umask.2 (17906) | umask.2 (20097) |
---|---|
1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)umask.2 8.1 (Berkeley) 6/4/93 | 1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)umask.2 8.1 (Berkeley) 6/4/93 |
33.\" $Id$ | 33.\" $Id: umask.2,v 1.2 1996/08/29 21:24:19 wosch Exp $ |
34.\" 35.Dd June 4, 1993 36.Dt UMASK 2 37.Os BSD 4 38.Sh NAME 39.Nm umask 40.Nd set file creation mode mask 41.Sh SYNOPSIS --- 32 unchanged lines hidden (view full) --- 74function is always successful. 75.Sh SEE ALSO 76.Xr chmod 2 , 77.Xr mknod 2 , 78.Xr open 2 79.Sh STANDARDS 80The 81.Fn umask | 34.\" 35.Dd June 4, 1993 36.Dt UMASK 2 37.Os BSD 4 38.Sh NAME 39.Nm umask 40.Nd set file creation mode mask 41.Sh SYNOPSIS --- 32 unchanged lines hidden (view full) --- 74function is always successful. 75.Sh SEE ALSO 76.Xr chmod 2 , 77.Xr mknod 2 , 78.Xr open 2 79.Sh STANDARDS 80The 81.Fn umask |
82function call is expected to conform to IEEE Std 1003.1-1988 83.Pq Dq Tn POSIX . | 82function call is expected to conform to 83.St -p1003.1-90 . |
84.Sh HISTORY 85An 86.Fn umask 87function call appeared in 88.At v7 . | 84.Sh HISTORY 85An 86.Fn umask 87function call appeared in 88.At v7 . |