summaryrefslogtreecommitdiff
path: root/static/v10/man8
diff options
context:
space:
mode:
authorJacob McDonnell <jacob@jacobmcdonnell.com>2026-04-26 16:38:00 -0400
committerJacob McDonnell <jacob@jacobmcdonnell.com>2026-04-26 16:38:00 -0400
commit97d5c458cfa039d857301e1ca7d5af3beb37131d (patch)
treeb460cd850d0537eb71806ba30358840377b27688 /static/v10/man8
parentb89dc2331a50c63f8b33272a5c4c61ab98abdaa3 (diff)
build: Better Build System
Diffstat (limited to 'static/v10/man8')
-rw-r--r--static/v10/man8/11.812
-rw-r--r--static/v10/man8/20boot.831
-rw-r--r--static/v10/man8/Makefile3
-rw-r--r--static/v10/man8/ac.856
-rw-r--r--static/v10/man8/acct.837
-rw-r--r--static/v10/man8/adduser.887
-rw-r--r--static/v10/man8/analyze.8117
-rw-r--r--static/v10/man8/apx.833
-rw-r--r--static/v10/man8/arcv.823
-rw-r--r--static/v10/man8/arff.864
-rw-r--r--static/v10/man8/asd.8174
-rw-r--r--static/v10/man8/atalla.862
-rw-r--r--static/v10/man8/authmgr.8204
-rw-r--r--static/v10/man8/backup.890
-rw-r--r--static/v10/man8/blmount.823
-rw-r--r--static/v10/man8/bproc.8235
-rw-r--r--static/v10/man8/check.850
-rw-r--r--static/v10/man8/chk.821
-rw-r--r--static/v10/man8/chown.847
-rw-r--r--static/v10/man8/chuck.8116
-rw-r--r--static/v10/man8/cl.8100
-rw-r--r--static/v10/man8/clri.841
-rw-r--r--static/v10/man8/config.848
-rw-r--r--static/v10/man8/cpp.8114
-rw-r--r--static/v10/man8/crash.8268
-rw-r--r--static/v10/man8/cron.886
-rw-r--r--static/v10/man8/dcheck.844
-rw-r--r--static/v10/man8/delivermail.8248
-rw-r--r--static/v10/man8/df.821
-rw-r--r--static/v10/man8/dist.8146
-rw-r--r--static/v10/man8/dkmgr.8165
-rw-r--r--static/v10/man8/dli.827
-rw-r--r--static/v10/man8/dmesg.864
-rw-r--r--static/v10/man8/downgrade.837
-rw-r--r--static/v10/man8/dump.894
-rw-r--r--static/v10/man8/dumpdir.838
-rw-r--r--static/v10/man8/expire.867
-rw-r--r--static/v10/man8/fsck.8248
-rw-r--r--static/v10/man8/fstat.849
-rw-r--r--static/v10/man8/gacct.822
-rw-r--r--static/v10/man8/gettable.865
-rw-r--r--static/v10/man8/getty.888
-rw-r--r--static/v10/man8/halt.821
-rw-r--r--static/v10/man8/htable.8116
-rw-r--r--static/v10/man8/icheck.8182
-rw-r--r--static/v10/man8/inews.893
-rw-r--r--static/v10/man8/init.8147
-rw-r--r--static/v10/man8/ino.810
-rw-r--r--static/v10/man8/ins.8103
-rw-r--r--static/v10/man8/install.834
-rw-r--r--static/v10/man8/ipconfig.8125
-rw-r--r--static/v10/man8/istat.835
-rw-r--r--static/v10/man8/kill.836
-rw-r--r--static/v10/man8/kmc.8107
-rw-r--r--static/v10/man8/ldpcs.858
-rw-r--r--static/v10/man8/login.8138
-rw-r--r--static/v10/man8/makekey.853
-rw-r--r--static/v10/man8/mkfs.8138
-rw-r--r--static/v10/man8/mknod.879
-rw-r--r--static/v10/man8/mkpkg.8179
-rw-r--r--static/v10/man8/mount.8153
-rw-r--r--static/v10/man8/netfs.8315
-rw-r--r--static/v10/man8/netstat.8100
-rw-r--r--static/v10/man8/nosh.8138
-rw-r--r--static/v10/man8/ns.8153
-rw-r--r--static/v10/man8/postbgi.8138
-rw-r--r--static/v10/man8/postio.8205
-rw-r--r--static/v10/man8/postreverse.897
-rw-r--r--static/v10/man8/postscript.8283
-rw-r--r--static/v10/man8/privserv.860
-rw-r--r--static/v10/man8/ps.877
-rw-r--r--static/v10/man8/pstat.8418
-rw-r--r--static/v10/man8/pwserv.877
-rw-r--r--static/v10/man8/quot.8135
-rw-r--r--static/v10/man8/rarepl.8115
-rw-r--r--static/v10/man8/rc.877
-rw-r--r--static/v10/man8/reboot.8127
-rw-r--r--static/v10/man8/recnews.824
-rw-r--r--static/v10/man8/reloc.845
-rw-r--r--static/v10/man8/renice.831
-rw-r--r--static/v10/man8/restor.8112
-rw-r--r--static/v10/man8/route.895
-rw-r--r--static/v10/man8/sa.8185
-rw-r--r--static/v10/man8/salv.886
-rw-r--r--static/v10/man8/savecore.883
-rw-r--r--static/v10/man8/scsish.8222
-rw-r--r--static/v10/man8/sendcover.828
-rw-r--r--static/v10/man8/sendnews.860
-rw-r--r--static/v10/man8/ship.8118
-rw-r--r--static/v10/man8/showq.856
-rw-r--r--static/v10/man8/shutdown.89
-rw-r--r--static/v10/man8/smash.843
-rw-r--r--static/v10/man8/smstat.824
-rw-r--r--static/v10/man8/smtp.8200
-rw-r--r--static/v10/man8/sticky.844
-rw-r--r--static/v10/man8/su.834
-rw-r--r--static/v10/man8/svcmgr.8331
-rw-r--r--static/v10/man8/swapon.837
-rw-r--r--static/v10/man8/swtmp.824
-rw-r--r--static/v10/man8/symorder.823
-rw-r--r--static/v10/man8/sync.818
-rw-r--r--static/v10/man8/syslog.8172
-rw-r--r--static/v10/man8/tcpmgr.873
-rw-r--r--static/v10/man8/tm.848
-rw-r--r--static/v10/man8/tp.8175
-rw-r--r--static/v10/man8/umount.831
-rw-r--r--static/v10/man8/unspk.843
-rw-r--r--static/v10/man8/upas.8275
-rw-r--r--static/v10/man8/update.825
-rw-r--r--static/v10/man8/uucico.8205
-rw-r--r--static/v10/man8/uucleanup.8103
-rw-r--r--static/v10/man8/uurec.818
-rw-r--r--static/v10/man8/vipw.823
-rw-r--r--static/v10/man8/vmstat.8143
-rw-r--r--static/v10/man8/vpac.849
-rw-r--r--static/v10/man8/wall.823
-rw-r--r--static/v10/man8/worm.8436
-rw-r--r--static/v10/man8/xs.863
-rw-r--r--static/v10/man8/xstr.8108
119 files changed, 0 insertions, 11832 deletions
diff --git a/static/v10/man8/11.8 b/static/v10/man8/11.8
deleted file mode 100644
index ed079810..00000000
--- a/static/v10/man8/11.8
+++ /dev/null
@@ -1,12 +0,0 @@
-.TH 11 8
-.CT 1 prog_c
-.SH NAME
-11as, 11cc, 11ld, 11nm, 11ranlib, 11reloc, 11size, 11strip \- pdp11 support
-.SH DESCRIPTION
-These programs do cross-compiling and related support
-functions for the DEC PDP-11 family of computers.
-Their descriptions correspond closely with those of
-similarly named programs in Section 1 of this manual.
-.SH FILES
-.F 11a.out
-output file
diff --git a/static/v10/man8/20boot.8 b/static/v10/man8/20boot.8
deleted file mode 100644
index 893cb167..00000000
--- a/static/v10/man8/20boot.8
+++ /dev/null
@@ -1,31 +0,0 @@
-.pa 1
-.he '20BOOT (VIII)'1/25/73'20BOOT (VIII)'
-.ti 0
-NAME 20boot -- install new 11/20 system
-.sp
-.ti 0
-SYNOPSIS 20boot______ [ x_ ]
-.sp
-.ti 0
-DESCRIPTION This
-shell command file copies the current version
-of the 11/20 program used to run the VT01 display
-onto the /dev/vt0 file.
-
-If no argument is given, the 11/20 program should be executing
-but idle; the 11/20 program is sent preceded by a
-"reboot" command.
-If an argument is given, the 11/20 should
-have been restarted at its ROM location
-777300.
-.sp
-.ti 0
-FILES /dev/vt0;
-.br
-/sys/mdec/20.o (11/20 program)
-.sp
-.ti 0
-SEE ALSO vt0 (IV)
-.sp
-.ti 0
-DIAGNOSTICS --
diff --git a/static/v10/man8/Makefile b/static/v10/man8/Makefile
deleted file mode 100644
index a2af6bc6..00000000
--- a/static/v10/man8/Makefile
+++ /dev/null
@@ -1,3 +0,0 @@
-MAN = $(wildcard *.8)
-
-include ../../mandoc.mk
diff --git a/static/v10/man8/ac.8 b/static/v10/man8/ac.8
deleted file mode 100644
index 1048aa19..00000000
--- a/static/v10/man8/ac.8
+++ /dev/null
@@ -1,56 +0,0 @@
-.TH AC 8
-.CT 1 sa_nonmortals
-.SH NAME
-ac \- login accounting
-.SH SYNOPSIS
-.B /etc/ac
-[
-.I option ...
-]
-[
-.I person ...
-]
-.SH DESCRIPTION
-.I Ac
-prints the total connect time
-recorded in the accounting file,
-.FR /usr/adm/wtmp .
-If
-.I persons
-are named, only those login names are considered.
-The options are
-.TP
-.BI -w " file"
-Use
-.I file
-instead of
-.FR /usr/adm/wtmp ;
-.L -
-means the standard input.
-.TP
-.B -p
-Print total connect time for each
-user.
-.TP
-.B -d
-Print totals for each day.
-.PP
-The accounting file
-.F /usr/adm/wtmp
-is maintained by
-.I init
-and
-.IR login (8),
-provided it exists.
-To start accounting, create it with length 0.
-When accounting is turned on, the file grows without limit.
-It is prudent periodically
-to process the data and truncate the file.
-.SH FILES
-.F /usr/adm/wtmp
-.SH "SEE ALSO"
-.IR init (8),
-.IR sa (8),
-.IR login (8),
-.IR utmp (5),
-.IR who (1)
diff --git a/static/v10/man8/acct.8 b/static/v10/man8/acct.8
deleted file mode 100644
index fe5bebbc..00000000
--- a/static/v10/man8/acct.8
+++ /dev/null
@@ -1,37 +0,0 @@
-.pa 1
-.he 'ACCT (VIII)'1/20/73'ACCT (VIII)'
-.ti 0
-NAME acct -- login accounting
-.sp
-.ti 0
-SYNOPSIS acct____ [ -w__ wtmp ] [ -p__ ] [ -d__ ] people
-.sp
-.ti 0
-DESCRIPTION acct____
-produces a printout giving
-connect time
-for each user who has logged in
-during the life of the current wtmp____ file.
-A total is also produced.
--w__ is used to specify an alternate wtmp file.
--p__ prints individual totals; without this option,
-only totals are printed.
--d__ causes a printout for each midnight to midnight
-period.
-The people______ argument will limit the
-printout to only the specified login names.
-If no wtmp file is given,
-/usr/adm/wtmp_____________
-is used.
-.sp
-.ti 0
-FILES /usr/adm/wtmp
-.sp
-.ti 0
-SEE ALSO init(VII), login(I), wtmp(V).
-.sp
-.ti 0
-DIAGNOSTICS "Cannot open 'wtmp'" if argument is unreadable.
-.sp
-.ti 0
-BUGS --
diff --git a/static/v10/man8/adduser.8 b/static/v10/man8/adduser.8
deleted file mode 100644
index c22c10b1..00000000
--- a/static/v10/man8/adduser.8
+++ /dev/null
@@ -1,87 +0,0 @@
-.TH ADDUSER 8
-.UC 4
-.SH NAME
-adduser \- procedure for adding new users
-.SH DESCRIPTION
-A new user must choose a login name, which must not already appear in
-.I /etc/passwd.
-An account can be added by editing a line into the passwd file; this must
-be done with the password file locked e.g. by using
-.IR vipw (8).
-.PP
-A new user is given a group and user id.
-User id's should be distinct across a system, since they
-are used to control access to files.
-Typically, users working on
-similar projects will be put in the same group. Thus at UCB we have
-groups for system staff, faculty, graduate students, and a few special
-groups for large projects. System staff is group \*(lq10\*(rq for historical
-reasons, and the super-user is in this group.
-.PP
-A skeletal account for a new user \*(lqernie\*(rq would look like:
-.IP
-ernie::235:20:& Kovacs,508E,7925,6428202:/mnt/grad/ernie:/bin/csh
-.PP
-The first field is the login name \*(lqernie\*(rq. The next field is the
-encrypted password which is not given and must be initialized using
-.IR passwd (1).
-The next two fields are the user and group id's.
-Traditionally, users in group 20 are graduate students and have account
-names with numbers in the 200's.
-The next field gives information about ernie's real name, office and office
-phone and home phone.
-This information is used by the
-.IR finger (1)
-program.
-From this information we can tell that ernie's real name is
-\*(lqErnie Kovacs\*(rq (the & here serves to repeat \*(lqernie\*(rq
-with appropriate capitalization), that his office is 508 Evans Hall,
-his extension is x2-7925, and this his home phone number is 642-8202.
-You can modify the
-.IR finger (1)
-program if necessary to allow different information to be encoded in
-this field. The UCB version of finger knows several things particular
-to Berkeley \- that phone extensions start \*(lq2\-\*(rq, that offices ending
-in \*(lqE\*(rq are in Evans Hall and that offices ending in \*(lqC\*(rq are
-in Cory Hall.
-.PP
-The final two fields give a login directory and a login shell name.
-Traditionally, user files live on a file system which has the machines
-single letter
-.IR net (1)
-address as the first of two characters. Thus on the Berkeley CS Department
-VAX, whose Berknet address is ``csvax'' abbreviated ``v'' the user file
-systems are mounted on ``/va'', ``/vb'', etc.
-On each such filesystem there are subdirectories there for each group
-of users, i.e.: \*(lq/va/staff\*(rq and \*(lq/vb/prof\*(rq.
-This is not strictly necessary but keeps the number of files in the
-top level directories reasonably small.
-.PP
-The login shell will default to \*(lq/bin/sh\*(rq if none is given.
-Most users at Berkeley choose \*(lq/bin/csh\*(rq so this is usually
-specified here.
-.PP
-It is useful to give new users some help in getting started, supplying
-them with a few skeletal files such as
-.I \&.profile
-if they use \*(lq/bin/sh\*(rq, or
-.I \&.cshrc
-and
-.I \&.login
-if they use \*(lq/bin/csh\*(rq.
-The directory
-\*(lq/usr/skel\*(rq contains skeletal definitions of such files.
-New users should be given copies of these files which, for instance,
-arrange to use
-.IR tset (1)
-automatically at each login.
-.SH FILES
-.ta 2i
-/etc/passwd password file
-.br
-/usr/skel skeletal login directory
-.SH SEE ALSO
-passwd(1), finger(1), chsh(1), chfn(1), passwd(5), vipw(8)
-.SH BUGS
-User information should be stored in its own data base separate from
-the password file.
diff --git a/static/v10/man8/analyze.8 b/static/v10/man8/analyze.8
deleted file mode 100644
index 72c8769c..00000000
--- a/static/v10/man8/analyze.8
+++ /dev/null
@@ -1,117 +0,0 @@
-.lg 0
-.TH ANALYZE 8
-.UC 4
-.SH NAME
-analyze \- Virtual UNIX postmortem crash analyzer
-.SH SYNOPSIS
-.B /etc/analyze
-[
-.B \-s
-swapfile
-] [
-.B \-f
-] [
-.B \-m
-] [
-.B \-d
-] [
-.B \-D
-] [
-.B \-v
-]
-corefile
-[ system ]
-.SH DESCRIPTION
-.I Analyze
-is the post-mortem analyzer for the state of the paging system.
-In order to use
-.I analyze
-you must arrange to get a image of the memory (and possibly the
-paging area) of the system after it crashes (see
-.IR crash (8)).
-.PP
-The
-.I analyze
-program reads the relevant system data structures from the core
-image file and indexing information from
-.B /vmunix
-(or the specified file).
-to determine the state of the paging subsystem at the point of crash.
-It looks at each process in the system, and the resources each is
-using in an attempt to determine inconsistencies in the paging system
-state. Normally, the output consists of a sequence of lines showing
-each active process, its state (whether swapped in or not), its
-.I p0br,
-and the number and location of its page table pages.
-Any pages which are locked while raw i/o is in progress, or which
-are locked because they are
-.I intransit
-are also printed. (Intransit text pages often diagnose as duplicated;
-you will have to weed these out by hand.)
-.PP
-The program checks that any pages in core which are marked as not
-modified are, in fact, identical to the swap space copies.
-It also checks for non-overlap of the swap space, and that the core
-map entries correspond to the page tables.
-The state of the free list is also checked.
-.PP
-Options to
-.I analyze:
-.TP
-.B \-D
-causes the diskmap for each process to be printed.
-.TP
-.B \-d
-causes the (sorted) paging area usage to be printed.
-.TP
-.B \-f
-which causes the free list to be dumped.
-.TP
-.B \-m
-causes the entire coremap state to be dumped.
-.TP
-.B \-v
-(long unused) which causes a hugely verbose output format to be used.
-.PP
-In general, the output from this program can be confused by processes
-which were forking, swapping, or exiting or
-happened to be in unusual states when the
-crash occurred. You should examine the flags fields of relevant processes
-in the output of a
-.IR pstat (8)
-to weed out such processes.
-.PP
-It is possible to look at the core dump with
-.I adb
-if you do
-.IP
-adb /vmunix /vmcore
-.br
-.lg 0
-/m 80000000 #ffffffff
-.LP
-which fixes the map of
-.I vmcore
-so that symbols in data space will work.
-Note that the debugger is looking at the physical memory at the point
-of crash; you will have to determine which pages of physical memory
-virtual pages are in if you wish to look at them.
-If
-.I analyze
-says that a processes page tables are in page 218 (hex of course), then
-you can look at them by looking at address 0x80043000 in the dump, i.e.
-\*(lq80043000,80/X\*(rq will print the page of page tables.
-.SH FILES
-/vmunix default system namelist
-.SH SEE ALSO
-ps(1), crash(8), pstat(8)
-.SH AUTHORS
-Ozalp Babaoglu and William Joy
-.SH DIAGNOSTICS
-Various diagnostics about overlaps in swap mappings, missing swap mappings,
-page table entries inconsistent with the core map, incore pages which
-are marked clean but differ from disk-image copies, pages which are
-locked or intransit, and inconsistencies in the free list.
-.PP
-It would be nice if this program analyzed the system in general, rather
-than just the paging system in particular.
diff --git a/static/v10/man8/apx.8 b/static/v10/man8/apx.8
deleted file mode 100644
index 3d2cd296..00000000
--- a/static/v10/man8/apx.8
+++ /dev/null
@@ -1,33 +0,0 @@
-.TH APX 8
-.CT 1 sa_nonmortals secur
-.SH NAME
-apx \- mark an open stream device trusted
-.SH SYNOPSIS
-.B /etc/apx
-[
-.I arg
-]
-.SH DESCRIPTION
-By default, a freshly opened stream device has the
-.B APX
-bit cleared: it will reject all pex requests.
-If invoked without an argument,
-.I apx
-will set the APX bit on its standard input
-(by calling the
-.B FIOAPX
-control).
-If invoked without an argument the
-.B APX
-bit is cleared.
-.I Apx
-needs licence
-.B T_EXTERN
-to run.
-It is usually automatically invoked at login time,
-provided that the source identifier of the standard input
-of the login session is worthy.
-.SH FILES
-.F /etc/privs
-.SH SEE ALSO
-.IR pex (4)
diff --git a/static/v10/man8/arcv.8 b/static/v10/man8/arcv.8
deleted file mode 100644
index a55ac199..00000000
--- a/static/v10/man8/arcv.8
+++ /dev/null
@@ -1,23 +0,0 @@
-.TH ARCV 8
-.UC 4
-.SH NAME
-arcv \- convert archives to new format
-.SH SYNOPSIS
-.B /etc/arcv
-file ...
-.SH DESCRIPTION
-.I Arcv
-converts archive files
-(see
-.IR ar (1),
-.IR ar (5))
-from 32v and Third Berkeley editions to a new portable format.
-The conversion is done in place, and the command
-refuses to alter a file not in old archive format.
-.PP
-Old archives are marked with a magic number of 0177545 at the start;
-new archives have a first line ``!<arch>''.
-.SH FILES
-/tmp/v*, temporary copy
-.SH SEE ALSO
-ar(1), ar(5)
diff --git a/static/v10/man8/arff.8 b/static/v10/man8/arff.8
deleted file mode 100644
index 4f082533..00000000
--- a/static/v10/man8/arff.8
+++ /dev/null
@@ -1,64 +0,0 @@
-.TH ARFF 8
-.CT 1 sa_nonmortals
-.SH NAME
-arff \- read RT11 files
-.SH SYNOPSIS
-.B arff
-[
-.I key
-]
-[
-.I name ...
-]
-.SH DESCRIPTION
-.I Arff
-reads and writes files
-on an RT11 volume,
-such as the VAX-11/780 console floppy or
-11/750 console tape.
-Its actions are controlled by the
-.I key
-argument, in the manner of
-.IR ar (1).
-Other arguments
-are the names of files
-to be read or written.
-.PP
-The RT11 filesystem restricts names to the character set
-.BR a - z0 - 9.\| ,
-and there are no subdirectories.
-Filename arguments are trimmed to the last pathname element
-and mapped to lower case.
-.PP
-The key must contain one of the letters
-.LR rxdt ,
-which mean the same as in
-.I ar.
-Unlike
-.I ar,
-however,
-.I arff
-may reorder files to fit without moving existing files.
-.PP
-Other key letters are
-.TP
-v
-Verbose.
-.TP
-.B f
-The next argument is the name of the archive instead
-of the default
-.FR /dev/floppy .
-.TP
-.B m
-Omit the DEC-standard sector interleaving algorithm;
-needed when the file isn't a floppy;
-e.g. the 11/750 console cassette.
-.SH FILES
-.F /dev/floppy
-.SH BUGS
-Floppy errors are handled ungracefully.
-.br
-The program is too floppy-dependent.
-Mapping belongs in the device driver,
-or at least shouldn't be the default.
diff --git a/static/v10/man8/asd.8 b/static/v10/man8/asd.8
deleted file mode 100644
index 1bf1ff51..00000000
--- a/static/v10/man8/asd.8
+++ /dev/null
@@ -1,174 +0,0 @@
-.TH ASD 8
-.CT 1 sa_auto
-.SH NAME
-asd \- automatic software distribution
-.SH SYNOPSIS
-.B /usr/lib/asd/cdaemon
-.br
-.B /usr/lib/asd/dkinstall
-.br
-.B /usr/lib/asd/mkspool
-.br
-.B /usr/lib/asd/rmlocks
-.br
-.B /usr/lib/asd/udaemon
-.SH DESCRIPTION
-These programs constitute the innards of the
-automatic software distribution system
-invoked by
-.IR ship (8).
-.PP
-.I Mkspool
-creates an
-.SM ASD
-spool directory for its invoker (if necessary),
-puts a file named
-.F dummy
-in the directory to prevent
-.I cdaemon
-from deleting it,
-and prints the directory's name.
-.PP
-.I Udaemon
-examines its invoker's
-.SM ASD
-spool directory in lexical order
-for things to do.
-To forestall multiple daemons, it first makes an empty file named
-.BI L. pid
-in the spool directory
-and tries to link to it a file
-.FR lock .
-If the link fails,
-.BI L. pid
-is removed and
-.I udaemon
-exits.
-.PP
-Shipping instructions
-appear in pairs of files with
-.B .s
-and
-.B .d
-suffixes.
-.I Udaemon
-examines each status
-.RB ( .s )
-file for destination names and
-places a network call
-to send the corresponding data
-.RB ( .d )
-file to
-.I dkinstall
-at each destination.
-.I Dkinstall
-verifies the data
-and gives it to
-.IR inspkg ,
-see
-.IR mkpkg (8).
-.PP
-A status file contains
-zero or more entries,
-each of which has one or more lines.
-The first line of an entry is a
-network address,
-with default network
-.B dk
-and default service
-.BR asd ,
-possibly followed by a blank and a failure report.
-An entry with destination
-.L #
-is a comment and is ignored.
-Lines after the first begin with
-a tab,
-and contain output generated by the entry.
-If an entry has output,
-it is considered complete
-and will be processed no further.
-.PP
-.I Udaemon
-scans each status file once,
-and attempts to send the corresponding data file to the destination
-for each incomplete entry.
-If the attempt fails,
-a failure report is appended to the entry,
-and it remains incomplete.
-If the attempt succeeds,
-or the failure is severe,
-an error message
-or output from
-.I dkinstall
-is appended to the entry,
-which makes the entry complete.
-If an entry is completed successfully
-but there are no output lines,
-the entry is deleted.
-.PP
-Each instance of
-.I udaemon
-remembers which network addresses failed with non-severe errors;
-entries with the same address in later status files
-are given failure status `deferred for sequence.'
-.PP
-If at least one additional entry was completed,
-.I udaemon
-sends the new status file to the owner by
-.IR mail (1)
-after the whole file has been scanned.
-If no incomplete entries remain,
-both status and data files are removed.
-.PP
-.I Cdaemon
-examines every subdirectory of
-.FR /usr/spool/asd ,
-deletes empty directories and, impersonating the owner,
-invokes
-.I udaemon
-for nonempty directories.
-.I Cdaemon
-should be run regularly by
-.IR cron (8)
-with super-user permissions.
-.PP
-.IR Rmlocks
-removes all lock files in
-subdirectories of
-.FR /usr/spool/asd .
-It should be called from
-.IR rc (8).
-.PP
-Entries in an
-.SM ASD
-spool directory may be made without regard to locks
-provided that everything is done in the right
-sequence:
-(1) call
-.IR mkspool ;
-(2) create the data file;
-(3) create the status file under a temporary name;
-(4) rename the status file to end with
-.BR .s ;
-(5) remove the
-.F dummy
-file, if present; and
-(6) call
-.IR udaemon .
-.PP
-Because
-.I mail
-will not send an empty file,
-a status file must have a comment entry if
-acknowledgment is desired after a
-successful
-.I udaemon
-run.
-.SH FILES
-.BI /usr/spool/asd/ "userid "
-user's
-.SM ASD
-spool directory
-.SH SEE ALSO
-.IR mkpkg (8),
-.IR ship (8)
diff --git a/static/v10/man8/atalla.8 b/static/v10/man8/atalla.8
deleted file mode 100644
index 3e73746e..00000000
--- a/static/v10/man8/atalla.8
+++ /dev/null
@@ -1,62 +0,0 @@
-.TH ATALLA 8
-.SH NAME
-atalla \- initializing a challenge box
-.SH DESCRIPTION
-It is easiest to initialize an Atalla
-(a.k.a. SNK) box at the same time you use the
-.B -c
-option of
-.IR pwx ,
-before you hand it to the user, not in the user's presence.
-To initialize the box:
-freak it out by giving five consecutive wrong PIN entries, for example by
-pushing the sequence
-.B ON
-.B 0
-.B ENTER
-five times.
-The box's display should now read
-.BR "ES0 ----" ,
-you push
-.B 1
-.BR ENTER .
-The display now reads
-.BR "ES1 ----" ,
-you now enter eight bytes of secret key, which you may ask
-.I pwx
-to invent, and which the user will not know.
-Each byte is represented by three octal digits, in the range
-.B 000
-through
-.BR 277 ,
-so it takes 24 key strokes to enter the secret key.
-Now push
-.BR ENTER ,
-and a check sum of form
-.B "C xxxxxxxx"
-is displayed.
-Push
-.B ENTER
-again
-and another check sum is displayed,
-this time of form
-.BR "F xxxxxxxx" .
-Push
-.B ENTER
-yet again
-and
-the display reads
-.BR "EP1 ----" .
-At this point the box may be handed to the user.
-The user enters a personal password (his ``PIN'')
-of 4 through 8 digits' length,
-followed by
-.BR ENTER ,
-and again, as a check.
-Thereafter the user must
-type his personal password whenever he uses the box.
-Instruct the user not to divulge his personal password, and
-promise the user you will not divulge
-his secret key.
-.SH SEE ALSO
-.IR passwd (1)
diff --git a/static/v10/man8/authmgr.8 b/static/v10/man8/authmgr.8
deleted file mode 100644
index a20c22e2..00000000
--- a/static/v10/man8/authmgr.8
+++ /dev/null
@@ -1,204 +0,0 @@
-.TH AUTHMGR 8
-.CT 1 sa_auto secur
-.SH NAME
-authmgr \- authenticate users and make secure calls
-.SH SYNOPSIS
-.B authmgr
-.BI [ "options ..." ]
-.SH DESCRIPTION
-.I Authmgr
-receives authentication requests from the network via
-.IR svcmgr (8),
-authenticates the requesting user, and redials their
-call using one of the network interfaces, such as
-.IR dkmgr (8).
-The actual method used to authenticate the user depends
-on the command line arguments and the environment at the
-time
-.I authmgr
-is executed.
-.PP
-One mode is used when a user connects directly to the authentication
-service.
-In this mode, the user is asked to enter a login name (unless
-there is a login name present in the CSOURCE environment variable).
-The user is then challenged to encode some character string with
-their challenge box (or possibly just enter their password), and
-enter this as a response.
-If the response is correct (i.e. the user had the correct encryption
-key or password), the user is asked to enter the name of a new
-destination, and the call is redialed to this new destination.
-.PP
-The other mode is used when a call to a service using the V9 authentication
-protocol is rerouted through the authentication server (this is currently
-only possible if the call was placed over the datakit, through a trunk).
-In this case, the authentication server uses an extension of the "OK"/"NO"
-protocol used by
-.IR con (1).
-Here,
-.I authmgr
-responds to a connection with a string ``CH''.
-The calling program should prompt the user for a login name, and
-send that login back, followed by a newline.
-.I Authmgr
-responds with a challenge string, up to 60 characters long, followed
-by a newline (the challenge will be printable ASCII).
-The calling process must encode this string (unless it is blank; then
-it should obtain the user's password), and send this response back, also
-terminated by a newline.
-If the response is correct, the "OK"/"NO" protocol continues as
-normal (that is, the call is automatically redialed by the server
-without further intervention); otherwise, the "CH" challenge is
-repeated.
-.PP
-The options are
-.TP
-.B -n
-Do not prompt the user for a new destination, even if we don't have
-one already.
-This option is useful for authenticating an entire host (or a
-powerful terminal) as one user.
-The call will automatically be redialed in a special way.
-.TP
-.BI -f file
-Use
-.I file
-as the configuration file rather than the default.
-.PP
-When a call is redialed, the security ID of the new call is that
-of the authentication server itself, rather than the original security ID.
-.PP
-Much of the operation of the server is keyed off its configuration
-file. Each line in the file contains an initial keyword, followed
-by a number of arguments (there are no continuation lines), a line
-starting with a ``#'' is a comment. The various keywords are:
-.TP
-.BI admin " address ..."
-This defines the names of the administrators of the authentication server.
-The addresses (up to 10 may be specified) are the electronic mail
-addresses of the administrators. These names will received mail
-if the server detects a possibly security violation.
-.TP
-.BI failures " number"
-This sets the maximum number of failures to allow an individual
-instantiation of
-.I authmgr
-before the connection is closed and the administrators are notified.
-The default is 3.
-.TP
-.BI disallow " login"
-Defines a login name that may not authenticate itself, even if it
-exists in the keys file.
-Any number of
-.B disallow
-lines may appear in the configuration file.
-.TP
-.BI usepasswd " regexp"
-Tells
-.I authmgr
-that despite what the key file says, if the source of this call
-matches
-.IR regexp ,
-the user should be requested to enter their password from the
-/etc/passwd file, rather than doing some kind of key encryption.
-This is useful when
-.I authmgr
-is being used for authentication inside a trusted network, and
-using encryption boxes would be too cumbersome.
-.TP
-.BI setuser " regexp user"
-Map all calls from machines matching
-.IR regexp
-to
-.IR user .
-If the
-.I user
-field is empty, prompt for the login name. This can be useful
-for calls coming from untrusted machines.
-.TP
-.BI setsvc " regexp service"
-If a call comes from a machine matching
-.IR regexp ,
-set the default service of the redialed call to
-.IR service .
-.TP
-.BI setlog " regexp file"
-Log calls from machines matching
-.I regexp
-in
-.IR file .
-.TP
-.BI secmapid " regexp securityid"
-If the security ID of the incoming call matches
-.I regexp
-(in the format of
-.IR regexp (3))
-the outgoing security ID will be
-.IR securityid .
-There must be at least one
-.B secmapid
-lines in the configuration file, that of the default (``.*'')
-outgoing security ID.
-Because of the way the security ID mappings are stored, any
-mappings that contain wildcards should appear after those without;
-the mappings are tried against an incoming security ID in top-down
-order (this implies that the default mapping should appear last).
-.PP
-The keys are stored in a key file.
-Each line in the key file is of the form
-.RS
-.sp
-login:keytype:key encoding:
-.sp
-.RE
-Login is a usual login name.
-Keytype is the type of the key (more than one encryption box type
-are supported by
-.IR authmgr ).
-The key encoding is the key for this user; this encoding differs
-depending on the keytype.
-Currently, two key types recognized.
-One is
-.BR atalla ,
-for the Atalla Confidante style key (the key encoding for this
-type is 8 groups of octal numbers between 0 and 0377, specifying the DES
-key kept in this box, for example ``010 342 176 214 212 101 414 527'').
-The other is
-.BR passwd ,
-which means the key encoding is a standard password file 13 character
-password entry (if the key encoding is blank,
-.I authmgr
-look in the password file for the password).
-Because these keys are stored
-in the clear, this file should be well protected, and probably
-should be encrypted.
-.PP
-Currently, the authentication server may be connected to at the
-service point ``security'' on the security host.
-If you use the service ``gsecurity'', you get the no-redial
-option of the server.
-.SH FILES
-.nf
-.F /usr/net/authmgr.conf
-.F /usr/net/authmgr.keys
-.F /etc/passwd
-.fi
-.SH "SEE ALSO"
-.IR con (1),
-.IR regexp (3),
-.IR svcmgr (8),
-.IR dkmgr (8)
-.SH BUGS
-There is currently no support for encrypting the keys file.
-.br
-The only current use for this is over the datakit, and the
-regular expressions in the secmapid line are not of the same
-format as would be expected for wildcard datakit names.
-.br
-Users will still have to enter a login and password if the
-service they redial doesn't believe
-.IR authmgr .
-.br
-The
-.I secmapid
-parameter is currently ignored.
diff --git a/static/v10/man8/backup.8 b/static/v10/man8/backup.8
deleted file mode 100644
index 793f463e..00000000
--- a/static/v10/man8/backup.8
+++ /dev/null
@@ -1,90 +0,0 @@
-.TH BACKUP 8
-.CT 1 sa_nonmortals
-.SH NAME
-backup \- backup client administration
-.SH SYNOPSIS
-.B /usr/lib/backup/sel
-.PP
-.B /usr/lib/backup/fcheck
-.I maxsize
-.I maxdays
-.I files ...
-.PP
-.B /usr/lib/backup/act
-[
-.I stat
-]
-.SH DESCRIPTION
-These programs select and back up files
-to the incremental file backup system,
-.IR backup (1).
-.PP
-.I Sel
-prints on the standard output
-a list of filenames that might need to be backed up.
-The initial version
-picks out files that have been changed in the past few days,
-skipping huge files
-and eliding boring names like
-.BR core .
-.I Sel
-is a shell script;
-the local administrator is expected to customize it.
-.PP
-.I Fcheck
-is a fast,
-specialized file scanning program,
-used by
-.IR sel .
-It examines each of the
-.IR files ,
-descending into directories,
-and prints the name of each file
-that has been changed in the last
-.I maxdays
-days and is smaller than
-.I maxsize
-kilobytes.
-Symbolic links are followed when presented as arguments,
-examined but not followed otherwise.
-.PP
-.I Act
-reads a list of filenames from the standard input.
-It searches the backup database
-.IR backup (5)
-for the current version of each file,
-and backs up files that aren't registered.
-.PP
-By default,
-.I act
-sends errors by
-.IR mail (1)
-to user
-.BR backup .
-If the
-.I stat
-argument is non-empty,
-errors and additional comforting chatter
-are printed on the standard output instead.
-.PP
-One way to request automatic backups is to run
-.IP
-.L
-/usr/lib/backup/sel | /usr/lib/backup/act
-.LP
-regularly from
-.IR cron (8).
-Particular files may be backed up by hand at any time
-by running
-.I act
-with a list of filenames.
-There are no special permissions involved;
-any user may run
-.IR act .
-.SH SEE ALSO
-.IR backup (1),
-.IR backup (5)
-.br
-A. Hume, `The File Motel: An Owner's Manual',
-this manual,
-Volume 2
diff --git a/static/v10/man8/blmount.8 b/static/v10/man8/blmount.8
deleted file mode 100644
index de9f167e..00000000
--- a/static/v10/man8/blmount.8
+++ /dev/null
@@ -1,23 +0,0 @@
-.TH BLMOUNT 8
-.CT 1 sa_nonmortals
-.SH NAME
-blmount \- mark directories blind
-.SH SYNOPSIS
-.B /etc/blmount
-[
-.B -u
-]
-.I directory
-.SH DESCRIPTION
-.I Blmount
-without options
-mounts the named directory on itself as a blind file system
-.IR bl (4) .
-With option
-.BR -u ,
-the treatment is reversed.
-The
-.I directory
-must be on a traditional (disk) file system.
-.SH SEE ALSO
-.IR bl (4)
diff --git a/static/v10/man8/bproc.8 b/static/v10/man8/bproc.8
deleted file mode 100644
index fd4f5a77..00000000
--- a/static/v10/man8/bproc.8
+++ /dev/null
@@ -1,235 +0,0 @@
-.pa 1
-.he 'BOOT PROCEDURES (VIII)'2/6/73'BOOT PROCEDURES (VIII)'
-.ti 0
-NAME bos, maki, vcboot, msys, et__ al__.
-.sp
-.ti 0
-DESCRIPTION
-.br
-.in 8
-On
-the RF disk, the highest 16K words are
-reserved for stand-alone programs.
-These 16K words are allocated as follows:
-.sp
-bos (1K)
-.br
-Warm UNIX (7K)
-.br
-Cold UNIX (8K)
-.sp
-The program bos___ (Bootstrap Operating System)
-examines the console switches and executes
-one of several internal programs depending on the setting.
