summaryrefslogtreecommitdiff
path: root/static/v10/man8
diff options
context:
space:
mode:
Diffstat (limited to 'static/v10/man8')
-rw-r--r--static/v10/man8/11.812
-rw-r--r--static/v10/man8/20boot.831
-rw-r--r--static/v10/man8/Makefile3
-rw-r--r--static/v10/man8/ac.856
-rw-r--r--static/v10/man8/acct.837
-rw-r--r--static/v10/man8/adduser.887
-rw-r--r--static/v10/man8/analyze.8117
-rw-r--r--static/v10/man8/apx.833
-rw-r--r--static/v10/man8/arcv.823
-rw-r--r--static/v10/man8/arff.864
-rw-r--r--static/v10/man8/asd.8174
-rw-r--r--static/v10/man8/atalla.862
-rw-r--r--static/v10/man8/authmgr.8204
-rw-r--r--static/v10/man8/backup.890
-rw-r--r--static/v10/man8/blmount.823
-rw-r--r--static/v10/man8/bproc.8235
-rw-r--r--static/v10/man8/check.850
-rw-r--r--static/v10/man8/chk.821
-rw-r--r--static/v10/man8/chown.847
-rw-r--r--static/v10/man8/chuck.8116
-rw-r--r--static/v10/man8/cl.8100
-rw-r--r--static/v10/man8/clri.841
-rw-r--r--static/v10/man8/config.848
-rw-r--r--static/v10/man8/cpp.8114
-rw-r--r--static/v10/man8/crash.8268
-rw-r--r--static/v10/man8/cron.886
-rw-r--r--static/v10/man8/dcheck.844
-rw-r--r--static/v10/man8/delivermail.8248
-rw-r--r--static/v10/man8/df.821
-rw-r--r--static/v10/man8/dist.8146
-rw-r--r--static/v10/man8/dkmgr.8165
-rw-r--r--static/v10/man8/dli.827
-rw-r--r--static/v10/man8/dmesg.864
-rw-r--r--static/v10/man8/downgrade.837
-rw-r--r--static/v10/man8/dump.894
-rw-r--r--static/v10/man8/dumpdir.838
-rw-r--r--static/v10/man8/expire.867
-rw-r--r--static/v10/man8/fsck.8248
-rw-r--r--static/v10/man8/fstat.849
-rw-r--r--static/v10/man8/gacct.822
-rw-r--r--static/v10/man8/gettable.865
-rw-r--r--static/v10/man8/getty.888
-rw-r--r--static/v10/man8/halt.821
-rw-r--r--static/v10/man8/htable.8116
-rw-r--r--static/v10/man8/icheck.8182
-rw-r--r--static/v10/man8/inews.893
-rw-r--r--static/v10/man8/init.8147
-rw-r--r--static/v10/man8/ino.810
-rw-r--r--static/v10/man8/ins.8103
-rw-r--r--static/v10/man8/install.834
-rw-r--r--static/v10/man8/ipconfig.8125
-rw-r--r--static/v10/man8/istat.835
-rw-r--r--static/v10/man8/kill.836
-rw-r--r--static/v10/man8/kmc.8107
-rw-r--r--static/v10/man8/ldpcs.858
-rw-r--r--static/v10/man8/login.8138
-rw-r--r--static/v10/man8/makekey.853
-rw-r--r--static/v10/man8/mkfs.8138
-rw-r--r--static/v10/man8/mknod.879
-rw-r--r--static/v10/man8/mkpkg.8179
-rw-r--r--static/v10/man8/mount.8153
-rw-r--r--static/v10/man8/netfs.8315
-rw-r--r--static/v10/man8/netstat.8100
-rw-r--r--static/v10/man8/nosh.8138
-rw-r--r--static/v10/man8/ns.8153
-rw-r--r--static/v10/man8/postbgi.8138
-rw-r--r--static/v10/man8/postio.8205
-rw-r--r--static/v10/man8/postreverse.897
-rw-r--r--static/v10/man8/postscript.8283
-rw-r--r--static/v10/man8/privserv.860
-rw-r--r--static/v10/man8/ps.877
-rw-r--r--static/v10/man8/pstat.8418
-rw-r--r--static/v10/man8/pwserv.877
-rw-r--r--static/v10/man8/quot.8135
-rw-r--r--static/v10/man8/rarepl.8115
-rw-r--r--static/v10/man8/rc.877
-rw-r--r--static/v10/man8/reboot.8127
-rw-r--r--static/v10/man8/recnews.824
-rw-r--r--static/v10/man8/reloc.845
-rw-r--r--static/v10/man8/renice.831
-rw-r--r--static/v10/man8/restor.8112
-rw-r--r--static/v10/man8/route.895
-rw-r--r--static/v10/man8/sa.8185
-rw-r--r--static/v10/man8/salv.886
-rw-r--r--static/v10/man8/savecore.883
-rw-r--r--static/v10/man8/scsish.8222
-rw-r--r--static/v10/man8/sendcover.828
-rw-r--r--static/v10/man8/sendnews.860
-rw-r--r--static/v10/man8/ship.8118
-rw-r--r--static/v10/man8/showq.856
-rw-r--r--static/v10/man8/shutdown.89
-rw-r--r--static/v10/man8/smash.843
-rw-r--r--static/v10/man8/smstat.824
-rw-r--r--static/v10/man8/smtp.8200
-rw-r--r--static/v10/man8/sticky.844
-rw-r--r--static/v10/man8/su.834
-rw-r--r--static/v10/man8/svcmgr.8331
-rw-r--r--static/v10/man8/swapon.837
-rw-r--r--static/v10/man8/swtmp.824
-rw-r--r--static/v10/man8/symorder.823
-rw-r--r--static/v10/man8/sync.818
-rw-r--r--static/v10/man8/syslog.8172
-rw-r--r--static/v10/man8/tcpmgr.873
-rw-r--r--static/v10/man8/tm.848
-rw-r--r--static/v10/man8/tp.8175
-rw-r--r--static/v10/man8/umount.831
-rw-r--r--static/v10/man8/unspk.843
-rw-r--r--static/v10/man8/upas.8275
-rw-r--r--static/v10/man8/update.825
-rw-r--r--static/v10/man8/uucico.8205
-rw-r--r--static/v10/man8/uucleanup.8103
-rw-r--r--static/v10/man8/uurec.818
-rw-r--r--static/v10/man8/vipw.823
-rw-r--r--static/v10/man8/vmstat.8143
-rw-r--r--static/v10/man8/vpac.849
-rw-r--r--static/v10/man8/wall.823
-rw-r--r--static/v10/man8/worm.8436
-rw-r--r--static/v10/man8/xs.863
-rw-r--r--static/v10/man8/xstr.8108
119 files changed, 11832 insertions, 0 deletions
diff --git a/static/v10/man8/11.8 b/static/v10/man8/11.8
new file mode 100644
index 00000000..ed079810
--- /dev/null
+++ b/static/v10/man8/11.8
@@ -0,0 +1,12 @@
+.TH 11 8
+.CT 1 prog_c
+.SH NAME
+11as, 11cc, 11ld, 11nm, 11ranlib, 11reloc, 11size, 11strip \- pdp11 support
+.SH DESCRIPTION
+These programs do cross-compiling and related support
+functions for the DEC PDP-11 family of computers.
+Their descriptions correspond closely with those of
+similarly named programs in Section 1 of this manual.
+.SH FILES
+.F 11a.out
+output file
diff --git a/static/v10/man8/20boot.8 b/static/v10/man8/20boot.8
new file mode 100644
index 00000000..893cb167
--- /dev/null
+++ b/static/v10/man8/20boot.8
@@ -0,0 +1,31 @@
+.pa 1
+.he '20BOOT (VIII)'1/25/73'20BOOT (VIII)'
+.ti 0
+NAME 20boot -- install new 11/20 system
+.sp
+.ti 0
+SYNOPSIS 20boot______ [ x_ ]
+.sp
+.ti 0
+DESCRIPTION This
+shell command file copies the current version
+of the 11/20 program used to run the VT01 display
+onto the /dev/vt0 file.
+
+If no argument is given, the 11/20 program should be executing
+but idle; the 11/20 program is sent preceded by a
+"reboot" command.
+If an argument is given, the 11/20 should
+have been restarted at its ROM location
+777300.
+.sp
+.ti 0
+FILES /dev/vt0;
+.br
+/sys/mdec/20.o (11/20 program)
+.sp
+.ti 0
+SEE ALSO vt0 (IV)
+.sp
+.ti 0
+DIAGNOSTICS --
diff --git a/static/v10/man8/Makefile b/static/v10/man8/Makefile
new file mode 100644
index 00000000..a2af6bc6
--- /dev/null
+++ b/static/v10/man8/Makefile
@@ -0,0 +1,3 @@
+MAN = $(wildcard *.8)
+
+include ../../mandoc.mk
diff --git a/static/v10/man8/ac.8 b/static/v10/man8/ac.8
new file mode 100644
index 00000000..1048aa19
--- /dev/null
+++ b/static/v10/man8/ac.8
@@ -0,0 +1,56 @@
+.TH AC 8
+.CT 1 sa_nonmortals
+.SH NAME
+ac \- login accounting
+.SH SYNOPSIS
+.B /etc/ac
+[
+.I option ...
+]
+[
+.I person ...
+]
+.SH DESCRIPTION
+.I Ac
+prints the total connect time
+recorded in the accounting file,
+.FR /usr/adm/wtmp .
+If
+.I persons
+are named, only those login names are considered.
+The options are
+.TP
+.BI -w " file"
+Use
+.I file
+instead of
+.FR /usr/adm/wtmp ;
+.L -
+means the standard input.
+.TP
+.B -p
+Print total connect time for each
+user.
+.TP
+.B -d
+Print totals for each day.
+.PP
+The accounting file
+.F /usr/adm/wtmp
+is maintained by
+.I init
+and
+.IR login (8),
+provided it exists.
+To start accounting, create it with length 0.
+When accounting is turned on, the file grows without limit.
+It is prudent periodically
+to process the data and truncate the file.
+.SH FILES
+.F /usr/adm/wtmp
+.SH "SEE ALSO"
+.IR init (8),
+.IR sa (8),
+.IR login (8),
+.IR utmp (5),
+.IR who (1)
diff --git a/static/v10/man8/acct.8 b/static/v10/man8/acct.8
new file mode 100644
index 00000000..fe5bebbc
--- /dev/null
+++ b/static/v10/man8/acct.8
@@ -0,0 +1,37 @@
+.pa 1
+.he 'ACCT (VIII)'1/20/73'ACCT (VIII)'
+.ti 0
+NAME acct -- login accounting
+.sp
+.ti 0
+SYNOPSIS acct____ [ -w__ wtmp ] [ -p__ ] [ -d__ ] people
+.sp
+.ti 0
+DESCRIPTION acct____
+produces a printout giving
+connect time
+for each user who has logged in
+during the life of the current wtmp____ file.
+A total is also produced.
+-w__ is used to specify an alternate wtmp file.
+-p__ prints individual totals; without this option,
+only totals are printed.
+-d__ causes a printout for each midnight to midnight
+period.
+The people______ argument will limit the
+printout to only the specified login names.
+If no wtmp file is given,
+/usr/adm/wtmp_____________
+is used.
+.sp
+.ti 0
+FILES /usr/adm/wtmp
+.sp
+.ti 0
+SEE ALSO init(VII), login(I), wtmp(V).
+.sp
+.ti 0
+DIAGNOSTICS "Cannot open 'wtmp'" if argument is unreadable.
+.sp
+.ti 0
+BUGS --
diff --git a/static/v10/man8/adduser.8 b/static/v10/man8/adduser.8
new file mode 100644
index 00000000..c22c10b1
--- /dev/null
+++ b/static/v10/man8/adduser.8
@@ -0,0 +1,87 @@
+.TH ADDUSER 8
+.UC 4
+.SH NAME
+adduser \- procedure for adding new users
+.SH DESCRIPTION
+A new user must choose a login name, which must not already appear in
+.I /etc/passwd.
+An account can be added by editing a line into the passwd file; this must
+be done with the password file locked e.g. by using
+.IR vipw (8).
+.PP
+A new user is given a group and user id.
+User id's should be distinct across a system, since they
+are used to control access to files.
+Typically, users working on
+similar projects will be put in the same group. Thus at UCB we have
+groups for system staff, faculty, graduate students, and a few special
+groups for large projects. System staff is group \*(lq10\*(rq for historical
+reasons, and the super-user is in this group.
+.PP
+A skeletal account for a new user \*(lqernie\*(rq would look like:
+.IP
+ernie::235:20:& Kovacs,508E,7925,6428202:/mnt/grad/ernie:/bin/csh
+.PP
+The first field is the login name \*(lqernie\*(rq. The next field is the
+encrypted password which is not given and must be initialized using
+.IR passwd (1).
+The next two fields are the user and group id's.
+Traditionally, users in group 20 are graduate students and have account
+names with numbers in the 200's.
+The next field gives information about ernie's real name, office and office
+phone and home phone.
+This information is used by the
+.IR finger (1)
+program.
+From this information we can tell that ernie's real name is
+\*(lqErnie Kovacs\*(rq (the & here serves to repeat \*(lqernie\*(rq
+with appropriate capitalization), that his office is 508 Evans Hall,
+his extension is x2-7925, and this his home phone number is 642-8202.
+You can modify the
+.IR finger (1)
+program if necessary to allow different information to be encoded in
+this field. The UCB version of finger knows several things particular
+to Berkeley \- that phone extensions start \*(lq2\-\*(rq, that offices ending
+in \*(lqE\*(rq are in Evans Hall and that offices ending in \*(lqC\*(rq are
+in Cory Hall.
+.PP
+The final two fields give a login directory and a login shell name.
+Traditionally, user files live on a file system which has the machines
+single letter
+.IR net (1)
+address as the first of two characters. Thus on the Berkeley CS Department
+VAX, whose Berknet address is ``csvax'' abbreviated ``v'' the user file
+systems are mounted on ``/va'', ``/vb'', etc.
+On each such filesystem there are subdirectories there for each group
+of users, i.e.: \*(lq/va/staff\*(rq and \*(lq/vb/prof\*(rq.
+This is not strictly necessary but keeps the number of files in the
+top level directories reasonably small.
+.PP
+The login shell will default to \*(lq/bin/sh\*(rq if none is given.
+Most users at Berkeley choose \*(lq/bin/csh\*(rq so this is usually
+specified here.
+.PP
+It is useful to give new users some help in getting started, supplying
+them with a few skeletal files such as
+.I \&.profile
+if they use \*(lq/bin/sh\*(rq, or
+.I \&.cshrc
+and
+.I \&.login
+if they use \*(lq/bin/csh\*(rq.
+The directory
+\*(lq/usr/skel\*(rq contains skeletal definitions of such files.
+New users should be given copies of these files which, for instance,
+arrange to use
+.IR tset (1)
+automatically at each login.
+.SH FILES
+.ta 2i
+/etc/passwd password file
+.br
+/usr/skel skeletal login directory
+.SH SEE ALSO
+passwd(1), finger(1), chsh(1), chfn(1), passwd(5), vipw(8)
+.SH BUGS
+User information should be stored in its own data base separate from
+the password file.
diff --git a/static/v10/man8/analyze.8 b/static/v10/man8/analyze.8
new file mode 100644
index 00000000..72c8769c
--- /dev/null
+++ b/static/v10/man8/analyze.8
@@ -0,0 +1,117 @@
+.lg 0
+.TH ANALYZE 8
+.UC 4
+.SH NAME
+analyze \- Virtual UNIX postmortem crash analyzer
+.SH SYNOPSIS
+.B /etc/analyze
+[
+.B \-s
+swapfile
+] [
+.B \-f
+] [
+.B \-m
+] [
+.B \-d
+] [
+.B \-D
+] [
+.B \-v
+]
+corefile
+[ system ]
+.SH DESCRIPTION
+.I Analyze
+is the post-mortem analyzer for the state of the paging system.
+In order to use
+.I analyze
+you must arrange to get a image of the memory (and possibly the
+paging area) of the system after it crashes (see
+.IR crash (8)).
+.PP
+The
+.I analyze
+program reads the relevant system data structures from the core
+image file and indexing information from
+.B /vmunix
+(or the specified file).
+to determine the state of the paging subsystem at the point of crash.
+It looks at each process in the system, and the resources each is
+using in an attempt to determine inconsistencies in the paging system
+state. Normally, the output consists of a sequence of lines showing
+each active process, its state (whether swapped in or not), its
+.I p0br,
+and the number and location of its page table pages.
+Any pages which are locked while raw i/o is in progress, or which
+are locked because they are
+.I intransit
+are also printed. (Intransit text pages often diagnose as duplicated;
+you will have to weed these out by hand.)
+.PP
+The program checks that any pages in core which are marked as not
+modified are, in fact, identical to the swap space copies.
+It also checks for non-overlap of the swap space, and that the core
+map entries correspond to the page tables.
+The state of the free list is also checked.
+.PP
+Options to
+.I analyze:
+.TP
+.B \-D
+causes the diskmap for each process to be printed.
+.TP
+.B \-d
+causes the (sorted) paging area usage to be printed.
+.TP
+.B \-f
+which causes the free list to be dumped.
+.TP
+.B \-m
+causes the entire coremap state to be dumped.
+.TP
+.B \-v
+(long unused) which causes a hugely verbose output format to be used.
+.PP
+In general, the output from this program can be confused by processes
+which were forking, swapping, or exiting or
+happened to be in unusual states when the
+crash occurred. You should examine the flags fields of relevant processes
+in the output of a
+.IR pstat (8)
+to weed out such processes.
+.PP
+It is possible to look at the core dump with
+.I adb
+if you do
+.IP
+adb /vmunix /vmcore
+.br
+.lg 0
+/m 80000000 #ffffffff
+.LP
+which fixes the map of
+.I vmcore
+so that symbols in data space will work.
+Note that the debugger is looking at the physical memory at the point
+of crash; you will have to determine which pages of physical memory
+virtual pages are in if you wish to look at them.
+If
+.I analyze
+says that a processes page tables are in page 218 (hex of course), then
+you can look at them by looking at address 0x80043000 in the dump, i.e.
+\*(lq80043000,80/X\*(rq will print the page of page tables.
+.SH FILES
+/vmunix default system namelist
+.SH SEE ALSO
+ps(1), crash(8), pstat(8)
+.SH AUTHORS
+Ozalp Babaoglu and William Joy
+.SH DIAGNOSTICS
+Various diagnostics about overlaps in swap mappings, missing swap mappings,
+page table entries inconsistent with the core map, incore pages which
+are marked clean but differ from disk-image copies, pages which are
+locked or intransit, and inconsistencies in the free list.
+.PP
+It would be nice if this program analyzed the system in general, rather
+than just the paging system in particular.
diff --git a/static/v10/man8/apx.8 b/static/v10/man8/apx.8
new file mode 100644
index 00000000..3d2cd296
--- /dev/null
+++ b/static/v10/man8/apx.8
@@ -0,0 +1,33 @@
+.TH APX 8
+.CT 1 sa_nonmortals secur
+.SH NAME
+apx \- mark an open stream device trusted
+.SH SYNOPSIS
+.B /etc/apx
+[
+.I arg
+]
+.SH DESCRIPTION
+By default, a freshly opened stream device has the
+.B APX
+bit cleared: it will reject all pex requests.
+If invoked without an argument,
+.I apx
+will set the APX bit on its standard input
+(by calling the
+.B FIOAPX
+control).
+If invoked without an argument the
+.B APX
+bit is cleared.
+.I Apx
+needs licence
+.B T_EXTERN
+to run.
+It is usually automatically invoked at login time,
+provided that the source identifier of the standard input
+of the login session is worthy.
+.SH FILES
+.F /etc/privs
+.SH SEE ALSO
+.IR pex (4)
diff --git a/static/v10/man8/arcv.8 b/static/v10/man8/arcv.8
new file mode 100644
index 00000000..a55ac199
--- /dev/null
+++ b/static/v10/man8/arcv.8
@@ -0,0 +1,23 @@
+.TH ARCV 8
+.UC 4
+.SH NAME
+arcv \- convert archives to new format
+.SH SYNOPSIS
+.B /etc/arcv
+file ...
+.SH DESCRIPTION
+.I Arcv
+converts archive files
+(see
+.IR ar (1),
+.IR ar (5))
+from 32v and Third Berkeley editions to a new portable format.
+The conversion is done in place, and the command
+refuses to alter a file not in old archive format.
+.PP
+Old archives are marked with a magic number of 0177545 at the start;
+new archives have a first line ``!<arch>''.
+.SH FILES
+/tmp/v*, temporary copy
+.SH SEE ALSO
+ar(1), ar(5)
diff --git a/static/v10/man8/arff.8 b/static/v10/man8/arff.8
new file mode 100644
index 00000000..4f082533
--- /dev/null
+++ b/static/v10/man8/arff.8
@@ -0,0 +1,64 @@
+.TH ARFF 8
+.CT 1 sa_nonmortals
+.SH NAME
+arff \- read RT11 files
+.SH SYNOPSIS
+.B arff
+[
+.I key
+]
+[
+.I name ...
+]
+.SH DESCRIPTION
+.I Arff
+reads and writes files
+on an RT11 volume,
+such as the VAX-11/780 console floppy or
+11/750 console tape.
+Its actions are controlled by the
+.I key
+argument, in the manner of
+.IR ar (1).
+Other arguments
+are the names of files
+to be read or written.
+.PP
+The RT11 filesystem restricts names to the character set
+.BR a - z0 - 9.\| ,
+and there are no subdirectories.
+Filename arguments are trimmed to the last pathname element
+and mapped to lower case.
+.PP
+The key must contain one of the letters
+.LR rxdt ,
+which mean the same as in
+.I ar.
+Unlike
+.I ar,
+however,
+.I arff
+may reorder files to fit without moving existing files.
+.PP
+Other key letters are
+.TP
+v
+Verbose.
+.TP
+.B f
+The next argument is the name of the archive instead
+of the default
+.FR /dev/floppy .
+.TP
+.B m
+Omit the DEC-standard sector interleaving algorithm;
+needed when the file isn't a floppy;
+e.g. the 11/750 console cassette.
+.SH FILES
+.F /dev/floppy
+.SH BUGS
+Floppy errors are handled ungracefully.
+.br
+The program is too floppy-dependent.
+Mapping belongs in the device driver,
+or at least shouldn't be the default.
diff --git a/static/v10/man8/asd.8 b/static/v10/man8/asd.8
new file mode 100644
index 00000000..1bf1ff51
--- /dev/null
+++ b/static/v10/man8/asd.8
@@ -0,0 +1,174 @@
+.TH ASD 8
+.CT 1 sa_auto
+.SH NAME
+asd \- automatic software distribution
+.SH SYNOPSIS
+.B /usr/lib/asd/cdaemon
+.br
+.B /usr/lib/asd/dkinstall
+.br
+.B /usr/lib/asd/mkspool
+.br
+.B /usr/lib/asd/rmlocks
+.br
+.B /usr/lib/asd/udaemon
+.SH DESCRIPTION
+These programs constitute the innards of the
+automatic software distribution system
+invoked by
+.IR ship (8).
+.PP
+.I Mkspool
+creates an
+.SM ASD
+spool directory for its invoker (if necessary),
+puts a file named
+.F dummy
+in the directory to prevent
+.I cdaemon
+from deleting it,
+and prints the directory's name.
+.PP
+.I Udaemon
+examines its invoker's
+.SM ASD
+spool directory in lexical order
+for things to do.
+To forestall multiple daemons, it first makes an empty file named
+.BI L. pid
+in the spool directory
+and tries to link to it a file
+.FR lock .
+If the link fails,
+.BI L. pid
+is removed and
+.I udaemon
+exits.
+.PP
+Shipping instructions
+appear in pairs of files with
+.B .s
+and
+.B .d
+suffixes.
+.I Udaemon
+examines each status
+.RB ( .s )
+file for destination names and
+places a network call
+to send the corresponding data
+.RB ( .d )
+file to
+.I dkinstall
+at each destination.
+.I Dkinstall
+verifies the data
+and gives it to
+.IR inspkg ,
+see
+.IR mkpkg (8).
+.PP
+A status file contains
+zero or more entries,
+each of which has one or more lines.
+The first line of an entry is a
+network address,
+with default network
+.B dk
+and default service
+.BR asd ,
+possibly followed by a blank and a failure report.
+An entry with destination
+.L #
+is a comment and is ignored.
+Lines after the first begin with
+a tab,
+and contain output generated by the entry.
+If an entry has output,
+it is considered complete
+and will be processed no further.
+.PP
+.I Udaemon
+scans each status file once,
+and attempts to send the corresponding data file to the destination
+for each incomplete entry.
+If the attempt fails,
+a failure report is appended to the entry,
+and it remains incomplete.
+If the attempt succeeds,
+or the failure is severe,
+an error message
+or output from
+.I dkinstall
+is appended to the entry,
+which makes the entry complete.
+If an entry is completed successfully
+but there are no output lines,
+the entry is deleted.
+.PP
+Each instance of
+.I udaemon
+remembers which network addresses failed with non-severe errors;
+entries with the same address in later status files
+are given failure status `deferred for sequence.'
+.PP
+If at least one additional entry was completed,
+.I udaemon
+sends the new status file to the owner by
+.IR mail (1)
+after the whole file has been scanned.
+If no incomplete entries remain,
+both status and data files are removed.
+.PP
+.I Cdaemon
+examines every subdirectory of
+.FR /usr/spool/asd ,
+deletes empty directories and, impersonating the owner,
+invokes
+.I udaemon
+for nonempty directories.
+.I Cdaemon
+should be run regularly by
+.IR cron (8)
+with super-user permissions.
+.PP
+.IR Rmlocks
+removes all lock files in
+subdirectories of
+.FR /usr/spool/asd .
+It should be called from
+.IR rc (8).
+.PP
+Entries in an
+.SM ASD
+spool directory may be made without regard to locks
+provided that everything is done in the right
+sequence:
+(1) call
+.IR mkspool ;
+(2) create the data file;
+(3) create the status file under a temporary name;
+(4) rename the status file to end with
+.BR .s ;
+(5) remove the
+.F dummy
+file, if present; and
+(6) call
+.IR udaemon .
+.PP
+Because
+.I mail
+will not send an empty file,
+a status file must have a comment entry if
+acknowledgment is desired after a
+successful
+.I udaemon
+run.
+.SH FILES
+.BI /usr/spool/asd/ "userid "
+user's
+.SM ASD
+spool directory
+.SH SEE ALSO
+.IR mkpkg (8),
+.IR ship (8)
diff --git a/static/v10/man8/atalla.8 b/static/v10/man8/atalla.8
new file mode 100644
index 00000000..3e73746e
--- /dev/null
+++ b/static/v10/man8/atalla.8
@@ -0,0 +1,62 @@
+.TH ATALLA 8
+.SH NAME
+atalla \- initializing a challenge box
+.SH DESCRIPTION
+It is easiest to initialize an Atalla
+(a.k.a. SNK) box at the same time you use the
+.B -c
+option of
+.IR pwx ,
+before you hand it to the user, not in the user's presence.
+To initialize the box:
+freak it out by giving five consecutive wrong PIN entries, for example by
+pushing the sequence
+.B ON
+.B 0
+.B ENTER
+five times.
+The box's display should now read
+.BR "ES0 ----" ,
+you push
+.B 1
+.BR ENTER .
+The display now reads
+.BR "ES1 ----" ,
+you now enter eight bytes of secret key, which you may ask
+.I pwx
+to invent, and which the user will not know.
+Each byte is represented by three octal digits, in the range
+.B 000
+through
+.BR 277 ,
+so it takes 24 key strokes to enter the secret key.
+Now push
+.BR ENTER ,
+and a check sum of form
+.B "C xxxxxxxx"
+is displayed.
+Push
+.B ENTER
+again
+and another check sum is displayed,
+this time of form
+.BR "F xxxxxxxx" .
+Push
+.B ENTER
+yet again
+and
+the display reads
+.BR "EP1 ----" .
+At this point the box may be handed to the user.
+The user enters a personal password (his ``PIN'')
+of 4 through 8 digits' length,
+followed by
+.BR ENTER ,
+and again, as a check.
+Thereafter the user must
+type his personal password whenever he uses the box.
+Instruct the user not to divulge his personal password, and
+promise the user you will not divulge
+his secret key.
+.SH SEE ALSO
+.IR passwd (1)
diff --git a/static/v10/man8/authmgr.8 b/static/v10/man8/authmgr.8
new file mode 100644
index 00000000..a20c22e2
--- /dev/null
+++ b/static/v10/man8/authmgr.8
@@ -0,0 +1,204 @@
+.TH AUTHMGR 8
+.CT 1 sa_auto secur
+.SH NAME
+authmgr \- authenticate users and make secure calls
+.SH SYNOPSIS
+.B authmgr
+.BI [ "options ..." ]
+.SH DESCRIPTION
+.I Authmgr
+receives authentication requests from the network via
+.IR svcmgr (8),
+authenticates the requesting user, and redials their
+call using one of the network interfaces, such as
+.IR dkmgr (8).
+The actual method used to authenticate the user depends
+on the command line arguments and the environment at the
+time
+.I authmgr
+is executed.
+.PP
+One mode is used when a user connects directly to the authentication
+service.
+In this mode, the user is asked to enter a login name (unless
+there is a login name present in the CSOURCE environment variable).
+The user is then challenged to encode some character string with
+their challenge box (or possibly just enter their password), and
+enter this as a response.
+If the response is correct (i.e. the user had the correct encryption
+key or password), the user is asked to enter the name of a new
+destination, and the call is redialed to this new destination.
+.PP
+The other mode is used when a call to a service using the V9 authentication
+protocol is rerouted through the authentication server (this is currently
+only possible if the call was placed over the datakit, through a trunk).
+In this case, the authentication server uses an extension of the "OK"/"NO"
+protocol used by
+.IR con (1).
+Here,
+.I authmgr
+responds to a connection with a string ``CH''.
+The calling program should prompt the user for a login name, and
+send that login back, followed by a newline.
+.I Authmgr
+responds with a challenge string, up to 60 characters long, followed
+by a newline (the challenge will be printable ASCII).
+The calling process must encode this string (unless it is blank; then
+it should obtain the user's password), and send this response back, also
+terminated by a newline.
+If the response is correct, the "OK"/"NO" protocol continues as
+normal (that is, the call is automatically redialed by the server
+without further intervention); otherwise, the "CH" challenge is
+repeated.
+.PP
+The options are
+.TP
+.B -n
+Do not prompt the user for a new destination, even if we don't have
+one already.
+This option is useful for authenticating an entire host (or a
+powerful terminal) as one user.
+The call will automatically be redialed in a special way.
+.TP
+.BI -f file
+Use
+.I file
+as the configuration file rather than the default.
+.PP
+When a call is redialed, the security ID of the new call is that
+of the authentication server itself, rather than the original security ID.
+.PP
+Much of the operation of the server is keyed off its configuration
+file. Each line in the file contains an initial keyword, followed
+by a number of arguments (there are no continuation lines), a line
+starting with a ``#'' is a comment. The various keywords are:
+.TP
+.BI admin " address ..."
+This defines the names of the administrators of the authentication server.
+The addresses (up to 10 may be specified) are the electronic mail
+addresses of the administrators. These names will received mail
+if the server detects a possibly security violation.
+.TP
+.BI failures " number"
+This sets the maximum number of failures to allow an individual
+instantiation of
+.I authmgr
+before the connection is closed and the administrators are notified.
+The default is 3.
+.TP
+.BI disallow " login"
+Defines a login name that may not authenticate itself, even if it
+exists in the keys file.
+Any number of
+.B disallow
+lines may appear in the configuration file.
+.TP
+.BI usepasswd " regexp"
+Tells
+.I authmgr
+that despite what the key file says, if the source of this call
+matches
+.IR regexp ,
+the user should be requested to enter their password from the
+/etc/passwd file, rather than doing some kind of key encryption.
+This is useful when
+.I authmgr
+is being used for authentication inside a trusted network, and
+using encryption boxes would be too cumbersome.
+.TP
+.BI setuser " regexp user"
+Map all calls from machines matching
+.IR regexp
+to
+.IR user .
+If the
+.I user
+field is empty, prompt for the login name. This can be useful
+for calls coming from untrusted machines.
+.TP
+.BI setsvc " regexp service"
+If a call comes from a machine matching
+.IR regexp ,
+set the default service of the redialed call to
+.IR service .
+.TP
+.BI setlog " regexp file"
+Log calls from machines matching
+.I regexp
+in
+.IR file .
+.TP
+.BI secmapid " regexp securityid"
+If the security ID of the incoming call matches
+.I regexp
+(in the format of
+.IR regexp (3))
+the outgoing security ID will be
+.IR securityid .
+There must be at least one
+.B secmapid
+lines in the configuration file, that of the default (``.*'')
+outgoing security ID.
+Because of the way the security ID mappings are stored, any
+mappings that contain wildcards should appear after those without;
+the mappings are tried against an incoming security ID in top-down
+order (this implies that the default mapping should appear last).
+.PP
+The keys are stored in a key file.
+Each line in the key file is of the form
+.RS
+.sp
+login:keytype:key encoding:
+.sp
+.RE
+Login is a usual login name.
+Keytype is the type of the key (more than one encryption box type
+are supported by
+.IR authmgr ).
+The key encoding is the key for this user; this encoding differs
+depending on the keytype.
+Currently, two key types recognized.
+One is
+.BR atalla ,
+for the Atalla Confidante style key (the key encoding for this
+type is 8 groups of octal numbers between 0 and 0377, specifying the DES
+key kept in this box, for example ``010 342 176 214 212 101 414 527'').
+The other is
+.BR passwd ,
+which means the key encoding is a standard password file 13 character
+password entry (if the key encoding is blank,
+.I authmgr
+look in the password file for the password).
+Because these keys are stored
+in the clear, this file should be well protected, and probably
+should be encrypted.
+.PP
+Currently, the authentication server may be connected to at the
+service point ``security'' on the security host.
+If you use the service ``gsecurity'', you get the no-redial
+option of the server.
+.SH FILES
+.nf
+.F /usr/net/authmgr.conf
+.F /usr/net/authmgr.keys
+.F /etc/passwd
+.fi
+.SH "SEE ALSO"
+.IR con (1),
+.IR regexp (3),
+.IR svcmgr (8),
+.IR dkmgr (8)
+.SH BUGS
+There is currently no support for encrypting the keys file.
+.br
+The only current use for this is over the datakit, and the
+regular expressions in the secmapid line are not of the same
+format as would be expected for wildcard datakit names.
+.br
+Users will still have to enter a login and password if the
+service they redial doesn't believe
+.IR authmgr .
+.br
+The
+.I secmapid
+parameter is currently ignored.
diff --git a/static/v10/man8/backup.8 b/static/v10/man8/backup.8
new file mode 100644
index 00000000..793f463e
--- /dev/null
+++ b/static/v10/man8/backup.8
@@ -0,0 +1,90 @@
+.TH BACKUP 8
+.CT 1 sa_nonmortals
+.SH NAME
+backup \- backup client administration
+.SH SYNOPSIS
+.B /usr/lib/backup/sel
+.PP
+.B /usr/lib/backup/fcheck
+.I maxsize
+.I maxdays
+.I files ...
+.PP
+.B /usr/lib/backup/act
+[
+.I stat
+]
+.SH DESCRIPTION
+These programs select and back up files
+to the incremental file backup system,
+.IR backup (1).
+.PP
+.I Sel
+prints on the standard output
+a list of filenames that might need to be backed up.
+The initial version
+picks out files that have been changed in the past few days,
+skipping huge files
+and eliding boring names like
+.BR core .
+.I Sel
+is a shell script;
+the local administrator is expected to customize it.
+.PP
+.I Fcheck
+is a fast,
+specialized file scanning program,
+used by
+.IR sel .
+It examines each of the
+.IR files ,
+descending into directories,
+and prints the name of each file
+that has been changed in the last
+.I maxdays
+days and is smaller than
+.I maxsize
+kilobytes.
+Symbolic links are followed when presented as arguments,
+examined but not followed otherwise.
+.PP
+.I Act
+reads a list of filenames from the standard input.
+It searches the backup database
+.IR backup (5)
+for the current version of each file,
+and backs up files that aren't registered.
+.PP
+By default,
+.I act
+sends errors by
+.IR mail (1)
+to user
+.BR backup .
+If the
+.I stat
+argument is non-empty,
+errors and additional comforting chatter
+are printed on the standard output instead.
+.PP
+One way to request automatic backups is to run
+.IP
+.L
+/usr/lib/backup/sel | /usr/lib/backup/act
+.LP
+regularly from
+.IR cron (8).
+Particular files may be backed up by hand at any time
+by running
+.I act
+with a list of filenames.
+There are no special permissions involved;
+any user may run
+.IR act .
+.SH SEE ALSO
+.IR backup (1),
+.IR backup (5)
+.br
+A. Hume, `The File Motel: An Owner's Manual',
+this manual,
+Volume 2
diff --git a/static/v10/man8/blmount.8 b/static/v10/man8/blmount.8
new file mode 100644
index 00000000..de9f167e
--- /dev/null
+++ b/static/v10/man8/blmount.8
@@ -0,0 +1,23 @@
+.TH BLMOUNT 8
+.CT 1 sa_nonmortals
+.SH NAME
+blmount \- mark directories blind
+.SH SYNOPSIS
+.B /etc/blmount
+[
+.B -u
+]
+.I directory
+.SH DESCRIPTION
+.I Blmount
+without options
+mounts the named directory on itself as a blind file system
+.IR bl (4) .
+With option
+.BR -u ,
+the treatment is reversed.
+The
+.I directory
+must be on a traditional (disk) file system.
+.SH SEE ALSO
+.IR bl (4)
diff --git a/static/v10/man8/bproc.8 b/static/v10/man8/bproc.8
new file mode 100644
index 00000000..fd4f5a77
--- /dev/null
+++ b/static/v10/man8/bproc.8
@@ -0,0 +1,235 @@
+.pa 1
+.he 'BOOT PROCEDURES (VIII)'2/6/73'BOOT PROCEDURES (VIII)'
+.ti 0
+NAME bos, maki, vcboot, msys, et__ al__.
+.sp
+.ti 0
+DESCRIPTION
+.br
+.in 8
+On
+the RF disk, the highest 16K words are
+reserved for stand-alone programs.
+These 16K words are allocated as follows:
+.sp
+bos (1K)
+.br
+Warm UNIX (7K)
+.br
+Cold UNIX (8K)
+.sp
+The program bos___ (Bootstrap Operating System)
+examines the console switches and executes
+one of several internal programs depending on the setting.
+The following settings are currently recognized:
+.sp
+.in +8
+.ti -8
+??? Will read Warm UNIX from
+the RF into core location 0 and transfer to 600.
+.sp
+.ti -8
+1 Will read Cold UNIX from the
+RF into core location 0 and transfer to 600.
+.sp
+.ti -8
+10 Will dump all of memory
+from core location 0 onto DECtape drive 7
+and then halt.
