1 .\" Copyright (c) 1980, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)utmp.5 8.2 (Berkeley) 3/17/94
49 declares the structures used to record information about current
52 logins and logouts in the file
54 and last logins in the file
56 The time stamps of date changes, shutdowns and reboots are also logged in
60 .Bd -literal -offset indent
61 #define _PATH_UTMP "/var/run/utmp"
62 #define _PATH_WTMP "/var/log/wtmp"
63 #define _PATH_LASTLOG "/var/log/lastlog"
65 #define UT_NAMESIZE 16
67 #define UT_HOSTSIZE 16
70 int32_t ll_time; /* When user logged in */
71 char ll_line[UT_LINESIZE]; /* Terminal line name */
72 char ll_host[UT_HOSTSIZE]; /* Host user came from */
76 char ut_line[UT_LINESIZE]; /* Terminal line name */
77 char ut_name[UT_NAMESIZE]; /* User's login name */
78 char ut_host[UT_HOSTSIZE]; /* Host user came from */
79 int32_t ut_time; /* When user logged in */
85 file is a linear array of
87 structures indexed by a user's
91 file is a linear array of
93 structures indexed by a terminal line number
100 structures and is a binary log file,
101 that is, grows linearly at its end.
103 By default, each time a user logs in, the
105 program looks up the user's
109 If it is found, the timestamp of the last time the user logged
110 in, the terminal line and the hostname
111 are written to the standard output.
114 program then records the new login time in the file
127 record for the user is inserted.
128 This record remains there until
129 the user logs out at which time it is deleted.
132 file is used by the programs
141 program opens the file
143 and appends the user's
146 The user's subsequent logout from the terminal
147 line is marked by a special
162 file is used by the programs
167 In the event of a date change, a shutdown or reboot, the
168 following items are logged in the
172 .Bl -tag -width ".Li shutdown" -compact
175 A system reboot or shutdown has been initiated.
178 is placed in the field
192 The system time has been manually or automatically updated
197 is recorded in the field
203 indicates the time prior to the change, and the character
205 indicates the new time.
210 file can grow rapidly on busy systems, so daily or weekly rotation
215 If any one of these files does not exist, it is not created by
217 The files must be created manually.
224 utility functions should be used to perform
225 the standard actions on the
229 files in order to maintain the portability across
230 systems with different formats of those files.
232 .Bl -tag -width ".Pa /var/log/lastlog" -compact
241 .It Pa /var/log/lastlog
262 file format appeared in
266 file format appeared in