-The following settings are currently recognized:
-.sp
-.in +8
-.ti -8
-??? Will read Warm UNIX from
-the RF into core location 0 and transfer to 600.
-.sp
-.ti -8
-1 Will read Cold UNIX from the
-RF into core location 0 and transfer to 600.
-.sp
-.ti -8
-10 Will dump all of memory
-from core location 0 onto DECtape drive 7
-and then halt.
-.sp
-.ti -8
-20 Will read 256 words from RK0 into
-core 0 and transfer to zero.
-This is the procedure to boot
-DOS from an RK.
-.sp
-.ti -8
-40 This is the same as 10 above, but
-instead of halting, UNIX warm is loaded.
-.sp
-.ti -8
-0 Will load a standard UNIX binary paper tape
-into core location 0 and transfer to 0.
-.sp
-.ti -8
-77500 Will load the standard DEC absolute and binary
-loaders and transfer to 77500.
-.sp
-.in 8
-All manual methods of booting the system involve
-manipulation of the console switches.
-In order for this to be possible,
-the panel must be unlocked
-and the machine must be halted.
-Also, remember that at the time UNIX comes up,
-the console switches must contain 773030
-for a single-user system; anything else gives
-a multi-user system.
-
-There are four temperatures of boots.
-They are:
-
-.in +4
-Hot boot: restart the system without refreshing
-its code, that is simply by transferring to
-its start.
-The only use for this procedure is if the
-system has been patched and one doesn't wish
-to redo the patches.
-The procedure is:
-
- 600 in switches
- Load address
- (773030 in switches for single-user system)
- start
-
-Warm boot: refresh system code from the RF disk, but
-the "panic" routine must be in core.
-Best for general use if it works, since
-outstanding I/O
-is cleaned up.
-Procedure:
-
- 602 in switches
- load address
- (773030 in switches for single-user system)
- start (flushes any I/O, then executes bos___)
-
-Cool boot: RF disk is OK, but nothing in core.
-Procedure:
-
- UTIL DECtape on drive 0
- 773030 in switches
- load address
- (602 in switches for multi-user system)
- start
- type "boot" on console tty to load bos___
-
-Cold boot: nothing in core, nothing on RF.
-Best to have an expert around for this
-one.
-Procedure:
-
- INIT DECtape on drive 0
- 773030 in switches
- load address
- 1 in switches
- start
- (machine halts. last chance to preserve RF!)
- 773030 in switches
- continue
- (reads in basic files)
-
-UNIX is then up, but for various reasons, one should
-do a warm boot (single user) right away.
-At this point also, one might
-consider whether the INIT tape UNIX is the
-latest version.
-If there is reason for doubt,
-mount the /sys disk pack, change to directory
-/sys/sys, do "msys u unix", and reboot.
-Then get the /bin-/etc-/lib tape which contains
-the rest of of the RF disk,
-and do an "mt x".
-Conceivably, "create errors" due to lack of some
-directories will occur; make the directories,
-then try again.
-Set the date correctly; the system starts off
-at time 0.
-
-At this point UNIX is in full operation and
-can be rebooted for
-a multi-user system.
-.sp
-.in 8
-Here is what happens during a cold boot:
-the INIT tape contains a program called
-.ul
-vcboot.
-The ROM program reads vcboot
-from the tape into
-core location 0 and transfers to it.
-vcboot then reads 16K words from
-the DECtape (blocks 1-32)
-and copies the data to the highest 16K words of
-the RF.
-Thus this initializes the read-only part of the RF.
-vcboot then reads in bos___ and executes it.
-bos___ reads in Cold UNIX and executes that.
-Cold UNIX halts for a last chance before
-it completely initializes the RF file system.
-When continue is pressed,
-Cold UNIX initializes the RF.
-It then reads the DECtape for initialization files
-starting from block 33.
-Normal operation then commences
-with the execution of "/etc/init".
-.sp
-The INIT tape is made by the program maki____
-running under UNIX.
-maki____ writes vcboot______ on block 0 of
-.ul
-/dev/tap7.
-It then copies the RF 16K words (using
-.ul
-/dev/rf0)
-onto blocks 1 thru 32.
-It has internally a list of files to
-be copied from block 33 on.
-This list follows:
-.sp
-.nf
-.in +8
-/etc/init
-/bin/chmod
-/bin/date
-/bin/login
-/bin/ls
-/bin/mkdir
-/etc/mount
-/bin/sh
-/bin/tap
-/bin/mt
-.in -8
-.fi
-.sp
-Thus this is the set of programs available after a cold boot.
-init____ and sh__ are mandatory.
-For multi-user UNIX,
-getty_____ and login_____ are also necessary.
-mkdir_____ is necessary due to a bug in tap___.
-mt__, tap___ and mount_____ are useful to
-bring in new files.
-As soon as possible, date____ should be done.
-That leaves ls__ and chmod_____ as frosting.
-.sp
-The last link in this incestuous
-daisy chain is the program msys____.
-.sp
- msys____ char file
-.sp
-will copy the file file____ onto the
-RF read only slot specified by the character char____.
-Char is taken from the following set:
-.sp
- b_ bos
- u_ Warm UNIX
- 1_ Cold UNIX
-.sp
-.in 16
-.ti 0
-FILES /dev/rf0,
-/dev/tap?
-.sp
-.ti 0
-SEE ALSO init(VII),
-tap(I),
-sh(I),
-mkdir(I)
-.sp
-.ti 0
-DIAGNOSTICS --
-.sp
-.ti 0
-BUGS This
-section is very configuration dependent.
diff --git a/static/v10/man8/check.8 b/static/v10/man8/check.8
deleted file mode 100644
index 9f6e030b..00000000
--- a/static/v10/man8/check.8
+++ /dev/null
@@ -1,50 +0,0 @@
-.pa 1
-.he 'CHECK (VIII)'1/20/73'CHECK (VIII)'
-.ti 0
-NAME check -- file system consistency check
-.sp
-.ti 0
-SYNOPSIS check_____ [ filesystem [ blockno918 ... ] ]
-.sp
-.ti 0
-DESCRIPTION check_____
-will examine a file system,
-build a bit map of used blocks,
-and compare this bit map against
-the bit map maintained on the file system.
-If the file system is not specified,
-a check of all
-of the normally mounted file systems
-is performed.
-Output includes the number of files on the file system,
-the number of these that are 'large', the number
-of indirect blocks,
-the number
-of used blocks, and the number of free blocks.
-.sp
-check_____ works by examining the i-nodes
-on the file system and is entirely
-independent of its directory hierarchy.
-The file system may be,
-but need not be, mounted.
-
-.ti 0
-FILES /dev/rf?,
-/dev/rk?,
-/dev/rp?
-.sp
-.ti 0
-SEE ALSO find(I), ds(I)
-.sp
-.ti 0
-DIAGNOSTICS Diagnostics are produced for
-blocks missing, duplicated, and bad block addresses.
-Diagnostics are also produced for block numbers passed as parameters.
-In each case, the block number, i-number, and
-block class (i_ = inode, x_ indirect, f_ free) is printed.
-.sp
-.ti 0
-BUGS The
-checking process is two pass in nature.
-If checking is done on an active file system,
-extraneous diagnostics may occur.
diff --git a/static/v10/man8/chk.8 b/static/v10/man8/chk.8
deleted file mode 100644
index 54114b62..00000000
--- a/static/v10/man8/chk.8
+++ /dev/null
@@ -1,21 +0,0 @@
-.pa 1
-.he 'CHK (VIII)'1/20/73'CHK (VIII)'
-.ti 0
-NAME chk -- check + dcheck
-.sp
-.ti 0
-SYNOPSIS chk
-.sp
-.ti 0
-DESCRIPTION This
-command file does a check_____ and a dcheck______ of all of the normally mounted
-file systems.
-.sp
-.ti 0
-FILES /dev/[fkp]*
-.sp
-.ti 0
-SEE ALSO check (VIII), dcheck (VIII)
-.sp
-.ti 0
-DIAGNOSTICS see "SEE ALSO"
diff --git a/static/v10/man8/chown.8 b/static/v10/man8/chown.8
deleted file mode 100644
index ba114a64..00000000
--- a/static/v10/man8/chown.8
+++ /dev/null
@@ -1,47 +0,0 @@
-.TH CHOWN 8
-.CT 1 sa_nonmortals secur
-.SH NAME
-chown \- change owner or group
-.SH SYNOPSIS
-.B /etc/chown
-.IB owner , group
-.I file ...
-.SH DESCRIPTION
-.I Chown
-changes the owner of the
-.I files
-to
-.I owner
-and the groupid to
-.IR group .
-Either
-.I owner
-or
-.I group
-may be omitted
-to leave the owner or groupid unchanged.
-.PP
-.I Owner
-may be either a decimal userid or
-a login name found in
-.FR /etc/passwd .
-.I Group
-may be either a decimal groupid or
-a group name found in
-.FR /etc/group .
-.PP
-The owner of a file
-may change its group
-to that of the current process.
-Other changes are restricted to the super-user.
-.SH FILES
-.F /etc/passwd
-.br
-.F /etc/group
-.SH "SEE ALSO"
-.I chown
-in
-.IR chmod (2),
-.IR passwd (5),
-.IR chmod (1),
-.IR chdate (1)
diff --git a/static/v10/man8/chuck.8 b/static/v10/man8/chuck.8
deleted file mode 100644
index 087b6d50..00000000
--- a/static/v10/man8/chuck.8
+++ /dev/null
@@ -1,116 +0,0 @@
-.TH CHUCK 8
-.CT 1 sa_nonmortals
-.SH NAME
-chuck \- a file system checking program
-.SH SYNOPSIS
-.B /etc/chuck
-[
-.I option ...
-]
-.I device
-.PP
-.B /etc/chuck
-.B -M
-.I blocks
-.I device
-.PP
-.B /etc/upchuck
-[
-.B -w
-] [
-.B -p
-.I program
-]
-.SH DESCRIPTION
-.PP
-.I Chuck
-checks and optionally repairs the file system on the named
-.I device.
-It is normally invoked by
-.I upchuck
-by
-.IR rc (8)
-during reboots.
-The
-.B -w
-flag to
-.I upchuck
-is passed on to
-.I program.
-If
-.I program
-is not present, the default is
-.FR /etc/chuck .
-(Try, as super-user,
-.B "/etc/upchuck -p /bin/echo
-to see the normal arguments to
-.IR chuck .)
-If
-.I upchuck
-can read the raw version of
-.I device,
-it will, except for the root file system.
-.PP
-The options are
-.TP
-.B -w
-Try to do standard repairs.
-.TP
-.BI -b " blocksize
-Specify file system block size; default is 4096.
-.TP
-.B -i
-Interactive.
-Ask approval for each change.
-.TP
-.BI -I " inode ...
-.br
-.ns
-.TP
-.BI -B " block ...
-Report on inodes or blocks specified by number.
-.TP
-.B -v
-Verbose.
-Give more commentary.
-.PP
-.I Chuck
-can also make a new file system:
-.B "chuck -M"
-.I size device
-makes a bitmapped file system (only)
-of
-.I size
-4096-byte blocks
-on
-.IR device .
-It asks approval before writing.
-.SH FILES
-.F /etc/fstab
-.SH "SEE ALSO"
-.IR fstab (5),
-.IR filsys (5),
-.IR fsck (8),
-.IR reboot (8)
-.SH BUGS
-.I Chuck
-does not replace real expertise.
-It will not automatically repair a file system with duplicate blocks.
-In complicated situations it may have to be run
-several times to get complete consistency.
-.br
-It will not recover from I/O errors in reading the inodes,
-and does not yet extend
-.F lost+found
-when necessary.
-.br
-It uses memory freely (about 12 bytes per file system block
-and 84 bytes per inode).
-.br
-.I Chuck
-is still experimental,
-and acts the part.
-Error messages are usually inscrutable.
-.br
-It believes even preposterous super-blocks and
-consequently can get core images.
diff --git a/static/v10/man8/cl.8 b/static/v10/man8/cl.8
deleted file mode 100644
index 75a0de9e..00000000
--- a/static/v10/man8/cl.8
+++ /dev/null
@@ -1,100 +0,0 @@
-.TH CL 8
-.CT 1 sa_nonmortals
-.SH NAME
-cl, integrity \- file system label check
-.SH SYNOPSIS
-.B /etc/cl
-[
-.IR specfile " | " dir
-] ...
-.PP
-.B /etc/integrity
-[
-.I rootdir
-]
-.SH DESCRIPTION
-.I Cl
-examines file trees for correctness of labels.
-Each
-.I specfile
-argument names a file containing a description
-of the labels expected in a given subtree of a file system.
-Each line of a
-.I specfile
-has the form
-.IP
-.L
-filename uid,gid mode capabilities licenses label
-.LP
-User and group ids are specified in the style of
-.IR chown (8).
-The mode is specified in the style of
-.IR chmod (2);
-only the 07777 bits are significant.
-Capabilities and licenses are in the style of
-.IR atopriv ;
-see
-.IR labtoa (3).
-The label is in the style of
-.IR atolab,
-without capabilities or licenses.
-.PP
-The first valid line names the root of the tree in question.
-Subsequent lines name particular files in the tree.
-A report is made for each `suspicious' file and for each
-particular file which does
-not match its description in
-.IR specfile .
-.LP
-A suspicious file is a file that is not named in the
-.I specfile
-for which one of the following holds:
-.IP
-The label has flag
-.B L_UNDEF
-or
-.BR L_YES .
-.br
-The file is a special file the label flag is
-.BR L_NO .
-.br
-The file is not a special file the label flag is not
-.BR L_NO .
-.br
-The lattice value of the label is not dominated by the
-label in the first line of
-.IR specfile .
-.br
-The capability or license is not dominated by the corresponding
-value in the first line of
-.IR specfile .
-.LP
-Each named directory argument
-.I dir
-is treated as if there were a
-.I specfile
-argument
-consisting of just a single line
-.IP
-.EX
-\fIdir\fP bin,bin 666 ----- ----- 0000...
-.EE
-.I Integrity
-surveys the directory tree dependent from
-.I rootdir,
-or
-.L /
-if no
-.I rootdir
-is given.
-It reports non-bottom labels, which are possible signs
-of loss of integrity \- modification without privilege.
-The search cuts off at directories with non-bottom labels.
-.SH "SEE ALSO"
-.IR getflab (2),
-.IR ftw (3),
-.IR lcheck (8)
-.SH BUGS
-Extraneous diagnostics
-may be produced if this command is applied to
-active file systems.
diff --git a/static/v10/man8/clri.8 b/static/v10/man8/clri.8
deleted file mode 100644
index 68ec27af..00000000
--- a/static/v10/man8/clri.8
+++ /dev/null
@@ -1,41 +0,0 @@
-.pa 1
-.he 'CLRI (VIII)'1/20/73'CLRI (VIII)'
-.ti 0
-NAME clri -- clear i-node
-.sp
-.ti 0
-SYNOPSIS clri i-number [ file system ]
-.sp
-.ti 0
-DESCRIPTION clri____
-writes zeros on the 32 bytes occupied by the i-node
-numbered
-.ul
-i-number.
-If the
-.ul
-file system
-argument is given, the i-node resides on
-the given device, otherwise on a
-default file system.
-The file system argument
-must be a special file
-name referring to a device
-containing a file system.
-
-After clri____, any blocks
-in the affected file
-will show up as "missing" in a check_____ of
-the file system.
-
-Read and write permission is required on the specified
-file system device.
-The i-node becomes allocatable.
-
-The primary purpose of this routine
-is to remove a file which
-for some reason appears in no
-directory.
-.sp
-.ti 0
-DIAGNOSTICS "error"
diff --git a/static/v10/man8/config.8 b/static/v10/man8/config.8
deleted file mode 100644
index dc215527..00000000
--- a/static/v10/man8/config.8
+++ /dev/null
@@ -1,48 +0,0 @@
-.TH CONFIG 8
-.SH NAME
-config \- configure a Unix kernel
-.SH SYNOPSIS
-.B /etc/config
-[ machine ]
-.SH DESCRIPTION
-.I Config
-generates files used to build a Unix kernel
-for the named
-.IR machine .
-The working directory should be
-.I /usr/sys/conf
-or
-.IR /usr/sys/ machine;
-if the latter,
-.I machine
-may be omitted from the command.
-.PP
-A machine description is expected in
-.RI machine /conf ;
-a makefile,
-a number of header files,
-and some C and assembler programs
-are generated from the description.
-.PP
-The usual way to configure a new system is:
-.nf
-mkdir /usr/sys/newmach
-cd /usr/sys/newmach
-(create conf)
-/etc/config
-make
-.fi
-.SH FILES
-\&../conf/makefile makefile template
-.br
-\&../conf/files list of kernel source files
-.br
-files more sources specific to this machine
-.br
-\&../conf/devices list of device handlers
-.br
-devices more devices specific to this machine
-.br
-conf machine description
-.SH SEE ALSO
-config(5)
diff --git a/static/v10/man8/cpp.8 b/static/v10/man8/cpp.8
deleted file mode 100644
index fa52b773..00000000
--- a/static/v10/man8/cpp.8
+++ /dev/null
@@ -1,114 +0,0 @@
-.TH CPP 8
-.CT 1 prog_c
-.SH NAME
-cpp \- C language preprocessor
-.SH SYNOPSIS
-.B /lib/cpp
-[
-.I option ...
-]
-[
-.I ifile
-[
-.I ofile
-]
-]
-.SH DESCRIPTION
-.I Cpp\^
-interprets preprocessor directives
-and does macro substitution
-for
-.IR cc (1)
-and other compilers.
-The input
-.I ifile
-and output
-.I ofile
-default to standard input and standard output respectively.
-.PP
-The options are:
-.TP
-.B -P
-Do not place line number markings in output.
-.TP
-.B -C
-Do not remove comments.
-.TP
-.BI -U name\^
-.PD 0
-.TP
-.BI -D name\^
-.TP
-.BI -D name=def\^
-.TP
-.BI -I dir\^
-Same as in
-.IR cc (1).
-.B -U
-overrides
-.BR -D .
-.PD
-.TP
-.B -H
-Report all included files on standard error file,.
-.TP
-.B -M
-Attach modification date to file names in line number
-directives thus:
-.IB file @ modtime,
-where modtime is the integer number of seconds since the epoch.
-.TP
-.B -T
-Truncate preprocessor symbols to eight characters.
-.TP
-.BI -Y dir
-Use
-.I dir
-instead of
-.F /usr/include
-as the last resort in searching for include files.
-.PP
-The output file contains processed text sprinkled
-with lines that show the original input line numbering:
-.IP
-.B #
-.I linenumber
-.L
-"\fIifile\fP"
-.PP
-The input language is as described in the reference,
-with a few additions:
-.PP
-The
-.B #
-.I linenumber
-marks placed in the output are accepted as an alternative
-to the official
-.B #line
-directive.
-.PP
-These symbols are predefined in various implementations:
-.IP
-.EX
-ibm gcos os tss unix
-interdata pdp11 u370 u3b u3b5 vax
-RES RT
-lint
-.EE
-.PP
-Preprocessor formal parameters are recognized within
-quoted strings in the replacement text.
-.PP
-When comments are removed they are replaced by null strings;
-this unofficial feature makes it possible to construct
-identifiers by concatenation.
-.SH FILES
-.TF /usr/include
-.TP
-.F /usr/include
-standard directory for include files
-.SH SEE ALSO
-B. W. Kernighan and D. M. Ritchie,
-.I The C Programming Language,
-Prentice-Hall,
-1988
diff --git a/static/v10/man8/crash.8 b/static/v10/man8/crash.8
deleted file mode 100644
index e38a694c..00000000
--- a/static/v10/man8/crash.8
+++ /dev/null
@@ -1,268 +0,0 @@
-.TH CRASH 8 VAX-11
-.UC 4
-.SH NAME
-crash \- what happens when the system crashes
-.SH DESCRIPTION
-This section explains what happens when the system crashes and how
-you can get a crash dump for analysis of non-transient problems.
-.PP
-When the system crashes voluntarily it prints a message of the form
-.IP
-panic: why i gave up the ghost
-.LP
-on the console, and then invokes an automatic reboot procedure as
-described in
-.IR reboot (8).
-If the auto-reboot switch is off on the console, then the processor
-will simply halt at this point.
-Otherwise the registers and the top few locations of the stack will
-be printed on the console, and then the system will check the disks
-and (unless some unexpected inconsistency is encountered), resume
-multi-user operations.
-.PP
-The system has a large number of internal consistency checks; if one
-of these fails, then it will panic with a very short message indicating
-which one failed. In the absence of a dump, little can be done about
-one of these. If the problem recurs, you should arrange to get a dump
-for further analysis by running with auto-reboot disabled during normal
-working hours and then following the procedure described below.
-.PP
-The most common cause of system failures is hardware failure, which
-can reflect itself in different ways. Here are the messages which
-you are likely to encounter, with some hints as to causes.
-Left unstated in all cases is the possibility that hardware or software
-error produced the message in some unexpected way.
-.TP
-IO err in push
-.ns
-.TP
-hard IO err in swap
-The system encountered an error trying to write to the paging device
-or an error in reading critical information from a disk drive.
-You should fix your disk if it is broken or unreliable.
-.TP
-Timeout table overflow
-.ns
-.TP
-ran out of bdp's
-.ns
-.TP
-ran out of uba map
-These really shouldn't be panics, but until we fix up the data structures
-involved, running out of entries causes a crash. If the timeout table
-overflows, you should make it bigger. If you run out of bdp's or uba map
-you probably have a buggy device driver in your system, allocating and
-not releasing UNIBUS resources.
-.TP
-KSP not valid
-.ns
-.TP
-SBI fault
-.ns
-.TP
-Machine check
-.ns
-.TP
-CHM? in kernel
-These indicate either a serious bug in the system or, more often,
-a glitch or failing hardware. For the machine check, the top part of
-the resulting stack frame gives more information. You can refer to a
-VAX 11/780 System Maintenance Guide for information on machine checks.
-If machine checks or SBI faults recur, check out the hardware or call
-field service. If the other faults recur, there is likely a bug somewhere
-in the system, although these can be caused by a flakey processor.
-Run processor microdiagnostics.
-.TP
-trap type %d, code=%d
-A unexpected trap has occurred within the system; the trap types are:
-.RS
-.TP 10
-0
-reserved addressing mode
-.br
-.ns
-.TP 10
-1
-privileged instruction
-.br
-.ns
-.TP 10
-2
-BPT
-.br
-.ns
-.TP 10
-3
-XFC
-.br
-.ns
-.TP 10
-4
-reserved operand
-.br
-.ns
-.TP 10
-5
-CHMK (system call)
-.br
-.ns
-.TP 10
-6
-arithmetic trap
-.br
-.ns
-.TP 10
-7
-reschedule trap (software level 3)
-.br
-.ns
-.TP 10
-8
-segmentation fault
-.br
-.ns
-.TP 10
-9
-protection fault
-.br
-.ns
-.TP 10
-10
-trace pending (TP bit)
-.RE
-.IP
-The favorite trap type in system crashes is trap type 9, indicating
-a wild reference. The code is the referenced address. If you look
-down the stack, just after the trap type and the code are the pc and
-the ps of the processor when it trapped, showing you where in the
-system the problem occurred. These problems tend to be easy to track
-down if they are kernel bugs since the processor stops cold, but random
-flakiness seems to cause this sometimes, e.g. we have trapped with
-code 80000800 three times in six months as an instruction fetch went across
-this page boundary in the kernel but have been unable to find any reason
-for this to have happened.
-.TP
-init died
-The system initialization process has exited. This is bad news, as no new
-users will then be able to log in. Rebooting is the only fix, so the
-system just does it right away.
-.PP
-That completes the list of panic types you are likely to see.
-Now for the crash dump procedure:
-.PP
-At the moment a dump can be taken only on magnetic tape.
-Before you do anything, be sure that a clean tape is mounted with a ring-in
-on the tape drive if you plan to make a dump.
-.PP
-Write the date and time on the console log.
-Use the console commands to examine the registers, program status long word,
-and the top several locations on the stack.
-A suggested command sequence, which is executed by the \*(lq@DUMP\*(rq
-console command script, is:
-.DS
-.nf
- E PSL<return>
- E R0/NE:F<return>
- E SP<return>
- E/V @ /NE:40<return>
-.fi
-.DE
-If hardware problems dictate a special set of commands be executed when
-the system crashes, a sequence of commands can be saved using the console
-command \*(lqLINK\*(rq to be reexecuted with \*(lqPERFORM\*(rq (which can be
-abbreviated \*(lqP\*(rq).
-If a dump is to be taken on magnetic tape (this is a good idea
-in most any case where the cause of the crash is not immediately obvious)
-then the following commands will (should) be executed:
-.DS
-.nf
- D PSL 0<return>
- D PC 80000200<return>
- C<return>
-.fi
-.DE
-These commands are actually part of the standard \*(lq@DUMP\*(rq script.
-This should write a copy of all of memory
-on the tape, followed by two EOF marks.
-Caution:
-Any error is taken to mean the end of memory has been reached.
-This means that you must be sure the ring is in,
-the tape is ready, and the tape is clean and new.
-.PP
-If there are not 40(hex) locations active on the kernel stack when the
-procedure is begun, then the console may begin to print error diagnostics.
-You can stop this by hitting \*(lq^C\*(rq (control-C), and then give the
-last three commands above.
-.PP
-If the dump fails, you can try again,
-but some of the registers will be lost.
-See below for what to do with the tape.
-.PP
-To restart after a crash, follow the directions in
-.IR reboot (8);
-if the virtual memory subsystem is suspected as the cause of the crash,
-then a version of the system other than \*(lqvmunix\*(rq should be booted
-which will leave the paging areas temporarily intact
-for use by the post-mortem analysis program
-.I analyze.
-After checking your root file system consistency with
-.IR fsck (8),
-you can read the core dump tape into the file /vmcore with
-.IP
-dd if=/dev/rmt0 of=/vmcore bs=20b
-.LP
-It does not work to use just
-.IR cp (1),
-as the tape is blocked.
-With the system still in single-user mode, run the analysis program
-.I analyze,
-e.g.:
-.IP
-analyze \-s /dev/drum /vmcore /vmunix
-.LP
-and save the output.
-Then boot up
-\*(lqvmunix\*(rq
-and let it do the automatic reboot, i.e. to boot multi-user from
-an RM03/RM05/RP06 on the MASSBUS
-.IP
->>> BOOT RPM
-.PP
-After rebooting, to analyze a dump you should execute
-.I "ps \-alxk"
-to print the process table at the time of the crash.
-Use
-.IR adb (1)
-to examine
-.IR /vmcore .
-The location
-.I dumpstack\-80000000
-is the bottom of a stack onto which were pushed the stack pointer
-.BR sp ,
-.B PCBB
-(containing the physical address of a
-.IR u_area ),
-.BR MAPEN ,
-.BR IPL ,
-and registers
-.BR r13 \- r0
-(in that order).
-.BR r13 (fp)
-is the system frame pointer and the stack is used in standard
-.B calls
-format. Use
-.IR adb (1)
-to get a reverse calling order.
-In most cases this procedure will give
-an idea of what is wrong.
-A more complete discussion
-of system debugging is impossible here.
-See, however,
-.IR analyze (8)
-for some more hints.
-.SH "SEE ALSO"
-analyze(8), reboot(8)
-.br
-.I "VAX 11/780 System Maintenance Guide"
-for more information about machine checks.
-.SH BUGS
diff --git a/static/v10/man8/cron.8 b/static/v10/man8/cron.8
deleted file mode 100644
index 3a58416f..00000000
--- a/static/v10/man8/cron.8
+++ /dev/null
@@ -1,86 +0,0 @@
-.TH CRON 8
-.CT 1 sa_auto
-.SH NAME
-cron \- clock daemon
-.SH SYNOPSIS
-.B /etc/cron
-.SH DESCRIPTION
-.I Cron
-executes commands at specified dates and times
-according to the instructions in the file
-.FR /etc/crontab .
-It should be run once from
-.IR rc (8).
-.PP
-.I Crontab
-entries are lines of seven fields separated by blanks or tabs:
-.IP
-.I
-login minute hour day month weekday command
-.PP
-.I Login
-is the login name under
-whose userid and groupid
-the command should be executed.
-The next five fields are integer patterns for
-.PD0
-.RS
-.TP \w'day\ of\ month\ \ 'u
-minute
-0-59
-.TP
-hour
-0-23
-.TP
-day of month
-1-31
-.TP
-month of year
-1-12
-.TP
-day of week
-0-6; 0=Sunday
-.PD
-.RE
-.PP
-Each pattern may
-contain a number in the range above;
-two numbers separated by
-a hyphen
-meaning an inclusive range;
-a list of numbers separated by
-commas meaning any of the numbers;
-or an asterisk meaning all legal values.
-.PP
-The last field is a string
-to be executed by the shell,
-after replacing
-.L %
-with newline.
-.PP
-It is wise to spread the times of activities to avoid
-bogging the system down at favorite hours.
-.PP
-.I Cron
-examines
-.I crontab
-every minute.
-.SH EXAMPLES
-.EX
-daemon 17 3 * * * /usr/bin/calendar - # reminders at 0317
-adm 15 4 1,15 * * ac -p | mail adm # bimonthly accounts
-root 0 12 22-28 11 4 /etc/wall Time for Thanksgiving dinner
-.EE
-.SH FILES
-.F /etc/crontab
-.SH SEE ALSO
-.IR at (1)
-.SH BUGS
-The behavior of
-.L %
-in
-.I crontab
-entries is nonstandard.
-Strings following
-.L %
-should be delivered to the command as standard input.
diff --git a/static/v10/man8/dcheck.8 b/static/v10/man8/dcheck.8
deleted file mode 100644
index 9f9d8eec..00000000
--- a/static/v10/man8/dcheck.8
+++ /dev/null
@@ -1,44 +0,0 @@
-.pa 1
-.he 'DCHECK (VIII)'1/20/73'DCHECK (VIII)'
-.ti 0
-NAME dcheck -- directory consistency check
-.sp
-.ti 0
-SYNOPSIS dcheck______ [ -l__ ] [ device ]
-.sp
-.ti 0
-DESCRIPTION dcheck______
-builds an image of the directory hierarchy
-of the specified device
-by reading all its directories (using physical I/O
-guided by the i-nodes on the device).
-A list entry is made for
-each file encountered.
-A second pass reads the i-nodes and for
-each file compares the number of links
-specified in its i-node
-with the number of entries actually seen.
-All discrepancies are noted.
-.sp
-If no device is specified,
-a default device is assumed.
-.sp
-The argument -l__ causes a complete
-listing of the file names on the device
-in i-node order.
-.sp
-.ti 0
-FILES /dev/rk?
-.sp
-.ti 0
-SEE ALSO check(VIII)
-.sp
-.ti 0
-DIAGNOSTICS inconsistent i-numbers,
-unnamed files,
-unreachable files,
-loops in directory "hierarchy".
-.sp
-.ti 0
-BUGS Unreachable files and loops are
-discovered only under the "-l" option.
diff --git a/static/v10/man8/delivermail.8 b/static/v10/man8/delivermail.8
deleted file mode 100644
index 5c1070b4..00000000
--- a/static/v10/man8/delivermail.8
+++ /dev/null
@@ -1,248 +0,0 @@
-.TH DELIVERMAIL 8
-.UC 4
-.SH NAME
-delivermail \- deliver mail to arbitrary people
-.SH SYNOPSIS
-.B /etc/delivermail
-[
-.BR \- [ fr ]
-.I address
-] [
-.B \-a
-] [
-.BI \-e x
-] [
-.B \-n
-] [
-.B \-m
-] [
-.B \-s
-] [
-.B \-i
-] [
-.B \-h
-.I N
-] address ...
-.SH DESCRIPTION
-.I Delivermail
-delivers a letter to one or more people,
-routing the letter over whatever networks
-are necessary.
-.I Delivermail
-will do inter-net forwarding as necessary
-to deliver the mail to the correct place.
-.PP
-.I Delivermail
-is not intended as a user interface routine;
-it is expected that other programs will provide user-friendly
-front ends,
-and
-.I delivermail
-will be used only to deliver pre-formatted messages.
-.PP
-.I Delivermail
-reads its standard input
-up to a control-D
-or a line with a single dot
-and sends a copy of the letter found there
-to all of the addresses listed.
-If the
-.B \-i
-flag is given,
-single dots are ignored.
-It determines the network to use
-based on the syntax of the addresses.
-Addresses containing the character `@'
-or the word \*(lqat\*(rq
-are sent to the
-.SM ARPANET;
-addresses containing `!'
-are sent to the
-.SM UUCP
-net,
-and addresses containing `:' or `.'
-are sent to the Berkeley network.
-Other addresses are assumed to be local.
-.PP
-Local addresses are looked up in a file
-constructed by
-.IR newaliases (1)
-from the data file
-.I /usr/lib/aliases
-and aliased appropriately.
-Aliasing can be prevented by preceding the address
-with a backslash or using the
-.B \-n
-flag.
-Normally the sender is not included in any alias
-expansions, e.g.,
-if `john' sends to `group',
-and `group' includes `john' in the expansion,
-then the letter will not be delivered to `john'.
-The
-.B \-m
-flag disables this suppression.
-.PP
-.I Delivermail
-computes the person sending the mail
-by looking at your login name.
-The \*(lqfrom\*(rq person
-can be explicitly specified by using the
-.B \-f
-flag;
-or, if the
-.B \-a
-flag is given,
-delivermail looks in the body of the message
-for a \*(lqFrom:\*(rq or \*(lqSender:\*(rq
-field in
-.SM ARPANET
-format.
-The
-.B \-f
-and
-.B \-a
-flags can be used
-only by the special users
-.I root
-and
-.I network,
-or if the person you are trying to become
-is the same as the person you are.
-The
-.B \-r
-flag is entirely equivalent to the
-.B \-f
-flag; it is provided for ease of interface only.
-.PP
-The
-.BI \-e x
-flag controls the disposition of error output,
-as follows:
-.TP 3n
-.B e
-Print errors on the standard output,
-and echo a copy of the message when done.
-It is assumed that a network server will
-return the message back to the user.
-.TP
-.B m
-Mail errors back to the user.
-.TP
-.B p
-Print errors on the standard output.
-.TP
-.B q
-Throw errors away;
-only exit status is returned.
-.TP
-.B w
-Write errors back to the user's terminal,
-but only if the user is still logged in
-and write permission is enabled;
-otherwise errors are mailed back.
-.LP
-If the error is not mailed back,
-and if the mail originated on the machine where the error occurred,
-the letter is appended to the file
-.I dead.letter
-in the sender's home directory.
-.PP
-If the first character of the user name
-is a vertical bar,
-the rest of the user name is used as the name of a program
-to pipe the mail to.
-It may be necessary to quote the name of the user
-to keep
-.I delivermail
-from suppressing the blanks from between arguments.
-.PP
-The message is normally edited to eliminate \*(lqFrom\*(rq
-lines that might confuse other mailers.
-In particular,
-\*(lqFrom\*(rq lines in the header are deleted,
-and \*(lqFrom\*(rq lines in the body are prepended by `>'.
-The
-.B \-s
-flag saves \*(lqFrom\*(rq lines in the header.
-.PP
-The
-.B \-h
-flag gives a \*(lqhop-count\*(rq, i.e.,
-a measure of how many times this message
-has been processed by
-.I delivermail
-(presumably on different machines).
-Each time
-.I delivermail
-processes a message,
-it increases the hop-count by one;
-if it exceeds 30
-.I delivermail
-assumes that an alias loop has occurred
-and it aborts the message.
-The hop-count defaults to zero.
-.PP
-.I Delivermail
-returns an exit status
-describing what it did.
-The codes are defined in <sysexits.h>
-.ta 3n +\w'EX_UNAVAILABLE'u+3n
-.de XX
-.ti \n(.iu
-..
-.in +\w'EX_UNAVAILABLE'u+6n
-.XX
- EX_OK Successful completion on all addresses.
-.XX
- EX_NOUSER User name not recognized.
-.XX
- EX_UNAVAILABLE Catchall meaning necessary resources
-were not available.
-.XX
- EX_SYNTAX Syntax error in address.
-.XX
- EX_SOFTWARE Internal software error,
-including bad arguments.
-.XX
- EX_OSERR Temporary operating system error,
-such as \*(lqcannot fork\*(rq.
-.XX
- EX_NOHOST Host name not recognized.
-.SH FILES
-.if t .ta 2i
-.if n .ta 3i
-/usr/lib/aliases raw data for alias names
-.br
-/usr/lib/aliases.dir data base of alias names
-.br
-/usr/lib/aliases.pag
-.br
-/bin/mail to deliver uucp mail
-.br
-/usr/net/bin/v6mail to deliver local mail
-.br
-/usr/net/bin/sendmail to deliver Berknet mail
-.br
-/usr/lib/mailers/arpa to deliver ARPANET mail
-.br
-/tmp/mail* temp file
-.br
-/tmp/xscript* saved transcript
-.SH SEE\ ALSO
-biff(1), binmail(1), mail(1), newaliases(1), aliases(5)
-.SH BUGS
-.I Delivermail
-sends one copy of the letter
-to each user;
-it should send one copy
-of the letter to each host
-and distribute to multiple users there
-whenever possible.
-.PP
-.I Delivermail
-assumes the addresses can be represented as one word.
-This is incorrect according to the
-.SM ARPANET
-mail protocol RFC 733 (NIC 41952),
-but is consistent with the real world.
diff --git a/static/v10/man8/df.8 b/static/v10/man8/df.8
deleted file mode 100644
index 49713d39..00000000
--- a/static/v10/man8/df.8
+++ /dev/null
@@ -1,21 +0,0 @@
-.th DF VIII 1/20/73
-.sh NAME
-df \*- disk free
-.sh SYNOPSIS
-.bd df
-[ filesystem ]
-.sh DESCRIPTION
-.it Df
-prints out the number of free blocks
-available on a file system.
-If the file system is unspecified,
-the free space on all of
-the normally mounted file systems
-is printed.
-.sh FILES
-/dev/rf?,
-/dev/rk?,
-/dev/rp?
-.sh "SEE ALSO"
-check(VIII)
-.sh BUGS
diff --git a/static/v10/man8/dist.8 b/static/v10/man8/dist.8
deleted file mode 100644
index 37f65622..00000000
--- a/static/v10/man8/dist.8
+++ /dev/null
@@ -1,146 +0,0 @@
-.TH DIST 8
-.ds ld /usr/lib/dist
-.SH NAME
-connect, dispatch \(mi generic network client and server
-.PP
-query, receive, notify \(mi network clients
-.PP
-answer, transmit, notified \(mi network servers
-.SH SYNOPSIS
-.B \*(ld/connect
-.I remote-system remote-cmd io local-cmd local-args
-.PP
-.B \*(ld/query
-.PP
-.B \*(ld/receive
-.I package-id
-.PP
-.B \*(ld/notify
-.I package-id
-.PP
-.B \*(ld/dispatch
-.I remote-system remote-user
-.PP
-.B \*(ld/answer
-.I remote-system remote-user
-.PP
-.B \*(ld/transmit
-.I remote-system remote-user
-.PP
-.B \*(ld/notified
-.I remote-system remote-user
-.SH DESCRIPTION
-These programs act behind the scenes on behalf of
-.IR dist (1).