+.sp
+.ti -8
+20 Will read 256 words from RK0 into
+core 0 and transfer to zero.
+This is the procedure to boot
+DOS from an RK.
+.sp
+.ti -8
+40 This is the same as 10 above, but
+instead of halting, UNIX warm is loaded.
+.sp
+.ti -8
+0 Will load a standard UNIX binary paper tape
+into core location 0 and transfer to 0.
+.sp
+.ti -8
+77500 Will load the standard DEC absolute and binary
+loaders and transfer to 77500.
+.sp
+.in 8
+All manual methods of booting the system involve
+manipulation of the console switches.
+In order for this to be possible,
+the panel must be unlocked
+and the machine must be halted.
+Also, remember that at the time UNIX comes up,
+the console switches must contain 773030
+for a single-user system; anything else gives
+a multi-user system.
+
+There are four temperatures of boots.
+They are:
+
+.in +4
+Hot boot: restart the system without refreshing
+its code, that is simply by transferring to
+its start.
+The only use for this procedure is if the
+system has been patched and one doesn't wish
+to redo the patches.
+The procedure is:
+
+ 600 in switches
+ Load address
+ (773030 in switches for single-user system)
+ start
+
+Warm boot: refresh system code from the RF disk, but
+the "panic" routine must be in core.
+Best for general use if it works, since
+outstanding I/O
+is cleaned up.
+Procedure:
+
+ 602 in switches
+ load address
+ (773030 in switches for single-user system)
+ start (flushes any I/O, then executes bos___)
+
+Cool boot: RF disk is OK, but nothing in core.
+Procedure:
+
+ UTIL DECtape on drive 0
+ 773030 in switches
+ load address
+ (602 in switches for multi-user system)
+ start
+ type "boot" on console tty to load bos___
+
+Cold boot: nothing in core, nothing on RF.
+Best to have an expert around for this
+one.
+Procedure:
+
+ INIT DECtape on drive 0
+ 773030 in switches
+ load address
+ 1 in switches
+ start
+ (machine halts. last chance to preserve RF!)
+ 773030 in switches
+ continue
+ (reads in basic files)
+
+UNIX is then up, but for various reasons, one should
+do a warm boot (single user) right away.
+At this point also, one might
+consider whether the INIT tape UNIX is the
+latest version.
+If there is reason for doubt,
+mount the /sys disk pack, change to directory
+/sys/sys, do "msys u unix", and reboot.
+Then get the /bin-/etc-/lib tape which contains
+the rest of of the RF disk,
+and do an "mt x".
+Conceivably, "create errors" due to lack of some
+directories will occur; make the directories,
+then try again.
+Set the date correctly; the system starts off
+at time 0.
+
+At this point UNIX is in full operation and
+can be rebooted for
+a multi-user system.
+.sp
+.in 8
+Here is what happens during a cold boot:
+the INIT tape contains a program called
+.ul
+vcboot.
+The ROM program reads vcboot
+from the tape into
+core location 0 and transfers to it.
+vcboot then reads 16K words from
+the DECtape (blocks 1-32)
+and copies the data to the highest 16K words of
+the RF.
+Thus this initializes the read-only part of the RF.
+vcboot then reads in bos___ and executes it.
+bos___ reads in Cold UNIX and executes that.
+Cold UNIX halts for a last chance before
+it completely initializes the RF file system.
+When continue is pressed,
+Cold UNIX initializes the RF.
+It then reads the DECtape for initialization files
+starting from block 33.
+Normal operation then commences
+with the execution of "/etc/init".
+.sp
+The INIT tape is made by the program maki____
+running under UNIX.
+maki____ writes vcboot______ on block 0 of
+.ul
+/dev/tap7.
+It then copies the RF 16K words (using
+.ul
+/dev/rf0)
+onto blocks 1 thru 32.
+It has internally a list of files to
+be copied from block 33 on.
+This list follows:
+.sp
+.nf
+.in +8
+/etc/init
+/bin/chmod
+/bin/date
+/bin/login
+/bin/ls
+/bin/mkdir
+/etc/mount
+/bin/sh
+/bin/tap
+/bin/mt
+.in -8
+.fi
+.sp
+Thus this is the set of programs available after a cold boot.
+init____ and sh__ are mandatory.
+For multi-user UNIX,
+getty_____ and login_____ are also necessary.
+mkdir_____ is necessary due to a bug in tap___.
+mt__, tap___ and mount_____ are useful to
+bring in new files.
+As soon as possible, date____ should be done.
+That leaves ls__ and chmod_____ as frosting.
+.sp
+The last link in this incestuous
+daisy chain is the program msys____.
+.sp
+ msys____ char file
+.sp
+will copy the file file____ onto the
+RF read only slot specified by the character char____.
+Char is taken from the following set:
+.sp
+ b_ bos
+ u_ Warm UNIX
+ 1_ Cold UNIX
+.sp
+.in 16
+.ti 0
+FILES /dev/rf0,
+/dev/tap?
+.sp
+.ti 0
+SEE ALSO init(VII),
+tap(I),
+sh(I),
+mkdir(I)
+.sp
+.ti 0
+DIAGNOSTICS --
+.sp
+.ti 0
+BUGS This
+section is very configuration dependent.
diff --git a/static/v10/man8/check.8 b/static/v10/man8/check.8
new file mode 100644
index 00000000..9f6e030b
--- /dev/null
+++ b/static/v10/man8/check.8
@@ -0,0 +1,50 @@
+.pa 1
+.he 'CHECK (VIII)'1/20/73'CHECK (VIII)'
+.ti 0
+NAME check -- file system consistency check
+.sp
+.ti 0
+SYNOPSIS check_____ [ filesystem [ blockno918 ... ] ]
+.sp
+.ti 0
+DESCRIPTION check_____
+will examine a file system,
+build a bit map of used blocks,
+and compare this bit map against
+the bit map maintained on the file system.
+If the file system is not specified,
+a check of all
+of the normally mounted file systems
+is performed.
+Output includes the number of files on the file system,
+the number of these that are 'large', the number
+of indirect blocks,
+the number
+of used blocks, and the number of free blocks.
+.sp
+check_____ works by examining the i-nodes
+on the file system and is entirely
+independent of its directory hierarchy.
+The file system may be,
+but need not be, mounted.
+
+.ti 0
+FILES /dev/rf?,
+/dev/rk?,
+/dev/rp?
+.sp
+.ti 0
+SEE ALSO find(I), ds(I)
+.sp
+.ti 0
+DIAGNOSTICS Diagnostics are produced for
+blocks missing, duplicated, and bad block addresses.
+Diagnostics are also produced for block numbers passed as parameters.
+In each case, the block number, i-number, and
+block class (i_ = inode, x_ indirect, f_ free) is printed.
+.sp
+.ti 0
+BUGS The
+checking process is two pass in nature.
+If checking is done on an active file system,
+extraneous diagnostics may occur.
diff --git a/static/v10/man8/chk.8 b/static/v10/man8/chk.8
new file mode 100644
index 00000000..54114b62
--- /dev/null
+++ b/static/v10/man8/chk.8
@@ -0,0 +1,21 @@
+.pa 1
+.he 'CHK (VIII)'1/20/73'CHK (VIII)'
+.ti 0
+NAME chk -- check + dcheck
+.sp
+.ti 0
+SYNOPSIS chk
+.sp
+.ti 0
+DESCRIPTION This
+command file does a check_____ and a dcheck______ of all of the normally mounted
+file systems.
+.sp
+.ti 0
+FILES /dev/[fkp]*
+.sp
+.ti 0
+SEE ALSO check (VIII), dcheck (VIII)
+.sp
+.ti 0
+DIAGNOSTICS see "SEE ALSO"
diff --git a/static/v10/man8/chown.8 b/static/v10/man8/chown.8
new file mode 100644
index 00000000..ba114a64
--- /dev/null
+++ b/static/v10/man8/chown.8
@@ -0,0 +1,47 @@
+.TH CHOWN 8
+.CT 1 sa_nonmortals secur
+.SH NAME
+chown \- change owner or group
+.SH SYNOPSIS
+.B /etc/chown
+.IB owner , group
+.I file ...
+.SH DESCRIPTION
+.I Chown
+changes the owner of the
+.I files
+to
+.I owner
+and the groupid to
+.IR group .
+Either
+.I owner
+or
+.I group
+may be omitted
+to leave the owner or groupid unchanged.
+.PP
+.I Owner
+may be either a decimal userid or
+a login name found in
+.FR /etc/passwd .
+.I Group
+may be either a decimal groupid or
+a group name found in
+.FR /etc/group .
+.PP
+The owner of a file
+may change its group
+to that of the current process.
+Other changes are restricted to the super-user.
+.SH FILES
+.F /etc/passwd
+.br
+.F /etc/group
+.SH "SEE ALSO"
+.I chown
+in
+.IR chmod (2),
+.IR passwd (5),
+.IR chmod (1),
+.IR chdate (1)
diff --git a/static/v10/man8/chuck.8 b/static/v10/man8/chuck.8
new file mode 100644
index 00000000..087b6d50
--- /dev/null
+++ b/static/v10/man8/chuck.8
@@ -0,0 +1,116 @@
+.TH CHUCK 8
+.CT 1 sa_nonmortals
+.SH NAME
+chuck \- a file system checking program
+.SH SYNOPSIS
+.B /etc/chuck
+[
+.I option ...
+]
+.I device
+.PP
+.B /etc/chuck
+.B -M
+.I blocks
+.I device
+.PP
+.B /etc/upchuck
+[
+.B -w
+] [
+.B -p
+.I program
+]
+.SH DESCRIPTION
+.PP
+.I Chuck
+checks and optionally repairs the file system on the named
+.I device.
+It is normally invoked by
+.I upchuck
+by
+.IR rc (8)
+during reboots.
+The
+.B -w
+flag to
+.I upchuck
+is passed on to
+.I program.
+If
+.I program
+is not present, the default is
+.FR /etc/chuck .
+(Try, as super-user,
+.B "/etc/upchuck -p /bin/echo
+to see the normal arguments to
+.IR chuck .)
+If
+.I upchuck
+can read the raw version of
+.I device,
+it will, except for the root file system.
+.PP
+The options are
+.TP
+.B -w
+Try to do standard repairs.
+.TP
+.BI -b " blocksize
+Specify file system block size; default is 4096.
+.TP
+.B -i
+Interactive.
+Ask approval for each change.
+.TP
+.BI -I " inode ...
+.br
+.ns
+.TP
+.BI -B " block ...
+Report on inodes or blocks specified by number.
+.TP
+.B -v
+Verbose.
+Give more commentary.
+.PP
+.I Chuck
+can also make a new file system:
+.B "chuck -M"
+.I size device
+makes a bitmapped file system (only)
+of
+.I size
+4096-byte blocks
+on
+.IR device .
+It asks approval before writing.
+.SH FILES
+.F /etc/fstab
+.SH "SEE ALSO"
+.IR fstab (5),
+.IR filsys (5),
+.IR fsck (8),
+.IR reboot (8)
+.SH BUGS
+.I Chuck
+does not replace real expertise.
+It will not automatically repair a file system with duplicate blocks.
+In complicated situations it may have to be run
+several times to get complete consistency.
+.br
+It will not recover from I/O errors in reading the inodes,
+and does not yet extend
+.F lost+found
+when necessary.
+.br
+It uses memory freely (about 12 bytes per file system block
+and 84 bytes per inode).
+.br
+.I Chuck
+is still experimental,
+and acts the part.
+Error messages are usually inscrutable.
+.br
+It believes even preposterous super-blocks and
+consequently can get core images.
diff --git a/static/v10/man8/cl.8 b/static/v10/man8/cl.8
new file mode 100644
index 00000000..75a0de9e
--- /dev/null
+++ b/static/v10/man8/cl.8
@@ -0,0 +1,100 @@
+.TH CL 8
+.CT 1 sa_nonmortals
+.SH NAME
+cl, integrity \- file system label check
+.SH SYNOPSIS
+.B /etc/cl
+[
+.IR specfile " | " dir
+] ...
+.PP
+.B /etc/integrity
+[
+.I rootdir
+]
+.SH DESCRIPTION
+.I Cl
+examines file trees for correctness of labels.
+Each
+.I specfile
+argument names a file containing a description
+of the labels expected in a given subtree of a file system.
+Each line of a
+.I specfile
+has the form
+.IP
+.L
+filename uid,gid mode capabilities licenses label
+.LP
+User and group ids are specified in the style of
+.IR chown (8).
+The mode is specified in the style of
+.IR chmod (2);
+only the 07777 bits are significant.
+Capabilities and licenses are in the style of
+.IR atopriv ;
+see
+.IR labtoa (3).
+The label is in the style of
+.IR atolab,
+without capabilities or licenses.
+.PP
+The first valid line names the root of the tree in question.
+Subsequent lines name particular files in the tree.
+A report is made for each `suspicious' file and for each
+particular file which does
+not match its description in
+.IR specfile .
+.LP
+A suspicious file is a file that is not named in the
+.I specfile
+for which one of the following holds:
+.IP
+The label has flag
+.B L_UNDEF
+or
+.BR L_YES .
+.br
+The file is a special file the label flag is
+.BR L_NO .
+.br
+The file is not a special file the label flag is not
+.BR L_NO .
+.br
+The lattice value of the label is not dominated by the
+label in the first line of
+.IR specfile .
+.br
+The capability or license is not dominated by the corresponding
+value in the first line of
+.IR specfile .
+.LP
+Each named directory argument
+.I dir
+is treated as if there were a
+.I specfile
+argument
+consisting of just a single line
+.IP
+.EX
+\fIdir\fP bin,bin 666 ----- ----- 0000...
+.EE
+.I Integrity
+surveys the directory tree dependent from
+.I rootdir,
+or
+.L /
+if no
+.I rootdir
+is given.
+It reports non-bottom labels, which are possible signs
+of loss of integrity \- modification without privilege.
+The search cuts off at directories with non-bottom labels.
+.SH "SEE ALSO"
+.IR getflab (2),
+.IR ftw (3),
+.IR lcheck (8)
+.SH BUGS
+Extraneous diagnostics
+may be produced if this command is applied to
+active file systems.
diff --git a/static/v10/man8/clri.8 b/static/v10/man8/clri.8
new file mode 100644
index 00000000..68ec27af
--- /dev/null
+++ b/static/v10/man8/clri.8
@@ -0,0 +1,41 @@
+.pa 1
+.he 'CLRI (VIII)'1/20/73'CLRI (VIII)'
+.ti 0
+NAME clri -- clear i-node
+.sp
+.ti 0
+SYNOPSIS clri i-number [ file system ]
+.sp
+.ti 0
+DESCRIPTION clri____
+writes zeros on the 32 bytes occupied by the i-node
+numbered
+.ul
+i-number.
+If the
+.ul
+file system
+argument is given, the i-node resides on
+the given device, otherwise on a
+default file system.
+The file system argument
+must be a special file
+name referring to a device
+containing a file system.
+
+After clri____, any blocks
+in the affected file
+will show up as "missing" in a check_____ of
+the file system.
+
+Read and write permission is required on the specified
+file system device.
+The i-node becomes allocatable.
+
+The primary purpose of this routine
+is to remove a file which
+for some reason appears in no
+directory.
+.sp
+.ti 0
+DIAGNOSTICS "error"
diff --git a/static/v10/man8/config.8 b/static/v10/man8/config.8
new file mode 100644
index 00000000..dc215527
--- /dev/null
+++ b/static/v10/man8/config.8
@@ -0,0 +1,48 @@
+.TH CONFIG 8
+.SH NAME
+config \- configure a Unix kernel
+.SH SYNOPSIS
+.B /etc/config
+[ machine ]
+.SH DESCRIPTION
+.I Config
+generates files used to build a Unix kernel
+for the named
+.IR machine .
+The working directory should be
+.I /usr/sys/conf
+or
+.IR /usr/sys/ machine;
+if the latter,
+.I machine
+may be omitted from the command.
+.PP
+A machine description is expected in
+.RI machine /conf ;
+a makefile,
+a number of header files,
+and some C and assembler programs
+are generated from the description.
+.PP
+The usual way to configure a new system is:
+.nf
+mkdir /usr/sys/newmach
+cd /usr/sys/newmach
+(create conf)
+/etc/config
+make
+.fi
+.SH FILES
+\&../conf/makefile makefile template
+.br
+\&../conf/files list of kernel source files
+.br
+files more sources specific to this machine
+.br
+\&../conf/devices list of device handlers
+.br
+devices more devices specific to this machine
+.br
+conf machine description
+.SH SEE ALSO
+config(5)
diff --git a/static/v10/man8/cpp.8 b/static/v10/man8/cpp.8
new file mode 100644
index 00000000..fa52b773
--- /dev/null
+++ b/static/v10/man8/cpp.8
@@ -0,0 +1,114 @@
+.TH CPP 8
+.CT 1 prog_c
+.SH NAME
+cpp \- C language preprocessor
+.SH SYNOPSIS
+.B /lib/cpp
+[
+.I option ...
+]
+[
+.I ifile
+[
+.I ofile
+]
+]
+.SH DESCRIPTION
+.I Cpp\^
+interprets preprocessor directives
+and does macro substitution
+for
+.IR cc (1)
+and other compilers.
+The input
+.I ifile
+and output
+.I ofile
+default to standard input and standard output respectively.
+.PP
+The options are:
+.TP
+.B -P
+Do not place line number markings in output.
+.TP
+.B -C
+Do not remove comments.
+.TP
+.BI -U name\^
+.PD 0
+.TP
+.BI -D name\^
+.TP
+.BI -D name=def\^
+.TP
+.BI -I dir\^
+Same as in
+.IR cc (1).
+.B -U
+overrides
+.BR -D .
+.PD
+.TP
+.B -H
+Report all included files on standard error file,.
+.TP
+.B -M
+Attach modification date to file names in line number
+directives thus:
+.IB file @ modtime,
+where modtime is the integer number of seconds since the epoch.
+.TP
+.B -T
+Truncate preprocessor symbols to eight characters.
+.TP
+.BI -Y dir
+Use
+.I dir
+instead of
+.F /usr/include
+as the last resort in searching for include files.
+.PP
+The output file contains processed text sprinkled
+with lines that show the original input line numbering:
+.IP
+.B #
+.I linenumber
+.L
+"\fIifile\fP"
+.PP
+The input language is as described in the reference,
+with a few additions:
+.PP
+The
+.B #
+.I linenumber
+marks placed in the output are accepted as an alternative
+to the official
+.B #line
+directive.
+.PP
+These symbols are predefined in various implementations:
+.IP
+.EX
+ibm gcos os tss unix
+interdata pdp11 u370 u3b u3b5 vax
+RES RT
+lint
+.EE
+.PP
+Preprocessor formal parameters are recognized within
+quoted strings in the replacement text.
+.PP
+When comments are removed they are replaced by null strings;
+this unofficial feature makes it possible to construct
+identifiers by concatenation.
+.SH FILES
+.TF /usr/include
+.TP
+.F /usr/include
+standard directory for include files
+.SH SEE ALSO
+B. W. Kernighan and D. M. Ritchie,
+.I The C Programming Language,
+Prentice-Hall,
+1988
diff --git a/static/v10/man8/crash.8 b/static/v10/man8/crash.8
new file mode 100644
index 00000000..e38a694c
--- /dev/null
+++ b/static/v10/man8/crash.8
@@ -0,0 +1,268 @@
+.TH CRASH 8 VAX-11
+.UC 4
+.SH NAME
+crash \- what happens when the system crashes
+.SH DESCRIPTION
+This section explains what happens when the system crashes and how
+you can get a crash dump for analysis of non-transient problems.
+.PP
+When the system crashes voluntarily it prints a message of the form
+.IP
+panic: why i gave up the ghost
+.LP
+on the console, and then invokes an automatic reboot procedure as
+described in
+.IR reboot (8).
+If the auto-reboot switch is off on the console, then the processor
+will simply halt at this point.
+Otherwise the registers and the top few locations of the stack will
+be printed on the console, and then the system will check the disks
+and (unless some unexpected inconsistency is encountered), resume
+multi-user operations.
+.PP
+The system has a large number of internal consistency checks; if one
+of these fails, then it will panic with a very short message indicating
+which one failed. In the absence of a dump, little can be done about
+one of these. If the problem recurs, you should arrange to get a dump
+for further analysis by running with auto-reboot disabled during normal
+working hours and then following the procedure described below.
+.PP
+The most common cause of system failures is hardware failure, which
+can reflect itself in different ways. Here are the messages which
+you are likely to encounter, with some hints as to causes.
+Left unstated in all cases is the possibility that hardware or software
+error produced the message in some unexpected way.
+.TP
+IO err in push
+.ns
+.TP
+hard IO err in swap
+The system encountered an error trying to write to the paging device
+or an error in reading critical information from a disk drive.
+You should fix your disk if it is broken or unreliable.
+.TP
+Timeout table overflow
+.ns
+.TP
+ran out of bdp's
+.ns
+.TP
+ran out of uba map
+These really shouldn't be panics, but until we fix up the data structures
+involved, running out of entries causes a crash. If the timeout table
+overflows, you should make it bigger. If you run out of bdp's or uba map
+you probably have a buggy device driver in your system, allocating and
+not releasing UNIBUS resources.
+.TP
+KSP not valid
+.ns
+.TP
+SBI fault
+.ns
+.TP
+Machine check
+.ns
+.TP
+CHM? in kernel
+These indicate either a serious bug in the system or, more often,
+a glitch or failing hardware. For the machine check, the top part of
+the resulting stack frame gives more information. You can refer to a
+VAX 11/780 System Maintenance Guide for information on machine checks.
+If machine checks or SBI faults recur, check out the hardware or call
+field service. If the other faults recur, there is likely a bug somewhere
+in the system, although these can be caused by a flakey processor.
+Run processor microdiagnostics.
+.TP
+trap type %d, code=%d
+A unexpected trap has occurred within the system; the trap types are:
+.RS
+.TP 10
+0
+reserved addressing mode
+.br
+.ns
+.TP 10
+1
+privileged instruction
+.br
+.ns
+.TP 10
+2
+BPT
+.br
+.ns
+.TP 10
+3
+XFC
+.br
+.ns
+.TP 10
+4
+reserved operand
+.br
+.ns
+.TP 10
+5
+CHMK (system call)
+.br
+.ns
+.TP 10
+6
+arithmetic trap
+.br
+.ns
+.TP 10
+7
+reschedule trap (software level 3)
+.br
+.ns
+.TP 10
+8
+segmentation fault
+.br
+.ns
+.TP 10
+9
+protection fault
+.br
+.ns
+.TP 10
+10
+trace pending (TP bit)
+.RE
+.IP
+The favorite trap type in system crashes is trap type 9, indicating
+a wild reference. The code is the referenced address. If you look
+down the stack, just after the trap type and the code are the pc and
+the ps of the processor when it trapped, showing you where in the
+system the problem occurred. These problems tend to be easy to track
+down if they are kernel bugs since the processor stops cold, but random
+flakiness seems to cause this sometimes, e.g. we have trapped with
+code 80000800 three times in six months as an instruction fetch went across
+this page boundary in the kernel but have been unable to find any reason
+for this to have happened.
+.TP
+init died
+The system initialization process has exited. This is bad news, as no new
+users will then be able to log in. Rebooting is the only fix, so the
+system just does it right away.
+.PP
+That completes the list of panic types you are likely to see.
+Now for the crash dump procedure:
+.PP
+At the moment a dump can be taken only on magnetic tape.
+Before you do anything, be sure that a clean tape is mounted with a ring-in
+on the tape drive if you plan to make a dump.
+.PP
+Write the date and time on the console log.
+Use the console commands to examine the registers, program status long word,
+and the top several locations on the stack.
+A suggested command sequence, which is executed by the \*(lq@DUMP\*(rq
+console command script, is:
+.DS
+.nf
+ E PSL<return>
+ E R0/NE:F<return>
+ E SP<return>
+ E/V @ /NE:40<return>
+.fi
+.DE
+If hardware problems dictate a special set of commands be executed when
+the system crashes, a sequence of commands can be saved using the console
+command \*(lqLINK\*(rq to be reexecuted with \*(lqPERFORM\*(rq (which can be
+abbreviated \*(lqP\*(rq).
+If a dump is to be taken on magnetic tape (this is a good idea
+in most any case where the cause of the crash is not immediately obvious)
+then the following commands will (should) be executed:
+.DS
+.nf
+ D PSL 0<return>
+ D PC 80000200<return>
+ C<return>
+.fi
+.DE
+These commands are actually part of the standard \*(lq@DUMP\*(rq script.
+This should write a copy of all of memory
+on the tape, followed by two EOF marks.
+Caution:
+Any error is taken to mean the end of memory has been reached.
+This means that you must be sure the ring is in,
+the tape is ready, and the tape is clean and new.
+.PP
+If there are not 40(hex) locations active on the kernel stack when the
+procedure is begun, then the console may begin to print error diagnostics.
+You can stop this by hitting \*(lq^C\*(rq (control-C), and then give the
+last three commands above.
+.PP
+If the dump fails, you can try again,
+but some of the registers will be lost.
+See below for what to do with the tape.
+.PP
+To restart after a crash, follow the directions in
+.IR reboot (8);
+if the virtual memory subsystem is suspected as the cause of the crash,
+then a version of the system other than \*(lqvmunix\*(rq should be booted
+which will leave the paging areas temporarily intact
+for use by the post-mortem analysis program
+.I analyze.
+After checking your root file system consistency with
+.IR fsck (8),
+you can read the core dump tape into the file /vmcore with
+.IP
+dd if=/dev/rmt0 of=/vmcore bs=20b
+.LP
+It does not work to use just
+.IR cp (1),
+as the tape is blocked.
+With the system still in single-user mode, run the analysis program
+.I analyze,
+e.g.:
+.IP
+analyze \-s /dev/drum /vmcore /vmunix
+.LP
+and save the output.
+Then boot up
+\*(lqvmunix\*(rq
+and let it do the automatic reboot, i.e. to boot multi-user from
+an RM03/RM05/RP06 on the MASSBUS
+.IP
+>>> BOOT RPM
+.PP
+After rebooting, to analyze a dump you should execute
+.I "ps \-alxk"
+to print the process table at the time of the crash.
+Use
+.IR adb (1)
+to examine
+.IR /vmcore .
+The location
+.I dumpstack\-80000000
+is the bottom of a stack onto which were pushed the stack pointer
+.BR sp ,
+.B PCBB
+(containing the physical address of a
+.IR u_area ),
+.BR MAPEN ,
+.BR IPL ,
+and registers
+.BR r13 \- r0
+(in that order).
+.BR r13 (fp)
+is the system frame pointer and the stack is used in standard
+.B calls
+format. Use
+.IR adb (1)
+to get a reverse calling order.
+In most cases this procedure will give
+an idea of what is wrong.
+A more complete discussion
+of system debugging is impossible here.
+See, however,
+.IR analyze (8)
+for some more hints.
+.SH "SEE ALSO"
+analyze(8), reboot(8)
+.br
+.I "VAX 11/780 System Maintenance Guide"
+for more information about machine checks.
+.SH BUGS
diff --git a/static/v10/man8/cron.8 b/static/v10/man8/cron.8
new file mode 100644
index 00000000..3a58416f
--- /dev/null
+++ b/static/v10/man8/cron.8
@@ -0,0 +1,86 @@
+.TH CRON 8
+.CT 1 sa_auto
+.SH NAME
+cron \- clock daemon
+.SH SYNOPSIS
+.B /etc/cron
+.SH DESCRIPTION
+.I Cron
+executes commands at specified dates and times
+according to the instructions in the file
+.FR /etc/crontab .
+It should be run once from
+.IR rc (8).
+.PP
+.I Crontab
+entries are lines of seven fields separated by blanks or tabs:
+.IP
+.I
+login minute hour day month weekday command
+.PP
+.I Login
+is the login name under
+whose userid and groupid
+the command should be executed.
+The next five fields are integer patterns for
+.PD0
+.RS
+.TP \w'day\ of\ month\ \ 'u
+minute
+0-59
+.TP
+hour
+0-23
+.TP
+day of month
+1-31
+.TP
+month of year
+1-12
+.TP
+day of week
+0-6; 0=Sunday
+.PD
+.RE
+.PP
+Each pattern may
+contain a number in the range above;
+two numbers separated by
+a hyphen
+meaning an inclusive range;
+a list of numbers separated by
+commas meaning any of the numbers;
+or an asterisk meaning all legal values.
+.PP
+The last field is a string
+to be executed by the shell,
+after replacing
+.L %
+with newline.
+.PP
+It is wise to spread the times of activities to avoid
+bogging the system down at favorite hours.
+.PP
+.I Cron
+examines
+.I crontab
+every minute.
+.SH EXAMPLES
+.EX
+daemon 17 3 * * * /usr/bin/calendar - # reminders at 0317
+adm 15 4 1,15 * * ac -p | mail adm # bimonthly accounts
+root 0 12 22-28 11 4 /etc/wall Time for Thanksgiving dinner
+.EE
+.SH FILES
+.F /etc/crontab
+.SH SEE ALSO
+.IR at (1)
+.SH BUGS
+The behavior of
+.L %
+in
+.I crontab
+entries is nonstandard.
+Strings following
+.L %
+should be delivered to the command as standard input.
diff --git a/static/v10/man8/dcheck.8 b/static/v10/man8/dcheck.8
new file mode 100644
index 00000000..9f9d8eec
--- /dev/null
+++ b/static/v10/man8/dcheck.8
@@ -0,0 +1,44 @@
+.pa 1
+.he 'DCHECK (VIII)'1/20/73'DCHECK (VIII)'
+.ti 0
+NAME dcheck -- directory consistency check
+.sp
+.ti 0
+SYNOPSIS dcheck______ [ -l__ ] [ device ]
+.sp
+.ti 0
+DESCRIPTION dcheck______
+builds an image of the directory hierarchy
+of the specified device
+by reading all its directories (using physical I/O
+guided by the i-nodes on the device).
+A list entry is made for
+each file encountered.
+A second pass reads the i-nodes and for
+each file compares the number of links
+specified in its i-node
+with the number of entries actually seen.
+All discrepancies are noted.
+.sp
+If no device is specified,
+a default device is assumed.
+.sp
+The argument -l__ causes a complete
+listing of the file names on the device
+in i-node order.
+.sp
+.ti 0
+FILES /dev/rk?
+.sp
+.ti 0
+SEE ALSO check(VIII)
+.sp
+.ti 0
+DIAGNOSTICS inconsistent i-numbers,
+unnamed files,
+unreachable files,
+loops in directory "hierarchy".
+.sp
+.ti 0
+BUGS Unreachable files and loops are
+discovered only under the "-l" option.
diff --git a/static/v10/man8/delivermail.8 b/static/v10/man8/delivermail.8
new file mode 100644
index 00000000..5c1070b4
--- /dev/null
+++ b/static/v10/man8/delivermail.8
@@ -0,0 +1,248 @@
+.TH DELIVERMAIL 8
+.UC 4
+.SH NAME
+delivermail \- deliver mail to arbitrary people
+.SH SYNOPSIS
+.B /etc/delivermail
+[
+.BR \- [ fr ]
+.I address
+] [
+.B \-a
+] [
+.BI \-e x
+] [
+.B \-n
+] [
+.B \-m
+] [
+.B \-s
+] [
+.B \-i
+] [
+.B \-h
+.I N
+] address ...
+.SH DESCRIPTION
+.I Delivermail
+delivers a letter to one or more people,
+routing the letter over whatever networks
+are necessary.
+.I Delivermail
+will do inter-net forwarding as necessary
+to deliver the mail to the correct place.
+.PP
+.I Delivermail
+is not intended as a user interface routine;
+it is expected that other programs will provide user-friendly
+front ends,
+and
+.I delivermail
+will be used only to deliver pre-formatted messages.
+.PP
+.I Delivermail
+reads its standard input
+up to a control-D
+or a line with a single dot
+and sends a copy of the letter found there
+to all of the addresses listed.
+If the
+.B \-i
+flag is given,
+single dots are ignored.
+It determines the network to use
+based on the syntax of the addresses.
+Addresses containing the character `@'
+or the word \*(lqat\*(rq
+are sent to the
+.SM ARPANET;
+addresses containing `!'
+are sent to the
+.SM UUCP
+net,
+and addresses containing `:' or `.'
+are sent to the Berkeley network.
+Other addresses are assumed to be local.
+.PP
+Local addresses are looked up in a file
+constructed by
+.IR newaliases (1)
+from the data file
+.I /usr/lib/aliases
+and aliased appropriately.
+Aliasing can be prevented by preceding the address
+with a backslash or using the
+.B \-n
+flag.
+Normally the sender is not included in any alias
+expansions, e.g.,
+if `john' sends to `group',
+and `group' includes `john' in the expansion,
+then the letter will not be delivered to `john'.
+The
+.B \-m
+flag disables this suppression.
+.PP
+.I Delivermail
+computes the person sending the mail
+by looking at your login name.
+The \*(lqfrom\*(rq person
+can be explicitly specified by using the
+.B \-f
+flag;
+or, if the
+.B \-a
+flag is given,
+delivermail looks in the body of the message
+for a \*(lqFrom:\*(rq or \*(lqSender:\*(rq
+field in
+.SM ARPANET
+format.
+The
+.B \-f
+and
+.B \-a
+flags can be used
+only by the special users
+.I root
+and
+.I network,
+or if the person you are trying to become
+is the same as the person you are.
+The
+.B \-r
+flag is entirely equivalent to the
+.B \-f
+flag; it is provided for ease of interface only.
+.PP
+The
+.BI \-e x
+flag controls the disposition of error output,
+as follows:
+.TP 3n
+.B e
+Print errors on the standard output,
+and echo a copy of the message when done.
+It is assumed that a network server will
+return the message back to the user.
+.TP
+.B m
+Mail errors back to the user.
+.TP
+.B p
+Print errors on the standard output.
+.TP
+.B q
+Throw errors away;
+only exit status is returned.
+.TP
+.B w
+Write errors back to the user's terminal,
+but only if the user is still logged in
+and write permission is enabled;
+otherwise errors are mailed back.
+.LP
+If the error is not mailed back,
+and if the mail originated on the machine where the error occurred,
+the letter is appended to the file
+.I dead.letter
+in the sender's home directory.
+.PP
+If the first character of the user name
+is a vertical bar,
+the rest of the user name is used as the name of a program
+to pipe the mail to.
+It may be necessary to quote the name of the user
+to keep
+.I delivermail
+from suppressing the blanks from between arguments.
+.PP
+The message is normally edited to eliminate \*(lqFrom\*(rq
+lines that might confuse other mailers.
+In particular,
+\*(lqFrom\*(rq lines in the header are deleted,
+and \*(lqFrom\*(rq lines in the body are prepended by `>'.
+The
+.B \-s
+flag saves \*(lqFrom\*(rq lines in the header.
+.PP
+The
+.B \-h
+flag gives a \*(lqhop-count\*(rq, i.e.,
+a measure of how many times this message
+has been processed by
+.I delivermail
+(presumably on different machines).
+Each time
+.I delivermail
+processes a message,
+it increases the hop-count by one;
+if it exceeds 30
+.I delivermail
+assumes that an alias loop has occurred
+and it aborts the message.
+The hop-count defaults to zero.
+.PP
+.I Delivermail
+returns an exit status
+describing what it did.
+The codes are defined in <sysexits.h>
+.ta 3n +\w'EX_UNAVAILABLE'u+3n
+.de XX
+.ti \n(.iu
+..
+.in +\w'EX_UNAVAILABLE'u+6n
+.XX
+ EX_OK Successful completion on all addresses.
+.XX
+ EX_NOUSER User name not recognized.
+.XX
+ EX_UNAVAILABLE Catchall meaning necessary resources
+were not available.
+.XX
+ EX_SYNTAX Syntax error in address.
+.XX
+ EX_SOFTWARE Internal software error,
+including bad arguments.
+.XX
+ EX_OSERR Temporary operating system error,
+such as \*(lqcannot fork\*(rq.
+.XX
+ EX_NOHOST Host name not recognized.
+.SH FILES
+.if t .ta 2i
+.if n .ta 3i
+/usr/lib/aliases raw data for alias names
+.br
+/usr/lib/aliases.dir data base of alias names
+.br
+/usr/lib/aliases.pag
+.br
+/bin/mail to deliver uucp mail
+.br
+/usr/net/bin/v6mail to deliver local mail
+.br
+/usr/net/bin/sendmail to deliver Berknet mail
+.br
+/usr/lib/mailers/arpa to deliver ARPANET mail
+.br
+/tmp/mail* temp file
+.br
+/tmp/xscript* saved transcript
+.SH SEE\ ALSO
+biff(1), binmail(1), mail(1), newaliases(1), aliases(5)
+.SH BUGS
+.I Delivermail
+sends one copy of the letter
+to each user;
+it should send one copy
+of the letter to each host
+and distribute to multiple users there
+whenever possible.
+.PP
+.I Delivermail
+assumes the addresses can be represented as one word.
+This is incorrect according to the
+.SM ARPANET
+mail protocol RFC 733 (NIC 41952),
+but is consistent with the real world.
diff --git a/static/v10/man8/df.8 b/static/v10/man8/df.8
new file mode 100644
index 00000000..49713d39
--- /dev/null
+++ b/static/v10/man8/df.8
@@ -0,0 +1,21 @@
+.th DF VIII 1/20/73
+.sh NAME
+df \*- disk free
+.sh SYNOPSIS
+.bd df
+[ filesystem ]
+.sh DESCRIPTION
+.it Df
+prints out the number of free blocks
+available on a file system.
+If the file system is unspecified,
+the free space on all of
+the normally mounted file systems
+is printed.
+.sh FILES
+/dev/rf?,
+/dev/rk?,
+/dev/rp?
+.sh "SEE ALSO"
+check(VIII)
+.sh BUGS
diff --git a/static/v10/man8/dist.8 b/static/v10/man8/dist.8
new file mode 100644
index 00000000..37f65622
--- /dev/null
+++ b/static/v10/man8/dist.8
@@ -0,0 +1,146 @@
+.TH DIST 8
+.ds ld /usr/lib/dist
+.SH NAME
+connect, dispatch \(mi generic network client and server
+.PP
+query, receive, notify \(mi network clients
+.PP
+answer, transmit, notified \(mi network servers
+.SH SYNOPSIS
+.B \*(ld/connect
+.I remote-system remote-cmd io local-cmd local-args
+.PP
+.B \*(ld/query
+.PP
+.B \*(ld/receive
+.I package-id
+.PP
+.B \*(ld/notify
+.I package-id
+.PP
+.B \*(ld/dispatch
+.I remote-system remote-user
+.PP
+.B \*(ld/answer
+.I remote-system remote-user
+.PP
+.B \*(ld/transmit
+.I remote-system remote-user
+.PP
+.B \*(ld/notified
+.I remote-system remote-user
+.SH DESCRIPTION
+These programs act behind the scenes on behalf of
+.IR dist (1).
