of additional clusters of storage at the expense of a significant performance degradation on RAIDs, flash
media or large-sector hard disks.
-A Use Atari variation of the MS-DOS filesystem. This is default if mkfs.fat is run on an Atari, then this option turns off Atari format. There are some differences when using Atari format: If not directed otherwise by the user, mkfs.fat will always use 2 sectors per cluster, since GEMDOS doesn't like other values very much. It will also obey the maximum number of sectors GEMDOS can handle.
Larger filesystems are managed by raising the logical sector size. Under Atari format, an Atari-compatible serial number for the filesystem is generated, and a 12 bit FAT is used only for filesystems that have one of the usual floppy sizes (720k, 1.2M, 1.44M, 2.88M), a 16 bit FAT otherwise. This can be overridden with the -F option. Some PC-specific boot sector fields aren't written, and a boot
message (option -m) is ignored.
+ man mkfs.xfs
+ head -n 20
mkfs.xfs(8) System Manager's Manual mkfs.xfs(8)
NAME
mkfs.xfs - construct an XFS filesystem
SYNOPSIS
mkfs.xfs [ -b block_size ] [ -m global_metadata_options ] [ -d data_section_options ] [ -f ] [ -i inode_options ] [ -l log_section_options ] [ -n naming_options ] [ -p protofile ] [ -q ] [ -r realtime_section_options ] [ -s sector_size ] [ -L label ] [ -N ] [ -K ] device
mkfs.xfs -V
DESCRIPTION
mkfs.xfs constructs an XFS filesystem by writing on a special file using the values found in the arguments of the command line. It is invoked automatically by mkfs(8) when it is given the -t xfs option.
In its simplest (and most commonly used form), the size of the filesystem is determined from the disk driver. As an example, to make a filesystem with an internal log on the first partition on the first SCSI disk, use:
mkfs.xfs /dev/sda1
The metadata log can be placed on another device to reduce the number of disk seeks. To create a filesystem on the first partition on the first SCSI disk with a 10000 block log located on the first partition on the second SCSI disk, use:
+ man mkhomedir_helper
+ head -n 20
MKHOMEDIR_HELPER(8) Linux-PAM Manual MKHOMEDIR_HELPER(8)
NAME
mkhomedir_helper - Helper binary that creates home directories
SYNOPSIS
mkhomedir_helper {user} [umask [ path-to-skel ]]
DESCRIPTION
mkhomedir_helper is a helper program for the pam_mkhomedir module that creates home directories and populates them with contents of the specified skel directory.
The default value of umask is 0022 and the default value of path-to-skel is /etc/skel.
The helper is separated from the module to not require direct access from login SELinux domains to the contents of user home directories. The SELinux domain transition happens when the module is executing the mkhomedir_helper.
The helper never touches home directories if they already exist.
SEE ALSO
+ man mkinitrd
+ head -n 20
MKINITRD(8) dracut MKINITRD(8)
NAME
mkinitrd - is a compat wrapper, which calls dracut to generate an initramfs
SYNOPSIS
mkinitrd [OPTION...] [<initrd-image>] <kernel-version>
DESCRIPTION
mkinitrd creates an initramfs image <initrd-image> for the kernel with version <kernel-version> by calling "dracut".
Important
If a more fine grained control over the resulting image is needed, "dracut" should be called directly.
OPTIONS
--version
print info about the version
+ man mklost+found
+ head -n 20
MKLOST+FOUND(8) System Manager's Manual MKLOST+FOUND(8)
NAME
mklost+found - create a lost+found directory on a mounted Linux second extended file system
SYNOPSIS
mklost+found
DESCRIPTION
mklost+found is used to create a lost+found directory in the current working directory on a Linux second extended file system. There is normally a lost+found directory in the root directory of each filesystem.
mklost+found pre-allocates disk blocks to the lost+found directory so that when e2fsck(8) is being run to recover a filesystem, it does not need to allocate blocks in the filesystem to store a large number of unlinked files. This ensures that e2fsck will not have to allocate data blocks in the filesystem during recovery.
OPTIONS
There are none.
AUTHOR
mklost+found has been written by Remy Card <[email protected]>. It is currently being maintained by Theodore Ts'o <[email protected]>.
+ man mkswap
+ head -n 20
MKSWAP(8) System Administration MKSWAP(8)
NAME
mkswap - set up a Linux swap area
SYNOPSIS
mkswap [options] device [size]
DESCRIPTION
mkswap sets up a Linux swap area on a device or in a file.
The device argument will usually be a disk partition (something like /dev/sdb7) but can also be a file. The Linux kernel does not look at partition IDs, but many installation scripts will assume that partitions of hex type 82 (LINUX_SWAP) are meant to be swap partitions. (Warning: Solaris also uses this type. Be careful not to kill your Solaris partitions.)
The size parameter is superfluous but retained for backwards compatibility. (It specifies the desired size of the swap area in 1024-byte blocks. mkswap will use the entire partition or file if it is omitted. Specifying it is unwise – a typo may destroy your disk.)
After creating the swap area, you need the swapon command to start using it. Usually swap areas are listed in /etc/fstab so that they can be taken into use at boot time by a swapon -a command in some boot script.
+ man modinfo
+ head -n 20
MODINFO(8) modinfo MODINFO(8)
NAME
modinfo - Show information about a Linux Kernel module
SYNOPSIS
modinfo [-0] [-F field] [-k kernel] [modulename|filename...]
modinfo -V
modinfo -h
DESCRIPTION
modinfo extracts information from the Linux Kernel modules given on the command line. If the module name is not a filename, then the /lib/modules/version directory is searched, as is also done by modprobe(8) when loading kernel modules.
modinfo by default lists each attribute of the module in form fieldname : value, for easy reading. The filename is listed the same way (although it's not really an attribute).
This version of modinfo can understand modules of any Linux Kernel architecture.
+ man modprobe
+ head -n 20
MODPROBE(8) modprobe MODPROBE(8)
NAME
modprobe - Add and remove modules from the Linux Kernel
SYNOPSIS
modprobe [-v] [-V] [-C config-file] [-n] [-i] [-q] [-b] [modulename] [module parameters...]
modprobe [-r] [-v] [-n] [-i] [modulename...]
modprobe [-c]
modprobe [--dump-modversions] [filename]
DESCRIPTION
modprobe intelligently adds or removes a module from the Linux kernel: note that for convenience, there is no difference between _ and - in module names (automatic underscore conversion is performed). modprobe looks in the module directory /lib/modules/`uname -r` for all the modules and other files, except for the optional configuration files in the /etc/modprobe.d directory (see modprobe.d(5)).
modprobe will also use module options specified on the kernel command line in the form of <module>.<option> and blacklists in the form of modprobe.blacklist=<module>.
+ man more
+ head -n 20
MORE(1) User Commands MORE(1)
NAME
more - file perusal filter for crt viewing
SYNOPSIS
more [options] file...
DESCRIPTION
more is a filter for paging through text one screenful at a time. This version is especially primitive. Users should realize that less(1) provides more(1) emulation plus extensive enhancements.
OPTIONS
Options are also taken from the environment variable MORE (make sure to precede them with a dash (-)) but command-line options will override those.
-d Prompt with "[Press space to continue, 'q' to quit.]", and display "[Press 'h' for instructions.]" instead of ringing the bell when an illegal key is pressed.
-l Do not pause after any line containing a ^L (form feed).
+ man mount
+ head -n 20
MOUNT(8) System Administration MOUNT(8)
NAME
mount - mount a filesystem
SYNOPSIS
mount [-l|-h|-V]
mount -a [-fFnrsvw] [-t fstype] [-O optlist]
mount [-fnrsvw] [-o options] device|dir
mount [-fnrsvw] [-t fstype] [-o options] device dir
DESCRIPTION
All files accessible in a Unix system are arranged in one big tree, the file hierarchy, rooted at /. These files can be spread out over several devices. The mount command serves to attach the filesystem found on some device to the big file tree. Conversely, the umount(8) command will detach it again.
The standard form of the mount command is:
+ man mount.nfs
+ head -n 20
MOUNT.NFS(8) System Manager's Manual MOUNT.NFS(8)
NAME
mount.nfs, mount.nfs4 - mount a Network File System
SYNOPSIS
mount.nfs remotetarget dir [-rvVwfnsh ] [-o options]
DESCRIPTION
mount.nfs is a part of nfs(5) utilities package, which provides NFS client functionality.
mount.nfs is meant to be used by the mount(8) command for mounting NFS shares. This subcommand, however, can also be used as a standalone command with limited functionality.
remotetarget is a server share usually in the form of servername:/path/to/share. dir is the directory on which the file system is to be mounted.
Under Linux 2.6.32 and later kernel versions, mount.nfs can mount all NFS file system versions. Under earlier Linux kernel versions, mount.nfs4 must be used for mounting NFSv4 file systems while mount.nfs must be used for NFSv3 and v2.
+ man mount.nfs4
+ head -n 20
MOUNT.NFS(8) System Manager's Manual MOUNT.NFS(8)
NAME
mount.nfs, mount.nfs4 - mount a Network File System
SYNOPSIS
mount.nfs remotetarget dir [-rvVwfnsh ] [-o options]
DESCRIPTION
mount.nfs is a part of nfs(5) utilities package, which provides NFS client functionality.
mount.nfs is meant to be used by the mount(8) command for mounting NFS shares. This subcommand, however, can also be used as a standalone command with limited functionality.
remotetarget is a server share usually in the form of servername:/path/to/share. dir is the directory on which the file system is to be mounted.
Under Linux 2.6.32 and later kernel versions, mount.nfs can mount all NFS file system versions. Under earlier Linux kernel versions, mount.nfs4 must be used for mounting NFSv4 file systems while mount.nfs must be used for NFSv3 and v2.
+ man mountpoint
+ head -n 20
MOUNTPOINT(1) User Commands MOUNTPOINT(1)
NAME
mountpoint - see if a directory or file is a mountpoint
SYNOPSIS
mountpoint [-d|-q] directory | file
mountpoint -x device
DESCRIPTION
mountpoint checks whether the given directory or file is mentioned in the /proc/self/mountinfo file.
OPTIONS
-d, --fs-devno
Show the major/minor numbers of the device that is mounted on the given directory.
+ man mountstats
+ head -n 20
mountstats(8) System Manager's Manual mountstats(8)
NAME
mountstats - Displays various NFS client per-mount statistics
SYNOPSIS
mountstats [-h|--help] [-v|--version] [-f|--file infile] [-S|--since sincefile] [ [-n|--nfs] | [-r|--rpc] | [-R|--raw] ] [mountpoint]...
mountstats iostat [-h|--help] [-v|--version] [-f|--file infile] [-S|--since sincefile] [interval] [count] [mountpoint]...
mounstats nfsstat [-h|--help] [-v|--version] [-f|--file infile] [-S|--since sincefile] [-3] [-4] [mountpoint]...
DESCRIPTION
The mountstats command displays various NFS client statisitics for each given mountpoint.
If no mountpoint is given, statistics will be displayed for all NFS mountpoints on the client.
Sub-commands
+ man mpstat
+ head -n 20
MPSTAT(1) Linux User's Manual MPSTAT(1)
NAME
mpstat - Report processors related statistics.
SYNOPSIS
mpstat [ -A ] [ -u ] [ -V ] [ -I { SUM | CPU | SCPU | ALL } ] [ -P { cpu [,...] | ON | ALL } ] [ interval [ count ] ]
DESCRIPTION
The mpstat command writes to standard output activities for each available processor, processor 0 being the first one. Global average activities among all processors are also reported. The mpstat command can be used both on SMP and UP machines, but in the latter, only global average activities will be printed. If no activity has been selected, then the default report is the CPU utilization report.
The interval parameter specifies the amount of time in seconds between each report. A value of 0 (or no parameters at all) indicates that processors statistics are to be reported for the time since system startup (boot). The count parameter can be specified in conjunction with the interval parameter if this one is not set to zero. The value of count determines the number of reports generated at
interval seconds apart. If the interval parameter is specified without the count parameter, the mpstat command generates reports continuously.
OPTIONS
-A This option is equivalent to specifying -u -I ALL -P ALL
+ man msgattrib
+ head -n 20
MSGATTRIB(1) GNU MSGATTRIB(1)
NAME
msgattrib - attribute matching and manipulation on message catalog
SYNOPSIS
msgattrib [OPTION] [INPUTFILE]
DESCRIPTION
Filters the messages of a translation catalog according to their attributes, and manipulates the attributes.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
INPUTFILE
input PO file
-D, --directory=DIRECTORY
+ man msgcat
+ head -n 20
MSGCAT(1) GNU MSGCAT(1)
NAME
msgcat - combines several message catalogs
SYNOPSIS
msgcat [OPTION] [INPUTFILE]...
DESCRIPTION
Concatenates and merges the specified PO files. Find messages which are common to two or more of the specified PO files. By using the --more-than option, greater commonality may be requested before messages are printed. Conversely, the --less-than option may be used to specify less commonality before messages are printed (i.e. --less-than=2 will only print the unique messages). Translations, com‐
ments, extracted comments, and file positions will be cumulated, except that if --use-first is specified, they will be taken from the first PO file to define them.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
INPUTFILE ...
input files
+ man msgcmp
+ head -n 20
MSGCMP(1) GNU MSGCMP(1)
NAME
msgcmp - compare message catalog and template
SYNOPSIS
msgcmp [OPTION] def.po ref.pot
DESCRIPTION
Compare two Uniforum style .po files to check that both contain the same set of msgid strings. The def.po file is an existing PO file with the translations. The ref.pot file is the last created PO file, or a PO Template file (generally created by xgettext). This is useful for checking that you have translated each and every message in your program. Where an exact match cannot be found, fuzzy match‐
ing is used to produce better diagnostics.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
def.po translations
ref.pot
+ man msgcomm
+ head -n 20
MSGCOMM(1) GNU MSGCOMM(1)
NAME
msgcomm - match two message catalogs
SYNOPSIS
msgcomm [OPTION] [INPUTFILE]...
DESCRIPTION
Find messages which are common to two or more of the specified PO files. By using the --more-than option, greater commonality may be requested before messages are printed. Conversely, the --less-than option may be used to specify less commonality before messages are printed (i.e. --less-than=2 will only print the unique messages). Translations, comments and extracted comments will be preserved, but
only from the first PO file to define them. File positions from all PO files will be cumulated.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
INPUTFILE ...
input files
+ man msgconv
+ head -n 20
MSGCONV(1) GNU MSGCONV(1)
NAME
msgconv - character set conversion for message catalog
SYNOPSIS
msgconv [OPTION] [INPUTFILE]
DESCRIPTION
Converts a translation catalog to a different character encoding.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
INPUTFILE
input PO file
-D, --directory=DIRECTORY
+ man msgen
+ head -n 20
MSGEN(1) GNU MSGEN(1)
NAME
msgen - create English message catalog
SYNOPSIS
msgen [OPTION] INPUTFILE
DESCRIPTION
Creates an English translation catalog. The input file is the last created English PO file, or a PO Template file (generally created by xgettext). Untranslated entries are assigned a translation that is identical to the msgid.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
INPUTFILE
input PO or POT file
-D, --directory=DIRECTORY
+ man msgexec
+ head -n 20
MSGEXEC(1) GNU MSGEXEC(1)
NAME
msgexec - process translations of message catalog
SYNOPSIS
msgexec [OPTION] COMMAND [COMMAND-OPTION]
DESCRIPTION
Applies a command to all translations of a translation catalog. The COMMAND can be any program that reads a translation from standard input. It is invoked once for each translation. Its output becomes msgexec's output. msgexec's return code is the maximum return code across all invocations.
A special builtin command called '0' outputs the translation, followed by a null byte. The output of "msgexec 0" is suitable as input for "xargs -0".
Command input:
--newline
add newline at the end of input
Mandatory arguments to long options are mandatory for short options too.
+ man msgfilter
+ head -n 20
MSGFILTER(1) GNU MSGFILTER(1)
NAME
msgfilter - edit translations of message catalog
SYNOPSIS
msgfilter [OPTION] FILTER [FILTER-OPTION]
DESCRIPTION
Applies a filter to all translations of a translation catalog.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
-i, --input=INPUTFILE
input PO file
-D, --directory=DIRECTORY
+ man msgfmt
+ head -n 20
MSGFMT(1) GNU MSGFMT(1)
NAME
msgfmt - compile message catalog to binary format
SYNOPSIS
msgfmt [OPTION] filename.po ...
DESCRIPTION
Generate binary message catalog from textual translation description.
Mandatory arguments to long options are mandatory for short options too. Similarly for optional arguments.
Input file location:
filename.po ...
input files
-D, --directory=DIRECTORY
+ man msggrep
+ head -n 20
MSGGREP(1) GNU MSGGREP(1)
NAME
msggrep - pattern matching on message catalog
SYNOPSIS
msggrep [OPTION] [INPUTFILE]
DESCRIPTION
Extracts all messages of a translation catalog that match a given pattern or belong to some given source files.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
INPUTFILE
input PO file
-D, --directory=DIRECTORY
+ man msghack
+ head -n 20
MSGHACK(1) User Commands MSGHACK(1)
NAME
msghack - alter PO files in ways
SYNOPSIS
msghack [OPTION] file.po [ref.po]
DESCRIPTION
This program can be used to alter .po files in ways no sane mind would think about.
-o result will be written to FILE
--invert
invert a po file by switching msgid and msgstr
--master
join any number of files in a master-formatted catalog
+ man msginit
+ head -n 20
MSGINIT(1) GNU MSGINIT(1)
NAME
msginit - initialize a message catalog
SYNOPSIS
msginit [OPTION]
DESCRIPTION
Creates a new PO file, initializing the meta information with values from the user's environment.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
-i, --input=INPUTFILE
input POT file
If no input file is given, the current directory is searched for the POT file. If it is -, standard input is read.
+ man msgmerge
+ head -n 20
MSGMERGE(1) GNU MSGMERGE(1)
NAME
msgmerge - merge message catalog and template
SYNOPSIS
msgmerge [OPTION] def.po ref.pot
DESCRIPTION
Merges two Uniforum style .po files together. The def.po file is an existing PO file with translations which will be taken over to the newly created file as long as they still match; comments will be preserved, but extracted comments and file positions will be discarded. The ref.pot file is the last created PO file with up-to-date source references but old translations, or a PO Template file (gener‐
ally created by xgettext); any translations or comments in the file will be discarded, however dot comments and file positions will be preserved. Where an exact match cannot be found, fuzzy matching is used to produce better results.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
def.po translations referring to old sources
ref.pot
+ man msgunfmt
+ head -n 20
MSGUNFMT(1) GNU MSGUNFMT(1)
NAME
msgunfmt - uncompile message catalog from binary format
SYNOPSIS
msgunfmt [OPTION] [FILE]...
DESCRIPTION
Convert binary message catalog to Uniforum style .po file.
Mandatory arguments to long options are mandatory for short options too.
Operation mode:
-j, --java
Java mode: input is a Java ResourceBundle class
--csharp
+ man msguniq
+ head -n 20
MSGUNIQ(1) GNU MSGUNIQ(1)
NAME
msguniq - unify duplicate translations in message catalog
SYNOPSIS
msguniq [OPTION] [INPUTFILE]
DESCRIPTION
Unifies duplicate translations in a translation catalog. Finds duplicate translations of the same message ID. Such duplicates are invalid input for other programs like msgfmt, msgmerge or msgcat. By default, duplicates are merged together. When using the --repeated option, only duplicates are output, and all other messages are discarded. Comments and extracted comments will be cumulated, except
that if --use-first is specified, they will be taken from the first translation. File positions will be cumulated. When using the --unique option, duplicates are discarded.
Mandatory arguments to long options are mandatory for short options too.
Input file location:
INPUTFILE
input PO file
+ man mtr
+ head -n 20
MTR(8) System Administration MTR(8)
NAME
mtr - a network diagnostic tool
SYNOPSIS
mtr [-4|-6] [-F FILENAME] [--report] [--report-wide] [--xml] [--gtk] [--curses] [--displaymode MODE] [--raw] [--csv] [--json] [--split] [--no-dns] [--show-ips] [-o FIELDS] [-y IPINFO] [--aslookup] [-i INTERVAL] [-c COUNT] [-s PACKETSIZE] [-B BITPATTERN] [-G GRACEPERIOD] [-Q TOS] [--mpls] [-a ADDRESS] [-f FIRST-TTL] [-m MAX-TTL] [-U MAX-UNKNOWN] [--udp] [--tcp] [--sctp] [-P PORT] [-L LOCALPORT]
[-Z TIMEOUT] [-M MARK] HOSTNAME
DESCRIPTION
mtr combines the functionality of the traceroute and ping programs in a single network diagnostic tool.
As mtr starts, it investigates the network connection between the host mtr runs on and HOSTNAME by sending packets with purposely low TTLs. It continues to send packets with low TTL, noting the response time of the intervening routers. This allows mtr to print the response percentage and response times of the internet route to HOSTNAME. A sudden increase in packet loss or response time is often an
indication of a bad (or simply overloaded) link.
The results are usually reported as round-trip-response times in milliseconds and the percentage of packetloss.
OPTIONS
+ man mtr-packet
+ head -n 20
MTR-PACKET(8) System Administration MTR-PACKET(8)
NAME
mtr-packet - send and receive network probes
DESCRIPTION
mtr-packet is a tool for sending network probes to measure network connectivity and performance. Many network probes can be sent simultaneously by a single process instance of mtr-packet and additional probes can be generated by an instance of mtr-packet which already has network probes in flight. It is intended to be used by programs which invoke it with Unix pipes attached to its standard input and
output streams.
mtr-packet reads command requests from stdin, each separated by a newline character, and responds with command replies to stdout, also each separated by a newline character. The syntactic structure of requests and replies are the same. The following format is used:
TOKEN COMMAND [ARGUMENT-NAME ARGUMENT-VALUE ...]
TOKEN is a unique integer value. The same value will be used as the TOKEN for the response. This is necessary for associating replies with requests, as commands may be completed in a different order than they are requested. The invoker of mtr-packet should always use the TOKEN value to determine which command request has completed.
COMMAND is a string identifying the command request type. A common command is send-probe, which will transmit one network probe.
+ man namei
+ head -n 20
NAMEI(1) User Commands NAMEI(1)
NAME
namei - follow a pathname until a terminal point is found
SYNOPSIS
namei [options] pathname...
DESCRIPTION
namei interprets its arguments as pathnames to any type of Unix file (symlinks, files, directories, and so forth). namei then follows each pathname until an endpoint is found (a file, a directory, a device node, etc). If it finds a symbolic link, it shows the link, and starts following it, indenting the output to show the context.
This program is useful for finding "too many levels of symbolic links" problems.
For each line of output, namei uses the following characters to identify the file type found:
f: = the pathname currently being resolved
d = directory
l = symbolic link (both the link and its contents are output)
+ man nameif
+ head -n 20
NAMEIF(8) Linux System Administrator's Manual NAMEIF(8)
NAME
nameif - name network interfaces based on MAC addresses
SYNOPSIS
nameif [-c configfile] [-s]
nameif [-c configfile] [-s] {interface macaddress}
NOTE
This program is obsolete. For replacement check ip link. This functionality is also much better provided by udev methods.
DESCRIPTION
nameif renames network interfaces based on mac addresses. When no arguments are given /etc/mactab is read. Each line of it contains an interface name and a Ethernet MAC address. Comments are allowed starting with #. Otherwise the interfaces specified on the command line are processed. nameif looks for the interface with the given MAC address and renames it to the name given.
When the -s argument is given all error messages go to the syslog.
+ man nano
+ head -n 20
NANO(1) General Commands Manual NANO(1)
NAME
nano - Nano's ANOther editor, an enhanced free Pico clone
SYNOPSIS
nano [options] [[+line[,column]] file]...
DESCRIPTION
nano is a small and friendly editor. It copies the look and feel of Pico, but is free software, and implements several features that Pico lacks, such as: opening multiple files, scrolling per line, undo/redo, syntax coloring, line numbering, and soft-wrapping overlong lines.
When giving a filename on the command line, the cursor can be put on a specific line by adding the line number with a plus sign (+) before the filename, and even in a specific column by adding it with a comma.
As a special case: if instead of a filename a dash (-) is given, nano will read data from standard input.
+ man needs-restarting
+ head -n 20
needs-restarting(1) needs-restarting(1)
NAME
needs-restarting - report running processes that have been updated
SYNOPSIS
needs-restarting [options]
DESCRIPTION
needs-restarting is a program that reports a list of process ids that started running before they or some component that they use were updated.
OPTIONS
-h, --help
Display a help message, and then quit.
-u, --useronly
Show processes for my userid only.
+ man netreport
+ head -n 20
NETREPORT(1) General Commands Manual NETREPORT(1)
NAME
netreport - request notification of network interface changes
SYNOPSIS
netreport [-r]
DESCRIPTION
netreport tells the network management scripts to send a SIGIO signal to the process which called netreport when any network interface status changes occur.
OPTIONS
-r Remove the current request (if any) for the calling process.
NOTES
If a program does not call netreport with the -r option before it exits, and another process is created with the same PID before any changes take place in interface status, it is possible that the new process will receive a spurious SIGIO.
+ man netstat
+ head -n 20
NETSTAT(8) Linux System Administrator's Manual NETSTAT(8)
NAME
netstat - Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships
SYNOPSIS
netstat [address_family_options] [--tcp|-t] [--udp|-u] [--udplite|-U] [--sctp|-S] [--raw|-w] [--listening|-l] [--all|-a] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--symbolic|-N] [--extend|-e[--extend|-e]] [--timers|-o] [--program|-p] [--verbose|-v] [--continuous|-c] [--wide|-W] [delay]
netstat {--route|-r} [address_family_options] [--extend|-e[--extend|-e]] [--verbose|-v] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay]
netstat {--interfaces|-I|-i} [--all|-a] [--extend|-e] [--verbose|-v] [--program|-p] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay]
netstat {--groups|-g} [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay]
netstat {--masquerade|-M} [--extend|-e] [--numeric|-n] [--numeric-hosts] [--numeric-ports] [--numeric-users] [--continuous|-c] [delay]
netstat {--statistics|-s} [--tcp|-t] [--udp|-u] [--udplite|-U] [--sctp|-S] [--raw|-w] [delay]
+ man nettle-hash
+ head -n 20
No manual entry for nettle-hash
+ man nettle-lfib-stream
+ head -n 20
No manual entry for nettle-lfib-stream
+ man new-kernel-pkg
+ head -n 20
NEW-KERNEL-PKG(8) System Manager's Manual NEW-KERNEL-PKG(8)
NAME
new-kernel-pkg - tool to script kernel installation
SYNOPSIS
new-kernel-pkg [-v] [--mkinitrd] [--rminitrd] [--dracut]
[--initrdfile=initrd-image [--depmod] [--rmmoddep]
[--kernel-args=args] [--remove-args=args]
[--banner=banner] [--multiboot=multiboot]
[--mbargs=mbargs] [--make-default] [--add-dracut-args]
[--add-plymouth-initrd] [--host-only]
<--install | --remove | --update | --rpmposttrans> <kernel-version>
DESCRIPTION
new-kernel-pkg is a tool used in packaging to automate the installation of a new kernel, including the creation of an initial ram filesystem image, updating of bootloader configuration, and other associated tasks.
+ man newaliases
+ head -n 20
SENDMAIL(1) General Commands Manual SENDMAIL(1)
NAME
sendmail - Postfix to Sendmail compatibility interface
SYNOPSIS
sendmail [option ...] [recipient ...]
mailq
sendmail -bp
newaliases
sendmail -I
DESCRIPTION
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored.
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory.
+ man newaliases.postfix
+ head -n 20
SENDMAIL(1) General Commands Manual SENDMAIL(1)
NAME
sendmail - Postfix to Sendmail compatibility interface
SYNOPSIS
sendmail [option ...] [recipient ...]
mailq
sendmail -bp
newaliases
sendmail -I
DESCRIPTION
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored.
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory.
+ man newgrp
+ head -n 20
NEWGRP(1) User Commands NEWGRP(1)
NAME
newgrp - log in to a new group
SYNOPSIS
newgrp [-] [group]
DESCRIPTION
The newgrp command is used to change the current group ID during a login session. If the optional - flag is given, the user's environment will be reinitialized as though the user had logged in, otherwise the current environment, including current working directory, remains unchanged.
newgrp changes the current real group ID to the named group, or to the default group listed in /etc/passwd if no group name is given. newgrp also tries to add the group to the user groupset. If not root, the user will be prompted for a password if she does not have a password (in /etc/shadow if this user has an entry in the shadowed password file, or in /etc/passwd otherwise) and the group does, or if
the user is not listed as a member and the group has a password. The user will be denied access if the group password is empty and the user is not listed as a member.
If there is an entry for this group in /etc/gshadow, then the list of members and the password of this group will be taken from this file, otherwise, the entry in /etc/group is considered.
CONFIGURATION
The following configuration variables in /etc/login.defs change the behavior of this tool:
+ man newusers
+ head -n 20
NEWUSERS(8) System Management Commands NEWUSERS(8)
NAME
newusers - update and create new users in batch
SYNOPSIS
newusers [options] [file]
DESCRIPTION
The newusers command reads a file (or the standard input by default) and uses this information to update a set of existing users or to create new users. Each line is in the same format as the standard password file (see passwd(5)) with the exceptions explained below:
pw_name:pw_passwd:pw_uid:pw_gid:pw_gecos:pw_dir:pw_shell
pw_name
This is the name of the user.
It can be the name of a new user or the name of an existing user (or an user created before by newusers). In case of an existing user, the user's information will be changed, otherwise a new user will be created.
+ man nf-ct-add
+ head -n 20
No manual entry for nf-ct-add
+ man nf-ct-list
+ head -n 20
No manual entry for nf-ct-list
+ man nf-exp-add
+ head -n 20
No manual entry for nf-exp-add
+ man nf-exp-delete
+ head -n 20
No manual entry for nf-exp-delete
+ man nf-exp-list
+ head -n 20
No manual entry for nf-exp-list
+ man nf-log
+ head -n 20
No manual entry for nf-log
+ man nf-monitor
+ head -n 20
No manual entry for nf-monitor
+ man nf-queue
+ head -n 20
No manual entry for nf-queue
+ man nfsdcltrack
+ head -n 20
NFSDCLTRACK(8) NFSDCLTRACK(8)
NAME
nfsdcltrack - NFSv4 Client Tracking Callout Program
SYNOPSIS
nfsdcltrack [-d] [-f] [-s stable storage dir] <command> <args...>
DESCRIPTION
nfsdcltack is the NFSv4 client tracking callout program. It is not necessary to install this daemon on machines that are not acting as NFSv4 servers.