-.I Connect
-and
-.I dispatch
-deal with all the details of establishing and authenticating connections
-on the network. The remaining programs are independent of the underlying
-network.
-.PP
-.I Connect
-encapsulates all the details of making a call on the underlying network.
-Its arguments are mostly self explanatory.
-.I Remote-cmd
-must be one of
-.BR answer ", " transmit ", or " notified "."
-If
-.I io
-is
-.BR i ,
-the standard input of the local command is connected
-to the standard output of the remote command. If
-.B i
-is not specified, the local command inherits its local
-standard input, and the remote command has its standard
-output directed to a log file.
-Similarly,
-.B o
-means the standard output of the local command is connected
-to the standard input of the remote command. If
-.B o
-is not specified, the local command inherits its local
-standard output, and the remote command has its standard
-input attached to
-.BR /dev/null .
-Legal possibilities are
-.BR i ,
-.BR o ,
-and
-.BR io.
-.PP
-.I Dispatch
-is intended to be called by a generic network daemon
-such as
-.IR svcmgr (8).
-It talks to
-.I connect
-and takes care of establishing the appropriate standard input and
-output before calling
-.IR answer ,
-.IR transmit ,
-or
-.IR notified .
-.I Dispatch
-expects arguments giving the remote system, remote user, and remote
-address, and passes these to whatever program it calls.
-.PP
-.I Query
-is a simple program called by
-.I connect
-with its standard input attached to the remote
-.IR answer .
-.I Query
-displays a formatted version of the queue list from the remote machine.
-(It may even turn out to be the same as
-.BR /bin/cat .)
-.PP
-.I Receive
-is a more complicated program that is called by
-.I connect
-with both its input and output attached to the remote
-.IR transmit .
-.I Receive
-performs actual software installation and sends a transcript of any
-errors back to the remote system.
-.PP
-.I Notify
-is a simple program called by
-.I connect
-with its standard output attached to the remote
-.IR notified .
-.I Notify
-sends an announcement of the availability of some specific package.
-.PP
-All of the servers read a configuration file,
-.BR \*(ld/conf ,
-to determine how to handle installation on behalf
-of a given remote system and user. The file consists of lines
-containing patterns and actions. Empty lines or lines beginning
-with a '\c
-.BR "#" "'"
-are ignored. The first three fields (separated by white space)
-of each line are regular
-expressions to be matched the remote system name, remote user name,
-and file name respectively. The first line in which all three match
-will be chosen.
-The remainder of the line contains
-the associated actions.
-Each action is an alphanumeric name, optionally followed immediately
-by a parenthesized argument.
-.PP
-Someday the actions will be enumerated here, but I don't know what
-they are yet.
-.SH EXAMPLES
-A simple configuration file:
-.EX
-.ta \w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u
-# system user pathname action
-# we are willing to distribute stuff to coma and pyxis.
-(coma|pyxis) .* .* accept(yes)
-\&.* .* .* accept(no)
-.EE
-.SH "SEE ALSO"
-.IR dist (1),
-.IR dist (5)
diff --git a/static/v10/man8/dkmgr.8 b/static/v10/man8/dkmgr.8
deleted file mode 100644
index 168f6640..00000000
--- a/static/v10/man8/dkmgr.8
+++ /dev/null
@@ -1,165 +0,0 @@
-.TH DKMGR 8
-.CT 1 sa_auto
-.SH NAME
-dkhup, dkmgr, dkzap \- manage Datakit interface
-.SH SYNOPSIS
-.B /usr/ipc/mgrs/dkhup
-[
-.B -N
-.I prefix
-]
-.br
-.B /usr/ipc/mgrs/dkmgr
-[
-.B -N
-.I prefix
-] [
-.B -m
-.I outname
-] [
-.B -n
-.I service
-]
-.br
-.B /usr/ipc/mgrs/dkzap
-[
-.B -N
-.I prefix
-]
-.SH DESCRIPTION
-.I Dkhup
-starts the common signaling channel protocol
-for a Datakit interface.
-Initially it sends several reset messages,
-and tells the controller
-to hang up all outstanding calls;
-thereafter it simply keeps the signaling protocol running.
-.PP
-.I Dkmgr
-receives and places Datakit calls.
-Outbound calls may be placed by calling
-.I ipcopen
-.RI ( ipc (3))
-with the
-.I outname
-specified by option
-.BR -m ;
-the default is
-.BR dk .
-.I Dkmgr
-announces itself to the Datakit network
-with the
-.I service
-name specified by option
-.BR -n ;
-the default is taken from
-.FR /etc/whoami .
-Inbound calls to
-.I service
-are connected to the local
-.L login
-service;
-inbound calls to
-Datakit address
-.IB service . serv
-are handed to local service
-.IR serv .
-.PP
-.I Dkhup
-and
-.I dkmgr
-are normally run once from
-.IR rc (8).
-Both programs must be running
-to make the network available.
-.PP
-.I Dkzap
-arranges for a KMC11-assisted Datakit interface
-to be reset, reloaded, and restarted.
-This should be done only if things are badly broken,
-as it hangs up all existing calls through that interface.
-.PP
-Datakit devices are expected to have names of the form
-.BI /dev/dk/dk nn
-with
-.I nn
-a two-digit channel number.
-If there are more than 100 channels,
-the first digit overflows to lower-case letters:
-channel 100 is
-.LR a0 .
-The common signaling control channel
-is named
-.BR /dev/dk/dkctl .
-All three programs accept an option
-.B -N
-.I prefix
-to change the naming convention;
-for example,
-.B -N /dev/kb/kb
-means that the files have names like
-.B /dev/kb/kb32
-and
-.BR /dev/kb/kbctl .
-.PP
-Support also exists for a less general naming convention:
-there may be two sets of files,
-named
-.BI /dev/dk/dk0 nn
-and
-.BI /dev/dk/dk2 nn\c
-,
-with control channels
-.B /dev/dk/dkctl0
-and
-.BR /dev/dk/dkctl2 .
-.I Dkhup
-and
-.I dkzap
-take the extra argument
-.B 0
-or
-.B 2
-to point at one or the other of the control names.
-A separate copy of
-.I dkhup
-is needed for each name.
-.I Dkmgr
-takes an option
-.B -u
-.IR c ,
-where
-.I c
-is
-.B 0
-or
-.B 2
-to use one set of files,
-or
-.B b
-to use both simultaneously;
-in the latter case,
-.I service
-is announced to both networks.
-This scheme is obsolete and overdue for replacement;
-the missing piece is something to pick an interface for outcalls.
-.PP
-.I Dkmgr
-records its activity in file
-.I service
-in directory
-.BR /usr/ipc/log ,
-default
-.BR /usr/ipc/log/dk .
-.SH FILES
-.F /dev/dk
-.SH "SEE ALSO"
-.IR con (1),
-.IR kmc (8),
-.IR svcmgr (8),
-.IR ipc (3)
-.SH BUGS
-.I Dkhup
-should be folded into
-.IR dkmgr ;
-it is separate for historic reasons.
diff --git a/static/v10/man8/dli.8 b/static/v10/man8/dli.8
deleted file mode 100644
index b63e9af0..00000000
--- a/static/v10/man8/dli.8
+++ /dev/null
@@ -1,27 +0,0 @@
-.pa 1
-.he 'DLI (VIII)'3/15/72'DLI (VIII)'
-.ti 0
-NAME dli -- load DEC binary paper tapes
-.sp
-.ti 0
-SYNOPSIS dli output [input]
-.sp
-.ti 0
-DESCRIPTION dli___
-will load a DEC binary paper tape
-into the output file.
-The binary format paper tape
-is read from the input file
-(/dev/ppt is default.)
-.sp
-.ti 0
-FILES /dev/ppt
-.sp
-.ti 0
-SEE ALSO --
-.sp
-.ti 0
-DIAGNOSTICS "checksum"
-.sp
-.ti 0
-BUGS --
diff --git a/static/v10/man8/dmesg.8 b/static/v10/man8/dmesg.8
deleted file mode 100644
index 162b84fd..00000000
--- a/static/v10/man8/dmesg.8
+++ /dev/null
@@ -1,64 +0,0 @@
-.TH DMESG 8
-.CT 1 sa_nonmortals
-.SH NAME
-dmesg \- system diagnostic messages
-.SH SYNOPSIS
-.B /etc/dmesg
-[
-.B -
-]
-[
-.B -i
-]
-[
-.I core namelist
-]
-.SH DESCRIPTION
-.I Dmesg
-looks in a system buffer
-for recent console messages from the operating system
-and reproduces them on the standard output.
-Under option
-.LR - ,
-.I dmesg
-produces only those messages printed by the system
-since the last time
-.L dmesg\ -
-was run.
-It is normally run periodically by
-.IR cron (8)
-to produce the error log
-.FR /usr/adm/messages .
-.PP
-Option
-.B -i
-prints messages produced since the last
-.L dmesg\ -
-without changing any records.
-.PP
-If
-.I core
-and
-.I namelist
-are specified,
-they are used in place of
-.F /dev/kmem
-and
-.FR /unix .
-.SH FILES
-.TF /usr/adm/messages
-.TP
-.F /usr/adm/messages
-error log
-.br
-.TP
-.F /usr/adm/msgbuf
-record of option
-.L -
-.SH BUGS
-Since the system error message buffer is small,
-not all error messages
-are guaranteed to be logged.
-.br
-Error messages generated immediately before a system crash
-may not be logged.
diff --git a/static/v10/man8/downgrade.8 b/static/v10/man8/downgrade.8
deleted file mode 100644
index 9ab11d51..00000000
--- a/static/v10/man8/downgrade.8
+++ /dev/null
@@ -1,37 +0,0 @@
-.TH DOWNGRADE 8
-.CT 8 sa_nonmortals
-.SH NAME
-downgrade \- downgrade a file
-.SH SYNOPSIS
-.B /etc/downgrade
-.I label
-.I file ...
-.SH DESCRIPTION
-.I Downgrade
-clears from the label of each
-.I file
-all bits that correspond to one bits in
-.I label.
-Capabilities or licenses specified in
-.I label
-are ignored.
-The
-.I files
-must be readable and must be specified by full path name.
-.LP
-.I Downgrade
-requires
-.B T_EXTERN
-privilege, which may be granted to authorized users by
-.IR priv (8).
-.SH EXAMPLES
-.L
-priv downgrade 0110 /usr/myproject/*.c
-.SH FILES
-.F /dev/log
-.SH "SEE ALSO"
-.IR getlab (2),
-.IR setlab (1)
-.SH BUGS
-Downgrading is not an atomic operation. If a file is
-relinked underfoot misleading logging records may result.
diff --git a/static/v10/man8/dump.8 b/static/v10/man8/dump.8
deleted file mode 100644
index 51a70ec8..00000000
--- a/static/v10/man8/dump.8
+++ /dev/null
@@ -1,94 +0,0 @@
-.th DUMP VIII 11/24/73
-.sh NAME
-dump \*- incremental file system dump
-.sh SYNOPSIS
-.bd dump
-[ key [ arguments ] filesystem ]
-.sh DESCRIPTION
-.it Dump
-will make an incremental file system dump
-on magtape
-of all files changed after a certain date.
-The argument
-.it key,
-specifies the date and other options about the dump.
-.it Key
-consists of characters from
-the set
-.bd iu0hds.
-.s3
-.lp +5 3
-\fBi\fR the
-dump date is taken from the file
-.bd /etc/ddate.
-.s3
-.lp +5 3
-\fBu\fR the date just prior to this dump
-is written on
-.bd /etc/ddate
-upon successful completion of this dump.
-.s3
-.lp +5 3
-\fB0\fR the dump date is taken as the epoch
-(beginning of time).
-Thus this option causes an entire file system dump to be taken.
-.s3
-.lp +5 3
-\fBh\fR the dump date is some number of hours before the current date.
-The number of hours is taken from the next argument in
-.it arguments.
-.s3
-.lp +5 3
-\fBd\fR the dump date is some number of days before the current date.
-The number of days is taken from the next argument in
-.it arguments.
-.s3
-.lp +5 3
-\fBs\fR the size of the dump tape is specified in feet.
-The number of feet is taken from the next argument in
-.it arguments.
-It is assumed that there are 9 standard UNIX records per foot.
-When the specified size is reached,
-the dump will wait for reels to be changed.
-The default size is 1700 feet.
-.s3
-.i0
-If no arguments are given,
-the
-.it key
-is assumed to be
-.bd i
-and the file system is
-assumed to be
-.bd /dev/rp1.
-.s3
-Full dumps
-should be taken on quiet file systems as follows:
-.s3
- dump 0u /dev/rp1
-.br
- check -l /dev/rp1
-.s3
-The
-.it check
-will come in handy in case it is necessary
-to resore indiviidual files from this dump.
-Incremental dumps should then be taken
-when desired by:
-.s3
- dump
-.s3
-When the incremental dumps get cumbersome,
-a new complete dump should be taken.
-In this way,
-a restore requires
-loading of the complete dump tape and only the latest incremental tape.
-.sh FILES
-/dev/mt0 magtape
-.br
-/dev/rp1 default file system
-.br
-/etc/ddate
-.sh "SEE ALSO"
-restor, check(VIII), dump(V)
-.sh BUGS
diff --git a/static/v10/man8/dumpdir.8 b/static/v10/man8/dumpdir.8
deleted file mode 100644
index 005bd8ef..00000000
--- a/static/v10/man8/dumpdir.8
+++ /dev/null
@@ -1,38 +0,0 @@
-.TH DUMPDIR 8
-.UC 4
-.SH NAME
-dumpdir \- print the names of files on a dump tape
-.SH SYNOPSIS
-.B /etc/dumpdir
-[
-.B f
-filename ]
-.SH DESCRIPTION
-.I Dumpdir
-is used to read magtapes dumped with the
-.I dump
-command and list the names and inode numbers
-of all the files and directories on the tape.
-.PP
-The
-.B f
-option causes
-.I filename
-as the name of the tape instead
-of the default.
-.SH FILES
-default tape unit varies with installation
-.br
-rst*
-.SH "SEE ALSO"
-dump(1), restor(1)
-.SH DIAGNOSTICS
-If the dump extends over more than one tape,
-it may ask you to change tapes.
-Reply with a new-line when the next tape has been mounted.
-.SH BUGS
-There is redundant information on the tape
-that could be used in case of tape reading problems.
-Unfortunately,
-.I dumpdir
-doesn't use it.
diff --git a/static/v10/man8/expire.8 b/static/v10/man8/expire.8
deleted file mode 100644
index 3c5a2672..00000000
--- a/static/v10/man8/expire.8
+++ /dev/null
@@ -1,67 +0,0 @@
-.TH EXPIRE 8
-.SH NAME
-expire \- remove outdated news articles
-.SH SYNOPSIS
-.BR /usr/lib/news/expire " [ " \-n
-.IR newsgroups " ] [ "
-.BR \-i " ] [ " \-I " ] [ " \-v " [ "
-.IR level " ] ] [ "
-.BI \-e days
- ]
- [
-.B \-a
- ]
-.SH DESCRIPTION
-.PP
-.I Expire
-is normally started up by
-.IR cron (8)
-every night to remove all expired news.
-If no newsgroups are specified, the default is to expire
-.BR all .
-.PP
-Articles whose specified expiration date has already passed
-are considered expirable.
-The
-.B \-a
-option causes expire to archive articles in /usr/spool/oldnews.
-Otherwise, the articles are unlinked.
-.PP
-The
-.B \-v
-option causes expire to be more verbose.
-It can be given a verbosity level (default 1) as in
-.B \-v3
-for even more output.
-This is useful if articles aren't being expired and you want to know why.
-.PP
-The
-.B \-e
-flag gives the number of days to use for a default expiration date.
-If not given, an installation dependent default (often 2 weeks) is used.
-.PP
-The
-.B \-i
-and
-.B \-I
-flags
-tell
-.B expire
-to ignore any expiration date explicitly given on articles.
-This can be used when disk space is really tight.
-The
-.B \-I
-flag will always ignore expiration dates,
-while the
-.B \-i
-flag will only ignore the date if ignoring it would expire the article sooner.
-.I WARNING:
-If you have articles archived by giving them expiration dates far into the
-future, these options might remove these files anyway.
-.SH "SEE ALSO"
-checknews(1),
-inews(1),
-readnews(1),
-recnews(8),
-sendnews(8),
-uurec(8)
diff --git a/static/v10/man8/fsck.8 b/static/v10/man8/fsck.8
deleted file mode 100644
index 2f6841c5..00000000
--- a/static/v10/man8/fsck.8
+++ /dev/null
@@ -1,248 +0,0 @@
-.TH FSCK 8
-.CT 1 sa_nonmortals
-.SH NAME
-fsck \- file system consistency check and interactive repair
-.SH SYNOPSIS
-.B /etc/fsck
-.B -p
-[
-.I special ...
-]
-.br
-.B /etc/fsck
-[
-.B -y
-]
-[
-.B -n
-]
-[
-.BI -s X
-]
-[
-.BI -S X
-]
-[
-.B -t
-.I filename
-] [
-.I special ...
-]
-.SH DESCRIPTION
-.I Fsck
-inspects the disk filesystems
-in the named
-.I special
-files
-and repairs inconsistencies.
-If no files are named,
-every file system listed in
-.IR fstab (5)
-with type 0
-and a nonzero pass number
-is checked.
-.PP
-Under option
-.BR -p ,
-.I fsck
-runs without intervention,
-repairing minor inconsistencies
-and aborting on major ones.
-This form is usually called from
-.IR rc (8).
-If no special files are named,
-file systems in
-.I fstab
-are checked in parallel passes:
-all file systems with pass number 1
-are checked simultaneously,
-then all file systems with pass number 2,
-and so on until
-.I fstab
-is exhausted.
-.PP
-Here are the minor ailments
-repaired automatically
-under
-.BR -p :
-.RS
-unreferenced inodes;
-.br
-wrong link counts in inodes;
-.br
-missing blocks in the free list;
-.br
-blocks in the free list also in files; and
-.br
-counts wrong in the super-block.
-.RE
-.PP
-Other inconsistencies
-cause
-.I fsck
-to abandon the inconsistent file system,
-and exit with a nonzero status
-when the current pass finishes.
-.PP
-Without the
-.B -p
-option,
-.I fsck
-inspects one file system at a time,
-interactively.
-Each inconsistency causes
-.I fsck
-to print a message
-and ask permission to fix the problem.
-The operator may require arcane knowledge
-to guide
-.I fsck
-safely through repair of a badly damaged file system.
-.PP
-Here are the remaining options.
-They are allowed only if
-.B -p
-is absent.
-.TP
-.B -y
-Assume a yes response to all questions.
-This should be used with great caution.
-.TP
-.B -n
-Assume a no response to all questions;
-do not open the file system for writing.
-This option is assumed if the file system cannot be opened for writing.
-.TP
-.BI -s X
-Ignore the actual free list and (unconditionally) reconstruct a new
-one by rewriting the super-block of the file system.
-The file system should be unmounted while this is done; if this
-is not possible, care should be taken that the system is quiescent
-and that it is rebooted immediately afterwards.
-This precaution is necessary so that the old, bad, in-core copy
-of the superblock will not continue to be used, or written on the file system.
-If the file system has a bitmap free list (see
-.IR filsys (5)),
-the free list is always reconstructed unless the
-.B -n
-option is enabled.
-.IP
-Parameter
-.I X
-allows free-list parameters to be specified:
-.BI -s blocks-per-cylinder : blocks-to-skip\c
-\&.
-If
-.I X
-is not given,
-the values used when the file system was created
-are used; see
-.IR mkfs (8).
-If these values were not specified,
-.I X
-is assumed to be
-.BR 400:9 .
-.TP
-.BI -S X
-Conditionally reconstruct the free list.
-This option
-is like
-.BI -s X
-except that the free list is rebuilt only
-if no discrepancies were found.
-.B -S
-implies
-.BR -n .
-.TP
-.B -t
-If
-.I fsck
-cannot obtain enough memory to keep its tables,
-it uses a scratch file.
-If the
-.B -t
-option is
-specified, the file named in the next argument
-is used as the scratch file, if needed.
-Without
-.BR -t ,
-.I fsck
-will prompt the operator for the name of the
-scratch file.
-The file chosen should not be on the
-file system being checked.
-If it did not already exist,
-it is removed when
-.I fsck
-completes.
-.PD
-.br
-.ne 6
-.PP
-Inconsistencies checked are:
-.IP
-.nf
-Blocks claimed more than once.
-Blocks designated outside the file system.
-Incorrect link counts.
-Directory size not 16-byte aligned.
-Bad inode format.
-Blocks not accounted for anywhere.
-Directory entry pointing to unallocated inode.
-Inode number out of range.
-More than 65536 inodes.
-More blocks for inodes than there are in the file system.
-Bad free block list format.
-Total free block and/or free inode count incorrect.
-.fi
-.PP
-Orphaned files and directories (allocated but unreferenced) are
-reconnected by
-placing them in the directory
-.F lost+found
-in the root of the file system being checked.
-The name assigned is the inode number,
-prefixed by
-.LR # .
-.PP
-Checking the raw device is almost always faster,
-but
-.I fsck
-distinguishes bitmapped from non-bitmapped file systems
-by examining the minor device number,
-so the block device is safer.
-.SH FILES
-.F /etc/fstab
-.SH "SEE ALSO"
-.IR fstab (5),
-.IR filsys (5),
-.IR mkfs (8),
-.IR reboot (8)
-.br
-T. J. Kowalski,
-`Fsck\(emthe
-.SM UNIX
-File System Check Program',
-this manual, Volume 2
-.SH BUGS
-Inode numbers for
-.B .
-and
-.B ..
-in each directory should be checked for validity.
-.PP
-Some systems save core images after a crash
-in the swap area;
-on such machines,
-checking many large file systems in parallel
-may cause swapping, overwriting the crash dump.
-It is best just to write crash dumps in a a safer place.
-If disk space for dumps and swapping is scarce,
-avoid checking more than three 120-megabyte file systems
-in parallel on a machine with four megabytes of physical memory.
-.PP
-Examining the minor device number is a botch;
-there should be an explicit flag somewhere.
-.PP
-.I Fsck
-does not have supernatural powers.
diff --git a/static/v10/man8/fstat.8 b/static/v10/man8/fstat.8
deleted file mode 100644
index 7abf677b..00000000
--- a/static/v10/man8/fstat.8
+++ /dev/null
@@ -1,49 +0,0 @@
-.TH FSTAT 1
-.SH NAME
-fstat \- file status
-.SH SYNOPSIS
-.B /etc/fstat
-[
-.B \-u
-user ] [
-.B \-p
-pid ] [
-.B \-f
-filename ]
-.SH DESCRIPTION
-.I Fstat
-identifies open files.
-A file is considered open if a process has it open,
-if it is the working directory for a process,
-or if it is an active pure text file.
-Under default options,
-.I fstat
-reports on all open files.
-.PP
-Options:
-.TP 6
-.B \-u
-Report all files open by a specified user.
-.TP 6
-.B \-p
-Report all files open by a specified process id.
-.TP 6
-.B \-f
-Restrict reports to the specified file.
-If the file is a character special file,
-.I fstat
-additionally reports on any open files on that device,
-treating it as a mounted file system.
-.dt
-.SH "SEE ALSO"
-ps(1), pstat(8)
-.SH DIAGNOSTICS
-Yet to be determined.
-.SH BUGS
-.I Fstat
-tries to be clever if you elide the
-.B \-u ,
-.B \-f ,
-or
-.B \-p
-flags for the argument. Like any expert system, it is sometimes wrong.
diff --git a/static/v10/man8/gacct.8 b/static/v10/man8/gacct.8
deleted file mode 100644
index bc72d1a3..00000000
--- a/static/v10/man8/gacct.8
+++ /dev/null
@@ -1,22 +0,0 @@
-.pa 1
-.he 'GACCT (VIII)'4/27/73'GACCT (VIII)'
-.ti 0
-NAME gacct -- command accounting statistics
-.sp
-.ti 0
-SYNOPSIS gacct [ -arnl ] [ files ]
-.sp
-.ti 0
-DESCRIPTION X
-.sp
-.ti 0
-FILES /usr/adm/tacct
-.sp
-.ti 0
-SEE ALSO sh(i)
-.sp
-.ti 0
-DIAGNOSTICS --
-.sp
-.ti 0
-BUGS --
diff --git a/static/v10/man8/gettable.8 b/static/v10/man8/gettable.8
deleted file mode 100644
index 32ed9d57..00000000
--- a/static/v10/man8/gettable.8
+++ /dev/null
@@ -1,65 +0,0 @@
-.\" Copyright (c) 1983 The Regents of the University of California.
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms are permitted
-.\" provided that the above copyright notice and this paragraph are
-.\" duplicated in all such forms and that any documentation,
-.\" advertising materials, and other materials related to such
-.\" distribution and use acknowledge that the software was developed
-.\" by the University of California, Berkeley. The name of the
-.\" University may not be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
-.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
-.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
-.\"
-.\" @(#)gettable.8 6.3 (Berkeley) 9/20/88
-.\"
-.TH GETTABLE 8 "September 20, 1988"
-.UC 5
-.SH NAME
-gettable \- get NIC format host tables from a host
-.SH SYNOPSIS
-.B /etc/gettable
-[
-.B \-v
-]
-.I host
-[ outfile ]
-.SH DESCRIPTION
-.I Gettable
-is a simple program used to obtain the NIC standard
-host tables from a ``nicname'' server. The indicated
-.I host
-is queried for the tables. The tables, if retrieved,
-are placed in the file
-.I outfile
-or by default,
-.IR hosts.txt .
-.PP
-The
-.B \-v
-option will get just the version number instead of the complete host table
-and put the output in the file
-.I outfile
-or by default,
-.IR hosts.ver .
-.PP
-.I Gettable
-operates by opening a TCP connection to the port indicated
-in the service specification for ``nicname''. A request
-is then made for ``ALL'' names and the resultant information
-is placed in the output file.
-.PP
-.I Gettable
-is best used in conjunction with the
-.IR htable (8)
-program which converts the NIC standard file format to
-that used by the network library lookup routines.
-.SH "SEE ALSO"
-intro(3), htable(8), named(8)
-.SH BUGS
-If the name-domain system provided network name mapping well as host
-name mapping,
-.I gettable
-would no longer be needed.
diff --git a/static/v10/man8/getty.8 b/static/v10/man8/getty.8
deleted file mode 100644
index 41c7cf37..00000000
--- a/static/v10/man8/getty.8
+++ /dev/null
@@ -1,88 +0,0 @@
-.TH GETTY 8
-.CT 1 sa_auto secur
-.SH NAME
-getty \- set terminal mode
-.SH SYNOPSIS
-.B /etc/getty
-[
-.I char
-]
-.SH DESCRIPTION
-.I Getty
-is invoked by
-.IR init (8)
-after a terminal is opened.
-While reading the user's name
-.I getty
-attempts to adapt the system to the speed and type of terminal
-being used.
-.PP
-.I Init
-calls
-.I getty
-with an argument specified by the
-.IR ttys (5)
-entry for the terminal line.
-The argument
-.I char
-determines the line speed
-and other characteristics;
-see below.
-.I Getty
-then types a banner identifying the system (from
-.FR /etc/whoami )
-and the
-.L login:
-message.
-The user's name is then read, a character at a time.
-If a null character is received, it is assumed to be the result
-of the user pushing the `break' (`interrupt') key.
-The speed is then
-changed to another baud rate and
-.L login:
-is typed again.
-Successive breaks cycle through a set of speeds.
-.PP
-The user's name is terminated by a newline or
-carriage return.
-The latter results in the system being set to
-treat carriage returns appropriately (see
-.IR ioctl (2)).
-.PP
-Finally,
-.IR login (8)
-is called with the user's name as argument.
-.PP
-Here are the possible values for
-.IR char .
-If more than one speed is given,
-the first speed is used initially;
-others are selected by successive depressions of the
-BREAK key.
-Other things,
-like delays and tab expansion,
-are set in various ways as well.
-.PP
-.de fq
-\f5\\$1 \fR\\$2 \\$3 \\$4 \\$5 \\$6
-..
-.nf
-char speed
-.fq 0 300-1200-150-110
-.fq 2 9600
-.fq 3 1200-300
-.fq 4 300
-.fq 5 300-1200
-.fq 6 2400
-.fq 7 4800
-.fq 8 9600-1200-300
-.fq 9 300-9600-1200
-.fq a 2400-1200
-.fq b 1200-2400
-.fq j exta (usually 19200)
-.fi
-.SH "SEE ALSO"
-.IR init (8),
-.IR login (8),
-.IR ioctl (2),
-.IR ttys (5)
diff --git a/static/v10/man8/halt.8 b/static/v10/man8/halt.8
deleted file mode 100644
index cd4de601..00000000
--- a/static/v10/man8/halt.8
+++ /dev/null
@@ -1,21 +0,0 @@
-.TH HALT 8
-.UC 4
-.SH NAME
-halt \- halt the processor
-.SH SYNOPSIS
-.B /etc/halt
-[
-.B \-n
-]
-.SH DESCRIPTION
-.I Halt
-writes out sandbagged information to the disks and then halts
-the processor. The machine does not reboot, even if the auto-reboot
-switch is set on the console.
-.PP
-The
-.B \-n
-option prevent the sync before the reboot.
-.SH SEE ALSO
-reboot(8)
-.SH BUGS
diff --git a/static/v10/man8/htable.8 b/static/v10/man8/htable.8
deleted file mode 100644
index f98c9b05..00000000
--- a/static/v10/man8/htable.8
+++ /dev/null
@@ -1,116 +0,0 @@
-.\" Copyright (c) 1983 The Regents of the University of California.
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms are permitted
-.\" provided that the above copyright notice and this paragraph are
-.\" duplicated in all such forms and that any documentation,
-.\" advertising materials, and other materials related to such
-.\" distribution and use acknowledge that the software was developed
-.\" by the University of California, Berkeley. The name of the
-.\" University may not be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
-.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
-.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
-.\"
-.\" @(#)htable.8 6.4 (Berkeley) 9/20/88
-.\"
-.TH HTABLE 8 "September 20, 1988"
-.UC 5
-.SH NAME
-htable \- convert NIC standard format host tables
-.SH SYNOPSIS
-.B /etc/htable
-[
-.B \-c
-.I connected-nets
-] [
-.B \-l
-.I local-nets
-]
-.I file
-.SH DESCRIPTION
-.I Htable
-is used to convert host files in the format specified
-in Internet RFC 810 to the format used by the network
-library routines. Three files are created as a result
-of running
-.IR htable :
-.IR hosts ,
-.IR networks ,
-and
-.IR gateways .
-The
-.I hosts
-file may be used by the
-.IR gethostbyname (3N)
-routines in mapping host names to addresses
-if the nameserver,
-.IR named (8),
-is not used.
-The
-.I networks
-file is used by the
-.IR getnetent (3N)
-routines in mapping network names to numbers.
-The
-.I gateways
-file may be used by the routing daemon
-in identifying ``passive'' Internet gateways;
-see
-.IR routed (8C)
-for an explanation.
-.PP
-If any of the files
-.IR localhosts ,
-.IR localnetworks ,
-or
-.I localgateways
-are present in the current directory,
-the file's contents is prepended to the
-output file.
-Of these, only the gateways file is interpreted.
-This allows sites to maintain local aliases and
-entries which are not normally present in the
-master database.
-Only one gateway to each network will be placed in the gateways file;
-a gateway listed in the localgateways file will override any in the
-input file.
-.PP
-If the gateways file is to be used,
-a list of networks to which the host is directly connected
-is specified with the
-.B \-c
-flag.
-The networks, separated by commas,
-may be given by name or in Internet-standard dot notation,
-e.g.
-.B \-c
-arpanet,128.32,local-ether-net.
-.I Htable
-only includes gateways
-which are directly connected to one of the networks specified,
-or which can be reached from another gateway on a connected net.
-.PP
-If the
-.B \-l
-option is given with a list of networks (in the same format as for
-.BR \-c ),
-these networks will be treated as ``local,''
-and information about hosts on local networks is
-taken only from the localhosts file.
-Entries for local hosts from the main database will be omitted.
-This allows the localhosts file to completely override
-any entries in the input file.
-.PP
-.I Htable
-is best used in conjunction with the
-.IR gettable (8)
-program which retrieves the NIC database from a host.
-.SH "SEE ALSO"
-netintro(4), gettable(8), named(8)
-.SH BUGS
-If the name-domain system provided network name mapping well as host
-name mapping,
-.I htable
-would no longer be needed.
diff --git a/static/v10/man8/icheck.8 b/static/v10/man8/icheck.8
deleted file mode 100644
index b4ae5804..00000000
--- a/static/v10/man8/icheck.8
+++ /dev/null
@@ -1,182 +0,0 @@
-.TH ICHECK 8
-.CT 1 sa_nonmortals
-.SH NAME
-icheck, dcheck, ncheck \- file system consistency check
-.SH SYNOPSIS
-.B /etc/icheck
-[
-option ... ]
-.I filesystem ...
-.PP
-.B /etc/dcheck
-[
-option ... ]
-.I filesystem ...
-.PP
-.B /etc/ncheck
-[
-option ... ]
-.I filesystem ...
-.SH DESCRIPTION
-These programs perform
-consistency checks on file systems.
-For normal file system maintenance, see
-.IR fsck (8).
-Common options are
-.TP
-.B -B
-The file system is bitmapped.
-If
-.I filesystem
-is a special file, this option is set automatically from
-the minor device number.
-.TP
-.BI -i " number ...
-Report only on specified inode
-.I numbers
-.RI ( dcheck
-and
-.I ncheck
-only).
-.PP
-.I Icheck
-examines each
-.I filesystem,
-builds a list of used blocks,
-and compares this list against
-the free list maintained on the file system.
-The normal output of
-.I icheck
-includes a report of
-.IP ""
-The total number of files and the numbers of
-regular, directory, block special and character special files.
-.IP ""
-The total number of blocks in use and the numbers of
-single-, double-, and triple-indirect blocks and directory blocks.
-.IP ""
-The number of free blocks.
-.IP ""
-The number of blocks missing;
-.I i.e.\&
-not in any file
-nor in the free list.
-.PP
-Other
-.I icheck
-options are
-.TP
-.B -s
-Ignore the free list and reconstruct a new one
-by rewriting the super-block of the file system.
-The file system should be dismounted while this is done;
-if this is not possible (for example if
-the root file system has to be salvaged)
-care should be taken that the system is quiescent.
-The words in the super-block
-which indicate the size of the free list and of the
-i-list are believed.
-If the super-block has been curdled
-these words will have to be patched.
-The normal output reports are suppressed.
-.TP
-.BI -b " number ...
-Report each appearance of the selected block
-.I numbers
-in a file or on the free list.
-.TP
-.B -d
-Report each duplicate block.
-.TP
-.B -m
-Report each missing block.
-.TP
-.B -e
-Print at most one diagnostic per file;
-useful for badly curdled file systems.
-.PP
-.I Dcheck
-reads the directories in each
-.I filesystem
-and compares
-the link count in each inode with the number of directory
-entries by which it is referenced.
-.PP
-.I Ncheck
-generates a list of pathname vs i-number for each named
-.I filesystem.
-Other
-.I ncheck
-options are
-.TP
-.B -a
-Report
-.L .
-and
-.LR .. ,
-which are normally ignored.
-.TP
-.B -s
-Report only special files, and files with
-set-userid or set-groupid mode;
-helpful in finding security breaches.
-.SH "SEE ALSO"
-.IR filsys (5),
-.IR chuck (8),
-.IR fsck (8),
-.IR clri (8)
-.SH DIAGNOSTICS
-For duplicate blocks
-and bad blocks (which lie outside the file system)
-.I icheck
-announces the difficulty, the i-number, and the kind of block involved.
-If a read error is encountered,
-the block number of the bad block is printed and
-.I icheck
-considers it to contain 0.
-`Bad freeblock' means that
-a block number outside the available space was encountered in the free list.
-`Dups in free'
-means that
-blocks were found in the free list which
-duplicate blocks either in some file or in the
-earlier part of the free list.
-.PP
-When a file turns up for which the link-count and the number
-of directory entries disagree,
-.I dcheck
-reports the relevant facts.
-Allocated files which have 0 link-count and no entries are also
-listed.
-The only dangerous situation
-occurs when there are more entries than links;
-if entries are removed,
-so the link-count drops to 0,
-the remaining entries point to thin air.
-They should be removed.
-When there are more links than entries, or there is
-an allocated file with neither links nor entries,
-some disk space may be lost but the situation will not degenerate.
-.PP
-When the filesystem structure is improper,
-.I ncheck
-prints
-.L ??
-to denote the `parent' of
-a parentless file.
-A pathname beginning with
-.L ...
-denotes a loop.
-.SH BUGS
-Extraneous diagnostics
-may be produced if these commands are applied to
-active file systems.
-.br
-They believe even preposterous super-blocks and
-consequently can get core images.
-.br
-.I Ncheck's
-report is in no useful
-order, and probably should be sorted.
-.I Ncheck
-fails to report the root inode.
diff --git a/static/v10/man8/inews.8 b/static/v10/man8/inews.8
deleted file mode 100644
index 561d345f..00000000
--- a/static/v10/man8/inews.8
+++ /dev/null
@@ -1,93 +0,0 @@
-.TH INEWS 8
-.SH NAME
-inews \- submit news articles
-.SH SYNOPSIS
-.B inews
-[
-.B \-h
-]
-.B \-t
-title [
-.B \-n
-newsgroup ... ] [
-.B \-e
-expiration ]
-.PP
-.B inews \-p
-[ file ]
-.PP
-.B inews \-C
-newsgroup
-.SH DESCRIPTION
-.I Inews
-submits netnews articles.
-It is not intended for people; see
-.IR postnews (1)
-for routine use.
-The first form is for submitting articles;
-the second for receiving articles from other machines;
-the third for creating newsgroups.
-.PP
-In the first form, the article is read from the standard input.
-A
-.I title
-must be specified, one or more
-.I newsgroups
-(default `general')
-may be specified, and a nonstandard
-.I expiration
-date may be specified.
-Option
-.B \-f
-substitutes another sender's name instead of the user.
-Option
-.B \-h
-specifies that headers are present at the beginning of the
-article and should be included with the article
-header instead of as text.
-.PP
-The sender's full name is taken from the environment variable NAME,
-or from the system index (often
-.IR passwd (5)).
-The environment variable ORGANIZATION overrides the system default.
-.PP
-In the second form
-.I inews
-reads the article from the named
-.I file.
-.PP
-The third form is for creating new newsgroups.
-This may
-be limited to specific users such as the super-user or news administrator.
