1 .\" Copyright 1995, 1996, 1997
2 .\" Guy Helmer, Ames, Iowa 50014. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer as
9 .\" the first lines of this file unmodified.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
13 .\" 3. The name of the author may not be used to endorse or promote products
14 .\" derived from this software without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY GUY HELMER ``AS IS'' AND ANY EXPRESS OR
17 .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 .\" IN NO EVENT SHALL GUY HELMER BE LIABLE FOR ANY DIRECT, INDIRECT,
20 .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 .Nd remove users from the system
43 utility removes one or more users submitted on the command line
45 In removing a user from the system, this utility:
54 jobs belonging to the user.
58 signal to all processes owned by the user.
60 Removes the user from the system's local password file.
62 Removes the user's home directory (if it is owned by the user),
63 including handling of symbolic links in the path to the actual home
66 Removes the incoming mail and POP daemon mail files belonging to the
70 Removes all files owned by the user from
73 .Pa /var/tmp/vi.recover .
75 Removes the username from all groups to which it belongs in
77 (If a group becomes empty and the group name is the same as the username,
78 the group is removed; this complements
80 per-user unique groups.)
82 Removes all message queues, shared memory segments and
83 semaphores owned by the user.
88 utility refuses to remove users whose UID is 0 (typically root), since
89 certain actions (namely, killing all the user's processes, and perhaps
90 removing the user's home directory) would cause damage to a running system.
91 If it is necessary to remove a user whose UID is 0, see
93 for information on directly editing the password file.
97 was not invoked with the
100 show the selected user's password file entry and ask for confirmation
101 that the user be removed.
102 It will then ask for confirmation to delete
103 the user's home directory.
104 If the answer is in the affirmative, the home
105 directory and any files and subdirectories under it will be deleted only if
106 they are owned by the user.
113 operates, it informs the user regarding the current activity.
115 errors occur, they are posted to standard error and, if it is possible for
117 to continue, it will.
119 The options are as follows:
120 .Bl -tag -width ".Ar username"
124 utility will get a list of users to be removed from
126 which will contain one user per line.
127 Anything following a hash mark
129 including the hash mark itself, is considered a comment and will not
131 If the file is owned by anyone other than a user with
132 UID 0, or is writable by anyone other than the owner,
134 will refuse to continue.
138 to any and all prompts.
139 Currently, this includes
140 prompts on whether to remove the specified user and whether to remove
142 This option requires that either the
144 option be used, or one or more user names be given as command line
149 the output includes one line per removed user;
153 will be much more chatty about the steps taken.
155 Identifies one or more users to be removed; if not present,
157 interactively asks for one or more users to be removed.
161 .It Pa /etc/master.passwd
187 utility does not comprehensively search the file system for all files
188 owned by the removed user and remove them; to do so on a system
189 of any size is prohibitively slow and I/O intensive.
190 It is also unable to remove symbolic links that were created by the
197 file systems do not contain information
198 as to who created them.
199 Also, there may be other files created in
202 .Pa /var/mail/ Ns Ar username
204 .Pa /var/mail/.pop. Ns Ar username
205 that are not owned by the removed user but should be removed.
209 utility has no knowledge of YP/NIS, and it operates only on the