When a network partition is combined with a server reboot, there are edge conditions that can cause the server to grant lock reclaims when other clients have taken conflicting locks in the interim. A more detailed explanation of this issue is described in RFC 3530, section 8.6.3.
In order to prevent these problems, the server must track a small amount of per-client information on stable storage. This program provides the userspace piece of that functionality. When the kernel needs to manipulate the database that stores this info, it will execute this program to handle it.
OPTIONS
-d, --debug
Enable debug level logging.
+ man nfsidmap
+ head -n 20
nfsidmap(5) File Formats Manual nfsidmap(5)
NAME
nfsidmap - The NFS idmapper upcall program
SYNOPSIS
nfsidmap [-v] [-t timeout] key desc
nfsidmap [-v] [-c]
nfsidmap [-v] [-u|-g|-r user]
nfsidmap -d
nfsidmap -l
nfsidmap -h
DESCRIPTION
The NFSv4 protocol represents the local system's UID and GID values on the wire as strings of the form user@domain. The process of translating from UID to string and string to UID is referred to as "ID mapping."
The system derives the user part of the string by performing a password or group lookup. The lookup mechanism is configured in /etc/idmapd.conf.
+ man nfsiostat
+ head -n 20
nfsiostat(8) System Manager's Manual nfsiostat(8)
NAME
nfsiostat - Emulate iostat for NFS mount points using /proc/self/mountstats
SYNOPSIS
nfsiostat [[<interval>] [<count>]] [<options>][<mount_point>]
DESCRIPTION
The nfsiostat command displays NFS client per-mount statisitics.
<interval>
specifies the amount of time in seconds between each report. The first report contains statistics for the time since each file system was mounted. Each subsequent report contains statistics collected during the interval since the previous report.
<count>
If the <count> parameter is specified, the value of <count> determines the number of reports generated at <interval> seconds apart. if the interval parameter is specified without the <count> parameter, the command generates reports continuously.
<options>
+ man nfsiostat-sysstat
+ head -n 20
NFSIOSTAT-SYSSTAT(1) Linux User's Manual NFSIOSTAT-SYSSTAT(1)
NAME
nfsiostat-sysstat (the nfsiostat command from the sysstat package) - Report input/output statistics for network filesystems (NFS).
SYNOPSIS
nfsiostat-sysstat [ -h ] [ -k | -m ] [ -t ] [ -V ] [ interval [ count ] ]
DESCRIPTION
The nfsiostat-sysstat command displays statistics about read and write operations on NFS filesystems.
The interval parameter specifies the amount of time in seconds between each report. The first report contains statistics for the time since system startup (boot). Each subsequent report contains statistics collected during the interval since the previous report. A report consists of an NFS header row followed by a line of statistics for each network filesystem that is mounted. The count parameter can
be specified in conjunction with the interval parameter. If the count parameter is specified, the value of count determines the number of reports generated at interval seconds apart. If the interval parameter is specified without the count parameter, the nfsiostat-sysstat command generates reports continuously.
REPORT
The Network Filesystem (NFS) report provides statistics for each mounted network filesystem. Transfer rates are shown in 1K blocks by default, unless the environment variable POSIXLY_CORRECT is set, in which case 512-byte blocks are used. The report shows the following fields:
+ man nfsstat
+ head -n 20
nfsstat(8) System Manager's Manual nfsstat(8)
NAME
nfsstat - list NFS statistics
SYNOPSIS
nfsstat [OPTION]...
DESCRIPTION
The nfsstat displays statistics kept about NFS client and server activity.
OPTIONS
-s, --server
Print only server-side statistics. The default is to print both server and client statistics.
-c, --client
Print only client-side statistics.
+ man ngettext
+ head -n 20
NGETTEXT(1) GNU NGETTEXT(1)
NAME
ngettext - translate message and choose plural form
SYNOPSIS
ngettext [OPTION] [TEXTDOMAIN] MSGID MSGID-PLURAL COUNT
DESCRIPTION
The ngettext program translates a natural language message into the user's language, by looking up the translation in a message catalog, and chooses the appropriate plural form, which depends on the number COUNT and the language of the message catalog where the translation was found.
Display native language translation of a textual message whose grammatical form depends on a number.
-d, --domain=TEXTDOMAIN
retrieve translated message from TEXTDOMAIN
-e enable expansion of some escape sequences
+ man nisdomainname
+ head -n 20
HOSTNAME(1) Linux Programmer's Manual HOSTNAME(1)
NAME
hostname - show or set the system's host name
domainname - show or set the system's NIS/YP domain name
ypdomainname - show or set the system's NIS/YP domain name
nisdomainname - show or set the system's NIS/YP domain name
dnsdomainname - show the system's DNS domain name
SYNOPSIS
hostname [-a|--alias] [-d|--domain] [-f|--fqdn|--long] [-A|--all-fqdns] [-i|--ip-address] [-I|--all-ip-addresses] [-s|--short] [-y|--yp|--nis]
hostname [-b|--boot] [-F|--file filename] [hostname]
hostname [-h|--help] [-V|--version]
domainname [nisdomain] [-F file]
ypdomainname [nisdomain] [-F file]
nisdomainname [nisdomain] [-F file]
+ man nl-addr-add
+ head -n 20
No manual entry for nl-addr-add
+ man nl-addr-delete
+ head -n 20
No manual entry for nl-addr-delete
+ man nl-addr-list
+ head -n 20
No manual entry for nl-addr-list
+ man nl-class-add
+ head -n 20
No manual entry for nl-class-add
+ man nl-class-delete
+ head -n 20
No manual entry for nl-class-delete
+ man nl-class-list
+ head -n 20
No manual entry for nl-class-list
+ man nl-classid-lookup
+ head -n 20
nl-classid-lookup(8) System Manager's Manual nl-classid-lookup(8)
NAME
nl-classid-lookup - Lookup classid definitions
SYNOPSIS
nl-classid-lookup [-hv] [-r] [--raw] name
DESCRIPTION
nl-classid-lookup searches the classid database for a matching entry. It is used to resolve qdisc/class names to classid values and vice versa.
OPTIONS
-h or --help
Print help text to console and exit.
-v or --version
+ man nl-cls-add
+ head -n 20
No manual entry for nl-cls-add
+ man nl-cls-delete
+ head -n 20
No manual entry for nl-cls-delete
+ man nl-cls-list
+ head -n 20
No manual entry for nl-cls-list
+ man nl-fib-lookup
+ head -n 20
No manual entry for nl-fib-lookup
+ man nl-link-enslave
+ head -n 20
No manual entry for nl-link-enslave
+ man nl-link-ifindex2name
+ head -n 20
No manual entry for nl-link-ifindex2name
+ man nl-link-list
+ head -n 20
No manual entry for nl-link-list
+ man nl-link-name2ifindex
+ head -n 20
No manual entry for nl-link-name2ifindex
+ man nl-link-release
+ head -n 20
No manual entry for nl-link-release
+ man nl-link-set
+ head -n 20
No manual entry for nl-link-set
+ man nl-link-stats
+ head -n 20
No manual entry for nl-link-stats
+ man nl-list-caches
+ head -n 20
No manual entry for nl-list-caches
+ man nl-list-sockets
+ head -n 20
No manual entry for nl-list-sockets
+ man nl-monitor
+ head -n 20
No manual entry for nl-monitor
+ man nl-neigh-add
+ head -n 20
No manual entry for nl-neigh-add
+ man nl-neigh-delete
+ head -n 20
No manual entry for nl-neigh-delete
+ man nl-neigh-list
+ head -n 20
No manual entry for nl-neigh-list
+ man nl-neightbl-list
+ head -n 20
No manual entry for nl-neightbl-list
+ man nl-pktloc-lookup
+ head -n 20
nl-pktloc-lookup(8) System Manager's Manual nl-pktloc-lookup(8)
NAME
nl-pktloc-lookup - Lookup packet location definitions
SYNOPSIS
nl-pktloc-lookup name
nl-pktloc-lookup --list
DESCRIPTION
nl-pktloc-lookup searches the packet location database for a matching entry. It is used to resolve packet location aliases to their definition, i.e. alignment, layer, offset, and mask.
OPTIONS
-h or --help
Print help text to console and exit.
+ man nl-qdisc-add
+ head -n 20
nl-qdisc(8) System Manager's Manual nl-qdisc(8)
NAME
nl-qdisc-{add|list|delete} - Manage queueing disciplines
SYNOPSIS
nl-qdisc-add --dev dev --parent id [OPTIONS] qdisc-type [QDISC]
nl-qdisc-delete [ --interactive ] [OPTIONS]
nl-qdisc-list [OPTIONS]
DESCRIPTION
The nl-qdisc tools allow to manage and configure queueing disciplines (qdiscs) in the kernel.
OPTIONS
+ man nl-qdisc-delete
+ head -n 20
nl-qdisc(8) System Manager's Manual nl-qdisc(8)
NAME
nl-qdisc-{add|list|delete} - Manage queueing disciplines
SYNOPSIS
nl-qdisc-add --dev dev --parent id [OPTIONS] qdisc-type [QDISC]
nl-qdisc-delete [ --interactive ] [OPTIONS]
nl-qdisc-list [OPTIONS]
DESCRIPTION
The nl-qdisc tools allow to manage and configure queueing disciplines (qdiscs) in the kernel.
OPTIONS
+ man nl-qdisc-list
+ head -n 20
nl-qdisc(8) System Manager's Manual nl-qdisc(8)
NAME
nl-qdisc-{add|list|delete} - Manage queueing disciplines
SYNOPSIS
nl-qdisc-add --dev dev --parent id [OPTIONS] qdisc-type [QDISC]
nl-qdisc-delete [ --interactive ] [OPTIONS]
nl-qdisc-list [OPTIONS]
DESCRIPTION
The nl-qdisc tools allow to manage and configure queueing disciplines (qdiscs) in the kernel.
OPTIONS
+ man nl-route-add
+ head -n 20
No manual entry for nl-route-add
+ man nl-route-delete
+ head -n 20
No manual entry for nl-route-delete
+ man nl-route-get
+ head -n 20
No manual entry for nl-route-get
+ man nl-route-list
+ head -n 20
No manual entry for nl-route-list
+ man nl-rule-list
+ head -n 20
No manual entry for nl-rule-list
+ man nl-tctree-list
+ head -n 20
No manual entry for nl-tctree-list
+ man nl-util-addr
+ head -n 20
No manual entry for nl-util-addr
+ man nm
+ head -n 20
NM(1) GNU Development Tools NM(1)
NAME
nm - list symbols from object files
SYNOPSIS
nm [-A|-o|--print-file-name] [-a|--debug-syms]
[-B|--format=bsd] [-C|--demangle[=style]]
[-D|--dynamic] [-fformat|--format=format]
[-g|--extern-only] [-h|--help]
[-l|--line-numbers] [--inlines]
[-n|-v|--numeric-sort]
[-P|--portability] [-p|--no-sort]
[-r|--reverse-sort] [-S|--print-size]
[-s|--print-armap] [-t radix|--radix=radix]
[-u|--undefined-only] [-V|--version]
[-X 32_64] [--defined-only] [--no-demangle]
[--plugin name] [--size-sort] [--special-syms]
+ man nologin
+ head -n 20
NOLOGIN(8) System Administration NOLOGIN(8)
NAME
nologin - politely refuse a login
SYNOPSIS
nologin [-V] [-h]
DESCRIPTION
nologin displays a message that an account is not available and exits non-zero. It is intended as a replacement shell field to deny login access to an account.
If the file /etc/nologin.txt exists, nologin displays its contents to the user instead of the default message.
The exit code returned by nologin is always 1.
OPTIONS
-h, --help
Display help text and exit.
+ man nsenter
+ head -n 20
NSENTER(1) User Commands NSENTER(1)
NAME
nsenter - run program with namespaces of other processes
SYNOPSIS
nsenter [options] [program [arguments]]
DESCRIPTION
Enters the namespaces of one or more other processes and then executes the specified program. If program is not given, then ``${SHELL}'' is run (default: /bin/sh).
Enterable namespaces are:
mount namespace
Mounting and unmounting filesystems will not affect the rest of the system, except for filesystems which are explicitly marked as shared (with mount --make-shared; see /proc/self/mountinfo for the shared flag). For further details, see mount_namespaces(7) and the discussion of the CLONE_NEWNS flag in clone(2).
UTS namespace
Setting hostname or domainname will not affect the rest of the system. For further details, see namespaces(7) and the discussion of the CLONE_NEWUTS flag in clone(2).
+ man nslookup
+ head -n 20
NSLOOKUP(1) BIND9 NSLOOKUP(1)
NAME
nslookup - query Internet name servers interactively
SYNOPSIS
nslookup [-option] [name | -] [server]
DESCRIPTION
Nslookup is a program to query Internet domain name servers. Nslookup has two modes: interactive and non-interactive. Interactive mode allows the user to query name servers for information about various hosts and domains or to print a list of hosts in a domain. Non-interactive mode is used to print just the name and requested information for a host or domain.
ARGUMENTS
Interactive mode is entered in the following cases:
1. when no arguments are given (the default name server will be used)
2. when the first argument is a hyphen (-) and the second argument is the host name or Internet address of a name server.
+ man nstat
+ head -n 20
RTACCT(8) System Manager's Manual RTACCT(8)
NAME
nstat, rtacct - network statistics tools.
SYNOPSIS
Usage: nstat [ -h?vVzrnasd:t: ] [ PATTERN [ PATTERN ] ]
Usage: rtacct [ -h?vVzrnasd:t: ] [ ListOfRealms ]
DESCRIPTION
nstat and rtacct are simple tools to monitor kernel snmp counters and network interface statistics.
OPTIONS
-h, --help Print help
+ man nsupdate
+ head -n 20
NSUPDATE(1) BIND9 NSUPDATE(1)
NAME
nsupdate - Dynamic DNS update utility
SYNOPSIS
nsupdate [-d] [-D] [-i] [-L level] [[-g] | [-o] | [-l] | [-y [hmac:]keyname:secret] | [-k keyfile]] [-t timeout] [-u udptimeout] [-r udpretries] [-R randomdev] [-v] [-T] [-P] [-V] [filename]
DESCRIPTION
nsupdate is used to submit Dynamic DNS Update requests as defined in RFC 2136 to a name server. This allows resource records to be added or removed from a zone without manually editing the zone file. A single update request can contain requests to add or remove more than one resource record.
Zones that are under dynamic control via nsupdate or a DHCP server should not be edited by hand. Manual edits could conflict with dynamic updates and cause data to be lost.
The resource records that are dynamically added or removed with nsupdate have to be in the same zone. Requests are sent to the zone's master server. This is identified by the MNAME field of the zone's SOA record.
Transaction signatures can be used to authenticate the Dynamic DNS updates. These use the TSIG resource record type described in RFC 2845 or the SIG(0) record described in RFC 2535 and RFC 2931 or GSS-TSIG as described in RFC 3645.
TSIG relies on a shared secret that should only be known to nsupdate and the name server. For instance, suitable key and server statements would be added to /etc/named.conf so that the name server can associate the appropriate secret key and algorithm with the IP address of the client application that will be using TSIG authentication. You can use ddns-confgen to generate suitable configuration
+ man ntsysv
+ head -n 20
NTSYSV(8) System Manager's Manual NTSYSV(8)
NAME
ntsysv - simple interface for configuring runlevels
SYNOPSIS
ntsysv [--back] [--level <levels>]
DESCRIPTION
ntsysv is a simple interface for configuring runlevel services which are also configurable through chkconfig. By default, it configures runlevels 2, 3, 4, and 5. If the user would like to configure other runlevels, those levels can be specified on the command line by listing the levels after --level, without any spaces. For example, the option --level 016 edits runlevels 0, 1, and 6.
A service is considered to be started in the runlevel set if it is started in any of the runlevels which are being edited.
The ntsysv window normally contains a Cancel button. If --back is specified, a Back button appears instead.
RETURN CODES
ntsysv returns 0 on success, 2 on error, and 1 if the user cancelled (or backed out of) the program.
+ man objcopy
+ head -n 20
OBJCOPY(1) GNU Development Tools OBJCOPY(1)
NAME
objcopy - copy and translate object files
SYNOPSIS
objcopy [-F bfdname|--target=bfdname]
[-I bfdname|--input-target=bfdname]
[-O bfdname|--output-target=bfdname]
[-B bfdarch|--binary-architecture=bfdarch]
[-S|--strip-all]
[-g|--strip-debug]
[-K symbolname|--keep-symbol=symbolname]
[-N symbolname|--strip-symbol=symbolname]
[--strip-unneeded-symbol=symbolname]
[-G symbolname|--keep-global-symbol=symbolname]
[--localize-hidden]
[-L symbolname|--localize-symbol=symbolname]
+ man objdump
+ head -n 20
OBJDUMP(1) GNU Development Tools OBJDUMP(1)
NAME
objdump - display information from object files.
SYNOPSIS
objdump [-a|--archive-headers]
[-b bfdname|--target=bfdname]
[-C|--demangle[=style] ]
[-d|--disassemble]
[-D|--disassemble-all]
[-z|--disassemble-zeroes]
[-EB|-EL|--endian={big | little }]
[-f|--file-headers]
[-F|--file-offsets]
[--file-start-context]
[-g|--debugging]
[-e|--debugging-tags]
+ man on_ac_power
+ head -n 20
ON_AC_POWER(1) [FIXME: manual] ON_AC_POWER(1)
NAME
on_ac_power - test whether the computer is running on line power
SYNOPSIS
on_ac_power
DESCRIPTION
This manual page documents briefly the on_ac_power command.
on_ac_power is a command line program to test whether the computer is running on line power
EXIT CODES
The command succeeds (status 0) if the system is using line power and fails (status other than 0) otherwise. It is designed to be easy to use in shell scripts.
0 (true)
System is on line power.
+ man open
+ head -n 20
OPENVT(1) Linux 1.x OPENVT(1)
NAME
openvt - start a program on a new virtual terminal (VT).
SYNOPSIS
openvt [-c vtnumber] [OPTIONS] [--] command
DESCRIPTION
openvt will find the first available VT, and run on it the given command with the given command options, standard input, output and error are directed to that terminal. The current search path ($PATH) is used to find the requested command. If no command is specified then the environment variable $SHELL is used.
OPTIONS
-c, --console=VTNUMBER
Use the given VT number and not the first available. Note you must have write access to the supplied VT for this to work;
-f, --force
Force opening a VT without checking whether it is already in use;
+ man openssl
+ head -n 20
OPENSSL(1) OpenSSL OPENSSL(1)
NAME
openssl - OpenSSL command line tool
SYNOPSIS
openssl command [ command_opts ] [ command_args ]
openssl [ list-standard-commands | list-message-digest-commands | list-cipher-commands | list-cipher-algorithms | list-message-digest-algorithms | list-public-key-algorithms]
openssl no-XXX [ arbitrary options ]
DESCRIPTION
OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) network protocols and related cryptography standards required by them.
The openssl program is a command line tool for using the various cryptography functions of OpenSSL's crypto library from the shell. It can be used for
o Creation and management of private keys, public keys and parameters
+ man openvt
+ head -n 20
OPENVT(1) Linux 1.x OPENVT(1)
NAME
openvt - start a program on a new virtual terminal (VT).
SYNOPSIS
openvt [-c vtnumber] [OPTIONS] [--] command
DESCRIPTION
openvt will find the first available VT, and run on it the given command with the given command options, standard input, output and error are directed to that terminal. The current search path ($PATH) is used to find the requested command. If no command is specified then the environment variable $SHELL is used.
OPTIONS
-c, --console=VTNUMBER
Use the given VT number and not the first available. Note you must have write access to the supplied VT for this to work;
-f, --force
Force opening a VT without checking whether it is already in use;
+ man os-prober
+ head -n 20
os-prober(1) General Commands Manual os-prober(1)
NAME
os-prober — Discover bootable partitions on the local system.
SYNOPSIS
os-prober
DESCRIPTION
The os-prober utility will scan all disks available on the system for other operating systems. For each discovered OS, it will output a line of the form:
<partition>:<descriptive name>:<short name>:<kind of loader>
For example, on system with Windows XP installed on /dev/sda1, os-prober will display:
/dev/sda1:Windows NT/2000/XP:WinNT:chain
Note that for Linux systems that are discovered, a call to linux-boot-prober may be required in order to fully discover the necessary information to boot the system.
+ man osd_login
+ head -n 20
No manual entry for osd_login
+ man package-cleanup
+ head -n 20
package-cleanup(1) package-cleanup(1)
NAME
package-cleanup - clean up locally installed, duplicate, or orphaned packages
SYNOPSIS
package-cleanup [options] <item ...>
DESCRIPTION
package-cleanup is a program for cleaning up the locally-installed RPMs.
GENERAL OPTIONS
-c <config file>
Use alternative config file (default is /etc/yum.conf).
-h, --help
Help; display a help message and then quit.
+ man packer
+ head -n 20
No manual entry for packer
+ man pam_console_apply
+ head -n 20
pam_console_apply(8) System Administrator's Manual pam_console_apply(8)
NAME
pam_console_apply - set or revoke permissions for users at the system console
SYNOPSIS
pam_console_apply [-f <fstab file>] [-c <console.perms file>] [-r] [-t <tty>] [-s] [-d] [<device file> ...]
DESCRIPTION
pam_console_apply is a helper executable which sets or resets permissions on device nodes.
If /var/run/console.lock exists, pam_console_apply will grant permissions to the user listed therein. If the lock file does not exist, permissions are reset according to defaults set in console.perms files, normally configured to set permissions on devices so that root owns them.
When initializing its configuration it first parses the /etc/security/console.perms file and then it searches for files ending with the .perms suffix in the /etc/security/console.perms.d directory. These files are parsed in the lexical order in "C" locale. Permission rules are appended to a global list, console and device class definitions override previous definitions of the same class.
ARGUMENTS
-c Load other console.perms file than the default one.
-f Load other fstab file than the default one (/etc/fstab).
+ man pam_tally2
+ head -n 20
PAM_TALLY2(8) Linux-PAM Manual PAM_TALLY2(8)
NAME
pam_tally2 - The login counter (tallying) module
SYNOPSIS
pam_tally2.so [file=/path/to/counter] [onerr=[fail|succeed]] [magic_root] [even_deny_root] [deny=n] [lock_time=n] [unlock_time=n] [root_unlock_time=n] [serialize] [audit] [silent] [no_log_info]
pam_tally2 [--file /path/to/counter] [--user username] [--reset[=n]] [--quiet]
DESCRIPTION
This module maintains a count of attempted accesses, can reset count on success, can deny access if too many attempts fail.
pam_tally2 comes in two parts: pam_tally2.so and pam_tally2. The former is the PAM module and the latter, a stand-alone program. pam_tally2 is an (optional) application which can be used to interrogate and manipulate the counter file. It can display users' counts, set individual counts, or clear all counts. Setting artificially high counts may be useful for blocking users without changing their
passwords. For example, one might find it useful to clear all counts every midnight from a cron job.
Normally, failed attempts to access root will not cause the root account to become blocked, to prevent denial-of-service: if your users aren't given shell accounts and root may only login via su or at the machine console (not telnet/rsh, etc), this is safe.
+ man pam_timestamp_check
+ head -n 20
PAM_TIMESTAMP_CHECK(8) Linux-PAM Manual PAM_TIMESTAMP_CHECK(8)
NAME
pam_timestamp_check - Check to see if the default timestamp is valid
SYNOPSIS
pam_timestamp_check [-k] [-d] [target_user]
DESCRIPTION
With no arguments pam_timestamp_check will check to see if the default timestamp is valid, or optionally remove it.
OPTIONS
-k
Instead of checking the validity of a timestamp, remove it. This is analogous to sudo's -k option.
-d
Instead of returning validity using an exit status, loop indefinitely, polling regularly and printing the status on standard output.
+ man parted
+ head -n 20
PARTED(8) GNU Parted Manual PARTED(8)
NAME
parted - a partition manipulation program
SYNOPSIS
parted [options] [device [command [options...]...]]
DESCRIPTION
parted is a program to manipulate disk partitions. It supports multiple partition table formats, including MS-DOS and GPT. It is useful for creating space for new operating systems, reorganising disk usage, and copying data to new hard disks.
This manual page documents parted briefly. Complete documentation is distributed with the package in GNU Info format.
OPTIONS
-h, --help
displays a help message
-l, --list
+ man partprobe
+ head -n 20
PARTPROBE(8) GNU Parted Manual PARTPROBE(8)
NAME
partprobe - inform the OS of partition table changes
SYNOPSIS
partprobe [-d] [-s] [devices...]
DESCRIPTION
This manual page documents briefly the partprobe command.
partprobe is a program that informs the operating system kernel of partition table changes, by requesting that the operating system re-read the partition table.
OPTIONS
This program uses short UNIX style options.
-d Don't update the kernel.
+ man partx
+ head -n 20
PARTX(8) System Administration PARTX(8)
NAME
partx - tell the kernel about the presence and numbering of on-disk partitions
SYNOPSIS
partx [-a|-d|-P|-r|-s|-u] [-t type] [-n M:N] [-] disk
partx [-a|-d|-P|-r|-s|-u] [-t type] partition [disk]
DESCRIPTION
Given a device or disk-image, partx tries to parse the partition table and list its contents. It can also tell the kernel to add or remove partitions from its bookkeeping.
The disk argument is optional when a partition argument is provided. To force scanning a partition as if it were a whole disk (for example to list nested subpartitions), use the argument "-" (hyphen-minus). For example:
partx --show - /dev/sda3
This will see sda3 as a whole-disk rather than as a partition.
+ man passwd
+ head -n 20
PASSWD(1) User utilities PASSWD(1)
NAME
passwd - update user's authentication tokens
SYNOPSIS
passwd [-k] [-l] [-u [-f]] [-d] [-e] [-n mindays] [-x maxdays] [-w warndays] [-i inactivedays] [-S] [--stdin] [username]
DESCRIPTION
The passwd utility is used to update user's authentication token(s).
This task is achieved through calls to the Linux-PAM and Libuser API. Essentially, it initializes itself as a "passwd" service with Linux-PAM and utilizes configured password modules to authenticate and then update a user's password.
A simple entry in the global Linux-PAM configuration file for this service would be:
+ man pdata_tools
+ head -n 20
No manual entry for pdata_tools
+ man perl
+ head -n 20
PERL(1) Perl Programmers Reference Guide PERL(1)
NAME
perl - The Perl 5 language interpreter
SYNOPSIS
perl [ -sTtuUWX ] [ -hv ] [ -V[:configvar] ] [ -cw ] [ -d[t][:debugger] ] [ -D[number/list] ] [ -pna ] [ -Fpattern ] [ -l[octal] ] [ -0[octal/hexadecimal] ] [ -Idir ] [ -m[-]module ] [ -M[-]'module...' ] [ -f ] [ -C [number/list] ] [ -S ] [ -x[dir] ] [ -i[extension] ] [ [-e|-E] 'command' ] [ -- ] [ programfile ] [ argument ]...
GETTING HELP
The perldoc program gives you access to all the documentation that comes with Perl. You can get more documentation, tutorials and community support online at <http://www.perl.org/>.
If you're new to Perl, you should start by running "perldoc perlintro", which is a general intro for beginners and provides some background to help you navigate the rest of Perl's extensive documentation. Run "perldoc perldoc" to learn more things you can do with perldoc.
For ease of access, the Perl manual has been split up into several sections.
Overview
perl Perl overview (this section)
perlintro Perl introduction for beginners
+ man perl5.16.3
+ head -n 20
No manual entry for perl5.16.3
+ man perlbug
+ head -n 20
PERLBUG(1) Perl Programmers Reference Guide PERLBUG(1)
NAME
perlbug - how to submit bug reports on Perl
SYNOPSIS
perlbug
perlbug [ -v ] [ -a address ] [ -s subject ] [ -b body | -f inputfile ] [ -F outputfile ] [ -r returnaddress ] [ -e editor ] [ -c adminaddress | -C ] [ -S ] [ -t ] [ -d ] [ -A ] [ -h ] [ -T ]
perlbug [ -v ] [ -r returnaddress ]
[ -A ] [ -ok | -okay | -nok | -nokay ]
perlthanks
DESCRIPTION
This program is designed to help you generate and send bug reports (and thank-you notes) about perl5 and the modules which ship with it.
+ man perldoc
+ head -n 20
PERLDOC(1) User Contributed Perl Documentation PERLDOC(1)
NAME
perldoc - Look up Perl documentation in Pod format.
SYNOPSIS
perldoc [-h] [-D] [-t] [-u] [-m] [-l] [-F]
[-i] [-V] [-T] [-r]
[-d destination_file]
[-o formatname]
[-M FormatterClassName]
[-w formatteroption:value]
[-n nroff-replacement]
[-X]
[-L language_code]
PageName|ModuleName|ProgramName|URL
Examples:
+ man perlthanks
+ head -n 20
PERLBUG(1) Perl Programmers Reference Guide PERLBUG(1)
NAME
perlbug - how to submit bug reports on Perl
SYNOPSIS
perlbug
perlbug [ -v ] [ -a address ] [ -s subject ] [ -b body | -f inputfile ] [ -F outputfile ] [ -r returnaddress ] [ -e editor ] [ -c adminaddress | -C ] [ -S ] [ -t ] [ -d ] [ -A ] [ -h ] [ -T ]
perlbug [ -v ] [ -r returnaddress ]
[ -A ] [ -ok | -okay | -nok | -nokay ]
perlthanks
DESCRIPTION
This program is designed to help you generate and send bug reports (and thank-you notes) about perl5 and the modules which ship with it.