-.SH FILES
-.PD 0
-.TP \w'/usr/spool/news/newsgroup/article_no 'u
-/usr/spool/news/.sys.nnn
-temporary articles
-.TP
-.RI /usr/spool/news/ newsgroup / article_no
-articles
-.TP
-/usr/spool/oldnews/
-expired articles
-.TP
-/usr/lib/news/active
-known newsgroups and highest article number in each
-.TP
-/usr/lib/news/seq
-sequence number of last article
-.TP
-/usr/lib/news/history
-list of all articles ever seen
-.TP
-/usr/lib/news/sys
-system subscription list
-.PD
-.SH "SEE ALSO"
-news(5),
-newsrc(5),
-postnews(1),
-readnews(1),
-recnews(8),
-sendnews(8)
-uurec(8)
diff --git a/static/v10/man8/init.8 b/static/v10/man8/init.8
deleted file mode 100644
index 72def2a8..00000000
--- a/static/v10/man8/init.8
+++ /dev/null
@@ -1,147 +0,0 @@
-.TH INIT 8
-.CT 1 sa_auto secur
-.SH NAME
-init \- process control initialization
-.SH SYNOPSIS
-.B /etc/init
-.SH DESCRIPTION
-.I Init
-is invoked by the kernel as the last step in the boot procedure.
-It is always process 1.
-.PP
-When started normally,
-.I init
-calls
-.IR rc (8).
-The security label is set at bottom.
-If this succeeds,
-.I init
-begins multi-user operation.
-If
-.I rc
-fails,
-.I init
-commences single user operation by executing
-a superuser shell,
-.IR nosh (8),
-with bottom security label, top ceiling, and all privileges.
-.PP
-When started by a cold boot from the console,
-.I init
-starts single user operation immediately.
-When the single user shell terminates,
-.I init
-runs
-.IR rc
-without the parameter,
-and begins multi-user operation.
-.PP
-In multi-user operation,
-.IR init 's
-role is to create a process for each
-directly connected terminal port on which a user may log in.
-To begin such operations, it reads the
-.IR ttys (5)
-file and forks to create a process
-for each terminal specified in the file.
-Each of these processes opens the appropriate terminal
-for reading and writing
-on file descriptors 0, 1, 2, and 3 (the standard input and
-output, the diagnostic output and
-.FR /dev/tty ).
-The security label of each port is set to that of file
-.FR /etc/floor .
-Opening the terminal will usually involve a delay,
-since the
-.I open
-is not completed until someone
-dials and carrier is established on the channel.
-Then
-.IR getty (8)
-is called with argument as specified by the second character of
-the
-.I ttys
-file line.
-.I Getty
-reads the user's name and invokes
-.IR login (8)
-to log in the user and execute the shell.
-.PP
-Ultimately the shell will terminate
-because of an end-of-file or as a result of hanging up.
-The main path of
-.IR init ,
-which has been waiting
-for such an event,
-wakes up and removes the appropriate entry from the
-file
-.IR utmp (5),
-which records current users, and
-makes an entry in
-.IR wtmp ,
-which maintains a history
-of logins and logouts.
-Then the appropriate terminal is reopened and
-.I getty
-is
-invoked again.
-.PP
-.I Init
-catches signal
-.B SIGHUP
-and interprets it to mean that
-the
-.I ttys
-file
-should be read again.
-The shell process on each line that has become inactive
-according to
-.I ttys
-is terminated;
-a new process is created for each line added;
-lines unchanged in the file are undisturbed.
-Thus it is possible to drop or add terminal lines without
-rebooting the system by changing the
-.I ttys
-file and sending a
-.I hangup
-signal to the
-.I init
-process: use
-.LR "kill -1 1" .
-.PP
-.I Init
-will terminate multi-user operations,
-kill all outstanding processes,
-and resume single-user mode
-if sent signal
-.BR SIGTERM :
-use
-.LR "kill 1" .
-.I Init
-will wait at most 30 seconds for outstanding processes to die,
-to avoid waiting forever.
-.PP
-If, at bootstrap time, the
-.I init
-program cannot be executed,
-the system will loop in user mode at a low address.
-.SH FILES
-.nf
-.F /dev/console
-.F /dev/tty
-.F /etc/utmp
-.F /usr/adm/wtmp
-.F /etc/ttys
-.F /etc/rc.nosh
-.fi
-.SH "SEE ALSO"
-.IR login (8),
-.IR kill (1),
-.IR sh (1),
-.IR ttys (5),
-.IR getty (8),
-.IR rc (8),
-.IR reboot (8)
-.SH BUGS
-The single-user shell has all privileges.
diff --git a/static/v10/man8/ino.8 b/static/v10/man8/ino.8
deleted file mode 100644
index be9c35c4..00000000
--- a/static/v10/man8/ino.8
+++ /dev/null
@@ -1,10 +0,0 @@
-.th INO VIII 11/1/73
-.sh NAME
-ino \*- get the i-number of a file
-.sh SYNOPSIS
-.bd ino
-file ...
-.sh DESCRIPTION
-The i-number of each file argument is printed.
-An i-number of zero is printed if a bad argument is given.
-.sh BUGS
diff --git a/static/v10/man8/ins.8 b/static/v10/man8/ins.8
deleted file mode 100644
index f4efaa4e..00000000
--- a/static/v10/man8/ins.8
+++ /dev/null
@@ -1,103 +0,0 @@
-.TH INS 8
-.SH NAME
-ins \- install software
-.SH USAGE
-.B ins
-[
-.I option ...
-]
-[
-[
-.I source
-]
-.I target
-]
-.SH DESCRIPTION
-.I Ins
-queues a request to `install' the named
-.I target
-file \- in the simplest case, by copying from
-.I source
-to
-.BR target " \-
-and then attempts to execute all pending requests
-for the target,
-until thwarted by lack of privilege.
-By default, each target has a separate queue, but if several files are
-to be updated together their requests can
-also be placed in another separate queue.
-If modification requests for a given target file appear in several
-different queues, those requests will be executed in correct time
-order.
-A request will be served only when it is at the front of all the queues
-it is in.
-.PP
-If no target is named,
-.I ins
-attempts to serve all pending requests.
-The options are
-.TP
-.B -x
-Verify consistency of currently queued-up requests
-with historical record in
-.F /usr/spool/ins/log.
-.TP
-.B -v
-Print a verbose commentary
-(by copying logging data to standard output).
-.TP
-.B -n
-Print, but do not execute, the modification requests.
-.TP
-.BI -j " jobnumber" "...
-Delete a queued-up request.
-Possible values for
-.I jobnumber
-are revealed by using the
-.B -n
-flag, where they are listed in the style
-.BI /usr/spool/ins/job jobnumber.
-.TP
-.BI -q " queuename
-Put the request in special named queue, in addition to the
-queue for
-.I target.
-.TP
-.B -r
-Remove target.
-.TP
-.BI -o " owner
-Set uid of target.
-.TP
-.BI -g " group
-Set gid of target.
-.TP
-.BI -m " mode
-Set file mode of target, as in
-.IR chmod (1).
-.TP
-.BI -l " label
-Set file label of target, as in
-.IR setlab (1).
-.TP
-.BI -p " cap lic
-Set file privileges, as in
-.IR setpriv (8).
-.PP
-.I Ins
-records
-.IR xs (8)-style
-checksums of both modified software and of its own queues,
-keeps a verbose log file, etc, etc.
-.SH FILES
-.F /usr/spool/ins/log
-.br
-.F /usr/spool/ins/lock
-.br
-.F /usr/spool/ins/pending
-.br
-.F /usr/spool/ins/job*
-.br
-.F /usr/spool/ins/dat*
-.SH BUGS
-Not written yet.
diff --git a/static/v10/man8/install.8 b/static/v10/man8/install.8
deleted file mode 100644
index 966aeffa..00000000
--- a/static/v10/man8/install.8
+++ /dev/null
@@ -1,34 +0,0 @@
-.TH INSTALL 8 bowell
-.SH NAME
-install \- place files in their proper homes
-.SH SYNOPSIS
-.B /etc/install
-[
-.B \-c
-] [ \-s ]
-file dest
-.SH DESCRIPTION
-.I Install
-moves or copies the
-.I file
-to
-.I dest.
-If
-.I dest
-is a directory, the file is installed in the directory.
-Its main use is in makefiles subsidiary to the primary source directory /src.
-.PP
-Option
-.B \-c
-causes the file to be copied, otherwise it is moved.
-Option
-.B \-s
-invokes
-.IR strip (1)
-on the file first.
-.PP
-If possible, the group and owner of
-.I dest
-are changed to `bin'.
-.SH BUGS
-Only one option can appear.
diff --git a/static/v10/man8/ipconfig.8 b/static/v10/man8/ipconfig.8
deleted file mode 100644
index 6fcc66c7..00000000
--- a/static/v10/man8/ipconfig.8
+++ /dev/null
@@ -1,125 +0,0 @@
-.TH IPCONFIG 8
-.CT 1 sa_auto
-.SH NAME
-ipconfig, dkipconfig, udpconfig \- set up DARPA Internet protocols
-.SH SYNOPSIS
-.B /usr/ipc/mgrs/ipconfig
-[
-.B -m
-.I mask
-] [
-.B -df
-]
-.I "ip-device localhost network"
-.BI [ arp-device ]
-.B &
-.br
-.B /usr/ipc/mgrs/dkipconfig
-.I "gatemachine localhost remotehost"
-.B &
-.br
-.B /usr/ipc/mgrs/udpconfig
-.I udp-device
-.B &
-.SH DESCRIPTION
-.I Ipconfig
-activates the DARPA Internet protocol on a communications device,
-with Internet address
-.I localhost
-for the host
-and network address
-.I network
-for the device.
-.PP
-If
-.I arp-device
-is specified,
-the ARP address resolution protocol
-is started on that device.
-Option
-.B -d
-causes
-.I ipconfig
-to print ARP requests on the standard output
-as they are received.
-.PP
-Option
-.B -m
-declares a subnet mask
-for the network reached through
-.IR ip-device .
-.I Mask
-may be a four-piece IP address like
-.L 255.255.255.0
-or a 32-bit hexadecimal number like
-.LR ffffff00 .
-.PP
-Option
-.B -f
-is a special workaround for networks with obsolete hosts.
-It causes
-.I ipconfig
-to answer illegal ARP requests for the subnet's broadcast address
-with an illegal Ethernet address,
-to prevent broadcast storms.
-.PP
-.I Dkipconfig
-places a network call to
-.I gatemachine
-and activates the IP protocol on the connection,
-so that the remote machine becomes a gateway for the caller's IP traffic.
-.I Localhost
-becomes the calling machine's Internet address
-through this IP interface;
-.I remotehost
-is the Internet address
-to which local IP packets should be sent
-to reach the gateway.
-.PP
-.I Ipconfig
-and
-.I dkipconfig
-record unusual events and errors in
-log files
-.F /usr/ipc/log/ipconfig
-and
-.FR /usr/ipc/log/dkipconfig .
-.PP
-.I Udpconfig
-activates the UDP datagram protocol
-on the named
-.IR udp-device ,
-usually
-.FR /dev/ipudp .
-Only one
-.I udpconfig
-is needed for the entire collection of IP networks.
-.PP
-These programs are usually run once from
-.IR rc (8).
-.SH EXAMPLES
-The following calls start IP
-on system
-.B fs
-on the first Interlan Ethernet controller,
-with ARP active;
-arrange for machine
-.B nj/astro/research
-to pass IP packets to
-.BR fs ;
-and activate
-UDP.
-.EX
-/usr/ipc/mgrs/ipconfig /dev/il00 fs mh-astro-net /dev/il01 &
-/usr/ipc/mgrs/dkipconfig nj/astro/research fs-dk research-dk127 &
-/usr/ipc/mgrs/udpconfig /dev/ipudp &
-.EE
-.SH FILES
-.F /usr/ipc/log/ipconfig
-.br
-.F /usr/ipc/log/dkipconfig
-.SH "SEE ALSO"
-.IR con (1),
-.IR qns (7),
-.IR route (8),
-.IR tcpmgr (8)
diff --git a/static/v10/man8/istat.8 b/static/v10/man8/istat.8
deleted file mode 100644
index d44f3133..00000000
--- a/static/v10/man8/istat.8
+++ /dev/null
@@ -1,35 +0,0 @@
-.pa 1
-.he 'ISTAT (VIII)'1/20/73'ISTAT (VIII)'
-.ti 0
-NAME istat -- get inode status
-.sp
-.ti 0
-SYNOPSIS istat_____ [ filesystem ] inumber\d1\u ...
-.sp
-.ti 0
-DESCRIPTION istat_____
-gives information about one or more i-nodes
-on the given file system or on /dev/rk0 if no file system
-is given.
-.sp
-The information is in exactly the same form
-as that for stat(I),
-except that mode letter "a" is
-used to indicate that the i-node is allocated,
-"u" that it is unallocated.
-.sp
-.ti 0
-FILES /etc/uids,
-/dev/rk0
-.sp
-.ti 0
-SEE ALSO stat(I), ls(I) (-l option)
-.sp
-.ti 0
-DIAGNOSTICS --
-.sp
-.ti 0
-BUGS istat_____
-ignores any read error
-and pretends to give status even if the file system
-is not physically present.
diff --git a/static/v10/man8/kill.8 b/static/v10/man8/kill.8
deleted file mode 100644
index 0c6db3ff..00000000
--- a/static/v10/man8/kill.8
+++ /dev/null
@@ -1,36 +0,0 @@
-.pa 1
-.he 'KILL (VIII)'1/20/73'KILL (VIII)'
-.ti 0
-NAME kill -- terminate process with extreme prejudice
-.sp
-.ti 0
-SYNOPSIS /usr/adm/kill_____________ processnumber
-.sp
-.ti 0
-DESCRIPTION After ps__
-(q.v.) has given you the unique ID of a process, you can terminate
-it by this command.
-A core image is produced in the process's working directory.
-
-Only the super-user can exercise this privilege.
-.sp
-.ti 0
-FILES --
-.sp
-.ti 0
-SEE ALSO ps (VIII)
-.sp
-.ti 0
-DIAGNOSTICS yes
-.sp
-.ti 0
-BUGS If the process
-has executed sys nice (II)
-and there is another process which has not, but
-which loops,
-the first process cannot be done in properly,
-since it has to be swapped in so as cooperate
-in its own murder.
-
-It would also be nice if ordinary people could
-kill their own processes.
diff --git a/static/v10/man8/kmc.8 b/static/v10/man8/kmc.8
deleted file mode 100644
index a2e40dc2..00000000
--- a/static/v10/man8/kmc.8
+++ /dev/null
@@ -1,107 +0,0 @@
-.TH KMC 8
-.CT 1 sa_nonmortals
-.SH NAME
-kmc, kdiload, kmcdump \- control KMC11 input/output processors
-.SH SYNOPSIS
-.B /etc/kdiload
-[
-.I dev
-[
-.I file
-] ]
-.PP
-.B /etc/kmcdump
-[
-.I dev
-]
-.SH DESCRIPTION
-These commands control the KMC11-B
-microprocessors
-used for Datakit protocol processing.
-.PP
-.I Kdiload
-resets KMC device
-.IR dev ,
-copies the microcode in
-.IR file
-into the KMC's memory,
-and starts the KMC.
-.I Dev
-may be a pathname
-or a single character key
-identifying the KMC;
-the default is
-.LR 2 .
-.I File
-defaults to that specified in
-.F /etc/kmctab
-if a single character key is used,
-.F /etc/dkk.dubhi
-otherwise.
-.PP
-.I Kmcdump
-stops the KMC
-and copies its state into files
-in the working directory.
-.I Dev
-may be a single character key
-or a pathname;
-the default is
-.LR 2 .
-The KMC's memory is copied to the file
-.BI core. k . nnn\c
-,
-where
-.I k
-is the keyletter
-and
-.I nnn
-is some number;
-the state of the KMC's registers and some trace information from Unix
-is written to
-.BI regs. k . nnn\c
-\&.
-.PP
-These commands search the file
-.F /etc/kmctab
-for KMC devices and microcode files.
-The file contains lines of
-three blank-separated fields:
-.PP
-.RS
-single character identifying this KMC
-.br
-full pathname of the KMC device file
-.br
-full pathname of the microcode to be used in this KMC
-.RE
-.PP
-The KMC with key
-.I K
-uses Datakit special files with names like
-.BI /dev/dk/dk K 03\c
-\&.
-If there is only one KMC for Datakit,
-its key is
-.LR 2 .
-If the only KMC is the only Datakit interface in a machine,
-its key is
-.LR 2 ,
-and its special files look like
-.BR /dev/dk/dk03 .
-.SH FILES
-.F /etc/kmctab
-.br
-.F /bin/kasb
-.SH SEE ALSO
-.IR dkmgr (8)
-.SH BUGS
-For the moment,
-the only permissible keys are
-.L 0
-and
-.LR 2 .
-The KMC and Datakit filename conventions
-are arcane,
-and based on obsolete notions;
-they should be replaced.
diff --git a/static/v10/man8/ldpcs.8 b/static/v10/man8/ldpcs.8
deleted file mode 100644
index 31db6da2..00000000
--- a/static/v10/man8/ldpcs.8
+++ /dev/null
@@ -1,58 +0,0 @@
-.TH LDPCS 8 VAX-11/750
-.CT 1 sa_auto
-.SH NAME
-ldpcs \- load comet microcode
-.SH SYNOPSIS
-.B /etc/ldpcs
-[
-.B -f
-]
-[
-.B -v
-]
-.I pcsfile
-.SH DESCRIPTION
-.I Ldpcs
-loads microcode
-from
-.I pcsfile
-into the VAX-11/750 patchable control store.
-Normally,
-the hardware ID register is checked
-to see that the system is an 11/750
-and that its base microcode revision level
-is appropriately high;
-the
-.B -f
-option
-removes the checks.
-The
-.B -v
-option causes the microcode version number
-to be printed after loading.
-.PP
-.I Ldpcs
-is usually called from
-.IR rc (8)
-to load the most recent
-.SM DEC
-microcode patches from
-.FR /etc/pcs750.bin .
-.PP
-The patch file consists of
-1024 bytes of patch bits,
-followed by 10240 bytes of actual patches.
-Each patch bit represents a 20-bit microcode word;
-the patches themselves are 20-bit words
-packed together.
-The format is the same as that distributed by DEC.
-.SH FILES
-.F /dev/mem
-.br
-.F /dev/mtpr
-.SH BUGS
-Calling
-.I ldpcs
-is a good idea,
-but it is not mandatory;
-the system will run without the patches.
diff --git a/static/v10/man8/login.8 b/static/v10/man8/login.8
deleted file mode 100644
index 50336078..00000000
--- a/static/v10/man8/login.8
+++ /dev/null
@@ -1,138 +0,0 @@
-.TH LOGIN 8
-.CT 1 sa_auto
-.SH NAME
-login \- sign on
-.SH SYNOPSIS
-.B /etc/login
-.I name
-.br
-.B /etc/login
-.B -f
-.I name
-[
-.I cmd
-]
-.br
-.B /etc/login
-.B -p
-.I passwd-line
-[
-.I cmd
-]
-.SH DESCRIPTION
-.I Login
-is executed by
-.IR getty (8).
-See the Introduction to this volume for how to dial up initially.
-.PP
-.I Login
-asks for a password if appropriate.
-Echoing is turned off during the typing of the password.
-The
-.B -f
-option forces login of the named user, without a password.
-.B -p
-is similar to
-.BR -f ,
-but an entire line of password file information
-is supplied.
-.PP
-.I Login
-initializes the userid, the groupid, and the working directory
-according to specifications found in the password file;
-see
-.IR passwd (5).
-It also initializes environment variables
-.SM PATH
-and
-.SM HOME .
-Finally it executes a command interpreter (usually
-.IR sh (1)).
-Argument 0 of the command interpreter is its name with
-a dash
-.RL ( - )
-prepended.
-If
-a
-.I cmd
-argument was present,
-two additional arguments
-.B -c
-.I cmd
-are passed,
-and environment variable
-.SM REXEC
-is set to
-.LR 1 .
-.PP
-Upon a successful login,
-accounting files are updated and,
-if no options are present,
-the message of the day is printed
-and the user is informed of the
-existence of mail.
-.PP
-Successful logins are recorded in
-.F /etc/utmp
-and
-.FR /usr/adm/wtmp .
-If
-.I cmd
-was present,
-.L *
-is appended to the login name in
-.IR wtmp ,
-and
-no record is made in
-.IR utmp .
-.PP
-Only the super-user may execute
-.IR login .
-.SH FILES
-.TF /usr/spool/mail/*
-.TP
-.F /etc/utmp
-accounting
-.TP
-.F /usr/adm/wtmp
-accounting
-.TP
-.F /usr/spool/mail/*
-mail
-.TP
-.F /etc/motd
-message-of-the-day
-.TP
-.F /etc/passwd
-password file
-.TP
-.F /etc/group
-groups file
-.SH "SEE ALSO"
-.IR newgrp (1),
-.IR passwd (1),
-.IR environ (5),
-.IR passwd (5),
-.IR getty (8),
-.IR init (8),
-.IR su (8),
-.IR svcmgr (8).
-.SH DIAGNOSTICS
-`Login incorrect':
-the name or the password is bad.
-.br
-`No Shell' or `no directory': the initial shell or
-home directory specified in the password file does not exist.
-.br
-`Cannot open password file': things are badly curdled.
-.SH BUGS
-Information passed to options
-.B -p
-and
-.B -f
-is not checked.
-Only trusted programs should run
-.IR login .
-Only trusted programs may usefully do so anyway;
-.I login
-has no privileges.
diff --git a/static/v10/man8/makekey.8 b/static/v10/man8/makekey.8
deleted file mode 100644
index 193201bf..00000000
--- a/static/v10/man8/makekey.8
+++ /dev/null
@@ -1,53 +0,0 @@
-.TH MAKEKEY 8
-.CT 1 sa_nonmortals
-.SH NAME
-makekey \- generate encryption key
-.SH SYNOPSIS
-.B /usr/lib/makekey
-.SH DESCRIPTION
-.I Makekey
-improves the usefulness of encryption schemes depending on a key by
-increasing the amount of time required to search the key space.
-It
-reads 10 bytes from its standard input, and writes 13 bytes on its
-standard output.
-The output depends on the input in a way intended to
-be difficult to compute (i.e. to require a substantial fraction of a
-second).
-.PP
-The first eight input bytes
-(the
-.IR "input key" )
-can be arbitrary
-.SM ASCII
-characters.
-The last
-two (the
-.IR salt )
-are best chosen from the set of digits, upper- and lower-case
-letters,
-.L .
-and
-.LR / .
-The salt characters are repeated as the first two characters of the output.
-The remaining 11 output characters are chosen from the same set as the salt
-and constitute the
-.I "output key."
-.PP
-The salt is used to select one of 4096 cryptographic
-machines all based on the National Bureau of Standards
-.SM DES
-algorithm, but modified in 4096 different ways.
-Using the input key as key,
-a constant string is fed into the machine and recirculated
-a number of times.
-The 64 bits that come out are distributed into the
-66 useful key bits in the result.
-.PP
-.I Makekey
-is intended for programs, such as
-.IR crypt (1),
-that perform encryption.
-Usually its input and output will be pipes.
-.SH SEE ALSO
-.IR crypt (1)
diff --git a/static/v10/man8/mkfs.8 b/static/v10/man8/mkfs.8
deleted file mode 100644
index 595723ba..00000000
--- a/static/v10/man8/mkfs.8
+++ /dev/null
@@ -1,138 +0,0 @@
-.th MKFS VIII 11/1/73
-.sh NAME
-mkfs \*- construct a file system
-.sh SYNOPSIS
-.bd /etc/mkfs
-special
-proto
-.sh DESCRIPTION
-.it Mkfs
-constructs a file system
-by writing on the special file
-.it special
-according to the directions
-found in
-the prototype file
-.it proto.
-The prototype file
-contains tokens separated by spaces or
-new lines.
-The first token is the name of a file
-to be copied onto block zero as
-the bootstrap program
-(see boot procedures(VIII)).
-The second token is a number specifying the
-size of the created file system.
-Typically it will be the number of blocks on the device,
-perhaps diminished
-by space for swapping.
-The next token is the i-list size in blocks
-(remember there are 16 i-nodes per block).
-The next set of tokens comprise the specification
-for the root file.
-File specifications consist of tokens
-giving the mode,
-the user-id,
-the group id,
-and the initial contents of the file.
-The syntax of the contents field
-depends on the mode.
-.s3
-The mode token for a file is a 6 character string.
-The first character
-specifies the type of the file.
-(The characters
-.bd \*-bcd
-specify regular, block special,
-character special and directory files
-respectively.)
-The second character of the type
-is either
-.bd u
-or
-.bd \*-
-to specify set-user-id mode or not.
-The third is
-.bd g
-or
-.bd \*-
-for the set-group-id mode.
-The rest of the mode
-is a three digit octal number giving the
-owner, group, and foreigner read, write, execute
-permissions (see
-.it chmod
-(I)).
-.s3
-Two decimal number
-tokens come after the mode; they specify the
-user and group ID's of the owner of the file.
-.s3
-If the file is a regular file,
-the next token is a pathname
-whence the contents and size are copied.
-.s3
-If the file is a block or character special file,
-two decimal number tokens
-follow which give the major and minor device numbers.
-.s3
-If the file is a directory,
-.it mkfs
-makes the entries \fB.\fR and \fB..\fR
-and then
-reads a list of names and
-(recursively)
-file specifications for the entries
-in the directory.
-The scan is terminated with the
-token \fB$\fR.
-.s3
-If the prototype file cannot be opened and
-its name consists of a string of digits,
-.it mkfs
-builds a file system with a single
-empty directory on it.
-The size of the file system is the value
-of
-.it proto
-interpreted as a decimal number.
-The i-list size is the file system size
-divided by 50.
-(This corresponds to an average size of
-three blocks per file.)
-The boot program is left uninitialized.
-.s3
-A sample prototype specification follows:
-.s3
-.nf
-.in +5
-/usr/mdec/uboot
-4872 55
-d\*-\*-777 3 1
-usr d\*-\*-777 3 1
- sh \*-\*-\*-755 3 1 /bin/sh
- ken d\*-\*-755 6 1
- $
- b0 b\*-\*-644 3 1 0 0
- c0 c\*-\*-644 3 1 0 0
- $
-$
-.in -5
-.fi
-.sh "SEE ALSO"
-file system(V),
-directory(V),
-boot procedures(VIII)
-.sh DIAGNOSTICS
-There are various diagnostics for
-syntax errors,
-inconsistent values,
-and sizes too small.
-.sh BUGS
-It is not possible to initialize a file larger than
-64K bytes.
-.br
-The size of the file system is restricted to
-64K blocks.
-.br
-There should be some way to specify links.
diff --git a/static/v10/man8/mknod.8 b/static/v10/man8/mknod.8
deleted file mode 100644
index ea3a5137..00000000
--- a/static/v10/man8/mknod.8
+++ /dev/null
@@ -1,79 +0,0 @@
-.th MKNOD VIII 10/31/73
-.sh NAME
-mknod \*- build special file
-.sh SYNOPSIS
-.bd /etc/mknod
-name
-[
-.bd c
-] [
-.bd b
-]
-major
-minor
-.sh DESCRIPTION
-.it Mknod
-makes a directory entry and corresponding i-node
-for a special file.
-The first argument is the
-.it name
-of the entry.
-The second is
-.bd b
-if the special file is block-type (disks, tape) or
-.bd c
-if it is character-type (other devices).
-The last two arguments are
-numbers specifying the
-.it major
-device type
-and the
-.it minor
-device (e.g. unit, drive, or line number).
-.s3
-The assignment of major device numbers is specific to each system.
-For reference, here are the numbers for the MH 2C-644 machine.
-Do not believe them too much.
-.s3
-Block devices:
-.lp +8 4
-0 RF fixed-head disk
-.lp +8 4
-1 RK moving-head disk
-.lp +8 4
-2 TC DECtape
-.lp +8 4
-3 TM magtape
-.lp +8 4
-4 RP moving-head disk
-.lp +8 4
-5 Vermont Research moving-head disk
-.i0
-.s3
-Character devices:
-.lp +8 4
-0 KL on-line console
-.lp +8 4
-1 DC communications lines
-.lp +8 4
-2 PC paper tape
-.lp +8 4
-3 DP synchronous interface
-.lp +8 4
-4 DN ACU interface
-.lp +8 4
-5 core memory
-.lp +8 4
-6 VT scope (via 11/20)
-.lp +8 4
-7 DA voice response unit
-.lp +8 4
-8 CT phototypesetter
-.lp +8 4
-9 VS voice synthesizer
-.lp +8 4
-10 TIU Spider interface
-.i0
-.sh "SEE ALSO"
-mknod (II)
-.sh BUGS
diff --git a/static/v10/man8/mkpkg.8 b/static/v10/man8/mkpkg.8
deleted file mode 100644
index 50032998..00000000
--- a/static/v10/man8/mkpkg.8
+++ /dev/null
@@ -1,179 +0,0 @@
-.TH MKPKG 8
-.CT 1 comm_mach
-.SH NAME
-mkpkg, inspkg, seal, unseal \- package files for automatic software distribution
-.SH SYNOPSIS
-.B mkpkg
-[
-.I option ...
-]
-.I file ...
-.PP
-.B inspkg
-[
-.I option ...
-]
-[
-.I file ...
-]
-.PP
-.B seal
-[
-.I option
-]
-[
-.I file ...
-]
-.PP
-.B unseal
-[
-.I option
-]
-[
-.I file ...
-]
-.SH DESCRIPTION
-These programs are used by
-.IR ship (8)
-to keep files identical across machines.
-.PP
-.I Mkpkg
-packages
-.I files
-and writes the result on the standard output.
-.I Inspkg
-installs the named packages
-or the standard input.
-.PP
-Non-existent files given to
-.I mkpkg
-are deleted upon installation.
-Directories are copied with all their contents.
-Hard links are reproduced.
-Symbolic links and special files
-are reproduced with the same inode contents.
-File modification and access times and owner and group names
-are reproduced as far as possible.
-Old versions of files are removed before installation:
-.I inspkg
-needs write permission in containing directories.
-.PP
-Options for both
-.I mkpkg
-and
-.IR inspkg :
-.nr xx \w'\f5-K \f2keyfile '
-.TP \n(xxu
-.B -v
-Place running commentary on the standard error file.
-.br
-.ns
-.TP
-.BI -D path1 = path2
-Pretend that any pathname beginning with
-.I path1
-really begins with
-.IR path2 .
-Relative pathnames are extended to full pathnames before comparison.
-.PP
-Options for
-.IR mkpkg ;
-only one may occur:
-.TP \n(xxu
-.BI -x command
-Include in the package instructions to execute the shell
-.I command
-after all files have been installed.
-.I Command
-is unaffected by option
-.BR -D .
-.br
-.ns
-.TP
-.BI -X file
-Include in the package instructions to
-run the shell script
-.I file
-after all files have been installed.
-The file name is subject to option
-.BR -D .
-.PP
-Options for
-.IR inspkg :
-.TP \n(xxu
-.B -n
-Skip the actual installation, but verify
-the input packages and produce a backup if requested.
-.br
-.ns
-.TP
-.B
--b
-Write on the standard output a backup package
-that contains whatever was destroyed.
-.PP
-A package is an
-.IR ar (1)
-archive containing an extra
-.SM ASCII
-file named
-.FR Instructions .
-.PP
-.I Seal
-concatenates the named
-.I files
-or the standard input
-onto the standard output in
-an error-detecting form suitable for shipment by
-.IR mail (1).
-.I Unseal
-reverses the process, concatenating copies of all the
-original inputs onto the standard output.
-When
-.IR asd (8)
-uses
-.IR uucp (1),
-it sends sealed packages.
-.PP
-A sealed file is printable, has
-fewer than 128 characters per line, and has no lines
-consisting of a single period.
-The first line is
-.L !<seal>
-and the last one begins with
-.LR !end .
-Other lines, such as mail headers, can be added to
-either end of a sealed file
-without hindering
-.IR unseal .
-.PP
-Options for
-.I seal
-and
-.IR unseal :
-.TP \n(xxu
-.B -k
-A key will be demanded to encrypt the
-checksum calculation.
-.br
-.ns
-.TP
-.BI -K " keyfile"
-Same, but taking the first line of
-.I keyfile
-as the key.
-.SH SEE ALSO
-.IR ar (1),
-.IR cpio (1),
-.IR tar (1),
-.IR bundle (1),
-.IR ship (8),
-.IR ar (5),
-.IR asd (8)
-.SH BUGS
-The pipeline
-.L mkpkg ... | inspkg
-fails if input and output files overlap.
-.br
-.I Inspkg
-fills any holes in files.
diff --git a/static/v10/man8/mount.8 b/static/v10/man8/mount.8
deleted file mode 100644
index 1dfa16a2..00000000
--- a/static/v10/man8/mount.8
+++ /dev/null
@@ -1,153 +0,0 @@
-.TH MOUNT 8
-.CT 1 sa_nonmortals
-.SH NAME
-mount, umount \- mount and dismount file system
-.SH SYNOPSIS
-.B /etc/mount
-[ options ]
-[
-.I special name
-[
-.I fstype
-[
-.I flags
-] ] ]
-.PP
-.B /etc/mount
-.B -a
-.PP
-.B /etc/mount
-[
-.I special name
-[
-.B -r
-]
-]
-.PP
-.B /etc/umount
-.I name
-.PP
-.B /etc/umount
-.B -a
-.SH DESCRIPTION
-.I Mount
-announces to the system that a removable file system
-of type
-.I fstype
-is present on the file
-.I special.
-The file
-.I name
-must exist already; it
-must be a directory (unless the root of the
-mounted file system is not a directory).
-It becomes the name of the newly mounted root.
-See
-.IR fmount (2)
-for a list of file system types
-and appropriate flags.
-If
-.I fstype
-or
-.I flags
-is omitted,
-zero is assumed;
-file system type 0
-is an ordinary disk file system.
-.PP
-The options are
-.TP
-.B -a
-Mount all the files designated in
-.FR /etc/fstab ;
-see
-.IR fstab (5).
-No other arguments are legal with
-.BR -a .
-.TP
-.B -r
-Read only; shorthand for
-.I fstype
-0
-and
-.I flag
-1.
-A deprecated usage allows
-.B -r
-to follow
-.I name.
-.TP
-.BI -l " label
-The
-.I label,
-given in the form of
-.I atolab
-(see
-.IR labtoa (3)),
-becomes the file system ceiling described in
-.IR fmount (2).
-.PP
-.I Umount
-announces to the system that the file system mounted on file
-.I name
-is to be removed.
-.PP
-If the
-.B -a
-option is present for
-.I mount
-.RI ( umount ),
-an attempt is made to mount (remove) each file system named in
-.FR /etc/fstab
-(\c
-.FR /etc/mtab ).
-.PP
-These commands
-maintain a table of mounted devices in
-.FR /etc/mtab .
-If invoked without an argument,
-.I mount
-prints the table.
-.PP
-Physically write-protected and magnetic tape file
-systems must be mounted read-only
-or errors will occur when access times are updated,
-whether or not any explicit write is attempted.
-.SH EXAMPLES
-.TP
-.B "/etc/mount /dev/ra02 /usr"
-Mount the file system on disk
-.L /dev/ra02
-on directory
-.LR /usr .
-.TP
-.B "/etc/mount /dev/null /proc 2"
-Mount the process file system.
-.TP
-.B " /etc/mount -l 'nu u ffff...' /dev/ra02 /usr
-File capabilities on
-.IR exec (2)
-are limited to
-.BR T_NOCHK
-and
-.BR T_UAREA ,
-with self-licensing only for
-.BR T_UAREA ;
-all lattice labels are accessible (ceiling is lattice top).
-.SH FILES
-.TF /etc/fstab
-.TP
-.F /etc/mtab
-mount table
-.TP
-.F /etc/fstab
-file system table
-.SH "SEE ALSO"
-.IR fmount (2),
-.IR fstab (5),
-.IR netfs (8)
-.SH BUGS
-Mounting file systems full of garbage will crash the system.
-.br
-Mounting a root directory on a non-directory
-makes some apparently good pathnames invalid.
diff --git a/static/v10/man8/netfs.8 b/static/v10/man8/netfs.8
deleted file mode 100644
index d4b97656..00000000
--- a/static/v10/man8/netfs.8
+++ /dev/null
@@ -1,315 +0,0 @@
-.TH NETFS 8
-.CT 1 sa_nonmortals
-.SH NAME
-netfs \- network file system
-.SH SYNOPSIS
-.nf
-.B /usr/netb/setup.go
-.fi
-.SH DESCRIPTION
-The network file system is conventionally a set of directories
-contained in
-.FR /n ,
-and a set of files and programs in
-.FR /usr/netb .
-Connections in the network file system are asymmetric:
-files on a `server' system are made accessible on a `client' system,
-usually in directory
-.BI /n/ server-name.
-.SS Client
-The client runs
-.FR /usr/netb/setup
-to maintain connections;
-it is started by invoking
-.F /usr/netb/setup.go
-from
-.IR rc (8).
-.I Setup
-uses
-.F /usr/netb/friends
-to control the connections to servers.
-Each line in
-.I friends
-contains six fields:
-.RS
-network address
-.br
-network call argument
-.br
-mount point
-.br
-protocol id
-.br
-unique identifier
-.br
-debugging flag
-.br
-network calling username
-.RE
-.PP
-The network address and argument give the location of the server.
-They are interpreted differently according to the protocol id,
-which should be one of
-.TP
-.B d
-Call the server on the named network address,
-with default network
-.L dk
-and default service name
-.LR fsb .
-The network call argument is ignored.
-The server machine should respond by calling
-.IR zarf ,
-described below;
-see
-.IR svcmgr (8).
-.TP
-.B t
-Call the named network address,
-with default network
-.LR tcp ,
-and invoke the program named in the
-network call argument
-using the protocol of
-.IR rsh ;
-.IR con (1).
-.PP
-.I Setup
-calls
-.IR setlogname
-(see
-.IR getuid (2))
-to make the network call appear to have been placed
-by the calling username.
-The username may be omitted;
-.LR daemon
-is the default.
-.PP
-The mount point is the directory
-on which the remote file system is to appear.
-The unique identifier is a integer in the range 0-255;
-it is used internally to distinguish connections,
-and must be unique among all active remote file systems
-(including those not maintained by
-.IR setup ,
-e.g.
-.IR faced (9.5)).
-The debugging flag is usually 0;
-nonzero numbers
-increase the chatter in various logfiles.
-.PP
-.I Setup
-reads the
-.I friends
-file when it starts,
-and checks for changes once a minute.
-Each remote file system is probed once a minute;
-if there is no response to several consecutive probes,
-the connection is torn down and restarted.
-Failed connections are retried every minute.
-.SS Server
-The server program is
-.FR /usr/netb/zarf .
-A separate
-.I zarf
-process exists for each client.
-.PP
-When a connection is started,
-the client sends the server a list of valid user and group names
-and the corresponding numerical IDs
-on the client system.
-The userid and groupid of user and group names that exist
-on both machines are mapped so that
-client and server see IDs
-under the same names.
-Unmapped IDs on the server appear as \-1 on the client.
-Client processes with unmapped IDs are denied access.
-.PP
-.I Zarf
-is subject to access control on the server.
