-->
Page 296
OPTIONS
-i | Log the process ID of the logger process with each line. |
-s | Log the message to standard error, as well as the system log. |
-f file | Log the specified file. |
-p pri | Enter the message with the specified priority. The priority may be specified numerically or as a facility.level pair. For example, _p local3.info logs the message(s) as informational level in the local3 facility. The default is user.notice. |
-t tag | Mark every line in the log with the specified tag. |
message | Write the message to log; if not specified, and the -f flag is not provided, standard input is logged. |
The logger utility exits 0 on success, and >0 if an error occurs.
Example
logger system rebooted:
logger _p local0.notice _t HOSTIDM _f /dev/idmc
SEE ALSO
syslog(3), syslogd(8)
Standards
The logger command is expected to be compatible with IEEE Std 1003.2 (POSIX).
BSD 4.3, 6 June 1993
loginSign on
SYNOPSIS
login [ name ] login _p login _h hostname login _f name
DESCRIPTION
login is used when signing on to a system. It can also be used to switch from one user to another at any time. (Most modern shells have support for this feature built into them, however.)
If an argument is not given, login prompts for the username.
If the user is not root, and if /etc/nologin exists, the contents of this file are printed to the screen, and the login is terminated. This is typically used to prevent logins when the system is being taken down.
If the user is root, then the login must be occurring on a tty listed in /etc/securetty. Failures will be logged with the syslog facility.
After these conditions are checked, the password will be requested and checked (if a password is required for this username). Ten attempts are allowed before login dies, but after the first three, the response starts to get very slow. Login failures are reported via the syslog facility. This facility is also used to report any successful root logins.
If the file .hushlogin exists, then a quiet login is performed (this disables the checking of the checking of mail and the printing of the last login time and message of the day). Otherwise, if /var/log/lastlog exists, the last login time is printed (and the current login is recorded).
Page 297
Random administrative things, such as setting the UID and GID of the tty, are performed. The TERM ENVIRONMENT variable is preserved, if it exists; other ENVIRONMENT variables are preserved if the _p option is used. Then the HOME, PATH, SHELL, TERM, MAIL, and LOGNAME ENVIRONMENT variables are set. PATH defaults to /usr/local/bin:/bin:/usr/bin:. for normal users, and to /sbin:/bin:/usr/sbin:/usr/bin for root. Last, if this is not a quiet login, the message of the day is printed and the file with the user's name in /usr/spool/mail will be checked, and a message printed if it has nonzero length.
The user's shell is then started. If no shell is specified for the user in /etc/passwd, then /bin/sh is used. If there is no directory specified in /etc/passwd, then / is used. (The home directory is checked for the .hushlogin file described earlier.)
OPTIONS
_p | Used by getty(8) to tell login not to destroy the ENVIRONMENT. |
_f | Used to skip a second login authentication. This specifically does not work for root, and does not appear to work well under Linux. |
_h | Used by other servers (such as telnetd(8)) to pass the name of the remote host to login so that it may be placed in utmp and wtmp. Only the superuser may use this option. |
FILES
/var/run/utmp /var/log/wtmp /var/log/lastlog /usr/spool/mail/* /etc/motd /etc/passwd /etc/nologin /etc/usertty .hushlogin
SEE ALSO
init(8), getty(8), mail(1), passwd(1), passwd(5), environ(7), shutdown(8)
BUGS
Linux, unlike other Draconian operating systems, does not check quotas.
The undocumented BSD _r option is not supported. This may be required by some rlogind(8) programs.
AUTHOR
Derived from BSD login 5.40 (May 9, 1989) by Michael Glad (glad@daimi.dk) for HP-UX Ported to Linux 0.12: Peter Orbaek (poe@daimi.aau.dk).
Linux 0.99, 1 February 1993
lookDisplay lines beginning with a given string
SYNOPSIS
look [_dfa] [_t termchar] string [file]
DESCRIPTION
The look utility displays any lines in file that contain string as a prefix. As look performs a binary search, the lines in file must be sorted.