+ man pgrep
+ head -n 20
PGREP(1) User Commands PGREP(1)
NAME
pgrep, pkill - look up or signal processes based on name and other attributes
SYNOPSIS
pgrep [options] pattern
pkill [options] pattern
DESCRIPTION
pgrep looks through the currently running processes and lists the process IDs which match the selection criteria to stdout. All the criteria have to match. For example,
$ pgrep -u root sshd
will only list the processes called sshd AND owned by root. On the other hand,
$ pgrep -u root,daemon
+ man piconv
+ head -n 20
PICONV(1) User Contributed Perl Documentation PICONV(1)
NAME
piconv -- iconv(1), reinvented in perl
SYNOPSIS
piconv [-f from_encoding] [-t to_encoding]
[-p|--perlqq|--htmlcref|--xmlcref] [-C N|-c] [-D] [-S scheme]
[-s string|file...]
piconv -l
piconv -r encoding_alias
piconv -h
DESCRIPTION
piconv is perl version of iconv, a character encoding converter widely available for various Unixen today. This script was primarily a technology demonstrator for Perl 5.8.0, but you can use piconv in the place of iconv for virtually any case.
piconv converts the character encoding of either STDIN or files specified in the argument and prints out to STDOUT.
+ man pidof
+ head -n 20
PIDOF(8) Linux System Administrator's Manual PIDOF(8)
NAME
pidof -- find the process ID of a running program.
SYNOPSIS
pidof [-s] [-c] [-n] [-x] [-m] [-o omitpid[,omitpid..]] [-o omitpid[,omitpid..]..] program [program..]
DESCRIPTION
Pidof finds the process id's (pids) of the named programs. It prints those id's on the standard output. This program is on some systems used in run-level change scripts, especially when the system has a System-V like rc structure. In that case these scripts are located in /etc/rc?.d, where ? is the runlevel. If the system has a start-stop-daemon (8) program that should be used instead.
OPTIONS
-s Single shot - this instructs the program to only return one pid.
-c Only return process ids that are running with the same root directory. This option is ignored for non-root users, as they will be unable to check the current root directory of processes they do not own.
-n Avoid stat(2) system function call on all binaries which are located on network based file systems like NFS. Instead of using this option the the variable PIDOF_NETFS may be set and exported.
+ man pidstat
+ head -n 20
PIDSTAT(1) Linux User's Manual PIDSTAT(1)
NAME
pidstat - Report statistics for Linux tasks.
SYNOPSIS
pidstat [ -d ] [ -h ] [ -I ] [ -l ] [ -r ] [ -s ] [ -t ] [ -U [ username ] ] [ -u ] [ -V ] [ -w ] [ -C comm ] [ -p { pid [,...] | SELF | ALL } ] [ -T { TASK | CHILD | ALL } ] [ interval [ count ] ]
DESCRIPTION
The pidstat command is used for monitoring individual tasks currently being managed by the Linux kernel. It writes to standard output activities for every task selected with option -p or for every task managed by the Linux kernel if option -p ALL has been used. Not selecting any tasks is equivalent to specifying -p ALL but only active tasks (tasks with non-zero statistics values) will appear in the
report.
The pidstat command can also be used for monitoring the child processes of selected tasks. Read about option -T below.
The interval parameter specifies the amount of time in seconds between each report. A value of 0 (or no parameters at all) indicates that tasks statistics are to be reported for the time since system startup (boot). The count parameter can be specified in conjunction with the interval parameter if this one is not set to zero. The value of count determines the number of reports generated at interval
seconds apart. If the interval parameter is specified without the count parameter, the pidstat command generates reports continuously.
You can select information about specific task activities using flags. Not specifying any flags selects only CPU activity.
+ man ping
+ head -n 20
PING(8) System Manager's Manual: iputils PING(8)
NAME
ping - send ICMP ECHO_REQUEST to network hosts
SYNOPSIS
ping [-aAbBdDfhLnOqrRUvV46] [-c count] [-F flowlabel] [-i interval] [-I interface] [-l preload] [-m mark] [-M pmtudisc_option] [-N nodeinfo_option] [-w deadline] [-W timeout] [-p pattern] [-Q tos] [-s packetsize] [-S sndbuf] [-t ttl] [-T timestamp option] [hop ...] destination
DESCRIPTION
ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of ``pad'' bytes used to fill out the packet.
ping works with both IPv4 and IPv6. Using only one of them explicitly can be enforced by specifying -4 or -6.
ping can also send IPv6 Node Information Queries (RFC4620). Intermediate hops may not be allowed, because IPv6 source routing was deprecated (RFC5095).
OPTIONS
-4 Use IPv4 only.
+ man ping6
+ head -n 20
PING(8) System Manager's Manual: iputils PING(8)
NAME
ping - send ICMP ECHO_REQUEST to network hosts
SYNOPSIS
ping [-aAbBdDfhLnOqrRUvV46] [-c count] [-F flowlabel] [-i interval] [-I interface] [-l preload] [-m mark] [-M pmtudisc_option] [-N nodeinfo_option] [-w deadline] [-W timeout] [-p pattern] [-Q tos] [-s packetsize] [-S sndbuf] [-t ttl] [-T timestamp option] [hop ...] destination
DESCRIPTION
ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of ``pad'' bytes used to fill out the packet.
ping works with both IPv4 and IPv6. Using only one of them explicitly can be enforced by specifying -4 or -6.
ping can also send IPv6 Node Information Queries (RFC4620). Intermediate hops may not be allowed, because IPv6 source routing was deprecated (RFC5095).
OPTIONS
-4 Use IPv4 only.
+ man pip-3
+ head -n 20
No manual entry for pip-3
+ man pip-3.7
+ head -n 20
No manual entry for pip-3.7
+ man pip3
+ head -n 20
No manual entry for pip3
+ man pip3.7
+ head -n 20
No manual entry for pip3.7
+ man pivot_root
+ head -n 20
PIVOT_ROOT(8) System Administration PIVOT_ROOT(8)
NAME
pivot_root - change the root filesystem
SYNOPSIS
pivot_root new_root put_old
DESCRIPTION
pivot_root moves the root file system of the current process to the directory put_old and makes new_root the new root file system. Since pivot_root(8) simply calls pivot_root(2), we refer to the man page of the latter for further details.
Note that, depending on the implementation of pivot_root, root and cwd of the caller may or may not change. The following is a sequence for invoking pivot_root that works in either case, assuming that pivot_root and chroot are in the current PATH:
cd new_root
pivot_root . put_old
exec chroot . command
Note that chroot must be available under the old root and under the new root, because pivot_root may or may not have implicitly changed the root directory of the shell.
+ man pkcs1-conv
+ head -n 20
No manual entry for pkcs1-conv
+ man pkg-config
+ head -n 20
pkg-config(1) General Commands Manual pkg-config(1)
NAME
pkg-config - Return metainformation about installed libraries
SYNOPSIS
pkg-config [--modversion] [--version] [--help] [--atleast-pkgconfig-version=VERSION] [--print-errors] [--short-errors] [--silence-errors] [--errors-to-stdout] [--debug] [--cflags] [--libs] [--libs-only-L] [--libs-only-l] [--cflags-only-I] [--libs-only-other] [--cflags-only-other] [--variable=VARIABLENAME] [--define-variable=VARIABLENAME=VARIABLEVALUE] [--print-variables] [--uninstalled] [--exists]
[--atleast-version=VERSION] [--exact-version=VERSION] [--max-version=VERSION] [--list-all] [LIBRARIES...] [--print-provides] [--print-requires] [--print-requires-private] [LIBRARIES...]
DESCRIPTION
The pkg-config program is used to retrieve information about installed libraries in the system. It is typically used to compile and link against one or more libraries. Here is a typical usage scenario in a Makefile:
program: program.c
cc program.c $(pkg-config --cflags --libs gnomeui)
pkg-config retrieves information about packages from special metadata files. These files are named after the package, and has a .pc extension. On most systems, pkg-config looks in /usr/lib/pkgconfig, /usr/share/pkgconfig, /usr/local/lib/pkgconfig and /usr/local/share/pkgconfig for these files. It will additionally look in the colon-separated (on Windows, semicolon-separated) list of directories spec‐
ified by the PKG_CONFIG_PATH environment variable.
+ man pkill
+ head -n 20
PGREP(1) User Commands PGREP(1)
NAME
pgrep, pkill - look up or signal processes based on name and other attributes
SYNOPSIS
pgrep [options] pattern
pkill [options] pattern
DESCRIPTION
pgrep looks through the currently running processes and lists the process IDs which match the selection criteria to stdout. All the criteria have to match. For example,
$ pgrep -u root sshd
will only list the processes called sshd AND owned by root. On the other hand,
$ pgrep -u root,daemon
+ man pl2pm
+ head -n 20
PL2PM(1) Perl Programmers Reference Guide PL2PM(1)
NAME
pl2pm - Rough tool to translate Perl4 .pl files to Perl5 .pm modules.
SYNOPSIS
pl2pm files
DESCRIPTION
pl2pm is a tool to aid in the conversion of Perl4-style .pl library files to Perl5-style library modules. Usually, your old .pl file will still work fine and you should only use this tool if you plan to update your library to use some of the newer Perl 5 features, such as AutoLoading.
LIMITATIONS
It's just a first step, but it's usually a good first step.
AUTHOR
Larry Wall <[email protected]>
+ man plipconfig
+ head -n 20
PLIPCONFIG(8) Linux System Administrator's Manual PLIPCONFIG(8)
NAME
plipconfig - fine tune PLIP device parameters
SYNOPSIS
plipconfig interface [nibble NN] [trigger NN]
plipconfig [-V] [--version] [-h] [--help]
DESCRIPTION
Plipconfig is used to (hopefully) improve PLIP performance by changing the default timing parameters used by the PLIP protocol. Results are dependent on the parallel port hardware, cable, and the CPU speed of each machine on each end of the PLIP link.
If the single interface argument is given, plipconfig displays the status of the given interface only. Otherwise, it will try to set the options.
OPTIONS
nibble NN
Sets the nibble wait value in microseconds. Default is 3000.
+ man plymouth
+ head -n 20
PLYMOUTH(1) User Commands PLYMOUTH(1)
NAME
plymouth - Send commands to plymouthd
SYNOPSIS
plymouth [OPTION...]
plymouth COMMAND [OPTION...]
DESCRIPTION
The plymouth sends commands to a running plymouthd. This is used during the boot process to control the display of the graphical boot splash.
OPTIONS
The following options are understood. These options are supported for compatibility with the old rhgb-client interface, and have been replaced by the commands that are described in the next section.
--help
Show summary of options.
+ man plymouth-set-default-theme
+ head -n 20
PLYMOUTH-SET-DEFAU(1) User Commands PLYMOUTH-SET-DEFAU(1)
NAME
plymouth-set-default-theme - Set the plymouth theme
SYNOPSIS
plymouth-set-default-theme [OPTION...] [THEME]
DESCRIPTION
When called with a THEME argument, the plymouth-set-default-theme command changes the preferred boot theme and also performs the necessary regeneration of the initial ramdisk (initrd) since plymouth is loaded from the boot loader from the initrd prior to the mounting of the root filesystem.
If plymouth-set-default-theme is invoked with no options or parameters, it shows the currently selected theme by default. This output is used by the helper scripts plymouth-generate-initrd and plymouth-update-initrd to set the proper theme in the initial ramdisk.
OPTIONS
The following options are understood:
-h, --help
Show summary of options.
+ man plymouthd
+ head -n 20
PLYMOUTHD(8) System Administration PLYMOUTHD(8)
NAME
plymouthd - The plymouth daemon
SYNOPSIS
plymouthd [OPTION...]
DESCRIPTION
The plymouthd daemon is usually run out of the initrd. It does the heavy lifting of the plymouth system, logging the session and showing the splash screen.
The plymouth is used to send commands to plymouthd that control its behaviour.
OPTIONS
The following options are understood:
--help
Show summary of options.
+ man pm-hibernate
+ head -n 20
PM-ACTION(8) pm-utils User Manual PM-ACTION(8)
NAME
pm-action - Suspend or Hibernate your computer
SYNOPSIS
pm-hibernate [--help]
pm-suspend [--quirk-*] [--help]
pm-suspend-hybrid [--quirk-*] [--help]
DESCRIPTION
This manual page documents briefly the pm-action, pm-hibernate, pm-suspend and pm-suspend-hybrid commands. This manual page was originally written for the Debian(TM) distribution and has been adopted by the pm-utils project.
These commands can be used to put the machine in a sleep state. The precise way how this is done can be influenced by installing executables and configuration snippets. For some options external programs are needed.
These commands will usually be called by UPower or hald when triggered to do so by a program in a desktop session such as gnome-power-manager. Calling them from the command line is also possible, but it is not guaranteed that all programs in your desktop session keep working as expected.
+ man pm-is-supported
+ head -n 20
PM-IS-SUPPORTED(1) pm-utils User Manual PM-IS-SUPPORTED(1)
NAME
pm-is-supported - Test whether suspend or hibernate is supported.
SYNOPSIS
pm-is-supported [{--suspend | --hibernate | --suspend-hybrid}]
DESCRIPTION
This manual page documents briefly the pm-is-supported command.
The intended purpose of pm-is-supported is to find out which power management modes are supported by the system. hald(8) will call it to do just that. (Note that UPower does not use this.)
OPTIONS
--suspend
Test whether suspend is supported. Suspend is a state where most devices are shutdown, except for RAM. This state still draws power.
--hibernate
+ man pm-powersave
+ head -n 20
PM-POWERSAVE(8) pm-utils User Manual PM-POWERSAVE(8)
NAME
pm-powersave - Put your computer into low power mode
SYNOPSIS
pm-powersave [{true | false}] [--help]
DESCRIPTION
This manual page documents briefly the pm-powersave command.
pm-powersave can be used to set your system into low power mode.
OPTIONS
true
Put the computer into low power mode to reduce energy consumption and extend your laptop´s battery life.
false
+ man pm-suspend
+ head -n 20
PM-ACTION(8) pm-utils User Manual PM-ACTION(8)
NAME
pm-action - Suspend or Hibernate your computer
SYNOPSIS
pm-hibernate [--help]
pm-suspend [--quirk-*] [--help]
pm-suspend-hybrid [--quirk-*] [--help]
DESCRIPTION
This manual page documents briefly the pm-action, pm-hibernate, pm-suspend and pm-suspend-hybrid commands. This manual page was originally written for the Debian(TM) distribution and has been adopted by the pm-utils project.
These commands can be used to put the machine in a sleep state. The precise way how this is done can be influenced by installing executables and configuration snippets. For some options external programs are needed.
These commands will usually be called by UPower or hald when triggered to do so by a program in a desktop session such as gnome-power-manager. Calling them from the command line is also possible, but it is not guaranteed that all programs in your desktop session keep working as expected.
+ man pm-suspend-hybrid
+ head -n 20
PM-ACTION(8) pm-utils User Manual PM-ACTION(8)
NAME
pm-action - Suspend or Hibernate your computer
SYNOPSIS
pm-hibernate [--help]
pm-suspend [--quirk-*] [--help]
pm-suspend-hybrid [--quirk-*] [--help]
DESCRIPTION
This manual page documents briefly the pm-action, pm-hibernate, pm-suspend and pm-suspend-hybrid commands. This manual page was originally written for the Debian(TM) distribution and has been adopted by the pm-utils project.
These commands can be used to put the machine in a sleep state. The precise way how this is done can be influenced by installing executables and configuration snippets. For some options external programs are needed.
These commands will usually be called by UPower or hald when triggered to do so by a program in a desktop session such as gnome-power-manager. Calling them from the command line is also possible, but it is not guaranteed that all programs in your desktop session keep working as expected.
+ man pm-utils-bugreport-info.sh
+ head -n 20
PM-UTILS-BUGREPORT-INFO.SH(8) pm-utils User Manual PM-UTILS-BUGREPORT-INFO.SH(8)
NAME
pm-utils-bugreport-info.sh - Print pm-utils bug report
SYNOPSIS
pm-utils-bugreport-info.sh
DESCRIPTION
pm-utils-bugreport-info.sh can be used to print pm-utils bug report including your HW configuration and pm-utils logs. This can help developers to diagnose problems regarding suspend / hibernate.
SEE ALSO
pm-suspend(8), pm-hibernate(8)
AUTHOR
Jaroslav Škarvada <[email protected]>
Manpage author.
+ man pmap
+ head -n 20
PMAP(1) User Commands PMAP(1)
NAME
pmap - report memory map of a process
SYNOPSIS
pmap [options] pid [...]
DESCRIPTION
The pmap command reports the memory map of a process or processes.
OPTIONS
-x, --extended
Show the extended format.
-d, --device
Show the device format.
+ man pod2html
+ head -n 20
POD2HTML(1) Perl Programmers Reference Guide POD2HTML(1)
NAME
pod2html - convert .pod files to .html files
SYNOPSIS
pod2html --help --htmldir=<name> --htmlroot=<URL>
--infile=<name> --outfile=<name>
--podpath=<name>:...:<name> --podroot=<name>
--cachedir=<name> --flush --recurse --norecurse
--quiet --noquiet --verbose --noverbose
--index --noindex --backlink --nobacklink
--header --noheader --poderrors --nopoderrors
--css=<URL> --title=<name>
DESCRIPTION
Converts files from pod format (see perlpod) to HTML format.
+ man pod2man
+ head -n 20
POD2MAN(1) User Contributed Perl Documentation POD2MAN(1)
NAME
pod2man - Convert POD data to formatted *roff input
SYNOPSIS
pod2man [--center=string] [--date=string] [--errors=style]
[--fixed=font] [--fixedbold=font] [--fixeditalic=font]
[--fixedbolditalic=font] [--name=name] [--nourls]
[--official] [--quotes=quotes] [--release[=version]]
[--section=manext] [--stderr] [--utf8] [--verbose]
[input [output] ...]
pod2man --help
DESCRIPTION
pod2man is a front-end for Pod::Man, using it to generate *roff input from POD source. The resulting *roff code is suitable for display on a terminal using nroff(1), normally via man(1), or printing using troff(1).
+ man pod2text
+ head -n 20
POD2TEXT(1) User Contributed Perl Documentation POD2TEXT(1)
NAME
pod2text - Convert POD data to formatted ASCII text
SYNOPSIS
pod2text [-aclostu] [--code] [--errors=style] [-i indent]
[-q quotes] [--nourls] [--stderr] [-w width]
[input [output ...]]
pod2text -h
DESCRIPTION
pod2text is a front-end for Pod::Text and its subclasses. It uses them to generate formatted ASCII text from POD source. It can optionally use either termcap sequences or ANSI color escape sequences to format the text.
input is the file to read for POD source (the POD can be embedded in code). If input isn't given, it defaults to "STDIN". output, if given, is the file to which to write the formatted output. If output isn't given, the formatted output is written to "STDOUT". Several POD files can be processed in the same pod2text invocation (saving module load and compile times) by providing multiple pairs of
input and output files on the command line.
+ man pod2usage
+ head -n 20
POD2USAGE(1) User Contributed Perl Documentation POD2USAGE(1)
NAME
pod2usage - print usage messages from embedded pod docs in files
SYNOPSIS
pod2usage [-help] [-man] [-exit exitval] [-output outfile] [-verbose level] [-pathlist dirlist] [-formatter module] file
OPTIONS AND ARGUMENTS
-help Print a brief help message and exit.
-man Print this command's manual page and exit.
-exit exitval
The exit status value to return.
-output outfile
The output file to print to. If the special names "-" or ">&1" or ">&STDOUT" are used then standard output is used. If ">&2" or ">&STDERR" is used then standard error is used.
+ man postalias
+ head -n 20
POSTALIAS(1) General Commands Manual POSTALIAS(1)
NAME
postalias - Postfix alias database maintenance
SYNOPSIS
postalias [-Nfinoprsvw] [-c config_dir] [-d key] [-q key]
[file_type:]file_name ...
DESCRIPTION
The postalias(1) command creates or queries one or more Postfix alias databases, or updates an existing one. The input and output file formats are expected to be compatible with Sendmail version 8, and are expected to be suitable for the use as NIS alias maps.
If the result files do not exist they will be created with the same group and other read permissions as their source file.
While a database update is in progress, signal delivery is postponed, and an exclusive, advisory, lock is placed on the entire database, in order to avoid surprises in spectator processes.
The format of Postfix alias input files is described in aliases(5).
+ man postcat
+ head -n 20
POSTCAT(1) General Commands Manual POSTCAT(1)
NAME
postcat - show Postfix queue file contents
SYNOPSIS
postcat [-bdehnoqv] [-c config_dir] [files...]
DESCRIPTION
The postcat(1) command prints the contents of the named files in human-readable form. The files are expected to be in Postfix queue file format. If no files are specified on the command line, the program reads from standard input.
By default, postcat(1) shows the envelope and message content, as if the options -beh were specified. To view message content only, specify -bh (Postfix 2.7 and later).
Options:
-b Show body content. The -b option starts producing output at the first non-header line, and stops when the end of the message is reached.
This feature is available in Postfix 2.7 and later.
+ man postconf
+ head -n 20
POSTCONF(1) General Commands Manual POSTCONF(1)
NAME
postconf - Postfix configuration utility
SYNOPSIS
Managing main.cf:
postconf [-dfhnovx] [-c config_dir] [-C class,...] [parameter ...]
postconf [-ev] [-c config_dir] [parameter=value ...]
postconf [-#vX] [-c config_dir] [parameter ...]
Managing master.cf:
postconf [-fMovx] [-c config_dir] [service ...]
+ man postdrop
+ head -n 20
POSTDROP(1) General Commands Manual POSTDROP(1)
NAME
postdrop - Postfix mail posting utility
SYNOPSIS
postdrop [-rv] [-c config_dir]
DESCRIPTION
The postdrop(1) command creates a file in the maildrop directory and copies its standard input to the file.
Options:
-c config_dir
The main.cf configuration file is in the named directory instead of the default configuration directory. See also the MAIL_CONFIG environment setting below.
-r Use a Postfix-internal protocol for reading the message from standard input, and for reporting status information on standard output. This is currently the only supported method.
+ man postfix
+ head -n 20
POSTFIX(1) General Commands Manual POSTFIX(1)
NAME
postfix - Postfix control program
SYNOPSIS
postfix [-Dv] [-c config_dir] command
DESCRIPTION
This command is reserved for the superuser. To submit mail, use the Postfix sendmail(1) command.
The postfix(1) command controls the operation of the Postfix mail system: start or stop the master(8) daemon, do a health check, and other maintenance.
By default, the postfix(1) command sets up a standardized environment and runs the postfix-script shell script to do the actual work.
However, when support for multiple Postfix instances is configured, postfix(1) executes the command specified with the multi_instance_wrapper configuration parameter. This command will execute the command for each applicable Postfix instance.
The following commands are implemented:
+ man postkick
+ head -n 20
POSTKICK(1) General Commands Manual POSTKICK(1)
NAME
postkick - kick a Postfix service
SYNOPSIS
postkick [-c config_dir] [-v] class service request
DESCRIPTION
The postkick(1) command sends request to the specified service over a local transport channel. This command makes Postfix private IPC accessible for use in, for example, shell scripts.
Options:
-c config_dir
Read the main.cf configuration file in the named directory instead of the default configuration directory.
-v Enable verbose logging for debugging purposes. Multiple -v options make the software increasingly verbose.
+ man postlock
+ head -n 20
POSTLOCK(1) General Commands Manual POSTLOCK(1)
NAME
postlock - lock mail folder and execute command
SYNOPSIS
postlock [-c config_dir] [-l lock_style]
[-v] file command...
DESCRIPTION
The postlock(1) command locks file for exclusive access, and executes command. The locking method is compatible with the Postfix UNIX-style local delivery agent.
Options:
-c config_dir
Read the main.cf configuration file in the named directory instead of the default configuration directory.
-l lock_style
+ man postlog
+ head -n 20
POSTLOG(1) General Commands Manual POSTLOG(1)
NAME
postlog - Postfix-compatible logging utility
SYNOPSIS
postlog [-iv] [-c config_dir] [-p priority] [-t tag] [text...]
DESCRIPTION
The postlog(1) command implements a Postfix-compatible logging interface for use in, for example, shell scripts.
By default, postlog(1) logs the text given on the command line as one record. If no text is specified on the command line, postlog(1) reads from standard input and logs each input line as one record.
Logging is sent to syslogd(8); when the standard error stream is connected to a terminal, logging is sent there as well.
The following options are implemented:
-c config_dir
+ man postmap
+ head -n 20
POSTMAP(1) General Commands Manual POSTMAP(1)
NAME
postmap - Postfix lookup table management
SYNOPSIS
postmap [-Nbfhimnoprsvw] [-c config_dir] [-d key] [-q key]
[file_type:]file_name ...
DESCRIPTION
The postmap(1) command creates or queries one or more Postfix lookup tables, or updates an existing one. The input and output file formats are expected to be compatible with:
makemap file_type file_name < file_name
If the result files do not exist they will be created with the same group and other read permissions as their source file.
While the table update is in progress, signal delivery is postponed, and an exclusive, advisory, lock is placed on the entire table, in order to avoid surprises in spectator processes.
+ man postmulti
+ head -n 20
POSTMULTI(1) General Commands Manual POSTMULTI(1)
NAME
postmulti - Postfix multi-instance manager
SYNOPSIS
ENABLING MULTI-INSTANCE MANAGEMENT:
postmulti -e init [-v]
ITERATOR MODE:
postmulti -l [-aRv] [-g group] [-i name]
postmulti -p [-av] [-g group] [-i name] command...
postmulti -x [-aRv] [-g group] [-i name] command...
+ man postqueue
+ head -n 20
POSTQUEUE(1) General Commands Manual POSTQUEUE(1)
NAME
postqueue - Postfix queue control
SYNOPSIS
postqueue [-v] [-c config_dir] -f
postqueue [-v] [-c config_dir] -i queue_id
postqueue [-v] [-c config_dir] -p
postqueue [-v] [-c config_dir] -s site
DESCRIPTION
The postqueue(1) command implements the Postfix user interface for queue management. It implements operations that are traditionally available via the sendmail(1) command. See the postsuper(1) command for queue operations that require super-user privileges such as deleting a message from the queue or changing the status of a message.
The following options are recognized:
-c config_dir
The main.cf configuration file is in the named directory instead of the default configuration directory. See also the MAIL_CONFIG environment setting below.
+ man postsuper
+ head -n 20
POSTSUPER(1) General Commands Manual POSTSUPER(1)
NAME
postsuper - Postfix superintendent
SYNOPSIS
postsuper [-psSv] [-c config_dir] [-d queue_id]
[-h queue_id] [-H queue_id]
[-r queue_id] [directory ...]
DESCRIPTION
The postsuper(1) command does maintenance jobs on the Postfix queue. Use of the command is restricted to the superuser. See the postqueue(1) command for unprivileged queue operations such as listing or flushing the mail queue.
By default, postsuper(1) performs the operations requested with the -s and -p command-line options on all Postfix queue directories - this includes the incoming, active and deferred directories with mail files and the bounce, defer, trace and flush directories with log files.
Options:
-c config_dir
+ man poweroff
+ head -n 20
HALT(8) halt HALT(8)
NAME
halt, poweroff, reboot - Halt, power-off or reboot the machine
SYNOPSIS
halt [OPTIONS...]
poweroff [OPTIONS...]
reboot [OPTIONS...]
DESCRIPTION
halt, poweroff, reboot may be used to halt, power-off or reboot the machine.
OPTIONS
The following options are understood:
+ man ppp-watch
+ head -n 20
PPP-WATCH(8) System Manager's Manual PPP-WATCH(8)
NAME
ppp-watch - daemon to make PPP interfaces act more like other interfaces
SYNOPSIS
ppp-watch interface-name [boot]
DESCRIPTION
ppp-watch manages one PPP connection, including starting, stopping, and redialing. It makes starting and stopping the connection synchronous activities.
ppp-watch is not really meant to be called directly. It should only be used from within the ifup-ppp script.
OPTIONS
interface-name
The name of the PPP interface to bring up.
boot ppp-watch is being called at boot time and should time out after a while if the PPP connection does not come up in order not to hang the boot sequence.
+ man prlimit
+ head -n 20
PRLIMIT(1) User Commands PRLIMIT(1)
NAME
prlimit - get and set process resource limits
SYNOPSIS
prlimit [options] [--resource[=limits] [--pid PID]
prlimit [options] [--resource[=limits] command [argument...]
DESCRIPTION
Given a process ID and one or more resources, prlimit tries to retrieve and/or modify the limits.
When command is given, prlimit will run this command with the given arguments.
The limits parameter is composed of a soft and a hard value, separated by a colon (:), in order to modify the existing values. If no limits are given, prlimit will display the current values. If one of the values is not given, then the existing one will be used. To specify the unlimited or infinity limit (RLIM_INFINITY), the -1 or 'unlimited' string can be passed.
+ man prtstat
+ head -n 20
PRTSTAT(1) User Commands PRTSTAT(1)
NAME
prtstat - print statistics of a process
SYNOPSIS
prtstat [-r|--raw] pid
prtstat -V|--version
DESCRIPTION
prtstat prints the statistics of the specified process. This information comes from the /proc/PID/stat file.
OPTIONS
-r, --raw
Print the information in raw format.
-V, --version
Show the version information for prtstat.
+ man ps
+ head -n 20
PS(1) User Commands PS(1)
NAME
ps - report a snapshot of the current processes.
SYNOPSIS
ps [options]
DESCRIPTION
ps displays information about a selection of the active processes. If you want a repetitive update of the selection and the displayed information, use top(1) instead.
This version of ps accepts several kinds of options:
1 UNIX options, which may be grouped and must be preceded by a dash.
2 BSD options, which may be grouped and must not be used with a dash.
3 GNU long options, which are preceded by two dashes.
Options of different types may be freely mixed, but conflicts can appear. There are some synonymous options, which are functionally identical, due to the many standards and ps implementations that this ps is compatible with.
+ man psed
+ head -n 20
S2P(1) Perl Programmers Reference Guide S2P(1)
NAME
psed - a stream editor
SYNOPSIS
psed [-an] script [file ...]
psed [-an] [-e script] [-f script-file] [file ...]
s2p [-an] [-e script] [-f script-file]
DESCRIPTION
A stream editor reads the input stream consisting of the specified files (or standard input, if none are given), processes is line by line by applying a script consisting of edit commands, and writes resulting lines to standard output. The filename '"-"' may be used to read standard input.
