Deleted Added
full compact
sh.1 (217473) sh.1 (218306)
1.\"-
2.\" Copyright (c) 1991, 1993
3.\" The Regents of the University of California. All rights reserved.
4.\"
5.\" This code is derived from software contributed to Berkeley by
6.\" Kenneth Almquist.
7.\"
8.\" Redistribution and use in source and binary forms, with or without

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" from: @(#)sh.1 8.6 (Berkeley) 5/4/95
1.\"-
2.\" Copyright (c) 1991, 1993
3.\" The Regents of the University of California. All rights reserved.
4.\"
5.\" This code is derived from software contributed to Berkeley by
6.\" Kenneth Almquist.
7.\"
8.\" Redistribution and use in source and binary forms, with or without

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" from: @(#)sh.1 8.6 (Berkeley) 5/4/95
33.\" $FreeBSD: head/bin/sh/sh.1 217473 2011-01-16 14:11:50Z jilles $
33.\" $FreeBSD: head/bin/sh/sh.1 218306 2011-02-04 22:47:55Z jilles $
34.\"
34.\"
35.Dd January 16, 2011
35.Dd February 4, 2011
36.Dt SH 1
37.Os
38.Sh NAME
39.Nm sh
40.Nd command interpreter (shell)
41.Sh SYNOPSIS
42.Nm
43.Op Fl /+abCEefIimnPpTuVvx

--- 598 unchanged lines hidden (view full) ---

642whose
643.Tn ASCII
644representation is
645.Dq Li #! ,
646resulting in an
647.Er ENOEXEC
648return value from
649.Xr execve 2 )
36.Dt SH 1
37.Os
38.Sh NAME
39.Nm sh
40.Nd command interpreter (shell)
41.Sh SYNOPSIS
42.Nm
43.Op Fl /+abCEefIimnPpTuVvx

--- 598 unchanged lines hidden (view full) ---

642whose
643.Tn ASCII
644representation is
645.Dq Li #! ,
646resulting in an
647.Er ENOEXEC
648return value from
649.Xr execve 2 )
650the shell will interpret the program in a subshell.
651The child shell will reinitialize itself in this case,
652so that the effect will be
653as if a new shell had been invoked to handle the ad-hoc shell script,
654except that the location of hashed commands located in
655the parent shell will be remembered by the child
656(see the description of the
657.Ic hash
658built-in command below).
650the shell will run a new instance of
651.Nm
652to interpret it.
659.Pp
660Note that previous versions of this document
661and the source code itself misleadingly and sporadically
662refer to a shell script without a magic number
663as a
664.Dq "shell procedure" .
665.Ss Path Search
666When locating a command, the shell first looks to see if

--- 1857 unchanged lines hidden ---
653.Pp
654Note that previous versions of this document
655and the source code itself misleadingly and sporadically
656refer to a shell script without a magic number
657as a
658.Dq "shell procedure" .
659.Ss Path Search
660When locating a command, the shell first looks to see if

--- 1857 unchanged lines hidden ---