-It will have access only to files that its own userid
-and groupid admit.
-Unless run as super-user, it will create files with its own,
-not mapped, userid.
-.PP
-.I Zarf
-reads configuration information
-from
-.F /usr/netb/except.local
-and
-.FR /usr/netb/except .
-The
-files are read only once,
-when
-.I zarf
-starts,
-.B except.local
-first.
-Usually
-.B except
-is the same on all machines in some administrative cluster,
-.B except.local
-contains things specific to a particular server system.
-.PP
-The files contain sections
-beginning with the line
-.B client
-.I origin.
-.I Origin
-is the name of the calling client,
-as provided by the network;
-.L *
-matches any client.
-The first matching section is used.
-.PP
-Within each section,
-lines have of one of the following forms.
-Lines beginning with
-.L #
-are ignored.
-.TP
-.BI "uid " cname = sname
-Regardless of the contents of password files,
-map client user name
-.I cname
-to server user name
-.IR sname .
-If
-.I cname
-is not announced as valid by the client,
-the line is ignored.
-If
-.I sname
-is not a valid name on the server,
-any previous mapping for
-.I cname
-is discarded.
-.TP
-.BI "gid " cname = sname
-Map client group name
-.I cname
-to server group name
-.IR sname ,
-as above.
-.TP
-.BI "param otherok=" val
-If
-.I val
-is
-.LR 1 ,
-client processes with unmapped userids
-are granted world access
-to existing files on the server.
-Unmapped userids
-may never create files
-(who would own them?).
-If
-.I val
-is anything else,
-no access is permitted
-to
-unmapped client userids.
-.TP
-.BI "param root=" pathname
-Use
-.I pathname
-rather than
-.B /
-as the root of the filename hierarchy
-made visible on the client.
-.SH EXAMPLES
-A
-.I friends
-file
-for a connection to
-.B alice
-over Datakit,
-.B shamash
-over TCP/IP,
-and
-.B bebop
-over TCP/IP
-without administrative help:
-.RS
-.EX
-.ta \w'tcp!shamash!400 'u +\w'/usr/pjw/netb/zarf 'u +\w'/n/alice 'u +.3i +.3i +.3i
-alice - /n/alice d 0 0
-tcp!shamash!400 - /n/sun d 1 0
-bebop /usr/pjw/netb/zarf /n/bebop t 2 0 pjw
-.EE
-.RE
-.PP
-Some
-.I except
-file rules:
-.RS
-.EX
-client dk!nj/astro/research
-param otherok=1
-client *
-uid root=
-gid mail=other
-param otherok=0
-param root=/usr/spool
-.EE
-.RE
-.PP
-If the
-.I research
-machine calls as a client,
-the whole file system tree is visible,
-all userids including the super-user
-are permitted normal access,
-and user names unknown to the server
-are permitted world access.
-If any other machine calls,
-only the contents of
-.B /usr/spool
-are visible,
-.I root
-and unknown users
-are explicitly denied access,
-and
-processes in group
-.I mail
-on the client
-are treated as if in group
-.I other
-on the server.
-.SH FILES
-.PD 0
-.TF /usr/netb/except.local
-.TP
-.F /n/*
-.TP
-.F /usr/netb/friends
-client connection info
-.TP
-.F /usr/netb/except.local
-.TP
-.F /usr/netb/except
-.TP
-.F /usr/netb/setupl
-log file for
-.I setup
-.TP
-.F /usr/netb/zarf.log
-log file for zarf
-server control info
-.SH SEE ALSO
-S. A. Rago, `A Look at the Version 9 Network File System',
-this manual, Volume\ 2
-.SH BUGS
-The scheme works only in a modest-sized, friendly community, as it
-requires a process per client, trust of clients' security, and common
-login names.
-.br
-File modification times are adjusted for clock-time differences
-between machines.
-Thus, when viewed across the network,
-identical files installed on different machines by
-.IR asd (8)
-may appear to have different modification times, and
-symbol tables of random libraries
-.RI ( ar (1))
-may appear to be out of date.
diff --git a/static/v10/man8/netstat.8 b/static/v10/man8/netstat.8
deleted file mode 100644
index 2cc7257f..00000000
--- a/static/v10/man8/netstat.8
+++ /dev/null
@@ -1,100 +0,0 @@
-.TH NETSTAT 8
-.CT 1 sa_nonmortals
-.SH NAME
-netstat, dkstat \- show network status for internet and datakit networks
-.SH SYNOPSIS
-.B netstat
-[
-.B \-acCirRst
-]
-[
-.I system
-]
-[
-.I core
-]
-.PP
-.B dkstat
-[
-.I interval
-[
-.I count
-]
-]
-.SH DESCRIPTION
-.I Netstat
-displays internet
-(TCP/IP and UDP/IP)
-traffic and configuration
-data.
-Without options,
-it lists all TCP and UDP connection assignments.
-A single option
-changes the listing:
-.TP
-.B -a
-known mappings between internet names and
-Ethernet addresses.
-.TP
-.B -c
-all TCP and UDP connection assignments
-(the default).
-.TP
-.B -C
-detailed state of active TCP connections.
-.TP
-.B -i
-active IP interfaces.
-.TP
-.B -n
-display numeric internet addresses rather than host and
-network names.
-.TP
-.B -s
-protocol statistics.
-.TP
-.B -r
-routing tables.
-.TP
-.B -R
-routing tables,
-including deleted entries
-(for debugging).
-.TP
-.BI -t buf
-running trace of
-packets passing through
-.IR buf :
-.L il
-for the Interlan Ethernet controller,
-.L qe
-for the DEQNA,
-.L tcp
-(the default)
-for all packets passing through TCP.
-.PP
-The arguments
-.I system
-and
-.I core
-are substitutes for the defaults
-.F /unix
-and
-.FR /dev/kmem .
-.PP
-.I Dkstat
-reports the number of bytes received and sent over
-the Datakit network, together with error reports if any occurred.
-The first report is cumulative since a reboot.
-Further reports may be requested every
-.I interval
-seconds; these reports are incremental.
-.PP
-The optional
-.I count
-argument restricts the number of reports.
-.SH DIAGNOSTICS
-.BR "nlist /unix failed" :
-.I netstat
-could not find pertinent system information,
-perhaps because this system isn't set up for TCP/IP.
diff --git a/static/v10/man8/nosh.8 b/static/v10/man8/nosh.8
deleted file mode 100644
index 7447f767..00000000
--- a/static/v10/man8/nosh.8
+++ /dev/null
@@ -1,138 +0,0 @@
-.TH NOSH 8
-.CT 1 shell proc_man dirs files
-.SH NAME
-nosh \- `no-surprise' shell, a sub-standard command interpreter
-.SH SYNOPSIS
-.B /etc/nosh
-[
-.I file
-]
-.PP
-.B priv nosh -gunxlp
-.I file
-.SH DESCRIPTION
-.I Nosh
-executes commands read from its standard input
-or from the named
-.IR file .
-It has few of the advanced features of
-.IR sh (1),
-making it more trustable for use in
-security administration tasks.
-In the second usage,
-.I nosh
-is endowed with one or more of the licenses
-.BR gunxlp ;
-see
-.IR labtoa (3).
-.SS Commands
-A
-command is either
-.I simple
-or
-.I builtin.
-Each command consists of
-a sequence of
-.I words
-separated by white space,
-terminated by a new-line character or end of input.
-Backslash quoting and sharp commenting are honored.
-The first word specifies the name of the command to
-be executed.
-If the command name matches one of the builtins
-listed below it is executed in the shell process.
-If the command name matches no
-builtin command, it is taken to be the
-pathname of an executable file; the name must begin with
-.L /
-or
-.LR . .
-A new process is created and an attempt is made to
-execute the file via
-.IR exec (2)
-with an empty environment.
-.SS Input-Output Redirection
-The standard input is inherited by simple commands.
-Simple
-.B >
-output redirection to named files as in
-.IR sh (1)
-works only for simple commands, and only for file
-descriptors 1 (default) and 2.
-.SS Builtin Commands
-.PP
-.PD 0
-.TP
-.BI cd " dir
-Change the current directory to
-.I dir.
-.TP
-.BI exit " status
-Exit with given status, 0 by default.
-.TP
-.B set +e
-.TP
-.B set -e
-Turn an ignore-error switch on
-.RB ( +e ,
-default) or off
-.RB ( -e ).
-.I Nosh
-normally ignores nonzero exit status from an executed
-command, but exits with that status if
-.B -e
-is set.
-.TP
-.B set +x
-.TP
-.B set -x
-Refrain from echoing
-.RB ( +x ,
-default) or echo
-.RB ( -x )
-each command as it is executed.
-.TP
-.BI lmask " licenses command \fR[\fP arg \fR... ]\fP
-Run a simple command, allowing licenses
-indicated by a nonempty string from the set
-.BR gunxlp-
-to be inherited from
-.I nosh.
-Normally no licenses are inherited.
-.SS Missing features
-Features of
-.IR sh (1)
-that
-.IR nosh
-lacks include:
-background commands, pipelines, compound commands, most builtins,
-multicharacter quotation,
-command substitution, parameter substitution, variables, environments,
-file name generation, redirection of input, signal traps,
-search paths, mail notification,
-.BR .profile ,
-user specification of prompts.
-.SH DIAGNOSTICS
-.I Nosh
-prints nonzero exit or termination status
-of executed commands as octal numbers labeled
-.L e=
-and
-.LR t= ;
-see
-.IR wait (2).
-If invoked with a
-.I file
-argument, it exits unconditionally for nonzero termination
-status or syntax error, and conditionally (under control of
-.LR set )
-for nonzero exit status.
-.PP
-.I Nosh
-exits immediately if
-invoked with more than one argument,
-if invoked with an argument with a relative path name,
-if invoked by a relative path name, or if invoked
-with interrupt or quit signals ignored.
-.SH SEE ALSO
-.IR sh (1)
diff --git a/static/v10/man8/ns.8 b/static/v10/man8/ns.8
deleted file mode 100644
index 620e80e3..00000000
--- a/static/v10/man8/ns.8
+++ /dev/null
@@ -1,153 +0,0 @@
-.TH NS 8
-.CT 1 sa_auto
-.SH NAME
-ns \- name server database
-.SH SYNOPSIS
-.B /usr/ipc/mgrs/ns
-[
-.B -m
-.I server
-] [
-.B -d
-]
-.SH DESCRIPTION
-.I Ns
-maintains a database
-of naming information,
-accessed by
-.IR qns (7)
-and other programs.
-It should be run once from
-.IR rc (8).
-.PP
-The database is accessed
-through local service
-.BR ns ,
-or service
-.I server
-if option
-.B -m
-was specified.
-.PP
-The file
-.F /usr/ipc/lib/ns.db
-contains instructions for building the database.
-These instructions are lines
-of one of the following forms:
-.TP \w'#include\0file\0\0\0\0'u \" wrong fonts; near enough?
-.BI #uusys " file"
-Read the named
-.I uucp
-.B Systems
-.IR file .
-For entries using caller
-.LR ACU ,
-add a database entry containing
-.RS
-.IP
-.I system\0
-.IB telephone-number ,tel\0
-.B uucp,svc
-.PP
-For entries using caller
-.LR DK
-or
-.LR DKH ,
-add an entry containing
-.IP
-.I system\0
-.IB datakit-address ,dk\0
-.B uucp,svc
-.PP
-For any other entry,
-add
-.IP
-.I system\0
-.B uucp,svc
-.RE
-.TP
-.BI #inhost " file"
-For each line in the named
-4BSD-style internet hosts
-.IR file ,
-add a database entry of the form
-.RS
-.IP
-.IB ip-address ,in\0
-.I hostname\0
-.IB host-domain-name ,dom
-.RE
-.TP
-.BI #innet " file"
-For each line in the named
-4BSD-style internet networks
-.IR file ,
-add a database entry of the form
-.RS
-.IP
-.IB ip-net-address ,in\0
-.I netname
-.RE
-.TP
-.BI #include " file"
-Interpret
-the contents of
-.IR file
-in the same format
-as
-.BR ns.db .
-.PP
-In all cases,
-.I file
-may be followed by
-a list of
-.I value,attribute
-pairs to be included with any
-database entries caused by that file.
-If the filename doesn't begin with
-.LR / ,
-it is prefixed with
-.BR /usr/ipc/lib .
-.PP
-Blank lines
-and
-lines beginning with
-.L #
-followed by a space or tab
-are ignored.
-.PP
-Any other lines are taken as literal database entries:
-a collection of
-.I value,attribute
-pairs separated by spaces.
-Each line is a single entry.
-.PP
-The database is ephemeral;
-it is rebuilt whenever
-.I ns
-starts,
-when requested by
-.BR "qns reset" ,
-or when
-.I ns
-notices that
-.B ns.db
-or one of the files named therein
-has changed.
-Rebuilding can take several minutes,
-especially on a busy machine.
-During a rebuild,
-the server appears active but does not answer requests;
-calls will block until the rebuild finishes.
-.PP
-.I Ns
-leaves remarks in file
-.FR /usr/ipc/log/ns .
-There are more remarks if the
-.B -d
-option was used.
-.SH FILES
-.F /usr/ipc/lib/ns.db
-.SH SEE ALSO
-.IR ipc (3),
-.IR qns (7)
diff --git a/static/v10/man8/postbgi.8 b/static/v10/man8/postbgi.8
deleted file mode 100644
index 48e2742f..00000000
--- a/static/v10/man8/postbgi.8
+++ /dev/null
@@ -1,138 +0,0 @@
-.TH POSTBGI 8 local
-.SH NAME
-postbgi \- PostScript translator for BGI (Basic Graphical Instructions) files
-.SH SYNOPSIS
-.B postbgi
-[ options ] [ files ]
-.SH DESCRIPTION
-.I Postbgi
-translates BGI (Basic Graphical Instructions)
-.I files
-into PostScript and writes the results on the
-standard output.
-If no
-.I files
-are specified, or if \- is one of the input
-.I files,
-the standard input is read.
-The following
-.I options
-are understood:
-.TP 1.0i
-.BI \-c num
-Print
-.I num
-copies of each page.
-By default only one copy is printed.
-.TP 1.0i
-.BI \-f name
-Print text using font
-.I name.
-Any PostScript font can be used,
-although the best results will only be
-obtained with constant width fonts.
-The default font is Courier.
-.TP 1.0i
-.BI \-m num
-Magnify each logical page by the factor
-.I num.
-Pages are scaled uniformly about the origin,
-which by default is located at the center of
-each page.
-The default magnification is 1.0.
-.TP 1.0i
-.BI \-n num
-Print
-.I num
-logical pages on each piece of paper,
-where
-.I num
-can be any positive integer.
-By default
-.I num
-is set to 1.
-.TP 1.0i
-.BI \-o list
-Print pages whose numbers are given in the comma-separated
-.IR list .
-The list contains single numbers
-.I N
-and ranges
-.IB N1 \- N2.
-A missing
-.I N1
-means the lowest numbered page, a missing
-.I N2
-means the highest.
-.TP 1.0i
-.BI \-p mode
-Print
-.I files
-in either
-.B portrait
-or
-.B landscape
-.I mode.
-Only the first character of
-.I mode
-is significant.
-The default
-.I mode
-is portrait.
-.TP 1.0i
-.BI \-w num
-Set the line width used for graphics to
-.I num
-points, where a point is approximately 1/72
-of an inch.
-By default
-.I num
-is set to 0.0 points, which forces lines to be
-one pixel wide.
-.TP 1.0i
-.BI \-x num
-Translate the origin
-.I num
-inches along the positive x axis.
-The default
-coordinate system has the origin fixed at the
-center of the page, with positive
-x to the right and positive y up the page.
-Positive
-.I num
-moves everything right.
-The default offset is 0 inches.
-.TP 1.0i
-.BI \-y num
-Translate the origin
-.I num
-inches along the positive y axis.
-Positive
-.I num
-moves everything up the page.
-The default offset is 0 inches.
-.TP 1.0i
-.BI \-A file
-Append a simple accounting record to
-.I file
-after all the input
-.I files
-have been successfully translated.
-By default no accounting data is produced.
-.TP 1.0i
-.BI \-L file
-Use
-.I file
-as the PostScript prologue,
-which by default is /usr/lib/postscript/postbgi.ps.
-.SH DIAGNOSTICS
-0 exit status is returned if
-.I files
-were successfully processed.
-.SH BUGS
-The default line width is too small for 'write to white'
-print engines, like the one used by the PS-2400.
-.SH FILES
-/usr/lib/postscript/postbgi.ps
-.SH SEE ALSO
-dpost(1), postprint(1), posttek(1), postdmd(1)
diff --git a/static/v10/man8/postio.8 b/static/v10/man8/postio.8
deleted file mode 100644
index fdd5721e..00000000
--- a/static/v10/man8/postio.8
+++ /dev/null
@@ -1,205 +0,0 @@
-.TH POSTIO 8
-.CT 1 sa_auto
-.SH NAME
-postio \- serial interface for postscript printers
-.SH SYNOPSIS
-.B /usr/bin/postscript/postio
-[
-.I option ...
-] [
-.I file ...
-]
-.SH DESCRIPTION
-.I Postio
-sends
-.I files
-to a PostScript printer.
-It is usually called by the innards of
-.IR lp (1).
-If no files are named,
-the standard input is sent.
-.PP
-Mandatory argument
-.B -l
-names the printer.
-If
-the first character of
-.I line
-is
-.LR / ,
-it is assumed to be a local filename like
-.LR /dev/tty37 .
-Otherwise it is taken to be a network address,
-with default network
-.LR dk ,
-to which the printer is connected.
-.PP
-These options are probably the most useful:
-.nr xx \w'\fL-b\ \fIspeed\ 'u
-.TP \n(xxu
-.BI \-b speed
-Transmit data
-at baud rate
-.I speed,
-one of 1200, 2400, 4800, 9600 (default), and 19200.
-.TP
-.B \-q
-Disable status queries while
-.I files
-are being sent to the printer.
-When status queries are disabled a dummy message is appended
-to the log file before each block is transmitted.
-.TP
-.BI \-B num
-Set the internal buffer size for reading and writing
-.I files
-to
-.I num
-bytes, 2048 by default.
-.TP
-.B \-D
-Debug mode:
-copy everything read from the printer
-to the log file
-or standard error.
-.TP
-.BI \-L file
-Log data read from the printer in
-.IR file .
-Standard error is the default.
-Normally only messages indicating a change in the printer's state are logged.
-.TP
-.BI \-P string
-Send
-.I string
-to the printer before any input
-.IR files .
-The default
-is PostScript code that disables timeouts.
-.TP
-.BI \-R num
-If
-.I num
-is
-.LR 1 ,
-run as a single process;
-if
-.LR 2 ,
-use separate processes for reading and writing.
-.PP
-These options are not useful to spoolers like
-.IR lp .
-.TP \n(xxu
-.B \-i
-Interactive mode:
-send the
-.I files
-to the printer,
-then copy standard input to the printer
-and printer output to standard error.
-Overrides many other options.
-To have a friendly chat with the printer,
-begin by typing
-.L executive
-on a line by itself.
-.TP
-.B \-t
-Copy printer output that doesn't look like
-status information to the standard output;
-intended for use with PostScript programs that write results.
-.PP
-This option should be used only as a last resort:
-.TP \n(xxu
-.B \-S
-Take special measures to send data slowly.
-Limits the internal buffer to 1024 bytes,
-implies
-.B -R1
-and disables
-.BR -q
-and
-.BR -i .
-Expensive in CPU time.
-.PP
-When
-.I postio
-starts,
-it attempts to force the printer into IDLE state
-by sending a sequence of
-.RB control- t
-(status query),
-.RB control- c
-(interrupt),
-and
-.RB control- d
-(end of job)
-characters.
-When the printer is idle,
-the files are transmitted
-with an occasional
-.RB control- t
-interspersed
-(except under
-.BR -q ).
-After all data have been sent,
-.I postio
-waits until the printer appears to have finished
-before exiting.
-Fatal error messages from the printer
-cause
-.I postio
-to exit prematurely.
-.SH EXAMPLES
-.TP
-.L
-postio -l/dev/tty01 file1 file2
-Runing as a single process at 9600 baud, send file1 and file2
-to printer
-.LR /dev/tty01 .
-.TP
-.L
-postio -R2 -B4096 -l/dev/tty01 -Llog file1 file2
-Similarly,
-but use two processes
-and a 4096-byte buffer,
-and copy printer messages to file
-.BR log .
-.TP
-.L
-postio -t -l/dev/tty22 -Llog program >results
-Send the PostScript
-.L program
-to printer
-.BR /dev/tty22 ,
-place any data in
-.BR results ,
-put error messages in
-.BR log .
-.TP
-.L
-postio -i -l/cs/dk!my/printer
-Connect interactively to the printer at network address
-.BR /cs/dk!my/printer .
-.SH SEE ALSO
-.IR lp (1),
-.IR postscript (8)
-.SH DIAGNOSTICS
-Exit status 1 means a system error
-(e.g. can't open the printer),
-2 means a PostScript error,
-3 means both.
-Status 2 is usually caused by a syntax error in an input file.
-.SH BUGS
-Multiple
-files
-with PostScript end-of-job marks
-are not guaranteed to work.
-.PP
-If a network is involved,
-.B \-b
-may be ineffective and attempts by
-.I postio
-to flow-control data in both directions may not work.
-Option
-.B \-q
-can help if the printer is connected to Radian Datakit.
diff --git a/static/v10/man8/postreverse.8 b/static/v10/man8/postreverse.8
deleted file mode 100644
index 4b16537e..00000000
--- a/static/v10/man8/postreverse.8
+++ /dev/null
@@ -1,97 +0,0 @@
-.TH POSTREVERSE 8 local
-.SH NAME
-postreverse \- reverse the page order in a postscript file
-.SH SYNOPSIS
-.B postreverse
-[ options ] [ file ]
-.SH DESCRIPTION
-.I Postreverse
-reverses the page order in a minimally conforming PostScript
-.I file
-and writes the results on the standard output.
-If no
-.I file
-is specified, the standard input is read.
-The following
-.I options
-are understood:
-.TP 1.0i
-.BI \-o list
-Select pages whose numbers are given in the comma-separated
-.IR list .
-The list contains single numbers
-.I N
-and ranges
-.IB N1 \- N2.
-A missing
-.I N1
-means the lowest numbered page, a missing
-.I N2
-means the highest.
-.TP 1.0i
-.B \-r
-Don't reverse the pages in
-.I file.
-.TP 1.0i
-.BI \-T dir
-Use
-.I dir
-as the temporary file directory when
-reading from the standard input.
-By default
-.I dir
-is set to /tmp.
-.PP
-.I Postreverse
-can handle files the violate page independence,
-provided all global definitions are bracketed by
-\&\f(CW%%BeginGlobal\fP and \&\f(CW%%EndGlobal\fP
-comments.
-In addition files that mark the end of each page
-with \&\f(CW%%EndPage: label ordinal\fP comments
-will also reverse properly, provided the prologue and
-trailer sections can be located.
-If the end of the prologue isn't found, the entire
-.I file
-is copied, unmodified, to the standard output.
-.PP
-Since global definitions are pulled out of individual
-pages and put in the prologue, the output file can be
-minimally conforming, even if the input
-.I file
-wasn't.
-.SH EXAMPLES
-Select pages 1 to 100 from
-.B file
-and reverse the pages,
-.PP
-.RS
-\f(CWpostreverse -o1-100 file\fP
-.RE
-.PP
-Print 4 logical pages on each physical page
-and reverse all the pages,
-.PP
-.RS
-\f(CWpostprint -n4 file | postreverse\fP
-.RE
-.PP
-Produce a minimally conforming file from output
-generated by dpost without reversing the pages,
-.PP
-.RS
-\f(CWdpost file | postreverse -r\fP
-.RE
-.PP
-.SH DIAGNOSTICS
-0 exit status is returned if
-.I file
-was successfully processed.
-.SH BUGS
-No attempt has been made to deal with redefinitions of global
-variables or procedures.
-If standard input is used, the input
-.I file
-will be read three times before being reversed.
-.SH SEE ALSO
-dpost(1), postprint(1), posttek(1), postbgi(1), postdmd(1)
diff --git a/static/v10/man8/postscript.8 b/static/v10/man8/postscript.8
deleted file mode 100644
index 2143c6b2..00000000
--- a/static/v10/man8/postscript.8
+++ /dev/null
@@ -1,283 +0,0 @@
-.TH POSTSCRIPT 8
-.CT 1 sa_auto
-.SH NAME
-dpost, postdaisy, postdmd, postprint \- filters to produce postscript
-.SH SYNOPSIS
-.B /usr/bin/postscript/dpost
-[
-.I option ...
-] [
-.I file ...
-]
-.PP
-.B /usr/bin/postscript/postdaisy
-[
-.I option ...
-] [
-.I file ...
-]
-.PP
-.B /usr/bin/postscript/postdmd
-[
-.I option ...
-] [
-.I file ...
-]
-.PP
-.B /usr/bin/postscript/postprint
-[
-.I option ...
-] [
-.I file ...
-]
-.PP
-.B /usr/bin/postscript/posttek
-[
-.I option ...
-] [
-.I file ...
-]
-.SH DESCRIPTION
-These programs convert files of various formats into
-PostScript.
-The input formats are
-.nr xx \w'\fL-p\ \fImode\ 'u
-.TP \n(xxu
-.I dpost
-.IR troff (1)
-output
-.TP
-.I postdaisy
-Diablo 1640 daisy-wheel
-.TP
-.I postdmd
-.IR bitfile (9.5)
-files, as produced by
-.IR blitblt (9.1)
-.TP
-.I postprint
-.SM
-ASCII
-text
-.TP
-.I posttek
-Tektronix 4014 graphics
-.PP
-Except as noted,
-the options are common to all the programs:
-.TP \n(xxu
-.BI \-c num
-Print
-.I num
-copies of each page.
-By default only one copy is printed.
-.TP
-.BI \-m num
-Magnify each logical page by the factor
-.I num.
-Pages are scaled uniformly about the origin,
-located near the upper left corner of
-the page.
-The default magnification is 1.0.
-.TP
-.BI \-n num
-Print
-.I num
-logical pages on each piece of paper.
-The default is 1.
-.TP
-.BI \-o list
-Print only pages specified in
-the comma-separated
-.I list
-of numbers and ranges.
-A range
-.IB N - M
-means pages
-.I N
-through
-.IR M ;
-an initial
-.BI - N
-means
-from the beginning to page
-.IR N ;
-and a final
-.IB N -
-means
-from
-.I N
-to the end.
-Print only pages whose numbers are given in the comma-separated
-.IR list .
-The list contains single numbers
-.I N
-and ranges
-.IB N1 \- N2.
-A missing
-.I N1
-means the lowest numbered page, a missing
-.I N2
-means the highest.
-.TP
-.BI \-p mode
-Print
-in
-.I mode
-.B p
-(portrait)
-or
-.B l
-(landscape).
-The default is
-.BR p .
-.TP
-.BI \-x num
-Translate the origin
-.I num
-inches along the positive x axis.
-By default,
-the origin is
-fixed near the
-upper left corner of the page, with positive
-x to the right and positive y down the page.
-Positive
-.I num
-moves everything right.
-The default offset is 0 inches.
-.TP
-.BI \-y num
-Translate the origin
-.I num
-inches along the positive y axis.
-Positive
-.I num
-moves text down the page.
-The default offset is 0.
-.TP
-.BI \-A file
-Append a simple accounting record to
-.I file
-after all input
-.I files
-have been successfully translated.
-By default no accounting data is produced.
-.TP
-.BI \-L file
-Use
-.I file
-as the PostScript prologue.
-.TP
-.BI \-f name
-Print
-.I files
-using font
-.I name.
-Any PostScript font can be used,
-but constant width fonts yield the best results.
-The default font is Courier.
-.RI ( postdaisy,
-.IR postprint,
-and
-.IR posttek
-only)
-.TP
-.BI \-f
-Flip the sense of the bits in
-.I files
-before printing the bitmaps.
-.RI ( postdmd
-only)
-.PP
-In addition, three options allow the insertion of arbitrary PostScript
-at controlled points in the translation process:
-.TP \n(xxu
-.BI \-C file
-Copy
-.I file
-to the output file.
-.I File
-follows the prologue but
-precedes any job initialization commands.
-.I File
-becomes part of the job's global environment
-and must contain legitimate PostScript commands.
-.TP
-.BI \-P string
-Like
-.BR -C ,
-using a
-.I string
-instead of the contents of a file.
-.TP
-.BI \-R action
-Requests special
-.I action
-(e.g. manualfeed) on a per page or global basis.
-The
-.I action
-string has the general form
-.IB request : page : file,
-from which
-.BI : page : file
-or
-.B : file
-can be omitted.
-An omitted or 0 page number
-applies to all pages.
-If file is omitted the request
-lookup is done in
-.FR /usr/lib/postscript/ps.requests .
-The collection of recognized requests can be modified or extended
-by changing this file.
-Multiple occurrences of the
-.B \-R
-option behave as expected.
-.SH FILES
-.TF /usr/lib/font/devpost/charlib/*
-.TP
-.F /usr/lib/font/devpost/*.out
-.TP
-.F /usr/lib/font/devpost/charlib/*
-.TP
-.F /usr/lib/postscript/*.ps
-default prologues
-.TP
-.F /usr/lib/tmac/tmac.pictures
-.I troff
-macros for PostScript
-.SH SEE ALSO
-.IR lp (1),
-.IR postio (8)
-.SH DIAGNOSTICS
-Exit status 2
-usually means a syntax error in some input file.
-.SH BUGS
-Output files
-will often violate Adobe's
-file structuring conventions.
-Pipe the output of
-.I dpost
-through
-.I postreverse
-to produce a minimally conforming PostScript file.
-.PP
-Although
-.I dpost
-can handle files formatted for any
-.IR troff
-device, emulation is expensive and
-can easily double the print time and the size of the output file.
-.PP
-No attempt has been made to implement the character sets
-or fonts available on all devices supported by
-.I troff.
-Missing characters are replaced by white space;
-unrecognized fonts are replaced by one of the Times fonts.
-.PP
-.I Dpost
-requires an
-.B x res
-command before the first
-.B x init
-and any file data.
diff --git a/static/v10/man8/privserv.8 b/static/v10/man8/privserv.8
deleted file mode 100644
index 8029ddb4..00000000
--- a/static/v10/man8/privserv.8
+++ /dev/null
@@ -1,60 +0,0 @@
-.TH PRIVSERV 8
-.SH NAME
-privserv \- privilege server
-.SH SYNOPSIS
-.B lmask nuxl /etc/privserv
-[
-.I option ...
-]
-.SH DESCRIPTION
-.I Privserv
-is the keeper and interpreter of the
-.IR privs (5)
-file.
-.I Priv (1)
-calls on
-.I privserv
-to hand out privileges in accordance with the rules given in
-.I privs.
-.I Privserv
-is a permanent process, normally started by the boot script
-.IR rc (8).
-It receives service requests through the mounted pipe
-.FR /cs/priv .
-The options are
-.TP
-.BI -p " name
-The file name of the server,
-.B /etc/privserv
-by default
-(used to reinvoke the priv server when the
-.IR privs (5)
-file is modified by a
-.B PRIVEDIT
-request.)
-.TP
-.BI -m " mountpt
-The file system mount point for privilege service,
-.F /cs/priv
-by default.
-.TP
-.BI -l " logfile
-The file in which to record logging information,
-.F /usr/adm/privlog
-by default.
-.TP
-.BI -f " privs
-The data base of privileges,
-.F /etc/privs
-by default.
-Unless
-.I privs
-is itself a privileged file,
-.I privserv
-will not actually grant the privileges there specified.
-.SH FILES
-.F /etc/privs
-.br
-.F /cs/priv
-.SH SEE ALSO
-.IR priv (1)
diff --git a/static/v10/man8/ps.8 b/static/v10/man8/ps.8
deleted file mode 100644
index fcab9ac7..00000000
--- a/static/v10/man8/ps.8
+++ /dev/null
@@ -1,77 +0,0 @@
-.pa 1
-.he 'PS (VIII)'1/20/73'PS (VIII)'
-.ti 0
-NAME ps -- process status
-.sp
-.ti 0
-SYNOPSIS /usr/adm/ps [ -xlt____ ]
-.sp
-.ti 0
-DESCRIPTION
-.br
-.in 8
-ps__
-prints certain facts about active
-processes.
-The information is columnar and consists of:
-
-.in +3
-The (numerical) ID of the user associated
-with the process;
-
-The last character of the control typewriter of the process
-or "x" if there is no control typewriter;
-"x" lines are suppressed unless the "x" option
-is given.
-
-The number of 512-byte disk blocks holding the core
-image of the process;
-
-The process's unique ID (only with "l" option)
-
-The number of hours (mod 100) and minutes of system, disk, and
-user-process time accumulated by the process and
-all its terminated descendants (only with "t" option)
-
-An educated guess as to the command line which caused the
-process to be created.
-
-.in -3
-Some caveats:
-
-The guess as to the command name and arguments is obtained by examining
-the process's stack.
-The process is entitled to destroy this information.
-Also, only processes whose core images are on disk have
-visible names.
-The ps__ command in particular
-does not, nor does any other process which happens to
-be in core at the same time.
-ps__ tries to overcome this limitation by spawning
-a subprocess designed to take up the other core
-slot, and is usually successful.
-Because ps__ examines a dynamically changing data structure,
-it can produce incorrect results, for example if
-a process's core image moves between the time
-ps__ gets its disk address and reads its stack.
-
-Besides its utility for simple spying,
-ps__ is the only plausible
-way to find the process number of someone you are trying
-to kill (VIII).
-.sp
-.in 16
-.ti 0
-FILES /dev/rf0,
-/sys/sys/unix (to get magic numbers).
-.sp
-.ti 0
-SEE ALSO kill (VIII)
-.sp
-.ti 0
-DIAGNOSTICS "Bad RF", if
-a bad swap address turns up;
-various missing-file diagnostics.
-.sp
-.ti 0
-BUGS As described.
diff --git a/static/v10/man8/pstat.8 b/static/v10/man8/pstat.8
deleted file mode 100644
index 61942bbf..00000000
--- a/static/v10/man8/pstat.8
+++ /dev/null
@@ -1,418 +0,0 @@
-.TH PSTAT 8
-.CT 1 sa_mortals
-.SH NAME
-pstat \- print system facts
-.SH SYNOPSIS
-.B /etc/pstat
-[
-.B \-afipstuxT
-]
-[
-.I suboptions
-]
-[
-.I file
-]
-[
-.I namelist
-]
-.SH DESCRIPTION
-.I Pstat
-interprets the contents of certain system tables.
-If
-.I file
-is given, the tables are sought there, otherwise
-in
-.FR /dev/kmem .
-The required namelist is taken from
-.IR namelist ,
-default
-.FR /unix .
-Options are
-.TP
-.B -a
-Under
-.BR -p ,
-describe all process slots rather than just active ones.
-.TP
-.B -i
-Print the inode table with the these headings:
-.RS
-.PD 0
-.TF SIGNAL
-.TP
-.B LOC
-The core location of this table entry.
-.TP
-.B FLAGS
-Miscellaneous state variables encoded thus:
-.RS
-.TP
-.B L
-locked
-.TP
-.B U
-modified time
-.RI ( filsys (5))
-must be corrected
-.TP
-.B A
-access time must be corrected
-.TP
-.B O
-file was opened
-.TP
-.B W
-wanted by another process
-.RB ( L
-flag is on)
-.TP
-.B T
-contains an active text
-.RE
-.TP
-.B CNT
-Number of active references to this inode.
-.TP
-.B FS
-File system type, see
-.IR fmount (2).
-.TP
-.B DEVICE
-Device number of file system in which
-this inode resides.
-.TP
-.B INO
-I-number within the file system.
-.TP
-.B MODE
-Mode, see
-.IR stat (2).
-.TP
-.B NLN
-Number of links to this inode.
-.TP
-.B UID
-Userid of owner.
-.TP
-.B SPTR
-Core location of corresponding stream header,
-0 if this is not a stream.
-.TP
-.B SIZ/DEV
-Number of bytes in an ordinary file, or
-device number of a special file.
-.TP
-.B MROOT
-Core location of root inode
-of file system mounted here,
-0 if none.
-.PD
-.RE
-.TP 0
-.B -x
-Print the text table with these headings:
-.PD 0
-.RS
-.TF SIGNAL
-.TP
-.B LOC
-The core location of this table entry.
-.TP
-.B FLAGS
-Miscellaneous state variables encoded thus:
-.RS
-.TP
-.B P
-resulted from demand-page-from-inode exec format, see
-.IR exec (2)
-.TP
-.B T
-traced through
-.IR proc (4)
-.TP
-.B W
-text not yet written to swap device
-.TP
-.B L
-loading in progress
-.TP
-.B K
-locked
-.TP
-.B w
-wanted
-.RB ( L
-flag is on)
-.RE
-.TP
-.B DADDR
-Disk address in swap, in multiples of 512 bytes.
-.TP
-.B CADDR
-Head of a linked list of loaded processes using this text segment.
-.TP
-.B RSS
-Size of physical memory occupied
-by text segment,
-in multiples of 512 bytes.
-.TP
-.B SIZE
-Size of text segment, in multiples of 512 bytes.
-.TP
-.B IPTR
-Core location of corresponding inode.
-.TP
-.B CNT
-Number of processes using this text segment.
-.TP
-.B CCNT
-Number of processes in core using this text segment.
-.PD
-.RE
-.TP 0
-.B -p
-Print process table for active processes with these headings:
-.RS
-.TP
-.B LOC
-The core location of this table entry.
-.PD 0
-.TF SIGNAL
-.TP
-.B S
-Run state encoded thus:
-.RS
-.TP
-.B 0
-no process
-.TP
-.B 1
-waiting for some event
-.TP
-.B 3
-runnable
-.TP
-.B 4
-being created
-.TP
-.B 5
-being terminated
-.TP
-.B 6
-stopped under trace
-.RE
-.TP
-.B F
-Miscellaneous state variables, or-ed together (hexadecimal):
-.RS
-.TF SIGNAL
-.TP
-.B 0000001
-loaded in memory
-.TP
-.B 0000002
-special system process (swapper or pager)
-.TP
-.B 0000004
-being swapped out
-.TP
-.B 0000008
-obscure swapout flag
-.TP
-.B 0000010
-traced
-.TP
-.B 0000020
-used in tracing
-.TP
-.B 0000040
-locked in core
-.TP
-.B 0000080
-waiting for pagein
-.TP
-.B 0000100
-prevented from swapping during
-.IR fork (2)
-.TP
-.B 0000200
-gathering pages for raw i/o
-.TP
-.B 0000400
-exiting
-.TP
-.B 0008000
-associated text is demand paged from file
-.TP
-.B 0030000
-anomalous paging behaviour expected,
-see
-.IR vlimit
-in
-.IR deprecated (2)
-.TP
-.B 0040000
-in a sleep which will time out
-.TP
-.B 0400000
-in
-.IR select (2)
-.TP
-.B 0800000
-traced via
-.IR proc (4)
-.TP
-.B 1000000
-i/o via
-.IR proc
-in progress
-.TP
-.B 2000000
-stop on exec
-.TP
-.B 4000000
-wanted by
-.I proc
-after pagein
-.RE
-.TF SIGNAL
-.TP
-.B ADDR
-The core location of the page table entry for the first page of the `u-area.'