The edit script is composed from arguments of -e options and script-files, in the given order. A single script argument may be specified as the first parameter.
If this program is invoked with the name s2p, it will act as a sed-to-Perl translator. See "SED SCRIPT TRANSLATION".
+ man psfaddtable
+ head -n 20
PSFADDTABLE(1) General Commands Manual PSFADDTABLE(1)
NAME
psfaddtable - add a Unicode character table to a console font
SYNOPSIS
psfaddtable fontfile tablefile outfile
DESCRIPTION
psfaddtable takes a console font in .psf format given by fontfile and merges it with the Unicode character table given by tablefile to produce a font file with an embedded character table, which is written to outfile. An input file name of "-" denotes standard input, and an output file name of "-" denotes standard output. If the fontfile already contains an embedded character table, it is ignored.
TABLE FILE FORMAT
Each line in the tablefile should be either blank, contain a comment (preceded by #), or contain a sequence of numbers in either decimal (default), octal (preceded by 0), or hexadecimal (preceded by 0x) format, separated by spaces or tabs. The first number on each line indicates the glyph slot in the font that is being referred to, this is between 0 and 0xff for a 256-character font and 0 and 0x1ff
for a 512-character font. Any subsequent numbers on the same line are Unicodes matched by this specific glyph slot. Instead of a single Unicode one may have a sequence of Unicodes separates by commas, to denote that the glyph depicts the corresponding composed symbol. It is permissible to have multiple lines for the same glyph.
SEE ALSO
setfont(8), psfgettable(1), psfstriptable(1), psfxtable(1)
+ man psfgettable
+ head -n 20
PSFGETTABLE(1) General Commands Manual PSFGETTABLE(1)
NAME
psfgettable - extract the embedded Unicode character table from a console font
SYNOPSIS
psfgettable fontfile [outfile]
DESCRIPTION
psfgettable extracts the embedded Unicode character table from a .psf format console font into a human readable ASCII file of the format used by psfaddtable(1). If the font file name is a single dash (-), the font is read from standard input.
SEE ALSO
setfont(8), psfaddtable(1), psfstriptable(1), psfxtable(1)
25 Oct 1994 PSFGETTABLE(1)
+ man psfstriptable
+ head -n 20
PSFSTRIPTABLE(1) General Commands Manual PSFSTRIPTABLE(1)
NAME
psfstriptable - remove the embedded Unicode character table from a console font
SYNOPSIS
psfstriptable fontfile outfile
DESCRIPTION
psfstriptable reads a .psf format console font from fontfile, removes the embedded Unicode font table if there is one, and writes the result to outfile. An input file name of "-" denotes standard input, and an output file name of "-" denotes standard output.
SEE ALSO
setfont(8), psfaddtable(1), psfgettable(1), psfxtable(1)
25 Oct 1994 PSFSTRIPTABLE(1)
+ man psfxtable
+ head -n 20
PSFXTABLE(1) General Commands Manual PSFXTABLE(1)
NAME
psfxtable - handle Unicode character tables for console fonts
SYNOPSIS
psfxtable [-i infont] [-o outfont] [-it intable] [-ot outtable] [-nt]
DESCRIPTION
psfxtable handles the embedded Unicode character table for .psf format console fonts. It reads a font and possibly a table and writes a font and/or a table. psfaddtable(1), psfgettable(1) and psfstriptable(1) are links to it.
Each of the filenames infont, outfont, intable, and outtable may be replaced by a single dash (-), in which case standard input or standard output is used. If no -i option is given, the font is read from standard input. If no -it or -o or -ot option is given, no input table is read or no output font or output table is written.
By default the output font (if any) will have a Unicode table when either the input font has one, or an explicit table (which overrides an input font table) has been provided. The option -nt causes output of a font without table. When outfont is requested it will get a psf1 header when infont has a psf1 header and intable does not have sequences and a psf2 header otherwise.
SEE ALSO
setfont(8), psfaddtable(1), psfgettable(1), psfstriptable(1)
+ man pstree
+ head -n 20
PSTREE(1) User Commands PSTREE(1)
NAME
pstree - display a tree of processes
SYNOPSIS
pstree [-a, --arguments] [-c, --compact] [-h, --highlight-all, -Hpid, --highlight-pid pid] [-g] --show-pgids] [-l, --long] [-n, --numeric-sort] [-N, --ns-sortns [-p, --show-pids] [-s, --show-parents] [-S, --ns-changes] [-u, --uid-changes] [-Z, --security-context] [-A, --ascii, -G, --vt100, -U, --unicode] [pid, user]
pstree -V, --version
DESCRIPTION
pstree shows running processes as a tree. The tree is rooted at either pid or init if pid is omitted. If a user name is specified, all process trees rooted at processes owned by that user are shown.
pstree visually merges identical branches by putting them in square brackets and prefixing them with the repetition count, e.g.
init-+-getty
|-getty
|-getty
`-getty
+ man pstree.x11
+ head -n 20
No manual entry for pstree.x11
+ man pstruct
+ head -n 20
C2PH(1) Perl Programmers Reference Guide C2PH(1)
NAME
c2ph, pstruct - Dump C structures as generated from "cc -g -S" stabs
SYNOPSIS
c2ph [-dpnP] [var=val] [files ...]
OPTIONS
Options:
-w wide; short for: type_width=45 member_width=35 offset_width=8
-x hex; short for: offset_fmt=x offset_width=08 size_fmt=x size_width=04
-n do not generate perl code (default when invoked as pstruct)
-p generate perl code (default when invoked as c2ph)
-v generate perl code, with C decls as comments
+ man pvchange
+ head -n 20
PVCHANGE(8) System Manager's Manual PVCHANGE(8)
NAME
pvchange - Change attributes of physical volume(s)
SYNOPSIS
pvchange option_args position_args
[ option_args ]
DESCRIPTION
pvchange changes PV attributes in the VG.
For options listed in parentheses, any one is required, after which the others are optional.
USAGE
Change properties of all PVs.
pvchange
+ man pvck
+ head -n 20
PVCK(8) System Manager's Manual PVCK(8)
NAME
pvck - Check the consistency of physical volume(s)
SYNOPSIS
pvck position_args
[ option_args ]
DESCRIPTION
pvck checks the LVM metadata for consistency on PVs.
USAGE
pvck PV ...
[ --labelsector Number ]
[ COMMON_OPTIONS ]
Common options for lvm:
+ man pvcreate
+ head -n 20
PVCREATE(8) System Manager's Manual PVCREATE(8)
NAME
pvcreate - Initialize physical volume(s) for use by LVM
SYNOPSIS
pvcreate position_args
[ option_args ]
DESCRIPTION
pvcreate initializes a PV so that it is recognized as belonging to LVM, and allows the PV to be used in a VG. A PV can be a disk partition, whole disk, meta device, or loopback file.
For DOS disk partitions, the partition id should be set to 0x8e using fdisk(8), cfdisk(8), or a equivalent. For GUID Partition Table (GPT), the id is E6D6D379-F507-44C2-A23C-238F2A3DF928. For whole disk devices only the partition table must be erased, which will effectively destroy all data on that disk. This can be done by zeroing the first sector with:
dd if=/dev/zero of=PhysicalVolume bs=512 count=1
Use vgcreate(8) to create a new VG on the PV, or vgextend(8) to add the PV to existing VG.
+ man pvdisplay
+ head -n 20
PVDISPLAY(8) System Manager's Manual PVDISPLAY(8)
NAME
pvdisplay - Display various attributes of physical volume(s)
SYNOPSIS
pvdisplay
[ option_args ]
[ position_args ]
DESCRIPTION
pvdisplay shows the attributes of PVs, like size, physical extent size, space used for the VG descriptor area, etc.
pvs(8) is a preferred alternative that shows the same information and more, using a more compact and configurable output format.
USAGE
pvdisplay
[ -a|--all ]
+ man pvmove
+ head -n 20
PVMOVE(8) System Manager's Manual PVMOVE(8)
NAME
pvmove - Move extents from one physical volume to another
SYNOPSIS
pvmove position_args
[ option_args ]
[ position_args ]
DESCRIPTION
pvmove moves the allocated physical extents (PEs) on a source PV to one or more destination PVs. You can optionally specify a source LV in which case only extents used by that LV will be moved to free (or specified) extents on the destination PV. If no destination PV is specified, the normal allocation rules for the VG are used.
If pvmove is interrupted for any reason (e.g. the machine crashes) then run pvmove again without any PV arguments to restart any operations that were in progress from the last checkpoint. Alternatively, use the abort option at any time to abort the operation. The resulting location of LVs after an abort depends on whether the atomic option was used.
More than one pvmove can run concurrently if they are moving data from different source PVs, but additional pvmoves will ignore any LVs already in the process of being changed, so some data might not get moved.
USAGE
+ man pvremove
+ head -n 20
PVREMOVE(8) System Manager's Manual PVREMOVE(8)
NAME
pvremove - Remove LVM label(s) from physical volume(s)
SYNOPSIS
pvremove position_args
[ option_args ]
DESCRIPTION
pvremove wipes the label on a device so that LVM will no longer recognise it as a PV.
A PV cannot be removed from a VG while it is used by an active LV.
Repeat the force option (-ff) to forcibly remove a PV belonging to an existing VG. Normally, vgreduce(8) should be used instead.
USAGE
pvremove PV ...
+ man pvresize
+ head -n 20
PVRESIZE(8) System Manager's Manual PVRESIZE(8)
NAME
pvresize - Resize physical volume(s)
SYNOPSIS
pvresize position_args
[ option_args ]
DESCRIPTION
pvresize resizes a PV. The PV may already be in a VG and may have active LVs allocated on it.
USAGE
pvresize PV ...
[ --setphysicalvolumesize Size[m|UNIT] ]
[ --reportformat basic|json ]
[ COMMON_OPTIONS ]
+ man pvs
+ head -n 20
PVS(8) System Manager's Manual PVS(8)
NAME
pvs - Display information about physical volumes
SYNOPSIS
pvs
[ option_args ]
[ position_args ]
DESCRIPTION
pvs produces formatted output about PVs.
USAGE
pvs
[ -a|--all ]
[ -o|--options String ]
[ -S|--select String ]
+ man pvscan
+ head -n 20
PVSCAN(8) System Manager's Manual PVSCAN(8)
NAME
pvscan - List all physical volumes
SYNOPSIS
pvscan option_args
[ option_args ]
[ position_args ]
DESCRIPTION
pvscan scans all supported LVM block devices in the system for PVs.
Scanning with lvmetad
pvscan operates differently when used with the lvmetad(8) daemon.
Scanning disks is required to read LVM metadata and identify LVM PVs. Once read, lvmetad caches the metadata so that LVM commands can read it without repeatedly scanning disks. This is helpful because scanning disks is time consuming, and frequent scanning may interfere with the normal work of the system and disks.
+ man pwck
+ head -n 20
PWCK(8) System Management Commands PWCK(8)
NAME
pwck - verify integrity of password files
SYNOPSIS
pwck [options] [passwd [ shadow ]]
DESCRIPTION
The pwck command verifies the integrity of the users and authentication information. It checks that all entries in /etc/passwd and /etc/shadow have the proper format and contain valid data. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors.
Checks are made to verify that each entry has:
· the correct number of fields
· a unique and valid user name
· a valid user and group identifier
+ man pwconv
+ head -n 20
PWCONV(8) System Management Commands PWCONV(8)
NAME
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups
SYNOPSIS
pwconv [options]
pwunconv [options]
grpconv [options]
grpunconv [options]
DESCRIPTION
The pwconv command creates shadow from passwd and an optionally existing shadow.
The pwunconv command creates passwd from passwd and shadow and then removes shadow.
+ man pwdx
+ head -n 20
PWDX(1) User Commands PWDX(1)
NAME
pwdx - report current working directory of a process
SYNOPSIS
pwdx [options] pid [...]
OPTIONS
-V, --version
Output version information and exit.
-h, --help
Output help screen and exit.
SEE ALSO
ps(1), pgrep(1)
+ man pwhistory_helper
+ head -n 20
PWHISTORY_HELPER(8) Linux-PAM Manual PWHISTORY_HELPER(8)
NAME
pwhistory_helper - Helper binary that transfers password hashes from passwd or shadow to opasswd
SYNOPSIS
pwhistory_helper [...]
DESCRIPTION
pwhistory_helper is a helper program for the pam_pwhistory module that transfers password hashes from passwd or shadow file to the opasswd file and checks a password supplied by user against the existing hashes in the opasswd file.
The purpose of the helper is to enable tighter confinement of login and password changing services. The helper is thus called only when SELinux is enabled on the system.
The interface of the helper - command line options, and input/output data format are internal to the pam_pwhistory module and it should not be called directly from applications.
SEE ALSO
pam_pwhistory(8)
+ man pwmake
+ head -n 20
PWMAKE(1) General Commands Manual PWMAKE(1)
NAME
pwmake - simple tool for generating random relatively easily pronounceable passwords
SYNOPSIS
pwmake <entropy-bits>
DESCRIPTION
pwmake is a simple configurable tool for generating random and relatively easily pronounceable passwords. The tool allows you to specify the number of entropy bits that are used to generate the password.
The entropy is pulled from /dev/urandom.
The minimum number of bits is 56 which is usable for passwords on systems/services where brute force attacks are of very limited rate of tries. The 64 bits should be adequate for applications where the attacker does not have direct access to the password hash file. For situations where the attacker might obtain the direct access to the password hash or the password is used as an encryption key 80 to
128 bits should be used depending on your level of paranoia.
OPTIONS
+ man pwscore
+ head -n 20
PWSCORE(1) General Commands Manual PWSCORE(1)
NAME
pwscore - simple configurable tool for checking quality of a password
SYNOPSIS
pwscore [user]
DESCRIPTION
pwscore is a simple tool for checking quality of a password. The password is read from stdin.
The tool uses the libpwquality library to perform configurable checks for minimum length, dictionary checking against cracklib dictionaries, and other checks.
It either reports an error if the password fails any of the checks, or it prints out the password quality score as an integer value between 0 and 100.
The password quality score is relative to the minlen setting in the configuration file. But in general values below 50 can be treated as moderate quality and above it fairly strong quality. Any password that passes the quality checks (especially the mandatory cracklib check) should withstand dictionary attacks and scores above 50 with the default minlen setting even fast brute force attacks.
+ man pwunconv
+ head -n 20
PWCONV(8) System Management Commands PWCONV(8)
NAME
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups
SYNOPSIS
pwconv [options]
pwunconv [options]
grpconv [options]
grpunconv [options]
DESCRIPTION
The pwconv command creates shadow from passwd and an optionally existing shadow.
The pwunconv command creates passwd from passwd and shadow and then removes shadow.
+ man pydoc3
+ head -n 20
No manual entry for pydoc3
+ man pydoc3.7
+ head -n 20
No manual entry for pydoc3.7
+ man pyrsa-decrypt
+ head -n 20
No manual entry for pyrsa-decrypt
+ man pyrsa-decrypt-2
+ head -n 20
No manual entry for pyrsa-decrypt-2
+ man pyrsa-decrypt-bigfile
+ head -n 20
No manual entry for pyrsa-decrypt-bigfile
+ man pyrsa-decrypt-bigfile-2
+ head -n 20
No manual entry for pyrsa-decrypt-bigfile-2
+ man pyrsa-encrypt
+ head -n 20
No manual entry for pyrsa-encrypt
+ man pyrsa-encrypt-2
+ head -n 20
No manual entry for pyrsa-encrypt-2
+ man pyrsa-encrypt-bigfile
+ head -n 20
No manual entry for pyrsa-encrypt-bigfile
+ man pyrsa-encrypt-bigfile-2
+ head -n 20
No manual entry for pyrsa-encrypt-bigfile-2
+ man pyrsa-keygen
+ head -n 20
No manual entry for pyrsa-keygen
+ man pyrsa-keygen-2
+ head -n 20
No manual entry for pyrsa-keygen-2
+ man pyrsa-priv2pub
+ head -n 20
No manual entry for pyrsa-priv2pub
+ man pyrsa-priv2pub-2
+ head -n 20
No manual entry for pyrsa-priv2pub-2
+ man pyrsa-sign
+ head -n 20
No manual entry for pyrsa-sign
+ man pyrsa-sign-2
+ head -n 20
No manual entry for pyrsa-sign-2
+ man pyrsa-verify
+ head -n 20
No manual entry for pyrsa-verify
+ man pyrsa-verify-2
+ head -n 20
No manual entry for pyrsa-verify-2
+ man pystache
+ head -n 20
No manual entry for pystache
+ man pystache-3
+ head -n 20
No manual entry for pystache-3
+ man pystache-test
+ head -n 20
No manual entry for pystache-test
+ man pystache-test-3
+ head -n 20
No manual entry for pystache-test-3
+ man python-config
+ head -n 20
No manual entry for python-config
+ man python2-config
+ head -n 20
No manual entry for python2-config
+ man python2.7-config
+ head -n 20
No manual entry for python2.7-config
+ man python3
+ head -n 20
PYTHON(1) General Commands Manual PYTHON(1)
NAME
python - an interpreted, interactive, object-oriented programming language
SYNOPSIS
python [ -B ] [ -b ] [ -d ] [ -E ] [ -h ] [ -i ] [ -I ]
[ -m module-name ] [ -q ] [ -O ] [ -OO ] [ -s ] [ -S ] [ -u ]
[ -v ] [ -V ] [ -W argument ] [ -x ] [ [ -X option ] -? ]
[ --check-hash-based-pycs default | always | never ]
[ -c command | script | - ] [ arguments ]
DESCRIPTION
Python is an interpreted, interactive, object-oriented programming language that combines remarkable power with very clear syntax. For an introduction to programming in Python, see the Python Tutorial. The Python Library Reference documents built-in and standard types, constants, functions and modules. Finally, the Python Reference Manual describes the syntax and semantics of the core language in
(perhaps too) much detail. (These documents may be located via the INTERNET RESOURCES below; they may be installed on your system as well.)
Python's basic power can be extended with your own modules written in C or C++. On most systems such modules may be dynamically loaded. Python is also adaptable as an extension language for existing applications. See the internal documentation for hints.
+ man python3.7
+ head -n 20
PYTHON(1) General Commands Manual PYTHON(1)
NAME
python - an interpreted, interactive, object-oriented programming language
SYNOPSIS
python [ -B ] [ -b ] [ -d ] [ -E ] [ -h ] [ -i ] [ -I ]
[ -m module-name ] [ -q ] [ -O ] [ -OO ] [ -s ] [ -S ] [ -u ]
[ -v ] [ -V ] [ -W argument ] [ -x ] [ [ -X option ] -? ]
[ --check-hash-based-pycs default | always | never ]
[ -c command | script | - ] [ arguments ]
DESCRIPTION
Python is an interpreted, interactive, object-oriented programming language that combines remarkable power with very clear syntax. For an introduction to programming in Python, see the Python Tutorial. The Python Library Reference documents built-in and standard types, constants, functions and modules. Finally, the Python Reference Manual describes the syntax and semantics of the core language in
(perhaps too) much detail. (These documents may be located via the INTERNET RESOURCES below; they may be installed on your system as well.)
Python's basic power can be extended with your own modules written in C or C++. On most systems such modules may be dynamically loaded. Python is also adaptable as an extension language for existing applications. See the internal documentation for hints.
+ man python3.7m
+ head -n 20
No manual entry for python3.7m
+ man pyvenv
+ head -n 20
No manual entry for pyvenv
+ man pyvenv-3.7
+ head -n 20
No manual entry for pyvenv-3.7
+ man quot
+ head -n 20
QUOT(8) System Manager's Manual QUOT(8)
NAME
quot - summarize filesystem ownership
SYNOPSIS
quot [ -acfguvi ] [ filesystem... ]
DESCRIPTION
quot displays the number of kilobytes in the named filesystem currently owned by each user or group. Note that this utility currently works only for XFS.
OPTIONS
-a Generate a report for all mounted filesystems giving the number of kilobytes used by each user or group.
-c Display three columns giving file size in kilobytes, number of files of that size, and cumulative total of kilobytes in that size or smaller file. The last row is used as an overflow bucket and is the total of all files greater than 500 kilobytes.
-f Display count of kilobytes and number of files owned by each user or group.
+ man quota
+ head -n 20
QUOTA(1) General Commands Manual QUOTA(1)
NAME
quota - display disk usage and limits
SYNOPSIS
quota [ -F format-name ] [ -guqvswi ] [ -l | [ -QAm ]]
quota [ -F format-name ] [ -qvswi ] [ -l | [ -QAm ]] -u user...
quota [ -F format-name ] [ -qvswi ] [ -l | [ -QAm ]] -g group...
quota [ -F format-name ] [ -qvswugQm ] -f filesystem...
DESCRIPTION
quota displays users' disk usage and limits. By default only the user quotas are printed.
quota reports the quotas of all the filesystems listed in /etc/mtab. For filesystems that are NFS-mounted a call to the rpc.rquotad on the server machine is performed to get the information.
OPTIONS
-F, --format=format-name
+ man quotacheck
+ head -n 20
quotacheck(8) System Manager's Manual quotacheck(8)
NAME
quotacheck - scan a filesystem for disk usage, create, check and repair quota files
SYNOPSIS
quotacheck [ -gubcfinvdMmR ] [ -F quota-format ] -a | filesystem
DESCRIPTION
quotacheck examines each filesystem, builds a table of current disk usage, and compares this table against that recorded in the disk quota file for the filesystem (this step is omitted if option -c is specified). If any inconsistencies are detected, both the quota file and the current system copy of the incorrect quotas are updated (the latter only occurs if an active filesystem is checked which is not
advised). By default, only user quotas are checked. quotacheck expects each filesystem to be checked to have quota files named [a]quota.user and [a]quota.group located at the root of the associated filesystem. If a file is not present, quotacheck will create it.
If the quota file is corrupted, quotacheck tries to save as much data as possible. Rescuing data may need user intervention. With no additional options quotacheck will simply exit in such a situation. When in interactive mode (option -i) , the user is asked for advice. Advice can also be provided from command line (see option -n) , which is useful when quotacheck is run automatically (ie. from script)
and failure is unacceptable.
quotacheck should be run each time the system boots and mounts non-valid filesystems. This is most likely to happen after a system crash.
It is strongly recommended to run quotacheck with quotas turned off for the filesystem. Otherwise, possible damage or loss to data in the quota files can result. It is also unwise to run quotacheck on a live filesystem as actual usage may change during the scan. To prevent this, quotacheck tries to remount the filesystem read-only before starting the scan. After the scan is done it remounts the
+ man quotaoff
+ head -n 20
QUOTAON(8) System Manager's Manual QUOTAON(8)
NAME
quotaon, quotaoff - turn filesystem quotas on and off
SYNOPSIS
/usr/sbin/quotaon [ -vugfp ] [ -F format-name ] filesystem...
/usr/sbin/quotaon [ -avugfp ] [ -F format-name ]
/usr/sbin/quotaoff [ -vugp ] [ -x state ] filesystem...
/usr/sbin/quotaoff [ -avugp ]
DESCRIPTION
quotaon
quotaon announces to the system that disk quotas should be enabled on one or more filesystems. The filesystem quota files must be present in the root directory of the specified filesystem and be named either aquota.user (for version 2 user quota), quota.user (for version 1 user quota), aquota.group (for version 2 group quota), or quota.group (for version 1 group quota).
XFS filesystems are a special case - XFS considers quota information as filesystem metadata and uses journaling to provide a higher level guarantee of consistency. There are two components to the XFS disk quota system: accounting and limit enforcement. XFS filesystems require that quota accounting be turned on at mount time. It is possible to enable and disable limit enforcement on an XFS filesystem
after quota accounting is already turned on. The default is to turn on both accounting and enforcement.
+ man quotaon
+ head -n 20
QUOTAON(8) System Manager's Manual QUOTAON(8)
NAME
quotaon, quotaoff - turn filesystem quotas on and off
SYNOPSIS
/usr/sbin/quotaon [ -vugfp ] [ -F format-name ] filesystem...
/usr/sbin/quotaon [ -avugfp ] [ -F format-name ]
/usr/sbin/quotaoff [ -vugp ] [ -x state ] filesystem...
/usr/sbin/quotaoff [ -avugp ]
DESCRIPTION
quotaon
quotaon announces to the system that disk quotas should be enabled on one or more filesystems. The filesystem quota files must be present in the root directory of the specified filesystem and be named either aquota.user (for version 2 user quota), quota.user (for version 1 user quota), aquota.group (for version 2 group quota), or quota.group (for version 1 group quota).
XFS filesystems are a special case - XFS considers quota information as filesystem metadata and uses journaling to provide a higher level guarantee of consistency. There are two components to the XFS disk quota system: accounting and limit enforcement. XFS filesystems require that quota accounting be turned on at mount time. It is possible to enable and disable limit enforcement on an XFS filesystem
after quota accounting is already turned on. The default is to turn on both accounting and enforcement.
+ man quotastats
+ head -n 20
QUOTASTATS(8) quota QUOTASTATS(8)
NAME
quotastats - Program to query quota statistics
SYNOPSIS
/usr/sbin/quotastats
DESCRIPTION
quotastats queries the kernel for quota statistics. It displays:
· Supported kernel quota version
· Number of dquot lookups
· Number of dquot drops
· Number of dquot reads
· Number of dquot writes
· Number of quotafile syncs
· Number of dquot cache hits
+ man quotasync
+ head -n 20
QUOTASYNC(1) General Commands Manual QUOTASYNC(1)
NAME
quotasync - synchronize in-kernel file system usage and limits to disk format
SYNOPSIS
quotasync [ -ug ] mount-point...
quotasync [ -ug ] -a
quotasync -h | -V
DESCRIPTION
quotasync flushes file system usage and limits from kernel memory to quota files stored in the file system. By default only the user quotas are synchronized.
This tool can be useful if you want to display accurate quotas by tools that parse quota files, like repquota(8).
OPTIONS
-u, --user
Synchronize user usage and limits.
+ man quote
+ head -n 20
No manual entry for quote
+ man quote_readline
+ head -n 20
No manual entry for quote_readline
+ man raid-check
+ head -n 20
No manual entry for raid-check
+ man ranlib
+ head -n 20
RANLIB(1) GNU Development Tools RANLIB(1)
NAME
ranlib - generate index to archive.
SYNOPSIS
ranlib [--plugin name] [-DhHvVt] archive
DESCRIPTION
ranlib generates an index to the contents of an archive and stores it in the archive. The index lists each symbol defined by a member of an archive that is a relocatable object file.
You may use nm -s or nm --print-armap to list this index.
An archive with such an index speeds up linking to the library and allows routines in the library to call each other without regard to their placement in the archive.
The GNU ranlib program is another form of GNU ar; running ranlib is completely equivalent to executing ar -s.
OPTIONS
+ man raw
+ head -n 20
RAW(8) System Administration RAW(8)
NAME
raw - bind a Linux raw character device
SYNOPSIS
raw /dev/raw/raw<N> <major> <minor>
raw /dev/raw/raw<N> /dev/<blockdev>
raw -q /dev/raw/raw<N>
raw -qa
DESCRIPTION
raw is used to bind a Linux raw character device to a block device. Any block device may be used: at the time of binding, the device driver does not even have to be accessible (it may be loaded on demand as a kernel module later).
raw is used in two modes: it either sets raw device bindings, or it queries existing bindings. When setting a raw device, /dev/raw/raw<N> is the device name of an existing raw device node in the filesystem. The block device to which it is to be bound can be specified either in terms of its major and minor device numbers, or as a path name /dev/<blockdev> to an existing block device file.
+ man rdate
+ head -n 20
RDATE(1) Red Hat RDATE(1)
NAME
rdate - get the time via the network
SYNOPSIS
rdate [-p] [-s] [-u] [-l] [-t sec] [host...]
DESCRIPTION
rdate connects to an RFC 868 time server over a TCP/IP network, printing the returned time and/or setting the system clock.
OPTIONS
-p Print the time returned by the remote machine.
-s Set the system time to the returned time.
-u Use UDP instead of TCP as the transport.
+ man rdisc
+ head -n 20
RDISC(8) System Manager's Manual: iputils RDISC(8)
NAME
rdisc - network router discovery daemon
SYNOPSIS
rdisc [-abdfrstvV] [-p preference] [-T max_interval] [send_address] [receive_address]
DESCRIPTION
rdisc implements client side of the ICMP router discover protocol. rdisc is invoked at boot time to populate the network routing tables with default routes.
rdisc listens on the ALL_HOSTS (224.0.0.1) multicast address (or receive_address provided it is given) for ROUTER_ADVERTISE messages from routers. The received messages are handled by first ignoring those listed router addresses with which the host does not share a network. Among the remaining addresses the ones with the highest preference are selected as default routers and a default route is entered
in the kernel routing table for each one of them.
Optionally, rdisc can avoid waiting for routers to announce themselves by sending out a few ROUTER_SOLICITATION messages to the ALL_ROUTERS (224.0.0.2) multicast address (or send_address provided it is given) when it is started.
A timer is associated with each router address and the address will no longer be considered for inclusion in the the routing tables if the timer expires before a new advertise message is received from the router. The address will also be excluded from consideration if the host receives an advertise message with the preference being maximally negative.
+ man rdma
+ head -n 20
RDMA(8) Linux RDMA(8)
NAME
rdma - RDMA tool
SYNOPSIS
rdma [ OPTIONS ] OBJECT { COMMAND | help }
OBJECT := { dev | link }
OPTIONS := { -V[ersion] | -d[etails] } -j[son] } -p[retty] }
OPTIONS
-V, -Version
Print the version of the rdma tool and exit.
+ man readelf
+ head -n 20
READELF(1) GNU Development Tools READELF(1)
NAME
readelf - Displays information about ELF files.
SYNOPSIS
readelf [-a|--all]
[-h|--file-header]
[-l|--program-headers|--segments]
[-S|--section-headers|--sections]
[-g|--section-groups]
[-t|--section-details]
[-e|--headers]
[-s|--syms|--symbols]
[--dyn-syms]
[-n|--notes]
[-r|--relocs]
[-u|--unwind]
+ man readprofile
+ head -n 20
READPROFILE(8) System Administration READPROFILE(8)
NAME
readprofile - read kernel profiling information
SYNOPSIS
readprofile [options]
VERSION
This manpage documents version 2.0 of the program.
