Deleted Added
full compact
sh.1 (17987) sh.1 (18018)
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" Kenneth Almquist.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 19 unchanged lines hidden (view full) ---

28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)sh.1 8.6 (Berkeley) 5/4/95
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" Kenneth Almquist.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 19 unchanged lines hidden (view full) ---

28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)sh.1 8.6 (Berkeley) 5/4/95
36.\" $Id: sh.1,v 1.6 1996/08/29 18:06:10 wosch Exp $
36.\" $Id: sh.1,v 1.7 1996/09/01 10:21:39 peter Exp $
37.\"
38.na
39.TH SH 1
40.SH NAME
41sh \- command interpreter (shell)
42.SH SYNOPSIS
43sh [-/+aCefnuvxIimsVEb] [-/+o longname] [arg ...]
44.SH DESCRIPTION

--- 1231 unchanged lines hidden (view full) ---

1276are specified by signal number. Action may be null
1277or omitted; the former causes the specified signal to
1278be ignored and the latter causes the default action
1279to be taken. When the shell forks off a subshell, it
1280resets trapped (but not ignored) signals to the
1281default action. The trap command has no effect on
1282signals that were ignored on entry to the shell.
1283.TP
37.\"
38.na
39.TH SH 1
40.SH NAME
41sh \- command interpreter (shell)
42.SH SYNOPSIS
43sh [-/+aCefnuvxIimsVEb] [-/+o longname] [arg ...]
44.SH DESCRIPTION

--- 1231 unchanged lines hidden (view full) ---

1276are specified by signal number. Action may be null
1277or omitted; the former causes the specified signal to
1278be ignored and the latter causes the default action
1279to be taken. When the shell forks off a subshell, it
1280resets trapped (but not ignored) signals to the
1281default action. The trap command has no effect on
1282signals that were ignored on entry to the shell.
1283.TP
1284ulimit [ -HSacdflmnpst ] [ limit ]
1284ulimit [ -HSacdflmnust ] [ limit ]
1285Set or display resource limits (see getrlimit(2)).
1286If ``limit'' is specified, the named resource will be set;
1287otherwise the current resource value will be displayed.
1288.br
1289If ``-H'' is specified, the hard limits will be
1290set or displayed. While everybody is allowed to reduce a
1291hard limit, only the superuser can increase it. Option ``-S''
1292specifies the soft limits instead. When displaying limits,

--- 82 unchanged lines hidden ---
1285Set or display resource limits (see getrlimit(2)).
1286If ``limit'' is specified, the named resource will be set;
1287otherwise the current resource value will be displayed.
1288.br
1289If ``-H'' is specified, the hard limits will be
1290set or displayed. While everybody is allowed to reduce a
1291hard limit, only the superuser can increase it. Option ``-S''
1292specifies the soft limits instead. When displaying limits,

--- 82 unchanged lines hidden ---