-.TP
-.B PRI
-Scheduling priority;
-smaller numbers run first.
-.TP
-.B SIG
-Signals received; signals 1-32 coded in bits 0-31.
-.TP
-.B UID
-Real userid.
-.TP
-.B SLP
-Time blocked in seconds;
-times over 127 coded as 127.
-.TP
-.B TIM
-Time resident in seconds;
-times over 127 coded as 127.
-.TP
-.B CPU
-Weighted integral of CPU time, for scheduler.
-.TP
-.B NI
-Nice level,
-see
-.IR nice (2).
-.TP
-.B PGRP
-Process group number.
-.TP
-.B PID
-Process ID number.
-.TP
-.B PPID
-Process ID of parent process.
-.TP
-.B RSS
-Number of physical page frames allocated
-to this process.
-.TP
-.B SRSS
-RSS at last swap, 0 if never swapped.
-.TP
-.B SIZE
-Virtual size of process image (data+stack) in multiples of 512 bytes.
-.TP
-.B WCHAN
-Event address if waiting.
-.TP
-.B LINK
-Pointer to next entry in list of runnable processes.
-.TP
-.B TEXTP
-If text is pure, pointer to location of text table entry.
-.TP
-.B CLKT
-Countdown for
-.IR alarm (2)
-measured in seconds.
-.PD
-.RE
-.TP 0
-.B -u
-Print information about a user process;
-the next argument is its address as given
-by
-.L ADDR
-under
-.B -p
-above.
-The process must be in main memory, or the file used can
-be a core image
-.RI ( core (5))
-and the address 0.
-.TP
-.B -f
-Print the open file table with these headings:
-.PD0
-.RS
-.TF SIGNAL
-.TP
-.B LOC
-The core location of this table entry.
-.PD 0
-.TP
-.B FLG
-Miscellaneous state variables encoded thus:
-.RS
-.TP
-.B R
-open for reading
-.TP
-.B W
-open for writing
-.RE
-.TP
-.B CNT
-Number of processes that know this open file.
-.TP
-.B INO
-The core location of the inode table entry for this file.
-.TP
-.B OFFS
-The file offset, see
-.IR lseek (2).
-.PD
-.RE
-.TP 0
-.B -s
-Print information about swap space usage:
-the number of 1024 byte pages used
-and free,
-and the number of pages belonging
-to text images.
-.TP
-.B -T
-Print the number of used and free slots in several system tables;
-useful to see if they are nearly full.
-.SH FILES
-.TF /dev/kmem
-.TP
-.F /unix
-namelist
-.TP
-.F /dev/kmem
-default source of tables
-.SH SEE ALSO
-.IR ps (1),
-.IR stat (2),
-.IR filsys (5)
-.br
-M. J. Bach,
-.IR "The Design of the UNIX Operating System" ,
-Prentice-Hall, 1986
-.SH BUGS
-This program is never up to date.
diff --git a/static/v10/man8/pwserv.8 b/static/v10/man8/pwserv.8
deleted file mode 100644
index bb7fb90e..00000000
--- a/static/v10/man8/pwserv.8
+++ /dev/null
@@ -1,77 +0,0 @@
-.TH PWSERV 8
-.CT 1 sa_auto
-.SH NAME
-pwserv \- password verification service
-.SH SYNOPSIS
-.B /etc/pwserv
-.SH DESCRIPTION
-.I Pwserv,
-normally started from
-.IR rc (8),
-handles password verification requests initiated by (say)
-.IR pwquery (3)
-through the conventional
-process mount point
-.FR /cs/pw .
-When a request is made a file descriptor (called the `line' below)
-is passed to
-.I pwserv
-together with a user name and an optional parameter string.
-Normally,
-.I pwserv
-writes a prompt on the line, reads a reply, and returns
-an indication of success to the invoking client.
-Valid passwords are taken from the file
-.FR /etc/pwfile ,
-which lists for each user an ordinary (encrypted,
-.IR crypt (3)-style)
-password and an
-SNK (Secure Net Key) challenge-response key.
-Before prompting, an
-.B FIOPX
-IO control is attempted to render the line to the end user private;
-see
-.IR pex (4).
-If this succeeds
-either a classical or an Atalla password is accepted.
-If the pex bid fails, the prompt warns that the line
-is not private, and only an SNK response is accepted.
-.PP
-In the pexed case the prompt looks like
-.B Password(pjw:31416):
-and in the unpexed case like
-.B "Password(TAPPED LINE:01492):
-The five digit string after the colon is the Atalla challenge string.
-Only the first five digits of the Atalla response string are significant.
-Hex digits in the response must be typed in lower case.
-.PP
-Possible values of the optional parameter string are
-.TP
-.B pex
-(specified by opening the server with
-.B ipcopen("/cs/pw!pex") )
-Accept passwords only if the
-.B FIOPX
-succeeds.
-.PP
-When the line's stream identifier asserts previous confirmation
-of the same password,
-.I pwserv
-answers affirmatively without demanding a password; see
-.IR session (1)
-and
-.IR src (5).
-.SH FILES
-.nf
-.F /etc/pwserv
-.F /etc/pwfile
-.fi
-.SH "SEE ALSO"
-.IR pwquery (3),
-.IR ipc (3),
-.IR pex (4),
-.IR stream (4),
-.IR pwfile (5),
-.IR passwd (1)
-.SH BUGS
-Jammable.
diff --git a/static/v10/man8/quot.8 b/static/v10/man8/quot.8
deleted file mode 100644
index dca6bbad..00000000
--- a/static/v10/man8/quot.8
+++ /dev/null
@@ -1,135 +0,0 @@
-.TH QUOT 8
-.CT 1 sa_mortals
-.SH NAME
-quot, findo \- file system usage and hogs
-.SH SYNOPSIS
-.B /etc/quot
-[
-.I option ...
-]
-[
-.I filesystem
-]
-.PP
-.BI findo
-[
-.B -f
-]
-[
-.B -n
-]
-[
-.B -u
-.I userid
-]
-.I device mount-directory
-.SH DESCRIPTION
-.I Quot
-prints the number of blocks in the named
-.I filesystem
-device currently owned by each user.
-If no
-.I filesystem
-is named,
-.F /dev/usr
-is assumed.
-The options are:
-.TP
-.B -n
-Use as in the example below to list all files and owners.
-.TP
-.B -c
-Print three columns giving file size in blocks, number of
-files of that size, and cumulative total of blocks
-in files of that size or smaller.
-.TP
-.B -f
-Print count of number of files as well as space owned by each user.
-.TP
-.B -b
-Print space-time product in block-years in addition to space owned by
-each user.
-.PP
-.I Findo
-discovers files you might want to delete on the
-given block
-.I device,
-which must be mounted on the given directory.
-It lists, on the standard output, the
-sizes, ages in days, and names of files
-with any of the following characteristics:
-.IP -
-.IR Troff (1)
-output files older than 24 hours.
-The names are marked
-.L troff:
-in the output.
-.IP -
-Week-old files named
-.BR core ,
-.BR a.out ,
-.BR mon.out ,
-.BR .pilog ,
-.BR junk* ,
-.BR temp* ,
-.BR ed.hup ,
-.BR qed.hup:* ,
-.BR jim.recover ,
-.BR sam.save ,
-.BR sam.err ,
-.BR ~~sam~~ ,
-.BR [a-z] ,
-.BR dead.letter ,
-.BR foo[0-9]* ,
-.BR rst[0-9]+ ,
-.BR .jx* ,
-.BR *.dvi ,
-and files whose names
-resemble
-.IR apnews (7)
-spool entries.
-.IP -
-Files over a month old named
-.BR *.o .
-The names are marked
-.LR old: .
-.IP -
-Files owned by users selected with option
-.BR -u ;
-the names are marked
-.LR user: .
-.PP
-The options are
-.TP
-.B -f
-List files owned by users not in the password file.
-.TP
-.BI -u " userid
-List files over 2 days old owned by the user with the given numeric
-.I userid.
-.TP
-.B -n
-List files of any age owned by the specified users.
-.SH EXAMPLES
-.TP
-.L
-ncheck filesystem | sort -n | quot -n filesystem
-List all files and their owners.
-.SH FILES
-.F /etc/passwd
-to get user names
-.SH "SEE ALSO"
-.IR ls (1),
-.IR du (1),
-.IR icheck (8),
-.IR fstab (5)
-.SH BUGS
-.I Quot
-counts holes in files as if they actually occupied space.
-.br
-Patterns specifying the names and ages are compiled into
-.I findo.
-.br
-.I Findo's
-age distinction for files owned by a specific user is a
-historical dreg.
diff --git a/static/v10/man8/rarepl.8 b/static/v10/man8/rarepl.8
deleted file mode 100644
index 5d9fabef..00000000
--- a/static/v10/man8/rarepl.8
+++ /dev/null
@@ -1,115 +0,0 @@
-.TH RAREPL 8
-.CT 1 sa_nonmortals
-.SH NAME
-rarepl, rarct \- replace bad blocks on MSCP disks
-.SH SYNOPSIS
-.B /etc/rarct
-[
-.B -c
-]
-[
-.B -h
-]
-.I special ...
-.PP
-.B /etc/rarepl
-.I special
-.I lbn ...
-.SH DESCRIPTION
-.I Rarct
-prints status information
-about MSCP disk drives
-like the RA60 and RA81.
-Normally the replacement table (RCT)
-is listed,
-as lines of the form
-.IP
-.IB rbn : \0flags : \0lbn
-.PP
-where
-.I rbn
-is the replacement block number,
-.I lbn
-is the logical block number
-replaced by
-.IR rbn ,
-and
-.I flags
-are constructed from the following bits:
-.TP
-.PD 0
-.B 01
-alternate (not primary) replacement block
-.TP
-.B 02
-normal, allocated replacement block
-.TP
-.B 04
-this replacement block is bad
-.TP
-.B 010
-this replacement block does not exist
-.PD
-.PP
-Entries whose
-.I flags
-are zero,
-indicating a good,
-unused replacement block,
-are not listed.
-.PP
-The options suppress the RCT listing and perform other functions:
-.TP
-.B -h
-Print some header data
-from the first block of the RCT.
-The system does not use this information.
-.TP
-.B -c
-Print geometry information for the drive.
-.PP
-.I Rarepl
-causes logical block
-.I lbn
-on device
-.I dev
-to be marked as bad
-and replaced.
-The nearest available replacement block
-is used.
-The contents of
-.I lbn
-are copied into the replacement block if possible;
-if
-.I lbn
-is unreadable,
-the replacement block
-is initialized with zeros.
-.PP
-Both programs
-work only
-on the raw devices.
-.I Rarepl
-should be used only
-on a device
-which covers the entire drive
-(usually partition 7).
-.SH SEE ALSO
-.IR ra (4),
-.IR smash (8)
-.SH BUGS
-There are various controller- and drive-dependent anomalies.
-Some controllers,
-like the RQDX3,
-report an RCT
-but don't allow forwarding.
-On many controllers,
-the RCT exists
-only so programs in the host can look at it;
-the controller ignores its contents.
-There is no way to read the controller's `real' forwarding data,
-only a way to set it for a particular block.
-Hence if the RCT is corrupted,
-the disk may still be used,
-but must be reformatted
-before additional bad blocks are remapped.
diff --git a/static/v10/man8/rc.8 b/static/v10/man8/rc.8
deleted file mode 100644
index f46cff12..00000000
--- a/static/v10/man8/rc.8
+++ /dev/null
@@ -1,77 +0,0 @@
-.TH RC 8
-.CT 1 sa_auto
-.SH NAME
-rc \- boot script
-.SH SYNOPSIS
-.B /etc/rc
-.SH DESCRIPTION
-.I Rc
-is the command script
-invoked by
-.IR init (8)
-to control reboots.
-During an automatic reboot,
-.I rc
-is invoked with the argument
-.BR autoboot ;
-typically this invokes
-.L /etc/fsck -p
-to repair minor filesystem inconsistencies.
-If
-.I rc
-exits with a successful status,
-.I init
-proceeds to multi-user mode.
-.PP
-When the system enters multi-user mode,
-either during an auto-reboot
-or after the single-user shell terminates,
-.I rc
-is invoked without arguments.
-This usually causes it to
-mount filesystems,
-start daemons,
-clear
-.FR /tmp ,
-and perform other housekeeping.
-.PP
-If any call to
-.I rc
-returns a nonzero status,
-.I init
-reverts to single-user mode.
-.SH EXAMPLES
-A typical
-.I rc
-script:
-.PP
-.EX
-date
-case $1 in
-autoboot)
- echo Autoboot:
- /etc/fsck -p || {echo "error in reboot"; exit 1}
-esac
-/etc/ldpcs /etc/pcs750.bin
->/etc/mtab
-/etc/mount -a
-/etc/savecore /tmp/dump /dev/ra11
-/etc/swapon -a
-trap "" 1 2 3
-/etc/update
-/etc/cron &
-rm -f /tmp/*
-/usr/lib/asd/rmlocks
-date >> /usr/adm/lastboot
-/etc/accton /tmp/acct > /tmp/acct
-/usr/ipc/mgrs/svcmgr
-/etc/kdiload
-/usr/ipc/mgrs/dkhup; sleep 10
-/usr/ipc/mgrs/dkmgr
-/usr/netb/setup.go
-/usr/net/face.go
-wwv -s
-.EE
-.SH SEE ALSO
-.IR init (8),
-.IR reboot (8)
diff --git a/static/v10/man8/reboot.8 b/static/v10/man8/reboot.8
deleted file mode 100644
index 50e1c453..00000000
--- a/static/v10/man8/reboot.8
+++ /dev/null
@@ -1,127 +0,0 @@
-.TH REBOOT 8
-.CT 1 sa_auto
-.SH NAME
-reboot \- bootstrapping procedures
-.SH DESCRIPTION
-.PP
-Here are some recipes for booting and crashing the operating system
-on VAXes.
-.SS Rebooting a running system
-The preferred way to reboot is to log in on the console as super-user,
-invoke
-.B kill 1
-to take the system to single user,
-unmount file systems with
-.B /etc/umount -a
-and halt and restart the system
-as described below under `Console boots.'
-.SS Power fail and crash recovery
-The system will reboot itself at power-up or after crashes if
-auto-boot is enabled on the machine front panel
-or in the console software.
-If auto-restart is enabled,
-the system will first attempt to save a copy of physical memory
-on a reserved piece of disk.
-An automatic consistency check of the file systems is performed.
-Unless this fails the system will resume multi-user operations.
-.SS Console boots
-Sync the disks if necessary and possible.
-To recover hardware control of the console, type a
-.RB control- P .
-This will yield a
-.L >>>
-prompt from the VAX
-console subsystem (sic).
-The command
-.IP
-.B >>> H
-.LP
-will halt the CPU
-(except on the 11/750,
-where
-.RB control- P
-halts the CPU right away).
-.PP
-On MicroVAXes,
-.RB control- P
-doesn't work;
-hit the
-.SM BREAK
-key instead.
-.PP
-To boot multi-user with an automatic file system check,
-give the console command
-.IP
-.B >>> B
-.LP
-Commands to boot single-user vary.
-On the VAX-11/750 and on MicroVAXes,
-use
-.IP
-.B >>> B/3
-.LP
-On the VAX-11/780 and VAX 8550 and 8700,
-use
-.IP
-.B >>> B MAN
-.LP
-This will prompt with
-.LR *
-for the name of the file to boot.
-The filename should be an executable image
-in the root directory
-of the filesystem at the beginning of the disk.
-.SS System core images
-If the system crashes
-and auto-restart is enabled,
-a copy of physical memory is written
-to a reserved piece of disk.
-To save a core image of a hung system, type on the console (after
-.RB control- P
-if necessary):
-.IP
-.EX
->>> S 80000010
-.EE
-.PP
-The system will write the core image,
-then reboot automatically.
-.PP
-If the core image was written on
-.LR /dev/ra11 ,
-the following incantation will print a stack traceback
-from the time of the crash:
-.IP
-.EX
-adb /unix /dev/ra11
-$<crash
-$c
-.EE
-.PP
-To save disk space,
-the core image is sometimes overlaid on part of the swap area,
-where normal system operation will soon overwrite it.
-.IR Savecore (8)
-will copy the core image
-to an ordinary disk file.
-.SH FILES
-.TP
-.F /unix
-default system binary
-.SH "SEE ALSO"
-.IR fsck (8),
-.IR init (8),
-.IR rc (8),
-.IR savecore (8)
-.SH BUGS
-Older boot programs with different syntax are still around in a few places,
-especially on machines with Emulex UNIBUS disk controllers,
-for which silly boot ROMs are common.
-.PP
-There are commands
-.B /etc/reboot
-and
-.B /etc/halt
-which attempt to reboot and halt the system;
-their function is indeterminate
-and likely to change.
diff --git a/static/v10/man8/recnews.8 b/static/v10/man8/recnews.8
deleted file mode 100644
index 59a707ef..00000000
--- a/static/v10/man8/recnews.8
+++ /dev/null
@@ -1,24 +0,0 @@
-.TH RECNEWS 8
-.SH NAME
-recnews \- receive unprocessed articles via mail
-.SH SYNOPSIS
-.BR /usr/lib/news/recnews " [ "
-.IR newsgroup " [ " sender " ] ] "
-.SH DESCRIPTION
-.I Recnews
-reads a letter from the standard input; determines the article title,
-sender, and newsgroup; and gives the body to inews with the right
-arguments for insertion.
-.PP
-If
-.I newsgroup
-is omitted, the to line of the letter will be used. If
-.I sender
-is omitted, the sender will be determined from the from line of the letter.
-The title is determined from the subject line.
-.SH SEE ALSO
-inews(1),
-uurec(8),
-sendnews(8),
-readnews(1),
-checknews(1)
diff --git a/static/v10/man8/reloc.8 b/static/v10/man8/reloc.8
deleted file mode 100644
index a34054c6..00000000
--- a/static/v10/man8/reloc.8
+++ /dev/null
@@ -1,45 +0,0 @@
-.th RELOC VIII 2/7/73
-.sh NAME
-reloc \*- relocate object files
-.sh SYNOPSIS
-.bd reloc
-file octal [
-.bd \*-
-]
-.sh DESCRIPTION
-.it Reloc
-modifies the named object program file so that it will operate correctly
-at a different core origin than the one for which
-it was assembled or loaded.
-.s3
-The new core origin is the old origin
-increased by
-the given
-.it octal
-number (or decreased if the number has a `\*-' sign).
-.s3
-If the object file was generated by
-.it ld,
-the
-.bd \*-r
-and
-.bd \*-d
-options must have been given to
-preserve the relocation information and define any common symbols
-in the file.
-.s3
-If the optional last argument is given, then any
-.it setd
-instruction at the start of the file
-will be replaced by a no-op.
-.s3
-The purpose of this command is to simplify the
-preparation of object programs for systems
-which have no relocation hardware.
-It is hard to imagine a situation
-in which it would be useful to attempt directly to execute
-a program treated by
-.it reloc.
-.sh "SEE ALSO"
-as(I), ld(I), a.out(V)
-.sh BUGS
diff --git a/static/v10/man8/renice.8 b/static/v10/man8/renice.8
deleted file mode 100644
index 0f08f491..00000000
--- a/static/v10/man8/renice.8
+++ /dev/null
@@ -1,31 +0,0 @@
-.TH RENICE 8
-.CT 1 sa_nonmortals
-.SH NAME
-renice \- change priority of running process
-.SH SYNOPSIS
-.B /etc/renice
-[
-.BI - priority
-]
-.I pid ...
-.SH DESCRIPTION
-.I Renice
-increments the scheduling priority
-of the processes with the named
-.I process-ids
-by
-.IR pri .
-The default
-.IR pri
-is 19,
-making the process least likely to run.
-.PP
-Only the owner of the process
-or the super-user may change the priority.
-Only the super-user may use negative increments.
-.SH FILES
-.BI /proc
-.SH SEE ALSO
-.IR nice (1),
-.IR nice (2),
-.IR proc (4)
diff --git a/static/v10/man8/restor.8 b/static/v10/man8/restor.8
deleted file mode 100644
index 359164a1..00000000
--- a/static/v10/man8/restor.8
+++ /dev/null
@@ -1,112 +0,0 @@
-.th RESTOR VIII 11/24/73
-.sh NAME
-restor \*- incremental file system restore
-.sh SYNOPSIS
-.bd restor
-key [ arguments ]
-.sh DESCRIPTION
-.it Restor
-is used to read magtapes dumped with the
-.it dump
-command.
-The
-.it key
-argument specifies what is to be done.
-.it Key
-is a character from the set
-.bd trxw.
-.s3
-.lp +5 3
-\fBt\fR The date that the tape was made and the date that
-was specified in the
-.it dump
-command are printed.
-A list of all of the i-numbers on the tape
-are also given.
-.s3
-.lp +5 3
-\fBr\fR The tape
-is read and loaded into the file system
-specified in
-.it arguments.
-This should not be done lightly (see below).
-.s3
-.lp +5 3
-\fBx\fR Each file on the
-tape is individually extracted into
-a file whose name is the file's i-number.
-If
-there are
-.it arguments,
-they are interpreted as i-numbers and only they are
-extracted.
-.s3
-.lp +5 3
-\fBw\fR In conjunction with the
-.bd x
-option,
-before each file is extracted,
-its i-number is typed out.
-To extract this file,
-you must respond with
-.bd y.
-.s3
-.i0
-The
-.bd r
-option should only be used to restore
-a complete dump tape onto a clear file system
-or to restore an incremental dump tape onto this.
-Thus
-.s3
- /etc/mkfs /dev/rp0 40600
-.br
- restor r /dev/rp0
-.s3
-is a typical sequence to restore a complete dump.
-Another
-.it restor
-can be done to get an incremental dump
-in on top of this.
-.s3
-A
-.it dump
-followed by a
-.it mkfs
-and a
-.it restor
-is used to
-change the size of a file system.
-.sh FILES
-/dev/mt0
-.sh "SEE ALSO"
-dump, mkfs, check, clri (VIII)
-.sh DIAGNOSTICS
-There are various diagnostics
-involved with reading the tape and writing the disk.
-There are also diagnostics if the i-list or the free list
-of the file system is not large enough to hold the dump.
-.sh BUGS
-There is redundant information on the tape
-that could be used in case of tape reading problems.
-Unfortunately,
-.it restor's
-approach is to exit if anything is wrong.
-.s3
-Files that have been deleted are
-not removed when incremental tapes are loaded.
-It will be necessary to
-.it check
-the restored file system and
-.it clri
-any files that show up with
-a 201 delta diagnostic.
-.s3
-The current version of
-.it restor
-does not free space occupied
-by files that are overwritten.
-Thus a
-.it check
-will have to be performed to reclain the missing
-space.
diff --git a/static/v10/man8/route.8 b/static/v10/man8/route.8
deleted file mode 100644
index 1f99f156..00000000
--- a/static/v10/man8/route.8
+++ /dev/null
@@ -1,95 +0,0 @@
-.TH ROUTE 8
-.CT 1 sa_auto
-.SH NAME
-route, routed, remroutes \- IP gateway routing
-.SH SYNOPSIS
-.B /usr/ipc/mgrs/routed
-[
-.B -v
-] [
-.B -t
-] [
-.B -q
-] [
-.BI - hops
-] [
-.I addr ...
-]
-.br
-.B route add
-.I "dest gateway"
-.br
-.B route delete
-.I "dest"
-.B
-.br
-.B /etc/remroutes
-.br
-.SH DESCRIPTION
-.I Routed
-runs the 4BSD RIP routing protocol on an IP network.
-It broadcasts routing information to the network at large,
-listens for routing messages from elsewhere,
-and informs the system of the routes it receives.
-.PP
-The options are
-.TP
-.BI \-v
-Log transmitted messages on the standard output.
-.TP
-.BI \-t
-Log received messages on the standard output.
-.TP
-.BI \-q
-Accept routing information but do not broadcast any.
-.TP
-.BI \- hops
-Add
-.I hops
-(a decimal number)
-to the hop count
-when broadcasting routes.
-.PD
-.LP
-Information received for any named
-.I addrs
-is ignored.
-.PP
-.I Routed
-is usually run without options on gateway machines,
-and with the
-.B -q
-option on non-gateway machines.
-.PP
-.I Route
-sets up specific routes,
-to establish static routing
-or to adjust that set up by
-.IR routed .
-The
-.B add
-command informs the system that
-internet address
-.I dest
-may be reached through
-internet address
-.IR gateway ;
-.B delete
-removes any routing for
-.IR dest .
-The special
-destination
-.L *
-represents the default routing:
-.B route add *
-.I gate
-sets the default,
-.B route delete *
-removes any default.
-.PP
-.I Remroutes
-removes all known routes.
-.SH FILES
-.F /usr/ipc/log/routed
-.SH "SEE ALSO"
-.IR ipconfig (8)
diff --git a/static/v10/man8/sa.8 b/static/v10/man8/sa.8
deleted file mode 100644
index 45c77ec9..00000000
--- a/static/v10/man8/sa.8
+++ /dev/null
@@ -1,185 +0,0 @@
-.TH SA 8
-.CT 1 sa_nonmortals
-.SH NAME
-sa, accton \- system accounting
-.SH SYNOPSIS
-.B /etc/sa
-[
-.B -abcdDfgijkKlnrstuv
-]
-[
-.B -e prefix
-]
-[
-.I file
-]
-.PP
-.B /etc/accton
-[
-.I file
-]
-.SH DESCRIPTION
-With an argument naming an existing
-.I file,
-.I accton
-causes system accounting information for
-every process executed to be placed at the end of the file.
-If no argument is given, accounting is turned off.
-.PP
-.I Sa
-reports on, cleans up, and generally maintains
-accounting files.
-.PP
-.I Sa
-is able to condense
-the information in
-.F /usr/adm/acct
-into a summary file
-.F /usr/adm/savacct
-which contains a count of the
-number of times each command was called and the time resources
-consumed.
-This condensation is desirable because on a large system
-.F /usr/adm/acct
-can grow by 10000 blocks per day.
-The summary file is normally read before the accounting file,
-so the reports include all available information.
-.PP
-If a file name is given as the last argument,
-that file will be treated
-as the accounting file;
-.F /usr/adm/acct
-is the default.
-.PP
-Output fields are labeled:
-.L cpu
-for the sum of user and system times
-(in minutes),
-.L re
-for real time (also in minutes),
-.L k
-for cpu-time averaged core usage (in 1K units),
-.L avio
-for average number of IO operations per execution.
-With options fields labelled
-.L tio
-for total IO operations,
-.L k*sec
-for cpu storage integral (kilo-core seconds),
-.L u
-and
-.L s
-for user and system cpu time alone (both in minutes) will sometimes
-appear.
-.PP
-There are zillions of options:
-.TP
-.B a
-Place all command names containing unprintable characters
-and those used only once under the name
-.LR ***other .
-.TP
-.B b
-Sort output by sum of user and system time divided by number of
-calls.
-Default sort is by sum of user and system times.
-.TP
-.B c
-Besides total user, system, and real time for each command print percentage
-of total time over all commands.
-.TP
-.B d
-Sort by average number of disk IO operations.
-.TP
-.B D
-Sort by total number of disk IO operations.
-.TP
-.B e
-Set the prefix for accounting file names to the next argument
-.RB ( /usr/adm/
-is the default).
-.TP
-.B f
-Assume answer
-.L y
-for option
-.BR -v .
-.TP
-.B g
-Ignore
-.BR /usr/adm/acct .
-Useful for processing only
-.L savacct
-and
-.LR usracct .
-.TP
-.B i
-Don't read in summary file.
-.TP
-.B j
-Instead of total minutes time for each category,
-give seconds per call.
-.TP
-.B k
-Sort by cpu-time average memory usage.
-.TP
-.B K
-Print and sort by cpu-storage integral.
-.TP
-.B l
-Separate system and user time; normally they are combined.
-.TP
-.B m
-(money) Print number of processes and number of CPU minutes for each user.
-.TP
-.B n
-Sort by number of calls.
-.TP
-.B r
-Reverse order of sort.
-.TP
-.B s
-Merge accounting file into summary file
-.F /usr/adm/savacct
-when done.
-.TP
-.B t
-For each command report ratio of real time to the sum of user and
-system times.
-.TP
-.B u
-Superseding all other flags,
-print for each command in the accounting file the
-userid and command name.
-.TP
-.B v
-Followed by a number
-.I n,
-types the name of
-each command used
-.I n
-times or fewer.
-Await a reply from the terminal;
-if it begins with
-.LR y ,
-add the command to
-the category
-.LR **junk** .
-This is used to strip out garbage.
-.SH FILES
-.TF /usr/adm/usracct
-.TP
-.F /usr/adm/acct
-raw accounting
-.TP
-.F /usr/adm/savacct
-summary
-.TP
-.F /usr/adm/usracct
-per-user summary
-.SH "SEE ALSO"
-.IR ac (8),
-.IR acct (2)
-.SH BUGS
-.I Sa
-needs more options.
diff --git a/static/v10/man8/salv.8 b/static/v10/man8/salv.8
deleted file mode 100644
index cf9d808f..00000000
--- a/static/v10/man8/salv.8
+++ /dev/null
@@ -1,86 +0,0 @@
-.pa 1
-.he 'SALV (VIII)'1/20/73'SALV (VIII)'
-.ti 0
-NAME salv -- file system salvage
-.sp
-.ti 0
-SYNOPSIS /etc/salv_________ filesystem [ -akfs_____ ]
-.sp
-.ti 0
-DESCRIPTION
-.br
-.in 8
-salv____
-will place a given file system
-in a consistent state with
-almost no loss of information.
-This is the first step in putting things
-together after a bad crash.
-Salv performs the following functions:
-.sp
-.in +3
-A valid free list is constructed.
-
-.in -3
-The previous step is always performed; the following steps
-are performed only if the "a" option is given.
-If the file system's only defect is missing blocks,
-"a" should not be specified.
-.in +3
-.sp
-All bad pointers in the file system are zeroed.
-.sp
-All duplicate pointers to the same block
-are resolved by changing one of the pointers
-to point at a new block containing a copy of the data.
-.sp
-Inodes (not directory entries) for special files
-are generated (mode 16).
-
-Files whose size is too large for the number of
-blocks they contain (after bad pointers are zeroed)
-have their size revised downward.
-
-.in -3
-The file system should be unmounted while it is
-being salvaged.
-In cases of extreme need the permanently mounted
-file system may be salvaged; in such a case
-the system must be rebooted before it
-has a chance to write out the old, bad super-block.
-
-The "k", "f", and "s" options
-tell salv what magic numbers to use to generate
-the size of the free list and the i-node map.
-"k" is default (RK disk); "f" is RF; "s" is RK with
-swap space on it.
-If salv is to be used away
-from the mother system its code should be cheked
-to verify the numbers.
-.sp
-After a salv, files may be safely created
-and removed without causing
-more trouble.
-If the "a" option had to be used,
-a dcheck (VIII) should be done to find the degree
-of the damage to the hierarchy.
-.sp
-.in 16
-.ti 0
-FILES /dev/rk0
-.sp
-.ti 0
-SEE ALSO check(I), ds(I)
-.sp
-.ti 0
-DIAGNOSTICS --
-.sp
-.ti 0
-BUGS In
-only one (known) way does salv____ destroy information:
-if some random block appears to be an indirect block
-for a file,
-all "bad pointers" (for example, ASCII text) in it
-will be zeroed. If
-the block also appears in another file, it may be
-scribbled on before it is copied.
diff --git a/static/v10/man8/savecore.8 b/static/v10/man8/savecore.8
deleted file mode 100644
index 37ace4af..00000000
--- a/static/v10/man8/savecore.8
+++ /dev/null
@@ -1,83 +0,0 @@
-.TH SAVECORE 8
-.CT 1 sa_auto
-.SH NAME
-savecore \- save a core image of the operating system
-.SH SYNOPSIS
-.B /etc/savecore
-.I target
-.I dump
-.SH DESCRIPTION
-.I Savecore
-copies the core image
-saved after an operating system crash
-to an ordinary file.
-This is worth doing
-so that the crash image will not be overwritten
-immediately by another crash,
-or sometimes because the crash image was written
-in a place where normal system operation will overwrite it
-(e.g. in the swap area).
-.PP
-The crash image is taken from
-.I dump
-and written to
-.IR target .
-If
-.I target
-exists and is a directory,
-the image is copied to
-a file in that directory
-with the first nonexistent name
-in the sequence
-.BR "z.0 z.1 z.2 ..." ;
-otherwise
-.I target
-is created or overwritten.
-.PP
-The crash image to be copied
-is checked for a magic number
-in a known location.
-If the magic number is correct,
-it is followed by the size of the image,
-and the time it was written;
-these numbers are printed
-before the dump is copied.
-If the magic number is wrong,
-the image is not copied.
-.I Savecore
-overwrites the magic number in
-.I dump
-after a successful copy.
-.PP
-The program runs faster
-if
-.I dump
-is the raw device.
-.PP
-For compatibility with an older program of the same name,
-the
-.I dump
-argument may be omitted;
-.I savecore
-will noisily examine each device specified for swapping in
-.IR fstab (5)
-and each of several popular default swap devices
-for a valid magic number.
-The first device that looks right
-is taken to be the crash image.
-.PP
-.I Savecore
-is usually called when the system is booted,
-from
-.IR rc (8).
-.SH EXAMPLE
-.EX
-/etc/savecore /tmp/dump /dev/rra11
-.EE
-.SH SEE ALSO
-.IR reboot (8)
-.SH BUGS
-The argument convention
-(the file to be written comes first)
-is unfortunate;
-it stems from compatibility.
diff --git a/static/v10/man8/scsish.8 b/static/v10/man8/scsish.8
deleted file mode 100644
index b1c9b08a..00000000
--- a/static/v10/man8/scsish.8
+++ /dev/null
@@ -1,222 +0,0 @@
-.TH SCSISH 8
-.CT 1 sa_nonmortals
-.SH NAME
-scsish \- SCSI shell
-.SH SYNOPSIS
-.B /usr/lib/worm/scsish
-.SH DESCRIPTION
-.I Scsish
-is a command interpreter for SCSI commands executed through
-.B /dev/scsi
-(see
-.IR scsi (4)).
-Many commands are applicable to more or less all SCSI devices;
-some are specific to the SONY WDA-3000-10 optical disk jukebox.
-Any details not found here are in the manual for the jukebox.
-.PP
-Typically commands are sent to a particular drive
-(a number between 0 and 7 inclusive)
-on a particular device
-(normally a number between 0 and 5 inclusive).
-Most commands take a drive parameter (a number).
-The device number is set by the
-.B id
-command.
-.PP
-Occasionally, commands fail and will print the result of a
-.B sense
-command which is normally needed to clear the error status.
-.PP
-All input is in lower case and keywords and numbers are separated by white space.
-Commands are separated by a newline or semicolon.
-.SS "General SCSI Commands"
-.TF "disk eject drive"
-.TP
-.BI capacity " drive"
-Report the capacity of
-.I drive
-as
-.BR "nblocks x blocksize" .
-.TP
-.BI "disk eject" " drive"
-Eject the disk
-(or other removable medium)
-from
-.IR drive .
-.TP
-.BI echo " number"
-Print
-.I number
-on standard output.
-.TP
-.B help
-Print a summary of the available commands.
-.TP
-.BI id " n"
-Set the destination SCSI bus device number.
-By default, it is 2 which is the normal device number for the SONY jukebox.
-.TP
-.BI inquiry " drive"
-Print various bits of status about
-.IR drive .
-For example,
-.IP
-.EX
-drive 2,0: WORM device, ' SONY WDA-3000-10 2.D'
- disk,write protect,,,ready (0x9)
-.EE
-.IP
-If
-.I drive
-is omitted, an inquiry is performed for drives 0 through 7.
-.TP
-.BI read " drive block"
-Print the contents of the 1024 byte block at
-.I block
-on
-.I drive
-in hexadecimal.
-.TP
-.BI "read id" " drive"
-Print the string starting at byte 42 in block 1 on
-.IR drive .
-This corresponds to the initial
-.I vol_id
-for
-.IR worm (8)
-disks.
-.TP
-.B reset
-Attempt to reset the SCSI interface.
-.TP
-.BI sense " drive"
-Print the sense data for
-.IR drive .
-Some of the interpretations of the sense bytes are idiosyncratic to SONY.
-.TP
-.BI "ext sense" " drive"
-Print the extended sense data for
-.IR drive .
-Most of the interpretations of the extended sense bytes are idiosyncratic to SONY.
-.TP
-.BI sleep " n"
-Sleep for
-.I n
-seconds.
-.TP
-.BI start " drive"
-Start
-.I drive
-spinning.
-.TP
-.BI stop " drive"
-Stop
-.IR drive .
-.TP
-.BI test " drive"
-Test unit ready for
-.IR drive .
-.PD
-.SS "SONY Commands"
-.TP
-.BI alternate " drive"
-Print the replacement block tables from the disk.
-.TP
-.BI media " drive blkno nblks"
-Print a summary of the media quality in
-.I drive
-for the
-.I nblks
-blocks starting at block number
-.IR blkno .
-For example, a dirty disk can yield
-.IP
-.EX
-drive 0: media check for 1000 blocks [0-999], upper drive
-849 good, 1 unwritten, 147 <50% burst, 3 >96% burst,
-.EE
-.IP
-Please report any instances of messages including
-.B "rare error"
-to the jukebox guru.
-.PD
-.TP
-.BI "ext media" " drive blkno nblks"
-A verbose form of the
-.B media
-command.
-.PD
-.SS "Jukebox Commands"
-.TP
-.B config
-Print the configuration data for the jukebox.
-.TP
-.BI "rel" " drive shelf side"
-Release the disk from
-.I drive
-to
-.IR shelf .
-The value of
-.I side
-indicates whether it should be inverted on the way
-.RB ( b )
-or not
-.RB ( a ).
-If
-.I shelf
-and
-.I side
-are absent,
-the disk is restored to its former shelf.
-.PD0
-.TP
-.BI "set" " shelf side drive"
-Put the disk from
-.I shelf
-into
-.IR drive .
-The value of
-.I side
-indicates whether it should be inverted on the way
-.RB ( b )
-or not
-.RB ( a ).
-.TP
-.BI internal " n"
-Execute various internal reports and diagnostics.
-.B "internal -1"
-with no argument will print a list of available diagnostics.
-.TP
-.BI "status" " drive"
-Print the status for
-.IR drive .
-An absent
-.I drive
-is taken as 0.
-As the status is for the jukebox as a whole,
-the value of
-.I drive
-doesn't matter.