DESCRIPTION
The readprofile command uses the /proc/profile information to print ascii data on standard output. The output is organized in three columns: the first is the number of clock ticks, the second is the name of the C function in the kernel where those many ticks occurred, and the third is the normalized `load' of the procedure, calculated as a ratio between the number of ticks and the length of the proce‐
dure. The output is filled with blanks to ease readability.
OPTIONS
-a, --all
Print all symbols in the mapfile. By default the procedures with reported ticks are not printed.
+ man reboot
+ head -n 20
HALT(8) halt HALT(8)
NAME
halt, poweroff, reboot - Halt, power-off or reboot the machine
SYNOPSIS
halt [OPTIONS...]
poweroff [OPTIONS...]
reboot [OPTIONS...]
DESCRIPTION
halt, poweroff, reboot may be used to halt, power-off or reboot the machine.
OPTIONS
The following options are understood:
+ man recode-sr-latin
+ head -n 20
RECODE-SR-LATIN(1) GNU RECODE-SR-LATIN(1)
NAME
recode-sr-latin - convert Serbian text from Cyrillic to Latin script
SYNOPSIS
recode-sr-latin [OPTION]
DESCRIPTION
Recode Serbian text from Cyrillic to Latin script. The input text is read from standard input. The converted text is output to standard output.
Informative output:
-h, --help
display this help and exit
-V, --version
output version information and exit
+ man red
+ head -n 20
ED(1) User Commands ED(1)
NAME
Ed - line-oriented text editor
SYNOPSIS
ed [options] [file]
DESCRIPTION
GNU Ed - The GNU line editor.
OPTIONS
-h, --help
display this help and exit
-V, --version
output version information and exit
+ man rename
+ head -n 20
RENAME(1) User Commands RENAME(1)
NAME
rename - rename files
SYNOPSIS
rename [options] expression replacement file...
DESCRIPTION
rename will rename the specified files by replacing the first occurrence of expression in their name by replacement.
OPTIONS
-s, --symlink
Do not rename a symlink but its target.
-v, --verbose
Show which files where renamed, if any.
+ man renice
+ head -n 20
RENICE(1) User Commands RENICE(1)
NAME
renice - alter priority of running processes
SYNOPSIS
renice [-n] priority [-g|-p|-u] identifier...
DESCRIPTION
renice alters the scheduling priority of one or more running processes. The first argument is the priority value to be used. The other arguments are interpreted as process IDs (by default), process group IDs, user IDs, or user names. renice'ing a process group causes all processes in the process group to have their scheduling priority altered. renice'ing a user causes all processes owned by the
user to have their scheduling priority altered.
OPTIONS
-n, --priority priority
Specify the scheduling priority to be used for the process, process group, or user. Use of the option -n or --priority is optional, but when used it must be the first argument.
-g, --pgrp
Interpret the succeeding arguments as process group IDs.
+ man repo-graph
+ head -n 20
repo-graph(1) repo-graph(1)
NAME
repo-graph - output a full package dependency graph in dot format
SYNOPSIS
repo-graph [options]
DESCRIPTION
repo-graph is a program that generates a full package dependency list from a yum repository and outputs it in dot format.
OPTIONS
-h, --help
Display a help message, and then quit.
--repoid=REPOID
Specify repo ids to query, can be specified multiple times (default is all enabled).
+ man repo-rss
+ head -n 20
repo-rss(1) repo-rss(1)
NAME
repo-rss - generates an RSS feed from one or more Yum repositories
SYNOPSIS
repo-rss [options] repoid1 [repoid2...]
DESCRIPTION
repo-rss is a program for generating RSS feeds for one or more Yum repositories.
GENERAL OPTIONS
-h, --help
Help; display a help message and then quit.
-f <file>
Specify the file to which the RSS will be written. Default is repo-rss.xml.
+ man repoclosure
+ head -n 20
repoclosure(1) repoclosure(1)
NAME
repoclosure - display a list of unresolved dependencies for a yum repository
SYNOPSIS
repoclosure [options]
DESCRIPTION
repoclosure is a program that reads package metadata from one or more yum repositories, checks all dependencies, and displays a list of packages with unresolved dependencies.
OPTIONS
-h, --help
Display a help message, and then quit.
-c CONFIG, --config=CONFIG
Config file to use (defaults to /etc/yum.conf).
+ man repodiff
+ head -n 20
repodiff(1) repodiff(1)
NAME
repodiff - list differences between two or more Yum repositories
SYNOPSIS
repodiff --old=old_repo_baseurl --new=new_repo_baseurl
DESCRIPTION
repodiff is a program which will list differences between two sets of repositories. Note that by default only source packages are compared.
GENERAL OPTIONS
--old, -o
Add a repo. as an old repo. Note that if you prefix the url with "mirror:" then the following url is treated as a mirror and not a baseurl.
--new, -n
Add a repo. as an new repo. Note that if you prefix the url with "mirror:" then the following url is treated as a mirror and not a baseurl.
+ man repomanage
+ head -n 20
repomanage(1) repomanage(1)
NAME
repomanage - list the newest or oldest RPM packages in a directory
SYNOPSIS
repomanage [options] directory
DESCRIPTION
repomanage is a program to manage a directory of RPM packages. It displays a list of the newest or oldest packages in a directory for easy piping to xargs or similar programs.
OPTIONS
-h, --help
Display a help message, and then quit.
-o, --old
Print the oldest packages.
+ man repoquery
+ head -n 20
repoquery(1) repoquery(1)
NAME
repoquery - query information from Yum repositories
SYNOPSIS
repoquery [options] <item ...>
repoquery -a [options]
DESCRIPTION
repoquery is a program for querying information from YUM repositories similarly to rpm queries.
GENERAL OPTIONS
--querytags
List valid queryformat tags and exit..
--version
Report program version and exit.
+ man reposync
+ head -n 20
reposync(1) reposync(1)
NAME
reposync - synchronize yum repositories to a local directory
SYNOPSIS
reposync [options]
DESCRIPTION
reposync is used to synchronize a remote yum repository to a local directory, using yum to retrieve the packages.
OPTIONS
-h, --help
Display a help message, and then quit.
-c CONFIG, --config=CONFIG
Config file to use (defaults to /etc/yum.conf).
+ man repotrack
+ head -n 20
repotrack(1) repotrack(1)
NAME
repotrack - track a package and its dependencies and download them
SYNOPSIS
repotrack [options] package1 [package2...]
DESCRIPTION
repotrack is a program for keeping track of a particular package and its dependencies. It will download one or more packages and all dependencies.
OPTIONS
-h, --help
Display a help message, and then quit.
-c CONFIG, --config=CONFIG
Config file to use (defaults to /etc/yum.conf).
+ man repquota
+ head -n 20
REPQUOTA(8) System Manager's Manual REPQUOTA(8)
NAME
repquota - summarize quotas for a filesystem
SYNOPSIS
/usr/sbin/repquota [ -vspiug ] [ -c | -C ] [ -t | -n ] [ -F format-name ] filesystem...
/usr/sbin/repquota [ -avtpsiug ] [ -c | -C ] [ -t | -n ] [ -F format-name ]
DESCRIPTION
repquota prints a summary of the disc usage and quotas for the specified file systems. For each user the current number of files and amount of space (in kilobytes) is printed, along with any quota limits set with edquota(8) or setquota(8). In the second column repquota prints two characters marking which limits are exceeded. If user is over his space softlimit or reaches his space hardlimit in case
softlimit is unset, the first character is '+'. Otherwise the character printed is '-'. The second character denotes the state of inode usage analogously.
repquota has to translate ids of all users/groups to names (unless option -n was specified) so it may take a while to print all the information. To make translating as fast as possible repquota tries to detect (by reading /etc/nsswitch.conf) whether entries are stored in standard plain text file or in a database and either translates chunks of 1024 names or each name individually. You can override this
autodetection by -c or -C options.
OPTIONS
+ man request-key
+ head -n 20
REQUEST-KEY(8) Linux Key Management Utilities REQUEST-KEY(8)
NAME
request-key - Handle key instantiation callback requests from the kernel
SYNOPSIS
/sbin/request-key <op> <key> <uid> <gid> <threadring> <processring> <sessionring> [<info>]
DESCRIPTION
This program is invoked by the kernel when the kernel is asked for a key that it doesn't have immediately available. The kernel creates a partially set up key and then calls out to this program to instantiate it. It is not intended to be called directly.
ERRORS
All errors will be logged to the syslog.
FILES
/etc/request-key.conf Instantiation handler configuration file.
/etc/request-key.d/<keytype>.conf Keytype specific configuration file.
+ man resize2fs
+ head -n 20
RESIZE2FS(8) System Manager's Manual RESIZE2FS(8)
NAME
resize2fs - ext2/ext3/ext4 file system resizer
SYNOPSIS
resize2fs [ -fFpPM ] [ -d debug-flags ] [ -S RAID-stride ] device [ size ]
DESCRIPTION
The resize2fs program will resize ext2, ext3, or ext4 file systems. It can be used to enlarge or shrink an unmounted file system located on device. If the filesystem is mounted, it can be used to expand the size of the mounted filesystem, assuming the kernel supports on-line resizing. (As of this writing, the Linux 2.6 kernel supports on-line resize for filesystems mounted using ext3 and ext4.).
The size parameter specifies the requested new size of the filesystem. If no units are specified, the units of the size parameter shall be the filesystem blocksize of the filesystem. Optionally, the size parameter may be suffixed by one of the following units designators: 'K', 'M', 'G', 'T' (either upper-case or lower-case) or 's' for power-of-two kilobytes, megabytes, gigabytes, terabytes or 512
byte sectors respectively. The size of the filesystem may never be larger than the size of the partition. If size parameter is not specified, it will default to the size of the partition.
The resize2fs program does not manipulate the size of partitions. If you wish to enlarge a filesystem, you must make sure you can expand the size of the underlying partition first. This can be done using fdisk(8) by deleting the partition and recreating it with a larger size or using lvextend(8), if you're using the logical volume manager lvm(8). When recreating the partition, make sure you create
it with the same starting disk cylinder as before! Otherwise, the resize operation will certainly not work, and you may lose your entire filesystem. After running fdisk(8), run resize2fs to resize the ext2 filesystem to use all of the space in the newly enlarged partition.
If you wish to shrink an ext2 partition, first use resize2fs to shrink the size of filesystem. Then you may use fdisk(8) to shrink the size of the partition. When shrinking the size of the partition, make sure you do not make it smaller than the new size of the ext2 filesystem!
+ man resizepart
+ head -n 20
RESIZEPART(8) System Administration RESIZEPART(8)
NAME
resizepart - tell the kernel about the new size of a partition
SYNOPSIS
resizepart device partition length
DESCRIPTION
resizepart tells the Linux kernel about the new size of the specified partition. The command is a simple wrapper around the "resize partition" ioctl.
This command doesn't manipulate partitions on a block device.
PARAMETERS
device The disk device.
partition
+ man restorecon
+ head -n 20
restorecon(8) restorecon(8)
NAME
restorecon - restore file(s) default SELinux security contexts.
SYNOPSIS
restorecon [-R] [-n] [-p] [-v] [-e directory] pathname...
restorecon -f infilename [-e directory] [-R] [-n] [-p] [-v] [-F]
DESCRIPTION
This manual page describes the restorecon program.
This program is primarily used to set the security context (extended attributes) on one or more files.
It can also be run at any other time to correct inconsistent labels, to add support for newly-installed policy or, by using the -n option, to passively check whether the file contexts are all set as specified by the active policy (default behavior).
+ man rev
+ head -n 20
REV(1) User Commands REV(1)
NAME
rev - reverse lines characterwise
SYNOPSIS
rev [option] [file...]
DESCRIPTION
The rev utility copies the specified files to standard output, reversing the order of characters in every line. If no files are specified, standard input is read.
OPTIONS
-V, --version
Display version information and exit.
-h, --help
Display help text and exit.
+ man rmail
+ head -n 20
No manual entry for rmail
+ man rmail.postfix
+ head -n 20
No manual entry for rmail.postfix
+ man rmmod
+ head -n 20
RMMOD(8) rmmod RMMOD(8)
NAME
rmmod - Simple program to remove a module from the Linux Kernel
SYNOPSIS
rmmod [-f] [-s] [-v] [modulename]
DESCRIPTION
rmmod is a trivial program to remove a module (when module unloading support is provided) from the kernel. Most users will want to use modprobe(8) with the -r option instead.
OPTIONS
-v, --verbose
Print messages about what the program is doing. Usually rmmod prints messages only if something goes wrong.
-f, --force
This option can be extremely dangerous: it has no effect unless CONFIG_MODULE_FORCE_UNLOAD was set when the kernel was compiled. With this option, you can remove modules which are being used, or which are not designed to be removed, or have been marked as unsafe (see lsmod(8)).
+ man rnano
+ head -n 20
RNANO(1) General Commands Manual RNANO(1)
NAME
rnano - a restricted nano
SYNOPSIS
rnano [options] [[+line[,column]] file]...
DESCRIPTION
rnano runs the nano editor in restricted mode. This allows editing only the specified file or files, and doesn't allow the user access to the filesystem nor to a command shell.
In restricted mode, nano will:
· not read any nanorc files;
· not allow suspending;
+ man rngd
+ head -n 20
RNGD(8) System Manager's Manual RNGD(8)
NAME
rngd - Check and feed random data from hardware device to kernel random device
SYNOPSIS
rngd [-b, --background] [-f, --foreground] [-d, --debug] [-l, --list] [-x, --exclude] [-n, --include] [-O, --option] [-i, --ignorefail] [-o, --random-device=file] [-p, --pid-file=file] [-r, --rng-device=file] [-s, --random-step=nnn] [-t, --test] [-W, --fill-watermark=nnn] [-q, --quiet] [-?, --help] [-V, --version]
DESCRIPTION
This daemon feeds data from a random number generator to the kernel's random number entropy pool, after first checking the data to ensure that it is properly random.
The -f or --foreground options can be used to tell rngd to avoid forking on startup. This is typically used for debugging. The -b or --background options, which fork and put rngd into the background automatically, are the default.
The -r or --rng-device options can be used to select an alternate source of input, besides the default /dev/hwrng. The -o or --random-device options can be used to select an alternate entropy output device, besides the default /dev/random. Note that this device must support the Linux kernel /dev/random ioctl API.
OPTIONS
+ man rngtest
+ head -n 20
RNGTEST(1) General Commands Manual RNGTEST(1)
NAME
rngtest - Check the randomness of data using FIPS 140-2 tests
SYNOPSIS
rngtest [-c n | --blockcount=n] [-b n | --blockstats=n] [-t n | --timedstats=n] [-p | --pipe] [-?] [--help] [-V] [--version]
DESCRIPTION
rngtest works on blocks of 20000 bits at a time, using the FIPS 140-2 (errata of 2001-10-10) tests to verify the randomness of the block of data.
It takes input from stdin, and outputs statistics to stderr, optionally echoing blocks that passed the FIPS tests to stdout (when operating in pipe mode). Errors are sent to stderr.
At startup, rngtest will trow away the first 32 bits of data when operating in pipe mode. It will use the next 32 bits of data to bootstrap the FIPS tests (even when not operating in pipe mode). These bits are not tested for randomness.
Statistics are dumped to stderr when the program exits.
+ man route
+ head -n 20
ROUTE(8) Linux System Administrator's Manual ROUTE(8)
NAME
route - show / manipulate the IP routing table
SYNOPSIS
route [-CFvnNee] [-A family |-4|-6]
route [-v] [-A family |-4|-6] add [-net|-host] target [netmask Nm] [gw Gw] [metric N] [mss M] [window W] [irtt I] [reject] [mod] [dyn] [reinstate] [[dev] If]
route [-v] [-A family |-4|-6] del [-net|-host] target [gw Gw] [netmask Nm] [metric N] [[dev] If]
route [-V] [--version] [-h] [--help]
NOTE
This program is obsolete. For replacement check ip route.
+ man routef
+ head -n 20
ROUTEL(8) Linux ROUTEL(8)
NAME
routel - list routes with pretty output format
routef - flush routes
SYNTAX
routel [tablenr [raw ip args...]]
routef
DESCRIPTION
These programs are a set of helper scripts you can use instead of raw iproute2 commands.
The routel script will list routes in a format that some might consider easier to interpret then the ip route list equivalent.
The routef script does not take any arguments and will simply flush the routing table down the drain. Beware! This means deleting all routes which will make your network unusable!
AUTHORS
The routel script was written by Stephen R. van den Berg <[email protected]>, 1999/04/18 and donated to the public domain.
+ man routel
+ head -n 20
ROUTEL(8) Linux ROUTEL(8)
NAME
routel - list routes with pretty output format
routef - flush routes
SYNTAX
routel [tablenr [raw ip args...]]
routef
DESCRIPTION
These programs are a set of helper scripts you can use instead of raw iproute2 commands.
The routel script will list routes in a format that some might consider easier to interpret then the ip route list equivalent.
The routef script does not take any arguments and will simply flush the routing table down the drain. Beware! This means deleting all routes which will make your network unusable!
AUTHORS
The routel script was written by Stephen R. van den Berg <[email protected]>, 1999/04/18 and donated to the public domain.
+ man rpc.gssd
+ head -n 20
rpc.gssd(8) System Manager's Manual rpc.gssd(8)
NAME
rpc.gssd - RPCSEC_GSS daemon
SYNOPSIS
rpc.gssd [-DfMnlvr] [-k keytab] [-p pipefsdir] [-d ccachedir] [-t timeout] [-R realm]
INTRODUCTION
The RPCSEC_GSS protocol, defined in RFC 5403, is used to provide strong security for RPC-based protocols such as NFS.
Before exchanging RPC requests using RPCSEC_GSS, an RPC client must establish a GSS security context. A security context is shared state on each end of a network transport that enables GSS-API security services.
Security contexts are established using security credentials. A credential grants temporary access to a secure network service, much as a railway ticket grants temporary access to use a rail service.
A user typically obtains a credential by providing a password to the kinit(1) command, or via a PAM library at login time. A credential acquired with a user principal is known as a user credential (see kerberos(1) for more on principals).
For certain operations, a credential is required which represents no user, is otherwise unprivileged, and is always available. This is referred to as a machine credential.
+ man rpc.idmapd
+ head -n 20
RPC.IDMAPD(8) BSD System Manager's Manual RPC.IDMAPD(8)
NAME
rpc.idmapd — NFSv4 ID <-> Name Mapper
SYNOPSIS
rpc.idmapd [-h] [-f] [-v] [-C] [-S] [-p path] [-c path]
DESCRIPTION
rpc.idmapd is the NFSv4 ID <-> name mapping daemon. It provides functionality to the NFSv4 kernel client and server, to which it communicates via upcalls, by translating user and group IDs to names, and vice versa.
Note that on more recent kernels only the NFSv4 server uses rpc.idmapd. The NFSv4 client instead uses nfsidmap(8), and only falls back to rpc.idmapd if there was a problem running the nfsidmap(8) program.
The options are as follows:
-h Display usage message.
-v Increases the verbosity level (can be specified multiple times).
-f Runs rpc.idmapd in the foreground and prints all output to the terminal.
+ man rpc.mountd
+ head -n 20
rpc.mountd(8) System Manager's Manual rpc.mountd(8)
NAME
rpc.mountd - NFS mount daemon
SYNOPSIS
/usr/sbin/rpc.mountd [options]
DESCRIPTION
The rpc.mountd daemon implements the server side of the NFS MOUNT protocol, an NFS side protocol used by NFS version 2 [RFC1094] and NFS version 3 [RFC1813].
An NFS server maintains a table of local physical file systems that are accessible to NFS clients. Each file system in this table is referred to as an exported file system, or export, for short.
Each file system in the export table has an access control list. rpc.mountd uses these access control lists to determine whether an NFS client is permitted to access a given file system. For details on how to manage your NFS server's export table, see the exports(5) and exportfs(8) man pages.
Mounting exported NFS File Systems
The NFS MOUNT protocol has several procedures. The most important of these are MNT (mount an export) and UMNT (unmount an export).
+ man rpc.nfsd
+ head -n 20
rpc.nfsd(8) System Manager's Manual rpc.nfsd(8)
NAME
rpc.nfsd - NFS server process
SYNOPSIS
/usr/sbin/rpc.nfsd [options] nproc
DESCRIPTION
The rpc.nfsd program implements the user level part of the NFS service. The main functionality is handled by the nfsd kernel module. The user space program merely specifies what sort of sockets the kernel service should listen on, what NFS versions it should support, and how many kernel threads it should use.
The rpc.mountd server provides an ancillary service needed to satisfy mount requests by NFS clients.
OPTIONS
-d or --debug
enable logging of debugging messages
-H or --host hostname
+ man rpc.rquotad
+ head -n 20
RQUOTAD(8) System Manager's Manual RQUOTAD(8)
NAME
rpc.rquotad - remote quota server
SYNOPSIS
/usr/sbin/rpc.rquotad [ -FI ] [ -p port ] [ -s | -S ] [ -x path ]
/usr/sbin/rpc.rquotad [ -h | -V ]
DESCRIPTION
rpc.rquotad is an rpc(3) server which returns quotas for a user of a local filesystem which is mounted by a remote machine over the NFS. It also allows setting of quotas on NFS mounted filesystem (if configured during compilation and allowed by a command line option -S). The results are used by quota(1) to display user quotas for remote filesystems and by edquota(8) to set quotas on remote filesys‐
tems. rquotad daemon uses tcp-wrappers library (under service name rquotad) which allows you to specify hosts allowed/disallowed to use the daemon (see hosts.allow(5) manpage for more information). The rquotad daemon is normally started at boot time from the system startup scripts.
OPTIONS
-h, --help
Show program usage and exit. -V, --version Show version of quota tools.
+ man rpc.statd
+ head -n 20
RPC.STATD(8) System Manager's Manual RPC.STATD(8)
NAME
rpc.statd - NSM service daemon
SYNOPSIS
rpc.statd [-dh?FLNvV] [-H prog] [-n my-name] [-o outgoing-port]
[-p listener-port] [-P path]
[--nlm-port port] [--nlm-udp-port port]
DESCRIPTION
File locks are not part of persistent file system state. Lock state is thus lost when a host reboots.
Network file systems must also detect when lock state is lost because a remote host has rebooted. After an NFS client reboots, an NFS server must release all file locks held by applications that were running on that client. After a server reboots, a client must remind the server of file locks held by applications running on that client.
For NFS version 2 [RFC1094] and NFS version 3 [RFC1813], the Network Status Monitor protocol (or NSM for short) is used to notify NFS peers of reboots. On Linux, two separate user-space components constitute the NSM service:
rpc.statd
+ man rpcbind
+ head -n 20
mdoc warning: Unknown list type `Aurelien' (or missing list type)
in .Bl macro
Usage: .Bl {-hang | -ohang | -tag | -diag | -inset}
[-width <string>]
[-offset <string>] [-compact]
.Bl -column [-offset <string>] <string1> <string2> ...
.Bl {-item | -enum [-nested] | -bullet | -hyphen | -dash}
[-offset <string>] [-compact] (#148)
mdoc warning: extraneous .El call (#149)
RPCBIND(8) BSD System Manager's Manual RPCBIND(8)
NAME
rpcbind — universal addresses to RPC program number mapper
SYNOPSIS
rpcbind [-adhiLls]
DESCRIPTION
The rpcbind utility is a server that converts RPC program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine.
When an RPC service is started, it tells rpcbind the address at which it is listening, and the RPC program numbers it is prepared to serve. When a client wishes to make an RPC call to a given program number, it first contacts rpcbind on the server machine to determine the address where RPC requests should be sent.
The rpcbind utility should be started before any other RPC service. Normally, standard RPC servers are started by port monitors, so rpcbind must be started before port monitors are invoked.
When rpcbind is started, it checks that certain name-to-address translation-calls function correctly. If they fail, the network configuration databases may be corrupt. Since RPC services cannot function correctly in this situation, rpcbind reports the condition and terminates.
The rpcbind utility can only be started by the super-user.
+ man rpcdebug
+ head -n 20
rpcdebug(8) System Manager's Manual rpcdebug(8)
NAME
rpcdebug - set and clear NFS and RPC kernel debug flags
SYNOPSIS
rpcdebug -vh
rpcdebug -m module
rpcdebug -m module -s flags...
rpcdebug -m module -c flags...
DESCRIPTION
The rpcdebug command allows an administrator to set and clear the Linux kernel's NFS client and server debug flags. Setting these flags causes the kernel to emit messages to the system log in response to NFS activity; this is typically useful when debugging NFS problems.
The first form in the synopsis can be used to list all available debug flags. The second form shows the currently set debug flags for the given module. The third form sets one or more flags, and the fourth form clears one or more flags.
The value all may be used to set or clear all the flags for the given module.
+ man rpcinfo
+ head -n 20
RPCINFO(8) BSD System Manager's Manual RPCINFO(8)
NAME
rpcinfo — report RPC information
SYNOPSIS
rpcinfo [-m | -s] [host]
rpcinfo -p [host]
rpcinfo -T transport host prognum [versnum]
rpcinfo -l [-T transport] host prognum versnum
rpcinfo [-n portnum] -u host prognum [versnum]
rpcinfo [-n portnum] [-t] host prognum [versnum]
rpcinfo -a serv_address -T transport prognum [versnum]
rpcinfo -b [-T transport] prognum versnum
rpcinfo -d [-T transport] prognum versnum
DESCRIPTION
rpcinfo makes an RPC call to an RPC server and reports what it finds.
In the first synopsis, rpcinfo lists all the registered RPC services with rpcbind on host. If host is not specified, the local host is the default. If -s is used, the information is displayed in a concise format.
+ man rst2html
+ head -n 20
No manual entry for rst2html
+ man rst2html-3
+ head -n 20
No manual entry for rst2html-3
+ man rst2html-3.7
+ head -n 20
No manual entry for rst2html-3.7
+ man rst2html4-3
+ head -n 20
No manual entry for rst2html4-3
+ man rst2html4-3.7
+ head -n 20
No manual entry for rst2html4-3.7
+ man rst2html5-3
+ head -n 20
No manual entry for rst2html5-3
+ man rst2html5-3.7
+ head -n 20
No manual entry for rst2html5-3.7
+ man rst2latex
+ head -n 20
No manual entry for rst2latex
+ man rst2latex-3
+ head -n 20
No manual entry for rst2latex-3
+ man rst2latex-3.7
+ head -n 20
No manual entry for rst2latex-3.7
+ man rst2man
+ head -n 20
No manual entry for rst2man
+ man rst2man-3
+ head -n 20
No manual entry for rst2man-3
+ man rst2man-3.7
+ head -n 20
No manual entry for rst2man-3.7
+ man rst2odt
+ head -n 20
No manual entry for rst2odt
+ man rst2odt-3
+ head -n 20
No manual entry for rst2odt-3
+ man rst2odt-3.7
+ head -n 20
No manual entry for rst2odt-3.7
+ man rst2odt_prepstyles
+ head -n 20
No manual entry for rst2odt_prepstyles
+ man rst2odt_prepstyles-3
+ head -n 20
No manual entry for rst2odt_prepstyles-3
+ man rst2odt_prepstyles-3.7
+ head -n 20
No manual entry for rst2odt_prepstyles-3.7
+ man rst2pseudoxml
+ head -n 20
No manual entry for rst2pseudoxml
+ man rst2pseudoxml-3
+ head -n 20
No manual entry for rst2pseudoxml-3
+ man rst2pseudoxml-3.7
+ head -n 20
No manual entry for rst2pseudoxml-3.7
+ man rst2s5
+ head -n 20
No manual entry for rst2s5
+ man rst2s5-3
+ head -n 20
No manual entry for rst2s5-3
+ man rst2s5-3.7
+ head -n 20
No manual entry for rst2s5-3.7
+ man rst2xetex
+ head -n 20
No manual entry for rst2xetex
+ man rst2xetex-3
+ head -n 20
No manual entry for rst2xetex-3
+ man rst2xetex-3.7
+ head -n 20
No manual entry for rst2xetex-3.7
+ man rst2xml
+ head -n 20
No manual entry for rst2xml
+ man rst2xml-3
+ head -n 20
No manual entry for rst2xml-3
+ man rst2xml-3.7
+ head -n 20
No manual entry for rst2xml-3.7
+ man rstpep2html
+ head -n 20
No manual entry for rstpep2html
+ man rstpep2html-3
+ head -n 20
No manual entry for rstpep2html-3
+ man rstpep2html-3.7
+ head -n 20
No manual entry for rstpep2html-3.7
+ man rsync
+ head -n 20
rsync(1) rsync(1)
NAME
rsync - a fast, versatile, remote (and local) file-copying tool
SYNOPSIS
Local: rsync [OPTION...] SRC... [DEST]
Access via remote shell:
Pull: rsync [OPTION...] [USER@]HOST:SRC... [DEST]
Push: rsync [OPTION...] SRC... [USER@]HOST:DEST
Access via rsync daemon:
Pull: rsync [OPTION...] [USER@]HOST::SRC... [DEST]
rsync [OPTION...] rsync://[USER@]HOST[:PORT]/SRC... [DEST]
Push: rsync [OPTION...] SRC... [USER@]HOST::DEST
rsync [OPTION...] SRC... rsync://[USER@]HOST[:PORT]/DEST
+ man rsyslog-recover-qi.pl
+ head -n 20
No manual entry for rsyslog-recover-qi.pl
+ man rsyslogd
+ head -n 20
RSYSLOGD(8) Linux System Administration RSYSLOGD(8)
NAME
rsyslogd - reliable and extended syslogd
SYNOPSIS
rsyslogd [ -d ] [ -D ] [ -f config file ] [ -i pid file ] [ -n ] [ -N level ] [ -C ] [ -v ]
DESCRIPTION
Rsyslogd is a system utility providing support for message logging. Support of both internet and unix domain sockets enables this utility to support both local and remote logging.
Note that this version of rsyslog ships with extensive documentation in html format. This is provided in the ./doc subdirectory and probably in a separate package if you installed rsyslog via a packaging system. To use rsyslog's advanced features, you need to look at the html documentation, because the man pages only covers basic aspects of operation. For details and configuration examples, see the
rsyslog.conf (5) man page and the online documentation at http://www.rsyslog.com/doc
Rsyslogd(8) is derived from the sysklogd package which in turn is derived from the stock BSD sources.
