sh.1 (17987) | sh.1 (18018) |
---|---|
1.\" Copyright (c) 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Kenneth Almquist. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)sh.1 8.6 (Berkeley) 5/4/95 | 1.\" Copyright (c) 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Kenneth Almquist. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)sh.1 8.6 (Berkeley) 5/4/95 |
36.\" $Id: sh.1,v 1.6 1996/08/29 18:06:10 wosch Exp $ | 36.\" $Id: sh.1,v 1.7 1996/09/01 10:21:39 peter Exp $ |
37.\" 38.na 39.TH SH 1 40.SH NAME 41sh \- command interpreter (shell) 42.SH SYNOPSIS 43sh [-/+aCefnuvxIimsVEb] [-/+o longname] [arg ...] 44.SH DESCRIPTION --- 1231 unchanged lines hidden (view full) --- 1276are specified by signal number. Action may be null 1277or omitted; the former causes the specified signal to 1278be ignored and the latter causes the default action 1279to be taken. When the shell forks off a subshell, it 1280resets trapped (but not ignored) signals to the 1281default action. The trap command has no effect on 1282signals that were ignored on entry to the shell. 1283.TP | 37.\" 38.na 39.TH SH 1 40.SH NAME 41sh \- command interpreter (shell) 42.SH SYNOPSIS 43sh [-/+aCefnuvxIimsVEb] [-/+o longname] [arg ...] 44.SH DESCRIPTION --- 1231 unchanged lines hidden (view full) --- 1276are specified by signal number. Action may be null 1277or omitted; the former causes the specified signal to 1278be ignored and the latter causes the default action 1279to be taken. When the shell forks off a subshell, it 1280resets trapped (but not ignored) signals to the 1281default action. The trap command has no effect on 1282signals that were ignored on entry to the shell. 1283.TP |
1284ulimit [ -HSacdflmnpst ] [ limit ] | 1284ulimit [ -HSacdflmnust ] [ limit ] |
1285Set or display resource limits (see getrlimit(2)). 1286If ``limit'' is specified, the named resource will be set; 1287otherwise the current resource value will be displayed. 1288.br 1289If ``-H'' is specified, the hard limits will be 1290set or displayed. While everybody is allowed to reduce a 1291hard limit, only the superuser can increase it. Option ``-S'' 1292specifies the soft limits instead. When displaying limits, --- 82 unchanged lines hidden --- | 1285Set or display resource limits (see getrlimit(2)). 1286If ``limit'' is specified, the named resource will be set; 1287otherwise the current resource value will be displayed. 1288.br 1289If ``-H'' is specified, the hard limits will be 1290set or displayed. While everybody is allowed to reduce a 1291hard limit, only the superuser can increase it. Option ``-S'' 1292specifies the soft limits instead. When displaying limits, --- 82 unchanged lines hidden --- |