-A sample status output shows the jukebox hides the mapping
-of logical drive number and actual drive:
-.IP
-.EX
-drive 0: ready,disk in LUN,power on,disk in drive 0, return shelf 2
-drive 1: not ready,no disk in LUN,power on,disk in shelf 0
-drive 2: not ready,no disk in LUN,power on,disk in shelf 0
-drive 3: ready,disk in LUN,power on,disk in drive 1, return shelf 0
-drive 4: not ready,no disk in LUN,power on,disk in shelf 0
-drive 5: not ready,no disk in LUN,power on,disk in shelf 0
-drive 6: not ready,no disk in LUN,power on,disk in shelf 0
-drive 7: not ready,no disk in LUN,power on,disk in shelf 0
-0: no disk
-1: no disk
-2: disk,
-I/O shelf: no disk
-carrier: disk shelf=0
-upper drive: disk, LUN=0
-lower drive: disk, LUN=3
-.EE
-.SH "SEE ALSO"
-.IR worm (8),
-.IR scsi (4)
diff --git a/static/v10/man8/sendcover.8 b/static/v10/man8/sendcover.8
deleted file mode 100644
index 04be2b38..00000000
--- a/static/v10/man8/sendcover.8
+++ /dev/null
@@ -1,28 +0,0 @@
-.TH SENDCOVER 8
-.CT 1 writing_output
-.SH NAME
-sendcover \- send cover sheet to the library
-.SH SYNOPSIS
-.B sendcover
-.I file ...
-.SH DESCRIPTION
-.I Sendcover
-sends a document cover sheet to the
-Bell Laboratories library for their document database.
-It is invoked automatically as a byproduct of
-running
-.I troff -mcs.
-.PP
-The cover sheet is translated from the form of
-.IR mcs (6)
-to a form used in the library
-and certain other protocol information is added.
-The destination is not the same as that of
-.IR docsubmit (1).
-.SH FILES
-.F /usr/lib/tmac/tmac.cs
-.br
-.F /usr/lib/tmac/cstrans
-.SH "SEE ALSO"
-.IR docsubmit (1),
-.IR mcs (6)
diff --git a/static/v10/man8/sendnews.8 b/static/v10/man8/sendnews.8
deleted file mode 100644
index 6aba6dee..00000000
--- a/static/v10/man8/sendnews.8
+++ /dev/null
@@ -1,60 +0,0 @@
-.TH SENDNEWS 8
-.SH NAME
-sendnews \- send news articles via mail
-.SH SYNOPSIS
-sendnews
-[
-.B \-o
-]
-[
-.B \-a
-]
-[
-.B \-b
-]
-[
-.B \-n
-newsgroups
-]
-destination
-.SH DESCRIPTION
-.I sendnews
-reads an article from it's standard input, performs a set of changes
-to it, and gives it to the mail program to mail it to
-.I destination.
-.PP
-An `N' is prepended to each line for decoding by
-.I uurec(1).
-.PP
-The
-.B \-o
-flag handles old format articles.
-.PP
-The
-.B \-a
-flag is used for sending articles via the
-.B ARPANET.
-It maps the article's path from
-.I uucphost!xxx
-to
-.I xxx@arpahost.
-.PP
-The
-.B \-b
-flag is used for sending articles via the
-.B Berknet.
-It maps the article's path from
-.I uucphost!xxx
-to
-.I berkhost:xxx.
-.PP
-The
-.B \-n
-flag changes the article's newsgroup to the specified
-.I newsgroup.
-.SH SEE ALSO
-inews(1),
-uurec(8),
-recnews(8),
-readnews(1),
-checknews(1)
diff --git a/static/v10/man8/ship.8 b/static/v10/man8/ship.8
deleted file mode 100644
index 2901d1c9..00000000
--- a/static/v10/man8/ship.8
+++ /dev/null
@@ -1,118 +0,0 @@
-.TH SHIP 8
-.CT 1 comm_mach sa_nonmortals
-.SH NAME
-ship, shipstat \(mi automatic software distribution
-.SH SYNOPSIS
-.B ship
-[
-.I option ...
-]
-[
-.I file ...
-]
-.PP
-.B shipstat
-.SH DESCRIPTION
-.I Ship
-distributes the named files to other computers, where
-the files are installed under the same names.
-Shipping privileges are determined
-by the network manager on the receiving machine;
-see
-.IR svcmgr (8).
-.PP
-Destinations are taken from environment variable
-.BR dest ,
-or from
-.F /usr/lib/asd/dest/default
-if
-.B dest
-is empty.
-If a destination is the name of a file in
-.FR /usr/lib/asd/dest ,
-it is replaced by the contents of that file,
-each word of which is then examined in the same way.
-Otherwise the destination is a network address.
-The sending machine is omitted unless explicitly named in
-the environment variable,
-or unless option
-.B -f
-is present or environment variable
-.B force
-has a non-empty value.
-.PP
-.I Ship
-uses
-.I inspkg
-and
-.IR mkpkg (8)
-to do its work.
-Links among the named files are imitated
-on the receiving computer, and
-named files that do not exist on the sending
-computer are deleted on the receiving computer.
-Other options are the same as those of
-.IR mkpkg :
-.PP
-.TP \w'\-X file 'u
-.B -v
-Emit running commentary on the standard error file.
-.TP
-.BI -D path1 = path2
-Pretend that any
-.I file
-name that begins with
-.I path1
-really begins with
-.IR path2 .
-Relative pathnames are extended to full pathnames before comparison.
-.TP
-.BI -x command
-.br
-.ns
-.TP
-.BI -X file
-Include in the package instructions to execute the shell
-.I command
-or run the shell script
-.I file
-after all files have been installed.
-Only one of these options may occur.
-The
-.I file
-name in
-.BR -X
-is affected by
-.BR -D .
-.PP
-Shipments are generally acknowledged by mail after each destination
-has been tried at least once;
-see
-.IR asd (8)
-for details.
-.PP
-.I Shipstat
-reports the status of all its caller's
-incomplete shipments,
-with the most recent first.
-.SH FILES
-.TF/usr/lib/asd/dest/default
-.TP
-.F /usr/lib/asd/dest/*
-distribution lists
-.TP
-.F
-/usr/lib/asd/dest/default
-default distribution list
-.TP
-.BI /usr/spool/asd/ logname
-outgoing spool directories
-.SH SEE ALSO
-.IR mkpkg (8),
-.IR asd (8),
-.IR svcmgr (8)
-.SH BUGS
-The
-.B -f
-option, if given, must be the first option and
-must not be combined with any other.
diff --git a/static/v10/man8/showq.8 b/static/v10/man8/showq.8
deleted file mode 100644
index cf46ea27..00000000
--- a/static/v10/man8/showq.8
+++ /dev/null
@@ -1,56 +0,0 @@
-.TH SHOWQ 8
-.CT 1 sa_nonmortals
-.SH NAME
-showq \- status of stream input/output system
-.SH SYNOPSIS
-.B /etc/showq
-[
-.B "-v -V -s -m
-]
-[
-.I system
-]
-[
-.I mem
-]
-.SH DESCRIPTION
-.I Showq
-reports connectivity and contents of I/O streams.
-By default, it lists the maximum number of stream blocks
-(of various sizes) ever used, then each stream and the queue modules
-in each stream, and then blocks that are unaccounted for (not on any
-queue or the free list).
-.PP
-By default, the system namelist is
-.B /unix
-and the place the streams are kept is
-.BR /dev/mem .
-.PP
-The options are:
-.TP
-.B -v
-Verbose.
-Show more, in particular the contents of data and control blocks on each queue.
-.TP
-.B -V
-Very verbose.
-Show all blocks on every queue instead of giving up after a while.
-.TP
-.B -s
-Silent.
-Examine queues for consistency, printing only a summary.
-.TP
-.B -m
-Missing.
-Show the contents of missing blocks.
-(Perhaps this will give a clue about who lost them.)
-.SH FILES
-.F /unix
-.br
-.F /dev/mem
-.SH SEE ALSO
-.IR stream (4),
-.IR netstat (8)
-.br
-.IR mesgld (4)
-for a list of message types
diff --git a/static/v10/man8/shutdown.8 b/static/v10/man8/shutdown.8
deleted file mode 100644
index bfee17cb..00000000
--- a/static/v10/man8/shutdown.8
+++ /dev/null
@@ -1,9 +0,0 @@
-
-.TH SHUTDOWN 8
-.UC 4
-.SH NAME
-shutdown \- take system down gracefully
-.SH DESCRIPTION
-To be supplied.
-.SH "SEE ALSO"
-reboot(8)
diff --git a/static/v10/man8/smash.8 b/static/v10/man8/smash.8
deleted file mode 100644
index 5f076ad7..00000000
--- a/static/v10/man8/smash.8
+++ /dev/null
@@ -1,43 +0,0 @@
-.TH SMASH 8
-.CT 1 sa_nonmortals
-.SH NAME
-smash \- rewrite bad disk sectors
-.SH SYNOPSIS
-.B /etc/smash
-.I device sector
-.SH DESCRIPTION
-.I Smash
-attempts to read the named (decimal, 512-byte)
-.I sector
-from the named
-.IR device ,
-and prints the error status from the read
-and the data read,
-in octal,
-regardless of the error status.
-It then prompts
-.LR write? ,
-to which there are three answers:
-.TP
-.B y
-Write the data back to the sector.
-.TP
-.B c
-Write zeros to the sector.
-.TP
-anything else
-Quit.
-.PP
-After the sector is written,
-it is read again
-and the cycle repeats.
-.PP
-Writing the sector,
-even if its contents could be correctly read,
-will recompute the error correcting code.
-This may make soft ECC errors vanish,
-and will recover what can be recovered
-(sometimes not much)
-from hard ECC errors.
-.SH SEE ALSO
-.IR rarepl (8)
diff --git a/static/v10/man8/smstat.8 b/static/v10/man8/smstat.8
deleted file mode 100644
index b4cce1ab..00000000
--- a/static/v10/man8/smstat.8
+++ /dev/null
@@ -1,24 +0,0 @@
-.TH SMSTAT 8
-.CT 1 comm_mach
-.SH NAME
-smstat \- list smtp queues
-.SH SYNOPSIS
-.B smstat
-.SH DESCRIPTION
-.I Smstat
-prints a summary of pending mail messages
-queued by
-the programs in
-.IR smtp (8).
-Each line contains the name of a spooling directory;
-the number of outbound messages,
-followed by
-.LR C ;
-and the number of inbound messages,
-followed by
-.LR X .
-.SH FILES
-.F /usr/spool/smtpq/*
-spool directories
-.SH SEE ALSO
-.IR smtp (8)
diff --git a/static/v10/man8/smtp.8 b/static/v10/man8/smtp.8
deleted file mode 100644
index b6c6315d..00000000
--- a/static/v10/man8/smtp.8
+++ /dev/null
@@ -1,200 +0,0 @@
-.TH SMTP 8
-.CT 1 sa_auto
-.SH NAME
-smtp, smtpqer, smtpd, smtpsched \- handle simple mail transfer protocol
-.SH SYNOPSIS
-.B /usr/lib/upas/smtp
-[
-.I option ...
-]
-.I replyaddr
-.I dest
-.I recipient ...
-.PP
-.B /usr/lib/upas/smtpqer
-[
-.I option ...
-]
-.I replyaddr
-.I dest
-.I recipient ...
-.PP
-.B /usr/lib/upas/smtpd
-[
-.B -n
-] [
-.B -H
-.I host
-]
-.PP
-.B /usr/lib/upas/smtpsched
-[
-option ...
-] [
-.I queue ...
-]
-.SH DESCRIPTION
-.I Smtp
-reads a mail message from the standard input,
-and sends it with the Internet SMTP protocol
-to the named
-.I recipients
-at
-network address
-.IR dest .
-.I Dest
-has default network
-.B tcp
-and default
-service
-.B tcp.25
-(the conventional Internet SMTP port).
-Error reports are mailed to local address
-.IR replyaddr .
-.PP
-.I Smtp
-operates in two modes, `Internet' (default) and `Unix'.
-In Internet mode
-.I recipient
-addresses should be in full domain form.
-.L From:
-and
-.L Date:
-headers will be inserted as necessary
-to conform to Internet standards.
-In Unix mode
-addresses and message contents
-are not touched.
-The options are
-.TP
-.B -u
-Run in Unix mode.
-.TP
-.BI -H " host"
-Use
-.I host
-as the name of the sending system (taken from
-.IR whoami (5)
-by default).
-.TP
-.BI -d " domain
-Append the specified domain suffix to
-incomplete addresses.
-.PP
-.I Smtpqer
-reads a mail message from the standard input
-and stashes it away
-to be sent later
-by
-.IR smtpsched .
-By default,
-.I smtpsched
-is started immediately;
-option
-.B -n
-prevents this.
-Other options and arguments are the same as for
-.IR smtp .
-.PP
-.I Smtpd
-receives a message by
-speaking the server part of SMTP
-on the standard input and output.
-The message is stashed in a queue for later delivery
-as by
-.IR smtpqer .
-Option
-.B -n
-prevents
-.I smtpsched
-from running immediately;
-option
-.B -H
-is as for
-.I smtp.
-.PP
-.I Smtpsched
-processes the queues assembled by
-.I smtpqer
-and
-.IR smtpd ,
-calling
-.IR mail (1)
-for local messages and
-.I smtp
-for others.
-It should be run occasionally from
-.IR cron (8).
-.PP
-The
-.I queue
-arguments name particular queue directories to be processed;
-if no queue is named,
-all queues are processed.
-The options are
-.TF "-s\0nproc"
-.TP
-.BI -w " days"
-Send a warning about each message more than
-.I days
-old to the reply address.
-.TP
-.BI -r " days"
-Mail an error reply about each message more than
-.I days
-old,
-and discard the message.
-.TP
-.BI -s " nproc"
-Do not run more than
-.I nproc
-simultaneous copies of
-.I smtpsched
-started with this option.
-.TP
-.B -c
-Remove empty directories and inconsistent files.
-.TP
-.B -t
-Log actions without performing them.
-.TP
-.B -C
-Process `C' command files
-.RI ( smtp
-calls) only.
-.TP
-.B -X
-Process `X' command files
-.RI ( rmail
-calls) only.
-.TP
-.B -v
-Enable verbose logging.
-.PD
-.PP
-The queues are kept in subdirectories of
-.FR /usr/spool/smtpq ,
-named by splitting the lower case remote system name
-into components separated by
-periods,
-concatenating the last two or fewer components,
-taking the last 14 characters,
-and stripping leading periods.
-.SH FILES
-.TF /usr/spool/smtpq/smtpqsched.log
-.TP
-.B /usr/spool/smtpq
-spooling directory
-.TP
-.B /usr/spool/smtpq/smtpqsched.log
-logging
-.TP
-.B /usr/spool/smtpq/.consumers
-list of process IDs running
-.I smptqsched -s
-.SH SEE ALSO
-.IR mail (1),
-.IR upas (8),
-.IR smstat (8)
-.br
-DARPA standards RFC 822, RFC 976
diff --git a/static/v10/man8/sticky.8 b/static/v10/man8/sticky.8
deleted file mode 100644
index e9d9e1a5..00000000
--- a/static/v10/man8/sticky.8
+++ /dev/null
@@ -1,44 +0,0 @@
-.TH STICKY 8
-.UC 4
-.SH NAME
-sticky \- executable files with persistent text
-.SH DESCRIPTION
-While the `sticky bit', mode 01000 (see
-.IR chmod (2)),
-is set on a sharable executable file,
-the text of that file will not be removed from the system swap area.
-Thus the file does not have to be fetched from the file system
-upon each execution.
-As long as a copy remains in the swap area, the
-original text cannot be overwritten in the file system,
-nor can the file be deleted.
-(Directory entries can be removed so long as one link remains.)
-.PP
-Sharable files are made by the
-.B \-n
-and
-.B \-z
-options of
-.IR ld (1).
-.PP
-To replace a sticky file that has been used do:
-(1) Clear the sticky bit with
-.IR chmod (1).
-(2) Execute the old program to flush the swapped copy.
-This can be done safely even if others are using it.
-(3) Overwrite the sticky file.
-If the file is being executed by any process,
-writing will be prevented; it suffices to simply remove the file
-and then rewrite it, being careful to reset the owner and mode with
-.I chmod
-and
-.IR chown (2).
-(4) Set the sticky bit again.
-.PP
-Only the super-user can set the sticky bit.
-.SH BUGS
-Are self-evident.
-.PP
-Is largely unnecessary on the VAX; matters only for large programs that
-will page heavily to start, since text pages are normally cached incore
-as long as possible after all instances of a text image exit.
diff --git a/static/v10/man8/su.8 b/static/v10/man8/su.8
deleted file mode 100644
index 99721bb9..00000000
--- a/static/v10/man8/su.8
+++ /dev/null
@@ -1,34 +0,0 @@
-.pa 1
-.he 'SU (VIII)'1/20/73'SU (VIII)'
-.ti 0
-NAME su -- become privileged user
-.sp
-.ti 0
-SYNOPSIS su__
-.sp
-.ti 0
-DESCRIPTION su
-allows one to become the super-user, who has
-all sorts of marvelous (and correspondingly dangerous) powers.
-In order for su to do its magic, the user must
-supply a password.
-If the password is correct, su
-will execute the shell with the UID set to
-that of the super-user.
-To restore normal UID privileges,
-type an end-of-file to the super-user shell.
-
-To remind the super-user of his responsibilities,
-the shell substitutes "#" for its usual prompt "%".
-.sp
-.ti 0
-FILES --
-.sp
-.ti 0
-SEE ALSO sh(I)
-.sp
-.ti 0
-DIAGNOSTICS "Sorry" if password is wrong
-.sp
-.ti 0
-BUGS --
diff --git a/static/v10/man8/svcmgr.8 b/static/v10/man8/svcmgr.8
deleted file mode 100644
index 2b9ab3a8..00000000
--- a/static/v10/man8/svcmgr.8
+++ /dev/null
@@ -1,331 +0,0 @@
-.TH SVCMGR 8
-.CT 1 sa_auto
-.SH NAME
-svcmgr \- service remote computing requests
-.SH SYNOPSIS
-.B /usr/ipc/mgrs/svcmgr
-[
-.B -d
-]
-.SH DESCRIPTION
-.I Svcmgr
-performes services
-such as login and command execution,
-often in response to requests from network listeners
-like
-.IR dkmgr
-and
-.IR tcpmgr (8).
-It should be run once from
-.IR rc (8).
-.PP
-.I Svcmgr
-is controlled by several files in directory
-.FR /usr/ipc/lib :
-services are defined in files
-.B serv
-and
-.BR serv.local ,
-authorization in
-.B auth
-and
-.BR auth.local .
-The
-.B .local
-files are searched first.
-The idea is that
-.B serv
-and
-.B auth
-will be the same throughout an administrative cluster of machines,
-and anything peculiar to specific systems
-will be kept in
-.B serv.local
-and
-.BR auth.local .
-.PP
-Each service is announced
-as a name in directory
-.F /cs
-using the routines in
-.IR ipc (3).
-When a connection is requested to one of these services,
-.I svcmgr
-receives a file descriptor
-connected to the requester.
-A new process is created
-to perform the actions listed for that service
-in the
-.I serv
-files,
-usually resulting in a
-.IR login (8)
-with standard input, output, and error files
-attached to the connection.
-Often
-there are flags to
-.I login
-specifying a local user name
-or a command to be executed.
-Environment variable
-.SM CSOURCE
-is set to a string
-of the form
-.IP
-.BI source= remote-machine
-.BI user= ruser
-.BI line= lineinfo
-.PP
-.I Remote-machine
-and
-.I ruser
-are supplied in the connection message;
-.I lineinfo
-network-dependent stuff
-of varying interest and meaning.
-If a particular command was specified
-(the
-.B cmd
-or
-.B exec
-action),
-.I login
-sets
-environment variable
-.SM REXEC
-to
-.LR 1 .
-.PP
-The
-.I auth
-files are used to translate remote user names to local ones.
-They contain lines with four fields:
-.RS
-service name
-.br
-calling system name
-.br
-calling user name
-.br
-local user name
-.RE
-.LP
-The service, calling system, and calling user names
-are regular expressions
-in the style of
-.IR regexp (3).
-The calling system and calling user fields may be omitted;
-.L .*
-is assumed.
-The local user name
-is a literal name,
-.L &
-to repeat the calling user name provided in the request,
-or
-.L :
-to explicitly reject a call.
-If the local user name is omitted,
-.L &
-is assumed.
-.PP
-Several service actions `look up the connection in the
-.I auth
-files.'\0
-This means to
-find the first line in
-.B auth.local
-or
-.B auth
-for which the service,
-calling system,
-and calling user
-match the patterns,
-and return the local user name in that line
-(the same as the calling user if
-.LR & ).
-If no matching line is found,
-or if the first match has local user name
-.LR : ,
-the lookup fails.
-.PP
-The
-.I serv
-files contain lines with three fields:
-.RS
-service name
-.br
-a list of actions,
-separated by
-.L +
-.br
-the calling system name
-.RE
-.PP
-The calling system name is a regular expression as in
-the
-.I auth
-file.
-The line matching an incoming call is the first whose service
-matches the requested service and whose regular expression
-matches the calling machine.
-.PP
-The possible actions are:
-.de XP
-.TP
-.ie '\\$2'' .L "\\$1"
-.el .L "\\$1(\f2\\$2\fP)"
-..
-.TF password
-.PD
-.XP user x
-Use local username
-.IR x .
-.XP auth
-Look up the connection
-in the
-.I auth
-files.
-If a match is found,
-use the resulting local user.
-Otherwise reject the call.
-.XP v9auth
-Look up the connection
-in the
-.I auth
-files;
-if a match is found,
-send
-.L OK
-to the caller,
-and use the result.
-If there is no match, send
-.LR NO ,
-and read a string of the form `login,passwd\\n'.
-If the login and password
-describe a valid local user,
-send
-.L OK
-and use that user;
-otherwise send
-.L NO
-and try again
-(until the caller gives up).
-This is the authentication protocol used by
-.IR ipclogin
-(see
-.IR ipc (3)),
-hence by
-.IR con (1),
-.IR push (1),
-and
-.IR pull.
-.XP inauth
-Read two null-terminated strings
-from the caller.
-If they aren't the same,
-reject the call.
-Otherwise look up the service,
-calling system,
-and the null-terminated string
-(as a user name)
-in the
-.I auth
-files,
-use the resulting local user if there's a match,
-reject the call otherwise.
-This is the authentication protocol used by
-.IR ipcrogin,
-hence by
-.IR rsh
-and
-.IR rlogin ;
-see
-.IR ipc (3)
-and
-.IR con (1).
-.XP ttyld
-Push the terminal line discipline
-.IR ttyld (4)
-onto the connection.
-.XP mesgld
-Push the reverse message line discipline
-(see
-.IR mesgld (4))
-onto the connection.
-.XP term
-Read a null-terminated string from the caller,
-and set environment variable
-.SM TERM
-to the result.
-.XP args
-Read a null-terminated string from the caller,
-and save the result as arguments to a possible command.
-.XP s5parms
-Extract arguments from the destination address
-in a way compatible with the
-DKHOST network software
-used by System V Datakit implementations,
-and save for later use.
-.XP cmd x
-Execute shell command
-.IR x ,
-with any saved arguments,
-and with the connection as standard input, output, and error.
-.XP login
-Provide a login session with the connection as standard input, output, and error.
-.XP password
-Provide a login session,
-but ignore any local user name;
-always demand a login and password.
-.XP exec
-Use any saved arguments
-as a shell command to be executed.
-.XP gateout gateway
-Call network address
-.IR gateway
-and send the connection info there,
-If all is well,
-pass the new connection's file descriptor
-to the original caller:
-the result is a connection through the gateway.
-.I Gateway
-should be a
-.I svcmgr
-service,
-perhaps on some other machine,
-with action
-.BR gateway .
-.XP gateway localout
-The intended target for
-.BR gateout :
-read new connection info from the connection,
-and place a call to the new destination;
-if it succeeds,
-loop passing data between the new connection and the original one.
-.PP
-If the file
-.F /usr/ipc/log/svc
-can be opened,
-.I svcmgr
-prints miscellaneous chatter there,
-including a record of each service request.
-The
-.B -d
-(debug)
-option increases the chatter.
-...SH EXAMPLES
-...to be supplied
-.SH FILES
-.nf
-.F /usr/ipc/lib/serv
-.F /usr/ipc/lib/serv.local
-.F /usr/ipc/lib/auth
-.F /usr/ipc/lib/auth.local
-.F /usr/ipc/log/svc
-.fi
-.SH "SEE ALSO"
-.IR con (1),
-.IR ipc (3),
-.IR dkmgr (8),
-.IR tcpmgr (8),
-.IR ipc (3)
diff --git a/static/v10/man8/swapon.8 b/static/v10/man8/swapon.8
deleted file mode 100644
index 7193e909..00000000
--- a/static/v10/man8/swapon.8
+++ /dev/null
@@ -1,37 +0,0 @@
-.TH SWAPON 8
-.CT 1 sa_auto
-.SH NAME
-swapon \- specify swapping device
-.SH SYNOPSIS
-.B "/etc/swapon"
-.B -a
-.br
-.B "/etc/swapon"
-.I name ...
-.SH DESCRIPTION
-.I Swapon
-specifies additional devices on which paging and swapping
-are to take place.
-The system begins by using a single device;
-.I swapon
-must be used to enable others.
-.PP
-Usually there is a call to
-.L "swapon -a"
-in
-.IR rc (8).
-Specific swap devices may be nominated with the second form.
-.SH SEE ALSO
-.IR rc (8),
-.I vswapon
-in
-.IR deprecated (2)
-.SH BUGS
-There is no way to stop paging and swapping on a device.
-It is therefore not possible to make use of devices which may be
-dismounted during system operation.
-.br
-Possible swap devices
-must be listed in a table configured into the system;
-.I swapon
-can only enable devices in the table.
diff --git a/static/v10/man8/swtmp.8 b/static/v10/man8/swtmp.8
deleted file mode 100644
index e19ed31c..00000000
--- a/static/v10/man8/swtmp.8
+++ /dev/null
@@ -1,24 +0,0 @@
-.pa 1
-.he 'SWTMP (VIII)'2/11/73'SWTMP (VIII)'
-.ti 0
-NAME swtmp -- update accounting file
-.sp
-.ti 0
-SYNOPSIS swtmp_____
-.sp
-.ti 0
-DESCRIPTION This
-shell sequence concatenates /tmp/wtmp onto /usr/adm/wtmp
-and truncates /tmp/wtmp.
-It should be used before
-using acct(VIII)
-and every so often in any case if accounting
-is to be maintained.
-.sp
-.ti 0
-FILES /tmp/wtmp,
-/usr/adm/wtmp
-.sp
-.ti 0
-SEE ALSO acct(VIII),
-wtmp(V)
diff --git a/static/v10/man8/symorder.8 b/static/v10/man8/symorder.8
deleted file mode 100644
index 9d2668dc..00000000
--- a/static/v10/man8/symorder.8
+++ /dev/null
@@ -1,23 +0,0 @@
-.TH SYMORDER 8
-.UC
-.SH NAME
-symorder \- rearrange name list
-.SH SYNOPSIS
-.B symorder
-orderlist symbolfile
-.SH DESCRIPTION
-.I Orderlist
-is a file containing symbols to be found in symbolfile,
-1 symbol per line.
-.PP
-.I Symbolfile
-is updated in place to put the requested symbols first
-in the symbol table, in the order specified. This is done
-by swapping the old symbols in the required spots with the
-new ones. If all of the order symbols are not found, an
-error is generated.
-.PP
-This program was specifically designed to cut down on the
-overhead of getting symbols from /vmunix.
-.SH "SEE ALSO"
-nlist(3)
diff --git a/static/v10/man8/sync.8 b/static/v10/man8/sync.8
deleted file mode 100644
index d95c8ad8..00000000
--- a/static/v10/man8/sync.8
+++ /dev/null
@@ -1,18 +0,0 @@
-.th SYNC VIII 11/1/73
-.sh NAME
-sync \*- update the super block
-.sh SYNOPSIS
-.bd sync
-.sh DESCRIPTION
-.it Sync
-executes the
-.it sync
-system primitive.
-If the system is to be stopped,
-.it sync
-must be called to insure
-file system integrity.
-See sync(II) for details.
-.sh "SEE ALSO"
-sync(II)
-.sh BUGS
diff --git a/static/v10/man8/syslog.8 b/static/v10/man8/syslog.8
deleted file mode 100644
index da1f5040..00000000
--- a/static/v10/man8/syslog.8
+++ /dev/null
@@ -1,172 +0,0 @@
-.TH SYSLOG 8
-.CT 1 sa_nonmortals
-.SH NAME
-syslog, logpr \- system security logging
-.SH SYNOPSIS
-.B priv syslog
-.I command
-[
-.I arg2
-[
-.I arg3
-]
-]
-.PP
-.B /etc/logpr
-.I file
-[
-.I offset
-]
-.SH DESCRIPTION
-.I Syslog
-controls the mandatory logging scheme.
-License
-.B T_LOG
-is required.
-The variety of different commands and command formats
-reflects the full complexity of the
-protean
-.IR syslog (2)
-system call.
-In the usages given below a
-.I mask
-argument is a combination of letters
-.BR NILESDATUPX ,
-meaning:
-.TP
-.PD0
-.B N
-Record all uses of file names.
-.TP
-.B S
-Record all seek calls.
-.TP
-.B U
-Record all writes to the `u area'.
-.TP
-.B I
-Record all accesses of inode contents.
-.TP
-.B D
-Record possession and use of file descriptors.
-.TP
-.B P
-Record process history:
-.IR exec (2),
-.IR fork (2),
-.IR kill (2),
-.IR exit (2).
-.TP
-.B L
-Record all explicit changes of labels by
-.IR setflab
-(see
-.IR getflab (2))
-and
-.IR setplab
-(see
-.IR getplab (2)).
-.TP
-.B A
-Record all changes of labels.
-.TP
-.B X
-Record all uses of privilege.
-.TP
-.B E
-Record all
-.B ELAB
-error returns.
-.TP
-.B T
-Record all uses of a traced file or process.
-.PD
-.PP
-Valid arguments to
-.I syslog
-are:
-.TP
-.BI "on " file " " logdev
-Nominate
-.I file
-as repository for user generated
-logging records written to logging special file
-.IR logdev .
-.I File
-must be a full path name, and must be openable for writing.
-If
-.IR logdev 's
-minor device number is zero,
-.I file
-will also receive mandatory (kernel generated) logging records.
-.I Logdev
-may be a full path name or a minor device number.
-.PD0
-.TP
-.BI "off " logdev
-Cancel the effect of an
-.B on
-command.
-.TP
-.BI "get " n
-Print the value of the
-.IR n -th
-log mask.
-Values of
-.I n
-are 0, 1, 2, or 3
-for the `poison' masks; 4 is `global' mask.
-.TP
-.BI "set " n " " mask
-Set the value of the
-.IR n -th
-log mask.
-.TP
-.BI "fget " file
-Print the poison level of
-.IR file ,
-one of the integers 0, 1, 2, or 3.
-.I File
-must be the full path name of a readable file.
-.TP
-.BI "fset " file " " n
-Set the poison level of
-.I file
-to
-.IR n .
-.I File
-must be the full path name of a readable file.
-.TP
-.BI "pget " pid
-Print the logging mask of process
-.IR pid .
-.TP
-.BI "pset " pid " " mask
-Set the logging mask of process
-.I pid
-to
-.IR mask .
-.PD
-.PP
-.I Logpr
-converts to cryptic
-.SM ASCII
-the cryptic binary format of a log file described in
-.IR log (5).
-The optional numerical byte offset tells where in the file printing
-is to start.
-.SH FILES
-.TF /dev/log/log00
-.TP
-.F /dev/log/log00
-where
-.I syslog
-makes voluntary entries
-.SH "SEE ALSO"
-.IR syslog (2),
-.IR log (4),
-.IR log (5).
-.SH DIAGNOSTICS
-`Covert channel warning': the log file has
-a label that is neither top nor flagged
-.BR L_NO .
diff --git a/static/v10/man8/tcpmgr.8 b/static/v10/man8/tcpmgr.8
deleted file mode 100644
index ce77d7be..00000000
--- a/static/v10/man8/tcpmgr.8
+++ /dev/null
@@ -1,73 +0,0 @@
-.TH TCPMGR 8
-.CT 1 sa_auto
-.SH NAME
-tcpmgr \- accept and place calls via the TCP protocol
-.SH SYNOPSIS
-.B /usr/ipc/mgrs/tcpmgr
-[
-.BI -m " outnet"
-]
-.SH DESCRIPTION
-.I Tcpmgr
-receives and places TCP calls on an Internet TCP/IP network.
-Outbound TCP calls may be placed by calling
-.I ipcopen
-with network name
-.B tcp
-(see
-.IR ipc (3)).
-Inbound calls to TCP port
-.I n
-are handed to the local service
-listed for that port in
-.FR /usr/ipc/lib/inservices ,
-or to service
-.BI tcp. n
-if there is no listing.
-.PP
-Option
-.B -m
-tells
-.I tcpmgr
-to claim to place outbound calls for network
-.I outnet
-rather than
-.BR tcp .
-.PP
-The TCP protocol runs atop one or more IP networks.
-.I Tcpmgr
-arranges to receive all inbound TCP calls on all active IP networks,
-but other arrangements
-must be used to activate the IP networks themselves;
-see
-.IR ipconfig (8).
-.PP
-.I Tcpmgr
-records its activity
-in file
-.I outnet
-in directory
-.BR /usr/ipc/log ,
-default
-.BR /usr/ipc/log/tcp .
-.PP
-This command is usually run once from
-.IR rc (8).
-.SH FILES
-.TP 2i
-.PD 0
-.F /usr/ipc/log/tcp
-.TP
-.FR /dev/tcp*
-TCP network devices
-.TP
-.F /dev/iptcp
-IP channel for the TCP protocol
-.TP
-.F /usr/ipc/lib/inservices
-mapping between service name and port number
-.SH "SEE ALSO"
-.IR con (1),
-.IR ipconfig (8),
-.IR svcmgr (8),
-.IR ipc (3)
diff --git a/static/v10/man8/tm.8 b/static/v10/man8/tm.8
deleted file mode 100644
index 4240c173..00000000
--- a/static/v10/man8/tm.8
+++ /dev/null
@@ -1,48 +0,0 @@
-.pa 1
-.he 'TM (VIII)'3/15/72'TM (VIII)'
-.ti 0
-NAME tm -- provide time information
-.sp
-.ti 0
-SYNOPSIS tm__
-.sp
-.ti 0
-DESCRIPTION tm__
-is used to provide timing information.
-Output like the following
-is given:
-.sp
-.in +5
- tim 371:51:09 2:00.8
- ovh 20:00:33 17.0
- swp 13:43:20 4.6
- dsk 27:14:35 4.5
- idl 533:08:03 1:33.3
- usr 24:53:50 1.2
- der 0, 54 0, 0
-.sp
-.in -5
-The first column of numbers gives totals in the named categories
-since the last time the system was cold-booted; the second
-column gives the changes since the last time tm__ was invoked.
-The top left number is badly truncated and should be ignored.
-ovh___ is time spent
-executing in the system;
-swp___ is time waiting for swap I/O;
-dsk___ is time spent waiting for
-file system disk I/O; idl___ is idle time; usr___ is user execution
-time; der___ is RF disk error count (left number) and RK disk error
-count (right number).
-
-.ti 0
-FILES /dev/rf0 (for absolute times);
-/tmp/ttmp for differential timing history.
-.sp
-.ti 0
-SEE ALSO time(I), file system(V)
-.sp
-.ti 0
-DIAGNOSTICS --
-.sp
-.ti 0
-BUGS --
diff --git a/static/v10/man8/tp.8 b/static/v10/man8/tp.8
deleted file mode 100644
index 7e27f382..00000000
--- a/static/v10/man8/tp.8
+++ /dev/null
@@ -1,175 +0,0 @@
-.TH TP 8
-.SH NAME
-tp \- manipulate tape archive
-.SH SYNOPSIS
-.B tp
-[ key ] [ name ... ]
-.SH DESCRIPTION
-.PP
-.I Tp
-saves and restores files
-on DECtape or magtape.
-Its actions are controlled by the
-.I key
-argument.
-The key is a string of characters containing
-at most one function letter and possibly
-one or more function modifiers.
-Other arguments to the command are file or directory
-names specifying which files are to be dumped, restored,
-or listed.
-In all cases, appearance of a directory name refers to
-the files and (recursively) subdirectories of that directory.
-.PP
-The function portion of
-the key is specified by one of the following letters:
-.TP 8
-.B r
-The named files
-are written
-on the tape.
-If files with the same names
-already exist, they are replaced.
-`Same' is determined by string comparison, so
-`./abc' can never be the same as `/usr/dmr/abc' even
-if `/usr/dmr' is the current directory.
-If no file argument is given, `\fB.\fR' is the default.
-.TP 8
-.B u
-updates the tape.
-.B u
-is like
-.B r,
-but a file is replaced only if its
-modification date is later than the date stored on the tape;
-that is to say, if it has changed since it was dumped.
-.B u
-is the default command if none is given.
-.TP 8
-.B d
-deletes the named files from
-the tape.
-At least one name argument must be given.
-This function is not permitted on magtapes.
-.TP 8
-.B x
-extracts the named files from the tape to the file system.
-The owner and mode are restored.
-If no file argument is given, the entire contents of the
-tape are extracted.
-.TP 8
-.B t
-lists the names of the specified files.
-If no file argument is given,
-the entire contents of the tape is listed.
-.PP
-The following characters may be used in addition to the letter
-which selects the function desired.
-.TP 10
-.B m
-Specifies magtape as opposed to DECtape.
-.TP 10
-.B 0,...,7
-This
-modifier selects the drive on which the tape is mounted.
-For DECtape,
-.B x
-is default; for magtape
-`0' is the default.
-.TP 10
-.B v
-Normally
-.I tp
-does its work silently.
-The
-.B v
-(verbose)
-option causes it to type the name of each file it treats
-preceded by the function letter.
-With the
-.B t
-function,
-.B v
-gives more information about the
-tape entries than just the name.
-.TP 10
-.B c
-means a fresh dump is being created; the tape directory
-is cleared before beginning.
-Usable only with
-.B r
-and
-.B u.
-This option is assumed with magtape since
-it is impossible to selectively overwrite
-magtape.
-.TP 10
-.B i
-Errors reading and writing the
-tape are noted, but no action is taken.
-Normally, errors cause a return to the command level.
-.TP 10
-.B f
-Use the first named file, rather than a tape,
-as the archive.
-This option currently acts like
-.BR m ;
-.I i.e.
-.BR r
-implies
-.BR c ,
-and neither
-.BR d
-nor
-.BR u
-are permitted.
-.TP 10
-.B w
-causes
-.I tp
-to pause before treating each file, type
-the indicative letter and the file name (as with
-.BR v )
-and await the user's response.
-Response
-.B y
-means `yes', so the file is treated.
-Null response
-means `no', and the file does not take part
-in whatever is being done.
-Response
-.B x
-means `exit';
-the
-.I tp
-command terminates immediately.
-In the
-.B x
-function,
-files previously asked about
-have been extracted already.
-With
-.B "r, u,"
-and
-.B d
-no change has been made to the tape.