Rsyslogd provides a kind of logging that many modern programs use. Every logged message contains at least a time and a hostname field, normally a program name field, too, but that depends on how trusty the logging program is. The rsyslog package supports free definition of output formats via templates. It also supports precise timestamps and writing directly to databases. If the database option is
used, tools like phpLogCon can be used to view the log data.
+ man rtacct
+ head -n 20
RTACCT(8) System Manager's Manual RTACCT(8)
NAME
nstat, rtacct - network statistics tools.
SYNOPSIS
Usage: nstat [ -h?vVzrnasd:t: ] [ PATTERN [ PATTERN ] ]
Usage: rtacct [ -h?vVzrnasd:t: ] [ ListOfRealms ]
DESCRIPTION
nstat and rtacct are simple tools to monitor kernel snmp counters and network interface statistics.
OPTIONS
-h, --help Print help
+ man rtcwake
+ head -n 20
RTCWAKE(8) System Administration RTCWAKE(8)
NAME
rtcwake - enter a system sleep state until specified wakeup time
SYNOPSIS
rtcwake [options] [-d device] [-m standby_mode] {-s seconds|-t time_t}
DESCRIPTION
This program is used to enter a system sleep state and to automatically wake from it at a specified time.
This uses cross-platform Linux interfaces to enter a system sleep state, and leave it no later than a specified time. It uses any RTC framework driver that supports standard driver model wakeup flags.
This is normally used like the old apmsleep utility, to wake from a suspend state like ACPI S1 (standby) or S3 (suspend-to-RAM). Most platforms can implement those without analogues of BIOS, APM, or ACPI.
On some systems, this can also be used like nvram-wakeup, waking from states like ACPI S4 (suspend to disk). Not all systems have persistent media that are appropriate for such suspend modes.
Note that alarm functionality depends on hardware; not every RTC is able to setup an alarm up to 24 hours in the future.
+ man rtmon
+ head -n 20
RTMON(8) System Manager's Manual RTMON(8)
NAME
rtmon - listens to and monitors RTnetlink
SYNOPSIS
rtmon [ options ] file FILE [ all | LISTofOBJECTS ]
DESCRIPTION
This manual page documents briefly the rtmon command.
rtmon listens on netlink socket and monitors routing table changes.
rtmon can be started before the first network configuration command is issued. For example if you insert:
rtmon file /var/log/rtmon.log
in a startup script, you will be able to view the full history later. Certainly, it is possible to start rtmon at any time. It prepends the history with the state snapshot dumped at the moment of starting.
+ man rtpr
+ head -n 20
RTPR(8) System Manager's Manual RTPR(8)
NAME
rtpr - replace backslashes with newlines.
DESCRIPTION
rtpr is a trivial bash script which converts backslashes in standard input to newlines. It's sole purpose is to be fed with input from ip when executed with it's --oneline flag.
EXAMPLES
ip --oneline address show | rtpr
Undo oneline converted ip-address output.
SEE ALSO
ip(8)
+ man rtstat
+ head -n 20
LNSTAT(8) System Manager's Manual LNSTAT(8)
NAME
lnstat - unified linux network statistics
SYNOPSIS
lnstat [options]
DESCRIPTION
This manual page documents briefly the lnstat command.
lnstat is a generalized and more feature-complete replacement for the old rtstat program. It is commonly used to periodically print a selection of statistical values exported by the kernel. In addition to routing cache statistics, it supports any kind of statistics the linux kernel exports via a file in /proc/net/stat/.
Each file in /proc/net/stat/ contains a header line listing the column names. These names are used by lnstat as keys for selecting which statistics to print. For every CPU present in the system, a line follows which lists the actual values for each column of the file. lnstat sums these values up (which in fact are counters) before printing them. After each interval, only the difference to the last
value is printed.
Files and columns may be selected by using the -f and -k parameters. By default, all columns of all files are printed.
+ man run-parts
+ head -n 20
man: can't open /usr/share/man/man/man4/crontabs.4: No such file or directory
CRONTABS(4) Crontabs users' Manual CRONTABS(4)
NAME
crontabs - configuration and scripts for running periodical jobs
SYNOPSIS
run-parts [--list|--test]<directory>
DESCRIPTION
Crontabs is a historical name for the run-parts script and the system crontab. The run-parts script runs all executables in the specified directory. Run-parts runs all executables in the specified directory. The execution of files can be allowed or denied by creating file jobs.allow or jobs.deny which worked similar as other allow/deny config files. The file must be created in the specified
directory.
--list print names of all files (not limited to executables), but don't run them. This option can't be used with test option.
--test print names of files, which would be run.
Randomization of jobs can be configured in the /etc/sysconfig/run-parts file. To enable randomization of jobs, set the RANDOMIZE parameter to 1 and set the RANDOM parameter to an integer which determines a random seed. Additionally, you may configure the RANDOMTIME parameter (again, by specifying an integer) to provide an additional level of randomization. Jobs are not randomized when the RANDOM
and RANDOMTIME parameters are set to 0. Values in these two parameters must be set to 1 or larger to provide a good enough randomization.
+ man runlevel
+ head -n 20
RUNLEVEL(8) runlevel RUNLEVEL(8)
NAME
runlevel - Print previous and current SysV runlevel
SYNOPSIS
runlevel [options...]
DESCRIPTION
runlevel prints the previous and current SysV runlevel if they are known.
The two runlevel characters are separated by a single space character. If a runlevel cannot be determined, N is printed instead. If neither can be determined, the word "unknown" is printed.
Unless overridden in the environment, this will check the utmp database for recent runlevel changes.
OPTIONS
The following option is understood:
+ man runuser
+ head -n 20
RUNUSER(1) User Commands RUNUSER(1)
NAME
runuser - run a command with substitute user and group ID
SYNOPSIS
runuser [options] -u user [[--] command [argument...]]
runuser [options] [-] [user [argument...]]
DESCRIPTION
runuser allows to run commands with a substitute user and group ID. If the option -u is not given, it falls back to su-compatible semantics and a shell is executed. The difference between the commands runuser and su is that runuser does not ask for a password (because it may be executed by the root user only) and it uses a different PAM configuration. The command runuser does not have to be
installed with set-user-ID permissions.
If the PAM session is not required then recommended solution is to use setpriv(1) command.
When called without arguments, runuser defaults to running an interactive shell as root.
+ man rvim
+ head -n 20
VIM(1) General Commands Manual VIM(1)
NAME
vim - Vi IMproved, a programmer's text editor
SYNOPSIS
vim [options] [file ..]
vim [options] -
vim [options] -t tag
vim [options] -q [errorfile]
ex gex
view
gvim gview vimx evim eview
rvim rview rgvim rgview
DESCRIPTION
Vim is a text editor that is upwards compatible to Vi. It can be used to edit all kinds of plain text. It is especially useful for editing programs.
+ man s2p
+ head -n 20
S2P(1) Perl Programmers Reference Guide S2P(1)
NAME
psed - a stream editor
SYNOPSIS
psed [-an] script [file ...]
psed [-an] [-e script] [-f script-file] [file ...]
s2p [-an] [-e script] [-f script-file]
DESCRIPTION
A stream editor reads the input stream consisting of the specified files (or standard input, if none are given), processes is line by line by applying a script consisting of edit commands, and writes resulting lines to standard output. The filename '"-"' may be used to read standard input.
The edit script is composed from arguments of -e options and script-files, in the given order. A single script argument may be specified as the first parameter.
If this program is invoked with the name s2p, it will act as a sed-to-Perl translator. See "SED SCRIPT TRANSLATION".
+ man sa
+ head -n 20
SA(8) System Manager's Manual SA(8)
NAME
sa - summarizes accounting information
SYNOPSIS
sa [ -a | --list-all-names ]
[ -b | --sort-sys-user-div-calls ]
[ -c | --percentages ] [ -d | --sort-avio ]
[ -D | --sort-tio ] [ -f | --not-interactive ]
[ -i | --dont-read-summary-files ]
[ -j | --print-seconds ] [ -k | --sort-cpu-avmem ]
[ -K | --sort-ksec ] [ -l | --separate-times ]
[ -m | --user-summary ] [ -n | --sort-num-calls ]
[ -p | --show-paging ] [ -P | --show-paging-avg ]
[ -r | --reverse-sort ] [ -s | --merge ]
[ -t | --print-ratio ] [ -u | --print-users ]
[ -v num | --threshold num ] [ --sort-real-time ]
+ man sadf
+ head -n 20
SADF(1) Linux User's Manual SADF(1)
NAME
sadf - Display data collected by sar in multiple formats.
SYNOPSIS
sadf [ -C ] [ -d | -j | -p | -x ] [ -H ] [ -h ] [ -T | -t | -U ] [ -V ] [ -P { cpu [,...] | ALL } ] [ -s [ hh:mm:ss ] ] [ -e [ hh:mm:ss ] ] [ -- sar_options ] [ interval [ count ] ] [ datafile ]
DESCRIPTION
The sadf command is used for displaying the contents of data files created by the sar(1) command. But unlike sar, sadf can write its data in many different formats (CSV, XML, etc.) The default format is one that can easily be handled by pattern processing commands like awk (see option -p).
The sadf command extracts and writes to standard output records saved in the datafile file. This file must have been created by a version of sar which is compatible with that of sadf. If datafile is omitted, sadf uses the standard system activity file, the /var/log/sa/sadd file, where the dd parameter indicates the current day.
The interval and count parameters are used to tell sadf to select count records at interval seconds apart. If the count parameter is not set, then all the records saved in the data file will be displayed.
All the activity flags of sar may be entered on the command line to indicate which activities are to be reported. Before specifying them, put a pair of dashes (--) on the command line in order not to confuse the flags with those of sadf. Not specifying any flags selects only CPU activity.
+ man safe_finger
+ head -n 20
SAFE_FINGER(8) Linux Programmer's Manual SAFE_FINGER(8)
NAME
safe_finger - finger client wrapper that protects against nasty stuff from finger servers
SYNOPSIS
safe_finger [finger_options]
DESCRIPTION
The safe_finger command protects against nasty stuff from finger servers. Use this program for automatic reverse finger probes from the tcp_wrapper (tcpd) , not the raw finger command. The safe_finger command makes sure that the finger client is not run with root privileges. It also runs the finger client with a defined PATH environment. safe_finger will also protect you from problems caused by the
output of some finger servers. The problem: some programs may react to stuff in the first column. Other programs may get upset by thrash anywhere on a line. File systems may fill up as the finger server keeps sending data. Text editors may bomb out on extremely long lines. The finger server may take forever because it is somehow wedged. safe_finger takes care of all this badness.
SEE ALSO
hosts_access(5), hosts_options(5), tcpd(8)
AUTHOR
Wietse Venema, Eindhoven University of Technology, The Netherlands.
+ man sar
+ head -n 20
SAR(1) Linux User's Manual SAR(1)
NAME
sar - Collect, report, or save system activity information.
SYNOPSIS
sar [ -A ] [ -B ] [ -b ] [ -C ] [ -d ] [ -F ] [ -H ] [ -h ] [ -p ] [ -q ] [ -R ] [ -r ] [ -S ] [ -t ] [ -u [ ALL ] ] [ -V ] [ -v ] [ -W ] [ -w ] [ -y ] [ -I { int [,...] | SUM | ALL | XALL } ] [ -P { cpu [,...] | ALL } ] [ -m { keyword [,...] | ALL } ] [ -n { keyword [,...] | ALL } ] [ -j { ID | LABEL | PATH | UUID | ... } ] [ -f [ filename ] | -o [ filename ] | -[0-9]+ ] [ -i interval ] [ -s [
hh:mm:ss ] ] [ -e [ hh:mm:ss ] ] [ interval [ count ] ]
DESCRIPTION
The sar command writes to standard output the contents of selected cumulative activity counters in the operating system. The accounting system, based on the values in the count and interval parameters, writes information the specified number of times spaced at the specified intervals in seconds. If the interval parameter is set to zero, the sar command displays the average statistics for the time
since the system was started. If the interval parameter is specified without the count parameter, then reports are generated continuously. The collected data can also be saved in the file specified by the -o filename flag, in addition to being displayed onto the screen. If filename is omitted, sar uses the standard system activity daily data file, the /var/log/sa/sadd file, where the dd parameter
indicates the current day. By default all the data available from the kernel are saved in the data file.
The sar command extracts and writes to standard output records previously saved in a file. This file can be either the one specified by the -f flag or, by default, the standard system activity daily data file. It is also possible to enter -1, -2 etc. as an argument to sar to display data of that days ago. For example, -1 will point at the standard system activity file of yesterday.
Without the -P flag, the sar command reports system-wide (global among all processors) statistics, which are calculated as averages for values expressed as percentages, and as sums otherwise. If the -P flag is given, the sar command reports activity which relates to the specified processor or processors. If -P ALL is given, the sar command reports statistics for each individual processor and global
statistics among all processors.
+ man scl
+ head -n 20
<standard input>:12: a newline character is not allowed in an escape name
scl(1) General Commands Manual scl(1)
NAME
scl - Setup and run software from Software Collection environment
SYNOPSIS
scl <action> <collection1> [<collection2> ...] <command>
scl <action> <collection1> [<collection2> ...] -- <command>
scl {-l|--list} [<collection1> <collection2> ...]
scl register <path>
scl deregister <collection> [--force]
DESCRIPTION
This manual page documents scl, a program which is an utility for running software packaged as a Software Collection.
+ man scl_enabled
+ head -n 20
No manual entry for scl_enabled
+ man scl_source
+ head -n 20
No manual entry for scl_source
+ man scp
+ head -n 20
mdoc warning: .Ek found without .Bk before (#42)
SCP(1) BSD General Commands Manual SCP(1)
NAME
scp — secure copy (remote file copy program)
SYNOPSIS
scp [-12346BCpqrTv] [-c cipher] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-S program] [[user@]host1:]file1 ... [[user@]host2:]file2
DESCRIPTION
scp copies files between hosts on a network. It uses ssh(1) for data transfer, and uses the same authentication and provides the same security as ssh(1). scp will ask for passwords or passphrases if they are needed for authentication.
File names may contain a user and host specification to indicate that the file is to be copied to/from that host. Local file names can be made explicit using absolute or relative pathnames to avoid scp treating file names containing ‘:’ as host specifiers. Copies between two remote hosts are also permitted.
The options are as follows:
-1 Forces scp to use protocol 1.
-2 Forces scp to use protocol 2.
-3 Copies between two remote hosts are transferred through the local host. Without this option the data is copied directly between the two remote hosts. Note that this option disables the progress meter.
+ man screen
+ head -n 20
SCREEN(1) General Commands Manual SCREEN(1)
NAME
screen - screen manager with VT100/ANSI terminal emulation
SYNOPSIS
screen [ -options ] [ cmd [ args ] ]
screen -r [[pid.]tty[.host]]
screen -r sessionowner/[[pid.]tty[.host]]
DESCRIPTION
Screen is a full-screen window manager that multiplexes a physical terminal between several processes (typically interactive shells). Each virtual terminal provides the functions of a DEC VT100 terminal and, in addition, several control functions from the ISO 6429 (ECMA 48, ANSI X3.64) and ISO 2022 standards (e.g. insert/delete line and support for multiple character sets). There is a scrollback his‐
tory buffer for each virtual terminal and a copy-and-paste mechanism that allows moving text regions between windows.
+ man script
+ head -n 20
SCRIPT(1) User Commands SCRIPT(1)
NAME
script - make typescript of terminal session
SYNOPSIS
script [options] [file]
DESCRIPTION
script makes a typescript of everything displayed on your terminal. It is useful for students who need a hardcopy record of an interactive session as proof of an assignment, as the typescript file can be printed out later with lpr(1).
If the argument file is given, script saves the dialogue in this file. If no filename is given, the dialogue is saved in the file typescript.
OPTIONS
-a, --append
Append the output to file or to typescript, retaining the prior contents.
-c, --command command
+ man scriptreplay
+ head -n 20
SCRIPTREPLAY(1) User Commands SCRIPTREPLAY(1)
NAME
scriptreplay - play back typescripts, using timing information
SYNOPSIS
scriptreplay [options] [-t] timingfile [typescript [divisor]]
DESCRIPTION
This program replays a typescript, using timing information to ensure that output happens in the same rhythm as it originally appeared when the script was recorded.
The replay simply displays the information again; the programs that were run when the typescript was being recorded are not run again. Since the same information is simply being displayed, scriptreplay is only guaranteed to work properly if run on the same type of terminal the typescript was recorded on. Otherwise, any escape characters in the typescript may be interpreted differently by the terminal
to which scriptreplay is sending its output.
The timing information is what script(1) outputs to standard error if it is run with the -t parameter.
By default, the typescript to display is assumed to be named typescript, but other filenames may be specified, as the second parameter or with option -s.
+ man secon
+ head -n 20
SECON(1) NSA SECON(1)
NAME
secon - See an SELinux context, from a file, program or user input.
SYNOPSIS
secon [-hVurtscmPRfLp] [CONTEXT]
[--file] FILE
[--link] FILE
[--pid] PID
DESCRIPTION
See a part of a context. The context is taken from a file, pid, user input or the context in which secon is originally executed.
-V, --version
shows the current version of secon
-h, --help
+ man selabel_digest
+ head -n 20
No manual entry for selabel_digest
+ man selabel_lookup
+ head -n 20
No manual entry for selabel_lookup
+ man selabel_lookup_best_match
+ head -n 20
No manual entry for selabel_lookup_best_match
+ man selabel_partial_match
+ head -n 20
No manual entry for selabel_partial_match
+ man selinux_restorecon
+ head -n 20
No manual entry for selinux_restorecon
+ man selinuxconlist
+ head -n 20
selinuxconlist(1) SELinux Command Line documentation selinuxconlist(1)
NAME
selinuxconlist - list all SELinux context reachable for user
SYNOPSIS
selinuxconlist [-l level] user [context]
DESCRIPTION
selinuxconlist reports the list of context reachable for user from the current context or specified context
-l level mcs/mls level
AUTHOR
This manual page was written by Dan Walsh <[email protected]>.
+ man selinuxdefcon
+ head -n 20
selinuxdefcon(1) SELinux Command Line documentation selinuxdefcon(1)
NAME
selinuxdefcon - report default SELinux context for user
SYNOPSIS
selinuxdefcon [-l level] user fromcon
DESCRIPTION
selinuxdefcon reports the default context for the specified user from the specified context
-l level mcs/mls level
EXAMPLE
# selinuxdefcon jsmith system_u:system_r:sshd_t:s0
+ man selinuxenabled
+ head -n 20
selinuxenabled(8) SELinux Command Line documentation selinuxenabled(8)
NAME
selinuxenabled - tool to be used within shell scripts to determine if selinux is enabled
SYNOPSIS
selinuxenabled
DESCRIPTION
Indicates whether SELinux is enabled or disabled.
EXIT STATUS
It exits with status 0 if SELinux is enabled and 1 if it is not enabled.
AUTHOR
Dan Walsh, <[email protected]>
SEE ALSO
+ man selinuxexeccon
+ head -n 20
selinuxexeccon(8) SELinux Command Line documentation selinuxexeccon(8)
NAME
selinuxexeccon - report SELinux context used for this executable
SYNOPSIS
selinuxexeccon command [fromcon]
DESCRIPTION
selinuxexeccon reports the SELinux process context for the specified command from the specified context or the current context.
EXAMPLE
# selinuxexeccon /usr/bin/passwd
staff_u:staff_r:passwd_t:s0-s0:c0.c1023
# selinuxexeccon /usr/sbin/sendmail system_u:system_r:httpd_t:s0
system_u:system_r:system_mail_t:s0
+ man semodule
+ head -n 20
SEMODULE(8) NSA SEMODULE(8)
NAME
semodule - Manage SELinux policy modules.
SYNOPSIS
semodule [options]... MODE [MODES]...
DESCRIPTION
semodule is the tool used to manage SELinux policy modules, including installing, upgrading, listing and removing modules. semodule may also be used to force a rebuild of policy from the module store and/or to force a reload of policy without performing any other transaction. semodule acts on module packages created by semodule_package. Conventionally, these files have a .pp suffix (policy package),
although this is not mandated in any way.
OPTIONS
-R, --reload
force a reload of policy
+ man sendmail
+ head -n 20
SENDMAIL(1) General Commands Manual SENDMAIL(1)
NAME
sendmail - Postfix to Sendmail compatibility interface
SYNOPSIS
sendmail [option ...] [recipient ...]
mailq
sendmail -bp
newaliases
sendmail -I
DESCRIPTION
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored.
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory.
+ man sendmail.postfix
+ head -n 20
SENDMAIL(1) General Commands Manual SENDMAIL(1)
NAME
sendmail - Postfix to Sendmail compatibility interface
SYNOPSIS
sendmail [option ...] [recipient ...]
mailq
sendmail -bp
newaliases
sendmail -I
DESCRIPTION
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendmail command-line options are recognized but silently ignored.
By default, Postfix sendmail(1) reads a message from standard input until EOF or until it reads a line with only a . character, and arranges for delivery. Postfix sendmail(1) relies on the postdrop(1) command to create a queue file in the maildrop directory.
+ man service
+ head -n 20
service(8) System Manager's Manual service(8)
NAME
service - run a System V init script
SYNOPSIS
service SCRIPT COMMAND [OPTIONS]
service --status-all
service --help | -h | --version
DESCRIPTION
service runs a System V init script in as predictable environment as possible, removing most environment variables and with current working directory set to /.
The SCRIPT parameter specifies a System V init script, located in /etc/init.d/SCRIPT. The supported values of COMMAND depend on the invoked script, service passes COMMAND and OPTIONS it to the init script unmodified. All scripts should support at least the start and stop commands. As a special case, if COMMAND is --full-restart, the script is run twice, first with the stop command, then with the
+ man sestatus
+ head -n 20
sestatus(8) SELinux command line documentation sestatus(8)
NAME
sestatus - SELinux status tool
SYNOPSIS
sestatus [-v] [-b]
This tool is used to get the status of a system running SELinux.
DESCRIPTION
This manual page describes the sestatus program.
This tool is used to get the status of a system running SELinux. It displays data about whether SELinux is enabled or disabled, location of key directories, and the loaded policy with its status as shown in the example:
> sestatus
SELinux status: enabled
+ man setarch
+ head -n 20
SETARCH(8) System Administration SETARCH(8)
NAME
setarch - change reported architecture in new program environment and set personality flags
SYNOPSIS
setarch arch [options] [program [argument...]]
arch [options] [program [argument...]]
setarch --list|-h|-V
DESCRIPTION
setarch currently only affects the output of uname -m. For example, on an AMD64 system, running setarch i386 program will cause program to see i686 instead of x86_64 as the machine type. It also allows to set various personality options. The default program is /bin/sh.
OPTIONS
--list List the architectures that setarch knows about. Whether setarch can actually set each of these architectures depends on the running kernel.
+ man setenforce
+ head -n 20
setenforce(8) SELinux Command Line documentation setenforce(8)
NAME
setenforce - modify the mode SELinux is running in
SYNOPSIS
setenforce [Enforcing|Permissive|1|0]
DESCRIPTION
Use Enforcing or 1 to put SELinux in enforcing mode.
Use Permissive or 0 to put SELinux in permissive mode.
If SELinux is disabled and you want to enable it, or SELinux is enabled and you want to disable it, please see selinux(8).
AUTHOR
Dan Walsh, <[email protected]>
SEE ALSO
+ man setfacl
+ head -n 20
SETFACL(1) Access Control Lists SETFACL(1)
NAME
setfacl - set file access control lists
SYNOPSIS
setfacl [-bkndRLPvh] [{-m|-x} acl_spec] [{-M|-X} acl_file] file ...
setfacl --restore=file
DESCRIPTION
This utility sets Access Control Lists (ACLs) of files and directories. On the command line, a sequence of commands is followed by a sequence of files (which in turn can be followed by another sequence of commands, ...).
The options -m, and -x expect an ACL on the command line. Multiple ACL entries are separated by comma characters (`,'). The options -M, and -X read an ACL from a file or from standard input. The ACL entry format is described in Section ACL ENTRIES.
The --set and --set-file options set the ACL of a file or a directory. The previous ACL is replaced. ACL entries for this operation must include permissions.
+ man setfattr
+ head -n 20
SETFATTR(1) File Utilities SETFATTR(1)
NAME
setfattr - set extended attributes of filesystem objects
SYNOPSIS
setfattr [-h] -n name [-v value] pathname...
setfattr [-h] -x name pathname...
setfattr [-h] --restore=file
DESCRIPTION
The setfattr command associates a new value with an extended attribute name for each specified file.
OPTIONS
-n name, --name=name
Specifies the name of the extended attribute to set.
-v value, --value=value
+ man setfiles
+ head -n 20
setfiles(8) setfiles(8)
NAME
setfiles - set SELinux file security contexts.
SYNOPSIS
setfiles [-c policy] [-d] [-l] [-n] [-e directory] [-o filename] [-p] [-q] [-s] [-v] [-W] [-F] spec_file pathname...
DESCRIPTION
This manual page describes the setfiles program.
This program is primarily used to initialize the security context fields (extended attributes) on one or more filesystems (or parts of them). Usually it is initially run as part of the SELinux installation process (a step commonly known as labeling).
It can also be run at any other time to correct inconsistent labels, to add support for newly-installed policy or, by using the -n option, to passively check whether the file contexts are all set as specified by the active policy (default behavior) or by some other policy (see the -c option).
If a file object does not have a context, setfiles will write the default context to the file object's extended attributes. If a file object has a context, setfiles will only modify the type portion of the security context. The -F option will force a replacement of the entire context.
+ man setfont
+ head -n 20
SETFONT(8) International Support SETFONT(8)
NAME
setfont - load EGA/VGA console screen font
SYNOPSIS
setfont [-O font+umap.orig] [-o font.orig] [-om cmap.orig] [-ou umap.orig] [-N] [font.new ...] [-m cmap] [-u umap] [-C console] [-hH] [-v] [-V]
DESCRIPTION
The setfont command reads a font from the file font.new and loads it into the EGA/VGA character generator, and optionally outputs the previous font. It can also load various mapping tables and output the previous versions.
If no args are given (or only the option -N for some number N), then a default (8xN) font is loaded (see below). One may give several small fonts, all containing a Unicode table, and setfont will combine them and load the union. Typical use:
setfont
Load a default font.
setfont drdos8x16
Load a given font (here the 448-glyph drdos font).
+ man setkeycodes
+ head -n 20
SETKEYCODES(8) Keyboard Support SETKEYCODES(8)
NAME
setkeycodes - load kernel scancode-to-keycode mapping table entries
SYNOPSIS
setkeycodes scancode keycode ...
DESCRIPTION
The setkeycodes command reads its arguments two at a time, each pair of arguments consisting of a scancode (given in hexadecimal) and a keycode (given in decimal). For each such pair, it tells the kernel keyboard driver to map the specified scancode to the specified keycode.
This command is useful only for people with slightly unusual keyboards, that have a few keys which produce scancodes that the kernel does not recognize.
THEORY
The usual PC keyboard produces a series of scancodes for each key press and key release. (Scancodes are shown by showkey -s, see showkey(1).) The kernel parses this stream of scancodes, and converts it to a stream of keycodes (key press/release events). (Keycodes are shown by showkey.) Apart from a few scancodes with special meaning, and apart from the sequence produced by the Pause key, and apart
from shiftstate related scancodes, and apart from the key up/down bit, the stream of scancodes consists of unescaped scancodes xx (7 bits) and escaped scancodes e0 xx (8+7 bits). To these scancodes or scancode pairs, a corresponding keycode can be assigned (in the range 1-127). For example, if you have a Macro key that produces e0 6f according to showkey(1), the command
setkeycodes e06f 112
+ man setleds
+ head -n 20
SETLEDS(1) General Commands Manual SETLEDS(1)
NAME
setleds - set the keyboard leds
SYNOPSIS
setleds [-v] [-L] [-D] [-F] [{+|-}num] [{+|-}caps] [{+|-}scroll]
DESCRIPTION
Setleds reports and changes the led flag settings of a VT (namely NumLock, CapsLock and ScrollLock). Without arguments, setleds prints the current settings. With arguments, it sets or clears the indicated flags (and leaves the others unchanged). The settings before and after the change are reported if the -v flag is given.
The led flag settings are specific for each VT (and the VT corresponding to stdin is used).
By default (or with option -F), setleds will only change the VT flags (and their setting may be reflected by the keyboard leds).
With option -D, setleds will change both the VT flags and their default settings (so that a subsequent reset will not undo the change). This might be useful for people who always want to have numlock set.
With option -L, setleds will not touch the VT flags, but only change the leds. From this moment on, the leds will no longer reflect the VT flags (but display whatever is put into them). The command setleds -L (without further arguments) will restore the situation in which the leds reflect the VT flags.
+ man setmetamode
+ head -n 20
SETMETAMODE(1) General Commands Manual SETMETAMODE(1)
NAME
setmetamode - define the keyboard meta key handling
SYNOPSIS
setmetamode [ {meta|bit|metabit | esc|prefix|escprefix} ]
DESCRIPTION
Without argument, setmetamode prints the current Meta key mode. With argument, it sets the Meta key mode as indicated. The setting before and after the change are reported.
The Meta key mode is specific for each VT (and the VT corresponding to stdin is used). One might use setmetamode in /etc/rc to define the initial state of the Meta key mode, e.g. by
INITTY=/dev/tty[1-8]
for tty in $INITTY; do
setmetamode escprefix < $tty
done
OPTIONS
+ man setpci
+ head -n 20
setpci(8) The PCI Utilities setpci(8)
NAME
setpci - configure PCI devices
SYNOPSIS
setpci [options] devices operations...
DESCRIPTION
setpci is a utility for querying and configuring PCI devices.
All numbers are entered in hexadecimal notation.
Root privileges are necessary for almost all operations, excluding reads of the standard header of the configuration space on some operating systems. Please see lspci(8) for details on access rights.
OPTIONS
+ man setpriv
+ head -n 20
SETPRIV(1) User Commands SETPRIV(1)
NAME
setpriv - run a program with different Linux privilege settings
SYNOPSIS
setpriv [options] program [arguments]
DESCRIPTION
Sets or queries various Linux privilege settings that are inherited across execve(2).
