Deleted Added
full compact
du.1 (158339) du.1 (162792)
1.\" Copyright (c) 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\" notice, this list of conditions and the following disclaimer in the
11.\" documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\" must display the following acknowledgement:
14.\" This product includes software developed by the University of
15.\" California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\" may be used to endorse or promote products derived from this software
18.\" without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)du.1 8.2 (Berkeley) 4/1/94
1.\" Copyright (c) 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\" notice, this list of conditions and the following disclaimer in the
11.\" documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\" must display the following acknowledgement:
14.\" This product includes software developed by the University of
15.\" California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\" may be used to endorse or promote products derived from this software
18.\" without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)du.1 8.2 (Berkeley) 4/1/94
33.\" $FreeBSD: head/usr.bin/du/du.1 158339 2006-05-06 22:04:59Z maxim $
33.\" $FreeBSD: head/usr.bin/du/du.1 162792 2006-09-29 15:20:48Z ru $
34.\"
35.Dd May 6, 2006
36.Dt DU 1
37.Os
38.Sh NAME
39.Nm du
40.Nd display disk usage statistics
41.Sh SYNOPSIS
42.Nm
43.Op Fl H | L | P
44.Op Fl a | s | d Ar depth
45.Op Fl c
46.Op Fl h | k | m
47.Op Fl n
48.Op Fl x
49.Op Fl I Ar mask
50.Op Ar
51.Sh DESCRIPTION
52The
53.Nm
54utility displays the file system block usage for each file argument
55and for each directory in the file hierarchy rooted in each directory
56argument.
57If no file is specified, the block usage of the hierarchy rooted in
58the current directory is displayed.
59.Pp
60The options are as follows:
61.Bl -tag -width indent
62.It Fl H
63Symbolic links on the command line are followed, symbolic links in file
64hierarchies are not followed.
65.It Fl L
66Symbolic links on the command line and in file hierarchies are followed.
67.It Fl I Ar mask
68Ignore files and directories matching the specified
69.Ar mask .
70.It Fl P
71No symbolic links are followed.
72This is the default.
73.It Fl a
74Display an entry for each file in a file hierarchy.
75.It Fl h
76"Human-readable" output.
77Use unit suffixes: Byte, Kilobyte, Megabyte,
78Gigabyte, Terabyte and Petabyte.
79.It Fl r
80Generate messages about directories that cannot be read, files
81that cannot be opened, and so on.
82This is the default case.
83This option exists solely for conformance with
84.St -xpg4 .
85.It Fl s
86Display an entry for each specified file.
87(Equivalent to
88.Fl d Li 0 )
89.It Fl d Ar depth
90Display an entry for all files and directories
91.Ar depth
92directories deep.
93.It Fl c
94Display a grand total.
95.It Fl k
96Display block counts in 1024-byte (1-Kbyte) blocks.
97.It Fl m
98Display block counts in 1048576-byte (1-Mbyte) blocks.
99.It Fl n
34.\"
35.Dd May 6, 2006
36.Dt DU 1
37.Os
38.Sh NAME
39.Nm du
40.Nd display disk usage statistics
41.Sh SYNOPSIS
42.Nm
43.Op Fl H | L | P
44.Op Fl a | s | d Ar depth
45.Op Fl c
46.Op Fl h | k | m
47.Op Fl n
48.Op Fl x
49.Op Fl I Ar mask
50.Op Ar
51.Sh DESCRIPTION
52The
53.Nm
54utility displays the file system block usage for each file argument
55and for each directory in the file hierarchy rooted in each directory
56argument.
57If no file is specified, the block usage of the hierarchy rooted in
58the current directory is displayed.
59.Pp
60The options are as follows:
61.Bl -tag -width indent
62.It Fl H
63Symbolic links on the command line are followed, symbolic links in file
64hierarchies are not followed.
65.It Fl L
66Symbolic links on the command line and in file hierarchies are followed.
67.It Fl I Ar mask
68Ignore files and directories matching the specified
69.Ar mask .
70.It Fl P
71No symbolic links are followed.
72This is the default.
73.It Fl a
74Display an entry for each file in a file hierarchy.
75.It Fl h
76"Human-readable" output.
77Use unit suffixes: Byte, Kilobyte, Megabyte,
78Gigabyte, Terabyte and Petabyte.
79.It Fl r
80Generate messages about directories that cannot be read, files
81that cannot be opened, and so on.
82This is the default case.
83This option exists solely for conformance with
84.St -xpg4 .
85.It Fl s
86Display an entry for each specified file.
87(Equivalent to
88.Fl d Li 0 )
89.It Fl d Ar depth
90Display an entry for all files and directories
91.Ar depth
92directories deep.
93.It Fl c
94Display a grand total.
95.It Fl k
96Display block counts in 1024-byte (1-Kbyte) blocks.
97.It Fl m
98Display block counts in 1048576-byte (1-Mbyte) blocks.
99.It Fl n
100Ignore files and directories with user "nodump" flag (UF_NODUMP) set.
100Ignore files and directories with user
101.Dq nodump
102flag
103.Pq Dv UF_NODUMP
104set.
101.It Fl x
102File system mount points are not traversed.
103.El
104.Pp
105The
106.Nm
107utility counts the storage used by symbolic links and not the files they
108reference unless the
109.Fl H
110or
111.Fl L
112option is specified.
113If either the
114.Fl H
115or
116.Fl L
117options are specified, storage used by any symbolic links which are
118followed is not counted or displayed.
119.Pp
120Files having multiple hard links are counted (and displayed) a single
121time per
122.Nm
123execution.
124.Sh ENVIRONMENT
125.Bl -tag -width BLOCKSIZE
126.It Ev BLOCKSIZE
127If the environment variable
128.Ev BLOCKSIZE
129is set, and the
130.Fl k
131option is not specified, the block counts will be displayed in units of that
132size block.
133If
134.Ev BLOCKSIZE
135is not set, and the
136.Fl k
137option is not specified, the block counts will be displayed in 512-byte blocks.
138.El
139.Sh SEE ALSO
140.Xr df 1 ,
141.Xr chflags 2 ,
142.Xr fts 3 ,
143.Xr symlink 7 ,
144.Xr quot 8
145.Sh HISTORY
146A
147.Nm
148command appeared in
149.At v1 .
105.It Fl x
106File system mount points are not traversed.
107.El
108.Pp
109The
110.Nm
111utility counts the storage used by symbolic links and not the files they
112reference unless the
113.Fl H
114or
115.Fl L
116option is specified.
117If either the
118.Fl H
119or
120.Fl L
121options are specified, storage used by any symbolic links which are
122followed is not counted or displayed.
123.Pp
124Files having multiple hard links are counted (and displayed) a single
125time per
126.Nm
127execution.
128.Sh ENVIRONMENT
129.Bl -tag -width BLOCKSIZE
130.It Ev BLOCKSIZE
131If the environment variable
132.Ev BLOCKSIZE
133is set, and the
134.Fl k
135option is not specified, the block counts will be displayed in units of that
136size block.
137If
138.Ev BLOCKSIZE
139is not set, and the
140.Fl k
141option is not specified, the block counts will be displayed in 512-byte blocks.
142.El
143.Sh SEE ALSO
144.Xr df 1 ,
145.Xr chflags 2 ,
146.Xr fts 3 ,
147.Xr symlink 7 ,
148.Xr quot 8
149.Sh HISTORY
150A
151.Nm
152command appeared in
153.At v1 .