1 .\" Copyright (c) 1989, 1990, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
33 .\" $FreeBSD: src/usr.sbin/mtree/mtree.8,v 1.16.2.11 2003/03/11 22:31:29 trhodes Exp $
34 .\" $DragonFly: src/usr.sbin/mtree/mtree.8,v 1.6 2007/10/20 13:43:00 swildner Exp $
41 .Nd map a directory hierarchy
61 .Op Fl X Ar exclude-list
66 utility compares the file hierarchy rooted in the current directory against a
67 specification read from the standard input.
68 Messages are written to the standard output for any files whose
69 characteristics do not match the specifications, or which are
70 missing from either the file hierarchy or the specification.
72 The options are as follows:
75 Follow all symbolic links in the file hierarchy.
77 Don't follow symbolic links in the file hierarchy, instead consider
78 the symbolic link itself in any comparisons. This is the default.
80 Modify the owner, group and permissions of existing files to match
81 the specification and create any missing directories or symbolic links.
82 User, group and permissions must all be specified for missing directories
84 Corrected mismatches are not considered errors.
86 Print a specification for the file hierarchy to the standard output.
88 Ignore everything except directory type files.
90 Don't complain about files that are in the file hierarchy, but not in the
93 Indent the output 4 spaces each time a directory level is descended when
94 create a specification with the
97 This does not affect either the /set statements or the comment before each
99 It does however affect the comment before the close of each directory.
101 Do not emit pathname comments when creating a specification. Normally
102 a comment is emitted before each directory and before the close of that
103 directory when using the
107 Quiet mode. Do not complain when a
109 directory cannot be created because it already exists.
110 This occurs when the directory is a symbolic link.
112 Remove any files in the file hierarchy that are not described in the
117 except a status of 2 is returned if the file hierarchy did not match
120 Don't descend below mount points in the file hierarchy.
122 Read the specification from
124 instead of from the standard input.
126 Add the specified (whitespace or comma separated)
128 to the current set of keywords.
130 Use the ``type'' keyword plus the specified (whitespace or comma separated)
132 instead of the current set of keywords.
134 Use the file hierarchy rooted in
136 instead of the current directory.
138 Display a single checksum to the standard error output that represents all
139 of the files for which the keyword
142 The checksum is seeded with the specified value.
143 .It Fl X Ar exclude-list
144 The specified file contains
146 patterns matching files to be excluded from
147 the specification, one to a line.
148 If the pattern contains a
150 character, it will be matched against entire pathnames (relative to
151 the starting directory); otherwise,
152 it will be matched against basenames only. No comments are allowed in
158 Specifications are mostly composed of ``keywords'', i.e. strings
159 that specify values relating to files.
160 No keywords have default values, and if a keyword has no value set, no
161 checks based on it are performed.
163 Currently supported keywords are as follows:
166 The checksum of the file using the default algorithm specified by
171 The file flags as a symbolic name. See
173 for information on these names. If no flags are to be set the string
175 may be used to override the current default.
177 Ignore any file hierarchy below this file.
179 The file group as a numeric value.
181 The file group as a symbolic name.
183 The MD5 message digest of the file.
189 message digest of the file.
190 .It Cm ripemd160digest
193 message digest of the file.
195 The current file's permissions as a numeric (octal) or symbolic
198 The number of hard links the file is expected to have.
200 Make sure this file or directory exists but otherwise ignore all attributes.
202 The file owner as a numeric value.
204 The file owner as a symbolic name.
206 The size, in bytes, of the file.
208 The file the symbolic link is expected to reference.
210 The last modification time of the file.
212 The type of the file; may be set to any one of the following:
214 .Bl -tag -width Cm -compact
218 character special device
232 The default set of keywords are
243 There are four types of lines in a specification.
245 The first type of line sets a global value for a keyword, and consists of
246 the string ``/set'' followed by whitespace, followed by sets of keyword/value
247 pairs, separated by whitespace.
248 Keyword/value pairs consist of a keyword, followed by an equals sign
249 (``=''), followed by a value, without whitespace characters.
250 Once a keyword has been set, its value remains unchanged until either
253 The second type of line unsets keywords and consists of the string
254 ``/unset'', followed by whitespace, followed by one or more keywords,
255 separated by whitespace.
257 The third type of line is a file specification and consists of a file
258 name, followed by whitespace, followed by zero or more whitespace
259 separated keyword/value pairs.
260 The file name may be preceded by whitespace characters.
261 The file name may contain any of the standard file name matching
262 characters (``['', ``]'', ``?'' or ``*''), in which case files
263 in the hierarchy will be associated with the first pattern that
266 Each of the keyword/value pairs consist of a keyword, followed by an
267 equals sign (``=''), followed by the keyword's value, without
268 whitespace characters.
269 These values override, without changing, the global value of the
270 corresponding keyword.
272 All paths are relative.
273 Specifying a directory will cause subsequent files to be searched
274 for in that directory hierarchy.
275 Which brings us to the last type of line in a specification: a line
276 containing only the string
278 causes the current directory
279 path to ascend one level.
281 Empty lines and lines whose first non-whitespace character is a hash
282 mark (``#'') are ignored.
286 utility exits with a status of 0 on success, 1 if any error occurred,
287 and 2 if the file hierarchy did not match the specification.
288 A status of 2 is converted to a status of 0 if the
292 .Bl -tag -width /etc/mtree -compact
294 system specification directory
297 To detect system binaries that have been ``trojan horsed'', it is recommended
302 be run on the file systems, and a copy of the results stored on a different
303 machine, or, at least, in encrypted form.
304 The output file itself should be digested using the
311 should be run against the on-line specifications.
312 While it is possible for the bad guys to change the on-line specifications
313 to conform to their modified binaries, it is believed to be
314 impractical for them to create a modified specification which has
315 the same MD5 digest as the original.
321 options can be used in combination to create directory hierarchies
322 for distributions and other such things; the files in
324 were used to create almost all directories in this
330 style BSD.*.dist file, use
337 .Cm uname,gname,mode,nochange .
357 digest capability was added in
359 in response to the widespread use of programs which can spoof
365 digests were added in
367 as new attacks have demonstrated weaknesses in
369 Support for file flags was added in
371 and mostly comes from