The difference between the commands setpriv and su (or runuser) is that setpriv does not use open PAM session and does not ask for password. It's simple non-set-user-ID wrapper around execve system call.
OPTION
--clear-groups
Clear supplementary groups.
-d, --dump
+ man setquota
+ head -n 20
SETQUOTA(8) System Manager's Manual SETQUOTA(8)
NAME
setquota - set disk quotas
SYNOPSIS
setquota [ -rm ] [ -u | -g ] [ -F quotaformat ] name block-softlimit block-hardlimit inode-softlimit inode-hardlimit -a | filesystem...
setquota [ -rm ] [ -u | -g ] [ -F quotaformat ] [ -p protoname ] name -a | filesystem...
setquota -b [ -rm ] [ -u | -g ] [ -F quotaformat ] -a | filesystem...
setquota -t [ -u | -g ] [ -F quotaformat ] block-grace inode-grace -a | filesystem...
setquota -T [ -u | -g ] [ -F quotaformat ] name block-grace inode-grace -a | filesystem...
DESCRIPTION
setquota is a command line quota editor. The filesystem, user/group name and new quotas for this filesystem can be specified on the command line. Note that if a number is given in the place of a user/group name it is treated as an UID/GID.
+ man setsebool
+ head -n 20
setsebool(8) SELinux Command Line documentation setsebool(8)
NAME
setsebool - set SELinux boolean value
SYNOPSIS
setsebool [ -PNV ] boolean value | bool1=val1 bool2=val2 ...
DESCRIPTION
setsebool sets the current state of a particular SELinux boolean or a list of booleans to a given value. The value may be 1 or true or on to enable the boolean, or 0 or false or off to disable it.
Without the -P option, only the current boolean value is affected; the boot-time default settings are not changed.
If the -P option is given, all pending values are written to the policy file on disk. So they will be persistent across reboots.
If the -N option is given, the policy on disk is not reloaded into the kernel.
+ man setserial
+ head -n 20
SETSERIAL(8) System Manager's Manual SETSERIAL(8)
NAME
setserial - get/set Linux serial port information
SYNOPSIS
setserial [ -abqvVWz ] device [ parameter1 [ arg ] ] ...
setserial -g [ -abGv ] device1 ...
DESCRIPTION
setserial is a program designed to set and/or report the configuration information associated with a serial port. This information includes what I/O port and IRQ a particular serial port is using, and whether or not the break key should be interpreted as the Secure Attention Key, and so on.
During the normal bootup process, only COM ports 1-4 are initialized, using the default I/O ports and IRQ values, as listed below. In order to initialize any additional serial ports, or to change the COM 1-4 ports to a nonstadard configuration, the setserial program should be used. Typically it is called from an rc.serial script, which is usually run out of /etc/rc.local.
The device argument or arguments specifies the serial device which should be configured or interrogated. It will usually have the following form: /dev/cua[0-3].
If no parameters are specified, setserial will print out the port type (i.e., 8250, 16450, 16550, 16550A, etc.), the hardware I/O port, the hardware IRQ line, its "baud base," and some of its operational flags.
+ man setsid
+ head -n 20
SETSID(1) User Commands SETSID(1)
NAME
setsid - run a program in a new session
SYNOPSIS
setsid [options] program [arguments]
DESCRIPTION
setsid runs a program in a new session.
OPTIONS
-c, --ctty
Set the controlling terminal to the current one.
-w, --wait
Wait for the execution of the program to end, and return the exit value of this program as the return value of setsid.
+ man setterm
+ head -n 20
SETTERM(1) User Commands SETTERM(1)
NAME
setterm - set terminal attributes
SYNOPSIS
setterm [options]
DESCRIPTION
setterm writes to standard output a character string that will invoke the specified terminal capabilities. Where possible terminfo is consulted to find the string to use. Some options however (marked "virtual consoles only" below) do not correspond to a terminfo(5) capability. In this case, if the terminal type is "con" or "linux" the string that invokes the specified capabilities on the PC Minix
virtual console driver is output. Options that are not implemented by the terminal are ignored.
OPTIONS
For boolean options (on or off), the default is on.
Below, an 8-color can be black, red, green, yellow, blue, magenta, cyan, or white.
A 16-color can be an 8-color, or grey, or bright followed by red, green, yellow, blue, magenta, cyan, or white.
+ man setup
+ head -n 20
setup(1) setuptool setup(1)
NAME
setup - A text mode system configuration tool
SYNOPSIS
setup
DESCRIPTION
The setuptool program (setup) is a front-end menu program for a group of other tools, mostly system-config-*-tui tools. The list of options which it presents is assembled by scanning /etc/setuptool.d and /usr/share/setuptool/setuptool.d for files.
Each file in the directory should contain one or more lines of text. Each line contains from one to four fields which are separated by "|" characters. In order, they are:
- the path to the binary to invoke (mandatory)
- the untranslated name of the application which should be displayed
(If unset, defaults to the path of the binary, but don't depend on that.)
- the gettext textdomain in which a translation of the name of the application can be found
(If unset, defaults to "setup".)
- the directory in which translations for the textdomain can be found
+ man setvtrgb
+ head -n 20
SETVTRGB(8) System Manager's Manual SETVTRGB(8)
NAME
setvtrgb - set the virtual terminal RGB colors
SYNOPSIS
setvtrgb -h|-V|vga|FILE|-
DESCRIPTION
The setvtrgb command takes a single argument, either the string vga , or a path to a file containing the red, green, and blue colors to be used by the Linux virtual terminals.
If you use the FILE parameter, FILE should be exactly 3 lines of 16 comma-separated decimal values for RED, GREEN, and BLUE.
To seed a valid FILE :
cat /sys/module/vt/parameters/default_{red,grn,blu} > FILE
And then edit the values in FILE
+ man sexp-conv
+ head -n 20
No manual entry for sexp-conv
+ man sfdisk
+ head -n 20
SFDISK(8) System Administration SFDISK(8)
NAME
sfdisk - display or manipulate a disk partition table
SYNOPSIS
sfdisk [options] device [-N partition-number]
sfdisk [options] command
DESCRIPTION
sfdisk is a script-oriented tool for partitioning any block device.
Since version 2.26 sfdisk supports MBR (DOS), GPT, SUN and SGI disk labels, but no longer provides any functionality for CHS (Cylinder-Head-Sector) addressing. CHS has never been important for Linux, and this addressing concept does not make any sense for new devices.
sfdisk (since version 2.26) aligns the start and end of partitions to block-device I/O limits when relative sizes are specified, when the default values are used or when multiplicative suffixes (e.g MiB) are used for sizes. It is possible that partition size will be optimized (reduced or enlarged) due to alignment if the start offset is specified exactly in sectors and partition size relative or by
multiplicative suffixes.
+ man sftp
+ head -n 20
SFTP(1) BSD General Commands Manual SFTP(1)
NAME
sftp — secure file transfer program
SYNOPSIS
sftp [-1246aCfpqrv] [-B buffer_size] [-b batchfile] [-c cipher] [-D sftp_server_path] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-R num_requests] [-S program] [-s subsystem | sftp_server] host
sftp [user@]host[:file ...]
sftp [user@]host[:dir[/]]
sftp -b batchfile [user@]host
DESCRIPTION
sftp is an interactive file transfer program, similar to ftp(1), which performs all operations over an encrypted ssh(1) transport. It may also use many features of ssh, such as public key authentication and compression. sftp connects and logs into the specified host, then enters an interactive command mode.
The second usage format will retrieve files automatically if a non-interactive authentication method is used; otherwise it will do so after successful interactive authentication.
The third usage format allows sftp to start in a remote directory.
The final usage format allows for automated sessions using the -b option. In such cases, it is necessary to configure non-interactive authentication to obviate the need to enter a password at connection time (see sshd(8) and ssh-keygen(1) for details).
+ man sg
+ head -n 20
SG(1) User Commands SG(1)
NAME
sg - execute command as different group ID
SYNOPSIS
sg [-] [group [-c ] command]
DESCRIPTION
The sg command works similar to newgrp but accepts a command. The command will be executed with the /bin/sh shell. With most shells you may run sg from, you need to enclose multi-word commands in quotes. Another difference between newgrp and sg is that some shells treat newgrp specially, replacing themselves with a new instance of a shell that newgrp creates. This doesn't happen with sg, so upon exit
from a sg command you are returned to your previous group ID.
CONFIGURATION
The following configuration variables in /etc/login.defs change the behavior of this tool:
SYSLOG_SG_ENAB (boolean)
Enable "syslog" logging of sg activity.
+ man sgdisk
+ head -n 20
SGDISK(8) GPT fdisk Manual SGDISK(8)
NAME
sgdisk - Command-line GUID partition table (GPT) manipulator for Linux and Unix
SYNOPSIS
sgdisk [ options ] device
DESCRIPTION
GPT fdisk is a text-mode menu-driven package for creation and manipulation of partition tables. It consists of two programs: the text-mode interactive gdisk and the command-line sgdisk. Either program will automatically convert an old-style Master Boot Record (MBR) partition table or BSD disklabel stored without an MBR carrier partition to the newer Globally Unique Identifier (GUID) Partition Table
(GPT) format, or will load a GUID partition table. This man page documents the command-line sgdisk program.
Some advanced data manipulation and recovery options require you to understand the distinctions between the main and backup data, as well as between the GPT headers and the partition tables. For information on MBR vs. GPT, as well as GPT terminology and structure, see the extended gdisk documentation at http://www.rodsbooks.com/gdisk/ or consult Wikipedia.
The sgdisk program employs a user interface that's based entirely on the command line, making it suitable for use in scripts or by experts who want to make one or two quick changes to a disk. (The program may query the user when certain errors are encountered, though.) The program's name is based on sfdisk, but the user options of the two programs are entirely different from one another.
Ordinarily, sgdisk operates on disk device files, such as /dev/sda or /dev/hda under Linux, /dev/disk0 under Mac OS X, or /dev/ad0 or /dev/da0 under FreeBSD. The program can also operate on disk image files, which can be either copies of whole disks (made with dd, for instance) or raw disk images used by emulators such as QEMU or VMWare. Note that only raw disk images are supported; sgdisk cannot work
+ man sgpio
+ head -n 20
sgpio(1) USER COMMANDS sgpio(1)
NAME
sgpio - captive backplane LED control utility
SYNOPSIS
sgpio [-h] [-V] [[-d|--disk <device>[,<device>...]] | [-p|--port <port>[,<port>...]]] [-s|--status <status>] [-f|--freq <frequency>]
DESCRIPTION
Serial General Purpose Input Output (SGPIO) is a communication method used between a main board and a variety of internal and external hard disk drive bay enclosures. This utility can be used to control LEDs in an enclosure. For more information about SGPIO, please consult the SFF-8485 Specification.
OPTIONS
-h, --help
displays a short help text
-V, --version
displays the utility and AHCI SGPIO specification
+ man show-changed-rco
+ head -n 20
show-installed(1) show-installed(1)
NAME
show-changed-rco - show changes in an RPM package
SYNOPSIS
show-changed-rco [options]
DESCRIPTION
show-changed-rco gives a compact description of the changes to a packages Requires, Conflicts and Obsoletes data from the installed (or old) to a specified rpm file.
OPTIONS
-h, --help
show this help message and exit
-C, --cache
Tells repoquery to run entirely from YUM cache - does not download any metadata or update the cache. Queries in this mode can fail or give partial/incorrect results if the cache isn't fully populated beforehand with eg "yum makecache".
+ man show-installed
+ head -n 20
show-installed(1) show-installed(1)
NAME
show-installed - show installed RPM packages and descriptions
SYNOPSIS
show-installed [options]
DESCRIPTION
show-installed gives a compact description of the packages installed (or given) making use of the comps groups found in the repositories.
OPTIONS
-h, --help
show this help message and exit
-f FORMAT, --format=FORMAT
yum, kickstart or human; yum gives the result as a yum command line; kickstart the content of a %packages section; "human" readable is default.
+ man showconsolefont
+ head -n 20
SHOWCONSOLEFONT(8) Linux Console SHOWCONSOLEFONT(8)
NAME
showconsolefont - Show the current EGA/VGA console screen font
SYNOPSIS
showconsolefont [ -V | --version ] [ -v ] [ -i ] [ -C console ]
DESCRIPTION
The showconsolefont command outputs the current console font to stdout. The option -v prints additional information, while the option -V prints the program version number. The option -i doesn't print out the font table, just shows ROWSxCOLSxCOUNT and exits. On Linux 2.6.1 and later, the option -C allows one to indicate the console involved. Its argument is a pathname.
SEE ALSO
setfont(8)
+ man showkey
+ head -n 20
SHOWKEY(1) General Commands Manual SHOWKEY(1)
NAME
showkey - examine the codes sent by the keyboard
SYNOPSIS
showkey [-h|--help] [-a|--ascii] [-s|--scancodes] [-k|--keycodes] [-V|--version]
DESCRIPTION
showkey prints to standard output either the scan codes or the keycode or the `ascii' code of each key pressed. In the first two modes the program runs until 10 seconds have elapsed since the last key press or release event, or until it receives a suitable signal, like SIGTERM, from another process. In `ascii' mode the program terminates when the user types ^D.
When in scancode dump mode, showkey prints in hexadecimal format each byte received from the keyboard to the standard output. A new line is printed when an interval of about 0.1 seconds occurs between the bytes received, or when the internal receive buffer fills up. This can be used to determine roughly, what byte sequences the keyboard sends at once on a given key press. The scan code dumping mode is
primarily intended for debugging the keyboard driver or other low level interfaces. As such it shouldn't be of much interest to the regular end-user. However, some modern keyboards have keys or buttons that produce scancodes to which the kernel does not associate a keycode, and, after finding out what these are, the user can assign keycodes with setkeycodes(8).
When in the default keycode dump mode, showkey prints to the standard output the keycode number or each key pressed or released. The kind of the event, press or release, is also reported. Keycodes are numbers assigned by the kernel to each individual physical key. Every key has always only one associated keycode number, whether the keyboard sends single or multiple scan codes when pressing it. Using
showkey in this mode, you can find out what numbers to use in your personalized keymap files.
When in `ascii' dump mode, showkey prints to the standard output the decimal, octal, and hexadecimal value(s) of the key pressed, according to he present keymap.
+ man showmount
+ head -n 20
SHOWMOUNT(8) System Manager's Manual SHOWMOUNT(8)
NAME
showmount - show mount information for an NFS server
SYNOPSIS
showmount [ -adehv ] [ --all ] [ --directories ] [ --exports ] [ --help ] [ --version ] [ host ]
DESCRIPTION
showmount queries the mount daemon on a remote host for information about the state of the NFS server on that machine. With no options showmount lists the set of clients who are mounting from that host. The output from showmount is designed to appear as though it were processed through ``sort -u''.
OPTIONS
-a or --all
List both the client hostname or IP address and mounted directory in host:dir format. This info should not be considered reliable. See the notes on rmtab in rpc.mountd(8).
-d or --directories
List only the directories mounted by some client.
+ man shutdown
+ head -n 20
SHUTDOWN(8) shutdown SHUTDOWN(8)
NAME
shutdown - Halt, power-off or reboot the machine
SYNOPSIS
shutdown [OPTIONS...] [TIME] [WALL...]
DESCRIPTION
shutdown may be used to halt, power-off or reboot the machine.
The first argument may be a time string (which is usually "now"). Optionally, this may be followed by a wall message to be sent to all logged-in users before going down.
The time string may either be in the format "hh:mm" for hour/minutes specifying the time to execute the shutdown at, specified in 24h clock format. Alternatively it may be in the syntax "+m" referring to the specified number of minutes m from now. "now" is an alias for "+0", i.e. for triggering an immediate shutdown. If no time argument is specified, "+1" is implied.
Note that to specify a wall message you must specify a time argument, too.
If the time argument is used, 5 minutes before the system goes down the /run/nologin file is created to ensure that further logins shall not be allowed.
+ man sim_lsmplugin
+ head -n 20
sim_lsmplugin(1) libStorageMgmt sim_lsmplugin(1)
NAME
sim_lsmplugin -- LibStorageMgmt simulator python plugin
DESCRIPTION
LibstorageMgmt simulator plugin is for development or test use only. The plugin simulates an array which supports most features of the library. State is stored in a file, default is '/tmp/lsm_sim_data'. The 'sim_lsmplugin' executable file is for libStorageMgmt daemon to execute when client user specifies sim plugin in the URI.
This plugin is written in pure Python and is intended to be an example of a python plugin for the library.
URI
To use this plugin, users should set their URI to this format:
# All that is required
sim://
+ man simc_lsmplugin
+ head -n 20
simc_lsmplugin(1) libStorageMgmt simc_lsmplugin(1)
NAME
simc_lsmplugin -- LibstorageMgmt Simulator C Plugin
DESCRIPTION
LibStorageMgmt simulator C plugin is for development use. The plugin simulates an array which supports most features of the library. The simulator is memory based, state will be discarded once the plugin exits. The 'simc_lsmplugin' executable file is for the libStorageMgmt daemon to execute when client user specifies simc plugin in the URI.
Since every command of lsmcli is a standalone libStorageMgmt session, this plugin is essentially useless for this purpose. In this use case, the libStorageMgmt simulator plugin sim_lsmplugin(1) is suggested.
This plugin is written in pure C and is intended to be an example of a C plugin for the library.
URI
To use this plugin, users should set their URI to this format:
simc://
+ man size
+ head -n 20
SIZE(1) GNU Development Tools SIZE(1)
NAME
size - list section sizes and total size.
SYNOPSIS
size [-A|-B|--format=compatibility]
[--help]
[-d|-o|-x|--radix=number]
[--common]
[-t|--totals]
[--target=bfdname] [-V|--version]
[objfile...]
DESCRIPTION
The GNU size utility lists the section sizes---and the total size---for each of the object or archive files objfile in its argument list. By default, one line of output is generated for each object file or each module in an archive.
objfile... are the object files to be examined. If none are specified, the file "a.out" will be used.
+ man skill
+ head -n 20
SKILL(1) User Commands SKILL(1)
NAME
skill, snice - send a signal or report process status
SYNOPSIS
skill [signal] [options] expression
snice [new priority] [options] expression
DESCRIPTION
These tools are obsolete and unportable. The command syntax is poorly defined. Consider using the killall, pkill, and pgrep commands instead.
The default signal for skill is TERM. Use -l or -L to list available signals. Particularly useful signals include HUP, INT, KILL, STOP, CONT, and 0. Alternate signals may be specified in three ways: -9 -SIGKILL -KILL.
The default priority for snice is +4. Priority numbers range from +20 (slowest) to -20 (fastest). Negative priority numbers are restricted to administrative users.
OPTIONS
-f, --fast
+ man slabtop
+ head -n 20
SLABTOP(1) User Commands SLABTOP(1)
NAME
slabtop - display kernel slab cache information in real time
SYNOPSIS
slabtop [options]
DESCRIPTION
slabtop displays detailed kernel slab cache information in real time. It displays a listing of the top caches sorted by one of the listed sort criteria. It also displays a statistics header filled with slab layer information.
OPTIONS
Normal invocation of slabtop does not require any options. The behavior, however, can be fine-tuned by specifying one or more of the following flags:
-d, --delay=N
Refresh the display every n in seconds. By default, slabtop refreshes the display every three seconds. To exit the program, hit q.
-s, --sort=S
+ man slattach
+ head -n 20
SLATTACH(8) Linux System Administrator's Manual SLATTACH(8)
NAME
slattach - attach a network interface to a serial line
SYNOPSIS
slattach [-dehlLmnqv] [-c command] [-p proto] [-s speed] [tty]
DESCRIPTION
Slattach is a tiny little program that can be used to put a normal terminal ("serial") line into one of several "network" modes, thus allowing you to use it for point-to-point links to other computers.
OPTIONS
tty Path to a serial device like /dev/ttyS*, /dev/cua* or /dev/ptmx to spawn a new pseudo tty.
[-c command]
Execute command when the line is hung up. This can be used to run scripts or re-establish connections when a link goes down.
[-d] Enable debugging output. Useful when determining why a given setup doesn't work.
+ man slogin
+ head -n 20
SSH(1) BSD General Commands Manual SSH(1)
NAME
ssh — OpenSSH SSH client (remote login program)
SYNOPSIS
ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-J [user@]host[:port]] [-L address] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] [user@]hostname [command]
DESCRIPTION
ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections, arbitrary TCP ports and UNIX-domain sockets can also be forwarded over the secure channel.
ssh connects and logs into the specified hostname (with optional user name). The user must prove his/her identity to the remote machine using one of several methods (see below).
If command is specified, it is executed on the remote host instead of a login shell.
The options are as follows:
-1 Forces ssh to try protocol version 1 only.
-2 Forces ssh to try protocol version 2 only.
+ man sm-notify
+ head -n 20
SM-NOTIFY(8) System Manager's Manual SM-NOTIFY(8)
NAME
sm-notify - send reboot notifications to NFS peers
SYNOPSIS
/usr/sbin/sm-notify [-dfn] [-m minutes] [-v name] [-p notify-port] [-P path]
DESCRIPTION
File locks are not part of persistent file system state. Lock state is thus lost when a host reboots.
Network file systems must also detect when lock state is lost because a remote host has rebooted. After an NFS client reboots, an NFS server must release all file locks held by applications that were running on that client. After a server reboots, a client must remind the server of file locks held by applications running on that client.
For NFS version 2 and version 3, the Network Status Monitor protocol (or NSM for short) is used to notify NFS peers of reboots. On Linux, two separate user-space components constitute the NSM service:
sm-notify
A helper program that notifies NFS peers after the local system reboots
+ man smtp-sink
+ head -n 20
SMTP-SINK(1) General Commands Manual SMTP-SINK(1)
NAME
smtp-sink - multi-threaded SMTP/LMTP test server
SYNOPSIS
smtp-sink [options] [inet:][host]:port backlog
smtp-sink [options] unix:pathname backlog
DESCRIPTION
smtp-sink listens on the named host (or address) and port. It takes SMTP messages from the network and throws them away. The purpose is to measure client performance, not protocol compliance.
smtp-sink may also be configured to capture each mail delivery transaction to file. Since disk latencies are large compared to network delays, this mode of operation can reduce the maximal performance by several orders of magnitude.
Connections can be accepted on IPv4 or IPv6 endpoints, or on UNIX-domain sockets. IPv4 and IPv6 are the default. This program is the complement of the smtp-source(1) program.
Note: this is an unsupported test program. No attempt is made to maintain compatibility between successive versions.
+ man smtp-source
+ head -n 20
SMTP-SOURCE(1) General Commands Manual SMTP-SOURCE(1)
NAME
smtp-source - multi-threaded SMTP/LMTP test generator
SYNOPSIS
smtp-source [options] [inet:]host[:port]
smtp-source [options] unix:pathname
DESCRIPTION
smtp-source connects to the named host and TCP port (default: port 25) and sends one or more messages to it, either sequentially or in parallel. The program speaks either SMTP (default) or LMTP. Connections can be made to UNIX-domain and IPv4 or IPv6 servers. IPv4 and IPv6 are the default.
Note: this is an unsupported test program. No attempt is made to maintain compatibility between successive versions.
Arguments:
-4 Connect to the server with IPv4. This option has no effect when Postfix is built without IPv6 support.
+ man snice
+ head -n 20
SKILL(1) User Commands SKILL(1)
NAME
skill, snice - send a signal or report process status
SYNOPSIS
skill [signal] [options] expression
snice [new priority] [options] expression
DESCRIPTION
These tools are obsolete and unportable. The command syntax is poorly defined. Consider using the killall, pkill, and pgrep commands instead.
The default signal for skill is TERM. Use -l or -L to list available signals. Particularly useful signals include HUP, INT, KILL, STOP, CONT, and 0. Alternate signals may be specified in three ways: -9 -SIGKILL -KILL.
The default priority for snice is +4. Priority numbers range from +20 (slowest) to -20 (fastest). Negative priority numbers are restricted to administrative users.
OPTIONS
-f, --fast
+ man splain
+ head -n 20
SPLAIN(1) Perl Programmers Reference Guide SPLAIN(1)
NAME
diagnostics, splain - produce verbose warning diagnostics
SYNOPSIS
Using the "diagnostics" pragma:
use diagnostics;
use diagnostics -verbose;
enable diagnostics;
disable diagnostics;
Using the "splain" standalone filter program:
perl program 2>diag.out
splain [-v] [-p] diag.out
+ man ss
+ head -n 20
SS(8) System Manager's Manual SS(8)
NAME
ss - another utility to investigate sockets
SYNOPSIS
ss [options] [ FILTER ]
DESCRIPTION
ss is used to dump socket statistics. It allows showing information similar to netstat. It can display more TCP and state informations than other tools.
OPTIONS
When no option is used ss displays a list of open non-listening sockets (e.g. TCP/UNIX/UDP) that have established connection.
-h, --help
Show summary of options.
+ man ssh
+ head -n 20
SSH(1) BSD General Commands Manual SSH(1)
NAME
ssh — OpenSSH SSH client (remote login program)
SYNOPSIS
ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-J [user@]host[:port]] [-L address] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] [user@]hostname [command]
DESCRIPTION
ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections, arbitrary TCP ports and UNIX-domain sockets can also be forwarded over the secure channel.
ssh connects and logs into the specified hostname (with optional user name). The user must prove his/her identity to the remote machine using one of several methods (see below).
If command is specified, it is executed on the remote host instead of a login shell.
The options are as follows:
-1 Forces ssh to try protocol version 1 only.
-2 Forces ssh to try protocol version 2 only.
+ man ssh-add
+ head -n 20
SSH-ADD(1) BSD General Commands Manual SSH-ADD(1)
NAME
ssh-add — adds private key identities to the authentication agent
SYNOPSIS
ssh-add [-cDdkLlXx] [-E fingerprint_hash] [-t life] [file ...]
ssh-add -s pkcs11
ssh-add -e pkcs11
DESCRIPTION
ssh-add adds private key identities to the authentication agent, ssh-agent(1). When run without arguments, it adds the files ~/.ssh/id_rsa, ~/.ssh/id_dsa, ~/.ssh/id_ecdsa, ~/.ssh/id_ed25519 and ~/.ssh/identity. After loading a private key, ssh-add will try to load corresponding certificate information from the filename obtained by appending -cert.pub to the name of the private key file. Alternative
file names can be given on the command line.
If any file requires a passphrase, ssh-add asks for the passphrase from the user. The passphrase is read from the user's tty. ssh-add retries the last passphrase if multiple identity files are given.
The authentication agent must be running and the SSH_AUTH_SOCK environment variable must contain the name of its socket for ssh-add to work.
The options are as follows:
+ man ssh-agent
+ head -n 20
SSH-AGENT(1) BSD General Commands Manual SSH-AGENT(1)
NAME
ssh-agent — authentication agent
SYNOPSIS
ssh-agent [-c | -s] [-Dd] [-a bind_address] [-E fingerprint_hash] [-P pkcs11_whitelist] [-t life] [command [arg ...]]
ssh-agent [-c | -s] -k
DESCRIPTION
ssh-agent is a program to hold private keys used for public key authentication (RSA, DSA, ECDSA, Ed25519). ssh-agent is usually started in the beginning of an X-session or a login session, and all other windows or programs are started as clients to the ssh-agent program. Through use of environment variables the agent can be located and automatically used for authentication when logging in to other
machines using ssh(1).
The agent initially does not have any private keys. Keys are added using ssh(1) (see AddKeysToAgent in ssh_config(5) for details) or ssh-add(1). Multiple identities may be stored in ssh-agent concurrently and ssh(1) will automatically use them if present. ssh-add(1) is also used to remove keys from ssh-agent and to query the keys that are held in one.
The options are as follows:
-a bind_address
Bind the agent to the UNIX-domain socket bind_address. The default is $TMPDIR/ssh-XXXXXXXXXX/agent.<ppid>.
+ man ssh-copy-id
+ head -n 20
SSH-COPY-ID(1) BSD General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id — use locally available keys to authorise logins on a remote machine
SYNOPSIS
ssh-copy-id [-f] [-n] [-i [identity_file]] [-p port] [-o ssh_option] [user@]hostname
ssh-copy-id -h | -?
DESCRIPTION
ssh-copy-id is a script that uses ssh(1) to log into a remote machine (presumably using a login password, so password authentication should be enabled, unless you've done some clever use of multiple identities). It assembles a list of one or more fingerprints (as described below) and tries to log in with each key, to see if any of them are already installed (of course, if you are not using ssh-agent(1)
this may result in you being repeatedly prompted for pass-phrases). It then assembles a list of those that failed to log in, and using ssh, enables logins with those keys on the remote server. By default it adds the keys by appending them to the remote user's ~/.ssh/authorized_keys (creating the file, and directory, if necessary). It is also capable of detecting if the remote system is a NetScreen,
and using its ‘set ssh pka-dsa key ...’ command instead.
The options are as follows:
-i identity_file
Use only the key(s) contained in identity_file (rather than looking for identities via ssh-add(1) or in the default_ID_file). If the filename does not end in .pub this is added. If the filename is omitted, the default_ID_file is used.
Note that this can be used to ensure that the keys copied have the comment one prefers and/or extra options applied, by ensuring that the key file has these set as preferred before the copy is attempted.
+ man ssh-keygen
+ head -n 20
SSH-KEYGEN(1) BSD General Commands Manual SSH-KEYGEN(1)
NAME
ssh-keygen — authentication key generation, management and conversion
SYNOPSIS
ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1] [-N new_passphrase] [-C comment] [-f output_keyfile]
ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile]
ssh-keygen -i [-m key_format] [-f input_keyfile]
ssh-keygen -e [-m key_format] [-f input_keyfile]
ssh-keygen -y [-f input_keyfile]
ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
ssh-keygen -l [-v] [-E fingerprint_hash] [-f input_keyfile]
ssh-keygen -B [-f input_keyfile]
ssh-keygen -D pkcs11
ssh-keygen -F hostname [-f known_hosts_file] [-l]
ssh-keygen -H [-f known_hosts_file]
ssh-keygen -R hostname [-f known_hosts_file]
ssh-keygen -r hostname [-f input_keyfile] [-g]
ssh-keygen -G output_file [-v] [-b bits] [-M memory] [-S start_point]
+ man ssh-keyscan
+ head -n 20
SSH-KEYSCAN(1) BSD General Commands Manual SSH-KEYSCAN(1)
NAME
ssh-keyscan — gather ssh public keys
SYNOPSIS
ssh-keyscan [-46cHv] [-f file] [-p port] [-T timeout] [-t type] [host | addrlist namelist] ...
