10/12/88 check_iacl Syntax as a command: check_iacl {path} {-control_args} Function: lists segments whose access control lists (ACLs) disagree with the initial ACL for segments. (For a description of ACLs and initial ACLs, see the Programmer's Reference Manual.) Arguments: path is the pathname of the directory whose segment ACLs are to be checked against the segment initial ACL. If you omit path, the working directory is assumed. Control arguments: -all, -a lists User_ids in a segment ACL excluded from the initial ACL and User_ids included in the initial ACL but omitted from a segment ACL. If you give no -all, only User_ids in addition to those in the initial ACL are listed. -exclude User_id, -ex User_id excludes the specified User_id from the comparison of IACL with entry ACL. Up to 10 -exclude control arguments may be given. The ACL matching convention is allowed, as described in Notes below. NOTES The strategy for matching an access control name argument is defined by three rules: 1) A literal component, including "*", matches only a component of the same name. For example: "*.*.*" matches only the literal ACL entry "*.*.*" 2) A missing component delimited by a period matches any component. For examples: ".." matches any ACL entry. "." matches any ACL entry whose third component value is "*" 3) A missing component not delimited by a period is treated the same as a literal "*". For example: "*.Multics" is treated as "*.Multics.*" Missing components on the left must be delimited by periods. For example: "..a" matches any ACL entry whose third component value is "a" ----------------------------------------------------------- Historical Background This edition of the Multics software materials and documentation is provided and donated to Massachusetts Institute of Technology by Group BULL including BULL HN Information Systems Inc. as a contribution to computer science knowledge. This donation is made also to give evidence of the common contributions of Massachusetts Institute of Technology, Bell Laboratories, General Electric, Honeywell Information Systems Inc., Honeywell BULL Inc., Groupe BULL and BULL HN Information Systems Inc. to the development of this operating system. Multics development was initiated by Massachusetts Institute of Technology Project MAC (1963-1970), renamed the MIT Laboratory for Computer Science and Artificial Intelligence in the mid 1970s, under the leadership of Professor Fernando Jose Corbato. Users consider that Multics provided the best software architecture for managing computer hardware properly and for executing programs. Many subsequent operating systems incorporated Multics principles. Multics was distributed in 1975 to 2000 by Group Bull in Europe , and in the U.S. by Bull HN Information Systems Inc., as successor in interest by change in name only to Honeywell Bull Inc. and Honeywell Information Systems Inc. . ----------------------------------------------------------- Permission to use, copy, modify, and distribute these programs and their documentation for any purpose and without fee is hereby granted,provided that the below copyright notice and historical background appear in all copies and that both the copyright notice and historical background and this permission notice appear in supporting documentation, and that the names of MIT, HIS, BULL or BULL HN not be used in advertising or publicity pertaining to distribution of the programs without specific prior written permission. Copyright 1972 by Massachusetts Institute of Technology and Honeywell Information Systems Inc. Copyright 2006 by BULL HN Information Systems Inc. Copyright 2006 by Bull SAS All Rights Reserved