-.PP
-.SH FILES
-/dev/tap?
-.br
-/dev/rmt?
-.SH SEE ALSO
-ar(1), tar(1)
-.SH DIAGNOSTICS
-Several; the non-obvious one is
-`Phase error', which means the file changed after it was selected for
-dumping but before it was dumped.
-.SH BUGS
-A single file with several links to it is treated like several files.
-.PP
-Binary-coded control information makes
-magnetic tapes written by
-.I tp
-difficult to carry to other machines;
-.IR tar (1)
-avoids the problem.
diff --git a/static/v10/man8/umount.8 b/static/v10/man8/umount.8
deleted file mode 100644
index a69a5b8d..00000000
--- a/static/v10/man8/umount.8
+++ /dev/null
@@ -1,31 +0,0 @@
-.pa 1
-.he 'UMOUNT (VIII)'1/20/73'UMOUNT (VIII)'
-.ti 0
-NAME umount -- dismount file system
-.sp
-.ti 0
-SYNOPSIS /etc/umount___________ special
-.sp
-.ti 0
-DESCRIPTION umount______
-announces to the system that the removable file system previously
-mounted on special file special_______ is to be removed.
-
-The user must take care not
-only that all I/O activity on the file system has ceased,
-but that no one has his current directory on it.
-
-Only the super-user may issue this command.
-.sp
-.ti 0
-FILES --
-.sp
-.ti 0
-SEE ALSO mount(VIII)
-.sp
-.ti 0
-DIAGNOSTICS "?"
-.sp
-.ti 0
-BUGS This
-command is not, in fact, restricted to the super-user.
diff --git a/static/v10/man8/unspk.8 b/static/v10/man8/unspk.8
deleted file mode 100644
index af99d8c1..00000000
--- a/static/v10/man8/unspk.8
+++ /dev/null
@@ -1,43 +0,0 @@
-.pa 1
-.he 'UNSPK (VIII)'4/13/73'UNSPK (VIII)'
-.ti 0
-NAME unspk -- decode voice synthesizer text
-.sp
-.ti 0
-SYNOPSIS unspk_____ [ -_ ] [ input [ output ] ]
-.sp
-.ti 0
-DESCRIPTION unspk_____
-is inverse to
-.ul
-speak.
-It translates coded voice synthesizer input, as created by
-.ul
-speak,
-into phonetic strings
-of the sort accepted by
-.ul
-speak.
-Standard output or input is assumed when one or the other
-is unspecified.
-.sp
-The -_ option produces output in a different phonetic code
-for another vocal tract synthesizer [C. H. Coker,
-Speech synthesis by modelling the human articulatory
-system, MM69-1232-29].
-.sp
-unspk_____ lives in /crp/vs
-.sp
-.ti 0
-FILES --
-.sp
-.ti 0
-SEE ALSO speak(I), vsp(VII)
-.sp
-.ti 0
-DIAGNOSTICS "Input file." -- can't open it
-.br
-"Output file." -- can't create it
-.sp
-.ti 0
-BUGS --
diff --git a/static/v10/man8/upas.8 b/static/v10/man8/upas.8
deleted file mode 100644
index 8cf496bd..00000000
--- a/static/v10/man8/upas.8
+++ /dev/null
@@ -1,275 +0,0 @@
-.TH UPAS 8
-.CT 1 sa_auto sa_mortals
-.SH NAME
-upas, rmail, translate \- mail delivery system
-.SH SYNOPSIS
-.B rmail
-.I person ...
-.PP
-.B /usr/lib/upas/translate
-.I name
-.PP
-.B /usr/lib/upas/auth
-.I sender
-.I receiver
-.SH DESCRIPTION
-Users send mail by
-.IR mail (1).
-Remote machines use
-.I rmail.
-Both call on
-.I upas
-programs.
-.PP
-Mail addresses are interpreted
-according to rewrite rules as
-described below.
-When the addresses for a
-.I mail
-or
-.I rmail
-command have been interpreted, they are bundled by
-network and passed to network-specific handlers,
-such as
-.IR route.inet .
-.PP
-.I Translate
-looks up a mail
-.I name
-in an alias list (see
-.IR mail (6))
-and places the result on standard output.
-.PP
-.I Auth
-is called by
-.I upas
-to authorize mail delivery for each
-.I sender, receiver
-pair.
-The mail is accepted if
-the previous hop was a trusted gateway machine in
-.FR /usr/lib/upas/gateways ,
-or all the machines in the source or destination path are in
-.FR /usr/lib/upas/attlist .
-.SS Rewrite rules
-Each line of the file
-.F /usr/lib/upas/rewrite
-is a rule.
-Blank lines and lines beginning with
-.B #
-are ignored.
-.PP
-Each rewriting rule consists of (up to) 4 strings:
-.TP
-.I pattern
-A regular expression in the style of
-.IR regexp (3).
-The
-.I pattern
-is applied to mail destination addresses.
-The pattern match is case-insensitive
-and must match the entire address.
-.TP
-.I type
-The type of rule; see below.
-.TP
-.I arg1
-An
-.IR ed (1)
-style replacement string, with
-.BI \e n
-standing for the text matched by the
-.IR n th
-parenthesized subpattern.
-.TP
-.I arg2
-Another
-.IR ed (1)
-style replacement string.
-.PP
-In each of these fields the substring
-.L \es
-is replaced by the login id of the
-sender and the substring
-.L \el
-is replaced by the name of the local machine.
-.PP
-When delivering a message,
-.I mail
-starts with the first rule and continues down the list until a pattern
-matches the destination address.
-It then performs one of the following actions depending on rule type:
-.PD 0
-.TP
-.B >>
-Append the mail to the file indicated by expanding
-.IR arg1 ,
-provided that file appears to be a valid mailbox.
-.TP
-.B |
-Pipe the mail through the command formed from concatenating the
-expanded
-.I arg1
-and
-.I arg2.
-.TP
-.B alias
-Replace the address by the address(es) specified
-by expanding
-.I arg1
-and recur.
-.TP
-.B translate
-Replace the address by the address(es) output by the
-command formed by expanding
-.I arg1
-and recur.
-.TP
-.B auth
-Call the program in expanded
-.I arg1
-and authorize(reject) the mail if it returns a zero(non-zero) return code.
-.PD
-.PP
-.I Mail
-expands the addresses recursively until each address has matched a
-.L >>
-or
-.L |
-rule or until the recursion depth indicates a rewriting loop
-(currently 32).
-.PP
-An
-.L auth
-operator is only applied once per address.
-If no
-.L auth
-rule is encountered, the mail is accepted.
-.PP
-If several addresses match
-.L |
-rules and result in the same
-expanded
-.IR arg1 ,
-the message is delivered to all those addresses
-by a single command,
-composed by concatenating the common
-expanded
-.I arg1
-and each expanded
-.IR arg2 .
-This is meant to make less work of
-a message to several recipients on the same machine.
-For example, the rule
-.IP
-.L
-([^!]+)!(.+) | "uux - -a \\s \\1!rmail" \\2
-.LP
-causes
-.L mail r70!pjw r70!ken
-to generate the single delivery command
-.LR "uux -a rob r70!rmail pjw ken" .
-.SH EXAMPLES
-A sample rewrite file:
-.PP
-.EX
-.ta \w'([^!]+)[%@]([^!@%]+) 'u +\w'alias 'u
-# local mail
-[^!@%]+ translate "exec translate '&'"
-local!([^!@%]+) >> /usr/spool/mail/\e1
-\el!(.+) alias \e1
-.EE
-.PP
-.EX
-# convert %@ format to ! format
-(_822_)!((.+)!)?([^!]+)[%@]([^!%@]+) \e
- alias \e1!\e2\e5!\e4
-([^!]+)[%@]([^!@%]+) alias _822_!\e2!\e1
-_822_!(.+) alias \e1
-.EE
-.PP
-.EX
-# special domains
-[^!]+wisc\e.edu!.+ alias xunet!&
-.EE
-.PP
-.EX
-# network gateways
-(csnet|bitnet)!(.+) alias inet!&
-acsnet!.+
-.EE
-.PP
-.EX
-# real networks
-inet!([^!]+)!(.+) | "/usr/lib/upas/route.inet '\es' '\e1'" "'\e2'"
-([^!]+)!(.+) | "/usr/lib/upas/route '\es' '\e1'" "'\e2'"
-.EE
-.PP
-.EX# anything else goes to research
-.* alias research!&
-.EE
-.SH FILES
-.TF /n/bowell/usr/lib/upas/mkfile
-.TP
-.F /usr/lib/upas/namefiles
-list of files to search
-.TP
-.F $HOME/lib/names
-private aliases
-.TP
-.F /usr/lib/upas/rewrite
-rewriting rules
-.TP
-.F /usr/lib/upas/attlist
-known AT&T machines
-.TP
-.F /usr/lib/upas/gateways
-machines that check mail authorization reliably
-.TP
-.F /usr/lib/upas/translate
-alias lookup
-.TP
-.F /usr/lib/upas/route.*
-mail interfaces to specific networks
-.TP
-.F /usr/lib/upas/route
-interface to local (i.e. AT&T) Datakit network
-.TP
-.F /bin/mail
-shell file that calls the mailer
-.TP
-.F /usr/lib/upas/send
-actually delivery program
-.TP
-.F /bin/rmail
-linked to /usr/lib/upas/send
-.TP
-.F /usr/spool/mail/*
-mailboxes
-.TP
-.F /usr/spool/mail/mail.log*
-delivery logs
-.TP
-.F /n/bowell/usr/lib/upas/mkfile
-updates various mail and uucp files
-.TP
-.F /etc/passwd
-authentication
-.TP
-.F /tmp/ma*
-temp file
-.TP
-.F /tmp/ml*
-lock file
-.TP
-.F $HOME/dead.letter
-unmailable text
-.SH "SEE ALSO"
-.IR uucp (1),
-.IR mail (1),
-.IR mail (6),
-.IR smtp (8)
-.br
-D. L. Presotto and W. R. Cheswick,
-`Upas\(ema simpler approach to network mail',
-this manual, Volume\ 2
diff --git a/static/v10/man8/update.8 b/static/v10/man8/update.8
deleted file mode 100644
index a670606c..00000000
--- a/static/v10/man8/update.8
+++ /dev/null
@@ -1,25 +0,0 @@
-.th UPDATE VIII 11/1/73
-.sh NAME
-update \*- periodically update the super block
-.sh SYNOPSIS
-.bd update
-.sh DESCRIPTION
-.it Update
-is a program that executes
-the
-.it sync
-primitive every 30 seconds.
-This insures that the file system
-is fairly up to date in case of a crash.
-This command should not be executed directly,
-but should be executed out of the
-initialization shell command file.
-See sync(II) for details.
-.sh "SEE ALSO"
-sync(II), init(VII)
-.sh BUGS
-There is a system bug which, it is suspected,
-may be aggravated by this program.
-Until further notice,
-.it update
-should not be run.
diff --git a/static/v10/man8/uucico.8 b/static/v10/man8/uucico.8
deleted file mode 100644
index ba88daa7..00000000
--- a/static/v10/man8/uucico.8
+++ /dev/null
@@ -1,205 +0,0 @@
-.TH UUCICO 8
-.CT 1 sa_auto
-.SH NAME
-uucico, uusched, uuxqt, kick, debug \- uucp file transport and execution
-.SH SYNOPSIS
-.B /usr/lib/uucp/uucico
-[
-.B -r1
-.B -s
-.I system
-]
-[
-.B -x
-.I debug
-]
-[
-.B -d
-.I spool_directory
-]
-.PP
-.B /usr/lib/uucp/uusched
-[
-.B -x
-.I debug
-]
-[
-.B -u
-.I debug
-]
-.PP
-.B /usr/lib/uucp/kick
-.I system
-.PP
-.B /usr/lib/uucp/debug
-.I system
-.PP
-.B /usr/lib/uucp/uuxqt
-[
-.B -s
-.I system
-]
-[
-.B -x
-.I debug
-]
-.SH DESCRIPTION
-.I Uucico
-transfers files between systems
-for
-.IR uucp (1).
-It is normally invoked by
-.I login
-for
-an incoming connection
-(a slave),
-or by
-.IR uusched
-to call out to another system
-(a master).
-The options are
-.TP \w'\f5-s\ \fIsystem\ 'u
-.B -r1
-This is a master;
-option
-.B -s
-is required.
-In the absence of
-.B -r1
-the process is a slave and expects to speak to a master on
-standard input and standard output.
-.TP \w'\f5-s\ \fIsystem\ 'u
-.BI -s " system
-Call the named
-.I system.
-.TP
-.BI -x " debug
-Turn on debugging output;
-.I debug
-is a single digit, larger for more output.
-.ig
-.PP
-For example,
-the shell
-.I Uutry
-starts
-.I uucico
-with debugging turned on.
-..
-.PP
-.I Uusched
-invokes
-.I uucico
-for each system
-with work pending.
-It is called by
-.IR uucp
-and
-.IR uux (1)
-after work is queued,
-and should be invoked regularly by
-.IR cron (8).
-The options are
-.TP \w'\f5-s\ \fIsystem\ 'u
-.BI -x " debug
-As for
-.I uucico.
-.TP
-.BI -u " debug
-Invoke
-.I uucico
-with option
-.B -x
-.I debug.
-.PP
-.I Kick
-invokes
-.I uucico
-in the background
-to call out to the specified
-.IR system .
-.I Debug
-causes a call with
-a moderate amount
-of debugging output
-.RB ( -x4 ).
-Both attempt to remove
-existing system status information
-for
-.IR system ,
-so that a call will be attempted
-regardless of recent failures.
-.PP
-.I Uuxqt
-executes commands requested remotely by
-.IR uux (1).
-It searches the
-.I uucp
-spool directories looking for
-filenames starting with
-.BR X. ,
-checks the
-.I Permissions
-file to see that all required data files are available
-and accessible
-and that the requested command is permitted for the
-requesting system,
-and invokes the command if all is well.
-.PP
-Before a command is invoked,
-the file creation mask
-.RI ( umask (2))
-is set to 0 and these
-environment variables are set:
-.TF UU_MACHINE
-.TP
-.B UU_MACHINE
-the name of the last sending machine
-.TP
-.B UU_USER
-the user that sent the job
-.TP
-.B PATH
-set to
-.LR /bin:/usr/bin
-.TP
-.B USER
-set to
-.L uucp
-.PD
-.SH FILES
-.TF /usr/lib/uucp/Maxuuscheds
-.TP
-.F /usr/lib/uucp/Systems*
-.TP
-.F /usr/lib/uucp/Permissions
-.TP
-.F /usr/lib/uucp/Devices
-.TP
-.F /usr/lib/uucp/Maxuuscheds
-how many copies of
-.I uusched
-may be active at once
-.TP
-.F /usr/lib/uucp/Maxuuxqts
-ditto for
-.I uuxqt
-.TP
-.F /usr/spool/uucp/*
-.TP
-.F /usr/spool/uucppublic/*
-.TP
-.F /usr/spool/uucp/LCK*
-.fi
-.SH "SEE ALSO"
-.IR uucp (1),
-.IR uux (1),
-.IR uustat (1)
-.br
-D. A. Nowitz,
-`UUCP Administration',
-this manual, Volume 2
-.SH BUGS
-System and user names received by
-.I uuxqt
-should not be believed.
diff --git a/static/v10/man8/uucleanup.8 b/static/v10/man8/uucleanup.8
deleted file mode 100644
index 650af0d7..00000000
--- a/static/v10/man8/uucleanup.8
+++ /dev/null
@@ -1,103 +0,0 @@
-.TH UUCLEANUP 8
-.CT 1 sa_auto
-.SH NAME
-uucleanup \- uucp spool directory clean-up
-.SH SYNOPSIS
-.B /usr/lib/uucp/uucleanup
-[
-.I options
-]
-.SH DESCRIPTION
-.I Uucleanup\^
-removes old files from the
-.I uucp
-spool directories.
-It is typically called by
-.FR /usr/lib/uucp/uudemon.cleanu ,
-which may be run regularly by
-.IR cron (8).
-The options are:
-.TF -mstring
-.TP
-.BI -C days\^
-Remove
-.B C.
-(control) files that are at least
-.I days
-old,
-and send a message to the user who queued the job.
-.PD
-.TP
-.BI -D days\^
-Remove
-.B D.
-(data) files that are at least
-.I days
-old.
-If the data file appears to contain a mail message,
-an attempt will be made to deliver it;
-if it contains a netnews article
-from another system,
-it will be handed to
-.IR rnews .
-.TP
-.BI -W days\^
-Send a warning to the user who queued any jobs
-.RB ( C.
-files)
-at least
-.I days
-old.
-If one of the data files for the job appears to be a mail message,
-the message is included in the warning.
-.TP
-.BI -X days\^
-Remove any
-.B X.
-(remote execution) files at least
-.I days
-old.
-.TP
-.BI -m string\^
-Include
-.I string
-in warning messages.
-The default is
-`See your local administrator to locate the problem.'
-.TP
-.BI -o days\^
-Remove any other files
-that are at least
-.I days
-old.
-.TP
-.BI -s system\^
-Examine only files associated with
-.IR system .
-.PP
-By default,
-.B C.
-files generate a warning when
-one day old,
-and are removed after 7 days;
-.B D.
-files are removed after 7 days;
-and
-.B X.
-and other files
-are removed after 2 days.
-.SH FILES
-.TF /usr/spool/uucp
-.TP
-.F /usr/lib/uucp
-directory with commands used by
-.I uucleanup
-.TP
-.F /usr/spool/uucp
-spool directory
-.SH SEE ALSO
-.IR uucp (1)
-.br
-D. A. Nowitz,
-`UUCP Administration',
-this manual, Volume 2
diff --git a/static/v10/man8/uurec.8 b/static/v10/man8/uurec.8
deleted file mode 100644
index 38dae752..00000000
--- a/static/v10/man8/uurec.8
+++ /dev/null
@@ -1,18 +0,0 @@
-.TH UUREC 8
-.SH NAME
-uurec \- receive processed news articles via mail
-.SH SYNOPSIS
-uurec
-.SH DESCRIPTION
-.I uurec
-reads news articles on the standard input sent by
-.I sendnews(8),
-decodes them, and gives them to
-.I inews(1)
-for insertion.
-.SH SEE ALSO
-inews(1),
-readnews(1),
-recnews(8),
-sendnews(8),
-newscheck(1)
diff --git a/static/v10/man8/vipw.8 b/static/v10/man8/vipw.8
deleted file mode 100644
index 05f46458..00000000
--- a/static/v10/man8/vipw.8
+++ /dev/null
@@ -1,23 +0,0 @@
-.TH VIPW 8
-.UC 4
-.SH NAME
-vipw \- edit the password file with vi
-.SH SYNOPSIS
-.B vipw
-.SH DESCRIPTION
-.I Vipw
-edits the password file while setting the appropriate locks,
-and does any necessary processing after the password file is unlocked.
-If the password file is already being edited, then you will be told
-to try again later
-.SH SEE ALSO
-chfn(1), chsh(1), passwd(1), passwd(5), adduser(8)
-.SH FILES
-/etc/vipw.lock
-.SH BUGS
-.I Vipw
-does not remove the vipw.lock file; this is not a bug, but people tend
-to think it is.
-.PP
-No one deals with left-over /etc/ptmp (the real lock) files after a system
-crash.
diff --git a/static/v10/man8/vmstat.8 b/static/v10/man8/vmstat.8
deleted file mode 100644
index dd267fb0..00000000
--- a/static/v10/man8/vmstat.8
+++ /dev/null
@@ -1,143 +0,0 @@
-.TH VMSTAT 8
-.CT 1 sa_mortals
-.SH NAME
-vmstat \- report virtual memory statistics
-.SH SYNOPSIS
-.B vmstat
-[
-.B -st
-]
-[
-.I interval
-[
-.I count
-]
-]
-.SH DESCRIPTION
-.I Vmstat
-reports statistics about certain system activity.
-.ig x
-Option
-.B -f
-reports on
-.I forks
-since system startup and the number of pages of virtual memory involved.
-.x
-Option
-.B -s
-prints totals for miscellaneous events
-since the last boot.
-Option
-.B -t
-reports on paging events.
-.PP
-In the absence of other options, the optional
-.I interval
-argument causes
-.I vmstat
-to report once each
-.I interval
-seconds, repeated
-.I count
-times or forever.
-.PP
-The default format fields are:
-.TF faults
-.TP
-.B procs
-information about numbers of processes in various states:
-.RS
-.PD 0
-.TP
-.B r
-in run queue
-.TP
-.B b
-blocked for resources (I/O, paging, etc.)
-.TP
-.B w
-runnable or short sleeper (< 20 secs) but swapped
-.RE
-.PD
-.TP
-.B memory
-use of virtual and real memory:
-.RS
-.PD 0
-.TP
-.B avm
-number of
-pages belonging to processes that have run
-in the last 20 seconds
-.TP
-.B fre
-size of memory free list
-.RE
-.PD
-.TP
-.B page
-paging activity,
-averaged each five seconds, in units per second:
-.RS
-.PD 0
-.TP
-.B re
-page reclaims (simulating reference bits)
-.TP
-.B at
-text pages recovered from memory
-.TP
-.B pi
-page-in events
-.TP
-.B po
-page-out events
-.TP
-.B fr
-pages freed per second
-.TP
-.B de
-anticipated short term memory shortfall
-.TP
-.B sr
-scan rate: pageout daemon rpm
-.RE
-.PD
-.TP
-.B faults
-trap rates, averaged each five seconds, in units per second:
-.RS
-.PD 0
-.TP
-.B sy
-system calls
-.TP
-.B cs
-process context switches
-.RE
-.PD
-.TP
-.B cpu
-percentage use of CPU time:
-.RS
-.PD 0
-.TP
-.B us
-user time, both normal and low priority
-.TP
-.B sy
-system time
-.TP
-.B id
-cpu idle time
-.TP
-.B st
-stream queue processing time
-.RE
-.PD
-.SH FILES
-.F /dev/kmem
-.br
-.F /unix
-.SH BUGS
-This program is never up to date.
diff --git a/static/v10/man8/vpac.8 b/static/v10/man8/vpac.8
deleted file mode 100644
index 6acf1fce..00000000
--- a/static/v10/man8/vpac.8
+++ /dev/null
@@ -1,49 +0,0 @@
-.TH VPAC 8 2/21/80
-.UC 4
-.SH NAME
-vpac \- print raster printer/ploter accounting information
-.SH SYNOPSIS
-.B /etc/vpac
-[
-.B \-W
-] [
-.B \-s
-] [
-.B \-r
-] [
-.B \-t
-] [ name ... ]
-.SH DESCRIPTION
-.I Vpac
-reads the raster printer/plotter accounting files, accumulating the number
-of pages (for narrow fan-fold devices) or feet (for wide, roll paper devices)
-of paper consumed by each user, and printing out
-how much each user consumed in pages or feet and dollars (billed at
-2 cents / page or 8 cents / foot). If any
-.I names
-are specified, then statistics are only printed for those users;
-usually, statistics are printed for every user who has used any paper.
-.PP
-The
-.B \-W
-flag causes accounting to be done for a wide roll paper device. The default is
-to do accounting for a narrow, fan-fold device.
-The
-.B \-t
-flag causes the output to be sorted by feet of paper; usually the
-output is sorted alphabetically by name. The
-.B \-r
-flag reverses the sorting order.
-The
-.B \-s
-flag causes the accounting information to be summarized on the
-summary accounting file; this summarization is necessary since on a
-busy system, the accounting file can grow by several lines per day.
-.SH FILES
-.ta 2i
-/usr/adm/v?acct raw accounting files
-.br
-/usr/adm/v?_sum summary accounting files
-.SH BUGS
-The relationship between the computed price and reality is
-as yet unknown.
diff --git a/static/v10/man8/wall.8 b/static/v10/man8/wall.8
deleted file mode 100644
index 57918100..00000000
--- a/static/v10/man8/wall.8
+++ /dev/null
@@ -1,23 +0,0 @@
-.TH WALL 8
-.CT 1 sa_nonmortals
-.SH NAME
-wall \- write to all users
-.SH SYNOPSIS
-.B /etc/wall
-.SH DESCRIPTION
-.I Wall
-reads its standard input until an end-of-file.
-It then sends this message,
-preceded by
-`Broadcast Message ...',
-to all logged in users.
-.PP
-The sender should be super-user to override
-any protections the users may have invoked.
-.SH FILES
-.F /etc/utmp
-.SH "SEE ALSO"
-.IR write (1)
-.SH DIAGNOSTICS
-`Cannot send to ...' when the open on
-a user's tty file fails.
diff --git a/static/v10/man8/worm.8 b/static/v10/man8/worm.8
deleted file mode 100644
index 004f4a05..00000000
--- a/static/v10/man8/worm.8
+++ /dev/null
@@ -1,436 +0,0 @@
-.TH WORM 8 "wild"
-.CT 1 sa_nonmortals
-.SH NAME
-worm, jukebox \- optical disk utilities
-.SH SYNOPSIS
-.B "worm mkfs"
-[
-.BI -f device
-] [
-.BI -c comments
-] [
-.BI -b blksz
-] [
-.BI -n nblks
-] [
-.BI -v newvol_id
-]
-.I vol_id
-.PP
-.B "worm stat"
-[
-.BI -f device
-] [
-.BI -F n
-] [
-.B -v
-] [
-.I vol_id
-]
-.PP
-.B "worm ls"
-[
-.BI -f device
-] [
-.B -l
-] [
-.I file ...
-]
-.PP
-.B "worm rm"
-[
-.BI -f device
-]
-.I vol_id
-[
-.I file ...
-]
-.PP
-.B "worm mv"
-[
-.BI -f device
-]
-.I vol_id
-.I "src dest"
-.PP
-.B "worm write"
-[
-.BI -f device
-]
-.I vol_id
-[
-.I file ...
-]
-.PP
-.B "worm read"
-[
-.BI -f device
-] [
-.B -dm
-]
-.I vol_id
-[
-.I file ...
-]
-.PP
-.B "worm cat"
-[
-.BI -f device
-]
-.I vol_id
-.I file
-.PP
-.B "worm copy"
-[
-.B -v
-] [
-.BI -m min_free
-] [
-.BI -f src_dev
-]
-.I src_vol_id
-.I dest_dev
-.I dest_vol_id
-.PP
-.B "worm offline"
-[
-.BI -f device
-]
-.PP
-.B "worm btree"
-[
-.BI -f device
-]
-.I vol_id
-.PP
-.B "worm dir"
-[
-.BI -f device
-]
-.I vol_id
-.PP
-.B "worm tmpdir"
-[
-.BI -f device
-]
-.I vol_id
-.PP
-.B "worm mount"
-[
-.BI -w secs
-] [
-.I vol_id
-]
-.PP
-.B "jukebox"
-[
-.B -aemprsuU
-] [
-.BI -w secs
-] [
-.I vol_id
-]
-.SH DESCRIPTION
-The
-.I worm
-programs manipulate arbitrary files.
-They are intended for use with the raw device associated
-with a Write-Once Read-Many (WORM) optical disk.
-The default device is
-.FR /dev/worm0 .
-Other devices are specified by
-.BI -f device
-and a device name of a single digit
-.I n
-is taken as an abbreviation for
-.FR /dev/worm \f2n\fP.
-Most of the commands implement a simple file system.
-Programs just wanting a raw device should still use
-.B "worm mkfs"
-so that the disk is properly labeled.
-The
-.IR vol_id ,
-or label,
-should be unique and by convention, the vol_id's
-for the A and B sides of a disk should be the same string suffixed by
-a lowercase
-.B a
-and
-.B b
-respectively.
-.PP
-.I "Worm mkfs"
-labels an optical disk.
-The
-.I comments
-field is limited to 256 chars.
-It is purely descriptive and is printed by
-.IR "worm stat \-v" .
-The (default) blocksize is 1024 for our SONY disks.
-The number of blocks on a disk can be found by
-.IR ra (4)
-or
-.IR scsish (8);
-the default size
-(1,600,000 for single density, 3,250,000 for double density)
-sets aside 30MB or so as a hedge against oversights.
-If the disk has already been initialised, its vol_id must match
-.IR vol_id .
-A new vol_id can be set with
-.BR -v .
-.PP
-.I "Worm stat"
-prints out labeling information
-including the amount of free space left on the disk.
-Option
-.I vol_id
-turns off all output except exit status: zero if
-.I vol_id
-matches that of the disk,
-one otherwise.
-Option
-.B -F
-similarly exits with status zero if the disk has more than
-.I n
-free blocks, otherwise three.
-Option
-.B -v
-produces more output.
-.PP
-.I "Worm ls"
-simulates an emasculated
-.IR ls (1).
-.PP
-.I "Worm rm"
-makes the specifed files unavailable to the rest of the
-.I worm
-commands.
-.PP
-.I "Worm mv"
-renames
-.I src
-to
-.IR dest .
-.PP
-.I "Worm write"
-copies files onto the WORM.
-If no file arguments are given,
-filenames are read one per line from standard input.
-The total number of files and bytes is printed on standard output.
-.PP
-.I "Worm read"
-restores files from the WORM.
-If no file arguments are given,
-filenames are read one per line from standard input.
-Option
-.B -d
-causes directories to be created as needed.
-Option
-.B -m
-restores the original modification times.
-.PP
-.I "Worm cat"
-copies the named file from the WORM to the standard output.
-.PP
-.I "Worm copy"
-copies files directly from one disk to another.
-The names of the files to be copied are taken from standard input;
-groups (separated by blank lines) will be kept together.
-The names are typically generated by
-.BR "worm ls" .
-The
-.B -v
-option prints out progress and summary information.
-The copy will terminate before copying a group that would leave the destination
-volume with less than
-.I minfree
-(deafult value is 40000) blocks free.
-.PP
-.I "Worm offline"
-makes the WORM go offline, ready for ejecting.
-This command is harmless;
-accessing an offline drive will cause it to spin up and go online
-without operator intervention.
-.I "Worm offline"
-only takes effect after the last close of the WORM
-and as a bonus, applies to any MSCP device such as an RA81.
-.PP
-.I "Worm tmpdir"
-saves a copy of the directory in
-.BI /usr/worm/tmp/ vol_id
-if the directory
-.F /usr/worm/tmp
-exists.
-This will speed up subsequent access substantially,
-although it will still be slower than
-.I "worm btree"
-below.
-On the other hand,
-.I worm tmpdir
-typically takes 5 minutes to run (on a VAX 11/750)
-whereas
-.I worm btree
-takes about 45 minutes.
-.PP
-.I "Worm btree"
-constructs a new directory for the whole disk (in the form of a
-.IR cbt (1)
-database).
-The new superblock is at zero.
-All the worm commands go faster with such an index but it is intended to be done
-just once, after the disk is complete.
-The directory occupies of the order of 10MB but may be more.
-If you really have to add more files to the disk,
-you need to write zeros on the first 1K block of the WORM before using
-.IR "worm write" .
-.PP
-.I "Worm dir"
-takes the btree directory from the disk and stores in
-.FR /usr/worm/dirs .
-Future uses of the disk will be much faster.
-.PP
-.I "Worm mount"
-returns the device on which the disk labelled
-.I vol_id
-is mounted.
-If the drive(s) are busy and you have a jukebox, the
-.BI -w s
-option tells how many seconds to wait before failing.
-The default is wait forever.
-If no
-.I vol_id
-is given, print the drive status.
-.PP
-.I "Jukebox"
-manages the disks in the SONY jukebox.
-There are several options (default is
-.BR -s ):
-.TP 10
-.B -a
-Allocate a blank disk and label it
-.IR vol_id .
-Use
-.I "worm mkfs"
-to change any fields from their default value.
-.TP
-.B -e
-Eject the disk labeled
-.I vol_id.
-To physically retrieve the disk,
-press the
-.B OUT
-button (the
-.B "OUT READY"
-light should be on).
-Repeat until the
-.B "IN READY"
-light goes on.
-.TP
-.B -m
-Mount the disk labelled
-.I vol_id
-in some drive and print the drive number on standard output.
-.TP
-.B -p
-Print the list of disks in the jukebox.
-.TP
-.B -r
-Rebuild the list of disks by examining each disk in the jukebox.
-Do not do this unless you are sure you need to.
-If
-.I vol_id
-is given, it should be one of the following letters and governs
-how disks are assigned shelf numbers.
-The default is to leave the shelf number unchanged.
-Other options (mainly useful for demos) are
-.B c
-(compresses the disks in the jukebox towards the bottom or lower numbered shelves),
-.B r
-(distributes the disks randomly), and
-.B s
-(sorts the disks by vol_id).
-.TP
-.B -s
-Print the status of the jukebox.
-.TP
-.B -u
-Unload offline disks back onto their shelves.
-.TP
-.B -U
-Unload all disks (offline or not) back onto their shelves.
-.TP
-.BI -w secs
-This option only affects the behavior of
-.BR -m .
-If all drives are busy, try again for
-.I secs
-seconds before failing.
-.PP
-To load a disk into the jukebox, press the
-.B IN
-button on the jukebox when the
-.B "IN READY"
-light is on.
-After the shutter opens, push the disk in firmly.
-The disk (blank or initialised) is not examined immediately but on demand.
-.SS Etiquette
-Vol_ids should be unique as discussed above.
-The file
-.F /n/wild/usr/worm/vol_ids
-contains known vol_ids.
-The commands for reading and writing require vol_id's
-to guard against accessing the wrong disk.
-.PP
-The recommended protocol for changing disks is
-if no one appears to be using the drive
-(by using
-.IR ps (1)),
-execute
-.I "worm offline"
-and go to the drive.
-If, and only if, the drive has the DRIVE OFF (middle) light on,
-hit the EJECT button and change disks.
-If the light is not on, then
-someone is still using the disk and you should wait until they are done
-before hitting EJECT.
-.SS Programming considerations
-Programs should not depend on writing any block more than once; however,
-our SONY optical disks implement a small number of multiple writes
-via bad block replacement.
-A
-.IR read (2)
-of an unwritten block returns with an errno of
-.BR ENXIO .
-On Vaxes, the WORM is an MSCP device;
-thus geometry information can be fetched as in
-.IR ra (4).
-.PP
-For maximum speed, read and write in large blocks (preferably 63K)
-and avoid seeks.
-A seek across the whole disk takes about 1 second.
-.PP
-The device
-.F /dev/worm?
-is simply an appropriate raw
-.IR ra (4)
-device, partition 7 (the whole disk).
-.SH EXAMPLES
-.EX
-worm mkfs -c"512x512x24 movies" tdmoviesa
-worm write tdmoviesa < filenames
-worm read -d tdmoviesa bumblebee/act2/frame1
-.EE
-.SH FILES
-.F /dev/worm?
-.br
-.F /n/wild/usr/worm/vol_ids
-.br
-.F /n/wild/usr/worm/jukedir
-.SH SEE ALSO
-.IR backup (8),
-.IR scsish (8),
-.IR backup (1)
-.SH BUGS
-The output of
-.I "worm ls"
-is not necessarily sorted.
diff --git a/static/v10/man8/xs.8 b/static/v10/man8/xs.8
deleted file mode 100644
index 7c7339d2..00000000
--- a/static/v10/man8/xs.8
+++ /dev/null
@@ -1,63 +0,0 @@
-.TH XS 8
-.CT 1 sa_nonmortals
-.SH NAME
-xs \- checksums
-.SH SYNOPSIS
-.B xs
-[
--s
-]
-[
--k
-.I keystring
-]
-[
--f
-.I official-list
-]
-.IR file ...
-.SH DESCRIPTION
-.I Xs
-computes and reports
-checksums of named files,
-one report per line, in the form
-.IP
-filename s1 s2 s3 s4
-.LP
-where the checksum comprises four groups of four hex digits each.
-The checksum algorithm may be perturbed by specifying a
-.I keystring
-argument.
-The
-.B -s
-argument causes the file's mode, label, owner and group
-to enter into the checksum calculation.
-.PP
-The
-.B -f
-argument causes
-.I xs
-to verify checksums of files against
-values
-given
-in the
-.I official-list
-file, which has the format of the output of an earlier
-.I xs
-run:
-lines consisting of
-one file name followed by four groups of hex digits per line.
-Text after a
-.L #
-sign is ignored.
-.PP
-The checksum algorithm used is meant to be secure: to create a file
-whose checksum agrees with that of another given file is very difficult.
-.SH EXAMPLES
-.EX
-xs -s `find /bin -print` | xs /dev/stdin
-.EE
-.IP
-This should return a different value if
-.B /bin
-changes in any way.
diff --git a/static/v10/man8/xstr.8 b/static/v10/man8/xstr.8
deleted file mode 100644
index 681f2e2f..00000000
--- a/static/v10/man8/xstr.8
+++ /dev/null
@@ -1,108 +0,0 @@
-.TH XSTR 8
-.CT 1 prog_c
-.SH NAME
-xstr \- preprocessor for sharing strings in C programs
-.SH SYNOPSIS
-.B xstr
-[
-.B -c
-]
-[
-.B -
-]
-[
-.I file
-]
-.SH DESCRIPTION
-.I Xstr
-maintains a file
-.F strings
-into which strings in component parts of a large program are hashed.
-These strings are replaced with references to this common area.
-This serves to implement shared constant strings, most useful if they
-are also read-only.
-.PP
-The command
-.IP
-.L
-xstr -c name.c
-.PP
-will extract the strings from the named C source, replacing
-string references by expressions of the form
-.BI (&xstr[ number ])
-for some
-.I number.
-An appropriate declaration of
-.I xstr
-is prepended to the file.
-The resulting C text is placed in the file
-.BR x.c .
-The strings from this file are placed in the
-.F strings
-data base if they are not there already.
-Repeated strings and strings which are suffixes of existing strings
-do not cause changes to the data base.
-.PP
-After all components of a large program have been compiled a file
-.B xs.c
-declaring the common
-.I xstr
-space can be created by running
-.B xstr
-with no arguments.
-This
-.B xs.c
-file should then be compiled and loaded with the rest
-of the program.
-If possible, the array can be made read-only (shared) saving
-space and swap overhead.
-.PP
-Without option
-.BR -c ,
-creates files
-.I x.c
-and
-.I xs.c
-as before, but does not use or affect any
-.F strings
-file in the same directory.
-.PP
-It may be useful to run
-.I xstr
-after the C preprocessor if any macro definitions yield strings
-or if there is conditional code which contains strings
-which may not, in fact, be needed.
-.I Xstr
-reads from its standard input when the argument
-.L -
-is given.
-An appropriate command sequence for running
-.I xstr
-after the C preprocessor is:
-.IP
-.EX
-cc -E name.c | xstr -c -
-cc -c x.c
-mv x.o name.o
-.EE
-.SH FILES
-.TF /tmp/xs*
-.TP
-.F strings
-Data base of strings
-.TP
-.F x.c
-Massaged C source
-.TP
-.F xs.c
-C source for definition of array
-.L xstr
-.TP
-.F /tmp/xs*
-Temp file
-.SH BUGS
-If a string is a suffix of another string in the data base,
-but the shorter string is seen first by
-.I xstr
-both strings will be placed in the data base, when just
-placing the longer one there will do.