DESCRIPTION
ssh-keyscan is a utility for gathering the public ssh host keys of a number of hosts. It was designed to aid in building and verifying ssh_known_hosts files. ssh-keyscan provides a minimal interface suitable for use by shell and perl scripts.
ssh-keyscan uses non-blocking socket I/O to contact as many hosts as possible in parallel, so it is very efficient. The keys from a domain of 1,000 hosts can be collected in tens of seconds, even when some of those hosts are down or do not run ssh. For scanning, one does not need login access to the machines that are being scanned, nor does the scanning process involve any encryption.
The options are as follows:
-4 Forces ssh-keyscan to use IPv4 addresses only.
-6 Forces ssh-keyscan to use IPv6 addresses only.
-c Request certificates from target hosts instead of plain keys.
+ man sshd
+ head -n 20
SSHD(8) BSD System Manager's Manual SSHD(8)
NAME
sshd — OpenSSH SSH daemon
SYNOPSIS
sshd [-46DdeiqTt] [-C connection_spec] [-c host_certificate_file] [-E log_file] [-f config_file] [-g login_grace_time] [-h host_key_file] [-o option] [-p port] [-u len]
DESCRIPTION
sshd (OpenSSH Daemon) is the daemon program for ssh(1). Together these programs replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network.
sshd listens for connections from clients. It is normally started at boot from /etc/rc. It forks a new daemon for each incoming connection. The forked daemons handle key exchange, encryption, authentication, command execution, and data exchange.
sshd can be configured using command-line options or a configuration file (by default sshd_config(5)); command-line options override values specified in the configuration file. sshd rereads its configuration file when it receives a hangup signal, SIGHUP, by executing itself with the name and options it was started with, e.g. /usr/sbin/sshd.
The options are as follows:
-4 Forces sshd to use IPv4 addresses only.
-6 Forces sshd to use IPv6 addresses only.
+ man sshd-keygen
+ head -n 20
No manual entry for sshd-keygen
+ man ssm-agent-worker
+ head -n 20
No manual entry for ssm-agent-worker
+ man ssm-cli
+ head -n 20
No manual entry for ssm-cli
+ man ssm-document-worker
+ head -n 20
No manual entry for ssm-document-worker
+ man ssm-session-logger
+ head -n 20
No manual entry for ssm-session-logger
+ man ssm-session-worker
+ head -n 20
No manual entry for ssm-session-worker
+ man stap-merge
+ head -n 20
No manual entry for stap-merge
+ man stap-report
+ head -n 20
STAP-REPORT(1) General Commands Manual STAP-REPORT(1)
NAME
stap-report - collect system information that is useful for debugging systemtap bugs
SYNOPSIS
stap-report
DESCRIPTION
The stap-report executable collects system information that is useful for debugging systemtap bugs. It is a good idea to include such a report in bug reports especially if you send them directly to the upstream. stap-report can be run either as a normal user or as root. The report will be more complete if stap-report is run as root.
EXAMPLES
$ stap-report > report.txt
$ head report.txt
+ man stapbpf
+ head -n 20
STAPBPF(8) System Manager's Manual STAPBPF(8)
NAME
stapbpf - systemtap bpf runtime
SYNOPSIS
stapbpf [ OPTIONS ] MODULE
DESCRIPTION
The stapbpf program is the BPF back-end of the Systemtap tool. It expects a bpf-elf file produced by the front-end stap tool, when run with --runtime=bpf.
Splitting the systemtap tool into a front-end and a back-end allows a user to compile a systemtap script on a development machine that has the debugging information needed to compile the script and then transfer the resulting shared object to a production machine that doesn't have any development tools or debugging information installed.
+ man stapsh
+ head -n 20
STAPSH(8) System Manager's Manual STAPSH(8)
NAME
stapsh
SYNOPSIS
stapsh
DESCRIPTION
The stapsh executable is used by the stap --remote functionality, as a wrapper shell on the remote machines. It is not intended to be run directly by users.
SEE ALSO
stap(1)
+ man start-statd
+ head -n 20
No manual entry for start-statd
+ man strace
+ head -n 20
STRACE(1) General Commands Manual STRACE(1)
NAME
strace - trace system calls and signals
SYNOPSIS
strace [-ACdffhikqrtttTvVxxy] [-I n] [-b execve] [-e expr]... [-a column] [-o file] [-s strsize] [-X format] [-P path]... [-p pid]... { -p pid | [-D] [-E var[=val]]... [-u username] command [args] }
strace -c [-df] [-I n] [-b execve] [-e expr]... [-O overhead] [-S sortby] [-P path]... [-p pid]... { -p pid | [-D] [-E var[=val]]... [-u username] command [args] }
DESCRIPTION
In the simplest case strace runs the specified command until it exits. It intercepts and records the system calls which are called by a process and the signals which are received by a process. The name of each system call, its arguments and its return value are printed on standard error or to the file specified with the -o option.
strace is a useful diagnostic, instructional, and debugging tool. System administrators, diagnosticians and trouble-shooters will find it invaluable for solving problems with programs for which the source is not readily available since they do not need to be recompiled in order to trace them. Students, hackers and the overly-curious will find that a great deal can be learned about a system and its
system calls by tracing even ordinary programs. And programmers will find that since system calls and signals are events that happen at the user/kernel interface, a close examination of this boundary is very useful for bug isolation, sanity checking and attempting to capture race conditions.
Each line in the trace contains the system call name, followed by its arguments in parentheses and its return value. An example from stracing the command "cat /dev/null" is:
+ man strace-log-merge
+ head -n 20
STRACE-LOG-MERGE(1) General Commands Manual STRACE-LOG-MERGE(1)
NAME
strace-log-merge - merge strace -ff -tt output
SYNOPSIS
strace-log-merge STRACE_LOG
strace-log-merge --help
DESCRIPTION
strace-log-merge merges the output of strace -ff -tt[t] command, prepending PID to each line and sorting the result using time stamp as a key.
OPTIONS
--help Show program usage and exit.
STRACE_LOG
Output file name prefix of files produced by a strace -ff -tt[t] command.
+ man strings
+ head -n 20
STRINGS(1) GNU Development Tools STRINGS(1)
NAME
strings - print the strings of printable characters in files.
SYNOPSIS
strings [-afovV] [-min-len]
[-n min-len] [--bytes=min-len]
[-t radix] [--radix=radix]
[-e encoding] [--encoding=encoding]
[-] [--all] [--print-file-name]
[-T bfdname] [--target=bfdname]
[-w] [--include-all-whitespace]
[-s] [--output-separatorsep_string]
[--help] [--version] file...
DESCRIPTION
For each file given, GNU strings prints the printable character sequences that are at least 4 characters long (or the number given with the options below) and are followed by an unprintable character.
+ man strip
+ head -n 20
STRIP(1) GNU Development Tools STRIP(1)
NAME
strip - Discard symbols from object files.
SYNOPSIS
strip [-F bfdname |--target=bfdname]
[-I bfdname |--input-target=bfdname]
[-O bfdname |--output-target=bfdname]
[-s|--strip-all]
[-S|-g|-d|--strip-debug]
[--strip-dwo]
[-K symbolname|--keep-symbol=symbolname]
[-M|--merge-notes][--no-merge-notes]
[-N symbolname |--strip-symbol=symbolname]
[-w|--wildcard]
[-x|--discard-all] [-X |--discard-locals]
[-R sectionname |--remove-section=sectionname]
+ man su
+ head -n 20
SU(1) User Commands SU(1)
NAME
su - run a command with substitute user and group ID
SYNOPSIS
su [options] [-] [user [argument...]]
DESCRIPTION
su allows to run commands with a substitute user and group ID.
When called without arguments, su defaults to running an interactive shell as root.
For backward compatibility, su defaults to not change the current directory and to only set the environment variables HOME and SHELL (plus USER and LOGNAME if the target user is not root). It is recommended to always use the --login option (instead of its shortcut -) to avoid side effects caused by mixing environments.
This version of su uses PAM for authentication, account and session management. Some configuration options found in other su implementations, such as support for a wheel group, have to be configured via PAM.
su is mostly designed for unprivileged users, the recommended solution for privileged users (e.g. scripts executed by root) is to use non-set-user-ID command runuser(1) that does not require authentication and provide separate PAM configuration. If the PAM session is not required at all then the recommend solution is to use command setpriv(1).
+ man sudo
+ head -n 20
SUDO(8) BSD System Manager's Manual SUDO(8)
NAME
sudo, sudoedit — execute a command as another user
SYNOPSIS
sudo -h | -K | -k | -V
sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user]
sudo -l [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-U user] [-u user] [command]
sudo [-AbEHnPS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-r role] [-t type] [-T timeout] [-u user] [VAR=value] [-i | -s] [command]
sudoedit [-AknS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-T timeout] [-u user] file ...
DESCRIPTION
sudo allows a permitted user to execute a command as the superuser or another user, as specified by the security policy. The invoking user's real (not effective) user ID is used to determine the user name with which to query the security policy.
sudo supports a plugin architecture for security policies and input/output logging. Third parties can develop and distribute their own policy and I/O logging plugins to work seamlessly with the sudo front end. The default security policy is sudoers, which is configured via the file /etc/sudoers, or via LDAP. See the Plugins section for more information.
The security policy determines what privileges, if any, a user has to run sudo. The policy may require that users authenticate themselves with a password or another authentication mechanism. If authentication is required, sudo will exit if the user's password is not entered within a configurable time limit. This limit is policy-specific; the default password prompt timeout for the sudoers security
policy is 5 minutes.
+ man sudoedit
+ head -n 20
SUDO(8) BSD System Manager's Manual SUDO(8)
NAME
sudo, sudoedit — execute a command as another user
SYNOPSIS
sudo -h | -K | -k | -V
sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user]
sudo -l [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-U user] [-u user] [command]
sudo [-AbEHnPS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-r role] [-t type] [-T timeout] [-u user] [VAR=value] [-i | -s] [command]
sudoedit [-AknS] [-a type] [-C num] [-c class] [-g group] [-h host] [-p prompt] [-T timeout] [-u user] file ...
DESCRIPTION
sudo allows a permitted user to execute a command as the superuser or another user, as specified by the security policy. The invoking user's real (not effective) user ID is used to determine the user name with which to query the security policy.
sudo supports a plugin architecture for security policies and input/output logging. Third parties can develop and distribute their own policy and I/O logging plugins to work seamlessly with the sudo front end. The default security policy is sudoers, which is configured via the file /etc/sudoers, or via LDAP. See the Plugins section for more information.
The security policy determines what privileges, if any, a user has to run sudo. The policy may require that users authenticate themselves with a password or another authentication mechanism. If authentication is required, sudo will exit if the user's password is not entered within a configurable time limit. This limit is policy-specific; the default password prompt timeout for the sudoers security
policy is 5 minutes.
+ man sudoreplay
+ head -n 20
SUDOREPLAY(8) BSD System Manager's Manual SUDOREPLAY(8)
NAME
sudoreplay — replay sudo session logs
SYNOPSIS
sudoreplay [-hnR] [-d dir] [-f filter] [-m num] [-s num] ID
sudoreplay [-h] [-d dir] -l [search expression]
DESCRIPTION
sudoreplay plays back or lists the output logs created by sudo. When replaying, sudoreplay can play the session back in real-time, or the playback speed may be adjusted (faster or slower) based on the command line options.
The ID should either be a six character sequence of digits and upper case letters, e.g. 0100A5, or a pattern matching the iolog_file option in the sudoers file. When a command is run via sudo with log_output enabled in the sudoers file, a TSID=ID string is logged via syslog or to the sudo log file. The ID may also be determined using sudoreplay's list mode.
In list mode, sudoreplay can be used to find the ID of a session based on a number of criteria such as the user, tty or command run.
In replay mode, if the standard input and output are connected to a terminal and the -n option is not specified, sudoreplay will operate interactively. In interactive mode, sudoreplay will attempt to adjust the terminal size to match that of the session and write directly to the terminal (not all terminals support this). Additionally, it will poll the keyboard and act on the following keys:
‘\n’ or ‘\r’ Skip to the next replay event; useful for long pauses.
+ man sulogin
+ head -n 20
SULOGIN(8) System Administration SULOGIN(8)
NAME
sulogin - single-user login
SYNOPSIS
sulogin [options] [tty]
DESCRIPTION
sulogin is invoked by init when the system goes into single-user mode.
The user is prompted:
Give root password for system maintenance
(or type Control-D for normal startup):
If the root account is locked and --force is specified, no password is required.
+ man sushell
+ head -n 20
SUSHELL(8) System Manager's Manual SUSHELL(8)
NAME
sushell - execute the single-user shell
SYNOPSIS
sushell
DESCRIPTION
sushell executes the single-user shell. By default, this is /bin/bash This can be configured via the SUSHELL environment variable.
NOTES
sushell is an implementation detail, required for proper SELinux usage. It is not intended to be run regularly.
Red Hat, Inc SUSHELL(8)
+ man swaplabel
+ head -n 20
SWAPLABEL(8) System Administration SWAPLABEL(8)
NAME
swaplabel - print or change the label or UUID of a swap area
SYNOPSIS
swaplabel [-L label] [-U UUID] device
DESCRIPTION
swaplabel will display or change the label or UUID of a swap partition located on device (or regular file).
If the optional arguments -L and -U are not given, swaplabel will simply display the current swap-area label and UUID of device.
If an optional argument is present, then swaplabel will change the appropriate value on device. These values can also be set during swap creation using mkswap(8). The swaplabel utility allows to change the label or UUID on an actively used swap device.
OPTIONS
-h, --help
Display help text and exit.
+ man swapoff
+ head -n 20
SWAPON(8) System Administration SWAPON(8)
NAME
swapon, swapoff - enable/disable devices and files for paging and swapping
SYNOPSIS
swapon [options] [specialfile...]
swapoff [-va] [specialfile...]
DESCRIPTION
swapon is used to specify devices on which paging and swapping are to take place.
The device or file used is given by the specialfile parameter. It may be of the form -L label or -U uuid to indicate a device by label or uuid.
Calls to swapon normally occur in the system boot scripts making all swap devices available, so that the paging and swapping activity is interleaved across several devices and files.
swapoff disables swapping on the specified devices and files. When the -a flag is given, swapping is disabled on all known swap devices and files (as found in /proc/swaps or /etc/fstab).
+ man swapon
+ head -n 20
SWAPON(8) System Administration SWAPON(8)
NAME
swapon, swapoff - enable/disable devices and files for paging and swapping
SYNOPSIS
swapon [options] [specialfile...]
swapoff [-va] [specialfile...]
DESCRIPTION
swapon is used to specify devices on which paging and swapping are to take place.
The device or file used is given by the specialfile parameter. It may be of the form -L label or -U uuid to indicate a device by label or uuid.
Calls to swapon normally occur in the system boot scripts making all swap devices available, so that the paging and swapping activity is interleaved across several devices and files.
swapoff disables swapping on the specified devices and files. When the -a flag is given, swapping is disabled on all known swap devices and files (as found in /proc/swaps or /etc/fstab).
+ man switch_root
+ head -n 20
SWITCH_ROOT(8) System Administration SWITCH_ROOT(8)
NAME
switch_root - switch to another filesystem as the root of the mount tree
SYNOPSIS
switch_root [-hV]
switch_root newroot init [arg...]
DESCRIPTION
switch_root moves already mounted /proc, /dev, /sys and /run to newroot and makes newroot the new root filesystem and starts init process.
WARNING: switch_root removes recursively all files and directories on the current root filesystem.
OPTIONS
-h, --help
+ man sys-unconfig
+ head -n 20
SYS-UNCONFIG(8) System Manager's Manual SYS-UNCONFIG(8)
NAME
sys-unconfig - shell script to reconfigure the system upon next boot
SYNOPSIS
sys-unconfig
DESCRIPTION
sys-unconfig provides a simple method of reconfiguring a system in a new environment. Upon executing sys-unconfig will poweroff your system, and run firstboot at next boot.
FILES
/.unconfigured The presence of this file will trigger firsboot.
NOTES
This utility should not be used for creating cloud or virtual machine images. For that use please see virt-sysprep.
+ man sysctl
+ head -n 20
SYSCTL(8) System Administration SYSCTL(8)
NAME
sysctl - configure kernel parameters at runtime
SYNOPSIS
sysctl [options] [variable[=value]] [...]
sysctl -p [file or regexp] [...]
DESCRIPTION
sysctl is used to modify kernel parameters at runtime. The parameters available are those listed under /proc/sys/. Procfs is required for sysctl support in Linux. You can use sysctl to both read and write sysctl data.
PARAMETERS
variable
The name of a key to read from. An example is kernel.ostype. The '/' separator is also accepted in place of a '.'.
variable=value
To set a key, use the form variable=value where variable is the key and value is the value to set it to. If the value contains quotes or characters which are parsed by the shell, you may need to enclose the value in double quotes. This requires the -w parameter to use.
+ man systemctl
+ head -n 20
SYSTEMCTL(1) systemctl SYSTEMCTL(1)
NAME
systemctl - Control the systemd system and service manager
SYNOPSIS
systemctl [OPTIONS...] COMMAND [NAME...]
DESCRIPTION
systemctl may be used to introspect and control the state of the "systemd" system and service manager. Please refer to systemd(1) for an introduction into the basic concepts and functionality this tool manages.
OPTIONS
The following options are understood:
-t, --type=
The argument should be a comma-separated list of unit types such as service and socket.
If one of the arguments is a unit type, when listing units, limit display to certain unit types. Otherwise, units of all types will be shown.
+ man systemd-analyze
+ head -n 20
SYSTEMD-ANALYZE(1) systemd-analyze SYSTEMD-ANALYZE(1)
NAME
systemd-analyze - Analyze system boot-up performance
SYNOPSIS
systemd-analyze [OPTIONS...] [time]
systemd-analyze [OPTIONS...] blame
systemd-analyze [OPTIONS...] critical-chain [UNIT...]
systemd-analyze [OPTIONS...] plot [> file.svg]
systemd-analyze [OPTIONS...] dot [PATTERN...] [> file.dot]
systemd-analyze [OPTIONS...] dump
+ man systemd-ask-password
+ head -n 20
SYSTEMD-ASK-PASSWORD(1) systemd-ask-password SYSTEMD-ASK-PASSWORD(1)
NAME
systemd-ask-password - Query the user for a system password
SYNOPSIS
systemd-ask-password [OPTIONS...] [MESSAGE]
DESCRIPTION
systemd-ask-password may be used to query a system password or passphrase from the user, using a question message specified on the command line. When run from a TTY it will query a password on the TTY and print it to standard output. When run with no TTY or with --no-tty it will query the password system-wide and allow active users to respond via several agents. The latter is only available to
privileged processes.
The purpose of this tool is to query system-wide passwords -- that is passwords not attached to a specific user account. Examples include: unlocking encrypted hard disks when they are plugged in or at boot, entering an SSL certificate passphrase for web and VPN servers.
Existing agents are: a boot-time password agent asking the user for passwords using Plymouth; a boot-time password agent querying the user directly on the console; an agent requesting password input via a wall(1) message; an agent suitable for running in a GNOME session; a command line agent which can be started temporarily to process queued password requests; a TTY agent that is temporarily spawned
during systemctl(1) invocations.
Additional password agents may be implemented according to the systemd Password Agent Specification[1].
+ man systemd-cat
+ head -n 20
SYSTEMD-CAT(1) systemd-cat SYSTEMD-CAT(1)
NAME
systemd-cat - Connect a pipeline or program's output with the journal
SYNOPSIS
systemd-cat [OPTIONS...] [COMMAND] [ARGUMENTS...]
systemd-cat [OPTIONS...]
DESCRIPTION
systemd-cat may be used to connect the standard input and output of a process to the journal, or as a filter tool in a shell pipeline to pass the output the previous pipeline element generates to the journal.
If no parameter is passed, systemd-cat will write everything it reads from standard input (stdin) to the journal.
If parameters are passed, they are executed as command line with standard output (stdout) and standard error output (stderr) connected to the journal, so that all it writes is stored in the journal.
OPTIONS
+ man systemd-cgls
+ head -n 20
SYSTEMD-CGLS(1) systemd-cgls SYSTEMD-CGLS(1)
NAME
systemd-cgls - Recursively show control group contents
SYNOPSIS
systemd-cgls [OPTIONS...] [CGROUP...]
DESCRIPTION
systemd-cgls recursively shows the contents of the selected Linux control group hierarchy in a tree. If arguments are specified, shows all member processes of the specified control groups plus all their subgroups and their members. The control groups may either be specified by their full file paths or are assumed in the systemd control group hierarchy. If no argument is specified and the current
working directory is beneath the control group mount point /sys/fs/cgroup, shows the contents of the control group the working directory refers to. Otherwise, the full systemd control group hierarchy is shown.
By default, empty control groups are not shown.
OPTIONS
The following options are understood:
--all
+ man systemd-cgtop
+ head -n 20
SYSTEMD-CGTOP(1) systemd-cgtop SYSTEMD-CGTOP(1)
NAME
systemd-cgtop - Show top control groups by their resource usage
SYNOPSIS
systemd-cgtop [OPTIONS...]
DESCRIPTION
systemd-cgtop shows the top control groups of the local Linux control group hierarchy, ordered by their CPU, memory, or disk I/O load. The display is refreshed in regular intervals (by default every 1s), similar in style to top(1). If systemd-cgtop is not connected to a tty, only one iteration is performed and no columns headers are printed. This mode is suitable for scripting.
Resource usage is only accounted for control groups in the relevant hierarchy, i.e. CPU usage is only accounted for control groups in the "cpuacct" hierarchy, memory usage only for those in "memory" and disk I/O usage for those in "blkio". If resource monitoring for these resources is required, it is recommended to add the CPUAccounting=1, MemoryAccounting=1 and BlockIOAccounting=1 settings in the unit
files in question. See systemd.resource-control(5) for details.
To emphasize this: unless "CPUAccounting=1", "MemoryAccounting=1" and "BlockIOAccounting=1" are enabled for the services in question, no resource accounting will be available for system services and the data shown by systemd-cgtop will be incomplete.
OPTIONS
The following options are understood:
+ man systemd-coredumpctl
+ head -n 20
No manual entry for systemd-coredumpctl
+ man systemd-delta
+ head -n 20
SYSTEMD-DELTA(1) systemd-delta SYSTEMD-DELTA(1)
NAME
systemd-delta - Find overridden configuration files
SYNOPSIS
systemd-delta [OPTIONS...] [PREFIX[/SUFFIX]|SUFFIX...]
DESCRIPTION
systemd-delta may be used to identify and compare configuration files that override other configuration files. Files in /etc have highest priority, files in /run have the second highest priority, ..., files in /lib have lowest priority. Files in a directory with higher priority override files with the same name in directories of lower priority. In addition, certain configuration files can have ".d"
directories which contain "drop-in" files with configuration snippets which augment the main configuration file. "Drop-in" files can be overriden in the same way by placing files with the same name in a directory of higher priority (except that in case of "drop-in" files, both the "drop-in" file name and the name of the containing directory, which corresponds to the name of the main configuration file,
must match). For a fuller explanation, see systemd.unit(5).
The command line argument will be split into a prefix and a suffix. Either is optional. The prefix must be one of the directories containing configuration files (/etc, /run, /usr/lib, ...). If it is given, only overriding files contained in this directory will be shown. Otherwise, all overriding files will be shown. The suffix must be a name of a subdirectory containing configuration files like
tmpfiles.d, sysctl.d or systemd/system. If it is given, only configuration files in this subdirectory (across all configuration paths) will be analyzed. Otherwise, all configuration files will be analyzed. If the command line argument is not given at all, all configuration files will be analyzed. See below for some examples.
OPTIONS
The following options are understood:
+ man systemd-detect-virt
+ head -n 20
SYSTEMD-DETECT-VIRT(1) systemd-detect-virt SYSTEMD-DETECT-VIRT(1)
NAME
systemd-detect-virt - Detect execution in a virtualized environment
SYNOPSIS
systemd-detect-virt [OPTIONS...]
DESCRIPTION
systemd-detect-virt detects execution in a virtualized environment. It identifies the virtualization technology and can distinguish full VM virtualization from container virtualization. systemd-detect-virt exits with a return value of 0 (success) if a virtualization technology is detected, and non-zero (error) otherwise. By default any type of virtualization is detected, and the options --container
and --vm can be used to limit what types of virtualization are detected.
When executed without --quiet will print a short identifier for the detected virtualization technology. The following technologies are currently identified:
Table 1. Known virtualization technologies (both VM, i.e. full hardware virtualization, and container, i.e. shared kernel virtualization)
┌──────────┬────────────────┬──────────────────────────────────────────────────────────────────────────────┐
│Type │ ID │ Product │
├──────────┼────────────────┼──────────────────────────────────────────────────────────────────────────────┤
+ man systemd-escape
+ head -n 20
SYSTEMD-ESCAPE(1) systemd-escape SYSTEMD-ESCAPE(1)
NAME
systemd-escape - Escape strings for usage in system unit names
SYNOPSIS
systemd-escape [OPTIONS...] [STRING...]
DESCRIPTION
systemd-escape may be used to escape strings for inclusion in systemd unit names. The command may be used to escape and to undo escaping of strings.
The command takes any number of strings on the command line, and will process them individually, one after the other. It will output them separated by spaces to stdout.
By default this command will escape the strings passed, unless --unescape is passed which results in the inverse operation being applied. If --mangle a special mode of escaping is applied instead, which assumes a string to be already escaped but will escape everything that appears obviously non-escaped.
OPTIONS
The following options are understood:
+ man systemd-firstboot
+ head -n 20
SYSTEMD-FIRSTBOOT(1) systemd-firstboot SYSTEMD-FIRSTBOOT(1)
NAME
systemd-firstboot, systemd-firstboot.service - Initialize basic system settings on or before the first boot-up of a system
SYNOPSIS
systemd-firstboot [OPTIONS...]
systemd-firstboot.service
DESCRIPTION
systemd-firstboot initializes the most basic system settings interactively on the first boot, or optionally non-interactively when a system image is created. The following settings may be set up:
· The system locale, more specifically the two locale variables LANG= and LC_MESSAGES
· The system time zone
· The system host name
+ man systemd-hwdb
+ head -n 20
SYSTEMD-HWDB(8) systemd-hwdb SYSTEMD-HWDB(8)
NAME
systemd-hwdb - hardware database management tool
SYNOPSIS
systemd-hwdb [options] update
systemd-hwdb [options] query modalias
DESCRIPTION
systemd-hwdb expects a command and command specific arguments. It manages the binary hardware database.
OPTIONS
-h, --help
Print help text.
--usr
+ man systemd-inhibit
+ head -n 20
SYSTEMD-INHIBIT(1) systemd-inhibit SYSTEMD-INHIBIT(1)
NAME
systemd-inhibit - Execute a program with an inhibition lock taken
SYNOPSIS
systemd-inhibit [OPTIONS...] [COMMAND] [ARGUMENTS...]
systemd-inhibit [OPTIONS...] --list
DESCRIPTION
systemd-inhibit may be used to execute a program with a shutdown, sleep or idle inhibitor lock taken. The lock will be acquired before the specified command line is executed and released afterwards.
Inhibitor locks may be used to block or delay system sleep and shutdown requests from the user, as well as automatic idle handling of the OS. This is useful to avoid system suspends while an optical disc is being recorded, or similar operations that should not be interrupted.
For more information see the Inhibitor Lock Developer Documentation[1].
OPTIONS
+ man systemd-loginctl
+ head -n 20
No manual entry for systemd-loginctl
+ man systemd-machine-id-setup
+ head -n 20
SYSTEMD-MACHINE-ID-SETUP(1) systemd-machine-id-setup SYSTEMD-MACHINE-ID-SETUP(1)
NAME
systemd-machine-id-setup - Initialize the machine ID in /etc/machine-id
SYNOPSIS
systemd-machine-id-setup
DESCRIPTION
systemd-machine-id-setup may be used by system installer tools to initialize the machine ID stored in /etc/machine-id at install time with a randomly generated ID. See machine-id(5) for more information about this file.
This tool will execute no operation if /etc/machine-id is already initialized.
If a valid D-Bus machine ID is already configured for the system, the D-Bus machine ID is copied and used to initialize the machine ID in /etc/machine-id.
If run inside a KVM virtual machine and a UUID is passed via the -uuid option, this UUID is used to initialize the machine ID instead of a randomly generated one. The caller must ensure that the UUID passed is sufficiently unique and is different for every booted instanced of the VM.
Similar, if run inside a Linux container environment and a UUID is set for the container this is used to initialize the machine ID. For details see the documentation of the Container Interface[1].
+ man systemd-notify
+ head -n 20
SYSTEMD-NOTIFY(1) systemd-notify SYSTEMD-NOTIFY(1)
NAME
systemd-notify - Notify service manager about start-up completion and other daemon status changes
SYNOPSIS
systemd-notify [OPTIONS...] [VARIABLE=VALUE...]
DESCRIPTION
systemd-notify may be called by daemon scripts to notify the init system about status changes. It can be used to send arbitrary information, encoded in an environment-block-like list of strings. Most importantly it can be used for start-up completion notification.
This is mostly just a wrapper around sd_notify() and makes this functionality available to shell scripts. For details see sd_notify(3).
The command line may carry a list of environment variables to send as part of the status update.
Note that systemd will refuse reception of status updates from this command unless NotifyAccess=all is set for the service unit this command is called from.
OPTIONS
+ man systemd-nspawn
+ head -n 20
SYSTEMD-NSPAWN(1) systemd-nspawn SYSTEMD-NSPAWN(1)
NAME
systemd-nspawn - Spawn a namespace container for debugging, testing and building
SYNOPSIS
systemd-nspawn [OPTIONS...] [COMMAND [ARGS...]]
systemd-nspawn -b [OPTIONS...] [ARGS...]
DESCRIPTION
systemd-nspawn may be used to run a command or OS in a light-weight namespace container. In many ways it is similar to chroot(1), but more powerful since it fully virtu
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment