Deleted Added
full compact
umask.2 (17906) umask.2 (20097)
1.\" Copyright (c) 1980, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)umask.2 8.1 (Berkeley) 6/4/93
1.\" Copyright (c) 1980, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)umask.2 8.1 (Berkeley) 6/4/93
33.\" $Id$
33.\" $Id: umask.2,v 1.2 1996/08/29 21:24:19 wosch Exp $
34.\"
35.Dd June 4, 1993
36.Dt UMASK 2
37.Os BSD 4
38.Sh NAME
39.Nm umask
40.Nd set file creation mode mask
41.Sh SYNOPSIS

--- 32 unchanged lines hidden (view full) ---

74function is always successful.
75.Sh SEE ALSO
76.Xr chmod 2 ,
77.Xr mknod 2 ,
78.Xr open 2
79.Sh STANDARDS
80The
81.Fn umask
34.\"
35.Dd June 4, 1993
36.Dt UMASK 2
37.Os BSD 4
38.Sh NAME
39.Nm umask
40.Nd set file creation mode mask
41.Sh SYNOPSIS

--- 32 unchanged lines hidden (view full) ---

74function is always successful.
75.Sh SEE ALSO
76.Xr chmod 2 ,
77.Xr mknod 2 ,
78.Xr open 2
79.Sh STANDARDS
80The
81.Fn umask
82function call is expected to conform to IEEE Std 1003.1-1988
83.Pq Dq Tn POSIX .
82function call is expected to conform to
83.St -p1003.1-90 .
84.Sh HISTORY
85An
86.Fn umask
87function call appeared in
88.At v7 .
84.Sh HISTORY
85An
86.Fn umask
87function call appeared in
88.At v7 .