+.I Connect
+and
+.I dispatch
+deal with all the details of establishing and authenticating connections
+on the network. The remaining programs are independent of the underlying
+network.
+.PP
+.I Connect
+encapsulates all the details of making a call on the underlying network.
+Its arguments are mostly self explanatory.
+.I Remote-cmd
+must be one of
+.BR answer ", " transmit ", or " notified "."
+If
+.I io
+is
+.BR i ,
+the standard input of the local command is connected
+to the standard output of the remote command. If
+.B i
+is not specified, the local command inherits its local
+standard input, and the remote command has its standard
+output directed to a log file.
+Similarly,
+.B o
+means the standard output of the local command is connected
+to the standard input of the remote command. If
+.B o
+is not specified, the local command inherits its local
+standard output, and the remote command has its standard
+input attached to
+.BR /dev/null .
+Legal possibilities are
+.BR i ,
+.BR o ,
+and
+.BR io.
+.PP
+.I Dispatch
+is intended to be called by a generic network daemon
+such as
+.IR svcmgr (8).
+It talks to
+.I connect
+and takes care of establishing the appropriate standard input and
+output before calling
+.IR answer ,
+.IR transmit ,
+or
+.IR notified .
+.I Dispatch
+expects arguments giving the remote system, remote user, and remote
+address, and passes these to whatever program it calls.
+.PP
+.I Query
+is a simple program called by
+.I connect
+with its standard input attached to the remote
+.IR answer .
+.I Query
+displays a formatted version of the queue list from the remote machine.
+(It may even turn out to be the same as
+.BR /bin/cat .)
+.PP
+.I Receive
+is a more complicated program that is called by
+.I connect
+with both its input and output attached to the remote
+.IR transmit .
+.I Receive
+performs actual software installation and sends a transcript of any
+errors back to the remote system.
+.PP
+.I Notify
+is a simple program called by
+.I connect
+with its standard output attached to the remote
+.IR notified .
+.I Notify
+sends an announcement of the availability of some specific package.
+.PP
+All of the servers read a configuration file,
+.BR \*(ld/conf ,
+to determine how to handle installation on behalf
+of a given remote system and user. The file consists of lines
+containing patterns and actions. Empty lines or lines beginning
+with a '\c
+.BR "#" "'"
+are ignored. The first three fields (separated by white space)
+of each line are regular
+expressions to be matched the remote system name, remote user name,
+and file name respectively. The first line in which all three match
+will be chosen.
+The remainder of the line contains
+the associated actions.
+Each action is an alphanumeric name, optionally followed immediately
+by a parenthesized argument.
+.PP
+Someday the actions will be enumerated here, but I don't know what
+they are yet.
+.SH EXAMPLES
+A simple configuration file:
+.EX
+.ta \w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u +\w'00000000'u
+# system user pathname action
+# we are willing to distribute stuff to coma and pyxis.
+(coma|pyxis) .* .* accept(yes)
+\&.* .* .* accept(no)
+.EE
+.SH "SEE ALSO"
+.IR dist (1),
+.IR dist (5)
diff --git a/static/v10/man8/dkmgr.8 b/static/v10/man8/dkmgr.8
new file mode 100644
index 00000000..168f6640
--- /dev/null
+++ b/static/v10/man8/dkmgr.8
@@ -0,0 +1,165 @@
+.TH DKMGR 8
+.CT 1 sa_auto
+.SH NAME
+dkhup, dkmgr, dkzap \- manage Datakit interface
+.SH SYNOPSIS
+.B /usr/ipc/mgrs/dkhup
+[
+.B -N
+.I prefix
+]
+.br
+.B /usr/ipc/mgrs/dkmgr
+[
+.B -N
+.I prefix
+] [
+.B -m
+.I outname
+] [
+.B -n
+.I service
+]
+.br
+.B /usr/ipc/mgrs/dkzap
+[
+.B -N
+.I prefix
+]
+.SH DESCRIPTION
+.I Dkhup
+starts the common signaling channel protocol
+for a Datakit interface.
+Initially it sends several reset messages,
+and tells the controller
+to hang up all outstanding calls;
+thereafter it simply keeps the signaling protocol running.
+.PP
+.I Dkmgr
+receives and places Datakit calls.
+Outbound calls may be placed by calling
+.I ipcopen
+.RI ( ipc (3))
+with the
+.I outname
+specified by option
+.BR -m ;
+the default is
+.BR dk .
+.I Dkmgr
+announces itself to the Datakit network
+with the
+.I service
+name specified by option
+.BR -n ;
+the default is taken from
+.FR /etc/whoami .
+Inbound calls to
+.I service
+are connected to the local
+.L login
+service;
+inbound calls to
+Datakit address
+.IB service . serv
+are handed to local service
+.IR serv .
+.PP
+.I Dkhup
+and
+.I dkmgr
+are normally run once from
+.IR rc (8).
+Both programs must be running
+to make the network available.
+.PP
+.I Dkzap
+arranges for a KMC11-assisted Datakit interface
+to be reset, reloaded, and restarted.
+This should be done only if things are badly broken,
+as it hangs up all existing calls through that interface.
+.PP
+Datakit devices are expected to have names of the form
+.BI /dev/dk/dk nn
+with
+.I nn
+a two-digit channel number.
+If there are more than 100 channels,
+the first digit overflows to lower-case letters:
+channel 100 is
+.LR a0 .
+The common signaling control channel
+is named
+.BR /dev/dk/dkctl .
+All three programs accept an option
+.B -N
+.I prefix
+to change the naming convention;
+for example,
+.B -N /dev/kb/kb
+means that the files have names like
+.B /dev/kb/kb32
+and
+.BR /dev/kb/kbctl .
+.PP
+Support also exists for a less general naming convention:
+there may be two sets of files,
+named
+.BI /dev/dk/dk0 nn
+and
+.BI /dev/dk/dk2 nn\c
+,
+with control channels
+.B /dev/dk/dkctl0
+and
+.BR /dev/dk/dkctl2 .
+.I Dkhup
+and
+.I dkzap
+take the extra argument
+.B 0
+or
+.B 2
+to point at one or the other of the control names.
+A separate copy of
+.I dkhup
+is needed for each name.
+.I Dkmgr
+takes an option
+.B -u
+.IR c ,
+where
+.I c
+is
+.B 0
+or
+.B 2
+to use one set of files,
+or
+.B b
+to use both simultaneously;
+in the latter case,
+.I service
+is announced to both networks.
+This scheme is obsolete and overdue for replacement;
+the missing piece is something to pick an interface for outcalls.
+.PP
+.I Dkmgr
+records its activity in file
+.I service
+in directory
+.BR /usr/ipc/log ,
+default
+.BR /usr/ipc/log/dk .
+.SH FILES
+.F /dev/dk
+.SH "SEE ALSO"
+.IR con (1),
+.IR kmc (8),
+.IR svcmgr (8),
+.IR ipc (3)
+.SH BUGS
+.I Dkhup
+should be folded into
+.IR dkmgr ;
+it is separate for historic reasons.
diff --git a/static/v10/man8/dli.8 b/static/v10/man8/dli.8
new file mode 100644
index 00000000..b63e9af0
--- /dev/null
+++ b/static/v10/man8/dli.8
@@ -0,0 +1,27 @@
+.pa 1
+.he 'DLI (VIII)'3/15/72'DLI (VIII)'
+.ti 0
+NAME dli -- load DEC binary paper tapes
+.sp
+.ti 0
+SYNOPSIS dli output [input]
+.sp
+.ti 0
+DESCRIPTION dli___
+will load a DEC binary paper tape
+into the output file.
+The binary format paper tape
+is read from the input file
+(/dev/ppt is default.)
+.sp
+.ti 0
+FILES /dev/ppt
+.sp
+.ti 0
+SEE ALSO --
+.sp
+.ti 0
+DIAGNOSTICS "checksum"
+.sp
+.ti 0
+BUGS --
diff --git a/static/v10/man8/dmesg.8 b/static/v10/man8/dmesg.8
new file mode 100644
index 00000000..162b84fd
--- /dev/null
+++ b/static/v10/man8/dmesg.8
@@ -0,0 +1,64 @@
+.TH DMESG 8
+.CT 1 sa_nonmortals
+.SH NAME
+dmesg \- system diagnostic messages
+.SH SYNOPSIS
+.B /etc/dmesg
+[
+.B -
+]
+[
+.B -i
+]
+[
+.I core namelist
+]
+.SH DESCRIPTION
+.I Dmesg
+looks in a system buffer
+for recent console messages from the operating system
+and reproduces them on the standard output.
+Under option
+.LR - ,
+.I dmesg
+produces only those messages printed by the system
+since the last time
+.L dmesg\ -
+was run.
+It is normally run periodically by
+.IR cron (8)
+to produce the error log
+.FR /usr/adm/messages .
+.PP
+Option
+.B -i
+prints messages produced since the last
+.L dmesg\ -
+without changing any records.
+.PP
+If
+.I core
+and
+.I namelist
+are specified,
+they are used in place of
+.F /dev/kmem
+and
+.FR /unix .
+.SH FILES
+.TF /usr/adm/messages
+.TP
+.F /usr/adm/messages
+error log
+.br
+.TP
+.F /usr/adm/msgbuf
+record of option
+.L -
+.SH BUGS
+Since the system error message buffer is small,
+not all error messages
+are guaranteed to be logged.
+.br
+Error messages generated immediately before a system crash
+may not be logged.
diff --git a/static/v10/man8/downgrade.8 b/static/v10/man8/downgrade.8
new file mode 100644
index 00000000..9ab11d51
--- /dev/null
+++ b/static/v10/man8/downgrade.8
@@ -0,0 +1,37 @@
+.TH DOWNGRADE 8
+.CT 8 sa_nonmortals
+.SH NAME
+downgrade \- downgrade a file
+.SH SYNOPSIS
+.B /etc/downgrade
+.I label
+.I file ...
+.SH DESCRIPTION
+.I Downgrade
+clears from the label of each
+.I file
+all bits that correspond to one bits in
+.I label.
+Capabilities or licenses specified in
+.I label
+are ignored.
+The
+.I files
+must be readable and must be specified by full path name.
+.LP
+.I Downgrade
+requires
+.B T_EXTERN
+privilege, which may be granted to authorized users by
+.IR priv (8).
+.SH EXAMPLES
+.L
+priv downgrade 0110 /usr/myproject/*.c
+.SH FILES
+.F /dev/log
+.SH "SEE ALSO"
+.IR getlab (2),
+.IR setlab (1)
+.SH BUGS
+Downgrading is not an atomic operation. If a file is
+relinked underfoot misleading logging records may result.
diff --git a/static/v10/man8/dump.8 b/static/v10/man8/dump.8
new file mode 100644
index 00000000..51a70ec8
--- /dev/null
+++ b/static/v10/man8/dump.8
@@ -0,0 +1,94 @@
+.th DUMP VIII 11/24/73
+.sh NAME
+dump \*- incremental file system dump
+.sh SYNOPSIS
+.bd dump
+[ key [ arguments ] filesystem ]
+.sh DESCRIPTION
+.it Dump
+will make an incremental file system dump
+on magtape
+of all files changed after a certain date.
+The argument
+.it key,
+specifies the date and other options about the dump.
+.it Key
+consists of characters from
+the set
+.bd iu0hds.
+.s3
+.lp +5 3
+\fBi\fR the
+dump date is taken from the file
+.bd /etc/ddate.
+.s3
+.lp +5 3
+\fBu\fR the date just prior to this dump
+is written on
+.bd /etc/ddate
+upon successful completion of this dump.
+.s3
+.lp +5 3
+\fB0\fR the dump date is taken as the epoch
+(beginning of time).
+Thus this option causes an entire file system dump to be taken.
+.s3
+.lp +5 3
+\fBh\fR the dump date is some number of hours before the current date.
+The number of hours is taken from the next argument in
+.it arguments.
+.s3
+.lp +5 3
+\fBd\fR the dump date is some number of days before the current date.
+The number of days is taken from the next argument in
+.it arguments.
+.s3
+.lp +5 3
+\fBs\fR the size of the dump tape is specified in feet.
+The number of feet is taken from the next argument in
+.it arguments.
+It is assumed that there are 9 standard UNIX records per foot.
+When the specified size is reached,
+the dump will wait for reels to be changed.
+The default size is 1700 feet.
+.s3
+.i0
+If no arguments are given,
+the
+.it key
+is assumed to be
+.bd i
+and the file system is
+assumed to be
+.bd /dev/rp1.
+.s3
+Full dumps
+should be taken on quiet file systems as follows:
+.s3
+ dump 0u /dev/rp1
+.br
+ check -l /dev/rp1
+.s3
+The
+.it check
+will come in handy in case it is necessary
+to resore indiviidual files from this dump.
+Incremental dumps should then be taken
+when desired by:
+.s3
+ dump
+.s3
+When the incremental dumps get cumbersome,
+a new complete dump should be taken.
+In this way,
+a restore requires
+loading of the complete dump tape and only the latest incremental tape.
+.sh FILES
+/dev/mt0 magtape
+.br
+/dev/rp1 default file system
+.br
+/etc/ddate
+.sh "SEE ALSO"
+restor, check(VIII), dump(V)
+.sh BUGS
diff --git a/static/v10/man8/dumpdir.8 b/static/v10/man8/dumpdir.8
new file mode 100644
index 00000000..005bd8ef
--- /dev/null
+++ b/static/v10/man8/dumpdir.8
@@ -0,0 +1,38 @@
+.TH DUMPDIR 8
+.UC 4
+.SH NAME
+dumpdir \- print the names of files on a dump tape
+.SH SYNOPSIS
+.B /etc/dumpdir
+[
+.B f
+filename ]
+.SH DESCRIPTION
+.I Dumpdir
+is used to read magtapes dumped with the
+.I dump
+command and list the names and inode numbers
+of all the files and directories on the tape.
+.PP
+The
+.B f
+option causes
+.I filename
+as the name of the tape instead
+of the default.
+.SH FILES
+default tape unit varies with installation
+.br
+rst*
+.SH "SEE ALSO"
+dump(1), restor(1)
+.SH DIAGNOSTICS
+If the dump extends over more than one tape,
+it may ask you to change tapes.
+Reply with a new-line when the next tape has been mounted.
+.SH BUGS
+There is redundant information on the tape
+that could be used in case of tape reading problems.
+Unfortunately,
+.I dumpdir
+doesn't use it.
diff --git a/static/v10/man8/expire.8 b/static/v10/man8/expire.8
new file mode 100644
index 00000000..3c5a2672
--- /dev/null
+++ b/static/v10/man8/expire.8
@@ -0,0 +1,67 @@
+.TH EXPIRE 8
+.SH NAME
+expire \- remove outdated news articles
+.SH SYNOPSIS
+.BR /usr/lib/news/expire " [ " \-n
+.IR newsgroups " ] [ "
+.BR \-i " ] [ " \-I " ] [ " \-v " [ "
+.IR level " ] ] [ "
+.BI \-e days
+ ]
+ [
+.B \-a
+ ]
+.SH DESCRIPTION
+.PP
+.I Expire
+is normally started up by
+.IR cron (8)
+every night to remove all expired news.
+If no newsgroups are specified, the default is to expire
+.BR all .
+.PP
+Articles whose specified expiration date has already passed
+are considered expirable.
+The
+.B \-a
+option causes expire to archive articles in /usr/spool/oldnews.
+Otherwise, the articles are unlinked.
+.PP
+The
+.B \-v
+option causes expire to be more verbose.
+It can be given a verbosity level (default 1) as in
+.B \-v3
+for even more output.
+This is useful if articles aren't being expired and you want to know why.
+.PP
+The
+.B \-e
+flag gives the number of days to use for a default expiration date.
+If not given, an installation dependent default (often 2 weeks) is used.
+.PP
+The
+.B \-i
+and
+.B \-I
+flags
+tell
+.B expire
+to ignore any expiration date explicitly given on articles.
+This can be used when disk space is really tight.
+The
+.B \-I
+flag will always ignore expiration dates,
+while the
+.B \-i
+flag will only ignore the date if ignoring it would expire the article sooner.
+.I WARNING:
+If you have articles archived by giving them expiration dates far into the
+future, these options might remove these files anyway.
+.SH "SEE ALSO"
+checknews(1),
+inews(1),
+readnews(1),
+recnews(8),
+sendnews(8),
+uurec(8)
diff --git a/static/v10/man8/fsck.8 b/static/v10/man8/fsck.8
new file mode 100644
index 00000000..2f6841c5
--- /dev/null
+++ b/static/v10/man8/fsck.8
@@ -0,0 +1,248 @@
+.TH FSCK 8
+.CT 1 sa_nonmortals
+.SH NAME
+fsck \- file system consistency check and interactive repair
+.SH SYNOPSIS
+.B /etc/fsck
+.B -p
+[
+.I special ...
+]
+.br
+.B /etc/fsck
+[
+.B -y
+]
+[
+.B -n
+]
+[
+.BI -s X
+]
+[
+.BI -S X
+]
+[
+.B -t
+.I filename
+] [
+.I special ...
+]
+.SH DESCRIPTION
+.I Fsck
+inspects the disk filesystems
+in the named
+.I special
+files
+and repairs inconsistencies.
+If no files are named,
+every file system listed in
+.IR fstab (5)
+with type 0
+and a nonzero pass number
+is checked.
+.PP
+Under option
+.BR -p ,
+.I fsck
+runs without intervention,
+repairing minor inconsistencies
+and aborting on major ones.
+This form is usually called from
+.IR rc (8).
+If no special files are named,
+file systems in
+.I fstab
+are checked in parallel passes:
+all file systems with pass number 1
+are checked simultaneously,
+then all file systems with pass number 2,
+and so on until
+.I fstab
+is exhausted.
+.PP
+Here are the minor ailments
+repaired automatically
+under
+.BR -p :
+.RS
+unreferenced inodes;
+.br
+wrong link counts in inodes;
+.br
+missing blocks in the free list;
+.br
+blocks in the free list also in files; and
+.br
+counts wrong in the super-block.
+.RE
+.PP
+Other inconsistencies
+cause
+.I fsck
+to abandon the inconsistent file system,
+and exit with a nonzero status
+when the current pass finishes.
+.PP
+Without the
+.B -p
+option,
+.I fsck
+inspects one file system at a time,
+interactively.
+Each inconsistency causes
+.I fsck
+to print a message
+and ask permission to fix the problem.
+The operator may require arcane knowledge
+to guide
+.I fsck
+safely through repair of a badly damaged file system.
+.PP
+Here are the remaining options.
+They are allowed only if
+.B -p
+is absent.
+.TP
+.B -y
+Assume a yes response to all questions.
+This should be used with great caution.
+.TP
+.B -n
+Assume a no response to all questions;
+do not open the file system for writing.
+This option is assumed if the file system cannot be opened for writing.
+.TP
+.BI -s X
+Ignore the actual free list and (unconditionally) reconstruct a new
+one by rewriting the super-block of the file system.
+The file system should be unmounted while this is done; if this
+is not possible, care should be taken that the system is quiescent
+and that it is rebooted immediately afterwards.
+This precaution is necessary so that the old, bad, in-core copy
+of the superblock will not continue to be used, or written on the file system.
+If the file system has a bitmap free list (see
+.IR filsys (5)),
+the free list is always reconstructed unless the
+.B -n
+option is enabled.
+.IP
+Parameter
+.I X
+allows free-list parameters to be specified:
+.BI -s blocks-per-cylinder : blocks-to-skip\c
+\&.
+If
+.I X
+is not given,
+the values used when the file system was created
+are used; see
+.IR mkfs (8).
+If these values were not specified,
+.I X
+is assumed to be
+.BR 400:9 .
+.TP
+.BI -S X
+Conditionally reconstruct the free list.
+This option
+is like
+.BI -s X
+except that the free list is rebuilt only
+if no discrepancies were found.
+.B -S
+implies
+.BR -n .
+.TP
+.B -t
+If
+.I fsck
+cannot obtain enough memory to keep its tables,
+it uses a scratch file.
+If the
+.B -t
+option is
+specified, the file named in the next argument
+is used as the scratch file, if needed.
+Without
+.BR -t ,
+.I fsck
+will prompt the operator for the name of the
+scratch file.
+The file chosen should not be on the
+file system being checked.
+If it did not already exist,
+it is removed when
+.I fsck
+completes.
+.PD
+.br
+.ne 6
+.PP
+Inconsistencies checked are:
+.IP
+.nf
+Blocks claimed more than once.
+Blocks designated outside the file system.
+Incorrect link counts.
+Directory size not 16-byte aligned.
+Bad inode format.
+Blocks not accounted for anywhere.
+Directory entry pointing to unallocated inode.
+Inode number out of range.
+More than 65536 inodes.
+More blocks for inodes than there are in the file system.
+Bad free block list format.
+Total free block and/or free inode count incorrect.
+.fi
+.PP
+Orphaned files and directories (allocated but unreferenced) are
+reconnected by
+placing them in the directory
+.F lost+found
+in the root of the file system being checked.
+The name assigned is the inode number,
+prefixed by
+.LR # .
+.PP
+Checking the raw device is almost always faster,
+but
+.I fsck
+distinguishes bitmapped from non-bitmapped file systems
+by examining the minor device number,
+so the block device is safer.
+.SH FILES
+.F /etc/fstab
+.SH "SEE ALSO"
+.IR fstab (5),
+.IR filsys (5),
+.IR mkfs (8),
+.IR reboot (8)
+.br
+T. J. Kowalski,
+`Fsck\(emthe
+.SM UNIX
+File System Check Program',
+this manual, Volume 2
+.SH BUGS
+Inode numbers for
+.B .
+and
+.B ..
+in each directory should be checked for validity.
+.PP
+Some systems save core images after a crash
+in the swap area;
+on such machines,
+checking many large file systems in parallel
+may cause swapping, overwriting the crash dump.
+It is best just to write crash dumps in a a safer place.
+If disk space for dumps and swapping is scarce,
+avoid checking more than three 120-megabyte file systems
+in parallel on a machine with four megabytes of physical memory.
+.PP
+Examining the minor device number is a botch;
+there should be an explicit flag somewhere.
+.PP
+.I Fsck
+does not have supernatural powers.
diff --git a/static/v10/man8/fstat.8 b/static/v10/man8/fstat.8
new file mode 100644
index 00000000..7abf677b
--- /dev/null
+++ b/static/v10/man8/fstat.8
@@ -0,0 +1,49 @@
+.TH FSTAT 1
+.SH NAME
+fstat \- file status
+.SH SYNOPSIS
+.B /etc/fstat
+[
+.B \-u
+user ] [
+.B \-p
+pid ] [
+.B \-f
+filename ]
+.SH DESCRIPTION
+.I Fstat
+identifies open files.
+A file is considered open if a process has it open,
+if it is the working directory for a process,
+or if it is an active pure text file.
+Under default options,
+.I fstat
+reports on all open files.
+.PP
+Options:
+.TP 6
+.B \-u
+Report all files open by a specified user.
+.TP 6
+.B \-p
+Report all files open by a specified process id.
+.TP 6
+.B \-f
+Restrict reports to the specified file.
+If the file is a character special file,
+.I fstat
+additionally reports on any open files on that device,
+treating it as a mounted file system.
+.dt
+.SH "SEE ALSO"
+ps(1), pstat(8)
+.SH DIAGNOSTICS
+Yet to be determined.
+.SH BUGS
+.I Fstat
+tries to be clever if you elide the
+.B \-u ,
+.B \-f ,
+or
+.B \-p
+flags for the argument. Like any expert system, it is sometimes wrong.
diff --git a/static/v10/man8/gacct.8 b/static/v10/man8/gacct.8
new file mode 100644
index 00000000..bc72d1a3
--- /dev/null
+++ b/static/v10/man8/gacct.8
@@ -0,0 +1,22 @@
+.pa 1
+.he 'GACCT (VIII)'4/27/73'GACCT (VIII)'
+.ti 0
+NAME gacct -- command accounting statistics
+.sp
+.ti 0
+SYNOPSIS gacct [ -arnl ] [ files ]
+.sp
+.ti 0
+DESCRIPTION X
+.sp
+.ti 0
+FILES /usr/adm/tacct
+.sp
+.ti 0
+SEE ALSO sh(i)
+.sp
+.ti 0
+DIAGNOSTICS --
+.sp
+.ti 0
+BUGS --
diff --git a/static/v10/man8/gettable.8 b/static/v10/man8/gettable.8
new file mode 100644
index 00000000..32ed9d57
--- /dev/null
+++ b/static/v10/man8/gettable.8
@@ -0,0 +1,65 @@
+.\" Copyright (c) 1983 The Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms are permitted
+.\" provided that the above copyright notice and this paragraph are
+.\" duplicated in all such forms and that any documentation,
+.\" advertising materials, and other materials related to such
+.\" distribution and use acknowledge that the software was developed
+.\" by the University of California, Berkeley. The name of the
+.\" University may not be used to endorse or promote products derived
+.\" from this software without specific prior written permission.
+.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
+.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
+.\"
+.\" @(#)gettable.8 6.3 (Berkeley) 9/20/88
+.\"
+.TH GETTABLE 8 "September 20, 1988"
+.UC 5
+.SH NAME
+gettable \- get NIC format host tables from a host
+.SH SYNOPSIS
+.B /etc/gettable
+[
+.B \-v
+]
+.I host
+[ outfile ]
+.SH DESCRIPTION
+.I Gettable
+is a simple program used to obtain the NIC standard
+host tables from a ``nicname'' server. The indicated
+.I host
+is queried for the tables. The tables, if retrieved,
+are placed in the file
+.I outfile
+or by default,
+.IR hosts.txt .
+.PP
+The
+.B \-v
+option will get just the version number instead of the complete host table
+and put the output in the file
+.I outfile
+or by default,
+.IR hosts.ver .
+.PP
+.I Gettable
+operates by opening a TCP connection to the port indicated
+in the service specification for ``nicname''. A request
+is then made for ``ALL'' names and the resultant information
+is placed in the output file.
+.PP
+.I Gettable
+is best used in conjunction with the
+.IR htable (8)
+program which converts the NIC standard file format to
+that used by the network library lookup routines.
+.SH "SEE ALSO"
+intro(3), htable(8), named(8)
+.SH BUGS
+If the name-domain system provided network name mapping well as host
+name mapping,
+.I gettable
+would no longer be needed.
diff --git a/static/v10/man8/getty.8 b/static/v10/man8/getty.8
new file mode 100644
index 00000000..41c7cf37
--- /dev/null
+++ b/static/v10/man8/getty.8
@@ -0,0 +1,88 @@
+.TH GETTY 8
+.CT 1 sa_auto secur
+.SH NAME
+getty \- set terminal mode
+.SH SYNOPSIS
+.B /etc/getty
+[
+.I char
+]
+.SH DESCRIPTION
+.I Getty
+is invoked by
+.IR init (8)
+after a terminal is opened.
+While reading the user's name
+.I getty
+attempts to adapt the system to the speed and type of terminal
+being used.
+.PP
+.I Init
+calls
+.I getty
+with an argument specified by the
+.IR ttys (5)
+entry for the terminal line.
+The argument
+.I char
+determines the line speed
+and other characteristics;
+see below.
+.I Getty
+then types a banner identifying the system (from
+.FR /etc/whoami )
+and the
+.L login:
+message.
+The user's name is then read, a character at a time.
+If a null character is received, it is assumed to be the result
+of the user pushing the `break' (`interrupt') key.
+The speed is then
+changed to another baud rate and
+.L login:
+is typed again.
+Successive breaks cycle through a set of speeds.
+.PP
+The user's name is terminated by a newline or
+carriage return.
+The latter results in the system being set to
+treat carriage returns appropriately (see
+.IR ioctl (2)).
+.PP
+Finally,
+.IR login (8)
+is called with the user's name as argument.
+.PP
+Here are the possible values for
+.IR char .
+If more than one speed is given,
+the first speed is used initially;
+others are selected by successive depressions of the
+BREAK key.
+Other things,
+like delays and tab expansion,
+are set in various ways as well.
+.PP
+.de fq
+\f5\\$1 \fR\\$2 \\$3 \\$4 \\$5 \\$6
+..
+.nf
+char speed
+.fq 0 300-1200-150-110
+.fq 2 9600
+.fq 3 1200-300
+.fq 4 300
+.fq 5 300-1200
+.fq 6 2400
+.fq 7 4800
+.fq 8 9600-1200-300
+.fq 9 300-9600-1200
+.fq a 2400-1200
+.fq b 1200-2400
+.fq j exta (usually 19200)
+.fi
+.SH "SEE ALSO"
+.IR init (8),
+.IR login (8),
+.IR ioctl (2),
+.IR ttys (5)
diff --git a/static/v10/man8/halt.8 b/static/v10/man8/halt.8
new file mode 100644
index 00000000..cd4de601
--- /dev/null
+++ b/static/v10/man8/halt.8
@@ -0,0 +1,21 @@
+.TH HALT 8
+.UC 4
+.SH NAME
+halt \- halt the processor
+.SH SYNOPSIS
+.B /etc/halt
+[
+.B \-n
+]
+.SH DESCRIPTION
+.I Halt
+writes out sandbagged information to the disks and then halts
+the processor. The machine does not reboot, even if the auto-reboot
+switch is set on the console.
+.PP
+The
+.B \-n
+option prevent the sync before the reboot.
+.SH SEE ALSO
+reboot(8)
+.SH BUGS
diff --git a/static/v10/man8/htable.8 b/static/v10/man8/htable.8
new file mode 100644
index 00000000..f98c9b05
--- /dev/null
+++ b/static/v10/man8/htable.8
@@ -0,0 +1,116 @@
+.\" Copyright (c) 1983 The Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms are permitted
+.\" provided that the above copyright notice and this paragraph are
+.\" duplicated in all such forms and that any documentation,
+.\" advertising materials, and other materials related to such
+.\" distribution and use acknowledge that the software was developed
+.\" by the University of California, Berkeley. The name of the
+.\" University may not be used to endorse or promote products derived
+.\" from this software without specific prior written permission.
+.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
+.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
+.\"
+.\" @(#)htable.8 6.4 (Berkeley) 9/20/88
+.\"
+.TH HTABLE 8 "September 20, 1988"
+.UC 5
+.SH NAME
+htable \- convert NIC standard format host tables
+.SH SYNOPSIS
+.B /etc/htable
+[
+.B \-c
+.I connected-nets
+] [
+.B \-l
+.I local-nets
+]
+.I file
+.SH DESCRIPTION
+.I Htable
+is used to convert host files in the format specified
+in Internet RFC 810 to the format used by the network
+library routines. Three files are created as a result
+of running
+.IR htable :
+.IR hosts ,
+.IR networks ,
+and
+.IR gateways .
+The
+.I hosts
+file may be used by the
+.IR gethostbyname (3N)
+routines in mapping host names to addresses
+if the nameserver,
+.IR named (8),
+is not used.
+The
+.I networks
+file is used by the
+.IR getnetent (3N)
+routines in mapping network names to numbers.
+The
+.I gateways
+file may be used by the routing daemon
+in identifying ``passive'' Internet gateways;
+see
+.IR routed (8C)
+for an explanation.
+.PP
+If any of the files
+.IR localhosts ,
+.IR localnetworks ,
+or
+.I localgateways
+are present in the current directory,
+the file's contents is prepended to the
+output file.
+Of these, only the gateways file is interpreted.
+This allows sites to maintain local aliases and
+entries which are not normally present in the
+master database.
+Only one gateway to each network will be placed in the gateways file;
+a gateway listed in the localgateways file will override any in the
+input file.
+.PP
+If the gateways file is to be used,
+a list of networks to which the host is directly connected
+is specified with the
+.B \-c
+flag.
+The networks, separated by commas,
+may be given by name or in Internet-standard dot notation,
+e.g.
+.B \-c
+arpanet,128.32,local-ether-net.
+.I Htable
+only includes gateways
+which are directly connected to one of the networks specified,
+or which can be reached from another gateway on a connected net.
+.PP
+If the
+.B \-l
+option is given with a list of networks (in the same format as for
+.BR \-c ),
+these networks will be treated as ``local,''
+and information about hosts on local networks is
+taken only from the localhosts file.
+Entries for local hosts from the main database will be omitted.
+This allows the localhosts file to completely override
+any entries in the input file.
+.PP
+.I Htable
+is best used in conjunction with the
+.IR gettable (8)
+program which retrieves the NIC database from a host.
+.SH "SEE ALSO"
+netintro(4), gettable(8), named(8)
+.SH BUGS
+If the name-domain system provided network name mapping well as host
+name mapping,
+.I htable
+would no longer be needed.
diff --git a/static/v10/man8/icheck.8 b/static/v10/man8/icheck.8
new file mode 100644
index 00000000..b4ae5804
--- /dev/null
+++ b/static/v10/man8/icheck.8
@@ -0,0 +1,182 @@
+.TH ICHECK 8
+.CT 1 sa_nonmortals
+.SH NAME
+icheck, dcheck, ncheck \- file system consistency check
+.SH SYNOPSIS
+.B /etc/icheck
+[
+option ... ]
+.I filesystem ...
+.PP
+.B /etc/dcheck
+[
+option ... ]
+.I filesystem ...
+.PP
+.B /etc/ncheck
+[
+option ... ]
+.I filesystem ...
+.SH DESCRIPTION
+These programs perform
+consistency checks on file systems.
+For normal file system maintenance, see
+.IR fsck (8).
+Common options are
+.TP
+.B -B
+The file system is bitmapped.
+If
+.I filesystem
+is a special file, this option is set automatically from
+the minor device number.
+.TP
+.BI -i " number ...
+Report only on specified inode
+.I numbers
+.RI ( dcheck
+and
+.I ncheck
+only).
+.PP
+.I Icheck
+examines each
+.I filesystem,
+builds a list of used blocks,
+and compares this list against
+the free list maintained on the file system.
+The normal output of
+.I icheck
+includes a report of
+.IP ""
+The total number of files and the numbers of
+regular, directory, block special and character special files.
+.IP ""
+The total number of blocks in use and the numbers of
+single-, double-, and triple-indirect blocks and directory blocks.
+.IP ""
+The number of free blocks.
+.IP ""
+The number of blocks missing;
+.I i.e.\&
+not in any file
+nor in the free list.
+.PP
+Other
+.I icheck
+options are
+.TP
+.B -s
+Ignore the free list and reconstruct a new one
+by rewriting the super-block of the file system.
+The file system should be dismounted while this is done;
+if this is not possible (for example if
+the root file system has to be salvaged)
+care should be taken that the system is quiescent.
+The words in the super-block
+which indicate the size of the free list and of the
+i-list are believed.
+If the super-block has been curdled
+these words will have to be patched.
+The normal output reports are suppressed.
+.TP
+.BI -b " number ...
+Report each appearance of the selected block
+.I numbers
+in a file or on the free list.
+.TP
+.B -d
+Report each duplicate block.
+.TP
+.B -m
+Report each missing block.
+.TP
+.B -e
+Print at most one diagnostic per file;
+useful for badly curdled file systems.
+.PP
+.I Dcheck
+reads the directories in each
+.I filesystem
+and compares
+the link count in each inode with the number of directory
+entries by which it is referenced.
+.PP
+.I Ncheck
+generates a list of pathname vs i-number for each named
+.I filesystem.
+Other
+.I ncheck
+options are
+.TP
+.B -a
+Report
+.L .
+and
+.LR .. ,
+which are normally ignored.
+.TP
+.B -s
+Report only special files, and files with
+set-userid or set-groupid mode;
+helpful in finding security breaches.
+.SH "SEE ALSO"
+.IR filsys (5),
+.IR chuck (8),
+.IR fsck (8),
+.IR clri (8)
+.SH DIAGNOSTICS
+For duplicate blocks
+and bad blocks (which lie outside the file system)
+.I icheck
+announces the difficulty, the i-number, and the kind of block involved.
+If a read error is encountered,
+the block number of the bad block is printed and
+.I icheck
+considers it to contain 0.
+`Bad freeblock' means that
+a block number outside the available space was encountered in the free list.
+`Dups in free'
+means that
+blocks were found in the free list which
+duplicate blocks either in some file or in the
+earlier part of the free list.
+.PP
+When a file turns up for which the link-count and the number
+of directory entries disagree,
+.I dcheck
+reports the relevant facts.
+Allocated files which have 0 link-count and no entries are also
+listed.
+The only dangerous situation
+occurs when there are more entries than links;
+if entries are removed,
+so the link-count drops to 0,
+the remaining entries point to thin air.
+They should be removed.
+When there are more links than entries, or there is
+an allocated file with neither links nor entries,
+some disk space may be lost but the situation will not degenerate.
+.PP
+When the filesystem structure is improper,
+.I ncheck
+prints
+.L ??
+to denote the `parent' of
+a parentless file.
+A pathname beginning with
+.L ...
+denotes a loop.
+.SH BUGS
+Extraneous diagnostics
+may be produced if these commands are applied to
+active file systems.
+.br
+They believe even preposterous super-blocks and
+consequently can get core images.
+.br
+.I Ncheck's
+report is in no useful
+order, and probably should be sorted.
+.I Ncheck
+fails to report the root inode.
diff --git a/static/v10/man8/inews.8 b/static/v10/man8/inews.8
new file mode 100644
index 00000000..561d345f
--- /dev/null
+++ b/static/v10/man8/inews.8
@@ -0,0 +1,93 @@
+.TH INEWS 8
+.SH NAME
+inews \- submit news articles
+.SH SYNOPSIS
+.B inews
+[
+.B \-h
+]
+.B \-t
+title [
+.B \-n
+newsgroup ... ] [
+.B \-e
+expiration ]
+.PP
+.B inews \-p
+[ file ]
+.PP
+.B inews \-C
+newsgroup
+.SH DESCRIPTION
+.I Inews
+submits netnews articles.
+It is not intended for people; see
+.IR postnews (1)
+for routine use.
+The first form is for submitting articles;
+the second for receiving articles from other machines;
+the third for creating newsgroups.
+.PP
+In the first form, the article is read from the standard input.
+A
+.I title
+must be specified, one or more
+.I newsgroups
+(default `general')
+may be specified, and a nonstandard
+.I expiration
+date may be specified.
+Option
+.B \-f
+substitutes another sender's name instead of the user.
+Option
+.B \-h
+specifies that headers are present at the beginning of the
+article and should be included with the article
+header instead of as text.
+.PP
+The sender's full name is taken from the environment variable NAME,
+or from the system index (often
+.IR passwd (5)).
+The environment variable ORGANIZATION overrides the system default.
+.PP
+In the second form
+.I inews
+reads the article from the named
+.I file.
+.PP
+The third form is for creating new newsgroups.
+This may
+be limited to specific users such as the super-user or news administrator.
+.SH FILES
+.PD 0
+.TP \w'/usr/spool/news/newsgroup/article_no 'u
+/usr/spool/news/.sys.nnn
+temporary articles
+.TP
+.RI /usr/spool/news/ newsgroup / article_no
+articles
+.TP
+/usr/spool/oldnews/
+expired articles
+.TP
+/usr/lib/news/active
+known newsgroups and highest article number in each
+.TP
+/usr/lib/news/seq
+sequence number of last article
+.TP
+/usr/lib/news/history
+list of all articles ever seen
+.TP
+/usr/lib/news/sys
+system subscription list
+.PD
+.SH "SEE ALSO"
+news(5),
+newsrc(5),
+postnews(1),
+readnews(1),
+recnews(8),
+sendnews(8)
+uurec(8)
diff --git a/static/v10/man8/init.8 b/static/v10/man8/init.8
new file mode 100644
index 00000000..72def2a8
--- /dev/null
+++ b/static/v10/man8/init.8
@@ -0,0 +1,147 @@
+.TH INIT 8
+.CT 1 sa_auto secur
+.SH NAME
+init \- process control initialization
+.SH SYNOPSIS
+.B /etc/init
+.SH DESCRIPTION
+.I Init
+is invoked by the kernel as the last step in the boot procedure.
+It is always process 1.
+.PP
+When started normally,
+.I init
+calls
+.IR rc (8).
+The security label is set at bottom.
+If this succeeds,
+.I init
+begins multi-user operation.
+If
+.I rc
+fails,
+.I init
+commences single user operation by executing
+a superuser shell,
+.IR nosh (8),
+with bottom security label, top ceiling, and all privileges.
+.PP
+When started by a cold boot from the console,
+.I init
+starts single user operation immediately.
+When the single user shell terminates,
+.I init
+runs
+.IR rc
+without the parameter,
+and begins multi-user operation.
+.PP
+In multi-user operation,
+.IR init 's
+role is to create a process for each
+directly connected terminal port on which a user may log in.
+To begin such operations, it reads the
+.IR ttys (5)
+file and forks to create a process
+for each terminal specified in the file.
+Each of these processes opens the appropriate terminal
+for reading and writing
+on file descriptors 0, 1, 2, and 3 (the standard input and
+output, the diagnostic output and
+.FR /dev/tty ).
+The security label of each port is set to that of file
+.FR /etc/floor .
+Opening the terminal will usually involve a delay,
+since the
+.I open
+is not completed until someone
+dials and carrier is established on the channel.
+Then
+.IR getty (8)
+is called with argument as specified by the second character of
+the
+.I ttys
+file line.
+.I Getty
+reads the user's name and invokes
+.IR login (8)
+to log in the user and execute the shell.
+.PP
+Ultimately the shell will terminate
+because of an end-of-file or as a result of hanging up.
+The main path of
+.IR init ,
+which has been waiting
+for such an event,
+wakes up and removes the appropriate entry from the
+file
+.IR utmp (5),
+which records current users, and
+makes an entry in
+.IR wtmp ,
+which maintains a history
+of logins and logouts.
+Then the appropriate terminal is reopened and
+.I getty
+is
+invoked again.
+.PP
+.I Init
+catches signal
+.B SIGHUP
+and interprets it to mean that
+the
+.I ttys
+file
+should be read again.
+The shell process on each line that has become inactive
+according to
+.I ttys
+is terminated;
+a new process is created for each line added;
+lines unchanged in the file are undisturbed.
+Thus it is possible to drop or add terminal lines without
+rebooting the system by changing the
+.I ttys
+file and sending a
+.I hangup
+signal to the
+.I init
+process: use
+.LR "kill -1 1" .
+.PP
+.I Init
+will terminate multi-user operations,
+kill all outstanding processes,
+and resume single-user mode
+if sent signal
+.BR SIGTERM :
+use
+.LR "kill 1" .
+.I Init
+will wait at most 30 seconds for outstanding processes to die,
+to avoid waiting forever.
+.PP
+If, at bootstrap time, the
+.I init
+program cannot be executed,
+the system will loop in user mode at a low address.
+.SH FILES
+.nf
+.F /dev/console
+.F /dev/tty
+.F /etc/utmp
+.F /usr/adm/wtmp
+.F /etc/ttys
+.F /etc/rc.nosh
+.fi
+.SH "SEE ALSO"
+.IR login (8),
+.IR kill (1),
+.IR sh (1),
+.IR ttys (5),
+.IR getty (8),
+.IR rc (8),
+.IR reboot (8)
+.SH BUGS
+The single-user shell has all privileges.
diff --git a/static/v10/man8/ino.8 b/static/v10/man8/ino.8
new file mode 100644
index 00000000..be9c35c4
--- /dev/null
+++ b/static/v10/man8/ino.8
@@ -0,0 +1,10 @@
+.th INO VIII 11/1/73
+.sh NAME
+ino \*- get the i-number of a file
+.sh SYNOPSIS
+.bd ino
+file ...
+.sh DESCRIPTION
+The i-number of each file argument is printed.
+An i-number of zero is printed if a bad argument is given.
+.sh BUGS
diff --git a/static/v10/man8/ins.8 b/static/v10/man8/ins.8
new file mode 100644
index 00000000..f4efaa4e
--- /dev/null
+++ b/static/v10/man8/ins.8
@@ -0,0 +1,103 @@
+.TH INS 8
+.SH NAME
+ins \- install software
+.SH USAGE
+.B ins
+[
+.I option ...
+]
+[
+[
+.I source
+]
+.I target
+]
+.SH DESCRIPTION
+.I Ins
+queues a request to `install' the named
+.I target
+file \- in the simplest case, by copying from
+.I source
+to
+.BR target " \-
+and then attempts to execute all pending requests
+for the target,
+until thwarted by lack of privilege.
+By default, each target has a separate queue, but if several files are
+to be updated together their requests can
+also be placed in another separate queue.
+If modification requests for a given target file appear in several
+different queues, those requests will be executed in correct time
+order.
+A request will be served only when it is at the front of all the queues
+it is in.
+.PP
+If no target is named,
+.I ins
+attempts to serve all pending requests.
+The options are
+.TP
+.B -x
+Verify consistency of currently queued-up requests
+with historical record in
+.F /usr/spool/ins/log.
+.TP
+.B -v
+Print a verbose commentary
+(by copying logging data to standard output).
+.TP
+.B -n
+Print, but do not execute, the modification requests.
+.TP
+.BI -j " jobnumber" "...
+Delete a queued-up request.
+Possible values for
+.I jobnumber
+are revealed by using the
+.B -n
+flag, where they are listed in the style
+.BI /usr/spool/ins/job jobnumber.
+.TP
+.BI -q " queuename
+Put the request in special named queue, in addition to the
+queue for
+.I target.
+.TP
+.B -r
+Remove target.
+.TP
+.BI -o " owner
+Set uid of target.
+.TP
+.BI -g " group
+Set gid of target.
+.TP
+.BI -m " mode
+Set file mode of target, as in
+.IR chmod (1).
+.TP
+.BI -l " label
+Set file label of target, as in
+.IR setlab (1).
+.TP
+.BI -p " cap lic
+Set file privileges, as in
+.IR setpriv (8).
+.PP
+.I Ins
+records
+.IR xs (8)-style
+checksums of both modified software and of its own queues,
+keeps a verbose log file, etc, etc.
+.SH FILES
+.F /usr/spool/ins/log
+.br
+.F /usr/spool/ins/lock
+.br
+.F /usr/spool/ins/pending
+.br
+.F /usr/spool/ins/job*
+.br
+.F /usr/spool/ins/dat*
+.SH BUGS
+Not written yet.
diff --git a/static/v10/man8/install.8 b/static/v10/man8/install.8
new file mode 100644
index 00000000..966aeffa
--- /dev/null
+++ b/static/v10/man8/install.8
@@ -0,0 +1,34 @@
+.TH INSTALL 8 bowell
+.SH NAME
+install \- place files in their proper homes
+.SH SYNOPSIS
+.B /etc/install
+[
+.B \-c
+] [ \-s ]
+file dest
+.SH DESCRIPTION
+.I Install
+moves or copies the
+.I file
+to
+.I dest.
+If
+.I dest
+is a directory, the file is installed in the directory.
+Its main use is in makefiles subsidiary to the primary source directory /src.
+.PP
+Option
+.B \-c
+causes the file to be copied, otherwise it is moved.
+Option
+.B \-s
+invokes
+.IR strip (1)
+on the file first.
+.PP
+If possible, the group and owner of
+.I dest
+are changed to `bin'.
+.SH BUGS
+Only one option can appear.
diff --git a/static/v10/man8/ipconfig.8 b/static/v10/man8/ipconfig.8
new file mode 100644
index 00000000..6fcc66c7
--- /dev/null
+++ b/static/v10/man8/ipconfig.8
@@ -0,0 +1,125 @@
+.TH IPCONFIG 8
+.CT 1 sa_auto
+.SH NAME
+ipconfig, dkipconfig, udpconfig \- set up DARPA Internet protocols
+.SH SYNOPSIS
+.B /usr/ipc/mgrs/ipconfig
+[
+.B -m
+.I mask
+] [
+.B -df
+]
+.I "ip-device localhost network"
+.BI [ arp-device ]
+.B &
+.br
+.B /usr/ipc/mgrs/dkipconfig
+.I "gatemachine localhost remotehost"
+.B &
+.br
+.B /usr/ipc/mgrs/udpconfig
+.I udp-device
+.B &
+.SH DESCRIPTION
+.I Ipconfig
+activates the DARPA Internet protocol on a communications device,
+with Internet address
+.I localhost
+for the host
+and network address
+.I network
+for the device.
+.PP
+If
+.I arp-device
+is specified,
+the ARP address resolution protocol
+is started on that device.
+Option
+.B -d
+causes
+.I ipconfig
+to print ARP requests on the standard output
+as they are received.
+.PP
+Option
+.B -m
+declares a subnet mask
+for the network reached through
+.IR ip-device .
+.I Mask
+may be a four-piece IP address like
+.L 255.255.255.0
+or a 32-bit hexadecimal number like
+.LR ffffff00 .
+.PP
+Option
+.B -f
+is a special workaround for networks with obsolete hosts.
+It causes
+.I ipconfig
+to answer illegal ARP requests for the subnet's broadcast address
+with an illegal Ethernet address,
+to prevent broadcast storms.
+.PP
+.I Dkipconfig
+places a network call to
+.I gatemachine
+and activates the IP protocol on the connection,
+so that the remote machine becomes a gateway for the caller's IP traffic.
+.I Localhost
+becomes the calling machine's Internet address
+through this IP interface;
+.I remotehost
+is the Internet address
+to which local IP packets should be sent
+to reach the gateway.
+.PP
+.I Ipconfig
+and
+.I dkipconfig
+record unusual events and errors in
+log files
+.F /usr/ipc/log/ipconfig
+and
+.FR /usr/ipc/log/dkipconfig .
+.PP
+.I Udpconfig
+activates the UDP datagram protocol
+on the named
+.IR udp-device ,
+usually
+.FR /dev/ipudp .
+Only one
+.I udpconfig
+is needed for the entire collection of IP networks.
+.PP
+These programs are usually run once from
+.IR rc (8).
+.SH EXAMPLES
+The following calls start IP
+on system
+.B fs
+on the first Interlan Ethernet controller,
+with ARP active;
+arrange for machine
+.B nj/astro/research
+to pass IP packets to
+.BR fs ;
+and activate
+UDP.
+.EX
+/usr/ipc/mgrs/ipconfig /dev/il00 fs mh-astro-net /dev/il01 &
+/usr/ipc/mgrs/dkipconfig nj/astro/research fs-dk research-dk127 &
+/usr/ipc/mgrs/udpconfig /dev/ipudp &
+.EE
+.SH FILES
+.F /usr/ipc/log/ipconfig
+.br
+.F /usr/ipc/log/dkipconfig
+.SH "SEE ALSO"
+.IR con (1),
+.IR qns (7),
+.IR route (8),
+.IR tcpmgr (8)
diff --git a/static/v10/man8/istat.8 b/static/v10/man8/istat.8
new file mode 100644
index 00000000..d44f3133
--- /dev/null
+++ b/static/v10/man8/istat.8
@@ -0,0 +1,35 @@
+.pa 1
+.he 'ISTAT (VIII)'1/20/73'ISTAT (VIII)'
+.ti 0
+NAME istat -- get inode status
+.sp
+.ti 0
+SYNOPSIS istat_____ [ filesystem ] inumber\d1\u ...
+.sp
+.ti 0
+DESCRIPTION istat_____
+gives information about one or more i-nodes
+on the given file system or on /dev/rk0 if no file system
+is given.
+.sp
+The information is in exactly the same form
+as that for stat(I),
+except that mode letter "a" is
+used to indicate that the i-node is allocated,
+"u" that it is unallocated.
+.sp
+.ti 0
+FILES /etc/uids,
+/dev/rk0
+.sp
+.ti 0
+SEE ALSO stat(I), ls(I) (-l option)
+.sp
+.ti 0
+DIAGNOSTICS --
+.sp
+.ti 0
+BUGS istat_____
+ignores any read error
+and pretends to give status even if the file system
+is not physically present.
diff --git a/static/v10/man8/kill.8 b/static/v10/man8/kill.8
new file mode 100644
index 00000000..0c6db3ff
--- /dev/null
+++ b/static/v10/man8/kill.8
@@ -0,0 +1,36 @@
+.pa 1
+.he 'KILL (VIII)'1/20/73'KILL (VIII)'
+.ti 0
+NAME kill -- terminate process with extreme prejudice
+.sp
+.ti 0
+SYNOPSIS /usr/adm/kill_____________ processnumber
+.sp
+.ti 0
+DESCRIPTION After ps__
+(q.v.) has given you the unique ID of a process, you can terminate
+it by this command.
+A core image is produced in the process's working directory.
+
+Only the super-user can exercise this privilege.
+.sp
+.ti 0
+FILES --
+.sp
+.ti 0
+SEE ALSO ps (VIII)
+.sp
+.ti 0
+DIAGNOSTICS yes
+.sp
+.ti 0
+BUGS If the process
+has executed sys nice (II)
+and there is another process which has not, but
+which loops,
+the first process cannot be done in properly,
+since it has to be swapped in so as cooperate
+in its own murder.
+
+It would also be nice if ordinary people could
+kill their own processes.
diff --git a/static/v10/man8/kmc.8 b/static/v10/man8/kmc.8
new file mode 100644
index 00000000..a2e40dc2
--- /dev/null
+++ b/static/v10/man8/kmc.8
@@ -0,0 +1,107 @@
+.TH KMC 8
+.CT 1 sa_nonmortals
+.SH NAME
+kmc, kdiload, kmcdump \- control KMC11 input/output processors
+.SH SYNOPSIS
+.B /etc/kdiload
+[
+.I dev
+[
+.I file
+] ]
+.PP
+.B /etc/kmcdump
+[
+.I dev
+]
+.SH DESCRIPTION
+These commands control the KMC11-B
+microprocessors
+used for Datakit protocol processing.
+.PP
+.I Kdiload
+resets KMC device
+.IR dev ,
+copies the microcode in
+.IR file
+into the KMC's memory,
+and starts the KMC.
+.I Dev
+may be a pathname
+or a single character key
+identifying the KMC;
+the default is
+.LR 2 .
+.I File
+defaults to that specified in
+.F /etc/kmctab
+if a single character key is used,
+.F /etc/dkk.dubhi
+otherwise.
+.PP
+.I Kmcdump
+stops the KMC
+and copies its state into files
+in the working directory.
+.I Dev
+may be a single character key
+or a pathname;
+the default is
+.LR 2 .
+The KMC's memory is copied to the file
+.BI core. k . nnn\c
+,
+where
+.I k
+is the keyletter
+and
+.I nnn
+is some number;
+the state of the KMC's registers and some trace information from Unix
+is written to
+.BI regs. k . nnn\c
+\&.
+.PP
+These commands search the file
+.F /etc/kmctab
+for KMC devices and microcode files.
+The file contains lines of
+three blank-separated fields:
+.PP
+.RS
+single character identifying this KMC
+.br
+full pathname of the KMC device file
+.br
+full pathname of the microcode to be used in this KMC
+.RE
+.PP
+The KMC with key
+.I K
+uses Datakit special files with names like
+.BI /dev/dk/dk K 03\c
+\&.
+If there is only one KMC for Datakit,
+its key is
+.LR 2 .
+If the only KMC is the only Datakit interface in a machine,
+its key is
+.LR 2 ,
+and its special files look like
+.BR /dev/dk/dk03 .
+.SH FILES
+.F /etc/kmctab
+.br
+.F /bin/kasb
+.SH SEE ALSO
+.IR dkmgr (8)
+.SH BUGS
+For the moment,
+the only permissible keys are
+.L 0
+and
+.LR 2 .
+The KMC and Datakit filename conventions
+are arcane,
+and based on obsolete notions;
+they should be replaced.
diff --git a/static/v10/man8/ldpcs.8 b/static/v10/man8/ldpcs.8
new file mode 100644
index 00000000..31db6da2
--- /dev/null
+++ b/static/v10/man8/ldpcs.8
@@ -0,0 +1,58 @@
+.TH LDPCS 8 VAX-11/750
+.CT 1 sa_auto
+.SH NAME
+ldpcs \- load comet microcode
+.SH SYNOPSIS
+.B /etc/ldpcs
+[
+.B -f
+]
+[
+.B -v
+]
+.I pcsfile
+.SH DESCRIPTION
+.I Ldpcs
+loads microcode
+from
+.I pcsfile
+into the VAX-11/750 patchable control store.
+Normally,
+the hardware ID register is checked
+to see that the system is an 11/750
+and that its base microcode revision level
+is appropriately high;
+the
+.B -f
+option
+removes the checks.
+The
+.B -v
+option causes the microcode version number
+to be printed after loading.
+.PP
+.I Ldpcs
+is usually called from
+.IR rc (8)
+to load the most recent
+.SM DEC
+microcode patches from
+.FR /etc/pcs750.bin .
+.PP
+The patch file consists of
+1024 bytes of patch bits,
+followed by 10240 bytes of actual patches.
+Each patch bit represents a 20-bit microcode word;
+the patches themselves are 20-bit words
+packed together.
+The format is the same as that distributed by DEC.
+.SH FILES
+.F /dev/mem
+.br
+.F /dev/mtpr
+.SH BUGS
+Calling
+.I ldpcs
+is a good idea,
+but it is not mandatory;
+the system will run without the patches.
diff --git a/static/v10/man8/login.8 b/static/v10/man8/login.8
new file mode 100644
index 00000000..50336078
--- /dev/null
+++ b/static/v10/man8/login.8
@@ -0,0 +1,138 @@
+.TH LOGIN 8
+.CT 1 sa_auto
+.SH NAME
+login \- sign on
+.SH SYNOPSIS
+.B /etc/login
+.I name
+.br
+.B /etc/login
+.B -f
+.I name
+[
+.I cmd
+]
+.br
+.B /etc/login
+.B -p
+.I passwd-line
+[
+.I cmd
+]
+.SH DESCRIPTION
+.I Login
+is executed by
+.IR getty (8).
+See the Introduction to this volume for how to dial up initially.
+.PP
+.I Login
+asks for a password if appropriate.
+Echoing is turned off during the typing of the password.
+The
+.B -f
+option forces login of the named user, without a password.
+.B -p
+is similar to
+.BR -f ,
+but an entire line of password file information
+is supplied.
+.PP
+.I Login
+initializes the userid, the groupid, and the working directory
+according to specifications found in the password file;
+see
+.IR passwd (5).
+It also initializes environment variables
+.SM PATH
+and
+.SM HOME .
+Finally it executes a command interpreter (usually
+.IR sh (1)).
+Argument 0 of the command interpreter is its name with
+a dash
+.RL ( - )
+prepended.
+If
+a
+.I cmd
+argument was present,
+two additional arguments
+.B -c
+.I cmd
+are passed,
+and environment variable
+.SM REXEC
+is set to
+.LR 1 .
+.PP
+Upon a successful login,
+accounting files are updated and,
+if no options are present,
+the message of the day is printed
+and the user is informed of the
+existence of mail.
+.PP
+Successful logins are recorded in
+.F /etc/utmp
+and
+.FR /usr/adm/wtmp .
+If
+.I cmd
+was present,
+.L *
+is appended to the login name in
+.IR wtmp ,
+and
+no record is made in
+.IR utmp .
+.PP
+Only the super-user may execute
+.IR login .
+.SH FILES
+.TF /usr/spool/mail/*
+.TP
+.F /etc/utmp
+accounting
+.TP
+.F /usr/adm/wtmp
+accounting
+.TP
+.F /usr/spool/mail/*
+mail
+.TP
+.F /etc/motd
+message-of-the-day
+.TP
+.F /etc/passwd
+password file
+.TP
+.F /etc/group
+groups file
+.SH "SEE ALSO"
+.IR newgrp (1),
+.IR passwd (1),
+.IR environ (5),
+.IR passwd (5),
+.IR getty (8),
+.IR init (8),
+.IR su (8),
+.IR svcmgr (8).
+.SH DIAGNOSTICS
+`Login incorrect':
+the name or the password is bad.
+.br
+`No Shell' or `no directory': the initial shell or
+home directory specified in the password file does not exist.
+.br
+`Cannot open password file': things are badly curdled.
+.SH BUGS
+Information passed to options
+.B -p
+and
+.B -f
+is not checked.
+Only trusted programs should run
+.IR login .
+Only trusted programs may usefully do so anyway;
+.I login
+has no privileges.
diff --git a/static/v10/man8/makekey.8 b/static/v10/man8/makekey.8
new file mode 100644
index 00000000..193201bf
--- /dev/null
+++ b/static/v10/man8/makekey.8
@@ -0,0 +1,53 @@
+.TH MAKEKEY 8
+.CT 1 sa_nonmortals
+.SH NAME
+makekey \- generate encryption key
+.SH SYNOPSIS
+.B /usr/lib/makekey
+.SH DESCRIPTION
+.I Makekey
+improves the usefulness of encryption schemes depending on a key by
+increasing the amount of time required to search the key space.
+It
+reads 10 bytes from its standard input, and writes 13 bytes on its
+standard output.
+The output depends on the input in a way intended to
+be difficult to compute (i.e. to require a substantial fraction of a
+second).
+.PP
+The first eight input bytes
+(the
+.IR "input key" )
+can be arbitrary
+.SM ASCII
+characters.
+The last
+two (the
+.IR salt )
+are best chosen from the set of digits, upper- and lower-case
+letters,
+.L .
+and
+.LR / .
+The salt characters are repeated as the first two characters of the output.
+The remaining 11 output characters are chosen from the same set as the salt
+and constitute the
+.I "output key."
+.PP
+The salt is used to select one of 4096 cryptographic
+machines all based on the National Bureau of Standards
+.SM DES
+algorithm, but modified in 4096 different ways.
+Using the input key as key,
+a constant string is fed into the machine and recirculated
+a number of times.
+The 64 bits that come out are distributed into the
+66 useful key bits in the result.
+.PP
+.I Makekey
+is intended for programs, such as
+.IR crypt (1),
+that perform encryption.
+Usually its input and output will be pipes.
+.SH SEE ALSO
+.IR crypt (1)
diff --git a/static/v10/man8/mkfs.8 b/static/v10/man8/mkfs.8
new file mode 100644
index 00000000..595723ba
--- /dev/null
+++ b/static/v10/man8/mkfs.8
@@ -0,0 +1,138 @@
+.th MKFS VIII 11/1/73
+.sh NAME
+mkfs \*- construct a file system
+.sh SYNOPSIS
+.bd /etc/mkfs
+special
+proto
+.sh DESCRIPTION
+.it Mkfs
+constructs a file system
+by writing on the special file
+.it special
+according to the directions
+found in
+the prototype file
+.it proto.
+The prototype file
+contains tokens separated by spaces or
+new lines.
+The first token is the name of a file
+to be copied onto block zero as
+the bootstrap program
+(see boot procedures(VIII)).
+The second token is a number specifying the
+size of the created file system.
+Typically it will be the number of blocks on the device,
+perhaps diminished
+by space for swapping.
+The next token is the i-list size in blocks
+(remember there are 16 i-nodes per block).
+The next set of tokens comprise the specification
+for the root file.
+File specifications consist of tokens
+giving the mode,
+the user-id,
+the group id,
+and the initial contents of the file.
+The syntax of the contents field
+depends on the mode.
+.s3
+The mode token for a file is a 6 character string.
+The first character
+specifies the type of the file.
+(The characters
+.bd \*-bcd
+specify regular, block special,
+character special and directory files
+respectively.)
+The second character of the type
+is either
+.bd u
+or
+.bd \*-
+to specify set-user-id mode or not.
+The third is
+.bd g
+or
+.bd \*-
+for the set-group-id mode.
+The rest of the mode
+is a three digit octal number giving the
+owner, group, and foreigner read, write, execute
+permissions (see
+.it chmod
+(I)).
+.s3
+Two decimal number
+tokens come after the mode; they specify the
+user and group ID's of the owner of the file.
+.s3
+If the file is a regular file,
+the next token is a pathname
+whence the contents and size are copied.
+.s3
+If the file is a block or character special file,
+two decimal number tokens
+follow which give the major and minor device numbers.
+.s3
+If the file is a directory,
+.it mkfs
+makes the entries \fB.\fR and \fB..\fR
+and then
+reads a list of names and
+(recursively)
+file specifications for the entries
+in the directory.
+The scan is terminated with the
+token \fB$\fR.
+.s3
+If the prototype file cannot be opened and
+its name consists of a string of digits,
+.it mkfs
+builds a file system with a single
+empty directory on it.
+The size of the file system is the value
+of
+.it proto
+interpreted as a decimal number.
+The i-list size is the file system size
+divided by 50.
+(This corresponds to an average size of
+three blocks per file.)
+The boot program is left uninitialized.
+.s3
+A sample prototype specification follows:
+.s3
+.nf
+.in +5
+/usr/mdec/uboot
+4872 55
+d\*-\*-777 3 1
+usr d\*-\*-777 3 1
+ sh \*-\*-\*-755 3 1 /bin/sh
+ ken d\*-\*-755 6 1
+ $
+ b0 b\*-\*-644 3 1 0 0
+ c0 c\*-\*-644 3 1 0 0
+ $
+$
+.in -5
+.fi
+.sh "SEE ALSO"
+file system(V),
+directory(V),
+boot procedures(VIII)
+.sh DIAGNOSTICS
+There are various diagnostics for
+syntax errors,
+inconsistent values,
+and sizes too small.
+.sh BUGS
+It is not possible to initialize a file larger than
+64K bytes.
+.br
+The size of the file system is restricted to
+64K blocks.
+.br
+There should be some way to specify links.
diff --git a/static/v10/man8/mknod.8 b/static/v10/man8/mknod.8
new file mode 100644
index 00000000..ea3a5137
--- /dev/null
+++ b/static/v10/man8/mknod.8
@@ -0,0 +1,79 @@
+.th MKNOD VIII 10/31/73
+.sh NAME
+mknod \*- build special file
+.sh SYNOPSIS
+.bd /etc/mknod
+name
+[
+.bd c
+] [
+.bd b
+]
+major
+minor
+.sh DESCRIPTION
+.it Mknod
+makes a directory entry and corresponding i-node
+for a special file.
+The first argument is the
+.it name
+of the entry.
+The second is
+.bd b
+if the special file is block-type (disks, tape) or
+.bd c
+if it is character-type (other devices).
+The last two arguments are
+numbers specifying the
+.it major
+device type
+and the
+.it minor
+device (e.g. unit, drive, or line number).
+.s3
+The assignment of major device numbers is specific to each system.
+For reference, here are the numbers for the MH 2C-644 machine.
+Do not believe them too much.
+.s3
+Block devices:
+.lp +8 4
+0 RF fixed-head disk
+.lp +8 4
+1 RK moving-head disk
+.lp +8 4
+2 TC DECtape
+.lp +8 4
+3 TM magtape
+.lp +8 4
+4 RP moving-head disk
+.lp +8 4
+5 Vermont Research moving-head disk
+.i0
+.s3
+Character devices:
+.lp +8 4
+0 KL on-line console
+.lp +8 4
+1 DC communications lines
+.lp +8 4
+2 PC paper tape
+.lp +8 4
+3 DP synchronous interface
+.lp +8 4
+4 DN ACU interface
+.lp +8 4
+5 core memory
+.lp +8 4
+6 VT scope (via 11/20)
+.lp +8 4
+7 DA voice response unit
+.lp +8 4
+8 CT phototypesetter
+.lp +8 4
+9 VS voice synthesizer
+.lp +8 4
+10 TIU Spider interface
+.i0
+.sh "SEE ALSO"
+mknod (II)
+.sh BUGS
diff --git a/static/v10/man8/mkpkg.8 b/static/v10/man8/mkpkg.8
new file mode 100644
index 00000000..50032998
--- /dev/null
+++ b/static/v10/man8/mkpkg.8
@@ -0,0 +1,179 @@
+.TH MKPKG 8
+.CT 1 comm_mach
+.SH NAME
+mkpkg, inspkg, seal, unseal \- package files for automatic software distribution
+.SH SYNOPSIS
+.B mkpkg
+[
+.I option ...
+]
+.I file ...
+.PP
+.B inspkg
+[
+.I option ...
+]
+[
+.I file ...
+]
+.PP
+.B seal
+[
+.I option
+]
+[
+.I file ...
+]
+.PP
+.B unseal
+[
+.I option
+]
+[
+.I file ...
+]
+.SH DESCRIPTION
+These programs are used by
+.IR ship (8)
+to keep files identical across machines.
+.PP
+.I Mkpkg
+packages
+.I files
+and writes the result on the standard output.
+.I Inspkg
+installs the named packages
+or the standard input.
+.PP
+Non-existent files given to
+.I mkpkg
+are deleted upon installation.
+Directories are copied with all their contents.
+Hard links are reproduced.
+Symbolic links and special files
+are reproduced with the same inode contents.
+File modification and access times and owner and group names
+are reproduced as far as possible.
+Old versions of files are removed before installation:
+.I inspkg
+needs write permission in containing directories.
+.PP
+Options for both
+.I mkpkg
+and
+.IR inspkg :
+.nr xx \w'\f5-K \f2keyfile '
+.TP \n(xxu
+.B -v
+Place running commentary on the standard error file.
+.br
+.ns
+.TP
+.BI -D path1 = path2
+Pretend that any pathname beginning with
+.I path1
+really begins with
+.IR path2 .
+Relative pathnames are extended to full pathnames before comparison.
+.PP
+Options for
+.IR mkpkg ;
+only one may occur:
+.TP \n(xxu
+.BI -x command
+Include in the package instructions to execute the shell
+.I command
+after all files have been installed.
+.I Command
+is unaffected by option
+.BR -D .
+.br
+.ns
+.TP
+.BI -X file
+Include in the package instructions to
+run the shell script
+.I file
+after all files have been installed.
+The file name is subject to option
+.BR -D .
+.PP
+Options for
+.IR inspkg :
+.TP \n(xxu
+.B -n
+Skip the actual installation, but verify
+the input packages and produce a backup if requested.
+.br
+.ns
+.TP
+.B
+-b
+Write on the standard output a backup package
+that contains whatever was destroyed.
+.PP
+A package is an
+.IR ar (1)
+archive containing an extra
+.SM ASCII
+file named
+.FR Instructions .
+.PP
+.I Seal
+concatenates the named
+.I files
+or the standard input
+onto the standard output in
+an error-detecting form suitable for shipment by
+.IR mail (1).
+.I Unseal
+reverses the process, concatenating copies of all the
+original inputs onto the standard output.
+When
+.IR asd (8)
+uses
+.IR uucp (1),
+it sends sealed packages.
+.PP
+A sealed file is printable, has
+fewer than 128 characters per line, and has no lines
+consisting of a single period.
+The first line is
+.L !<seal>
+and the last one begins with
+.LR !end .
+Other lines, such as mail headers, can be added to
+either end of a sealed file
+without hindering
+.IR unseal .
+.PP
+Options for
+.I seal
+and
+.IR unseal :
+.TP \n(xxu
+.B -k
+A key will be demanded to encrypt the
+checksum calculation.
+.br
+.ns
+.TP
+.BI -K " keyfile"
+Same, but taking the first line of
+.I keyfile
+as the key.
+.SH SEE ALSO
+.IR ar (1),
+.IR cpio (1),
+.IR tar (1),
+.IR bundle (1),
+.IR ship (8),
+.IR ar (5),
+.IR asd (8)
+.SH BUGS
+The pipeline
+.L mkpkg ... | inspkg
+fails if input and output files overlap.
+.br
+.I Inspkg
+fills any holes in files.
diff --git a/static/v10/man8/mount.8 b/static/v10/man8/mount.8
new file mode 100644
index 00000000..1dfa16a2
--- /dev/null
+++ b/static/v10/man8/mount.8
@@ -0,0 +1,153 @@
+.TH MOUNT 8
+.CT 1 sa_nonmortals
+.SH NAME
+mount, umount \- mount and dismount file system
+.SH SYNOPSIS
+.B /etc/mount
+[ options ]
+[
+.I special name
+[
+.I fstype
+[
+.I flags
+] ] ]
+.PP
+.B /etc/mount
+.B -a
+.PP
+.B /etc/mount
+[
+.I special name
+[
+.B -r
+]
+]
+.PP
+.B /etc/umount
+.I name
+.PP
+.B /etc/umount
+.B -a
+.SH DESCRIPTION
+.I Mount
+announces to the system that a removable file system
+of type
+.I fstype
+is present on the file
+.I special.
+The file
+.I name
+must exist already; it
+must be a directory (unless the root of the
+mounted file system is not a directory).
+It becomes the name of the newly mounted root.
+See
+.IR fmount (2)
+for a list of file system types
+and appropriate flags.
+If
+.I fstype
+or
+.I flags
+is omitted,
+zero is assumed;
+file system type 0
+is an ordinary disk file system.
+.PP
+The options are
+.TP
+.B -a
+Mount all the files designated in
+.FR /etc/fstab ;
+see
+.IR fstab (5).
+No other arguments are legal with
+.BR -a .
+.TP
+.B -r
+Read only; shorthand for
+.I fstype
+0
+and
+.I flag
+1.
+A deprecated usage allows
+.B -r
+to follow
+.I name.
+.TP
+.BI -l " label
+The
+.I label,
+given in the form of
+.I atolab
+(see
+.IR labtoa (3)),
+becomes the file system ceiling described in
+.IR fmount (2).
+.PP
+.I Umount
+announces to the system that the file system mounted on file
+.I name
+is to be removed.
+.PP
+If the
+.B -a
+option is present for
+.I mount
+.RI ( umount ),
+an attempt is made to mount (remove) each file system named in
+.FR /etc/fstab
+(\c
+.FR /etc/mtab ).
+.PP
+These commands
+maintain a table of mounted devices in
+.FR /etc/mtab .
+If invoked without an argument,
+.I mount
+prints the table.
+.PP
+Physically write-protected and magnetic tape file
+systems must be mounted read-only
+or errors will occur when access times are updated,
+whether or not any explicit write is attempted.
+.SH EXAMPLES
+.TP
+.B "/etc/mount /dev/ra02 /usr"
+Mount the file system on disk
+.L /dev/ra02
+on directory
+.LR /usr .
+.TP
+.B "/etc/mount /dev/null /proc 2"
+Mount the process file system.
+.TP
+.B " /etc/mount -l 'nu u ffff...' /dev/ra02 /usr
+File capabilities on
+.IR exec (2)
+are limited to
+.BR T_NOCHK
+and
+.BR T_UAREA ,
+with self-licensing only for
+.BR T_UAREA ;
+all lattice labels are accessible (ceiling is lattice top).
+.SH FILES
+.TF /etc/fstab
+.TP
+.F /etc/mtab
+mount table
+.TP
+.F /etc/fstab
+file system table
+.SH "SEE ALSO"
+.IR fmount (2),
+.IR fstab (5),
+.IR netfs (8)
+.SH BUGS
+Mounting file systems full of garbage will crash the system.
+.br
+Mounting a root directory on a non-directory
+makes some apparently good pathnames invalid.
diff --git a/static/v10/man8/netfs.8 b/static/v10/man8/netfs.8
new file mode 100644
index 00000000..d4b97656
--- /dev/null
+++ b/static/v10/man8/netfs.8
@@ -0,0 +1,315 @@
+.TH NETFS 8
+.CT 1 sa_nonmortals
+.SH NAME
+netfs \- network file system
+.SH SYNOPSIS
+.nf
+.B /usr/netb/setup.go
+.fi
+.SH DESCRIPTION
+The network file system is conventionally a set of directories
+contained in
+.FR /n ,
+and a set of files and programs in
+.FR /usr/netb .
+Connections in the network file system are asymmetric:
+files on a `server' system are made accessible on a `client' system,
+usually in directory
+.BI /n/ server-name.
+.SS Client
+The client runs
+.FR /usr/netb/setup
+to maintain connections;
+it is started by invoking
+.F /usr/netb/setup.go
+from
+.IR rc (8).
+.I Setup
+uses
+.F /usr/netb/friends
+to control the connections to servers.
+Each line in
+.I friends
+contains six fields:
+.RS
+network address
+.br
+network call argument
+.br
+mount point
+.br
+protocol id
+.br
+unique identifier
+.br
+debugging flag
+.br
+network calling username
+.RE
+.PP
+The network address and argument give the location of the server.
+They are interpreted differently according to the protocol id,
+which should be one of
+.TP
+.B d
+Call the server on the named network address,
+with default network
+.L dk
+and default service name
+.LR fsb .
+The network call argument is ignored.
+The server machine should respond by calling
+.IR zarf ,
+described below;
+see
+.IR svcmgr (8).
+.TP
+.B t
+Call the named network address,
+with default network
+.LR tcp ,
+and invoke the program named in the
+network call argument
+using the protocol of
+.IR rsh ;
+.IR con (1).
+.PP
+.I Setup
+calls
+.IR setlogname
+(see
+.IR getuid (2))
+to make the network call appear to have been placed
+by the calling username.
+The username may be omitted;
+.LR daemon
+is the default.
+.PP
+The mount point is the directory
+on which the remote file system is to appear.
+The unique identifier is a integer in the range 0-255;
+it is used internally to distinguish connections,
+and must be unique among all active remote file systems
+(including those not maintained by
+.IR setup ,
+e.g.
+.IR faced (9.5)).
+The debugging flag is usually 0;
+nonzero numbers
+increase the chatter in various logfiles.
+.PP
+.I Setup
+reads the
+.I friends
+file when it starts,
+and checks for changes once a minute.
+Each remote file system is probed once a minute;
+if there is no response to several consecutive probes,
+the connection is torn down and restarted.
+Failed connections are retried every minute.
+.SS Server
+The server program is
+.FR /usr/netb/zarf .
+A separate
+.I zarf
+process exists for each client.
+.PP
+When a connection is started,
+the client sends the server a list of valid user and group names
+and the corresponding numerical IDs
+on the client system.
+The userid and groupid of user and group names that exist
+on both machines are mapped so that
+client and server see IDs
+under the same names.
+Unmapped IDs on the server appear as \-1 on the client.
+Client processes with unmapped IDs are denied access.
+.PP
+.I Zarf
+is subject to access control on the server.
+It will have access only to files that its own userid
+and groupid admit.
+Unless run as super-user, it will create files with its own,
+not mapped, userid.
+.PP
+.I Zarf
+reads configuration information
+from
+.F /usr/netb/except.local
+and
+.FR /usr/netb/except .
+The
+files are read only once,
+when
+.I zarf
+starts,
+.B except.local
+first.
+Usually
+.B except
+is the same on all machines in some administrative cluster,
+.B except.local
+contains things specific to a particular server system.
+.PP
+The files contain sections
+beginning with the line
+.B client
+.I origin.
+.I Origin
+is the name of the calling client,
+as provided by the network;
+.L *
+matches any client.
+The first matching section is used.
+.PP
+Within each section,
+lines have of one of the following forms.
+Lines beginning with
+.L #
+are ignored.
+.TP
+.BI "uid " cname = sname
+Regardless of the contents of password files,
+map client user name
+.I cname
+to server user name
+.IR sname .
+If
+.I cname
+is not announced as valid by the client,
+the line is ignored.
+If
+.I sname
+is not a valid name on the server,
+any previous mapping for
+.I cname
+is discarded.
+.TP
+.BI "gid " cname = sname
+Map client group name
+.I cname
+to server group name
+.IR sname ,
+as above.
+.TP
+.BI "param otherok=" val
+If
+.I val
+is
+.LR 1 ,
+client processes with unmapped userids
+are granted world access
+to existing files on the server.
+Unmapped userids
+may never create files
+(who would own them?).
+If
+.I val
+is anything else,
+no access is permitted
+to
+unmapped client userids.
+.TP
+.BI "param root=" pathname
+Use
+.I pathname
+rather than
+.B /
+as the root of the filename hierarchy
+made visible on the client.
+.SH EXAMPLES
+A
+.I friends
+file
+for a connection to
+.B alice
+over Datakit,
+.B shamash
+over TCP/IP,
+and
+.B bebop
+over TCP/IP
+without administrative help:
+.RS
+.EX
+.ta \w'tcp!shamash!400 'u +\w'/usr/pjw/netb/zarf 'u +\w'/n/alice 'u +.3i +.3i +.3i
+alice - /n/alice d 0 0
+tcp!shamash!400 - /n/sun d 1 0
+bebop /usr/pjw/netb/zarf /n/bebop t 2 0 pjw
+.EE
+.RE
+.PP
+Some
+.I except
+file rules:
+.RS
+.EX
+client dk!nj/astro/research
+param otherok=1
+client *
+uid root=
+gid mail=other
+param otherok=0
+param root=/usr/spool
+.EE
+.RE
+.PP
+If the
+.I research
+machine calls as a client,
+the whole file system tree is visible,
+all userids including the super-user
+are permitted normal access,
+and user names unknown to the server
+are permitted world access.
+If any other machine calls,
+only the contents of
+.B /usr/spool
+are visible,
+.I root
+and unknown users
+are explicitly denied access,
+and
+processes in group
+.I mail
+on the client
+are treated as if in group
+.I other
+on the server.
+.SH FILES
+.PD 0
+.TF /usr/netb/except.local
+.TP
+.F /n/*
+.TP
+.F /usr/netb/friends
+client connection info
+.TP
+.F /usr/netb/except.local
+.TP
+.F /usr/netb/except
+.TP
+.F /usr/netb/setupl
+log file for
+.I setup
+.TP
+.F /usr/netb/zarf.log
+log file for zarf
+server control info
+.SH SEE ALSO
+S. A. Rago, `A Look at the Version 9 Network File System',
+this manual, Volume\ 2
+.SH BUGS
+The scheme works only in a modest-sized, friendly community, as it
+requires a process per client, trust of clients' security, and common
+login names.
+.br
+File modification times are adjusted for clock-time differences
+between machines.
+Thus, when viewed across the network,
+identical files installed on different machines by
+.IR asd (8)
+may appear to have different modification times, and
+symbol tables of random libraries
+.RI ( ar (1))
+may appear to be out of date.
diff --git a/static/v10/man8/netstat.8 b/static/v10/man8/netstat.8
new file mode 100644
index 00000000..2cc7257f
--- /dev/null
+++ b/static/v10/man8/netstat.8
@@ -0,0 +1,100 @@
+.TH NETSTAT 8
+.CT 1 sa_nonmortals
+.SH NAME
+netstat, dkstat \- show network status for internet and datakit networks
+.SH SYNOPSIS
+.B netstat
+[
+.B \-acCirRst
+]
+[
+.I system
+]
+[
+.I core
+]
+.PP
+.B dkstat
+[
+.I interval
+[
+.I count
+]
+]
+.SH DESCRIPTION
+.I Netstat
+displays internet
+(TCP/IP and UDP/IP)
+traffic and configuration
+data.
+Without options,
+it lists all TCP and UDP connection assignments.
+A single option
+changes the listing:
+.TP
+.B -a
+known mappings between internet names and
+Ethernet addresses.
+.TP
+.B -c
+all TCP and UDP connection assignments
+(the default).
+.TP
+.B -C
+detailed state of active TCP connections.
+.TP
+.B -i
+active IP interfaces.
+.TP
+.B -n
+display numeric internet addresses rather than host and
+network names.
+.TP
+.B -s
+protocol statistics.
+.TP
+.B -r
+routing tables.
+.TP
+.B -R
+routing tables,
+including deleted entries
+(for debugging).
+.TP
+.BI -t buf
+running trace of
+packets passing through
+.IR buf :
+.L il
+for the Interlan Ethernet controller,
+.L qe
+for the DEQNA,
+.L tcp
+(the default)
+for all packets passing through TCP.
+.PP
+The arguments
+.I system
+and
+.I core
+are substitutes for the defaults
+.F /unix
+and
+.FR /dev/kmem .
+.PP
+.I Dkstat
+reports the number of bytes received and sent over
+the Datakit network, together with error reports if any occurred.
+The first report is cumulative since a reboot.
+Further reports may be requested every
+.I interval
+seconds; these reports are incremental.
+.PP
+The optional
+.I count
+argument restricts the number of reports.
+.SH DIAGNOSTICS
+.BR "nlist /unix failed" :
+.I netstat
+could not find pertinent system information,
+perhaps because this system isn't set up for TCP/IP.
diff --git a/static/v10/man8/nosh.8 b/static/v10/man8/nosh.8
new file mode 100644
index 00000000..7447f767
--- /dev/null
+++ b/static/v10/man8/nosh.8
@@ -0,0 +1,138 @@
+.TH NOSH 8
+.CT 1 shell proc_man dirs files
+.SH NAME
+nosh \- `no-surprise' shell, a sub-standard command interpreter
+.SH SYNOPSIS
+.B /etc/nosh
+[
+.I file
+]
+.PP
+.B priv nosh -gunxlp
+.I file
+.SH DESCRIPTION
+.I Nosh
+executes commands read from its standard input
+or from the named
+.IR file .
+It has few of the advanced features of
+.IR sh (1),
+making it more trustable for use in
+security administration tasks.
+In the second usage,
+.I nosh
+is endowed with one or more of the licenses
+.BR gunxlp ;
+see
+.IR labtoa (3).
+.SS Commands
+A
+command is either
+.I simple
+or
+.I builtin.
+Each command consists of
+a sequence of
+.I words
+separated by white space,
+terminated by a new-line character or end of input.
+Backslash quoting and sharp commenting are honored.
+The first word specifies the name of the command to
+be executed.
+If the command name matches one of the builtins
+listed below it is executed in the shell process.
+If the command name matches no
+builtin command, it is taken to be the
+pathname of an executable file; the name must begin with
+.L /
+or
+.LR . .
+A new process is created and an attempt is made to
+execute the file via
+.IR exec (2)
+with an empty environment.
+.SS Input-Output Redirection
+The standard input is inherited by simple commands.
+Simple
+.B >
+output redirection to named files as in
+.IR sh (1)
+works only for simple commands, and only for file
+descriptors 1 (default) and 2.
+.SS Builtin Commands
+.PP
+.PD 0
+.TP
+.BI cd " dir
+Change the current directory to
+.I dir.
+.TP
+.BI exit " status
+Exit with given status, 0 by default.
+.TP
+.B set +e
+.TP
+.B set -e
+Turn an ignore-error switch on
+.RB ( +e ,
+default) or off
+.RB ( -e ).
+.I Nosh
+normally ignores nonzero exit status from an executed
+command, but exits with that status if
+.B -e
+is set.
+.TP
+.B set +x
+.TP
+.B set -x
+Refrain from echoing
+.RB ( +x ,
+default) or echo
+.RB ( -x )
+each command as it is executed.
+.TP
+.BI lmask " licenses command \fR[\fP arg \fR... ]\fP
+Run a simple command, allowing licenses
+indicated by a nonempty string from the set
+.BR gunxlp-
+to be inherited from
+.I nosh.
+Normally no licenses are inherited.
+.SS Missing features
+Features of
+.IR sh (1)
+that
+.IR nosh
+lacks include:
+background commands, pipelines, compound commands, most builtins,
+multicharacter quotation,
+command substitution, parameter substitution, variables, environments,
+file name generation, redirection of input, signal traps,
+search paths, mail notification,
+.BR .profile ,
+user specification of prompts.
+.SH DIAGNOSTICS
+.I Nosh
+prints nonzero exit or termination status
+of executed commands as octal numbers labeled
+.L e=
+and
+.LR t= ;
+see
+.IR wait (2).
+If invoked with a
+.I file
+argument, it exits unconditionally for nonzero termination
+status or syntax error, and conditionally (under control of
+.LR set )
+for nonzero exit status.
+.PP
+.I Nosh
+exits immediately if
+invoked with more than one argument,
+if invoked with an argument with a relative path name,
+if invoked by a relative path name, or if invoked
+with interrupt or quit signals ignored.
+.SH SEE ALSO
+.IR sh (1)
diff --git a/static/v10/man8/ns.8 b/static/v10/man8/ns.8
new file mode 100644
index 00000000..620e80e3
--- /dev/null
+++ b/static/v10/man8/ns.8
@@ -0,0 +1,153 @@
+.TH NS 8
+.CT 1 sa_auto
+.SH NAME
+ns \- name server database
+.SH SYNOPSIS
+.B /usr/ipc/mgrs/ns
+[
+.B -m
+.I server
+] [
+.B -d
+]
+.SH DESCRIPTION
+.I Ns
+maintains a database
+of naming information,
+accessed by
+.IR qns (7)
+and other programs.
+It should be run once from
+.IR rc (8).
+.PP
+The database is accessed
+through local service
+.BR ns ,
+or service
+.I server
+if option
+.B -m
+was specified.
+.PP
+The file
+.F /usr/ipc/lib/ns.db
+contains instructions for building the database.
+These instructions are lines
+of one of the following forms:
+.TP \w'#include\0file\0\0\0\0'u \" wrong fonts; near enough?
+.BI #uusys " file"
+Read the named
+.I uucp
+.B Systems
+.IR file .
+For entries using caller
+.LR ACU ,
+add a database entry containing
+.RS
+.IP
+.I system\0
+.IB telephone-number ,tel\0
+.B uucp,svc
+.PP
+For entries using caller
+.LR DK
+or
+.LR DKH ,
+add an entry containing
+.IP
+.I system\0
+.IB datakit-address ,dk\0
+.B uucp,svc
+.PP
+For any other entry,
+add
+.IP
+.I system\0
+.B uucp,svc
+.RE
+.TP
+.BI #inhost " file"
+For each line in the named
+4BSD-style internet hosts
+.IR file ,
+add a database entry of the form
+.RS
+.IP
+.IB ip-address ,in\0
+.I hostname\0
+.IB host-domain-name ,dom
+.RE
+.TP
+.BI #innet " file"
+For each line in the named
+4BSD-style internet networks
+.IR file ,
+add a database entry of the form
+.RS
+.IP
+.IB ip-net-address ,in\0
+.I netname
+.RE
+.TP
+.BI #include " file"
+Interpret
+the contents of
+.IR file
+in the same format
+as
+.BR ns.db .
+.PP
+In all cases,
+.I file
+may be followed by
+a list of
+.I value,attribute
+pairs to be included with any
+database entries caused by that file.
+If the filename doesn't begin with
+.LR / ,
+it is prefixed with
+.BR /usr/ipc/lib .
+.PP
+Blank lines
+and
+lines beginning with
+.L #
+followed by a space or tab
+are ignored.
+.PP
+Any other lines are taken as literal database entries:
+a collection of
+.I value,attribute
+pairs separated by spaces.
+Each line is a single entry.
+.PP
+The database is ephemeral;
+it is rebuilt whenever
+.I ns
+starts,
+when requested by
+.BR "qns reset" ,
+or when
+.I ns
+notices that
+.B ns.db
+or one of the files named therein
+has changed.
+Rebuilding can take several minutes,
+especially on a busy machine.
+During a rebuild,
+the server appears active but does not answer requests;
+calls will block until the rebuild finishes.
+.PP
+.I Ns
+leaves remarks in file
+.FR /usr/ipc/log/ns .
+There are more remarks if the
+.B -d
+option was used.
+.SH FILES
+.F /usr/ipc/lib/ns.db
+.SH SEE ALSO
+.IR ipc (3),
+.IR qns (7)
diff --git a/static/v10/man8/postbgi.8 b/static/v10/man8/postbgi.8
new file mode 100644
index 00000000..48e2742f
--- /dev/null
+++ b/static/v10/man8/postbgi.8
@@ -0,0 +1,138 @@
+.TH POSTBGI 8 local
+.SH NAME
+postbgi \- PostScript translator for BGI (Basic Graphical Instructions) files
+.SH SYNOPSIS
+.B postbgi
+[ options ] [ files ]
+.SH DESCRIPTION
+.I Postbgi
+translates BGI (Basic Graphical Instructions)
+.I files
+into PostScript and writes the results on the
+standard output.
+If no
+.I files
+are specified, or if \- is one of the input
+.I files,
+the standard input is read.
+The following
+.I options
+are understood:
+.TP 1.0i
+.BI \-c num
+Print
+.I num
+copies of each page.
+By default only one copy is printed.
+.TP 1.0i
+.BI \-f name
+Print text using font
+.I name.
+Any PostScript font can be used,
+although the best results will only be
+obtained with constant width fonts.
+The default font is Courier.
+.TP 1.0i
+.BI \-m num
+Magnify each logical page by the factor
+.I num.
+Pages are scaled uniformly about the origin,
+which by default is located at the center of
+each page.
+The default magnification is 1.0.
+.TP 1.0i
+.BI \-n num
+Print
+.I num
+logical pages on each piece of paper,
+where
+.I num
+can be any positive integer.
+By default
+.I num
+is set to 1.
+.TP 1.0i
+.BI \-o list
+Print pages whose numbers are given in the comma-separated
+.IR list .
+The list contains single numbers
+.I N
+and ranges
+.IB N1 \- N2.
+A missing
+.I N1
+means the lowest numbered page, a missing
+.I N2
+means the highest.
+.TP 1.0i
+.BI \-p mode
+Print
+.I files
+in either
+.B portrait
+or
+.B landscape
+.I mode.
+Only the first character of
+.I mode
+is significant.
+The default
+.I mode
+is portrait.
+.TP 1.0i
+.BI \-w num
+Set the line width used for graphics to
+.I num
+points, where a point is approximately 1/72
+of an inch.
+By default
+.I num
+is set to 0.0 points, which forces lines to be
+one pixel wide.
+.TP 1.0i
+.BI \-x num
+Translate the origin
+.I num
+inches along the positive x axis.
+The default
+coordinate system has the origin fixed at the
+center of the page, with positive
+x to the right and positive y up the page.
+Positive
+.I num
+moves everything right.
+The default offset is 0 inches.
+.TP 1.0i
+.BI \-y num
+Translate the origin
+.I num
+inches along the positive y axis.
+Positive
+.I num
+moves everything up the page.
+The default offset is 0 inches.
+.TP 1.0i
+.BI \-A file
+Append a simple accounting record to
+.I file
+after all the input
+.I files
+have been successfully translated.
+By default no accounting data is produced.
+.TP 1.0i
+.BI \-L file
+Use
+.I file
+as the PostScript prologue,
+which by default is /usr/lib/postscript/postbgi.ps.
+.SH DIAGNOSTICS
+0 exit status is returned if
+.I files
+were successfully processed.
+.SH BUGS
+The default line width is too small for 'write to white'
+print engines, like the one used by the PS-2400.
+.SH FILES
+/usr/lib/postscript/postbgi.ps
+.SH SEE ALSO
+dpost(1), postprint(1), posttek(1), postdmd(1)
diff --git a/static/v10/man8/postio.8 b/static/v10/man8/postio.8
new file mode 100644
index 00000000..fdd5721e
--- /dev/null
+++ b/static/v10/man8/postio.8
@@ -0,0 +1,205 @@
+.TH POSTIO 8
+.CT 1 sa_auto
+.SH NAME
+postio \- serial interface for postscript printers
+.SH SYNOPSIS
+.B /usr/bin/postscript/postio
+[
+.I option ...
+] [
+.I file ...
+]
+.SH DESCRIPTION
+.I Postio
+sends
+.I files
+to a PostScript printer.
+It is usually called by the innards of
+.IR lp (1).
+If no files are named,
+the standard input is sent.
+.PP
+Mandatory argument
+.B -l
+names the printer.
+If
+the first character of
+.I line
+is
+.LR / ,
+it is assumed to be a local filename like
+.LR /dev/tty37 .
+Otherwise it is taken to be a network address,
+with default network
+.LR dk ,
+to which the printer is connected.
+.PP
+These options are probably the most useful:
+.nr xx \w'\fL-b\ \fIspeed\ 'u
+.TP \n(xxu
+.BI \-b speed
+Transmit data
+at baud rate
+.I speed,
+one of 1200, 2400, 4800, 9600 (default), and 19200.
+.TP
+.B \-q
+Disable status queries while
+.I files
+are being sent to the printer.
+When status queries are disabled a dummy message is appended
+to the log file before each block is transmitted.
+.TP
+.BI \-B num
+Set the internal buffer size for reading and writing
+.I files
+to
+.I num
+bytes, 2048 by default.
+.TP
+.B \-D
+Debug mode:
+copy everything read from the printer
+to the log file
+or standard error.
+.TP
+.BI \-L file
+Log data read from the printer in
+.IR file .
+Standard error is the default.
+Normally only messages indicating a change in the printer's state are logged.
+.TP
+.BI \-P string
+Send
+.I string
+to the printer before any input
+.IR files .
+The default
+is PostScript code that disables timeouts.
+.TP
+.BI \-R num
+If
+.I num
+is
+.LR 1 ,
+run as a single process;
+if
+.LR 2 ,
+use separate processes for reading and writing.
+.PP
+These options are not useful to spoolers like
+.IR lp .
+.TP \n(xxu
+.B \-i
+Interactive mode:
+send the
+.I files
+to the printer,
+then copy standard input to the printer
+and printer output to standard error.
+Overrides many other options.
+To have a friendly chat with the printer,
+begin by typing
+.L executive
+on a line by itself.
+.TP
+.B \-t
+Copy printer output that doesn't look like
+status information to the standard output;
+intended for use with PostScript programs that write results.
+.PP
+This option should be used only as a last resort:
+.TP \n(xxu
+.B \-S
+Take special measures to send data slowly.
+Limits the internal buffer to 1024 bytes,
+implies
+.B -R1
+and disables
+.BR -q
+and
+.BR -i .
+Expensive in CPU time.
+.PP
+When
+.I postio
+starts,
+it attempts to force the printer into IDLE state
+by sending a sequence of
+.RB control- t
+(status query),
+.RB control- c
+(interrupt),
+and
+.RB control- d
+(end of job)
+characters.
+When the printer is idle,
+the files are transmitted
+with an occasional
+.RB control- t
+interspersed
+(except under
+.BR -q ).
+After all data have been sent,
+.I postio
+waits until the printer appears to have finished
+before exiting.
+Fatal error messages from the printer
+cause
+.I postio
+to exit prematurely.
+.SH EXAMPLES
+.TP
+.L
+postio -l/dev/tty01 file1 file2
+Runing as a single process at 9600 baud, send file1 and file2
+to printer
+.LR /dev/tty01 .
+.TP
+.L
+postio -R2 -B4096 -l/dev/tty01 -Llog file1 file2
+Similarly,
+but use two processes
+and a 4096-byte buffer,
+and copy printer messages to file
+.BR log .
+.TP
+.L
+postio -t -l/dev/tty22 -Llog program >results
+Send the PostScript
+.L program
+to printer
+.BR /dev/tty22 ,
+place any data in
+.BR results ,
+put error messages in
+.BR log .
+.TP
+.L
+postio -i -l/cs/dk!my/printer
+Connect interactively to the printer at network address
+.BR /cs/dk!my/printer .
+.SH SEE ALSO
+.IR lp (1),
+.IR postscript (8)
+.SH DIAGNOSTICS
+Exit status 1 means a system error
+(e.g. can't open the printer),
+2 means a PostScript error,
+3 means both.
+Status 2 is usually caused by a syntax error in an input file.
+.SH BUGS
+Multiple
+files
+with PostScript end-of-job marks
+are not guaranteed to work.
+.PP
+If a network is involved,
+.B \-b
+may be ineffective and attempts by
+.I postio
+to flow-control data in both directions may not work.
+Option
+.B \-q
+can help if the printer is connected to Radian Datakit.
diff --git a/static/v10/man8/postreverse.8 b/static/v10/man8/postreverse.8
new file mode 100644
index 00000000..4b16537e
--- /dev/null
+++ b/static/v10/man8/postreverse.8
@@ -0,0 +1,97 @@
+.TH POSTREVERSE 8 local
+.SH NAME
+postreverse \- reverse the page order in a postscript file
+.SH SYNOPSIS
+.B postreverse
+[ options ] [ file ]
+.SH DESCRIPTION
+.I Postreverse
+reverses the page order in a minimally conforming PostScript
+.I file
+and writes the results on the standard output.
+If no
+.I file
+is specified, the standard input is read.
+The following
+.I options
+are understood:
+.TP 1.0i
+.BI \-o list
+Select pages whose numbers are given in the comma-separated
+.IR list .
+The list contains single numbers
+.I N
+and ranges
+.IB N1 \- N2.
+A missing
+.I N1
+means the lowest numbered page, a missing
+.I N2
+means the highest.
+.TP 1.0i
+.B \-r
+Don't reverse the pages in
+.I file.
+.TP 1.0i
+.BI \-T dir
+Use
+.I dir
+as the temporary file directory when
+reading from the standard input.
+By default
+.I dir
+is set to /tmp.
+.PP
+.I Postreverse
+can handle files the violate page independence,
+provided all global definitions are bracketed by
+\&\f(CW%%BeginGlobal\fP and \&\f(CW%%EndGlobal\fP
+comments.
+In addition files that mark the end of each page
+with \&\f(CW%%EndPage: label ordinal\fP comments
+will also reverse properly, provided the prologue and
+trailer sections can be located.
+If the end of the prologue isn't found, the entire
+.I file
+is copied, unmodified, to the standard output.
+.PP
+Since global definitions are pulled out of individual
+pages and put in the prologue, the output file can be
+minimally conforming, even if the input
+.I file
+wasn't.
+.SH EXAMPLES
+Select pages 1 to 100 from
+.B file
+and reverse the pages,
+.PP
+.RS
+\f(CWpostreverse -o1-100 file\fP
+.RE
+.PP
+Print 4 logical pages on each physical page
+and reverse all the pages,
+.PP
+.RS
+\f(CWpostprint -n4 file | postreverse\fP
+.RE
+.PP
+Produce a minimally conforming file from output
+generated by dpost without reversing the pages,
+.PP
+.RS
+\f(CWdpost file | postreverse -r\fP
+.RE
+.PP
+.SH DIAGNOSTICS
+0 exit status is returned if
+.I file
+was successfully processed.
+.SH BUGS
+No attempt has been made to deal with redefinitions of global
+variables or procedures.
+If standard input is used, the input
+.I file
+will be read three times before being reversed.
+.SH SEE ALSO
+dpost(1), postprint(1), posttek(1), postbgi(1), postdmd(1)
diff --git a/static/v10/man8/postscript.8 b/static/v10/man8/postscript.8
new file mode 100644
index 00000000..2143c6b2
--- /dev/null
+++ b/static/v10/man8/postscript.8
@@ -0,0 +1,283 @@
+.TH POSTSCRIPT 8
+.CT 1 sa_auto
+.SH NAME
+dpost, postdaisy, postdmd, postprint \- filters to produce postscript
+.SH SYNOPSIS
+.B /usr/bin/postscript/dpost
+[
+.I option ...
+] [
+.I file ...
+]
+.PP
+.B /usr/bin/postscript/postdaisy
+[
+.I option ...
+] [
+.I file ...
+]
+.PP
+.B /usr/bin/postscript/postdmd
+[
+.I option ...
+] [
+.I file ...
+]
+.PP
+.B /usr/bin/postscript/postprint
+[
+.I option ...
+] [
+.I file ...
+]
+.PP
+.B /usr/bin/postscript/posttek
+[
+.I option ...
+] [
+.I file ...
+]
+.SH DESCRIPTION
+These programs convert files of various formats into
+PostScript.
+The input formats are
+.nr xx \w'\fL-p\ \fImode\ 'u
+.TP \n(xxu
+.I dpost
+.IR troff (1)
+output
+.TP
+.I postdaisy
+Diablo 1640 daisy-wheel
+.TP
+.I postdmd
+.IR bitfile (9.5)
+files, as produced by
+.IR blitblt (9.1)
+.TP
+.I postprint
+.SM
+ASCII
+text
+.TP
+.I posttek
+Tektronix 4014 graphics
+.PP
+Except as noted,
+the options are common to all the programs:
+.TP \n(xxu
+.BI \-c num
+Print
+.I num
+copies of each page.
+By default only one copy is printed.
+.TP
+.BI \-m num
+Magnify each logical page by the factor
+.I num.
+Pages are scaled uniformly about the origin,
+located near the upper left corner of
+the page.
+The default magnification is 1.0.
+.TP
+.BI \-n num
+Print
+.I num
+logical pages on each piece of paper.
+The default is 1.
+.TP
+.BI \-o list
+Print only pages specified in
+the comma-separated
+.I list
+of numbers and ranges.
+A range
+.IB N - M
+means pages
+.I N
+through
+.IR M ;
+an initial
+.BI - N
+means
+from the beginning to page
+.IR N ;
+and a final
+.IB N -
+means
+from
+.I N
+to the end.
+Print only pages whose numbers are given in the comma-separated
+.IR list .
+The list contains single numbers
+.I N
+and ranges
+.IB N1 \- N2.
+A missing
+.I N1
+means the lowest numbered page, a missing
+.I N2
+means the highest.
+.TP
+.BI \-p mode
+Print
+in
+.I mode
+.B p
+(portrait)
+or
+.B l
+(landscape).
+The default is
+.BR p .
+.TP
+.BI \-x num
+Translate the origin
+.I num
+inches along the positive x axis.
+By default,
+the origin is
+fixed near the
+upper left corner of the page, with positive
+x to the right and positive y down the page.
+Positive
+.I num
+moves everything right.
+The default offset is 0 inches.
+.TP
+.BI \-y num
+Translate the origin
+.I num
+inches along the positive y axis.
+Positive
+.I num
+moves text down the page.
+The default offset is 0.
+.TP
+.BI \-A file
+Append a simple accounting record to
+.I file
+after all input
+.I files
+have been successfully translated.
+By default no accounting data is produced.
+.TP
+.BI \-L file
+Use
+.I file
+as the PostScript prologue.
+.TP
+.BI \-f name
+Print
+.I files
+using font
+.I name.
+Any PostScript font can be used,
+but constant width fonts yield the best results.
+The default font is Courier.
+.RI ( postdaisy,
+.IR postprint,
+and
+.IR posttek
+only)
+.TP
+.BI \-f
+Flip the sense of the bits in
+.I files
+before printing the bitmaps.
+.RI ( postdmd
+only)
+.PP
+In addition, three options allow the insertion of arbitrary PostScript
+at controlled points in the translation process:
+.TP \n(xxu
+.BI \-C file
+Copy
+.I file
+to the output file.
+.I File
+follows the prologue but
+precedes any job initialization commands.
+.I File
+becomes part of the job's global environment
+and must contain legitimate PostScript commands.
+.TP
+.BI \-P string
+Like
+.BR -C ,
+using a
+.I string
+instead of the contents of a file.
+.TP
+.BI \-R action
+Requests special
+.I action
+(e.g. manualfeed) on a per page or global basis.
+The
+.I action
+string has the general form
+.IB request : page : file,
+from which
+.BI : page : file
+or
+.B : file
+can be omitted.
+An omitted or 0 page number
+applies to all pages.
+If file is omitted the request
+lookup is done in
+.FR /usr/lib/postscript/ps.requests .
+The collection of recognized requests can be modified or extended
+by changing this file.
+Multiple occurrences of the
+.B \-R
+option behave as expected.
+.SH FILES
+.TF /usr/lib/font/devpost/charlib/*
+.TP
+.F /usr/lib/font/devpost/*.out
+.TP
+.F /usr/lib/font/devpost/charlib/*
+.TP
+.F /usr/lib/postscript/*.ps
+default prologues
+.TP
+.F /usr/lib/tmac/tmac.pictures
+.I troff
+macros for PostScript
+.SH SEE ALSO
+.IR lp (1),
+.IR postio (8)
+.SH DIAGNOSTICS
+Exit status 2
+usually means a syntax error in some input file.
+.SH BUGS
+Output files
+will often violate Adobe's
+file structuring conventions.
+Pipe the output of
+.I dpost
+through
+.I postreverse
+to produce a minimally conforming PostScript file.
+.PP
+Although
+.I dpost
+can handle files formatted for any
+.IR troff
+device, emulation is expensive and
+can easily double the print time and the size of the output file.
+.PP
+No attempt has been made to implement the character sets
+or fonts available on all devices supported by
+.I troff.
+Missing characters are replaced by white space;
+unrecognized fonts are replaced by one of the Times fonts.
+.PP
+.I Dpost
+requires an
+.B x res
+command before the first
+.B x init
+and any file data.
diff --git a/static/v10/man8/privserv.8 b/static/v10/man8/privserv.8
new file mode 100644
index 00000000..8029ddb4
--- /dev/null
+++ b/static/v10/man8/privserv.8
@@ -0,0 +1,60 @@
+.TH PRIVSERV 8
+.SH NAME
+privserv \- privilege server
+.SH SYNOPSIS
+.B lmask nuxl /etc/privserv
+[
+.I option ...
+]
+.SH DESCRIPTION
+.I Privserv
+is the keeper and interpreter of the
+.IR privs (5)
+file.
+.I Priv (1)
+calls on
+.I privserv
+to hand out privileges in accordance with the rules given in
+.I privs.
+.I Privserv
+is a permanent process, normally started by the boot script
+.IR rc (8).
+It receives service requests through the mounted pipe
+.FR /cs/priv .
+The options are
+.TP
+.BI -p " name
+The file name of the server,
+.B /etc/privserv
+by default
+(used to reinvoke the priv server when the
+.IR privs (5)
+file is modified by a
+.B PRIVEDIT
+request.)
+.TP
+.BI -m " mountpt
+The file system mount point for privilege service,
+.F /cs/priv
+by default.
+.TP
+.BI -l " logfile
+The file in which to record logging information,
+.F /usr/adm/privlog
+by default.
+.TP
+.BI -f " privs
+The data base of privileges,
+.F /etc/privs
+by default.
+Unless
+.I privs
+is itself a privileged file,
+.I privserv
+will not actually grant the privileges there specified.
+.SH FILES
+.F /etc/privs
+.br
+.F /cs/priv
+.SH SEE ALSO
+.IR priv (1)
diff --git a/static/v10/man8/ps.8 b/static/v10/man8/ps.8
new file mode 100644
index 00000000..fcab9ac7
--- /dev/null
+++ b/static/v10/man8/ps.8
@@ -0,0 +1,77 @@
+.pa 1
+.he 'PS (VIII)'1/20/73'PS (VIII)'
+.ti 0
+NAME ps -- process status
+.sp
+.ti 0
+SYNOPSIS /usr/adm/ps [ -xlt____ ]
+.sp
+.ti 0
+DESCRIPTION
+.br
+.in 8
+ps__
+prints certain facts about active
+processes.
+The information is columnar and consists of:
+
+.in +3
+The (numerical) ID of the user associated
+with the process;
+
+The last character of the control typewriter of the process
+or "x" if there is no control typewriter;
+"x" lines are suppressed unless the "x" option
+is given.
+
+The number of 512-byte disk blocks holding the core
+image of the process;
+
+The process's unique ID (only with "l" option)
+
+The number of hours (mod 100) and minutes of system, disk, and
+user-process time accumulated by the process and
+all its terminated descendants (only with "t" option)
+
+An educated guess as to the command line which caused the
+process to be created.
+
+.in -3
+Some caveats:
+
+The guess as to the command name and arguments is obtained by examining
+the process's stack.
+The process is entitled to destroy this information.
+Also, only processes whose core images are on disk have
+visible names.
+The ps__ command in particular
+does not, nor does any other process which happens to
+be in core at the same time.
+ps__ tries to overcome this limitation by spawning
+a subprocess designed to take up the other core
+slot, and is usually successful.
+Because ps__ examines a dynamically changing data structure,
+it can produce incorrect results, for example if
+a process's core image moves between the time
+ps__ gets its disk address and reads its stack.
+
+Besides its utility for simple spying,
+ps__ is the only plausible
+way to find the process number of someone you are trying
+to kill (VIII).
+.sp
+.in 16
+.ti 0
+FILES /dev/rf0,
+/sys/sys/unix (to get magic numbers).
+.sp
+.ti 0
+SEE ALSO kill (VIII)
+.sp
+.ti 0
+DIAGNOSTICS "Bad RF", if
+a bad swap address turns up;
+various missing-file diagnostics.
+.sp
+.ti 0
+BUGS As described.
diff --git a/static/v10/man8/pstat.8 b/static/v10/man8/pstat.8
new file mode 100644
index 00000000..61942bbf
--- /dev/null
+++ b/static/v10/man8/pstat.8
@@ -0,0 +1,418 @@
+.TH PSTAT 8
+.CT 1 sa_mortals
+.SH NAME
+pstat \- print system facts
+.SH SYNOPSIS
+.B /etc/pstat
+[
+.B \-afipstuxT
+]
+[
+.I suboptions
+]
+[
+.I file
+]
+[
+.I namelist
+]
+.SH DESCRIPTION
+.I Pstat
+interprets the contents of certain system tables.
+If
+.I file
+is given, the tables are sought there, otherwise
+in
+.FR /dev/kmem .
+The required namelist is taken from
+.IR namelist ,
+default
+.FR /unix .
+Options are
+.TP
+.B -a
+Under
+.BR -p ,
+describe all process slots rather than just active ones.
+.TP
+.B -i
+Print the inode table with the these headings:
+.RS
+.PD 0
+.TF SIGNAL
+.TP
+.B LOC
+The core location of this table entry.
+.TP
+.B FLAGS
+Miscellaneous state variables encoded thus:
+.RS
+.TP
+.B L
+locked
+.TP
+.B U
+modified time
+.RI ( filsys (5))
+must be corrected
+.TP
+.B A
+access time must be corrected
+.TP
+.B O
+file was opened
+.TP
+.B W
+wanted by another process
+.RB ( L
+flag is on)
+.TP
+.B T
+contains an active text
+.RE
+.TP
+.B CNT
+Number of active references to this inode.
+.TP
+.B FS
+File system type, see
+.IR fmount (2).
+.TP
+.B DEVICE
+Device number of file system in which
+this inode resides.
+.TP
+.B INO
+I-number within the file system.
+.TP
+.B MODE
+Mode, see
+.IR stat (2).
+.TP
+.B NLN
+Number of links to this inode.
+.TP
+.B UID
+Userid of owner.
+.TP
+.B SPTR
+Core location of corresponding stream header,
+0 if this is not a stream.
+.TP
+.B SIZ/DEV
+Number of bytes in an ordinary file, or
+device number of a special file.
+.TP
+.B MROOT
+Core location of root inode
+of file system mounted here,
+0 if none.
+.PD
+.RE
+.TP 0
+.B -x
+Print the text table with these headings:
+.PD 0
+.RS
+.TF SIGNAL
+.TP
+.B LOC
+The core location of this table entry.
+.TP
+.B FLAGS
+Miscellaneous state variables encoded thus:
+.RS
+.TP
+.B P
+resulted from demand-page-from-inode exec format, see
+.IR exec (2)
+.TP
+.B T
+traced through
+.IR proc (4)
+.TP
+.B W
+text not yet written to swap device
+.TP
+.B L
+loading in progress
+.TP
+.B K
+locked
+.TP
+.B w
+wanted
+.RB ( L
+flag is on)
+.RE
+.TP
+.B DADDR
+Disk address in swap, in multiples of 512 bytes.
+.TP
+.B CADDR
+Head of a linked list of loaded processes using this text segment.
+.TP
+.B RSS
+Size of physical memory occupied
+by text segment,
+in multiples of 512 bytes.
+.TP
+.B SIZE
+Size of text segment, in multiples of 512 bytes.
+.TP
+.B IPTR
+Core location of corresponding inode.
+.TP
+.B CNT
+Number of processes using this text segment.
+.TP
+.B CCNT
+Number of processes in core using this text segment.
+.PD
+.RE
+.TP 0
+.B -p
+Print process table for active processes with these headings:
+.RS
+.TP
+.B LOC
+The core location of this table entry.
+.PD 0
+.TF SIGNAL
+.TP
+.B S
+Run state encoded thus:
+.RS
+.TP
+.B 0
+no process
+.TP
+.B 1
+waiting for some event
+.TP
+.B 3
+runnable
+.TP
+.B 4
+being created
+.TP
+.B 5
+being terminated
+.TP
+.B 6
+stopped under trace
+.RE
+.TP
+.B F
+Miscellaneous state variables, or-ed together (hexadecimal):
+.RS
+.TF SIGNAL
+.TP
+.B 0000001
+loaded in memory
+.TP
+.B 0000002
+special system process (swapper or pager)
+.TP
+.B 0000004
+being swapped out
+.TP
+.B 0000008
+obscure swapout flag
+.TP
+.B 0000010
+traced
+.TP
+.B 0000020
+used in tracing
+.TP
+.B 0000040
+locked in core
+.TP
+.B 0000080
+waiting for pagein
+.TP
+.B 0000100
+prevented from swapping during
+.IR fork (2)
+.TP
+.B 0000200
+gathering pages for raw i/o
+.TP
+.B 0000400
+exiting
+.TP
+.B 0008000
+associated text is demand paged from file
+.TP
+.B 0030000
+anomalous paging behaviour expected,
+see
+.IR vlimit
+in
+.IR deprecated (2)
+.TP
+.B 0040000
+in a sleep which will time out
+.TP
+.B 0400000
+in
+.IR select (2)
+.TP
+.B 0800000
+traced via
+.IR proc (4)
+.TP
+.B 1000000
+i/o via
+.IR proc
+in progress
+.TP
+.B 2000000
+stop on exec
+.TP
+.B 4000000
+wanted by
+.I proc
+after pagein
+.RE
+.TF SIGNAL
+.TP
+.B ADDR
+The core location of the page table entry for the first page of the `u-area.'
+.TP
+.B PRI
+Scheduling priority;
+smaller numbers run first.
+.TP
+.B SIG
+Signals received; signals 1-32 coded in bits 0-31.
+.TP
+.B UID
+Real userid.
+.TP
+.B SLP
+Time blocked in seconds;
+times over 127 coded as 127.
+.TP
+.B TIM
+Time resident in seconds;
+times over 127 coded as 127.
+.TP
+.B CPU
+Weighted integral of CPU time, for scheduler.
+.TP
+.B NI
+Nice level,
+see
+.IR nice (2).
+.TP
+.B PGRP
+Process group number.
+.TP
+.B PID
+Process ID number.
+.TP
+.B PPID
+Process ID of parent process.
+.TP
+.B RSS
+Number of physical page frames allocated
+to this process.
+.TP
+.B SRSS
+RSS at last swap, 0 if never swapped.
+.TP
+.B SIZE
+Virtual size of process image (data+stack) in multiples of 512 bytes.
+.TP
+.B WCHAN
+Event address if waiting.
+.TP
+.B LINK
+Pointer to next entry in list of runnable processes.
+.TP
+.B TEXTP
+If text is pure, pointer to location of text table entry.
+.TP
+.B CLKT
+Countdown for
+.IR alarm (2)
+measured in seconds.
+.PD
+.RE
+.TP 0
+.B -u
+Print information about a user process;
+the next argument is its address as given
+by
+.L ADDR
+under
+.B -p
+above.
+The process must be in main memory, or the file used can
+be a core image
+.RI ( core (5))
+and the address 0.
+.TP
+.B -f
+Print the open file table with these headings:
+.PD0
+.RS
+.TF SIGNAL
+.TP
+.B LOC
+The core location of this table entry.
+.PD 0
+.TP
+.B FLG
+Miscellaneous state variables encoded thus:
+.RS
+.TP
+.B R
+open for reading
+.TP
+.B W
+open for writing
+.RE
+.TP
+.B CNT
+Number of processes that know this open file.
+.TP
+.B INO
+The core location of the inode table entry for this file.
+.TP
+.B OFFS
+The file offset, see
+.IR lseek (2).
+.PD
+.RE
+.TP 0
+.B -s
+Print information about swap space usage:
+the number of 1024 byte pages used
+and free,
+and the number of pages belonging
+to text images.
+.TP
+.B -T
+Print the number of used and free slots in several system tables;
+useful to see if they are nearly full.
+.SH FILES
+.TF /dev/kmem
+.TP
+.F /unix
+namelist
+.TP
+.F /dev/kmem
+default source of tables
+.SH SEE ALSO
+.IR ps (1),
+.IR stat (2),
+.IR filsys (5)
+.br
+M. J. Bach,
+.IR "The Design of the UNIX Operating System" ,
+Prentice-Hall, 1986
+.SH BUGS
+This program is never up to date.
diff --git a/static/v10/man8/pwserv.8 b/static/v10/man8/pwserv.8
new file mode 100644
index 00000000..bb7fb90e
--- /dev/null
+++ b/static/v10/man8/pwserv.8
@@ -0,0 +1,77 @@
+.TH PWSERV 8
+.CT 1 sa_auto
+.SH NAME
+pwserv \- password verification service
+.SH SYNOPSIS
+.B /etc/pwserv
+.SH DESCRIPTION
+.I Pwserv,
+normally started from
+.IR rc (8),
+handles password verification requests initiated by (say)
+.IR pwquery (3)
+through the conventional
+process mount point
+.FR /cs/pw .
+When a request is made a file descriptor (called the `line' below)
+is passed to
+.I pwserv
+together with a user name and an optional parameter string.
+Normally,
+.I pwserv
+writes a prompt on the line, reads a reply, and returns
+an indication of success to the invoking client.
+Valid passwords are taken from the file
+.FR /etc/pwfile ,
+which lists for each user an ordinary (encrypted,
+.IR crypt (3)-style)
+password and an
+SNK (Secure Net Key) challenge-response key.
+Before prompting, an
+.B FIOPX
+IO control is attempted to render the line to the end user private;
+see
+.IR pex (4).
+If this succeeds
+either a classical or an Atalla password is accepted.
+If the pex bid fails, the prompt warns that the line
+is not private, and only an SNK response is accepted.
+.PP
+In the pexed case the prompt looks like
+.B Password(pjw:31416):
+and in the unpexed case like
+.B "Password(TAPPED LINE:01492):
+The five digit string after the colon is the Atalla challenge string.
+Only the first five digits of the Atalla response string are significant.
+Hex digits in the response must be typed in lower case.
+.PP
+Possible values of the optional parameter string are
+.TP
+.B pex
+(specified by opening the server with
+.B ipcopen("/cs/pw!pex") )
+Accept passwords only if the
+.B FIOPX
+succeeds.
+.PP
+When the line's stream identifier asserts previous confirmation
+of the same password,
+.I pwserv
+answers affirmatively without demanding a password; see
+.IR session (1)
+and
+.IR src (5).
+.SH FILES
+.nf
+.F /etc/pwserv
+.F /etc/pwfile
+.fi
+.SH "SEE ALSO"
+.IR pwquery (3),
+.IR ipc (3),
+.IR pex (4),
+.IR stream (4),
+.IR pwfile (5),
+.IR passwd (1)
+.SH BUGS
+Jammable.
diff --git a/static/v10/man8/quot.8 b/static/v10/man8/quot.8
new file mode 100644
index 00000000..dca6bbad
--- /dev/null
+++ b/static/v10/man8/quot.8
@@ -0,0 +1,135 @@
+.TH QUOT 8
+.CT 1 sa_mortals
+.SH NAME
+quot, findo \- file system usage and hogs
+.SH SYNOPSIS
+.B /etc/quot
+[
+.I option ...
+]
+[
+.I filesystem
+]
+.PP
+.BI findo
+[
+.B -f
+]
+[
+.B -n
+]
+[
+.B -u
+.I userid
+]
+.I device mount-directory
+.SH DESCRIPTION
+.I Quot
+prints the number of blocks in the named
+.I filesystem
+device currently owned by each user.
+If no
+.I filesystem
+is named,
+.F /dev/usr
+is assumed.
+The options are:
+.TP
+.B -n
+Use as in the example below to list all files and owners.
+.TP
+.B -c
+Print three columns giving file size in blocks, number of
+files of that size, and cumulative total of blocks
+in files of that size or smaller.
+.TP
+.B -f
+Print count of number of files as well as space owned by each user.
+.TP
+.B -b
+Print space-time product in block-years in addition to space owned by
+each user.
+.PP
+.I Findo
+discovers files you might want to delete on the
+given block
+.I device,
+which must be mounted on the given directory.
+It lists, on the standard output, the
+sizes, ages in days, and names of files
+with any of the following characteristics:
+.IP -
+.IR Troff (1)
+output files older than 24 hours.
+The names are marked
+.L troff:
+in the output.
+.IP -
+Week-old files named
+.BR core ,
+.BR a.out ,
+.BR mon.out ,
+.BR .pilog ,
+.BR junk* ,
+.BR temp* ,
+.BR ed.hup ,
+.BR qed.hup:* ,
+.BR jim.recover ,
+.BR sam.save ,
+.BR sam.err ,
+.BR ~~sam~~ ,
+.BR [a-z] ,
+.BR dead.letter ,
+.BR foo[0-9]* ,
+.BR rst[0-9]+ ,
+.BR .jx* ,
+.BR *.dvi ,
+and files whose names
+resemble
+.IR apnews (7)
+spool entries.
+.IP -
+Files over a month old named
+.BR *.o .
+The names are marked
+.LR old: .
+.IP -
+Files owned by users selected with option
+.BR -u ;
+the names are marked
+.LR user: .
+.PP
+The options are
+.TP
+.B -f
+List files owned by users not in the password file.
+.TP
+.BI -u " userid
+List files over 2 days old owned by the user with the given numeric
+.I userid.
+.TP
+.B -n
+List files of any age owned by the specified users.
+.SH EXAMPLES
+.TP
+.L
+ncheck filesystem | sort -n | quot -n filesystem
+List all files and their owners.
+.SH FILES
+.F /etc/passwd
+to get user names
+.SH "SEE ALSO"
+.IR ls (1),
+.IR du (1),
+.IR icheck (8),
+.IR fstab (5)
+.SH BUGS
+.I Quot
+counts holes in files as if they actually occupied space.
+.br
+Patterns specifying the names and ages are compiled into
+.I findo.
+.br
+.I Findo's
+age distinction for files owned by a specific user is a
+historical dreg.
diff --git a/static/v10/man8/rarepl.8 b/static/v10/man8/rarepl.8
new file mode 100644
index 00000000..5d9fabef
--- /dev/null
+++ b/static/v10/man8/rarepl.8
@@ -0,0 +1,115 @@
+.TH RAREPL 8
+.CT 1 sa_nonmortals
+.SH NAME
+rarepl, rarct \- replace bad blocks on MSCP disks
+.SH SYNOPSIS
+.B /etc/rarct
+[
+.B -c
+]
+[
+.B -h
+]
+.I special ...
+.PP
+.B /etc/rarepl
+.I special
+.I lbn ...
+.SH DESCRIPTION
+.I Rarct
+prints status information
+about MSCP disk drives
+like the RA60 and RA81.
+Normally the replacement table (RCT)
+is listed,
+as lines of the form
+.IP
+.IB rbn : \0flags : \0lbn
+.PP
+where
+.I rbn
+is the replacement block number,
+.I lbn
+is the logical block number
+replaced by
+.IR rbn ,
+and
+.I flags
+are constructed from the following bits:
+.TP
+.PD 0
+.B 01
+alternate (not primary) replacement block
+.TP
+.B 02
+normal, allocated replacement block
+.TP
+.B 04
+this replacement block is bad
+.TP
+.B 010
+this replacement block does not exist
+.PD
+.PP
+Entries whose
+.I flags
+are zero,
+indicating a good,
+unused replacement block,
+are not listed.
+.PP
+The options suppress the RCT listing and perform other functions:
+.TP
+.B -h
+Print some header data
+from the first block of the RCT.
+The system does not use this information.
+.TP
+.B -c
+Print geometry information for the drive.
+.PP
+.I Rarepl
+causes logical block
+.I lbn
+on device
+.I dev
+to be marked as bad
+and replaced.
+The nearest available replacement block
+is used.
+The contents of
+.I lbn
+are copied into the replacement block if possible;
+if
+.I lbn
+is unreadable,
+the replacement block
+is initialized with zeros.
+.PP
+Both programs
+work only
+on the raw devices.
+.I Rarepl
+should be used only
+on a device
+which covers the entire drive
+(usually partition 7).
+.SH SEE ALSO
+.IR ra (4),
+.IR smash (8)
+.SH BUGS
+There are various controller- and drive-dependent anomalies.
+Some controllers,
+like the RQDX3,
+report an RCT
+but don't allow forwarding.
+On many controllers,
+the RCT exists
+only so programs in the host can look at it;
+the controller ignores its contents.
+There is no way to read the controller's `real' forwarding data,
+only a way to set it for a particular block.
+Hence if the RCT is corrupted,
+the disk may still be used,
+but must be reformatted
+before additional bad blocks are remapped.
diff --git a/static/v10/man8/rc.8 b/static/v10/man8/rc.8
new file mode 100644
index 00000000..f46cff12
--- /dev/null
+++ b/static/v10/man8/rc.8
@@ -0,0 +1,77 @@
+.TH RC 8
+.CT 1 sa_auto
+.SH NAME
+rc \- boot script
+.SH SYNOPSIS
+.B /etc/rc
+.SH DESCRIPTION
+.I Rc
+is the command script
+invoked by
+.IR init (8)
+to control reboots.
+During an automatic reboot,
+.I rc
+is invoked with the argument
+.BR autoboot ;
+typically this invokes
+.L /etc/fsck -p
+to repair minor filesystem inconsistencies.
+If
+.I rc
+exits with a successful status,
+.I init
+proceeds to multi-user mode.
+.PP
+When the system enters multi-user mode,
+either during an auto-reboot
+or after the single-user shell terminates,
+.I rc
+is invoked without arguments.
+This usually causes it to
+mount filesystems,
+start daemons,
+clear
+.FR /tmp ,
+and perform other housekeeping.
+.PP
+If any call to
+.I rc
+returns a nonzero status,
+.I init
+reverts to single-user mode.
+.SH EXAMPLES
+A typical
+.I rc
+script:
+.PP
+.EX
+date
+case $1 in
+autoboot)
+ echo Autoboot:
+ /etc/fsck -p || {echo "error in reboot"; exit 1}
+esac
+/etc/ldpcs /etc/pcs750.bin
+>/etc/mtab
+/etc/mount -a
+/etc/savecore /tmp/dump /dev/ra11
+/etc/swapon -a
+trap "" 1 2 3
+/etc/update
+/etc/cron &
+rm -f /tmp/*
+/usr/lib/asd/rmlocks
+date >> /usr/adm/lastboot
+/etc/accton /tmp/acct > /tmp/acct
+/usr/ipc/mgrs/svcmgr
+/etc/kdiload
+/usr/ipc/mgrs/dkhup; sleep 10
+/usr/ipc/mgrs/dkmgr
+/usr/netb/setup.go
+/usr/net/face.go
+wwv -s
+.EE
+.SH SEE ALSO
+.IR init (8),
+.IR reboot (8)
diff --git a/static/v10/man8/reboot.8 b/static/v10/man8/reboot.8
new file mode 100644
index 00000000..50e1c453
--- /dev/null
+++ b/static/v10/man8/reboot.8
@@ -0,0 +1,127 @@
+.TH REBOOT 8
+.CT 1 sa_auto
+.SH NAME
+reboot \- bootstrapping procedures
+.SH DESCRIPTION
+.PP
+Here are some recipes for booting and crashing the operating system
+on VAXes.
+.SS Rebooting a running system
+The preferred way to reboot is to log in on the console as super-user,
+invoke
+.B kill 1
+to take the system to single user,
+unmount file systems with
+.B /etc/umount -a
+and halt and restart the system
+as described below under `Console boots.'
+.SS Power fail and crash recovery
+The system will reboot itself at power-up or after crashes if
+auto-boot is enabled on the machine front panel
+or in the console software.
+If auto-restart is enabled,
+the system will first attempt to save a copy of physical memory
+on a reserved piece of disk.
+An automatic consistency check of the file systems is performed.
+Unless this fails the system will resume multi-user operations.
+.SS Console boots
+Sync the disks if necessary and possible.
+To recover hardware control of the console, type a
+.RB control- P .
+This will yield a
+.L >>>
+prompt from the VAX
+console subsystem (sic).
+The command
+.IP
+.B >>> H
+.LP
+will halt the CPU
+(except on the 11/750,
+where
+.RB control- P
+halts the CPU right away).
+.PP
+On MicroVAXes,
+.RB control- P
+doesn't work;
+hit the
+.SM BREAK
+key instead.
+.PP
+To boot multi-user with an automatic file system check,
+give the console command
+.IP
+.B >>> B
+.LP
+Commands to boot single-user vary.
+On the VAX-11/750 and on MicroVAXes,
+use
+.IP
+.B >>> B/3
+.LP
+On the VAX-11/780 and VAX 8550 and 8700,
+use
+.IP
+.B >>> B MAN
+.LP
+This will prompt with
+.LR *
+for the name of the file to boot.
+The filename should be an executable image
+in the root directory
+of the filesystem at the beginning of the disk.
+.SS System core images
+If the system crashes
+and auto-restart is enabled,
+a copy of physical memory is written
+to a reserved piece of disk.
+To save a core image of a hung system, type on the console (after
+.RB control- P
+if necessary):
+.IP
+.EX
+>>> S 80000010
+.EE
+.PP
+The system will write the core image,
+then reboot automatically.
+.PP
+If the core image was written on
+.LR /dev/ra11 ,
+the following incantation will print a stack traceback
+from the time of the crash:
+.IP
+.EX
+adb /unix /dev/ra11
+$<crash
+$c
+.EE
+.PP
+To save disk space,
+the core image is sometimes overlaid on part of the swap area,
+where normal system operation will soon overwrite it.
+.IR Savecore (8)
+will copy the core image
+to an ordinary disk file.
+.SH FILES
+.TP
+.F /unix
+default system binary
+.SH "SEE ALSO"
+.IR fsck (8),
+.IR init (8),
+.IR rc (8),
+.IR savecore (8)
+.SH BUGS
+Older boot programs with different syntax are still around in a few places,
+especially on machines with Emulex UNIBUS disk controllers,
+for which silly boot ROMs are common.
+.PP
+There are commands
+.B /etc/reboot
+and
+.B /etc/halt
+which attempt to reboot and halt the system;
+their function is indeterminate
+and likely to change.
diff --git a/static/v10/man8/recnews.8 b/static/v10/man8/recnews.8
new file mode 100644
index 00000000..59a707ef
--- /dev/null
+++ b/static/v10/man8/recnews.8
@@ -0,0 +1,24 @@
+.TH RECNEWS 8
+.SH NAME
+recnews \- receive unprocessed articles via mail
+.SH SYNOPSIS
+.BR /usr/lib/news/recnews " [ "
+.IR newsgroup " [ " sender " ] ] "
+.SH DESCRIPTION
+.I Recnews
+reads a letter from the standard input; determines the article title,
+sender, and newsgroup; and gives the body to inews with the right
+arguments for insertion.
+.PP
+If
+.I newsgroup
+is omitted, the to line of the letter will be used. If
+.I sender
+is omitted, the sender will be determined from the from line of the letter.
+The title is determined from the subject line.
+.SH SEE ALSO
+inews(1),
+uurec(8),
+sendnews(8),
+readnews(1),
+checknews(1)
diff --git a/static/v10/man8/reloc.8 b/static/v10/man8/reloc.8
new file mode 100644
index 00000000..a34054c6
--- /dev/null
+++ b/static/v10/man8/reloc.8
@@ -0,0 +1,45 @@
+.th RELOC VIII 2/7/73
+.sh NAME
+reloc \*- relocate object files
+.sh SYNOPSIS
+.bd reloc
+file octal [
+.bd \*-
+]
+.sh DESCRIPTION
+.it Reloc
+modifies the named object program file so that it will operate correctly
+at a different core origin than the one for which
+it was assembled or loaded.
+.s3
+The new core origin is the old origin
+increased by
+the given
+.it octal
+number (or decreased if the number has a `\*-' sign).
+.s3
+If the object file was generated by
+.it ld,
+the
+.bd \*-r
+and
+.bd \*-d
+options must have been given to
+preserve the relocation information and define any common symbols
+in the file.
+.s3
+If the optional last argument is given, then any
+.it setd
+instruction at the start of the file
+will be replaced by a no-op.
+.s3
+The purpose of this command is to simplify the
+preparation of object programs for systems
+which have no relocation hardware.
+It is hard to imagine a situation
+in which it would be useful to attempt directly to execute
+a program treated by
+.it reloc.
+.sh "SEE ALSO"
+as(I), ld(I), a.out(V)
+.sh BUGS
diff --git a/static/v10/man8/renice.8 b/static/v10/man8/renice.8
new file mode 100644
index 00000000..0f08f491
--- /dev/null
+++ b/static/v10/man8/renice.8
@@ -0,0 +1,31 @@
+.TH RENICE 8
+.CT 1 sa_nonmortals
+.SH NAME
+renice \- change priority of running process
+.SH SYNOPSIS
+.B /etc/renice
+[
+.BI - priority
+]
+.I pid ...
+.SH DESCRIPTION
+.I Renice
+increments the scheduling priority
+of the processes with the named
+.I process-ids
+by
+.IR pri .
+The default
+.IR pri
+is 19,
+making the process least likely to run.
+.PP
+Only the owner of the process
+or the super-user may change the priority.
+Only the super-user may use negative increments.
+.SH FILES
+.BI /proc
+.SH SEE ALSO
+.IR nice (1),
+.IR nice (2),
+.IR proc (4)
diff --git a/static/v10/man8/restor.8 b/static/v10/man8/restor.8
new file mode 100644
index 00000000..359164a1
--- /dev/null
+++ b/static/v10/man8/restor.8
@@ -0,0 +1,112 @@
+.th RESTOR VIII 11/24/73
+.sh NAME
+restor \*- incremental file system restore
+.sh SYNOPSIS
+.bd restor
+key [ arguments ]
+.sh DESCRIPTION
+.it Restor
+is used to read magtapes dumped with the
+.it dump
+command.
+The
+.it key
+argument specifies what is to be done.
+.it Key
+is a character from the set
+.bd trxw.
+.s3
+.lp +5 3
+\fBt\fR The date that the tape was made and the date that
+was specified in the
+.it dump
+command are printed.
+A list of all of the i-numbers on the tape
+are also given.
+.s3
+.lp +5 3
+\fBr\fR The tape
+is read and loaded into the file system
+specified in
+.it arguments.
+This should not be done lightly (see below).
+.s3
+.lp +5 3
+\fBx\fR Each file on the
+tape is individually extracted into
+a file whose name is the file's i-number.
+If
+there are
+.it arguments,
+they are interpreted as i-numbers and only they are
+extracted.
+.s3
+.lp +5 3
+\fBw\fR In conjunction with the
+.bd x
+option,
+before each file is extracted,
+its i-number is typed out.
+To extract this file,
+you must respond with
+.bd y.
+.s3
+.i0
+The
+.bd r
+option should only be used to restore
+a complete dump tape onto a clear file system
+or to restore an incremental dump tape onto this.
+Thus
+.s3
+ /etc/mkfs /dev/rp0 40600
+.br
+ restor r /dev/rp0
+.s3
+is a typical sequence to restore a complete dump.
+Another
+.it restor
+can be done to get an incremental dump
+in on top of this.
+.s3
+A
+.it dump
+followed by a
+.it mkfs
+and a
+.it restor
+is used to
+change the size of a file system.
+.sh FILES
+/dev/mt0
+.sh "SEE ALSO"
+dump, mkfs, check, clri (VIII)
+.sh DIAGNOSTICS
+There are various diagnostics
+involved with reading the tape and writing the disk.
+There are also diagnostics if the i-list or the free list
+of the file system is not large enough to hold the dump.
+.sh BUGS
+There is redundant information on the tape
+that could be used in case of tape reading problems.
+Unfortunately,
+.it restor's
+approach is to exit if anything is wrong.
+.s3
+Files that have been deleted are
+not removed when incremental tapes are loaded.
+It will be necessary to
+.it check
+the restored file system and
+.it clri
+any files that show up with
+a 201 delta diagnostic.
+.s3
+The current version of
+.it restor
+does not free space occupied
+by files that are overwritten.
+Thus a
+.it check
+will have to be performed to reclain the missing
+space.
diff --git a/static/v10/man8/route.8 b/static/v10/man8/route.8
new file mode 100644
index 00000000..1f99f156
--- /dev/null
+++ b/static/v10/man8/route.8
@@ -0,0 +1,95 @@
+.TH ROUTE 8
+.CT 1 sa_auto
+.SH NAME
+route, routed, remroutes \- IP gateway routing
+.SH SYNOPSIS
+.B /usr/ipc/mgrs/routed
+[
+.B -v
+] [
+.B -t
+] [
+.B -q
+] [
+.BI - hops
+] [
+.I addr ...
+]
+.br
+.B route add
+.I "dest gateway"
+.br
+.B route delete
+.I "dest"
+.B
+.br
+.B /etc/remroutes
+.br
+.SH DESCRIPTION
+.I Routed
+runs the 4BSD RIP routing protocol on an IP network.
+It broadcasts routing information to the network at large,
+listens for routing messages from elsewhere,
+and informs the system of the routes it receives.
+.PP
+The options are
+.TP
+.BI \-v
+Log transmitted messages on the standard output.
+.TP
+.BI \-t
+Log received messages on the standard output.
+.TP
+.BI \-q
+Accept routing information but do not broadcast any.
+.TP
+.BI \- hops
+Add
+.I hops
+(a decimal number)
+to the hop count
+when broadcasting routes.
+.PD
+.LP
+Information received for any named
+.I addrs
+is ignored.
+.PP
+.I Routed
+is usually run without options on gateway machines,
+and with the
+.B -q
+option on non-gateway machines.
+.PP
+.I Route
+sets up specific routes,
+to establish static routing
+or to adjust that set up by
+.IR routed .
+The
+.B add
+command informs the system that
+internet address
+.I dest
+may be reached through
+internet address
+.IR gateway ;
+.B delete
+removes any routing for
+.IR dest .
+The special
+destination
+.L *
+represents the default routing:
+.B route add *
+.I gate
+sets the default,
+.B route delete *
+removes any default.
+.PP
+.I Remroutes
+removes all known routes.
+.SH FILES
+.F /usr/ipc/log/routed
+.SH "SEE ALSO"
+.IR ipconfig (8)
diff --git a/static/v10/man8/sa.8 b/static/v10/man8/sa.8
new file mode 100644
index 00000000..45c77ec9
--- /dev/null
+++ b/static/v10/man8/sa.8
@@ -0,0 +1,185 @@
+.TH SA 8
+.CT 1 sa_nonmortals
+.SH NAME
+sa, accton \- system accounting
+.SH SYNOPSIS
+.B /etc/sa
+[
+.B -abcdDfgijkKlnrstuv
+]
+[
+.B -e prefix
+]
+[
+.I file
+]
+.PP
+.B /etc/accton
+[
+.I file
+]
+.SH DESCRIPTION
+With an argument naming an existing
+.I file,
+.I accton
+causes system accounting information for
+every process executed to be placed at the end of the file.
+If no argument is given, accounting is turned off.
+.PP
+.I Sa
+reports on, cleans up, and generally maintains
+accounting files.
+.PP
+.I Sa
+is able to condense
+the information in
+.F /usr/adm/acct
+into a summary file
+.F /usr/adm/savacct
+which contains a count of the
+number of times each command was called and the time resources
+consumed.
+This condensation is desirable because on a large system
+.F /usr/adm/acct
+can grow by 10000 blocks per day.
+The summary file is normally read before the accounting file,
+so the reports include all available information.
+.PP
+If a file name is given as the last argument,
+that file will be treated
+as the accounting file;
+.F /usr/adm/acct
+is the default.
+.PP
+Output fields are labeled:
+.L cpu
+for the sum of user and system times
+(in minutes),
+.L re
+for real time (also in minutes),
+.L k
+for cpu-time averaged core usage (in 1K units),
+.L avio
+for average number of IO operations per execution.
+With options fields labelled
+.L tio
+for total IO operations,
+.L k*sec
+for cpu storage integral (kilo-core seconds),
+.L u
+and
+.L s
+for user and system cpu time alone (both in minutes) will sometimes
+appear.
+.PP
+There are zillions of options:
+.TP
+.B a
+Place all command names containing unprintable characters
+and those used only once under the name
+.LR ***other .
+.TP
+.B b
+Sort output by sum of user and system time divided by number of
+calls.
+Default sort is by sum of user and system times.
+.TP
+.B c
+Besides total user, system, and real time for each command print percentage
+of total time over all commands.
+.TP
+.B d
+Sort by average number of disk IO operations.
+.TP
+.B D
+Sort by total number of disk IO operations.
+.TP
+.B e
+Set the prefix for accounting file names to the next argument
+.RB ( /usr/adm/
+is the default).
+.TP
+.B f
+Assume answer
+.L y
+for option
+.BR -v .
+.TP
+.B g
+Ignore
+.BR /usr/adm/acct .
+Useful for processing only
+.L savacct
+and
+.LR usracct .
+.TP
+.B i
+Don't read in summary file.
+.TP
+.B j
+Instead of total minutes time for each category,
+give seconds per call.
+.TP
+.B k
+Sort by cpu-time average memory usage.
+.TP
+.B K
+Print and sort by cpu-storage integral.
+.TP
+.B l
+Separate system and user time; normally they are combined.
+.TP
+.B m
+(money) Print number of processes and number of CPU minutes for each user.
+.TP
+.B n
+Sort by number of calls.
+.TP
+.B r
+Reverse order of sort.
+.TP
+.B s
+Merge accounting file into summary file
+.F /usr/adm/savacct
+when done.
+.TP
+.B t
+For each command report ratio of real time to the sum of user and
+system times.
+.TP
+.B u
+Superseding all other flags,
+print for each command in the accounting file the
+userid and command name.
+.TP
+.B v
+Followed by a number
+.I n,
+types the name of
+each command used
+.I n
+times or fewer.
+Await a reply from the terminal;
+if it begins with
+.LR y ,
+add the command to
+the category
+.LR **junk** .
+This is used to strip out garbage.
+.SH FILES
+.TF /usr/adm/usracct
+.TP
+.F /usr/adm/acct
+raw accounting
+.TP
+.F /usr/adm/savacct
+summary
+.TP
+.F /usr/adm/usracct
+per-user summary
+.SH "SEE ALSO"
+.IR ac (8),
+.IR acct (2)
+.SH BUGS
+.I Sa
+needs more options.
diff --git a/static/v10/man8/salv.8 b/static/v10/man8/salv.8
new file mode 100644
index 00000000..cf9d808f
--- /dev/null
+++ b/static/v10/man8/salv.8
@@ -0,0 +1,86 @@
+.pa 1
+.he 'SALV (VIII)'1/20/73'SALV (VIII)'
+.ti 0
+NAME salv -- file system salvage
+.sp
+.ti 0
+SYNOPSIS /etc/salv_________ filesystem [ -akfs_____ ]
+.sp
+.ti 0
+DESCRIPTION
+.br
+.in 8
+salv____
+will place a given file system
+in a consistent state with
+almost no loss of information.
+This is the first step in putting things
+together after a bad crash.
+Salv performs the following functions:
+.sp
+.in +3
+A valid free list is constructed.
+
+.in -3
+The previous step is always performed; the following steps
+are performed only if the "a" option is given.
+If the file system's only defect is missing blocks,
+"a" should not be specified.
+.in +3
+.sp
+All bad pointers in the file system are zeroed.
+.sp
+All duplicate pointers to the same block
+are resolved by changing one of the pointers
+to point at a new block containing a copy of the data.
+.sp
+Inodes (not directory entries) for special files
+are generated (mode 16).
+
+Files whose size is too large for the number of
+blocks they contain (after bad pointers are zeroed)
+have their size revised downward.
+
+.in -3
+The file system should be unmounted while it is
+being salvaged.
+In cases of extreme need the permanently mounted
+file system may be salvaged; in such a case
+the system must be rebooted before it
+has a chance to write out the old, bad super-block.
+
+The "k", "f", and "s" options
+tell salv what magic numbers to use to generate
+the size of the free list and the i-node map.
+"k" is default (RK disk); "f" is RF; "s" is RK with
+swap space on it.
+If salv is to be used away
+from the mother system its code should be cheked
+to verify the numbers.
+.sp
+After a salv, files may be safely created
+and removed without causing
+more trouble.
+If the "a" option had to be used,
+a dcheck (VIII) should be done to find the degree
+of the damage to the hierarchy.
+.sp
+.in 16
+.ti 0
+FILES /dev/rk0
+.sp
+.ti 0
+SEE ALSO check(I), ds(I)
+.sp
+.ti 0
+DIAGNOSTICS --
+.sp
+.ti 0
+BUGS In
+only one (known) way does salv____ destroy information:
+if some random block appears to be an indirect block
+for a file,
+all "bad pointers" (for example, ASCII text) in it
+will be zeroed. If
+the block also appears in another file, it may be
+scribbled on before it is copied.
diff --git a/static/v10/man8/savecore.8 b/static/v10/man8/savecore.8
new file mode 100644
index 00000000..37ace4af
--- /dev/null
+++ b/static/v10/man8/savecore.8
@@ -0,0 +1,83 @@
+.TH SAVECORE 8
+.CT 1 sa_auto
+.SH NAME
+savecore \- save a core image of the operating system
+.SH SYNOPSIS
+.B /etc/savecore
+.I target
+.I dump
+.SH DESCRIPTION
+.I Savecore
+copies the core image
+saved after an operating system crash
+to an ordinary file.
+This is worth doing
+so that the crash image will not be overwritten
+immediately by another crash,
+or sometimes because the crash image was written
+in a place where normal system operation will overwrite it
+(e.g. in the swap area).
+.PP
+The crash image is taken from
+.I dump
+and written to
+.IR target .
+If
+.I target
+exists and is a directory,
+the image is copied to
+a file in that directory
+with the first nonexistent name
+in the sequence
+.BR "z.0 z.1 z.2 ..." ;
+otherwise
+.I target
+is created or overwritten.
+.PP
+The crash image to be copied
+is checked for a magic number
+in a known location.
+If the magic number is correct,
+it is followed by the size of the image,
+and the time it was written;
+these numbers are printed
+before the dump is copied.
+If the magic number is wrong,
+the image is not copied.
+.I Savecore
+overwrites the magic number in
+.I dump
+after a successful copy.
+.PP
+The program runs faster
+if
+.I dump
+is the raw device.
+.PP
+For compatibility with an older program of the same name,
+the
+.I dump
+argument may be omitted;
+.I savecore
+will noisily examine each device specified for swapping in
+.IR fstab (5)
+and each of several popular default swap devices
+for a valid magic number.
+The first device that looks right
+is taken to be the crash image.
+.PP
+.I Savecore
+is usually called when the system is booted,
+from
+.IR rc (8).
+.SH EXAMPLE
+.EX
+/etc/savecore /tmp/dump /dev/rra11
+.EE
+.SH SEE ALSO
+.IR reboot (8)
+.SH BUGS
+The argument convention
+(the file to be written comes first)
+is unfortunate;
+it stems from compatibility.
diff --git a/static/v10/man8/scsish.8 b/static/v10/man8/scsish.8
new file mode 100644
index 00000000..b1c9b08a
--- /dev/null
+++ b/static/v10/man8/scsish.8
@@ -0,0 +1,222 @@
+.TH SCSISH 8
+.CT 1 sa_nonmortals
+.SH NAME
+scsish \- SCSI shell
+.SH SYNOPSIS
+.B /usr/lib/worm/scsish
+.SH DESCRIPTION
+.I Scsish
+is a command interpreter for SCSI commands executed through
+.B /dev/scsi
+(see
+.IR scsi (4)).
+Many commands are applicable to more or less all SCSI devices;
+some are specific to the SONY WDA-3000-10 optical disk jukebox.
+Any details not found here are in the manual for the jukebox.
+.PP
+Typically commands are sent to a particular drive
+(a number between 0 and 7 inclusive)
+on a particular device
+(normally a number between 0 and 5 inclusive).
+Most commands take a drive parameter (a number).
+The device number is set by the
+.B id
+command.
+.PP
+Occasionally, commands fail and will print the result of a
+.B sense
+command which is normally needed to clear the error status.
+.PP
+All input is in lower case and keywords and numbers are separated by white space.
+Commands are separated by a newline or semicolon.
+.SS "General SCSI Commands"
+.TF "disk eject drive"
+.TP
+.BI capacity " drive"
+Report the capacity of
+.I drive
+as
+.BR "nblocks x blocksize" .
+.TP
+.BI "disk eject" " drive"
+Eject the disk
+(or other removable medium)
+from
+.IR drive .
+.TP
+.BI echo " number"
+Print
+.I number
+on standard output.
+.TP
+.B help
+Print a summary of the available commands.
+.TP
+.BI id " n"
+Set the destination SCSI bus device number.
+By default, it is 2 which is the normal device number for the SONY jukebox.
+.TP
+.BI inquiry " drive"
+Print various bits of status about
+.IR drive .
+For example,
+.IP
+.EX
+drive 2,0: WORM device, ' SONY WDA-3000-10 2.D'
+ disk,write protect,,,ready (0x9)
+.EE
+.IP
+If
+.I drive
+is omitted, an inquiry is performed for drives 0 through 7.
+.TP
+.BI read " drive block"
+Print the contents of the 1024 byte block at
+.I block
+on
+.I drive
+in hexadecimal.
+.TP
+.BI "read id" " drive"
+Print the string starting at byte 42 in block 1 on
+.IR drive .
+This corresponds to the initial
+.I vol_id
+for
+.IR worm (8)
+disks.
+.TP
+.B reset
+Attempt to reset the SCSI interface.
+.TP
+.BI sense " drive"
+Print the sense data for
+.IR drive .
+Some of the interpretations of the sense bytes are idiosyncratic to SONY.
+.TP
+.BI "ext sense" " drive"
+Print the extended sense data for
+.IR drive .
+Most of the interpretations of the extended sense bytes are idiosyncratic to SONY.
+.TP
+.BI sleep " n"
+Sleep for
+.I n
+seconds.
+.TP
+.BI start " drive"
+Start
+.I drive
+spinning.
+.TP
+.BI stop " drive"
+Stop
+.IR drive .
+.TP
+.BI test " drive"
+Test unit ready for
+.IR drive .
+.PD
+.SS "SONY Commands"
+.TP
+.BI alternate " drive"
+Print the replacement block tables from the disk.
+.TP
+.BI media " drive blkno nblks"
+Print a summary of the media quality in
+.I drive
+for the
+.I nblks
+blocks starting at block number
+.IR blkno .
+For example, a dirty disk can yield
+.IP
+.EX
+drive 0: media check for 1000 blocks [0-999], upper drive
+849 good, 1 unwritten, 147 <50% burst, 3 >96% burst,
+.EE
+.IP
+Please report any instances of messages including
+.B "rare error"
+to the jukebox guru.
+.PD
+.TP
+.BI "ext media" " drive blkno nblks"
+A verbose form of the
+.B media
+command.
+.PD
+.SS "Jukebox Commands"
+.TP
+.B config
+Print the configuration data for the jukebox.
+.TP
+.BI "rel" " drive shelf side"
+Release the disk from
+.I drive
+to
+.IR shelf .
+The value of
+.I side
+indicates whether it should be inverted on the way
+.RB ( b )
+or not
+.RB ( a ).
+If
+.I shelf
+and
+.I side
+are absent,
+the disk is restored to its former shelf.
+.PD0
+.TP
+.BI "set" " shelf side drive"
+Put the disk from
+.I shelf
+into
+.IR drive .
+The value of
+.I side
+indicates whether it should be inverted on the way
+.RB ( b )
+or not
+.RB ( a ).
+.TP
+.BI internal " n"
+Execute various internal reports and diagnostics.
+.B "internal -1"
+with no argument will print a list of available diagnostics.
+.TP
+.BI "status" " drive"
+Print the status for
+.IR drive .
+An absent
+.I drive
+is taken as 0.
+As the status is for the jukebox as a whole,
+the value of
+.I drive
+doesn't matter.
+A sample status output shows the jukebox hides the mapping
+of logical drive number and actual drive:
+.IP
+.EX
+drive 0: ready,disk in LUN,power on,disk in drive 0, return shelf 2
+drive 1: not ready,no disk in LUN,power on,disk in shelf 0
+drive 2: not ready,no disk in LUN,power on,disk in shelf 0
+drive 3: ready,disk in LUN,power on,disk in drive 1, return shelf 0
+drive 4: not ready,no disk in LUN,power on,disk in shelf 0
+drive 5: not ready,no disk in LUN,power on,disk in shelf 0
+drive 6: not ready,no disk in LUN,power on,disk in shelf 0
+drive 7: not ready,no disk in LUN,power on,disk in shelf 0
+0: no disk
+1: no disk
+2: disk,
+I/O shelf: no disk
+carrier: disk shelf=0
+upper drive: disk, LUN=0
+lower drive: disk, LUN=3
+.EE
+.SH "SEE ALSO"
+.IR worm (8),
+.IR scsi (4)
diff --git a/static/v10/man8/sendcover.8 b/static/v10/man8/sendcover.8
new file mode 100644
index 00000000..04be2b38
--- /dev/null
+++ b/static/v10/man8/sendcover.8
@@ -0,0 +1,28 @@
+.TH SENDCOVER 8
+.CT 1 writing_output
+.SH NAME
+sendcover \- send cover sheet to the library
+.SH SYNOPSIS
+.B sendcover
+.I file ...
+.SH DESCRIPTION
+.I Sendcover
+sends a document cover sheet to the
+Bell Laboratories library for their document database.
+It is invoked automatically as a byproduct of
+running
+.I troff -mcs.
+.PP
+The cover sheet is translated from the form of
+.IR mcs (6)
+to a form used in the library
+and certain other protocol information is added.
+The destination is not the same as that of
+.IR docsubmit (1).
+.SH FILES
+.F /usr/lib/tmac/tmac.cs
+.br
+.F /usr/lib/tmac/cstrans
+.SH "SEE ALSO"
+.IR docsubmit (1),
+.IR mcs (6)
diff --git a/static/v10/man8/sendnews.8 b/static/v10/man8/sendnews.8
new file mode 100644
index 00000000..6aba6dee
--- /dev/null
+++ b/static/v10/man8/sendnews.8
@@ -0,0 +1,60 @@
+.TH SENDNEWS 8
+.SH NAME
+sendnews \- send news articles via mail
+.SH SYNOPSIS
+sendnews
+[
+.B \-o
+]
+[
+.B \-a
+]
+[
+.B \-b
+]
+[
+.B \-n
+newsgroups
+]
+destination
+.SH DESCRIPTION
+.I sendnews
+reads an article from it's standard input, performs a set of changes
+to it, and gives it to the mail program to mail it to
+.I destination.
+.PP
+An `N' is prepended to each line for decoding by
+.I uurec(1).
+.PP
+The
+.B \-o
+flag handles old format articles.
+.PP
+The
+.B \-a
+flag is used for sending articles via the
+.B ARPANET.
+It maps the article's path from
+.I uucphost!xxx
+to
+.I xxx@arpahost.
+.PP
+The
+.B \-b
+flag is used for sending articles via the
+.B Berknet.
+It maps the article's path from
+.I uucphost!xxx
+to
+.I berkhost:xxx.
+.PP
+The
+.B \-n
+flag changes the article's newsgroup to the specified
+.I newsgroup.
+.SH SEE ALSO
+inews(1),
+uurec(8),
+recnews(8),
+readnews(1),
+checknews(1)
diff --git a/static/v10/man8/ship.8 b/static/v10/man8/ship.8
new file mode 100644
index 00000000..2901d1c9
--- /dev/null
+++ b/static/v10/man8/ship.8
@@ -0,0 +1,118 @@
+.TH SHIP 8
+.CT 1 comm_mach sa_nonmortals
+.SH NAME
+ship, shipstat \(mi automatic software distribution
+.SH SYNOPSIS
+.B ship
+[
+.I option ...
+]
+[
+.I file ...
+]
+.PP
+.B shipstat
+.SH DESCRIPTION
+.I Ship
+distributes the named files to other computers, where
+the files are installed under the same names.
+Shipping privileges are determined
+by the network manager on the receiving machine;
+see
+.IR svcmgr (8).
+.PP
+Destinations are taken from environment variable
+.BR dest ,
+or from
+.F /usr/lib/asd/dest/default
+if
+.B dest
+is empty.
+If a destination is the name of a file in
+.FR /usr/lib/asd/dest ,
+it is replaced by the contents of that file,
+each word of which is then examined in the same way.
+Otherwise the destination is a network address.
+The sending machine is omitted unless explicitly named in
+the environment variable,
+or unless option
+.B -f
+is present or environment variable
+.B force
+has a non-empty value.
+.PP
+.I Ship
+uses
+.I inspkg
+and
+.IR mkpkg (8)
+to do its work.
+Links among the named files are imitated
+on the receiving computer, and
+named files that do not exist on the sending
+computer are deleted on the receiving computer.
+Other options are the same as those of
+.IR mkpkg :
+.PP
+.TP \w'\-X file 'u
+.B -v
+Emit running commentary on the standard error file.
+.TP
+.BI -D path1 = path2
+Pretend that any
+.I file
+name that begins with
+.I path1
+really begins with
+.IR path2 .
+Relative pathnames are extended to full pathnames before comparison.
+.TP
+.BI -x command
+.br
+.ns
+.TP
+.BI -X file
+Include in the package instructions to execute the shell
+.I command
+or run the shell script
+.I file
+after all files have been installed.
+Only one of these options may occur.
+The
+.I file
+name in
+.BR -X
+is affected by
+.BR -D .
+.PP
+Shipments are generally acknowledged by mail after each destination
+has been tried at least once;
+see
+.IR asd (8)
+for details.
+.PP
+.I Shipstat
+reports the status of all its caller's
+incomplete shipments,
+with the most recent first.
+.SH FILES
+.TF/usr/lib/asd/dest/default
+.TP
+.F /usr/lib/asd/dest/*
+distribution lists
+.TP
+.F
+/usr/lib/asd/dest/default
+default distribution list
+.TP
+.BI /usr/spool/asd/ logname
+outgoing spool directories
+.SH SEE ALSO
+.IR mkpkg (8),
+.IR asd (8),
+.IR svcmgr (8)
+.SH BUGS
+The
+.B -f
+option, if given, must be the first option and
+must not be combined with any other.
diff --git a/static/v10/man8/showq.8 b/static/v10/man8/showq.8
new file mode 100644
index 00000000..cf46ea27
--- /dev/null
+++ b/static/v10/man8/showq.8
@@ -0,0 +1,56 @@
+.TH SHOWQ 8
+.CT 1 sa_nonmortals
+.SH NAME
+showq \- status of stream input/output system
+.SH SYNOPSIS
+.B /etc/showq
+[
+.B "-v -V -s -m
+]
+[
+.I system
+]
+[
+.I mem
+]
+.SH DESCRIPTION
+.I Showq
+reports connectivity and contents of I/O streams.
+By default, it lists the maximum number of stream blocks
+(of various sizes) ever used, then each stream and the queue modules
+in each stream, and then blocks that are unaccounted for (not on any
+queue or the free list).
+.PP
+By default, the system namelist is
+.B /unix
+and the place the streams are kept is
+.BR /dev/mem .
+.PP
+The options are:
+.TP
+.B -v
+Verbose.
+Show more, in particular the contents of data and control blocks on each queue.
+.TP
+.B -V
+Very verbose.
+Show all blocks on every queue instead of giving up after a while.
+.TP
+.B -s
+Silent.
+Examine queues for consistency, printing only a summary.
+.TP
+.B -m
+Missing.
+Show the contents of missing blocks.
+(Perhaps this will give a clue about who lost them.)
+.SH FILES
+.F /unix
+.br
+.F /dev/mem
+.SH SEE ALSO
+.IR stream (4),
+.IR netstat (8)
+.br
+.IR mesgld (4)
+for a list of message types
diff --git a/static/v10/man8/shutdown.8 b/static/v10/man8/shutdown.8
new file mode 100644
index 00000000..bfee17cb
--- /dev/null
+++ b/static/v10/man8/shutdown.8
@@ -0,0 +1,9 @@
+
+.TH SHUTDOWN 8
+.UC 4
+.SH NAME
+shutdown \- take system down gracefully
+.SH DESCRIPTION
+To be supplied.
+.SH "SEE ALSO"
+reboot(8)
diff --git a/static/v10/man8/smash.8 b/static/v10/man8/smash.8
new file mode 100644
index 00000000..5f076ad7
--- /dev/null
+++ b/static/v10/man8/smash.8
@@ -0,0 +1,43 @@
+.TH SMASH 8
+.CT 1 sa_nonmortals
+.SH NAME
+smash \- rewrite bad disk sectors
+.SH SYNOPSIS
+.B /etc/smash
+.I device sector
+.SH DESCRIPTION
+.I Smash
+attempts to read the named (decimal, 512-byte)
+.I sector
+from the named
+.IR device ,
+and prints the error status from the read
+and the data read,
+in octal,
+regardless of the error status.
+It then prompts
+.LR write? ,
+to which there are three answers:
+.TP
+.B y
+Write the data back to the sector.
+.TP
+.B c
+Write zeros to the sector.
+.TP
+anything else
+Quit.
+.PP
+After the sector is written,
+it is read again
+and the cycle repeats.
+.PP
+Writing the sector,
+even if its contents could be correctly read,
+will recompute the error correcting code.
+This may make soft ECC errors vanish,
+and will recover what can be recovered
+(sometimes not much)
+from hard ECC errors.
+.SH SEE ALSO
+.IR rarepl (8)
diff --git a/static/v10/man8/smstat.8 b/static/v10/man8/smstat.8
new file mode 100644
index 00000000..b4cce1ab
--- /dev/null
+++ b/static/v10/man8/smstat.8
@@ -0,0 +1,24 @@
+.TH SMSTAT 8
+.CT 1 comm_mach
+.SH NAME
+smstat \- list smtp queues
+.SH SYNOPSIS
+.B smstat
+.SH DESCRIPTION
+.I Smstat
+prints a summary of pending mail messages
+queued by
+the programs in
+.IR smtp (8).
+Each line contains the name of a spooling directory;
+the number of outbound messages,
+followed by
+.LR C ;
+and the number of inbound messages,
+followed by
+.LR X .
+.SH FILES
+.F /usr/spool/smtpq/*
+spool directories
+.SH SEE ALSO
+.IR smtp (8)
diff --git a/static/v10/man8/smtp.8 b/static/v10/man8/smtp.8
new file mode 100644
index 00000000..b6c6315d
--- /dev/null
+++ b/static/v10/man8/smtp.8
@@ -0,0 +1,200 @@
+.TH SMTP 8
+.CT 1 sa_auto
+.SH NAME
+smtp, smtpqer, smtpd, smtpsched \- handle simple mail transfer protocol
+.SH SYNOPSIS
+.B /usr/lib/upas/smtp
+[
+.I option ...
+]
+.I replyaddr
+.I dest
+.I recipient ...
+.PP
+.B /usr/lib/upas/smtpqer
+[
+.I option ...
+]
+.I replyaddr
+.I dest
+.I recipient ...
+.PP
+.B /usr/lib/upas/smtpd
+[
+.B -n
+] [
+.B -H
+.I host
+]
+.PP
+.B /usr/lib/upas/smtpsched
+[
+option ...
+] [
+.I queue ...
+]
+.SH DESCRIPTION
+.I Smtp
+reads a mail message from the standard input,
+and sends it with the Internet SMTP protocol
+to the named
+.I recipients
+at
+network address
+.IR dest .
+.I Dest
+has default network
+.B tcp
+and default
+service
+.B tcp.25
+(the conventional Internet SMTP port).
+Error reports are mailed to local address
+.IR replyaddr .
+.PP
+.I Smtp
+operates in two modes, `Internet' (default) and `Unix'.
+In Internet mode
+.I recipient
+addresses should be in full domain form.
+.L From:
+and
+.L Date:
+headers will be inserted as necessary
+to conform to Internet standards.
+In Unix mode
+addresses and message contents
+are not touched.
+The options are
+.TP
+.B -u
+Run in Unix mode.
+.TP
+.BI -H " host"
+Use
+.I host
+as the name of the sending system (taken from
+.IR whoami (5)
+by default).
+.TP
+.BI -d " domain
+Append the specified domain suffix to
+incomplete addresses.
+.PP
+.I Smtpqer
+reads a mail message from the standard input
+and stashes it away
+to be sent later
+by
+.IR smtpsched .
+By default,
+.I smtpsched
+is started immediately;
+option
+.B -n
+prevents this.
+Other options and arguments are the same as for
+.IR smtp .
+.PP
+.I Smtpd
+receives a message by
+speaking the server part of SMTP
+on the standard input and output.
+The message is stashed in a queue for later delivery
+as by
+.IR smtpqer .
+Option
+.B -n
+prevents
+.I smtpsched
+from running immediately;
+option
+.B -H
+is as for
+.I smtp.
+.PP
+.I Smtpsched
+processes the queues assembled by
+.I smtpqer
+and
+.IR smtpd ,
+calling
+.IR mail (1)
+for local messages and
+.I smtp
+for others.
+It should be run occasionally from
+.IR cron (8).
+.PP
+The
+.I queue
+arguments name particular queue directories to be processed;
+if no queue is named,
+all queues are processed.
+The options are
+.TF "-s\0nproc"
+.TP
+.BI -w " days"
+Send a warning about each message more than
+.I days
+old to the reply address.
+.TP
+.BI -r " days"
+Mail an error reply about each message more than
+.I days
+old,
+and discard the message.
+.TP
+.BI -s " nproc"
+Do not run more than
+.I nproc
+simultaneous copies of
+.I smtpsched
+started with this option.
+.TP
+.B -c
+Remove empty directories and inconsistent files.
+.TP
+.B -t
+Log actions without performing them.
+.TP
+.B -C
+Process `C' command files
+.RI ( smtp
+calls) only.
+.TP
+.B -X
+Process `X' command files
+.RI ( rmail
+calls) only.
+.TP
+.B -v
+Enable verbose logging.
+.PD
+.PP
+The queues are kept in subdirectories of
+.FR /usr/spool/smtpq ,
+named by splitting the lower case remote system name
+into components separated by
+periods,
+concatenating the last two or fewer components,
+taking the last 14 characters,
+and stripping leading periods.
+.SH FILES
+.TF /usr/spool/smtpq/smtpqsched.log
+.TP
+.B /usr/spool/smtpq
+spooling directory
+.TP
+.B /usr/spool/smtpq/smtpqsched.log
+logging
+.TP
+.B /usr/spool/smtpq/.consumers
+list of process IDs running
+.I smptqsched -s
+.SH SEE ALSO
+.IR mail (1),
+.IR upas (8),
+.IR smstat (8)
+.br
+DARPA standards RFC 822, RFC 976
diff --git a/static/v10/man8/sticky.8 b/static/v10/man8/sticky.8
new file mode 100644
index 00000000..e9d9e1a5
--- /dev/null
+++ b/static/v10/man8/sticky.8
@@ -0,0 +1,44 @@
+.TH STICKY 8
+.UC 4
+.SH NAME
+sticky \- executable files with persistent text
+.SH DESCRIPTION
+While the `sticky bit', mode 01000 (see
+.IR chmod (2)),
+is set on a sharable executable file,
+the text of that file will not be removed from the system swap area.
+Thus the file does not have to be fetched from the file system
+upon each execution.
+As long as a copy remains in the swap area, the
+original text cannot be overwritten in the file system,
+nor can the file be deleted.
+(Directory entries can be removed so long as one link remains.)
+.PP
+Sharable files are made by the
+.B \-n
+and
+.B \-z
+options of
+.IR ld (1).
+.PP
+To replace a sticky file that has been used do:
+(1) Clear the sticky bit with
+.IR chmod (1).
+(2) Execute the old program to flush the swapped copy.
+This can be done safely even if others are using it.
+(3) Overwrite the sticky file.
+If the file is being executed by any process,
+writing will be prevented; it suffices to simply remove the file
+and then rewrite it, being careful to reset the owner and mode with
+.I chmod
+and
+.IR chown (2).
+(4) Set the sticky bit again.
+.PP
+Only the super-user can set the sticky bit.
+.SH BUGS
+Are self-evident.
+.PP
+Is largely unnecessary on the VAX; matters only for large programs that
+will page heavily to start, since text pages are normally cached incore
+as long as possible after all instances of a text image exit.
diff --git a/static/v10/man8/su.8 b/static/v10/man8/su.8
new file mode 100644
index 00000000..99721bb9
--- /dev/null
+++ b/static/v10/man8/su.8
@@ -0,0 +1,34 @@
+.pa 1
+.he 'SU (VIII)'1/20/73'SU (VIII)'
+.ti 0
+NAME su -- become privileged user
+.sp
+.ti 0
+SYNOPSIS su__
+.sp
+.ti 0
+DESCRIPTION su
+allows one to become the super-user, who has
+all sorts of marvelous (and correspondingly dangerous) powers.
+In order for su to do its magic, the user must
+supply a password.
+If the password is correct, su
+will execute the shell with the UID set to
+that of the super-user.
+To restore normal UID privileges,
+type an end-of-file to the super-user shell.
+
+To remind the super-user of his responsibilities,
+the shell substitutes "#" for its usual prompt "%".
+.sp
+.ti 0
+FILES --
+.sp
+.ti 0
+SEE ALSO sh(I)
+.sp
+.ti 0
+DIAGNOSTICS "Sorry" if password is wrong
+.sp
+.ti 0
+BUGS --
diff --git a/static/v10/man8/svcmgr.8 b/static/v10/man8/svcmgr.8
new file mode 100644
index 00000000..2b9ab3a8
--- /dev/null
+++ b/static/v10/man8/svcmgr.8
@@ -0,0 +1,331 @@
+.TH SVCMGR 8
+.CT 1 sa_auto
+.SH NAME
+svcmgr \- service remote computing requests
+.SH SYNOPSIS
+.B /usr/ipc/mgrs/svcmgr
+[
+.B -d
+]
+.SH DESCRIPTION
+.I Svcmgr
+performes services
+such as login and command execution,
+often in response to requests from network listeners
+like
+.IR dkmgr
+and
+.IR tcpmgr (8).
+It should be run once from
+.IR rc (8).
+.PP
+.I Svcmgr
+is controlled by several files in directory
+.FR /usr/ipc/lib :
+services are defined in files
+.B serv
+and
+.BR serv.local ,
+authorization in
+.B auth
+and
+.BR auth.local .
+The
+.B .local
+files are searched first.
+The idea is that
+.B serv
+and
+.B auth
+will be the same throughout an administrative cluster of machines,
+and anything peculiar to specific systems
+will be kept in
+.B serv.local
+and
+.BR auth.local .
+.PP
+Each service is announced
+as a name in directory
+.F /cs
+using the routines in
+.IR ipc (3).
+When a connection is requested to one of these services,
+.I svcmgr
+receives a file descriptor
+connected to the requester.
+A new process is created
+to perform the actions listed for that service
+in the
+.I serv
+files,
+usually resulting in a
+.IR login (8)
+with standard input, output, and error files
+attached to the connection.
+Often
+there are flags to
+.I login
+specifying a local user name
+or a command to be executed.
+Environment variable
+.SM CSOURCE
+is set to a string
+of the form
+.IP
+.BI source= remote-machine
+.BI user= ruser
+.BI line= lineinfo
+.PP
+.I Remote-machine
+and
+.I ruser
+are supplied in the connection message;
+.I lineinfo
+network-dependent stuff
+of varying interest and meaning.
+If a particular command was specified
+(the
+.B cmd
+or
+.B exec
+action),
+.I login
+sets
+environment variable
+.SM REXEC
+to
+.LR 1 .
+.PP
+The
+.I auth
+files are used to translate remote user names to local ones.
+They contain lines with four fields:
+.RS
+service name
+.br
+calling system name
+.br
+calling user name
+.br
+local user name
+.RE
+.LP
+The service, calling system, and calling user names
+are regular expressions
+in the style of
+.IR regexp (3).
+The calling system and calling user fields may be omitted;
+.L .*
+is assumed.
+The local user name
+is a literal name,
+.L &
+to repeat the calling user name provided in the request,
+or
+.L :
+to explicitly reject a call.
+If the local user name is omitted,
+.L &
+is assumed.
+.PP
+Several service actions `look up the connection in the
+.I auth
+files.'\0
+This means to
+find the first line in
+.B auth.local
+or
+.B auth
+for which the service,
+calling system,
+and calling user
+match the patterns,
+and return the local user name in that line
+(the same as the calling user if
+.LR & ).
+If no matching line is found,
+or if the first match has local user name
+.LR : ,
+the lookup fails.
+.PP
+The
+.I serv
+files contain lines with three fields:
+.RS
+service name
+.br
+a list of actions,
+separated by
+.L +
+.br
+the calling system name
+.RE
+.PP
+The calling system name is a regular expression as in
+the
+.I auth
+file.
+The line matching an incoming call is the first whose service
+matches the requested service and whose regular expression
+matches the calling machine.
+.PP
+The possible actions are:
+.de XP
+.TP
+.ie '\\$2'' .L "\\$1"
+.el .L "\\$1(\f2\\$2\fP)"
+..
+.TF password
+.PD
+.XP user x
+Use local username
+.IR x .
+.XP auth
+Look up the connection
+in the
+.I auth
+files.
+If a match is found,
+use the resulting local user.
+Otherwise reject the call.
+.XP v9auth
+Look up the connection
+in the
+.I auth
+files;
+if a match is found,
+send
+.L OK
+to the caller,
+and use the result.
+If there is no match, send
+.LR NO ,
+and read a string of the form `login,passwd\\n'.
+If the login and password
+describe a valid local user,
+send
+.L OK
+and use that user;
+otherwise send
+.L NO
+and try again
+(until the caller gives up).
+This is the authentication protocol used by
+.IR ipclogin
+(see
+.IR ipc (3)),
+hence by
+.IR con (1),
+.IR push (1),
+and
+.IR pull.
+.XP inauth
+Read two null-terminated strings
+from the caller.
+If they aren't the same,
+reject the call.
+Otherwise look up the service,
+calling system,
+and the null-terminated string
+(as a user name)
+in the
+.I auth
+files,
+use the resulting local user if there's a match,
+reject the call otherwise.
+This is the authentication protocol used by
+.IR ipcrogin,
+hence by
+.IR rsh
+and
+.IR rlogin ;
+see
+.IR ipc (3)
+and
+.IR con (1).
+.XP ttyld
+Push the terminal line discipline
+.IR ttyld (4)
+onto the connection.
+.XP mesgld
+Push the reverse message line discipline
+(see
+.IR mesgld (4))
+onto the connection.
+.XP term
+Read a null-terminated string from the caller,
+and set environment variable
+.SM TERM
+to the result.
+.XP args
+Read a null-terminated string from the caller,
+and save the result as arguments to a possible command.
+.XP s5parms
+Extract arguments from the destination address
+in a way compatible with the
+DKHOST network software
+used by System V Datakit implementations,
+and save for later use.
+.XP cmd x
+Execute shell command
+.IR x ,
+with any saved arguments,
+and with the connection as standard input, output, and error.
+.XP login
+Provide a login session with the connection as standard input, output, and error.
+.XP password
+Provide a login session,
+but ignore any local user name;
+always demand a login and password.
+.XP exec
+Use any saved arguments
+as a shell command to be executed.
+.XP gateout gateway
+Call network address
+.IR gateway
+and send the connection info there,
+If all is well,
+pass the new connection's file descriptor
+to the original caller:
+the result is a connection through the gateway.
+.I Gateway
+should be a
+.I svcmgr
+service,
+perhaps on some other machine,
+with action
+.BR gateway .
+.XP gateway localout
+The intended target for
+.BR gateout :
+read new connection info from the connection,
+and place a call to the new destination;
+if it succeeds,
+loop passing data between the new connection and the original one.
+.PP
+If the file
+.F /usr/ipc/log/svc
+can be opened,
+.I svcmgr
+prints miscellaneous chatter there,
+including a record of each service request.
+The
+.B -d
+(debug)
+option increases the chatter.
+...SH EXAMPLES
+...to be supplied
+.SH FILES
+.nf
+.F /usr/ipc/lib/serv
+.F /usr/ipc/lib/serv.local
+.F /usr/ipc/lib/auth
+.F /usr/ipc/lib/auth.local
+.F /usr/ipc/log/svc
+.fi
+.SH "SEE ALSO"
+.IR con (1),
+.IR ipc (3),
+.IR dkmgr (8),
+.IR tcpmgr (8),
+.IR ipc (3)
diff --git a/static/v10/man8/swapon.8 b/static/v10/man8/swapon.8
new file mode 100644
index 00000000..7193e909
--- /dev/null
+++ b/static/v10/man8/swapon.8
@@ -0,0 +1,37 @@
+.TH SWAPON 8
+.CT 1 sa_auto
+.SH NAME
+swapon \- specify swapping device
+.SH SYNOPSIS
+.B "/etc/swapon"
+.B -a
+.br
+.B "/etc/swapon"
+.I name ...
+.SH DESCRIPTION
+.I Swapon
+specifies additional devices on which paging and swapping
+are to take place.
+The system begins by using a single device;
+.I swapon
+must be used to enable others.
+.PP
+Usually there is a call to
+.L "swapon -a"
+in
+.IR rc (8).
+Specific swap devices may be nominated with the second form.
+.SH SEE ALSO
+.IR rc (8),
+.I vswapon
+in
+.IR deprecated (2)
+.SH BUGS
+There is no way to stop paging and swapping on a device.
+It is therefore not possible to make use of devices which may be
+dismounted during system operation.
+.br
+Possible swap devices
+must be listed in a table configured into the system;
+.I swapon
+can only enable devices in the table.
diff --git a/static/v10/man8/swtmp.8 b/static/v10/man8/swtmp.8
new file mode 100644
index 00000000..e19ed31c
--- /dev/null
+++ b/static/v10/man8/swtmp.8
@@ -0,0 +1,24 @@
+.pa 1
+.he 'SWTMP (VIII)'2/11/73'SWTMP (VIII)'
+.ti 0
+NAME swtmp -- update accounting file
+.sp
+.ti 0
+SYNOPSIS swtmp_____
+.sp
+.ti 0
+DESCRIPTION This
+shell sequence concatenates /tmp/wtmp onto /usr/adm/wtmp
+and truncates /tmp/wtmp.
+It should be used before
+using acct(VIII)
+and every so often in any case if accounting
+is to be maintained.
+.sp
+.ti 0
+FILES /tmp/wtmp,
+/usr/adm/wtmp
+.sp
+.ti 0
+SEE ALSO acct(VIII),
+wtmp(V)
diff --git a/static/v10/man8/symorder.8 b/static/v10/man8/symorder.8
new file mode 100644
index 00000000..9d2668dc
--- /dev/null
+++ b/static/v10/man8/symorder.8
@@ -0,0 +1,23 @@
+.TH SYMORDER 8
+.UC
+.SH NAME
+symorder \- rearrange name list
+.SH SYNOPSIS
+.B symorder
+orderlist symbolfile
+.SH DESCRIPTION
+.I Orderlist
+is a file containing symbols to be found in symbolfile,
+1 symbol per line.
+.PP
+.I Symbolfile
+is updated in place to put the requested symbols first
+in the symbol table, in the order specified. This is done
+by swapping the old symbols in the required spots with the
+new ones. If all of the order symbols are not found, an
+error is generated.
+.PP
+This program was specifically designed to cut down on the
+overhead of getting symbols from /vmunix.
+.SH "SEE ALSO"
+nlist(3)
diff --git a/static/v10/man8/sync.8 b/static/v10/man8/sync.8
new file mode 100644
index 00000000..d95c8ad8
--- /dev/null
+++ b/static/v10/man8/sync.8
@@ -0,0 +1,18 @@
+.th SYNC VIII 11/1/73
+.sh NAME
+sync \*- update the super block
+.sh SYNOPSIS
+.bd sync
+.sh DESCRIPTION
+.it Sync
+executes the
+.it sync
+system primitive.
+If the system is to be stopped,
+.it sync
+must be called to insure
+file system integrity.
+See sync(II) for details.
+.sh "SEE ALSO"
+sync(II)
+.sh BUGS
diff --git a/static/v10/man8/syslog.8 b/static/v10/man8/syslog.8
new file mode 100644
index 00000000..da1f5040
--- /dev/null
+++ b/static/v10/man8/syslog.8
@@ -0,0 +1,172 @@
+.TH SYSLOG 8
+.CT 1 sa_nonmortals
+.SH NAME
+syslog, logpr \- system security logging
+.SH SYNOPSIS
+.B priv syslog
+.I command
+[
+.I arg2
+[
+.I arg3
+]
+]
+.PP
+.B /etc/logpr
+.I file
+[
+.I offset
+]
+.SH DESCRIPTION
+.I Syslog
+controls the mandatory logging scheme.
+License
+.B T_LOG
+is required.
+The variety of different commands and command formats
+reflects the full complexity of the
+protean
+.IR syslog (2)
+system call.
+In the usages given below a
+.I mask
+argument is a combination of letters
+.BR NILESDATUPX ,
+meaning:
+.TP
+.PD0
+.B N
+Record all uses of file names.
+.TP
+.B S
+Record all seek calls.
+.TP
+.B U
+Record all writes to the `u area'.
+.TP
+.B I
+Record all accesses of inode contents.
+.TP
+.B D
+Record possession and use of file descriptors.
+.TP
+.B P
+Record process history:
+.IR exec (2),
+.IR fork (2),
+.IR kill (2),
+.IR exit (2).
+.TP
+.B L
+Record all explicit changes of labels by
+.IR setflab
+(see
+.IR getflab (2))
+and
+.IR setplab
+(see
+.IR getplab (2)).
+.TP
+.B A
+Record all changes of labels.
+.TP
+.B X
+Record all uses of privilege.
+.TP
+.B E
+Record all
+.B ELAB
+error returns.
+.TP
+.B T
+Record all uses of a traced file or process.
+.PD
+.PP
+Valid arguments to
+.I syslog
+are:
+.TP
+.BI "on " file " " logdev
+Nominate
+.I file
+as repository for user generated
+logging records written to logging special file
+.IR logdev .
+.I File
+must be a full path name, and must be openable for writing.
+If
+.IR logdev 's
+minor device number is zero,
+.I file
+will also receive mandatory (kernel generated) logging records.
+.I Logdev
+may be a full path name or a minor device number.
+.PD0
+.TP
+.BI "off " logdev
+Cancel the effect of an
+.B on
+command.
+.TP
+.BI "get " n
+Print the value of the
+.IR n -th
+log mask.
+Values of
+.I n
+are 0, 1, 2, or 3
+for the `poison' masks; 4 is `global' mask.
+.TP
+.BI "set " n " " mask
+Set the value of the
+.IR n -th
+log mask.
+.TP
+.BI "fget " file
+Print the poison level of
+.IR file ,
+one of the integers 0, 1, 2, or 3.
+.I File
+must be the full path name of a readable file.
+.TP
+.BI "fset " file " " n
+Set the poison level of
+.I file
+to
+.IR n .
+.I File
+must be the full path name of a readable file.
+.TP
+.BI "pget " pid
+Print the logging mask of process
+.IR pid .
+.TP
+.BI "pset " pid " " mask
+Set the logging mask of process
+.I pid
+to
+.IR mask .
+.PD
+.PP
+.I Logpr
+converts to cryptic
+.SM ASCII
+the cryptic binary format of a log file described in
+.IR log (5).
+The optional numerical byte offset tells where in the file printing
+is to start.
+.SH FILES
+.TF /dev/log/log00
+.TP
+.F /dev/log/log00
+where
+.I syslog
+makes voluntary entries
+.SH "SEE ALSO"
+.IR syslog (2),
+.IR log (4),
+.IR log (5).
+.SH DIAGNOSTICS
+`Covert channel warning': the log file has
+a label that is neither top nor flagged
+.BR L_NO .
diff --git a/static/v10/man8/tcpmgr.8 b/static/v10/man8/tcpmgr.8
new file mode 100644
index 00000000..ce77d7be
--- /dev/null
+++ b/static/v10/man8/tcpmgr.8
@@ -0,0 +1,73 @@
+.TH TCPMGR 8
+.CT 1 sa_auto
+.SH NAME
+tcpmgr \- accept and place calls via the TCP protocol
+.SH SYNOPSIS
+.B /usr/ipc/mgrs/tcpmgr
+[
+.BI -m " outnet"
+]
+.SH DESCRIPTION
+.I Tcpmgr
+receives and places TCP calls on an Internet TCP/IP network.
+Outbound TCP calls may be placed by calling
+.I ipcopen
+with network name
+.B tcp
+(see
+.IR ipc (3)).
+Inbound calls to TCP port
+.I n
+are handed to the local service
+listed for that port in
+.FR /usr/ipc/lib/inservices ,
+or to service
+.BI tcp. n
+if there is no listing.
+.PP
+Option
+.B -m
+tells
+.I tcpmgr
+to claim to place outbound calls for network
+.I outnet
+rather than
+.BR tcp .
+.PP
+The TCP protocol runs atop one or more IP networks.
+.I Tcpmgr
+arranges to receive all inbound TCP calls on all active IP networks,
+but other arrangements
+must be used to activate the IP networks themselves;
+see
+.IR ipconfig (8).
+.PP
+.I Tcpmgr
+records its activity
+in file
+.I outnet
+in directory
+.BR /usr/ipc/log ,
+default
+.BR /usr/ipc/log/tcp .
+.PP
+This command is usually run once from
+.IR rc (8).
+.SH FILES
+.TP 2i
+.PD 0
+.F /usr/ipc/log/tcp
+.TP
+.FR /dev/tcp*
+TCP network devices
+.TP
+.F /dev/iptcp
+IP channel for the TCP protocol
+.TP
+.F /usr/ipc/lib/inservices
+mapping between service name and port number
+.SH "SEE ALSO"
+.IR con (1),
+.IR ipconfig (8),
+.IR svcmgr (8),
+.IR ipc (3)
diff --git a/static/v10/man8/tm.8 b/static/v10/man8/tm.8
new file mode 100644
index 00000000..4240c173
--- /dev/null
+++ b/static/v10/man8/tm.8
@@ -0,0 +1,48 @@
+.pa 1
+.he 'TM (VIII)'3/15/72'TM (VIII)'
+.ti 0
+NAME tm -- provide time information
+.sp
+.ti 0
+SYNOPSIS tm__
+.sp
+.ti 0
+DESCRIPTION tm__
+is used to provide timing information.
+Output like the following
+is given:
+.sp
+.in +5
+ tim 371:51:09 2:00.8
+ ovh 20:00:33 17.0
+ swp 13:43:20 4.6
+ dsk 27:14:35 4.5
+ idl 533:08:03 1:33.3
+ usr 24:53:50 1.2
+ der 0, 54 0, 0
+.sp
+.in -5
+The first column of numbers gives totals in the named categories
+since the last time the system was cold-booted; the second
+column gives the changes since the last time tm__ was invoked.
+The top left number is badly truncated and should be ignored.
+ovh___ is time spent
+executing in the system;
+swp___ is time waiting for swap I/O;
+dsk___ is time spent waiting for
+file system disk I/O; idl___ is idle time; usr___ is user execution
+time; der___ is RF disk error count (left number) and RK disk error
+count (right number).
+
+.ti 0
+FILES /dev/rf0 (for absolute times);
+/tmp/ttmp for differential timing history.
+.sp
+.ti 0
+SEE ALSO time(I), file system(V)
+.sp
+.ti 0
+DIAGNOSTICS --
+.sp
+.ti 0
+BUGS --
diff --git a/static/v10/man8/tp.8 b/static/v10/man8/tp.8
new file mode 100644
index 00000000..7e27f382
--- /dev/null
+++ b/static/v10/man8/tp.8
@@ -0,0 +1,175 @@
+.TH TP 8
+.SH NAME
+tp \- manipulate tape archive
+.SH SYNOPSIS
+.B tp
+[ key ] [ name ... ]
+.SH DESCRIPTION
+.PP
+.I Tp
+saves and restores files
+on DECtape or magtape.
+Its actions are controlled by the
+.I key
+argument.
+The key is a string of characters containing
+at most one function letter and possibly
+one or more function modifiers.
+Other arguments to the command are file or directory
+names specifying which files are to be dumped, restored,
+or listed.
+In all cases, appearance of a directory name refers to
+the files and (recursively) subdirectories of that directory.
+.PP
+The function portion of
+the key is specified by one of the following letters:
+.TP 8
+.B r
+The named files
+are written
+on the tape.
+If files with the same names
+already exist, they are replaced.
+`Same' is determined by string comparison, so
+`./abc' can never be the same as `/usr/dmr/abc' even
+if `/usr/dmr' is the current directory.
+If no file argument is given, `\fB.\fR' is the default.
+.TP 8
+.B u
+updates the tape.
+.B u
+is like
+.B r,
+but a file is replaced only if its
+modification date is later than the date stored on the tape;
+that is to say, if it has changed since it was dumped.
+.B u
+is the default command if none is given.
+.TP 8
+.B d
+deletes the named files from
+the tape.
+At least one name argument must be given.
+This function is not permitted on magtapes.
+.TP 8
+.B x
+extracts the named files from the tape to the file system.
+The owner and mode are restored.
+If no file argument is given, the entire contents of the
+tape are extracted.
+.TP 8
+.B t
+lists the names of the specified files.
+If no file argument is given,
+the entire contents of the tape is listed.
+.PP
+The following characters may be used in addition to the letter
+which selects the function desired.
+.TP 10
+.B m
+Specifies magtape as opposed to DECtape.
+.TP 10
+.B 0,...,7
+This
+modifier selects the drive on which the tape is mounted.
+For DECtape,
+.B x
+is default; for magtape
+`0' is the default.
+.TP 10
+.B v
+Normally
+.I tp
+does its work silently.
+The
+.B v
+(verbose)
+option causes it to type the name of each file it treats
+preceded by the function letter.
+With the
+.B t
+function,
+.B v
+gives more information about the
+tape entries than just the name.
+.TP 10
+.B c
+means a fresh dump is being created; the tape directory
+is cleared before beginning.
+Usable only with
+.B r
+and
+.B u.
+This option is assumed with magtape since
+it is impossible to selectively overwrite
+magtape.
+.TP 10
+.B i
+Errors reading and writing the
+tape are noted, but no action is taken.
+Normally, errors cause a return to the command level.
+.TP 10
+.B f
+Use the first named file, rather than a tape,
+as the archive.
+This option currently acts like
+.BR m ;
+.I i.e.
+.BR r
+implies
+.BR c ,
+and neither
+.BR d
+nor
+.BR u
+are permitted.
+.TP 10
+.B w
+causes
+.I tp
+to pause before treating each file, type
+the indicative letter and the file name (as with
+.BR v )
+and await the user's response.
+Response
+.B y
+means `yes', so the file is treated.
+Null response
+means `no', and the file does not take part
+in whatever is being done.
+Response
+.B x
+means `exit';
+the
+.I tp
+command terminates immediately.
+In the
+.B x
+function,
+files previously asked about
+have been extracted already.
+With
+.B "r, u,"
+and
+.B d
+no change has been made to the tape.
+.PP
+.SH FILES
+/dev/tap?
+.br
+/dev/rmt?
+.SH SEE ALSO
+ar(1), tar(1)
+.SH DIAGNOSTICS
+Several; the non-obvious one is
+`Phase error', which means the file changed after it was selected for
+dumping but before it was dumped.
+.SH BUGS
+A single file with several links to it is treated like several files.
+.PP
+Binary-coded control information makes
+magnetic tapes written by
+.I tp
+difficult to carry to other machines;
+.IR tar (1)
+avoids the problem.
diff --git a/static/v10/man8/umount.8 b/static/v10/man8/umount.8
new file mode 100644
index 00000000..a69a5b8d
--- /dev/null
+++ b/static/v10/man8/umount.8
@@ -0,0 +1,31 @@
+.pa 1
+.he 'UMOUNT (VIII)'1/20/73'UMOUNT (VIII)'
+.ti 0
+NAME umount -- dismount file system
+.sp
+.ti 0
+SYNOPSIS /etc/umount___________ special
+.sp
+.ti 0
+DESCRIPTION umount______
+announces to the system that the removable file system previously
+mounted on special file special_______ is to be removed.
+
+The user must take care not
+only that all I/O activity on the file system has ceased,
+but that no one has his current directory on it.
+
+Only the super-user may issue this command.
+.sp
+.ti 0
+FILES --
+.sp
+.ti 0
+SEE ALSO mount(VIII)
+.sp
+.ti 0
+DIAGNOSTICS "?"
+.sp
+.ti 0
+BUGS This
+command is not, in fact, restricted to the super-user.
diff --git a/static/v10/man8/unspk.8 b/static/v10/man8/unspk.8
new file mode 100644
index 00000000..af99d8c1
--- /dev/null
+++ b/static/v10/man8/unspk.8
@@ -0,0 +1,43 @@
+.pa 1
+.he 'UNSPK (VIII)'4/13/73'UNSPK (VIII)'
+.ti 0
+NAME unspk -- decode voice synthesizer text
+.sp
+.ti 0
+SYNOPSIS unspk_____ [ -_ ] [ input [ output ] ]
+.sp
+.ti 0
+DESCRIPTION unspk_____
+is inverse to
+.ul
+speak.
+It translates coded voice synthesizer input, as created by
+.ul
+speak,
+into phonetic strings
+of the sort accepted by
+.ul
+speak.
+Standard output or input is assumed when one or the other
+is unspecified.
+.sp
+The -_ option produces output in a different phonetic code
+for another vocal tract synthesizer [C. H. Coker,
+Speech synthesis by modelling the human articulatory
+system, MM69-1232-29].
+.sp
+unspk_____ lives in /crp/vs
+.sp
+.ti 0
+FILES --
+.sp
+.ti 0
+SEE ALSO speak(I), vsp(VII)
+.sp
+.ti 0
+DIAGNOSTICS "Input file." -- can't open it
+.br
+"Output file." -- can't create it
+.sp
+.ti 0
+BUGS --
diff --git a/static/v10/man8/upas.8 b/static/v10/man8/upas.8
new file mode 100644
index 00000000..8cf496bd
--- /dev/null
+++ b/static/v10/man8/upas.8
@@ -0,0 +1,275 @@
+.TH UPAS 8
+.CT 1 sa_auto sa_mortals
+.SH NAME
+upas, rmail, translate \- mail delivery system
+.SH SYNOPSIS
+.B rmail
+.I person ...
+.PP
+.B /usr/lib/upas/translate
+.I name
+.PP
+.B /usr/lib/upas/auth
+.I sender
+.I receiver
+.SH DESCRIPTION
+Users send mail by
+.IR mail (1).
+Remote machines use
+.I rmail.
+Both call on
+.I upas
+programs.
+.PP
+Mail addresses are interpreted
+according to rewrite rules as
+described below.
+When the addresses for a
+.I mail
+or
+.I rmail
+command have been interpreted, they are bundled by
+network and passed to network-specific handlers,
+such as
+.IR route.inet .
+.PP
+.I Translate
+looks up a mail
+.I name
+in an alias list (see
+.IR mail (6))
+and places the result on standard output.
+.PP
+.I Auth
+is called by
+.I upas
+to authorize mail delivery for each
+.I sender, receiver
+pair.
+The mail is accepted if
+the previous hop was a trusted gateway machine in
+.FR /usr/lib/upas/gateways ,
+or all the machines in the source or destination path are in
+.FR /usr/lib/upas/attlist .
+.SS Rewrite rules
+Each line of the file
+.F /usr/lib/upas/rewrite
+is a rule.
+Blank lines and lines beginning with
+.B #
+are ignored.
+.PP
+Each rewriting rule consists of (up to) 4 strings:
+.TP
+.I pattern
+A regular expression in the style of
+.IR regexp (3).
+The
+.I pattern
+is applied to mail destination addresses.
+The pattern match is case-insensitive
+and must match the entire address.
+.TP
+.I type
+The type of rule; see below.
+.TP
+.I arg1
+An
+.IR ed (1)
+style replacement string, with
+.BI \e n
+standing for the text matched by the
+.IR n th
+parenthesized subpattern.
+.TP
+.I arg2
+Another
+.IR ed (1)
+style replacement string.
+.PP
+In each of these fields the substring
+.L \es
+is replaced by the login id of the
+sender and the substring
+.L \el
+is replaced by the name of the local machine.
+.PP
+When delivering a message,
+.I mail
+starts with the first rule and continues down the list until a pattern
+matches the destination address.
+It then performs one of the following actions depending on rule type:
+.PD 0
+.TP
+.B >>
+Append the mail to the file indicated by expanding
+.IR arg1 ,
+provided that file appears to be a valid mailbox.
+.TP
+.B |
+Pipe the mail through the command formed from concatenating the
+expanded
+.I arg1
+and
+.I arg2.
+.TP
+.B alias
+Replace the address by the address(es) specified
+by expanding
+.I arg1
+and recur.
+.TP
+.B translate
+Replace the address by the address(es) output by the
+command formed by expanding
+.I arg1
+and recur.
+.TP
+.B auth
+Call the program in expanded
+.I arg1
+and authorize(reject) the mail if it returns a zero(non-zero) return code.
+.PD
+.PP
+.I Mail
+expands the addresses recursively until each address has matched a
+.L >>
+or
+.L |
+rule or until the recursion depth indicates a rewriting loop
+(currently 32).
+.PP
+An
+.L auth
+operator is only applied once per address.
+If no
+.L auth
+rule is encountered, the mail is accepted.
+.PP
+If several addresses match
+.L |
+rules and result in the same
+expanded
+.IR arg1 ,
+the message is delivered to all those addresses
+by a single command,
+composed by concatenating the common
+expanded
+.I arg1
+and each expanded
+.IR arg2 .
+This is meant to make less work of
+a message to several recipients on the same machine.
+For example, the rule
+.IP
+.L
+([^!]+)!(.+) | "uux - -a \\s \\1!rmail" \\2
+.LP
+causes
+.L mail r70!pjw r70!ken
+to generate the single delivery command
+.LR "uux -a rob r70!rmail pjw ken" .
+.SH EXAMPLES
+A sample rewrite file:
+.PP
+.EX
+.ta \w'([^!]+)[%@]([^!@%]+) 'u +\w'alias 'u
+# local mail
+[^!@%]+ translate "exec translate '&'"
+local!([^!@%]+) >> /usr/spool/mail/\e1
+\el!(.+) alias \e1
+.EE
+.PP
+.EX
+# convert %@ format to ! format
+(_822_)!((.+)!)?([^!]+)[%@]([^!%@]+) \e
+ alias \e1!\e2\e5!\e4
+([^!]+)[%@]([^!@%]+) alias _822_!\e2!\e1
+_822_!(.+) alias \e1
+.EE
+.PP
+.EX
+# special domains
+[^!]+wisc\e.edu!.+ alias xunet!&
+.EE
+.PP
+.EX
+# network gateways
+(csnet|bitnet)!(.+) alias inet!&
+acsnet!.+
+.EE
+.PP
+.EX
+# real networks
+inet!([^!]+)!(.+) | "/usr/lib/upas/route.inet '\es' '\e1'" "'\e2'"
+([^!]+)!(.+) | "/usr/lib/upas/route '\es' '\e1'" "'\e2'"
+.EE
+.PP
+.EX# anything else goes to research
+.* alias research!&
+.EE
+.SH FILES
+.TF /n/bowell/usr/lib/upas/mkfile
+.TP
+.F /usr/lib/upas/namefiles
+list of files to search
+.TP
+.F $HOME/lib/names
+private aliases
+.TP
+.F /usr/lib/upas/rewrite
+rewriting rules
+.TP
+.F /usr/lib/upas/attlist
+known AT&T machines
+.TP
+.F /usr/lib/upas/gateways
+machines that check mail authorization reliably
+.TP
+.F /usr/lib/upas/translate
+alias lookup
+.TP
+.F /usr/lib/upas/route.*
+mail interfaces to specific networks
+.TP
+.F /usr/lib/upas/route
+interface to local (i.e. AT&T) Datakit network
+.TP
+.F /bin/mail
+shell file that calls the mailer
+.TP
+.F /usr/lib/upas/send
+actually delivery program
+.TP
+.F /bin/rmail
+linked to /usr/lib/upas/send
+.TP
+.F /usr/spool/mail/*
+mailboxes
+.TP
+.F /usr/spool/mail/mail.log*
+delivery logs
+.TP
+.F /n/bowell/usr/lib/upas/mkfile
+updates various mail and uucp files
+.TP
+.F /etc/passwd
+authentication
+.TP
+.F /tmp/ma*
+temp file
+.TP
+.F /tmp/ml*
+lock file
+.TP
+.F $HOME/dead.letter
+unmailable text
+.SH "SEE ALSO"
+.IR uucp (1),
+.IR mail (1),
+.IR mail (6),
+.IR smtp (8)
+.br
+D. L. Presotto and W. R. Cheswick,
+`Upas\(ema simpler approach to network mail',
+this manual, Volume\ 2
diff --git a/static/v10/man8/update.8 b/static/v10/man8/update.8
new file mode 100644
index 00000000..a670606c
--- /dev/null
+++ b/static/v10/man8/update.8
@@ -0,0 +1,25 @@
+.th UPDATE VIII 11/1/73
+.sh NAME
+update \*- periodically update the super block
+.sh SYNOPSIS
+.bd update
+.sh DESCRIPTION
+.it Update
+is a program that executes
+the
+.it sync
+primitive every 30 seconds.
+This insures that the file system
+is fairly up to date in case of a crash.
+This command should not be executed directly,
+but should be executed out of the
+initialization shell command file.
+See sync(II) for details.
+.sh "SEE ALSO"
+sync(II), init(VII)
+.sh BUGS
+There is a system bug which, it is suspected,
+may be aggravated by this program.
+Until further notice,
+.it update
+should not be run.
diff --git a/static/v10/man8/uucico.8 b/static/v10/man8/uucico.8
new file mode 100644
index 00000000..ba88daa7
--- /dev/null
+++ b/static/v10/man8/uucico.8
@@ -0,0 +1,205 @@
+.TH UUCICO 8
+.CT 1 sa_auto
+.SH NAME
+uucico, uusched, uuxqt, kick, debug \- uucp file transport and execution
+.SH SYNOPSIS
+.B /usr/lib/uucp/uucico
+[
+.B -r1
+.B -s
+.I system
+]
+[
+.B -x
+.I debug
+]
+[
+.B -d
+.I spool_directory
+]
+.PP
+.B /usr/lib/uucp/uusched
+[
+.B -x
+.I debug
+]
+[
+.B -u
+.I debug
+]
+.PP
+.B /usr/lib/uucp/kick
+.I system
+.PP
+.B /usr/lib/uucp/debug
+.I system
+.PP
+.B /usr/lib/uucp/uuxqt
+[
+.B -s
+.I system
+]
+[
+.B -x
+.I debug
+]
+.SH DESCRIPTION
+.I Uucico
+transfers files between systems
+for
+.IR uucp (1).
+It is normally invoked by
+.I login
+for
+an incoming connection
+(a slave),
+or by
+.IR uusched
+to call out to another system
+(a master).
+The options are
+.TP \w'\f5-s\ \fIsystem\ 'u
+.B -r1
+This is a master;
+option
+.B -s
+is required.
+In the absence of
+.B -r1
+the process is a slave and expects to speak to a master on
+standard input and standard output.
+.TP \w'\f5-s\ \fIsystem\ 'u
+.BI -s " system
+Call the named
+.I system.
+.TP
+.BI -x " debug
+Turn on debugging output;
+.I debug
+is a single digit, larger for more output.
+.ig
+.PP
+For example,
+the shell
+.I Uutry
+starts
+.I uucico
+with debugging turned on.
+..
+.PP
+.I Uusched
+invokes
+.I uucico
+for each system
+with work pending.
+It is called by
+.IR uucp
+and
+.IR uux (1)
+after work is queued,
+and should be invoked regularly by
+.IR cron (8).
+The options are
+.TP \w'\f5-s\ \fIsystem\ 'u
+.BI -x " debug
+As for
+.I uucico.
+.TP
+.BI -u " debug
+Invoke
+.I uucico
+with option
+.B -x
+.I debug.
+.PP
+.I Kick
+invokes
+.I uucico
+in the background
+to call out to the specified
+.IR system .
+.I Debug
+causes a call with
+a moderate amount
+of debugging output
+.RB ( -x4 ).
+Both attempt to remove
+existing system status information
+for
+.IR system ,
+so that a call will be attempted
+regardless of recent failures.
+.PP
+.I Uuxqt
+executes commands requested remotely by
+.IR uux (1).
+It searches the
+.I uucp
+spool directories looking for
+filenames starting with
+.BR X. ,
+checks the
+.I Permissions
+file to see that all required data files are available
+and accessible
+and that the requested command is permitted for the
+requesting system,
+and invokes the command if all is well.
+.PP
+Before a command is invoked,
+the file creation mask
+.RI ( umask (2))
+is set to 0 and these
+environment variables are set:
+.TF UU_MACHINE
+.TP
+.B UU_MACHINE
+the name of the last sending machine
+.TP
+.B UU_USER
+the user that sent the job
+.TP
+.B PATH
+set to
+.LR /bin:/usr/bin
+.TP
+.B USER
+set to
+.L uucp
+.PD
+.SH FILES
+.TF /usr/lib/uucp/Maxuuscheds
+.TP
+.F /usr/lib/uucp/Systems*
+.TP
+.F /usr/lib/uucp/Permissions
+.TP
+.F /usr/lib/uucp/Devices
+.TP
+.F /usr/lib/uucp/Maxuuscheds
+how many copies of
+.I uusched
+may be active at once
+.TP
+.F /usr/lib/uucp/Maxuuxqts
+ditto for
+.I uuxqt
+.TP
+.F /usr/spool/uucp/*
+.TP
+.F /usr/spool/uucppublic/*
+.TP
+.F /usr/spool/uucp/LCK*
+.fi
+.SH "SEE ALSO"
+.IR uucp (1),
+.IR uux (1),
+.IR uustat (1)
+.br
+D. A. Nowitz,
+`UUCP Administration',
+this manual, Volume 2
+.SH BUGS
+System and user names received by
+.I uuxqt
+should not be believed.
diff --git a/static/v10/man8/uucleanup.8 b/static/v10/man8/uucleanup.8
new file mode 100644
index 00000000..650af0d7
--- /dev/null
+++ b/static/v10/man8/uucleanup.8
@@ -0,0 +1,103 @@
+.TH UUCLEANUP 8
+.CT 1 sa_auto
+.SH NAME
+uucleanup \- uucp spool directory clean-up
+.SH SYNOPSIS
+.B /usr/lib/uucp/uucleanup
+[
+.I options
+]
+.SH DESCRIPTION
+.I Uucleanup\^
+removes old files from the
+.I uucp
+spool directories.
+It is typically called by
+.FR /usr/lib/uucp/uudemon.cleanu ,
+which may be run regularly by
+.IR cron (8).
+The options are:
+.TF -mstring
+.TP
+.BI -C days\^
+Remove
+.B C.
+(control) files that are at least
+.I days
+old,
+and send a message to the user who queued the job.
+.PD
+.TP
+.BI -D days\^
+Remove
+.B D.
+(data) files that are at least
+.I days
+old.
+If the data file appears to contain a mail message,
+an attempt will be made to deliver it;
+if it contains a netnews article
+from another system,
+it will be handed to
+.IR rnews .
+.TP
+.BI -W days\^
+Send a warning to the user who queued any jobs
+.RB ( C.
+files)
+at least
+.I days
+old.
+If one of the data files for the job appears to be a mail message,
+the message is included in the warning.
+.TP
+.BI -X days\^
+Remove any
+.B X.
+(remote execution) files at least
+.I days
+old.
+.TP
+.BI -m string\^
+Include
+.I string
+in warning messages.
+The default is
+`See your local administrator to locate the problem.'
+.TP
+.BI -o days\^
+Remove any other files
+that are at least
+.I days
+old.
+.TP
+.BI -s system\^
+Examine only files associated with
+.IR system .
+.PP
+By default,
+.B C.
+files generate a warning when
+one day old,
+and are removed after 7 days;
+.B D.
+files are removed after 7 days;
+and
+.B X.
+and other files
+are removed after 2 days.
+.SH FILES
+.TF /usr/spool/uucp
+.TP
+.F /usr/lib/uucp
+directory with commands used by
+.I uucleanup
+.TP
+.F /usr/spool/uucp
+spool directory
+.SH SEE ALSO
+.IR uucp (1)
+.br
+D. A. Nowitz,
+`UUCP Administration',
+this manual, Volume 2
diff --git a/static/v10/man8/uurec.8 b/static/v10/man8/uurec.8
new file mode 100644
index 00000000..38dae752
--- /dev/null
+++ b/static/v10/man8/uurec.8
@@ -0,0 +1,18 @@
+.TH UUREC 8
+.SH NAME
+uurec \- receive processed news articles via mail
+.SH SYNOPSIS
+uurec
+.SH DESCRIPTION
+.I uurec
+reads news articles on the standard input sent by
+.I sendnews(8),
+decodes them, and gives them to
+.I inews(1)
+for insertion.
+.SH SEE ALSO
+inews(1),
+readnews(1),
+recnews(8),
+sendnews(8),
+newscheck(1)
diff --git a/static/v10/man8/vipw.8 b/static/v10/man8/vipw.8
new file mode 100644
index 00000000..05f46458
--- /dev/null
+++ b/static/v10/man8/vipw.8
@@ -0,0 +1,23 @@
+.TH VIPW 8
+.UC 4
+.SH NAME
+vipw \- edit the password file with vi
+.SH SYNOPSIS
+.B vipw
+.SH DESCRIPTION
+.I Vipw
+edits the password file while setting the appropriate locks,
+and does any necessary processing after the password file is unlocked.
+If the password file is already being edited, then you will be told
+to try again later
+.SH SEE ALSO
+chfn(1), chsh(1), passwd(1), passwd(5), adduser(8)
+.SH FILES
+/etc/vipw.lock
+.SH BUGS
+.I Vipw
+does not remove the vipw.lock file; this is not a bug, but people tend
+to think it is.
+.PP
+No one deals with left-over /etc/ptmp (the real lock) files after a system
+crash.
diff --git a/static/v10/man8/vmstat.8 b/static/v10/man8/vmstat.8
new file mode 100644
index 00000000..dd267fb0
--- /dev/null
+++ b/static/v10/man8/vmstat.8
@@ -0,0 +1,143 @@
+.TH VMSTAT 8
+.CT 1 sa_mortals
+.SH NAME
+vmstat \- report virtual memory statistics
+.SH SYNOPSIS
+.B vmstat
+[
+.B -st
+]
+[
+.I interval
+[
+.I count
+]
+]
+.SH DESCRIPTION
+.I Vmstat
+reports statistics about certain system activity.
+.ig x
+Option
+.B -f
+reports on
+.I forks
+since system startup and the number of pages of virtual memory involved.
+.x
+Option
+.B -s
+prints totals for miscellaneous events
+since the last boot.
+Option
+.B -t
+reports on paging events.
+.PP
+In the absence of other options, the optional
+.I interval
+argument causes
+.I vmstat
+to report once each
+.I interval
+seconds, repeated
+.I count
+times or forever.
+.PP
+The default format fields are:
+.TF faults
+.TP
+.B procs
+information about numbers of processes in various states:
+.RS
+.PD 0
+.TP
+.B r
+in run queue
+.TP
+.B b
+blocked for resources (I/O, paging, etc.)
+.TP
+.B w
+runnable or short sleeper (< 20 secs) but swapped
+.RE
+.PD
+.TP
+.B memory
+use of virtual and real memory:
+.RS
+.PD 0
+.TP
+.B avm
+number of
+pages belonging to processes that have run
+in the last 20 seconds
+.TP
+.B fre
+size of memory free list
+.RE
+.PD
+.TP
+.B page
+paging activity,
+averaged each five seconds, in units per second:
+.RS
+.PD 0
+.TP
+.B re
+page reclaims (simulating reference bits)
+.TP
+.B at
+text pages recovered from memory
+.TP
+.B pi
+page-in events
+.TP
+.B po
+page-out events
+.TP
+.B fr
+pages freed per second
+.TP
+.B de
+anticipated short term memory shortfall
+.TP
+.B sr
+scan rate: pageout daemon rpm
+.RE
+.PD
+.TP
+.B faults
+trap rates, averaged each five seconds, in units per second:
+.RS
+.PD 0
+.TP
+.B sy
+system calls
+.TP
+.B cs
+process context switches
+.RE
+.PD
+.TP
+.B cpu
+percentage use of CPU time:
+.RS
+.PD 0
+.TP
+.B us
+user time, both normal and low priority
+.TP
+.B sy
+system time
+.TP
+.B id
+cpu idle time
+.TP
+.B st
+stream queue processing time
+.RE
+.PD
+.SH FILES
+.F /dev/kmem
+.br
+.F /unix
+.SH BUGS
+This program is never up to date.
diff --git a/static/v10/man8/vpac.8 b/static/v10/man8/vpac.8
new file mode 100644
index 00000000..6acf1fce
--- /dev/null
+++ b/static/v10/man8/vpac.8
@@ -0,0 +1,49 @@
+.TH VPAC 8 2/21/80
+.UC 4
+.SH NAME
+vpac \- print raster printer/ploter accounting information
+.SH SYNOPSIS
+.B /etc/vpac
+[
+.B \-W
+] [
+.B \-s
+] [
+.B \-r
+] [
+.B \-t
+] [ name ... ]
+.SH DESCRIPTION
+.I Vpac
+reads the raster printer/plotter accounting files, accumulating the number
+of pages (for narrow fan-fold devices) or feet (for wide, roll paper devices)
+of paper consumed by each user, and printing out
+how much each user consumed in pages or feet and dollars (billed at
+2 cents / page or 8 cents / foot). If any
+.I names
+are specified, then statistics are only printed for those users;
+usually, statistics are printed for every user who has used any paper.
+.PP
+The
+.B \-W
+flag causes accounting to be done for a wide roll paper device. The default is
+to do accounting for a narrow, fan-fold device.
+The
+.B \-t
+flag causes the output to be sorted by feet of paper; usually the
+output is sorted alphabetically by name. The
+.B \-r
+flag reverses the sorting order.
+The
+.B \-s
+flag causes the accounting information to be summarized on the
+summary accounting file; this summarization is necessary since on a
+busy system, the accounting file can grow by several lines per day.
+.SH FILES
+.ta 2i
+/usr/adm/v?acct raw accounting files
+.br
+/usr/adm/v?_sum summary accounting files
+.SH BUGS
+The relationship between the computed price and reality is
+as yet unknown.
diff --git a/static/v10/man8/wall.8 b/static/v10/man8/wall.8
new file mode 100644
index 00000000..57918100
--- /dev/null
+++ b/static/v10/man8/wall.8
@@ -0,0 +1,23 @@
+.TH WALL 8
+.CT 1 sa_nonmortals
+.SH NAME
+wall \- write to all users
+.SH SYNOPSIS
+.B /etc/wall
+.SH DESCRIPTION
+.I Wall
+reads its standard input until an end-of-file.
+It then sends this message,
+preceded by
+`Broadcast Message ...',
+to all logged in users.
+.PP
+The sender should be super-user to override
+any protections the users may have invoked.
+.SH FILES
+.F /etc/utmp
+.SH "SEE ALSO"
+.IR write (1)
+.SH DIAGNOSTICS
+`Cannot send to ...' when the open on
+a user's tty file fails.
diff --git a/static/v10/man8/worm.8 b/static/v10/man8/worm.8
new file mode 100644
index 00000000..004f4a05
--- /dev/null
+++ b/static/v10/man8/worm.8
@@ -0,0 +1,436 @@
+.TH WORM 8 "wild"
+.CT 1 sa_nonmortals
+.SH NAME
+worm, jukebox \- optical disk utilities
+.SH SYNOPSIS
+.B "worm mkfs"
+[
+.BI -f device
+] [
+.BI -c comments
+] [
+.BI -b blksz
+] [
+.BI -n nblks
+] [
+.BI -v newvol_id
+]
+.I vol_id
+.PP
+.B "worm stat"
+[
+.BI -f device
+] [
+.BI -F n
+] [
+.B -v
+] [
+.I vol_id
+]
+.PP
+.B "worm ls"
+[
+.BI -f device
+] [
+.B -l
+] [
+.I file ...
+]
+.PP
+.B "worm rm"
+[
+.BI -f device
+]
+.I vol_id
+[
+.I file ...
+]
+.PP
+.B "worm mv"
+[
+.BI -f device
+]
+.I vol_id
+.I "src dest"
+.PP
+.B "worm write"
+[
+.BI -f device
+]
+.I vol_id
+[
+.I file ...
+]
+.PP
+.B "worm read"
+[
+.BI -f device
+] [
+.B -dm
+]
+.I vol_id
+[
+.I file ...
+]
+.PP
+.B "worm cat"
+[
+.BI -f device
+]
+.I vol_id
+.I file
+.PP
+.B "worm copy"
+[
+.B -v
+] [
+.BI -m min_free
+] [
+.BI -f src_dev
+]
+.I src_vol_id
+.I dest_dev
+.I dest_vol_id
+.PP
+.B "worm offline"
+[
+.BI -f device
+]
+.PP
+.B "worm btree"
+[
+.BI -f device
+]
+.I vol_id
+.PP
+.B "worm dir"
+[
+.BI -f device
+]
+.I vol_id
+.PP
+.B "worm tmpdir"
+[
+.BI -f device
+]
+.I vol_id
+.PP
+.B "worm mount"
+[
+.BI -w secs
+] [
+.I vol_id
+]
+.PP
+.B "jukebox"
+[
+.B -aemprsuU
+] [
+.BI -w secs
+] [
+.I vol_id
+]
+.SH DESCRIPTION
+The
+.I worm
+programs manipulate arbitrary files.
+They are intended for use with the raw device associated
+with a Write-Once Read-Many (WORM) optical disk.
+The default device is
+.FR /dev/worm0 .
+Other devices are specified by
+.BI -f device
+and a device name of a single digit
+.I n
+is taken as an abbreviation for
+.FR /dev/worm \f2n\fP.
+Most of the commands implement a simple file system.
+Programs just wanting a raw device should still use
+.B "worm mkfs"
+so that the disk is properly labeled.
+The
+.IR vol_id ,
+or label,
+should be unique and by convention, the vol_id's
+for the A and B sides of a disk should be the same string suffixed by
+a lowercase
+.B a
+and
+.B b
+respectively.
+.PP
+.I "Worm mkfs"
+labels an optical disk.
+The
+.I comments
+field is limited to 256 chars.
+It is purely descriptive and is printed by
+.IR "worm stat \-v" .
+The (default) blocksize is 1024 for our SONY disks.
+The number of blocks on a disk can be found by
+.IR ra (4)
+or
+.IR scsish (8);
+the default size
+(1,600,000 for single density, 3,250,000 for double density)
+sets aside 30MB or so as a hedge against oversights.
+If the disk has already been initialised, its vol_id must match
+.IR vol_id .
+A new vol_id can be set with
+.BR -v .
+.PP
+.I "Worm stat"
+prints out labeling information
+including the amount of free space left on the disk.
+Option
+.I vol_id
+turns off all output except exit status: zero if
+.I vol_id
+matches that of the disk,
+one otherwise.
+Option
+.B -F
+similarly exits with status zero if the disk has more than
+.I n
+free blocks, otherwise three.
+Option
+.B -v
+produces more output.
+.PP
+.I "Worm ls"
+simulates an emasculated
+.IR ls (1).
+.PP
+.I "Worm rm"
+makes the specifed files unavailable to the rest of the
+.I worm
+commands.
+.PP
+.I "Worm mv"
+renames
+.I src
+to
+.IR dest .
+.PP
+.I "Worm write"
+copies files onto the WORM.
+If no file arguments are given,
+filenames are read one per line from standard input.
+The total number of files and bytes is printed on standard output.
+.PP
+.I "Worm read"
+restores files from the WORM.
+If no file arguments are given,
+filenames are read one per line from standard input.
+Option
+.B -d
+causes directories to be created as needed.
+Option
+.B -m
+restores the original modification times.
+.PP
+.I "Worm cat"
+copies the named file from the WORM to the standard output.
+.PP
+.I "Worm copy"
+copies files directly from one disk to another.
+The names of the files to be copied are taken from standard input;
+groups (separated by blank lines) will be kept together.
+The names are typically generated by
+.BR "worm ls" .
+The
+.B -v
+option prints out progress and summary information.
+The copy will terminate before copying a group that would leave the destination
+volume with less than
+.I minfree
+(deafult value is 40000) blocks free.
+.PP
+.I "Worm offline"
+makes the WORM go offline, ready for ejecting.
+This command is harmless;
+accessing an offline drive will cause it to spin up and go online
+without operator intervention.
+.I "Worm offline"
+only takes effect after the last close of the WORM
+and as a bonus, applies to any MSCP device such as an RA81.
+.PP
+.I "Worm tmpdir"
+saves a copy of the directory in
+.BI /usr/worm/tmp/ vol_id
+if the directory
+.F /usr/worm/tmp
+exists.
+This will speed up subsequent access substantially,
+although it will still be slower than
+.I "worm btree"
+below.
+On the other hand,
+.I worm tmpdir
+typically takes 5 minutes to run (on a VAX 11/750)
+whereas
+.I worm btree
+takes about 45 minutes.
+.PP
+.I "Worm btree"
+constructs a new directory for the whole disk (in the form of a
+.IR cbt (1)
+database).
+The new superblock is at zero.
+All the worm commands go faster with such an index but it is intended to be done
+just once, after the disk is complete.
+The directory occupies of the order of 10MB but may be more.
+If you really have to add more files to the disk,
+you need to write zeros on the first 1K block of the WORM before using
+.IR "worm write" .
+.PP
+.I "Worm dir"
+takes the btree directory from the disk and stores in
+.FR /usr/worm/dirs .
+Future uses of the disk will be much faster.
+.PP
+.I "Worm mount"
+returns the device on which the disk labelled
+.I vol_id
+is mounted.
+If the drive(s) are busy and you have a jukebox, the
+.BI -w s
+option tells how many seconds to wait before failing.
+The default is wait forever.
+If no
+.I vol_id
+is given, print the drive status.
+.PP
+.I "Jukebox"
+manages the disks in the SONY jukebox.
+There are several options (default is
+.BR -s ):
+.TP 10
+.B -a
+Allocate a blank disk and label it
+.IR vol_id .
+Use
+.I "worm mkfs"
+to change any fields from their default value.
+.TP
+.B -e
+Eject the disk labeled
+.I vol_id.
+To physically retrieve the disk,
+press the
+.B OUT
+button (the
+.B "OUT READY"
+light should be on).
+Repeat until the
+.B "IN READY"
+light goes on.
+.TP
+.B -m
+Mount the disk labelled
+.I vol_id
+in some drive and print the drive number on standard output.
+.TP
+.B -p
+Print the list of disks in the jukebox.
+.TP
+.B -r
+Rebuild the list of disks by examining each disk in the jukebox.
+Do not do this unless you are sure you need to.
+If
+.I vol_id
+is given, it should be one of the following letters and governs
+how disks are assigned shelf numbers.
+The default is to leave the shelf number unchanged.
+Other options (mainly useful for demos) are
+.B c
+(compresses the disks in the jukebox towards the bottom or lower numbered shelves),
+.B r
+(distributes the disks randomly), and
+.B s
+(sorts the disks by vol_id).
+.TP
+.B -s
+Print the status of the jukebox.
+.TP
+.B -u
+Unload offline disks back onto their shelves.
+.TP
+.B -U
+Unload all disks (offline or not) back onto their shelves.
+.TP
+.BI -w secs
+This option only affects the behavior of
+.BR -m .
+If all drives are busy, try again for
+.I secs
+seconds before failing.
+.PP
+To load a disk into the jukebox, press the
+.B IN
+button on the jukebox when the
+.B "IN READY"
+light is on.
+After the shutter opens, push the disk in firmly.
+The disk (blank or initialised) is not examined immediately but on demand.
+.SS Etiquette
+Vol_ids should be unique as discussed above.
+The file
+.F /n/wild/usr/worm/vol_ids
+contains known vol_ids.
+The commands for reading and writing require vol_id's
+to guard against accessing the wrong disk.
+.PP
+The recommended protocol for changing disks is
+if no one appears to be using the drive
+(by using
+.IR ps (1)),
+execute
+.I "worm offline"
+and go to the drive.
+If, and only if, the drive has the DRIVE OFF (middle) light on,
+hit the EJECT button and change disks.
+If the light is not on, then
+someone is still using the disk and you should wait until they are done
+before hitting EJECT.
+.SS Programming considerations
+Programs should not depend on writing any block more than once; however,
+our SONY optical disks implement a small number of multiple writes
+via bad block replacement.
+A
+.IR read (2)
+of an unwritten block returns with an errno of
+.BR ENXIO .
+On Vaxes, the WORM is an MSCP device;
+thus geometry information can be fetched as in
+.IR ra (4).
+.PP
+For maximum speed, read and write in large blocks (preferably 63K)
+and avoid seeks.
+A seek across the whole disk takes about 1 second.
+.PP
+The device
+.F /dev/worm?
+is simply an appropriate raw
+.IR ra (4)
+device, partition 7 (the whole disk).
+.SH EXAMPLES
+.EX
+worm mkfs -c"512x512x24 movies" tdmoviesa
+worm write tdmoviesa < filenames
+worm read -d tdmoviesa bumblebee/act2/frame1
+.EE
+.SH FILES
+.F /dev/worm?
+.br
+.F /n/wild/usr/worm/vol_ids
+.br
+.F /n/wild/usr/worm/jukedir
+.SH SEE ALSO
+.IR backup (8),
+.IR scsish (8),
+.IR backup (1)
+.SH BUGS
+The output of
+.I "worm ls"
+is not necessarily sorted.
diff --git a/static/v10/man8/xs.8 b/static/v10/man8/xs.8
new file mode 100644
index 00000000..7c7339d2
--- /dev/null
+++ b/static/v10/man8/xs.8
@@ -0,0 +1,63 @@
+.TH XS 8
+.CT 1 sa_nonmortals
+.SH NAME
+xs \- checksums
+.SH SYNOPSIS
+.B xs
+[
+-s
+]
+[
+-k
+.I keystring
+]
+[
+-f
+.I official-list
+]
+.IR file ...
+.SH DESCRIPTION
+.I Xs
+computes and reports
+checksums of named files,
+one report per line, in the form
+.IP
+filename s1 s2 s3 s4
+.LP
+where the checksum comprises four groups of four hex digits each.
+The checksum algorithm may be perturbed by specifying a
+.I keystring
+argument.
+The
+.B -s
+argument causes the file's mode, label, owner and group
+to enter into the checksum calculation.
+.PP
+The
+.B -f
+argument causes
+.I xs
+to verify checksums of files against
+values
+given
+in the
+.I official-list
+file, which has the format of the output of an earlier
+.I xs
+run:
+lines consisting of
+one file name followed by four groups of hex digits per line.
+Text after a
+.L #
+sign is ignored.
+.PP
+The checksum algorithm used is meant to be secure: to create a file
+whose checksum agrees with that of another given file is very difficult.
+.SH EXAMPLES
+.EX
+xs -s `find /bin -print` | xs /dev/stdin
+.EE
+.IP
+This should return a different value if
+.B /bin
+changes in any way.
diff --git a/static/v10/man8/xstr.8 b/static/v10/man8/xstr.8
new file mode 100644
index 00000000..681f2e2f
--- /dev/null
+++ b/static/v10/man8/xstr.8
@@ -0,0 +1,108 @@
+.TH XSTR 8
+.CT 1 prog_c
+.SH NAME
+xstr \- preprocessor for sharing strings in C programs
+.SH SYNOPSIS
+.B xstr
+[
+.B -c
+]
+[
+.B -
+]
+[
+.I file
+]
+.SH DESCRIPTION
+.I Xstr
+maintains a file
+.F strings
+into which strings in component parts of a large program are hashed.
+These strings are replaced with references to this common area.
+This serves to implement shared constant strings, most useful if they
+are also read-only.
+.PP
+The command
+.IP
+.L
+xstr -c name.c
+.PP
+will extract the strings from the named C source, replacing
+string references by expressions of the form
+.BI (&xstr[ number ])
+for some
+.I number.
+An appropriate declaration of
+.I xstr
+is prepended to the file.
+The resulting C text is placed in the file
+.BR x.c .
+The strings from this file are placed in the
+.F strings
+data base if they are not there already.
+Repeated strings and strings which are suffixes of existing strings
+do not cause changes to the data base.
+.PP
+After all components of a large program have been compiled a file
+.B xs.c
+declaring the common
+.I xstr
+space can be created by running
+.B xstr
+with no arguments.
+This
+.B xs.c
+file should then be compiled and loaded with the rest
+of the program.
+If possible, the array can be made read-only (shared) saving
+space and swap overhead.
+.PP
+Without option
+.BR -c ,
+creates files
+.I x.c
+and
+.I xs.c
+as before, but does not use or affect any
+.F strings
+file in the same directory.
+.PP
+It may be useful to run
+.I xstr
+after the C preprocessor if any macro definitions yield strings
+or if there is conditional code which contains strings
+which may not, in fact, be needed.
+.I Xstr
+reads from its standard input when the argument
+.L -
+is given.
+An appropriate command sequence for running
+.I xstr
+after the C preprocessor is:
+.IP
+.EX
+cc -E name.c | xstr -c -
+cc -c x.c
+mv x.o name.o
+.EE
+.SH FILES
+.TF /tmp/xs*
+.TP
+.F strings
+Data base of strings
+.TP
+.F x.c
+Massaged C source
+.TP
+.F xs.c
+C source for definition of array
+.L xstr
+.TP
+.F /tmp/xs*
+Temp file
+.SH BUGS
+If a string is a suffix of another string in the data base,
+but the shorter string is seen first by
+.I xstr
+both strings will be placed in the data base, when just
+placing the longer one there will do.